Kerberos Flashcards
Password, PIN, images, etc.
Something user knows
Smart cards, keys, tokens
Something user possess
Fingerprint, face, retina
Something user is
Voice pattern, handwriting style, typing rhythm
Something the user does
Method to ensure two similar encrypted passwords have different hash
Salting passwords
If k is compromised, all leaked. Reveals two users have same passowrd
Cannot encrypt all passwords with same key
Protected from passive eavesdroppers and active malicious users
Security in kerberos
Users shouldn’t notice authentication taking place
transparency
large numbers of users and servers
scalability in kerberos
eavesdropping, tampering, replay
malicious user eavesdrops, tampers, or replays other users’ conversation to gain unauthorized access
malicious user with access to workstation pretends to be user from same workstation
user impersonation
malicious user changes network address of his workstation to impersonate another workstation
network address impersonation
trusted authentication service on network
trusted third party
- password can never travel over network
- password cannot be stored in any form on client machine
- password should never be stored in unecrypted form
- user is asked to enter password only once per work session
Kerberos password design objectives
Application server cannot contain authentication info for their users?
- admin can disable account of any user by acting in single location
Both user and application must prove authenticity
mutual authentication