Kerberos
Kerberos
• Akshat Sharma
• Samarth Shah
Outline
Introduction What is Kerberos?
• Steps :
• An user requests use of a network service
• Service wants assurance that user is who he says he is.
(Continued…….)
Kerberos Functionality
• User presents a ticket that is issued to it by a
Kerberos Authentication Server(AS).
• If the ticket is valid, service is granted.
• The tickets must be unequivocally linked to the user
• Ticket demonstrates that the bearer knows
something that only its intended user would know.
• Ticket must obviously be safeguarded against all
attacks.
Benefits of Kerberos
• More efficient authentication to servers.
• Server can authenticate the client by examining
credentials. Clients can obtain credentials for a
particular server once and reuse them throughout a
network logon session.
• Mutual authentication.
• Parties at both ends of a network connection can know
that the party on the other end is who it claims to be.
• Delegated authentication.
• Kerberos protocol has a proxy mechanism that allows
a service to impersonate its client when connecting to
other services.
Drawbacks of Kerberos
• Single point of failure: It requires continuous availability of a
central server. When the Kerberos server is down, no one can
log in.
• Kerberos has strict time requirements, which means the
clocks of the involved hosts must be synchronized within
configured limits.
• The administration protocol is not standardized and differs
between server implementations.
• Since all authentication is controlled by a centralized KDC,
compromise of this authentication infrastructure will allow
an attacker to impersonate any user.
• Each network service which requires a different host name
will need its own set of Kerberos keys. This complicates
virtual hosting and clusters.
Conclusion
• Authentication is critical for the security of computer systems.
Without knowledge of the identity of a principal requesting an
operation, it's difficult to decide whether the operation should
be allowed.