cse543 introduction to computer and network security
play

CSE543 - Introduction to Computer and Network Security Module: - PowerPoint PPT Presentation


  1. �������฀฀���฀฀�������� ��������������฀�������� � � �������฀���฀��������฀��������฀������ ����������฀��฀��������฀�������฀���฀����������� ������������฀�����฀�����������฀����������฀����฀฀�� CSE543 - Introduction to Computer and Network Security Module: Authentication Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security Page 1 1

  2. Kerberos • History: from UNIX to Networks (late 80s) ‣ Solves: password eavesdropping • Also mutual authentication ‣ Online authentication • Variant of Needham-Schroeder protocol ‣ Easy application integration API ‣ First single sign-on system (SSO) ‣ Genesis: rsh, rcp • authentication via assertion • Most widely used (non-web) centralized password system in existence (and lately only one…) • Now: Windows 2K/XP/Vista/etc network authentication ‣ Old Windows authentication was a cruel joke. CSE543 - Introduction to Computer and Network Security Page 2 2

  3. An aside … • Authentication ‣ Assessing identity of users ‣ By using credentials … • Authorization ‣ Determining if users have the right to perform requested action (e.g., write a file, query a database, etc.) • Kerberos authenticates users, but does not perform any authorization functions … ‣ … beyond identify user as part of Realm ‣ Typically done by application. • Q: Do you use any “ Kerberized ” programs? ‣ How do you know? CSE543 - Introduction to Computer and Network Security Page 3 3

  4. The setup … • The players ‣ Principal - person being authenticated ‣ Service (verifier) - entity requiring authentication (e.g, AFS) ‣ Key Distribution Center (KDC) • Trusted third party for key distribution • Each principal and service has a Kerberos password known to KDC, which is munged to make a password ke, e.g., k A ‣ Ticket granting server • Server granting transient authentication • The objectives ‣ Authenticate Alice (Principal) to Bob (Service) ‣ Negotiate a symmetric (secret) session key k AB CSE543 - Introduction to Computer and Network Security Page 4 4

  5. The protocol • A two-phase process 1. User authentication/obtain session key (and ticket granting ticket) key from Key Distribution Center 2. Authenticate Service/obtain session key for communication with service • Setup ‣ Every user and service get certified and assigns password CSE543 - Introduction to Computer and Network Security Page 5 5

  6. A Kerberos Ticket • A kerberos ticket is a token that … ‣ Alice is the only one that can open it ‣ Contains a session key for Alice/Bob (K AB ) ‣ Contains inside it a token that can only be opened by Bob • Bob’s Ticket contains ‣ Alice’s identity Ticket (K AB ) ‣ The session key (K AB ) Ticket (K AB ) “Locked” by K B “Locked” by K A • Q: What if issuing service is not trusted? CSE543 - Introduction to Computer and Network Security Page 6 6

  7. Phase 1 (obtaining a TGT) • Time exp - time of expiration • n - nonce (random, one-use value: e.g., timestamp) [A,TGS,Time exp ,n] 1 Alice KDC 2 E(k A ,[k A,TGS ,TGS,Time exp ,n]),E(K TGS ,[A, k A,TGS , Time exp ],) TGT CSE543 - Introduction to Computer and Network Security Page 7 7

  8. Phase 2 (authentication/key dist.) [B,Time exp ,n,E(k A,TGS ,[B,Time exp ,n])], E(K TGS ,[A,k A,TGS , Time exp ])] 1 TGS Alice 2 [E(k A,TGS ,[k A,B ,B,Time exp ,n]), 3 E(k B, TGS ,[A,k A,B ,Time exp ])] Authenticator [E(k A,B ,[A,Time exp ,n]), E(k B, TGS ,[A,k A,B ,Time exp ])] Bob Ticket (for Bob) CSE543 - Introduction to Computer and Network Security Page 8 8

  9. Kerberos Reality • V4 was supposed to be replaced by V5 ‣ But wasn’t because interface was ugly, complicated, and encoding was infuriating • Assumes trusted path between user and Kerberos • Widely used in UNIX domains • Robust and stable implementation • Problem : trust ain’t transitive, so not so good for large collections of autonomous enterprises CSE543 - Introduction to Computer and Network Security Page 9 9

  10. Meeting Someone New • Anywhere in the Internet CSE543 - Introduction to Computer and Network Security Page 10 10

  11. What is a certificate? • A certificate … ‣ … makes an association between a user identity/job/attribute and a private key ‣ … contains public key information {e,n} ‣ … has a validity period ‣ … is signed by some certificate authority (CA) ‣ ... identity may have been vetted by a registration authority (RA) • Issued by CA for some purpose ‣ Symantec is in the business of issuing certificates ‣ People trust Symantec (formerly Verisign) to vet identity CSE543 - Introduction to Computer and Network Security Page 11 11-1

