25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4. Now the user needs the authorization credentials, known as extended<br />

privilege attribute certificate (EPAC), from the privilege service (PS).<br />

Therefore, it must construct a privilege ticket granting ticket (PTGT) request<br />

to retrieve this from the PS. To communicate with the PS, the client sends a<br />

request to the AS to contact the PS. This request is encrypted with the<br />

conversation key of the AS.<br />

5. The AS receives this request. Using the secret key of the PS, the AS<br />

generates a conversation key for the client to use when contacting the PS.<br />

This is returned to the client <strong>and</strong> encrypted again with the AS conversation<br />

key. The client receives the envelope <strong>and</strong> decrypts it (using the conversation<br />

key) <strong>and</strong> discovers the conversation key for the PS. The client can now send<br />

a privilege service ticket to the PS.<br />

6. The PS receives the request <strong>and</strong> decrypts it with its secret key successfully.<br />

This proves that the service ticket is legitimate, which also implies that the AS<br />

involved is also legitimate. From this, the PS knows that the client <strong>and</strong> the AS<br />

are valid. The PS constructs the EPAC, which lists the user's st<strong>and</strong>ard <strong>and</strong><br />

extended registry attributes, including group membership. The PS creates<br />

more conversation keys <strong>and</strong> sends the EPAC <strong>and</strong> other information in an<br />

encrypted PTGT envelope to the client.<br />

7. The client decrypts the PTGT envelope using the PS conversation key. Also,<br />

the client has the conversation key information <strong>and</strong> an encrypted PTGT<br />

(which the client cannot decrypt, because it is encrypted using the AS secret<br />

key).<br />

8. Now, the client wants to contact an application server. To do so, it sends the<br />

PTGT to the AS <strong>and</strong> requests a service ticket for the application server. The<br />

AS receives the PTGT <strong>and</strong> decrypts it to obtain the EPAC information. It<br />

encrypts the EPAC information with the secret key of the application server<br />

<strong>and</strong> also provides a conversation key for the application server. This<br />

information is encrypted with the conversation key of the AS (which the client<br />

knows) <strong>and</strong> is returned to the client.<br />

9. The client decrypts the envelope <strong>and</strong> discovers the application server's secret<br />

conversation key. Using this key, it can now contact the application server. By<br />

correctly decrypting the request from the client, the application server is able<br />

to determine that the client has been authenticated, <strong>and</strong> by responding to the<br />

client, the client knows that it was, indeed, the real application server that it<br />

has contacted. The two will then establish a mutually authenticated session.<br />

In addition to the extensive use of secret keys during the logon process,<br />

third-party authentication makes use of time stamps to ensure that the<br />

conversation is protected against intruders <strong>and</strong> eavesdropping. Time stamps<br />

make impersonation techniques, such as record <strong>and</strong> playback, ineffective. Also,<br />

the actual user password entered at logon time does not flow to the server as<br />

such. Instead, it is used as an encryption key for the initial logon messages that<br />

504 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!