Kerberos Flashcards

1
Q

Password, PIN, images, etc.

A

Something user knows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smart cards, keys, tokens

A

Something user possess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fingerprint, face, retina

A

Something user is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Voice pattern, handwriting style, typing rhythm

A

Something the user does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Method to ensure two similar encrypted passwords have different hash

A

Salting passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If k is compromised, all leaked. Reveals two users have same passowrd

A

Cannot encrypt all passwords with same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protected from passive eavesdroppers and active malicious users

A

Security in kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Users shouldn’t notice authentication taking place

A

transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

large numbers of users and servers

A

scalability in kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

eavesdropping, tampering, replay

A

malicious user eavesdrops, tampers, or replays other users’ conversation to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malicious user with access to workstation pretends to be user from same workstation

A

user impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malicious user changes network address of his workstation to impersonate another workstation

A

network address impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

trusted authentication service on network

A

trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • password can never travel over network
  • password cannot be stored in any form on client machine
  • password should never be stored in unecrypted form
  • user is asked to enter password only once per work session
A

Kerberos password design objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application server cannot contain authentication info for their users?

A
  • admin can disable account of any user by acting in single location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Both user and application must prove authenticity

A

mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Proves that user has authenticated

A

ticket

18
Q

encrypts ticket with key known to server, but not user

A

authentication server

19
Q

client cannot ___ or ____ contents of ticket

A

know or modify

20
Q

Malicious user may steal service ticket of another user on same workstation

A

Ticket hijacking

21
Q

Server must verify that the user who is presenting the ticket is the same user to whom the ticket was issued

A

Ticket hijacking

22
Q

Attacker can misconfigure the network so that he receives messages addressed to a legitimate server

A

No server authentication

23
Q

Server must prove identity to users

A

No server authentication

24
Q

Receving ticket from client is not enough to guarantee authenticity

A

Replay attack

25
Q

Client sends _____ where the username and current timestamp are included and encrypts it with the session key

A

the authenticator

26
Q

Critical for machines to be time synchronized

A

Using session key for authentication

27
Q

Server remembers authenticators which have arrived within the last 2 minutes and reject them if they are replicas

A

Replay cache

28
Q

Prove identity once to obtain a special ___ ticket

A

Ticket Granting Service

29
Q

Use ___ to get tickets for any network service

A

TGS

30
Q

Client cannot forge or tamper with it

A

TGS ticket

31
Q

Used to obtain service ticket and short-term session key for each network service

A

TGS ticket

32
Q

Network divided into realms

A

Kerberos in large networks

33
Q
  • Get ticket from home-realm TGS from home-realm KDC
  • Get ticket for remote realm TGS from home realm TGS
  • Get ticket from remote service from realms TGS
  • use remote realm ticket to acccess service
A

Kerberos in large networks

34
Q

Separate session key for each user-server pair

A

Short term session keys

35
Q

Long-term secrets used only to derive short-term keys

A

Short term session keys

36
Q

Used to prevent replays with synchronized clocks

A

Authenticator

37
Q

Symmetric cryptography only

A

Kerberos

38
Q

Server can access other servers on user’s behalf

A

Kerberos v5

39
Q

Better user-server authentication

A

Kerberos v5

40
Q

Separate subkey for each user-server session instead of re-using session key contain in ticket

A

Kerberos v5

41
Q

Authentication via subkeys, not timestamp increments

A

Kerberos v5

42
Q
A