Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

ECS401: Cryptography and

Network Security

Module 5: Authentication Protocols


Lecture 44
Outline of the lecture
• Kerberos Requirements
• Kerberos Overview
• Kerberos Realms and Multiple Kerberi
• Differences between Kerberos Version 4 and 5

2
Kerberos Requirements
The first published report on Kerberos listed the following requirements.

Reliable: For all services


Secure: A network that rely on Kerberos
eavesdropper should for access control, lack
not be able to obtain of availability of the
Transparent: Ideally, Scalable: The system
the necessary Kerberos service means
the user should not be should be capable of
information to lack of availability of the
aware that supporting large
impersonate a user. supported services.
authentication is taking numbers of clients and
More generally, Hence, Kerberos should
place beyond the servers. This suggests a
Kerberos should be be highly reliable and
requirement to enter a modular, distributed
strong enough that a should employ a
password. architecture.
potential opponent distributed server
does not find it to be architecture with one
the weak link. system able to back up
another.

3
Kerberos
Overview

4
Kerberos Overview
Table 1: Summary of Kerberos Version 4 Message Exchanges

5
Kerberos Realms and Multiple Kerberi
A full-service Kerberos environment consisting of a Kerberos server, a number of clients, and a number of application servers
requires the following:

1. The Kerberos server must have the user ID and hashed


2. The Kerberos server must share a secret key with each
passwords of all participating users in its database. All
server. All servers are registered with the Kerberos server.
users are registered with the Kerberos server.

Such an environment is referred to as a Kerberos realm.

6
Kerberos Realms and Multiple Kerberi
The concept of realm can be explained as follows.

A Kerberos realm is a set of managed nodes that share the same Kerberos database.

The Kerberos database resides on the Kerberos master computer system, which should be
kept in a physically secure room.

A read-only copy of the Kerberos database might also reside on other Kerberos computer
systems. However, all changes to the database must be made on the master computer
system.

Changing or accessing the contents of a Kerberos database requires the Kerberos master
password.

A related concept is that of a Kerberos principal, which is a service or user that is known to
the Kerberos system. Each Kerberos principal is identified by its principal name.

7
Kerberos Realms and Multiple Kerberi
Principal names consist of three parts:

a service or user name, an instance name, and a realm name

Networks of clients and servers under different administrative organizations typically constitute different
realms.

That is, it generally is not practical or does not conform to administrative policy to have users and servers in
one administrative domain registered with a Kerberos server elsewhere.

However, users in one realm may need access to servers in other realms, and some servers may be willing
to provide service to users from other realms, provided that those users are authenticated.

Kerberos provides a mechanism for supporting such interrealm authentication.

8
Kerberos Realms and Multiple Kerberi
For two realms to support interrealm authentication, a third requirement is added:

3. The Kerberos server in each interoperating realm shares a secret key with the
server in the other realm. The two Kerberos servers are registered with each
other.

The scheme requires that the Kerberos server in one realm trust the Kerberos server in the other realm to
authenticate its users.

Furthermore, the participating servers in the second realm must also be willing to trust the Kerberos
server in the first realm.

9
Kerberos Realms and Multiple Kerberi

With these ground rules in place, The user’s client follows the
The client can then apply to the
we can describe the mechanism usual procedures to gain access
remote TGS for a service-
as follows (Figure 1): A user to the local TGS and then
granting ticket for the desired
wishing service on a server in requests a ticket-granting ticket
server in the realm of the
another realm needs a ticket for for a remote TGS (TGS in another
remote TGS.
that server. realm).

10
Kerberos Realms and
Multiple Kerberi

Figure 1: Request for Service in Another Realm 11


Kerberos Realms and Multiple Kerberi

One problem presented by the foregoing approach is that it


The ticket presented to the remote server indicates the
does not scale well to many realms. If there are realms, then
realm in which the user was originally authenticated. The
there must be secure key exchanges so that each Kerberos
server chooses whether to honor the remote request.
realm can interoperate with all other Kerberos realms.

