32
VKSF 423 System Administration III Authentication Kerberos

VKSF 423 System Administration III Authentication Kerberos

Embed Size (px)

Citation preview

Page 1: VKSF 423 System Administration III Authentication Kerberos

VKSF 423 System Administration III

Authentication Kerberos

Page 2: VKSF 423 System Administration III Authentication Kerberos

Announcements

Slight modification to the syllabus Office hours

Tuesday 10-12 Thursday 10-12, 2-3

Lab Three: Virtualized Storage Veritas Storage Central OpenAFS LVM or EVMS Dynamic Disks (MS DFS)

Page 3: VKSF 423 System Administration III Authentication Kerberos

Syllabus Modifications

Old Component

Weight New Component

Due date

Labs 25% No change All sign offs and submission by the end of 10th week

Practical 25% No change Demonstrated before exam week begins

Group Presentation

10% In lab In lab approximately 5 minutes

Group Report

10% Site Book Due by end of 10th week

Homework 10% Group Evaluation

How did the individuals contribute to the completion of the labs

Final Exam 20% No change During the final exam period

Page 4: VKSF 423 System Administration III Authentication Kerberos

Definitions

Identification- assertion of who you are

Authentication-process of proving one’s identity

Authorization-The privileges that accrue to an identity

Access control-Provide the correct services to the correct users

Page 5: VKSF 423 System Administration III Authentication Kerberos

Two Types of Authentication

User authentication Machine to machine authentication

Cryptographic Other (weak)

Page 6: VKSF 423 System Administration III Authentication Kerberos

Identification

Who are you? Who do you claim to be? Who are you acting as?

Page 7: VKSF 423 System Administration III Authentication Kerberos

Authentication

Can you prove who you say you are?

How? Something you know

Passwords Something you are

Biometrics Something you have

Access tokens

Page 8: VKSF 423 System Administration III Authentication Kerberos

Access Control

All of the above Allow the correct users

Into a system Access to appropriate resources

Disallow invalid users Entry to the systems Deny access to restricted resources

Page 9: VKSF 423 System Administration III Authentication Kerberos

Something you KnowPasswords

Oxymoron: Large random string != easy to remember

Password design/assignment Multiple words/syllables Mixed case/digits/punctuation

Storage Weak/strong encryption

Users perceive the risks as minimal vs. need to get work done

Page 10: VKSF 423 System Administration III Authentication Kerberos

Passwords

Myth: never write down a password Recovery Helps more complicated passwords Multiple passwords

Clues/questions One time passwords

Page 11: VKSF 423 System Administration III Authentication Kerberos

Something you areBiometrics

Voice, retinal, DNA, body geometry, signature, finger prints

Hard to change Easy to forge

Page 12: VKSF 423 System Administration III Authentication Kerberos

Something you haveAccess Tokens

Physical keys Smart cards Translators Problems

Stolen Duplicated Spoofed

Page 13: VKSF 423 System Administration III Authentication Kerberos

Authentication Protocols

Cryptographic methods to authenticate over a network

Multiple vulnerabilities

Page 14: VKSF 423 System Administration III Authentication Kerberos

Network Authentication Options

Do nothing- trust machine to prevent unauthorized user access (control physical access)

Require machine to prove identity to network, then trust machine to authenticate users and provide access control

Require identification and authentication at each resource

Page 15: VKSF 423 System Administration III Authentication Kerberos

Authentication Requirements

Must be Secure A.k.a. secure enough to push hackers

elsewhere Must be reliable

Manageable level of false negatives and false positives

Transparent to users Scalable to enterprise networks

Page 16: VKSF 423 System Administration III Authentication Kerberos

Simple Protocol

Bob enters password on client Client sends password to server Server looks up id and password in

database of ids and passwords If it matches, validation message

sent to client & Bob is in

Page 17: VKSF 423 System Administration III Authentication Kerberos

Problems with simple scenario

Clear text password in database Clear text password in transfer Confirmation spoofing

Page 18: VKSF 423 System Administration III Authentication Kerberos

Password Database

Hide Encrypt

Salt Multiple serial encryptions

Page 19: VKSF 423 System Administration III Authentication Kerberos

Transfer

Hashing Encryption

Page 20: VKSF 423 System Administration III Authentication Kerberos

Confirmation spoofing

Simple T/F Alternate hash of password/known

key Encryption

Page 21: VKSF 423 System Administration III Authentication Kerberos

Improved Protocol: Challenge

Avoid clear text transfer of password Bob informs server of desire to

access Server offers a phrase to Bob Bob encrypts phrase with Bob’s

password and sends to server Server, who already knows Bob’s

password, also encrypts phrase with Bob’s password and compares

Page 22: VKSF 423 System Administration III Authentication Kerberos

Problems with improved version

Server needs clear text copy of Bob’s password

Given enough instances of a login the original password could be determined

Page 23: VKSF 423 System Administration III Authentication Kerberos

Use of a “Trusted Third Party”

The “Blind Date” protocol I don’t know Kathy She doesn’t know me We both know Loretta We both separately contact Loretta Loretta “vouches” for me to Kathy Loretta “vouches” for Kathy to me

Page 24: VKSF 423 System Administration III Authentication Kerberos

Levels of Kerberos Protection

Authentication at initiation of network session, assume future messages from same address come from same machine

Authentication of each message, no encryption of message

Private messages-each message is authenticated and encrypted

Page 25: VKSF 423 System Administration III Authentication Kerberos

Kerberos Modules

Applications library Encryption library Database library Database administration programs Administration server Authentication server Db propagation software User programs applications

Page 26: VKSF 423 System Administration III Authentication Kerberos

Kerberos Misc.

Model based on Needham and Schroeder key distribution protocol

Encryption done with DES Extendable to DES Cypher Block Chaining

Database Contains one record/principal Record contains name, private key,

expiration date of principal Name- name.instance@realm

Page 27: VKSF 423 System Administration III Authentication Kerberos

Kerberos

Ticket Used to securely pass the identity of the

person to whom the ticket was issued between the authentication server and the end server.

Authenticator Contains additional information which when

compared against the ticket proves that the client presenting the ticket is the same one to which the ticket was issued.

Page 28: VKSF 423 System Administration III Authentication Kerberos

Kerberos

Keeps database of clients and private keys If client is user, key is encrypted

password Generates temporary private keys

(session keys) Session keys are given to two clients

to encrypt messages between them.

Page 29: VKSF 423 System Administration III Authentication Kerberos

Kerberos Ticket

Ticket is good for a single server and a single client Contains name of the server Name of the client IP address of the client Timestamp Lifetime Random session key

Encrypted using the private key of the server for which the ticket will be used

May be used until lifetime expires

Page 30: VKSF 423 System Administration III Authentication Kerberos

Kerberos Authenticator

Contains Name of the client Client’s IP address Client’s current time

Can only be used once, must be regenerated each time a client wants to use a service

Can be regenerated by the client (without going to the server)

Encrypted in the session key that is part of the ticket

Page 31: VKSF 423 System Administration III Authentication Kerberos

Enhanced protocol: Kerberos

Bob asks K-server to access Mary’s server K-server checks to see if Bob has access

permissions K-server sends Bob a ticket and a

session key Bob uses session key to create an

authenticator to prove to Mary he is Bob Bob send ticket and authenticator to

Mary Mary checks both

Page 32: VKSF 423 System Administration III Authentication Kerberos

Main Problem

Authentication of user or device given zero prior information

Does Kerberos do this?