Needham-Shroeder & Kerberos Flashcards

1
Q

How does Needham-Schroeder work?

A

Alice and Bob are entities on a trusted network, Cathy is a trusted server.

Cathy can provide a session key encrypted using a shared secret between the request and her.

Nonce is also sent to prove it’s not a replay attack.

Cathy’s response introduces Alice to Bob, but the message for Bob is encrypted using Cathy & Bob’s shared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Nonce’s used for?

A

Used to defend against replay attacks pretending to be Cathy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the limitations of using nonces?

A

Bob has to assume that the key he receives from Cathy is fresh but the messages could have been delayed?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a limitation of Needham-Schroeder

A

Alice can stockpile keys for communications, Cathy has not way to know this or revoke the keys.

If K_ac is compromised the attack can obtain more keys or authority

Cathy must keep a record of all issued keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can a MITM be performed?

A

An attacker can compromise the first message and have Cathy return themselve as the intended recipient instead of Bob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three options to base access control off of in a distributed system?

A

User identity
User network address
Access Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does FTP and Telnet differ from rlogin?

A

They ask for ID and Password, rlogin transmits the username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can access rights be given to the user in a distributed system?

A

Can be granted to the user by a local security authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are issues with distributed system security?

A
Aliveness
Freshness
Replay
Cipher Suites
Standards
Integrity
MITM
Header and body encryption
Strength
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Kerberos?

A

Distributed access control system which was the default option in windows 2000. Made use of Needham-Schroeder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the type of trusted third party in Kerberos?

A

Authentication Server - used for login

Ticket granting server - Issues time-restricted tickets for access to resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens when a user authentications?

A

The authentication server sends a session key to both the ticket-granting server and the user so that the user can make requests to the ticket-granting server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the ticket recipient verify it’s received the ticket in a timely manner?

A

Sends a timestamp to the sender to confirm the liveness of the ticket by incrementing the timestamp by one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What replaces a nonce in Kerberos?

A

Timestamp, as it also shows aliveness and freshness.

Introduces time synchronisation problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DSSA?

A

Distributed system security architecture (DSSA) for localised networks of workstations

Comprised of authentication and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is access granted in DSSA?

A

Security of objects is handled by owners but access to resources is controlled by the central, trusted CA the Certificate Distribution Centre (CDC)

17
Q

What is DSSA/SPX

A

Authentication protocol of DSSA which has been adapted as the distributed authentication security service (DASS)

18
Q

What does DASS do?

A

Each node enforces it’s own security policy.

Authentication of users involves credentials containing
name, private keys, certs, auth tokens, binding of names to public keys

19
Q

What is GSS-API?

A

Interface to a set of security services

Service layer is most appropriate place for security employment in distributed systems.

20
Q

Why is CORBA used?

A

Heterogeneous technology stack means interoperability is difficult.

Object Request Broker handles interactions between users and objects, and can make requests for authorization to access.