1 / 11

Kerberos

Kerberos. Authenticating Over an Insecure Network. Initial request. Authentication Server. User key. (only real user can decode ). Session key Service name. user to service. user. Service key. Session key User name. service. Application Server. Kerberos Server. User and Server DB

mahola
Download Presentation

Kerberos

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kerberos Authenticating Over an Insecure Network

  2. Initial request Authentication Server User key (only real user can decode) Session key Service name user to service user Service key Session key User name service

  3. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server User Agent User asks User requests ticket to interact with Application Server

  4. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server User Agent User agent contacts Authentication Server to begin the process of authenticating the user as being who he says he is

  5. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent Auth Server looks up user private key, creates session key to talk to TGS, encrypts with user private key and returns. If not real user.. useless

  6. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent User password(key) User agent prompts user, takes key and decrypts the session key. If not the real user, can’t read. User takes a ticket to access TGS from the prev Step and encrypts appServer request info using Session Key.

  7. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent User agent sends request to the TGS with request encrypted using the Session Key.

  8. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent TGS creates a User/Server session key and encrypts it using theSession Keyand a Permission Ticket for User/Server Interaction encrypted using theAppserver key..

  9. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent User agent decrypts the user/server key using the Session Key and uses The US Session key is sent with the US Ticket to the App Server

  10. Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server User Agent AppServer uses own key to decrypt/authenticate the request and verify The US Ticket to be valid. Then begins communicating with the US Session key .

  11. Conclusions • No unencrypted messages across net • Not able to spoof either client OR server • Time stamps on the session keys so that even if eventually decoded, could not use • Point of failure is the DB where the Kerberos server is stored.

More Related