25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

22.11.1 Assumptions<br />

22.11.2 Naming<br />

Kerberos assumes the following:<br />

► The environment using this security system includes public <strong>and</strong> private<br />

workstations that can be located in areas with minimal physical security, a<br />

campus network without link encryption that can be composed of dispersed<br />

local networks connected by backbones or gateways, centrally operated<br />

servers in locked rooms with moderate physical security, <strong>and</strong> centrally<br />

operated servers with considerable physical security.<br />

► Confidential data or high-risk operations such as a bank transaction cannot<br />

be part of this environment without additional security, because after you<br />

have a workstation as a terminal, you can emulate certain conditions <strong>and</strong><br />

normal data will be flowing without any encryption protection.<br />

► One of the cryptosystems used is the Data Encryption St<strong>and</strong>ard (DES), which<br />

has been developed to be modular <strong>and</strong> replaceable by the Kerberos<br />

designers.<br />

► Kerberos assumes a loosely synchronized clock in the whole system, so the<br />

workstation has to have a synchronization tool such as the time server<br />

provided.<br />

A principal identifier is the name that identifies a client or a service for the<br />

Kerberos system.<br />

In Version 4, the identifier consists of three components:<br />

► The principal name is unique for each client <strong>and</strong> service assigned by the<br />

Kerberos Manager.<br />

► The instance name used for distinct authentication is an added label for<br />

clients <strong>and</strong> services, which exist in several forms. For users, an instance can<br />

provide different identifiers for different privileges. For services, an instance<br />

usually specifies the host name of the machine that provides this service.<br />

► The realm name used to allow independently administered Kerberos sites.<br />

The principal name <strong>and</strong> the instance are qualified by the realm to which they<br />

belong, <strong>and</strong> are unique only within that realm. The realm is commonly the<br />

domain name.<br />

In Version 4, each of the three components has a limit of 39 characters long. Due<br />

to conventions, the period (.) is not an acceptable character.<br />

In Version 5, the identifier consists of two parts only, the realm <strong>and</strong> the<br />

remainder, which is a sequence of however many components are needed to<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 865

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!