rakesh raj

21
A Seminar Report on KERBEROSSubmitted by Mr. Rakesh R. Rajgopal Guided by Prof. D. A. Sananse

Upload: dbncoet

Post on 13-May-2015

804 views

Category:

Technology


0 download

DESCRIPTION

it is most easy and comfortable ppt on topic KERBEROS

TRANSCRIPT

Page 1: Rakesh raj

ASeminar Report

on

”KERBEROS”

Submitted byMr. Rakesh R. Rajgopal

Guided byProf. D. A. Sananse

Page 2: Rakesh raj

CONTENTSINTRODUCTION

HistoryMotivation

WHAT IS KERBEROS?TERMINOLOGYWORKINGKERBEROS ENVIRONMENTKERBEROS DATABASEKERBEROS ADMINISTRATORADVANTAGES & DISADVANTAGESPUBLIC KEY CRYPTOGRAPHYCONCLUSIONREFERENCES

Page 3: Rakesh raj

INTRODUCTION History

Developed at the MIT during development of Project called Athena started in 1983 with UNIX timesharing computers.

Motivation It must be secure. It must be reliable. It should be transparent. It should be scalable.

Page 4: Rakesh raj

What is Kerberos?In an open network computing environment, a workstation cannot be trusted to identify its Users correctly.

Trusted third-party authentication service.

Monstrous three-headed guard dog of Hades.

Authentication protocol for trusted hosts on un-trusted networks.

Provide reliable authentication over open and insecure networks.

Uses secret-key cryptography with symmetric Needham-Schroeder protocol.

Page 5: Rakesh raj

TERMINOLOGY Realm:

Indicates an authentication administrator domain. Principal:

It is the name used to refer to the entries in AS. Ticket:

It is issued by AS & Encrypted using Secret key of Service. Encryption:

Encryption type:

DES, RC4-HMAC, AES128 &AES256 algorithms. Encryption key Salt Key Version Number (kvno)

Page 6: Rakesh raj

Key Distribution Center (KDC): Database:

Contains information about Users & Services. Authentication Server (AS):

Give reply to initial authentication Request from Client & issues TGT.

Ticket Granting Server (TGS):

Distributes Service tickets to client.

Session Key:

It is secret between Users & Services for which a client has work session open on a server.

Replay Cache Credential Cache:

Used to store password & related session key.

Page 7: Rakesh raj

Fig. 1 Authentication service verifies the user ID

Working of Kerberos

Step 1: (Fig 1) The AS, receives the request by the client and verifies that the client.

Page 8: Rakesh raj

Fig. 2 Authentication service issues TGT.

Step 2:

Upon verification, a timestamp is created with current time in a user session with expiration date. The timestamp ensures that when 8 hours is up, the encryption key is useless.

Step 3: (Fig 2)

The key is sent back to the client in the form of a TGT.

Page 9: Rakesh raj

Fig. 3 Client submits TGT to TGS.

Step 4: (Fig 3)

The client submits the TGT to the TGS, to get authenticated.

Page 10: Rakesh raj

Fig. 4 TGS grants client the service ticket.

Step 5: (Fig. 4)

The TGS creates an encrypted key with a timestamp and grants the client a service ticket.

Step 6:

The client decrypts the ticket & send ACK to TGS.

Page 11: Rakesh raj

Fig. 5 Service server decrypts key & checks timestamp

Step 7: Then sends its own encrypted key to the service server.

The service decrypts the key and check timestamp is still valid or not.

If it is, the service contacts the KDC to receive a session that is returned to the client.

Page 12: Rakesh raj

Fig. 6 For valid keys communication is initiated.

Step 8: (Fig. 6)

The client decrypts the ticket. If the keys are still valid , comm- -unication is initiated between client and server.

Now the client is authenticated until the session expires.

Page 13: Rakesh raj

Kerberos Environment

Fig. 7 A possible Kerberos environment

First, Kerberos infrastructure contain at least one Kerberos Server.

The KDC holds a complete database of user and service keys.

Second, Kerberos-enabled clients and services called kerberized clients and services.

1. Typical Infrastructure(Fig. 7)

2. Kerberized Services

Page 14: Rakesh raj

Kerberos Database

Fig. 8 Authentication Requests.

Kerberos operations requirs both read only and write access is done through Kerberos database.

From figure operations requiring read- only access to the Kerberos database are performed by the AS(KDBM), which can run on both master and slave M/c.

Page 15: Rakesh raj

From figure we may say that changes may only be made to the Master Kerberos database where Slave copies are read-only.

Therefore, the KDBM server may only run on the master Kerberos M/c.

Fig. Administration Requests.

Page 16: Rakesh raj

Kerberos AdministratorIt manages and controls all the Operations & Functions of Kerberos.

Running a program to initialize database.Register essential principals in the database.Kerberos administration server and AS must be started up properly.

For new Kerberos application ,it must take few steps to get it working.It must be registered in the databaseAssigned a private key

It must also ensure that Kerberos machines are physically secure & also

able to maintain backups of the Master database.

Page 17: Rakesh raj

Advantages:Passwords are never sent across the network unencrypted.Clients and applications services mutually authenticated.Tickets have a limited lifetime.Authentication through the AS only has to happen once.Sharing secret keys is more efficient than public-keys.

DisadvantagesKerberos only provides authentication for clients and services.Vulnerable to users making poor password choices.Client M/c and service(servers) M/c to be designed with Kerberos authentication in mind.

Page 18: Rakesh raj

PUBLIC KEY CRYPTOGRAPHYIn Public Key Cryptography two different but mathematically related keys are used.

The public key may be freely distributed, while its paired private key must remain secret.

The public key is typically used for encryption, while the private or secret key is used for decryption.

It give new direction to Kerberos as it eases key distribution a lot.

KDC doesn’t need to save client keys in its database.

To obtain a TGT, the client has to present his public key.

A trusted certification authority (CA) has to sign every valid public key.

Page 19: Rakesh raj

CONCLUSIONResearched and developed for over 8 years.Kerberos doesn’t fail to deliver services.Ex:- Cisco, Microsoft, Apple, and many others.As authentication is critical for the security of computer systems, traditional authentication methods are not suitable for use in computer networks The Kerberos authentication system is well suited for authentication of users in such environments.

Page 20: Rakesh raj

REFERENCESComputer Networking by James Kurose and Keith Rose.

Kerberos: Network Authentication System by Brain Pung.

Introduction to Kerberos technology.

http://web.mit.edu/Kerberos/

http://searchsecurity.techtarget.com/sDefinition/

http://www.google.co.in/

Page 21: Rakesh raj

THANK YOU!

ANY QUERIES

!