Professional Documents
Culture Documents
♦ Kerberos Architecture
Authentication
Step A database Ticket-
Authen- granting
1. Request for tication
service A service T
TGS ticket
2. TGS
ticket
Step B
3. Request for
server ticket
Login 4. Server ticket Step C
session setup 5. Service
Server request
Client session setup Service Server
C Request encrypted with session key function
S
DoOperation
Reply encrypted with session key
challenge
♦ Notation
8 A: authentication service
8 T: ticket-granting service
8 C: client
8 n: a nonce
8 t: a timestamp
8 t1/t2: start/ending time for ticket
challenge
♦ Note
8 use of KC
– if principal is user, KC is a scrambled (transformed) version of password
– upon receipt of message 2, client will prompt user for password
– client will use user password to decode challenge
(VWDEOLVKSURWRFROYHUVLRQVHVVLRQ,'
&OLHQW+HOOR FLSKHUVXLWHFRPSUHVVLRQPHWKRG
6HUYHU+HOOR H[FKDQJHUDQGRPYDOXHV
&HUWLILFDWH
&HUWLILFDWH5HTXHVW
Optionally send server certificate and
request client certificate
6HUYHU+HOOR'RQH
&KDQJH&LSKHU6SHF
Change cipher suite and finish
)LQLVKHG handshake
&KDQJH&LSKHU6SHF
)LQLVKHG
Fragment/combine
Compress (opt.)
Compressed units
Hash
MAC
Encrypt
Encrypted
Transmit
TCP packet
Internet
web/ftp
server
Internet
web/ftp
server
Internet
web/ftp
server
8 advantages of c)
– IP addresses of hosts on intranet need not be made public
– if first filter fails, second (inner) filter will step in
Distributed Systems - Fall 2001 VII - 59 © Stefan Leue 2002 tele
Security in Distributed Systems
♦ Virtual Private Networks (VPNs)
8 extend the intranet security beyond intranet boundaries
8 requires establishing secure channels across internet links
– usually used: IPSec extensions of IPv4 (RFC 2411)
ivariant 1: transport mode
* client supports cryptography inside TCP/IP stack