E N D
KERBEROS • PRESENTEDBY- • ARADHANA KUSHWAHA • Reg No. 2018CA37 • MCA, 4TH SEMESTER • MNNIT ALLAHABAD VERSION - 1
CONTENT •WhatisKerberos? •WhyKerberos? •Kerberosdesign • Working of Kerberos •ApplicationofKerberos •AttacksonKerberos
WHATISKERBEROS? •Literalmeaning:InGreekmythology,kerberosisamulti-headeddog(usuallythree)whichgaurdstheentranceofHades. •TechnicallyKerberosisanauthenticationprotocolimplementedonProjectAthenaatMIT •Athenaprovidesanopennetworkcomputingenvironment •Eachuserhascompletecontrolofitsworkstation •Buttheworkstationscannotbetrustedcompletelytoidentifyitsuserstothenetworkservices •Kerberosactsasathirdpartyauthenticator -Helpstheusertoproveitsidentitytothevariousservicesandviceversa •Usessymmetricalcryptographicalgorithms (privatekeycryptosystems) –Samekeyisusedforencryptionaswellasdecryption –UsesDES(DataEncryptionStandard)
WHYKERBEROS? •Authenticationisakeyfeatureinamulti-userenvironment. •Sendingusernamesandpasswordsoverthenetworkisnotsecure. •Eachtimeapasswordissentinthenetwork,thereisachanceforinterception. Problem:Cannottrustworkstationtoidentify theiruserscorrectlyinanopendistributedenvironmentSolution: –Buildingelaborateauthenticationprotocolsateachserver –Acentralizedauthenticationserver(Kerberos)
KERBEROSDESIGN •EveryUserhasapassword. •Everyservicehasapassword. •Passwordareneversentacrossthenetworkincleartext(orstoredinmemory) •Usermustidentifyhimselfonceatthebeginningofaworkstationsession(loginsession) •TheonlyentitythatknowsallthepasswordsistheAUTHENTICATIONSERVER(AS)•EveryusersharesitsprivatesecretkeywiththeAUTHENTICATIONSERVER -UserXdoesn’tknowtheprivatekeyofuserY. •KeyDistribution:WhenXwantstocommunicatewithY,theyneedtouseasecretkeybetweenthem -ASisresponsiblefordistributingthissessionkey(conversationkey)betweenX andY •EverybodyhastotrustAS
WORKING OF KERBEROS •Torequestaservicefromaserver,theclientgoesthroughthreephasesofauthentication •Phase1 –TheclientrequestsaticketfromtheKerberos –Kerberosgrantsaticketandasessionkey –Theticketisusedforrequestingotherticketsforvariousservices –Ticketconveystheidentityoftheclienttotheserver–Thesessionkeyisusedforconversationbetweenthe clientandtheserver
…..continue Phase2 –Theclientusestheticketofthefirstphasetorequestaticketfromtheticket grantingserver(TGS)foraspecificservice Phase3 –Theclientpresentsthekeytotheserverfortheservice
APPLICATIONSOFKERBEROS •WindowsserversuseKerberosastheprimaryauthenticationprotocol. •Telnet/FTPusesKerberos. •Authenticationforwebservices. •Authenticatingemailclientandservers.
ATTACKSONKERBEROS •KDCsecurity •Availability •Replayattacks •Password-guessingattacks