kerberos: man’s best friend. introduction and summary the authentication problem password-based...

16
Kerberos: Man’s Best Friend

Upload: cassandra-walton

Post on 14-Jan-2016

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Kerberos: Man’s Best Friend

Page 2: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Introduction and Summary

• The Authentication Problem

• Password-Based Authentication

• Kerberos

• Comparison

• Conclusion

Page 3: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

The Authentication Problem

• Users and Services

• Who are you?

• What do you want?

• Why do you keep touching me?

Page 4: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Password-Based Authentication

• Users and Services Redux

• Password Files and Hashing

• One User, One Password, One Service

• Password Synchronization Methods

Page 5: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Kerberos

• Why the Silly Name?

• A Bit of History

• General Aims and Goals

Page 6: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Building Security:A Real World Example

• Authentication: The Guards Know You

• Services: Why You Don’t Show Your Badge at the Water Cooler

Page 7: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Encryption:How to Use Your Password

Without Using Your Password

• Everything is a Number

• Public-Key vs. Private-Key (Conventional)

• Passwords = Shared Knowledge

Page 8: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Basics of a Kerberos Transaction

• Son of Users and Services

• Everybody Gets a Password

• Centralized Password Authority

• A Sample Packet: Example Ticketpassword{user:client:service:expires:time}

Page 9: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Session Keys and Services

• Why Do We Need Session Keys?– Replay Attacks– Passwords != Shared Knowledge– Authenticating the Authenticator

• A Sample Packet: User Authenticationsession{username:address} +

password{session:user:client:service:expires:time}

Page 10: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Ticket-Granting Tickets(And Other Self-Referential Nonsense)

• Tickets Are a Service Too– Ticket-Granting Servers Grant Tickets– Timestamps Stamp Times– Expiration Expires

• One User, One Password, Many Services

Page 11: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Realms

• Kerberos’ Scalability Problems

• Remote Ticket-Granting Servers

• Hierarchical Encapsulation

Page 12: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Why You Should Use Kerberos(An Unbiased Review)

• Unified Password Schemes and Psychology

• Synchronization Issues Disappear

• Secure Passwords are Secure

• Administrators Save Time and Energy

Page 13: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Problems with Kerberos

• Unified Password Schemes and Psychology

• Public Terminals and Replay Attacks

• Supported Applications

Page 14: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

General Security Problems(Users Aren’t Too Bright)

• Bad Passwords are Bad

• Good Passwords are Bad

• Security Workarounds for Convenience

Page 15: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Conclusion: Is Kerberos Right for Me?

• Size Does Matter (A Little)

• Predicting the Future for Fun and Profit

• Windows 2000: Engulfed in Evil

Page 16: Kerberos: Man’s Best Friend. Introduction and Summary The Authentication Problem Password-Based Authentication Kerberos Comparison Conclusion

Any Questions?

Thank you for enduring my presentation.

Those of you with questions, please ask them.

The rest of you may watch a dancing monkey: