unsecured networks prone to man-in-the-middle attacks that compromise sensitive data
Kerberos: standard, public-domain-based remote authentication protocol
developed by MIT
trusted third party
requires user to prove identity for each service + servers prove identity to each client
Kerberos anatomy/servers - “realm”
client - person that request authentication
application - resource client tries to access
Kerberos - in between client + app
Includes authentication server to verify identity
ticketing server to avoid direct sensitive exchange of data
3 TGT exchanges
client authentication request: client logs in + requests application → authentication server → once match create encrypted ticket granting ticket (TGT) → sends TGT back to client
TGT contains the session key + message
multiple realms should have a shared secret key
authentication server response: client sends TGT to ticketing server → Ticket Granting Server (TGS) further encrypts with session key → validates and grants TGT back to client
client sents TGT to application server → application creates a service ticket → client service ticket to host
TGT removes need for sending passwords over unsecure network, allows use of encrypted tickets
Differentiate from hashing
reduces risk of theft or interception
Version 4 Kerberos widely used since 1980s
Used DES (low key bits)
Version 5 addressed scalability of DES by using AES
Also promoted cross realm authentication
Kerberos designed for large-scale, muti-realm servers
Kerberos must be installed securely and isolated
certificate authority assigns public key to an owner to prevent impersonation
a certificate is created by a trusted, third party that actually binds the key w/ its owner
CA belongs to trusted authorites
X.509 is the digital standard for public key certificates for most security applications
Contains:
Subject - identity of certificate owner
Public Key of certificate owner
Issuer - CA
Validity
Digital Signature of above
Long-lived certificates have high validity and don’t require much renewal
Short-lived certificates have limited validity as they bypass
Proxy certificates address short-lived certificate demerits and are acknowledged using extensions
Attribute certificates have validity based on roles/attributes over identity (eg. admins)
Public Key Infrastructure (PKI) all assets that create public keys
Includes:
CA
Registration Authority (RA) - authenticates a certificate that refers to CA
Digital Certificates
Trust Store - repository of all the certificates (includes unused certificates)
Kerberos
Realms
Versions
Requirements
Certificate Authority
X.509
Public Key Infrastructure