Professional Documents
Culture Documents
Session 20 Kerberos Ver 2
Session 20 Kerberos Ver 2
Network Security
P C Gupta
1
Contents
Kerberos
• Centralized authentication service
• Kerberos
• Kerberos realms
P C Gupta 2
Centralized Authentication Service
A1 AS C : Client
A : Application server
C A2 C A1
AS: Authentication server
A3 A2
A3
P C Gupta 3
Centralized Authentication Service
P C Gupta 4
Centralized Authentication Service
C A1
Every instance of access to an application
server requires re-authentication and A3
A2
a new ‘ticket’ from AS.
• Therefore a user may require re-authentication and a
new ticket several times in a day. E.g.
a) On every instance of accessing the mail server.
b) On every instance of availing different application service
e.g. print server.
• These issues are addressed by
a) making a ticket reusable within its lifetime (say 8 hours).
b) separating ‘authentication’ and ‘ticketing’ functions by
introducing an additional server ‘ticket-granting server’
(TGS).
P C Gupta 5
Centralized Authentication Service
AS C : Client
A : Application server
C TGS AS : Authentication server
TGS : Ticket-granting server
A1
A2
KDC Client
User 1 AS KDC
Client 2
3 TGS
4 AS : Authentication server
User Application
5 A TGS: Ticket granting server
server (A) 6 A : Application server
IdC : User Id
IdTGS : TGS Id
TSC : Time stamp. It is used by the client to match its requests and
responses from AS.
P C Gupta 8
Kerberos
Client
User 1 AS KDC
2 AS : Authentication server
3 TGS TGS: Ticket granting server
4 A : Application server
5 A
6
P C Gupta 9
Kerberos
Client
User 1 AS KDC
2
3 TGS
4 AS : Authentication server
5 A TGS: Ticket granting server
6
A : Application server
3. Client asks user for password to derive KC. It verifies TSC &
retrieves key session key KC-TGS.
Client TGS Service request for accessing server A.
IdA Authenticator1
Authenticator1 consists of
E(KC-TGS, {IdC, IPC, TSC})
P C Gupta 10
Kerberos
Client
User 1 AS KDC
2
3
4 TGS AS : Authentication server
5 A TGS: Ticket granting server
6 A : Application server
P C Gupta 11
Kerberos
KDC Client
User 1 AS KDC
Client 2
3 TGS
4 AS : Authentication server
User Application
5 A TGS: Ticket granting server
server (A) 6 A : Application server
Authenticator2 contains
E(KC-A, {IdC, IPC, TSC})
P C Gupta 12
Kerberos
KDC Client
User 1 AS KDC
Client 2
3 TGS
4 AS : Authentication server
User Application
5 A TGS: Ticket granting server
server (A) 6 A : Application server
6. Application server (A)
– opens ( ) using key KA & extracts session key KC-A.
– uses KC-A to decrypt & verify Authenticator2.
– verifies time stamp TSC to ensure that it is not a replay.
A Client A’s authenticator for the client.
E(KC-A, {TSC+1})
P C Gupta 13
Attack Vulnerabilities
P C Gupta 14
Attack Vulnerabilities
5. Client A Authenticator2
Authenticator2 : E(KC-A, {IdC, IPC, TSC})
E(KA, {KC-A IdC IdA IPC TST LT})
Can attacker pose as client & generate this request?
6. A Client E(KC-A, {TSC+1})
Can attacker pose as application server and generate this
reply?
P C Gupta 15
Kerberos Realms
TGS TGS
P C Gupta 16
Kerberos Realms
Client
2
3 5 TGS
TGS 4 6
7 P
8
P C Gupta 17