Kerberos
Kerberos
Kerberos
of Hades It is an authentication service developed as a part of Project Athena at MIT The problem that Kerberos addresses is this: Assume an open distributed environment in which users at workstations wish to access services on server distributed throughout the network. We would like for servers to be able to restrict access to authorized users and to be able to authenticate requests for service. In this environment, a workstations cannot be trusted to identify its users correctly to network services.
Motivation
If a set of users is provided with dedicated personal computers that have no network connections, then a users resources and files can be protected by physically securing each personal computer. When these users instead are served by a centralized time-sharing system, the time sharing OS must provide the security. The OS can enforce access control policies based on user identity and use the logon procedure to identify users. Today, neither of these scenarios is typical. More common is a distributed architecture consisting of dedicated user workstations (clients) and distributed or centralized servers. In this environment, three approaches to security can be envisioned: Rely on each individual client workstation to assure the identity of its user or users and rely on each server to enforce a security policy based on user identification (ID) Require that client systems authenticate themselves to servers, but trust the client system concerning the identity of its user. Require the user to prove identity for each service invoked. Also require that servers prove their identity to clients. In a small, closed environment, the first two strategies works well. But in a more open environment, in which network connections to other machines are supported, the third approach is needed to protect user information and resources housed at the server. This third approach is supported by Kerberos. Kerberos assumes a distributed client / server architecture and employs one or more Kerberos servers to provide an authentication service. KERBEROS Users wish to access services on servers. Three threats exist: --User pretend to be another user. --User alter the network address of a workstation. --User eavesdrop on exchanges and use a replay attack. Provides a centralized authentication server to authenticate users to servers and servers to users. Relies on conventional encryption, making no use of public-key encryption Two versions: version 4 and 5 Version 4 makes use of DES
Overview of Kerberos
Kerberos Realms
a Kerberos environment consists of: a Kerberos server a number of clients, all registered with server application servers, sharing keys with server this is termed a realm typically a single administrative domain if have multiple realms, their Kerberos servers must share keys and trust