  12. What is a certificate? • A certificate … ‣ … makes an association between a user identity/job/attribute and a private key ‣ … contains public key information {e,n} ‣ … has a validity period ‣ … is signed by some certificate authority (CA) ‣ ... identity may have been vetted by a registration authority (RA) • Issued by CA for some purpose ‣ Symantec is in the business of issuing certificates ‣ People trust Symantec (formerly Verisign) to vet identity CSE543 - Introduction to Computer and Network Security Page 11 11-2

  13. Why do I trust the certificate? • A collections of “root” CA certificates ‣ … baked into your browser ‣ … vetted by the browser manufacturer ‣ … supposedly closely guarded (yeah, right) • Root certificates used to validate certificate ‣ Vouches for certificate’s authenticity (signs) Certificate CA Signature CSE543 - Introduction to Computer and Network Security Page 12 12

  14. Public Key Infrastructure • System to “ securely distribute public keys (certificates) ” ‣ Q: Why is that hard? • Terminology: ‣ Alice signs a certificate for Bob’s name and key • Alice is issuer, and Bob is subject ‣ Alice wants to find a path to Bob’s key • Alice is verifier, and Bob is target ‣ Anything that has a public key is a principal ‣ Anything trusted to sign certificates is a trust anchor • Its certificate is a root certificate CSE543 - Introduction to Computer and Network Security Page 13 13

  15. Possible PKI Constructions CSE543 - Introduction to Computer and Network Security Page 14 14-1

  16. Possible PKI Constructions • Monarchy ‣ Single globally trusted third party CSE543 - Introduction to Computer and Network Security Page 14 14-2

  17. Possible PKI Constructions • Monarchy ‣ Single globally trusted third party CSE543 - Introduction to Computer and Network Security Page 14 14-3

  18. Possible PKI Constructions • Monarchy ‣ Single globally trusted third party • Anarchy ‣ No globally trusted third party • e.g., Using MIT’s PGP keyserver CSE543 - Introduction to Computer and Network Security Page 14 14-4

  19. Possible PKI Constructions • Monarchy ‣ Single globally trusted third party • Anarchy ‣ No globally trusted third party • e.g., Using MIT’s PGP keyserver CSE543 - Introduction to Computer and Network Security Page 14 14-5

  20. Possible PKI Constructions • Monarchy ‣ Single globally trusted third party • Anarchy ‣ No globally trusted third party • e.g., Using MIT’s PGP keyserver • Oligarchy ‣ Multiple globally trusted third parties • Model used in the Internet CSE543 - Introduction to Computer and Network Security Page 14 14-6

  21. Possible PKI Constructions • Monarchy ‣ Single globally trusted third party • Anarchy ‣ No globally trusted third party • e.g., Using MIT’s PGP keyserver • Oligarchy ‣ Multiple globally trusted third parties • Model used in the Internet CSE543 - Introduction to Computer and Network Security Page 14 14-7

  22. The Internet PKI? Root • Rooted tree of CAs • Cascading issuance Any CA can issue cert ‣ CA1 CA2 CA3 CAs issue certs for children ‣ … … … CA11 CA12 CA1n CA21 CA22 … … … … Cert11a Cert11b Cert11c CSE543 - Introduction to Computer and Network Security Page 15 15

  23. Certificate Validation Root CA1 CA2 CA3 … … … CA11 CA12 CA1n CA21 CA22 Certificate Signature … … … … Cert11a Cert11b Cert11c CSE543 - Introduction to Computer and Network Security Page 16 16-1

  24. Certificate Validation Root CA1 CA2 CA3 … … … CA11 CA12 CA1n CA21 CA22 Certificate Signature … … … … Cert11a Cert11b Cert11c CSE543 - Introduction to Computer and Network Security Page 16 16-2

  25. Certificate Validation Root CA1 CA2 CA3 … … … CA11 CA12 CA1n CA21 CA22 Certificate Signature … … … … Cert11a Cert11b Cert11c CSE543 - Introduction to Computer and Network Security Page 16 16-3

  26. PKI and Revocation • Certificate may be revoked before expiration ‣ Lost private key ‣ Compromised ‣ Owner no longer authorized • Revocation is hard … ‣ The “anti-matter” problem ‣ Verifiers need to check revocation state • Loses the advantage of off-line verification ‣ Revocation state must be authenticated CSE543 - Introduction to Computer and Network Security Page 17 17

  27. Revocation Mechanisms CSE543 - Introduction to Computer and Network Security Page 18 18-1

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend