Lecture 16 Kerberos
Lecture 16 Kerberos
Authen-
Tication
Service
Susan’s
Desktop
Susan C omputer
Ticket
G ranting
X Y Z Service R epresents something Service
requiring Kerberos
authentication (web
server, ftp server, ssh Key
server, etc… ) Distribution
C enter
Authen-
Tication
Service
Susan’s
Desktop
Susan C omputer
Ticket
G ranting
X Y Z Service Service
Key
“I’d like to be allowed to Distribution
get tickets from the C enter
Ticket G ranting Server,
please.
Authen-
Tication
Service
Susan’s
Desktop
Susan C omputer
Ticket
G ranting
X Y Z Service Service
“O kay. I locked this box with
your secret password. If you
can unlock it, you can use its
contents to access my Ticket Key
G ranting Service.” Distribution
C enter
Authen-
Tication
Service
Susan’s
Desktop
Susan C omputer
Ticket
G ranting
X Y Z Service Service
Key
Distribution
C enter
Authen-
Tication
TG T Service
ord Susan’s
myPassw
Desktop
Susan C omputer
TG T
B ecause Susan was able to open the box (decrypt
a message) from the Authentication Service, she is
now the owner of a shiny “Ticket-G ranting Ticket”.
Key
Distribution
C enter
Authen-
Tication
TGTG
T T
Service
Susan’s
us e X Y Z Desktop
Susan C omputer
H ey X Y Z :
Susan is Susan. Ticket
C O NF IR M E D: TG S
G ranting
X Y Z Service Service
Y ou’re Susan.
H ere, take this.
Key
Distribution
C enter
Authen-
Tication
TG T
Service
Susan’s
Desktop
Susan C omputer
Ticket
I’m Susan. I’ll prove it. G ranting
X Y Z Service Service
H ere’s a copy of my
legit service ticket for
XYZ.
Key
Distribution
C enter
Authen-
H ey X Y Z :
Tication
SusanH iseySusan.
XYZ:
TG T
C O Susan
NF IR M is Susan.
E D: TG S Service
C O NF IR M E D: TG S
Susan’s
Desktop
Susan C omputer
That’s Susan alright. Let me
determine if she is authorized
to use me. Ticket
G ranting
X Y Z Service Service
H ey X Y Z :
Susan is Susan. Key
C O NF IR M E D: TG S Distribution
C enter
Authen-
H ey X Y Z :
Tication
Susan is Susan. TG T
C O NF IR M E D: TG S Service
Susan’s
Desktop
Susan C omputer
Authorization checks are performed by the X Y Z
service…
Authen-
H ey X Y Z :
Tication
SusanH iseySusan.
XYZ:
TG T
C O Susan
NF IR M is Susan.
E D: TG S Service
C O NF IR M E D: TG S
Susan’s
us e X Y Z Desktop
Susan C omputer
That’s Susan… again. Let me
determine if she is authorized
to use me. Ticket
G ranting
X Y Z Service Service
H ey X Y Z :
Susan is Susan. Key
C O NF IR M E D: TG S Distribution
C enter
Authen-
H ey X Y Z :
Tication
Susan is Susan. TG T
C O NF IR M E D: TG S Service
Susan’s
Desktop
Susan C omputer
A Simple Authentication
Dialogue
(1) C AS: IDc || P c || Idv
(2) AS C: Ticket
(3) C V : ID c || Ticket
Pc=password of client
c+ IDv
c+P
1- ID
ket
2- Tic
3- ID
c +T
icke
t
Ticket=Ekv[IDc,ADc,IDv]
Problems
Frequent requests to enter user’s password
Suppose each ticket can be used only once
A user enters a password to get a ticket each time the
user wants access to V
Suppose the tickets are reusable to improve the
matters
A user needs a new ticket for every different service
and hence be required to enter a password
A plaintext transmission of password in
message(1)
An opponent could capture the password and use
any service accessible to the victim
A M ore Secure Authentication
Dialogue
Addition of a ticket-granting server (TG S).
TG S issues tickets for services to users who
have been authenticated to AS.
User first requests a ticket-granting ticket (TG T)
from AS
TG T is saved in the client module of WS and used
to authenticate the user itself to TG S for each
access to a new service
The service-granting ticket (SG T) issued by TG S is
saved and used to authenticate its user to a
server for a particular service
A M ore Secure Authentication
Dialogue
Once per user logon session:
(1) C AS: IDC ll IDtgs
(2) AS C : E(KC , Tickettgs )
IDc, TicketV V
O nce per service session