Windows 2000 Kerberos Authentication

 

Overview

* Kerberos provides authentication and crypto over the network.

Benefits of Kerberos

* Faster connections:
– server does not need to contact domain controller (DC) in order to authenticate clients.
– clients carries with them session tickets for target servers.
* Mutual authentication:
– two way authentication between server and client
* Delegated authentication:
– proxy mechanism that allows a Windows service to impersonate its client when connecting to other services
* Simplified trust management
– trusts are mutual and transitive
* Interop with non Windows 2000 network resources via on Kerveros 5

Three Heads of Kerberos

* Key Distribution Center (KDC)
* User Client
* Server resource

Key Distribution Center: KDC

* KDC runs on a physically secure server.
* KDC maintains a database with account info for all security principals in its realm aka domain.
* KDC stores a cryptographic key known only to the security principal and the KDC.
– aka long-term key which is usually derived from user password, e.g. hash value.

Key Exchanges

AS Exchange

* AS: Authentication Service

TGS Exchange

* TGS: Ticket Granting Service

CS Exchange

* CS: Client Server

Kerberos in Active Directory

* Integral part of AD 2000 (NTLM only before it)
* Uses Kerberos verion 5
* KDC is part of domain controller and servers as:
– the Authentication Service (AS)
– the Ticket Granting Service (TGS)

TGT

* TGT is
– valid for the local domain
– cached on local machine in volatile memory space
– used to request sessions with services throughout the network
* TGT contains two sections:
– a TGT ticket encrypted with a key that only KDC(TGS) can decrypt
– a session key encrypted with user’s password hash to handle future communications
* TGT includes:
– TTL which defaults to 8 hrs
– authorization data
– session key

References

* Windows 2000 Kerberos Authentication
* Kerberos: The Network Authentication Protocol
* http://www.mcmcse.com/microsoft/guides/kerberos.shtml
* Kerberos Explained

This entry was posted in kerberos and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *


*

This site uses Akismet to reduce spam. Learn how your comment data is processed.