User Authentication: Jae Woong Joo
User Authentication: Jae Woong Joo
User Authentication: Jae Woong Joo
User Authentication
2015. 04. 06
15.3 Kerberos
2
Introduction
• This chapter examines some of the authentication
functions that have been developed to support network-
based use authentication.
3
15.1 Remote User-Authentication Principles
Remote User-Authentication Principles
5
Means of User Authentication
6
Mutual Authentication
7
Replay Attacks
• Timestamps
– Requires that clocks among the various participants be synchronized
– Party A accepts a message as fresh only if the message contains a timestamp
that, in A’s judgment, is close enough to A’s knowledge of current time
• Challenge/response
– Party A, expecting a fresh message from B, first sends B a nonce (challenge)
and requires that the subsequent message (response) received from B contain
the correct nonce value
9
One-Way Authentication
10
15.2 Remote User-Authentication Using
Symmetric Encryption
Mutual Authentication
12
Mutual Authentication
13
Mutual Authentication
14
Mutual Authentication
15
Mutual Authentication
16
One-Way Authentication
17
15.3 Kerberos
Kerberos
• Authentication service developed as part of Project Athena at
MIT
• A workstation cannot be trusted to identify its users correctly to
network services
– A user may gain access to a particular workstation and pretend to
be another user operating from that workstation
– A user may alter the network address of a workstation so that the
requests sent from the altered workstation appear to come from
the impersonated workstation
– A user may eavesdrop on exchanges and use a replay attack to
gain entrance to a server or to disrupt operations
20
Kerberos Version 4
21
Summary of Kerberos Version 4 Message
Exchanges
22
Summary of Kerberos
Overview of Kerberos Version 4 Message
Exchanges
23
Summary of Kerberos
Overview of Kerberos Version 4 Message
Exchanges
24
Rationale for the Elements of the Kerberos
Version 4 Protocol
25
26
27
Kerberos Realms and Multiple Kerberi
28
Kerberos
Realms
Kerberos Version 5
• developed in mid 1990’s
• specified as Internet standard RFC 1510
• provides improvements over v4
– addresses environmental shortcomings
• encryption alg, network protocol, byte order, ticket
lifetime, authentication forwarding, interrealm auth
– and technical deficiencies
• double encryption, non-std mode of use, session
keys, password attacks
Kerberos Version 5
• Encryption system dependence: In version 5, ciphertext is tagged
with an encryption-type identifier so that any encryption technique
may be used
• Internet protocol dependence: Version 5 network addresses are
tagged with type and length, allowing any network address type to
be used.
• Message byte ordering: In version 5, all message structures are
defined using Abstract Syntax Notation One (ASN.1) and Basic
Encoding Rules (BER), which provide an unambiguous byte
ordering.
• Ticket lifetime:tickets include an explicit start time and end time,
allowing tickets with arbitrary lifetimes.
• Authentication forwarding:Version 5 does not allow credentials
issued to one client to be forwarded to some other host and used by
some other client.
• Interrealm authentication:Version 5 supports a method that
requires fewer relationships, as described shortly.
Kerberos Version 5, technical deficiencies
• Double encryption:tickets provided to clients are encrypted twice,
The second encryption is not necessary and is computationally
wasteful.
• PCBC encryption:Version 5 provides explicit integrity mechanisms,
allowing the standard CBC mode to be used for encryption. In
particular, a checksum or hash code is attached to the message
prior to encryption using CBC.
• Session keys:In version 5, it is possible for a client and server to
negotiate a subsession key, which is to be used only for that one
connection. A new access by the client would result in the use of a
new subsession key.
• Password attacks: versions are vulnerable to a password attack
Table 15.3
Summary of Kerberos Version 5 Message Exchanges
Table 15.4
Kerberos
Version 5
Flags