why kerberos? presented by beth lynn eicher cplug security conference march 5, 2005 released under...

24
Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution-NonCommercial-ShareAlike License. Some Rights Reserved

Upload: joseph-simmons

Post on 16-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Why Kerberos?Presented by Beth Lynn Eicher

CPLUG Security Conference

March 5, 2005

Released Under The Creative Commons Attribution-

NonCommercial-ShareAlike License.

Some Rights Reserved

Page 2: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Kerberos IS...

Page 3: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

The mythical character

Page 4: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

A Network Authentication Protocol

● MIT took an idea from Xerox: “The Needham-

Schroeder Protocol”●Centralized, single sign-on, encrypted logins

Page 5: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Kerberos is everywhere•Required for OpenAFS•With Heimdal (from Sweden) you

can use Kerberos anywhere•Becoming a built-in option

• Microsoft Active Directory• LDAP• Fedora Core (PAM)

Page 6: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Yes, you can use telnet again

If you “kerberize” your service, you can use

services that otherwise pass your passwords in the

clear.

Page 7: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Allows many methods of

authentication...

Page 8: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Something that you know

Your password

Page 9: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Something that you have...

Your Securid

Page 10: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Something that you are...

Bio-authentication

Page 11: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Since there are multiple ways of

authenticating...

Let's just call it secret

Page 12: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Provides the 3 A's

● Authentication – verifying secrets●Authorization – control access

●Auditing – logging

Page 13: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

NOT to be confused with...

Page 14: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Fluffy from Harry Potter

Page 15: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

A directory service

● Kerberos doesn't know

your full name, your

favorite shell, or your

home address

● Use LDAP or NIS(+)

WITH Kerberos

Page 16: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Kerberos does encrypt your

password....● But if you are using what you assume to be

Kerberos may not be if your your system has

been exploited!

● Be aware of trojans and key stroke logging

Page 20: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Single Sign-On

1) I login to my desktop

2) After that initial login I'm given a ticket

3) I can ssh/telnet to other machines on the network

without typing a password again!

My password is not cached or resent.

My ticket allows me to request more tickets.

Page 21: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

When I want to be root

● I authenticate with my

[email protected] password

● Now I have full root privileges on the local host

● I can also use this ticket to ssh/telnet to other

machines to also be root on them too

Page 22: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

What I didn't tell you

● How Kerberos works.

● MIT vs Heimdal

● Who is Cerberus?

● How to configure Kerbeors

● How OpenAFS uses Kerberos

Page 23: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

O'Reilly to the Rescue

● “Kerberos The

Definitive Guide” by

Jason Garman

● The Owl book

● $34.95

Page 24: Why Kerberos? Presented by Beth Lynn Eicher CPLUG Security Conference March 5, 2005 Released Under The Creative Commons Attribution- NonCommercial-ShareAlike

Thanks!