28

KERBEROS

  • Upload
    baruch

  • View
    60

  • Download
    0

Embed Size (px)

DESCRIPTION

KERBEROS. CONTENTS Introduction What is Kerberos? Where does the name Kerberos came from? Why Kerberos? What does Kerberos do? Kerberos software components How Kerberos works? Kerberos names Kerberos database Kerberos from the outside looking in - PowerPoint PPT Presentation

Citation preview

Page 1: KERBEROS
Page 2: KERBEROS

CONTENTS

Introduction What is Kerberos? Where does the name Kerberos came from? Why Kerberos? What does Kerberos do? Kerberos software components How Kerberos works? Kerberos names Kerberos database Kerberos from the outside looking in Kerberos issue and open problems Effectiveness of Kerberos Kerberos status How widespread is deployment? Advantages and Disadvantages Commercial support for Kerberos MIT Kerberos team Conclusion References

Page 4: KERBEROS

Where does the name “Kerberos” came from?

The name Kerberos comes from Greek mythology; it is the three-headed dog that guarded the entrance to Hades.

“CERBERUS” is the Latin spelling of the Greek “Kerberos”, and according to the OED is pronounced like “Serberus”, but that is quite at odds with the Greek, as the initial consonant is a “k”.MIT project Athena chose to use the Greek spelling and pronunciation.

Page 5: KERBEROS

SECURE THE DATA

RELIABLE SERVICE

TRANSPERANCY

SCALABILITY

Page 6: KERBEROS

Kerberos keeps a database of its clients and their private keys.

Kerberos provides three distinct levels of protection.

Kerberos provides safe messages.

Page 7: KERBEROS

KERBEROS APPLICATION LIBRARY ENCRYPTION LIBRARY DATABASE LIBRARY DATABASE ADMINISTRATION PROGRAMS ADMINISTRATION SERVER AUTHENTICATION SERVER DB PROPOGATION SOFTWARE USER PROGRAMS

Page 8: KERBEROS

Requesting a Kerberos Service

Getting the Initial Kerberos Ticket

Getting Kerberos Server Tickets

Page 9: KERBEROS

TGT,TGS

Logging on to the workstation

1 User name

2

P W

A O

S R

S D

ENTRY

3Authentication

ServerWorkstation

Flow of Authentication Information

Page 10: KERBEROS

TICKET•User name•NT address•Service name•Time stamp•Session key

TGT

Ticket, 2 copies of session key

Session key requested

4

5Ticket Granting Server

Application Server

Workstation

SESSIONkey

TGS Session key

Page 11: KERBEROS

Verifying the request

Application

Server

WorkstationRandom Number8

7 Random number

Ticket6

Session Key

Session Key

Page 12: KERBEROS
Page 13: KERBEROS

Key referral between Domains

Key referral between Trusted Domains

Page 14: KERBEROS
Page 15: KERBEROS
Page 16: KERBEROS

The KDBM Server

The kadmin and kpasswd Programs

Kerberos Database Replication

Page 17: KERBEROS

Kerberos User's Eye View

Kerberos From the Programmer's Viewpoint

The Kerberos Administrator's Job

Page 18: KERBEROS

How to decide the correct lifetime for a ticket?

How to allow proxies?

How to guarantee workstation integrity?

Page 19: KERBEROS
Page 20: KERBEROS

A prototype version of Kerberos went into production in September of 1986. Since January of 1987, Kerberos has been Project Athena's sole means of authenticating its 5,000 users, 650 workstations, and 65 servers. In addition, Kerberos is now being used in place of .rhosts files for controlling access in several of Athena's timesharing systems.

Page 21: KERBEROS
Page 22: KERBEROS
Page 24: KERBEROS

MIT Team Members

Jeff Schiller ('79)

Ted Ts'o ('90) Tom Yu ('96) Ken Raeburn

('88) Paul Hill Marshall Vale Miroslav Jurisic Alexis Ellwood Danilo Almeida

Page 25: KERBEROS
Page 26: KERBEROS

[email protected] http://web.mit.edu/kerberos www.cisco.com www.orw.gor [email protected] [email protected] [email protected] www.cybersafecorporation.com www.crypto_publish.org.com [email protected] [email protected] The Kerberos newsgroup Kerberos on the Macintosh comp.protocols.kerberosFAQ

Page 27: KERBEROS
Page 28: KERBEROS