09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Kerberos (introduced in IOS version 11.2) is a trusted third-party<br />

au<strong>the</strong>ntication system developed at <strong>the</strong> Massachusetts Institute of<br />

Technology (MIT). Kerberos is named after Cerberus, <strong>the</strong><br />

three-headed dog who guarded <strong>the</strong> gates of Hades, and it uses <strong>the</strong><br />

Data Encryption Standard (DES) encryption algorithm for<br />

transmitting au<strong>the</strong>ntication data. With Kerberos, both users and<br />

systems must have an identity, known as a principle, s<strong>to</strong>red on a<br />

centralized au<strong>the</strong>ntication and database server, known as <strong>the</strong> Key<br />

Distribution Center (KDC). All access verification questions are<br />

deferred <strong>to</strong> <strong>the</strong> KDC (which is why Kerberos is called a "trusted<br />

third-party" system). The collection of users and systems that trust<br />

<strong>the</strong> Kerberos KDC <strong>to</strong> au<strong>the</strong>nticate is known as a Kerberos realm.<br />

On <strong>the</strong> system side, au<strong>the</strong>ntication information is exchanged using a<br />

key called a servtab <strong>to</strong> encrypt messages between <strong>the</strong> system and <strong>the</strong><br />

KDC. On <strong>the</strong> client side (which, from <strong>the</strong> Kerberos perspective, is <strong>the</strong><br />

unsecured element), however, au<strong>the</strong>ntication is a little more<br />

complicated. A simple view of <strong>the</strong> Kerberos user au<strong>the</strong>ntication<br />

process looks like this:<br />

1. A user logs in, and a request is sent <strong>to</strong> <strong>the</strong> KDC, where <strong>the</strong><br />

user's access rights are verified.<br />

2. If <strong>the</strong> user is valid, a ticket-granting ticket (TGT) and a session<br />

key (SK) (which is used as a one-time password [OTP] <strong>to</strong><br />

decrypt <strong>the</strong> TGT) are sent back in encrypted form, using <strong>the</strong><br />

user's password as <strong>the</strong> source of <strong>the</strong> encryption key. The user is<br />

now au<strong>the</strong>nticated locally. To access o<strong>the</strong>r systems that are<br />

part of <strong>the</strong> realm, ano<strong>the</strong>r ticket is needed.<br />

3. To get a ticket (which has a limited life span), <strong>the</strong> user<br />

generates a ticket request for <strong>the</strong> remote host it wants <strong>to</strong> access.<br />

The TGT and an au<strong>the</strong>ntica<strong>to</strong>r are sent <strong>to</strong> <strong>the</strong> Ticket Granting<br />

Server (TGS). The request is verified, and a ticket and session<br />

key (an OTP <strong>to</strong> decrypt <strong>the</strong> ticket) for <strong>the</strong> requested system are<br />

returned.<br />

4. After <strong>the</strong> ticket is acquired, <strong>the</strong> user logs in <strong>to</strong> <strong>the</strong> system. The<br />

system <strong>the</strong>n verifies that <strong>the</strong> ticket and au<strong>the</strong>ntica<strong>to</strong>r match,<br />

and if so, access is permitted.<br />

In addition <strong>to</strong> au<strong>the</strong>ntication, Kerberos also supports application data<br />

encryption for Telnet, rlogin, rsh (remote shell), and rcp (remote<br />

copy). There are two versions of Kerberos in use <strong>to</strong>day: version 4 and<br />

version 5. Version 4 is <strong>the</strong> most common because it is distributed in<br />

some form with most UNIX distributions. It is also popular because it<br />

can be used outside <strong>the</strong> United States. KerberosV4 is not without its<br />

shortcomings; <strong>the</strong> most obvious is its lack of support for fully qualified

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!