12
Differences between Kerberos Version 4 and 5
Kerberos version 5 provides a number of improvements over version 4.

Version 5 is intended to address the limitations of version 4 in two areas:

environmental technical
shortcomings deficiencies

13
Differences between Kerberos Version 4 and 5
Kerberos version 4 was developed for use within the Project Athena environment and, accordingly, did not fully address the
need to be of general purpose. This led to the following environmental shortcomings.

Encryption system Message byte ordering: In


dependence: Version 4 requires version 4, the sender of a
the use of DES. Export message employs a byte
restriction on DES as well as Internet protocol dependence: ordering of its own choosing
doubts about the strength of Version 4 requires the use of and tags the message to
DES were thus of concern. In Internet Protocol (IP) addresses. indicate least significant byte in
version 5, ciphertext is tagged Other address types, such as lowest address or most
with an encryption-type the ISO network address, are significant byte in lowest
identifier so that any encryption not accommodated. Version 5 address. This techniques works
technique may be used. network addresses are tagged but does not follow established
Encryption keys are tagged with with type and length, allowing conventions. In version 5, all
a type and a length, allowing any network address type to be message structures are defined
the same key to be used in used. using Abstract Syntax Notation
different algorithms and One (ASN.1) and Basic Encoding
allowing the specification of Rules (BER), which provide an
different variations on a given unambiguous byte ordering.
algorithm.
14
Differences between Kerberos Version 4 and 5
Environmental shortcomings:

Ticket lifetime: Lifetime Authentication forwarding:


values in version 4 are Version 4 does not allow
encoded in an 8-bit quantity credentials issued to one
in units of five minutes. Thus, client to be forwarded to
the maximum lifetime that some other host and used by
Interrealm authentication: In
can be expressed is (a little some other client. This
version 4, interoperability
over ). This may be capability would enable a
among realms requires on
inadequate for some client to access a server and
the order of Kerberos-to-
applications (e.g., a long- have that server access
Kerberos relationships, as
running simulation that another server on behalf of
described earlier. Version 5
requires valid Kerberos the client. For example, a
supports a method that
credentials throughout client issues a request to a
requires fewer relationships.
execution). In version 5, print server that then
tickets include an explicit start accesses the client’s file from
time and end time, allowing a file server, using the client’s
tickets with arbitrary credentials for access. Version
lifetimes. 5 provides this capability.
15
Differences
between Kerberos
Double encryption: Note in Table 1 [messages (2) and (4)]
that tickets provided to clients are encrypted twice—once
with the secret key of the target server and then again with a
Version 4 and 5 secret key known to the client. The second encryption is not
necessary and is computationally wasteful.

Apart from these environmental limitations, there


are technical deficiencies in the version 4 protocol
itself. The deficiencies are the following.
PCBC encryption: Encryption in version 4 makes use of a
nonstandard mode of DES known as propagating cipher block
chaining (PCBC). It has been demonstrated that this mode is
vulnerable to an attack involving the interchange of ciphertext
blocks. PCBC was intended to provide an integrity check as
part of the encryption operation. Version 5 provides explicit
integrity mechanisms, allowing the standard CBC mode to be
used for encryption. In particular, a checksum or hash code is
attached to the message prior to encryption using CBC.
16
Differences Session keys: Each ticket includes a session key that is used by the client to
encrypt the authenticator sent to the service associated with that ticket. In

between Kerberos
addition, the session key may subsequently be used by the client and the
server to protect messages passed during that session. However, because
the same ticket may be used repeatedly to gain service from a particular
Version 4 and 5 server, there is the risk that an opponent will replay messages from an old
session to the client or the server. In version 5, it is possible for a client and
server to negotiate a sub-session key, which is to be used only for that one
connection. A new access by the client would result in the use of a new
sub-session key.

Technical deficiencies:

Password attacks: Both versions are vulnerable to a password attack. The


message from the AS to the client includes material encrypted with a key
based on the client’s password. An opponent can capture this message and
attempt to decrypt it by trying various passwords. If the result of a test
decryption is of the proper form, then the opponent has discovered the
client’s password and may subsequently use it to gain authentication
credentials from Kerberos. Version 5 does provide a mechanism known as
pre-authentication, which should make password attacks more difficult, but
it does not prevent them.
17

You might also like