[Page 400]
Chapter 14.Authentication Applications
14.1 Kerberos
Motivation
Kerberos Version 4
Kerberos Version 5
14.2 X.509Authentication Service
Certificates
AuthenticationProcedures
X.509 Version 3
14.3 Public-KeyInfrastructure
PKIX ManagementFunctions
PKIX ManagementProtocols
14.4 Recommended Reading and Web Sites
14.5 Key Terms,Review Questions, and Problems
Key Terms
Review Questions
Problems
Appendix 14AKerberos Encryption Techniques
Password-to-KeyTransformation
Propagating CipherBlock Chaining Mode
[Page 401]
We cannot enter intoalliance with neighboring princes until we are acquainted with their designs.
The Art of War, SunTzu
Key Points
Kerberos is anauthentication service designed for use in a distributed environment.
Kerberos makes useof a trusted third-part authentication service that enables clients and serversto
establishauthenticated communication.
X.509 defines theformat for public-key certificates. This format is widely used in a variety ofapplications.
A public keyinfrastructure (PKI) is defined as the set of hardware, software, people,policies, and
procedures needed tocreate, manage, store, distribute, and revoke digital certificates based onasymmetric
cryptography.
Typically, PKIimplementations make use of X.509 certificates.
This chapterexamines some of the authentication functions that have been developed tosupport application-level authentication and
digital signatures.
We begin by lookingat one of the earliest and also one of the most widely used services: Kerberos.Next, we examine the X.509
directoryauthentication service. This standard is important as part of the directoryservice that it supports, but is also a basic building
block used in otherstandards, such as S/MIME, discussed in Chapter 15. Finally, this chapterexamines the concept of a public-key
infrastructure(PKI).
[Page 401(continued)]
14.1. Kerberos
[1]
Kerberos is anauthentication service developed as part of Project Athena at MIT. The problemthat Kerberos addresses is this: Assume
an open distributedenvironment in which users at workstations wish to access services on serversdistributed throughout the network. We
would like forservers to be able to restrict access to authorized users and to be able toauthenticate requests for service. In this
environment, aworkstation cannot be trusted to identify its users correctly to networkservices. In particular, the following three threats
exist:
[1] "In Greekmythology, a many headed dog, commonly three, perhaps with a serpent's tail,the guardian of the
entrance ofHades." From Dictionary of Subjects and Symbols in Art, by James Hall,Harper & Row, 1979. Just as
the Greek Kerberoshas three heads, the modern Kerberos was intended to have three components toguard a
network's gate:authentication, accounting, and audit. The last two heads were neverimplemented.
A user may gainaccess to a particular workstation and pretend to be another user operatingfrom that workstation.
[Page 402]
A user may alter thenetwork address of a workstation so that the requests sent from the alteredworkstation appear to come
from theimpersonated workstation.
A user may eavesdropon exchanges and use a replay attack to gain entrance to a server or to disruptoperations.
In any of thesecases, an unauthorized user may be able to gain access to services and datathat he or she is not authorized to access.
Rather than buildingin elaborate authentication protocols at each server, Kerberos provides acentralized authentication server whose
function is toauthenticate users to servers and servers to users. Unlike most otherauthentication schemes described in this book,
Kerberos reliesexclusively on symmetric encryption, making no use of public-key encryption.
Two versions ofKerberos are in common use. Version 4 [MILL88, STEI88] implementations stillexist. Version 5 [KOHL94] corrects some
[2]
of the securitydeficiencies of version 4 and has been issued as a proposed Internet Standard(RFC 1510).
[2] Versions 1through 3 were internal development versions. Version 4 is the"original" Kerberos.
We begin thissection with a brief discussion of the motivation for the Kerberos approach.Then, because of the complexity of Kerberos, it
is best to startwith a description of the authentication protocol used in version 4. Thisenables us to see the essence of the Kerberos
strategy withoutconsidering some of the details required to handle subtle security threats.Finally, we examine version 5.
Motivation
If a set of users isprovided with dedicated personal computers that have no network connections,then a user's resources and files can be
protected byphysically securing each personal computer. When these users instead are servedby a centralized time-sharing system, the
time-sharingoperating system must provide the security. The operating system can enforceaccess control policies based on user identity
and use the logonprocedure to identify users.
Today, neither ofthese scenarios is typical. More common is a distributed architectureconsisting of dedicated user workstations (clients)
and distributed orcentralized servers. In this environment, three approaches to security can beenvisioned:
1.
Rely on eachindividual client workstation to assure the identity of its user or users andrely on each server to enforce a security
policy based on useridentification (ID).
2.
Require that clientsystems authenticate themselves to servers, but trust the client systemconcerning the identity of its user.
3.
Require the user toprove his or her identity for each service invoked. Also require that serversprove their identity to clients.
In a small, closedenvironment, in which all systems are owned and operated by a single organization,the first or perhaps the second
[3]
strategy maysuffice. But in a more open environment, in which network connections to othermachines are supported, the third
approach is neededto protect user information and resources housed at the server. Kerberossupports this third approach. Kerberos
assumes adistributed client/server architecture and employs one or more Kerberos serversto provide an authentication service.
[3] However, even aclosed environment faces the threat of attack by a disgruntled employee.
[Page 403]
The first publishedreport on Kerberos [STEI88] listed the following requirements:
Secure: A networkeavesdropper should not be able to obtain the necessary information toimpersonate a user. More
generally, Kerberosshould be strong enough that a potential opponent does not find it to be theweak link.
Reliable: For allservices that rely on Kerberos for access control, lack of availability of theKerberos service means lack of
availability of thesupported services. Hence, Kerberos should be highly reliable and should employa distributed server
architecture, withone system able to back up another.
Transparent:Ideally, the user should not be aware that authentication is taking place,beyond the requirement to enter a
password.
Scalable: The systemshould be capable of supporting large numbers of clients and servers. Thissuggests a modular,
distributedarchitecture.
To support theserequirements, the overall scheme of Kerberos is that of a trusted third-partyauthentication service that uses a protocol
based on thatproposed by Needhamand Schroeder [NEED78], which was discussed inChapter 7. It is trusted in thesense that clients
and servers trustKerberos to mediate their mutual authentication. Assuming the Kerberos protocolis well designed, then the
[4]
authenticationservice is secure if the Kerberos server itself is secure.
[4] Remember thatthe security of the Kerberos server should not automatically be assumed butmust be guarded
carefully (e.g., in alocked room). It is well to remember the fate of the Greek Kerberos, whomHercules was ordered
by Eurystheus tocapture as his Twelfth Labor: "Hercules found the great dog on its chainand seized it by the
throat. At once thethree heads tried to attack, and Kerberos lashed about with his powerful tail.Hercules hung on
grimly, and Kerberosrelaxed into unconsciousness. Eurystheus may have been surprised to seeHercules
alivewhen he saw thethree slavering heads and the huge dog they belonged to he was frightened outof his wits,
and leapt back intothe safety of his great bronze jar." From The Hamlyn Concise Dictionary ofGreek and Roman
Mythology, byMichael Stapleton, Hamlyn, 1982.
Kerberos Version 4