cs 356 internet authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv...

21
CS 356 Internet Authentication Fall 2013

Upload: others

Post on 04-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

CS 356 Internet Authentication

Fall 2013

Page 2: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Review• Chapter 1: Basic Concepts and Terminology

• Chapter 2: Basic Cryptographic Tools

• Chapter 3 – User Authentication

• Chapter 4 – Access Control Lists

• Chapter 5 – Database Security (skipped)

• Chapter 6 – Malicious Software

• Networking Basics (not in book)

• Chapter 7 – Denial of Service

• Chapter 8 – Intrusion Detection

• Chapter 9 – Firewalls and Intrusion Prevention

• Chapter 10 – Buffer Overflow

• Chapter 11 – Software Security

• Chapter 12 – OS Security

• Chapter 22 – Internet Security Protocols

• Chapter 23 – Internet Authentication Applications

Page 3: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Chapter 23

Internet Authentication

Applications

Page 4: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Kerberos Overview

• initially developed at MIT

• software utility available in both the public domain and in commercially supported versions

• issued as an Internet standard and is the defacto standard for remote authentication

• overall scheme is that of a trusted third party authentication service

• requires that a user prove his or her identity for each service invoked and requires servers to prove their identity to clients

Page 5: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

The “original” Kerberos

• 3-headed dog who guarded the gates to

Hades

Page 6: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Kerberos Protocol

Page 7: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

AuthenticationServer (AS)

Ticket-granting

Server (TGS)

request ticket-

granting ticket

once peruser logonsession

1. User logs on toworkstation andrequests service on host.

3. Workstation promptsuser for password anduses password to decryptincoming message, thensends ticket andauthenticator thatcontains user's name,network address, andtime to TGS.

ticket + session key

request service-

granting ticket

ticket + session key

once pertype of service 4. TGS decrypts ticket and

authenticator, verifies request,then creates ticket for requestedserver.

Kerberos

5. Workstation sendsticket and authenticatorto server.

6. Server verifies thatticket and authenticatormatch, then grants accessto service. If mutualauthentication isrequired, server returnsan authenticator.

request service

provide server

authenticatoronce perservice session

Figure 23.1 Overview of Kerberos

2. AS verifies user's access right in

database, creates ticket-granting ticket

and session key. Results are encrypted

using key derived from user's password.

Kerberos OverviewKerberos Overview

Page 8: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Kerberos Realms

• a Kerberos environment consists of:– a Kerberos server

– a number of clients, all registered with server

– a number of application servers, sharing keys with server

• this is referred to as a realm– networks of clients and servers under different administrative

organizations generally constitute different realms

• if multiple realms:– their Kerberos servers must share a secret key and trust the

Kerberos server in the other realm to authenticate its users

– participating servers in the second realm must also be willing to trust the Kerberos server in the first realm

Page 9: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Kerberos

Realms

AS

TGS

Kerberos

Client

Realm A

AS

TGS

Kerberos

Server

Realm B

1. request ticket for local TGS

2. ticket for local TGS

3. request ticket for remote TGS

4. ticket for remote TGS

5 request ticket for remote server

6 ticket for remote server

7. re

quest re

mote serv

ice

Figure 23.2 Request for Service in Another Realm

Page 10: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Kerberos Versions 4 and 5

• Kerberos v4 is most widely used version

• improvements found in version 5:

– an encrypted message is tagged with an

encryption algorithm identifier

• this enables users to configure Kerberos to use an algorithm other than DES

– supports authentication forwarding

• enables a client to access a server and have that server access another server on behalf of the client

• supports a method for interrealm authentication that requires fewer secure key exchanges than in version 4

Page 11: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Kerberos Performance Issues• see larger client-server installations

• Kerberos performance impact in a large-scale Kerberos security is best assured by placing the Kerberos server on a separate, isolated machine

• motivation for multiple realms is administrative, not performance related

Page 12: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Certificate Authority (CA)

Page 13: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

X.509 Authentication Service

Page 14: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

X.509 Certificates

Page 15: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Public Key

InfrastructureX.509(PKIX)

End entitycertificate/CRL retrieval

certificate

publication

certificate/CRL

publication

CRL

publication

cross

certification

Cer

tifi

cate

/CR

L R

eposi

tory

Certificate

authority

Registration

authority

Certificate

authority

registration,

initialization,

certification,

key pair recovery,

key pair update

revocation request

PKI

users

PKI

management

entities

CRL issuer

Figure 23.4 PKIX Architectural Model

Page 16: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

PKIX Management Functions

Page 17: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Federated Identity Management

• use of common identity management scheme

– across multiple enterprises and numerous

applications

– supporting many thousands, even millions of users

• principal elements are:

– authentication, authorization, accounting,

provisioning, workflow automation, delegated

administration, password synchronization,

self-service password reset, federation

Page 18: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Identity Management

Principal

Principal

Administrator

Administrator

Data consumer

Identity control

interface

Principals provide

attributes

Principals

authenticate,

manage their

identity elements

Administrators

provide

attributes

Data consumers apply

references to obtain

attribute data

Data consumers obtain

identifiers, attribute

references

Identity Provider

Figure 23.5 Generic Identity Management Architecture

Attribute

locator

Principal

authentication

Identifier

translation

Data consumer

Attribute service

Attribute service

Attribute service

Principal

Page 19: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Standards Used

Page 20: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Federated Identity Management

User store

(a) Federation based on account linking

(b) Chained Web Services

Figure 23.6 Federated Identity Scenarios

Workplace.com

(employee portal)NameJoeJaneRavi

ID121314101603

User storeNameJoeJaneRavi

ID121314101603

Links:

health benefits

etc.

Health.com

Workplace.com

End user

(employee)

Initial

authenticationUser store

(b) Federation based on roles

W orkplace.com

(employee portal)NameJoeJaneRavi

ID121314101603

DeptEngPurchPurch

User store

Role

Engineer

Purchaser

Links:

parts supplier

etc.

PartsSupplier.com

Welcome Joe!

Technical doc.

Troubleshooting

End user

(employee)

Initial

authentication

Procurement

application

End user

Soap

message

Initial message

authentication

Soap

message

PinSupplies.com

Purchasing

Web service

E-ship.com

Shipping

Web service

Page 21: CS 356 Internet Authenticationgersch/cs356/356lecture28.pdf · 2013-12-06 · r eq uest s erv ice-grant ing ti ck t ticket + session k ey once per type of service 4. ... • Kerberos

Summary

• Kerberos

• Kerberos protocol

• Kerberos realms

• Kerberos versions 4 and 5

• Kerberos performance issues

• X.509

• public-key infrastructure

• PKIX management functions

• PKIX management protocols

• federated identity management