110 likes | 274 Views
Kerberos. Authenticating Over an Insecure Network. Initial request. Authentication Server. User key. (only real user can decode ). Session key Service name. user to service. user. Service key. Session key User name. service. Application Server. Kerberos Server. User and Server DB
E N D
Kerberos Authenticating Over an Insecure Network
Initial request Authentication Server User key (only real user can decode) Session key Service name user to service user Service key Session key User name service
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server User Agent User asks User requests ticket to interact with Application Server
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server User Agent User agent contacts Authentication Server to begin the process of authenticating the user as being who he says he is
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent Auth Server looks up user private key, creates session key to talk to TGS, encrypts with user private key and returns. If not real user.. useless
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent User password(key) User agent prompts user, takes key and decrypts the session key. If not the real user, can’t read. User takes a ticket to access TGS from the prev Step and encrypts appServer request info using Session Key.
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent User agent sends request to the TGS with request encrypted using the Session Key.
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent TGS creates a User/Server session key and encrypts it using theSession Keyand a Permission Ticket for User/Server Interaction encrypted using theAppserver key..
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server Session Key User Agent User agent decrypts the user/server key using the Session Key and uses The US Session key is sent with the US Ticket to the App Server
Application Server Kerberos Server User and Server DB Private keys Ticket Granting Server Authentication Server User Agent AppServer uses own key to decrypt/authenticate the request and verify The US Ticket to be valid. Then begins communicating with the US Session key .
Conclusions • No unencrypted messages across net • Not able to spoof either client OR server • Time stamps on the session keys so that even if eventually decoded, could not use • Point of failure is the DB where the Kerberos server is stored.