SlideShare a Scribd company logo
1 of 42
Current standard implementations for security/authorization in distributed computing infrastructures Michele Orrù – VincenzoCiaschini INFN-CNAF For the complete webinar (with sound) please go: http://www.ogfeurope.eu/tutorials.aspx
Outline Security concepts ,[object Object]
Hash functions
Digital Signature and Digital Certificates
PKIGrid Security ,[object Object],Authentication/Authorization management ,[object Object]
Shibboleth,[object Object]
An entity: an user, a service, or a machine
Credentials
Some data providing a proof of identity
Authentication
Verify the identity of the principal
Authorization
Map an entity to some set of privileges
Confidentiality
Encrypt the message so that only the recipient can understand it
Integrity
Ensure that the message has not been altered in the transmission
Non-repudiation
Impossibility of denying the authenticity of a digital signature,[object Object]
Really fast, but if we need to distribute the keys to principals we have O(n2) keys
Examples: DES, AES, Serpent, Twofish, Blowfish  ,[object Object]
every user has two keys, one private and one public
a message encrypted by one key can be decrypted only by the other one
it is hard (computationally unfeasible) to derive the private key from the public one
Thousand times slower than symmetric one, but if we need to distribute the keys to principals we have just O(n) keys
Examples: Diffie-Helmann, RSA
Curiosity: Kasperky Lab is working on factoring the 1024 bit RSA key used by the Gpcode virus. According to Bruce Schneier “it's likely to require a lot more than 15 million computer years of work"     ,[object Object]
given M, it must be easy to calculate H(M) = h
given h, it must be difficult to calculate M = H-1(h)‏
given M, it must be difficult to find M’ such that H(M) = H(M’)A birthday attack is a name used to refer to a class of brute-force attacks. It gets  its name from the surprising result that the probability that two or more people in ‏ a group of 23 share the same birthday is greater that 50%: such a result is called  a birthday paradox. From many years Philippe Oechslin published a famous paper named  “Making a Faster Cryptanalytic Time-Memory Trade-Off”: RainbowCrack is a  general propose implementation of this paper. It can find collisions on MD5, SHA1, LM, NTLM hashes.
Digital Signature Suppose we have two users, Michele and Vincenzo, that want to communicate respecting principles such as Integrity and Non-repudiation Michele calculates the hash of the message Michele encrypts the hash using his private key: the encrypted hash is the digital signature. Michele sends the signed message to Vincenzo.  Vincenzo calculates the hash of the message and verifies it with the one received by Michele and decyphered with Michele’s public key. If hashes equal: message wasn’t modified. Michele cannot repudiate it.
Digital Signature
Digital Signature
Digital Certificates Michele’s digital signature is safe if: ,[object Object]
Vincenzo knows Michele’s public keyHow can Vincenzo be sure that Michele’s public key is really Michele’s public key and not someone else’s? ,[object Object]
Both Michele and Vincenzo must trust this third partyTwo models: ,[object Object]
X.509: hierarchical organization.,[object Object]
F is reasonably sure that the key from A is really from A.,[object Object]
Online Certificate Status Protocol (OCSP): a service hosted by the CA which verifies the validity of the certificatesCA certificates are self-signed
X.509 Certificates
Which CA can you trust in Grid? EUGridPMA(http://www.eugridpma.org/) “The EUGridPMA is the international organization to coordinate the trust fabric for e-Science grid authentication in Europe. It collaborates with the regional peers APGridPMA  for the Asia-Pacific and The Americas Grid PMA in the International Grid Trust Federation. The charter document defines the group's objective, scope and operation. It is the basis for the guidelines documents on the accreditation procedure, the Authentication profile for X.509 secured "classic" certification authorities and other IGTF recognised Profiles". RPMs and DEB metapackages are available for almost every Linux distribution
The Grid Security Infrastructure (GSI)‏ Based on X.509 PKI: Every Grid transaction is mutually authenticated: ,[object Object]

More Related Content

What's hot

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
Lê Liêu
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
53398506 10-case-study-digital-signature
53398506 10-case-study-digital-signature53398506 10-case-study-digital-signature
53398506 10-case-study-digital-signature
BookStoreLib
 

What's hot (20)

Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
57 306-311
57 306-31157 306-311
57 306-311
 
C08 crypto-digital signature13
C08 crypto-digital signature13C08 crypto-digital signature13
C08 crypto-digital signature13
 
Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...Digital signatures - A mathematical scheme for demonstrating the authenticity...
Digital signatures - A mathematical scheme for demonstrating the authenticity...
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
 
Part04 key exchange protocols
Part04 key exchange protocolsPart04 key exchange protocols
Part04 key exchange protocols
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROT...
A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROT...A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROT...
A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROT...
 
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Blind Signature Scheme
Blind Signature SchemeBlind Signature Scheme
Blind Signature Scheme
 
Digital signature schemes
Digital signature schemesDigital signature schemes
Digital signature schemes
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear PairingsID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings
 
53398506 10-case-study-digital-signature
53398506 10-case-study-digital-signature53398506 10-case-study-digital-signature
53398506 10-case-study-digital-signature
 
El Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign onEl Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign on
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 
CISSPills #1.02
CISSPills #1.02CISSPills #1.02
CISSPills #1.02
 
Cryptanalysis of Efficient Unlinkable Secret Handshakes for Anonymous Communi...
Cryptanalysis of Efficient Unlinkable Secret Handshakes for Anonymous Communi...Cryptanalysis of Efficient Unlinkable Secret Handshakes for Anonymous Communi...
Cryptanalysis of Efficient Unlinkable Secret Handshakes for Anonymous Communi...
 
Bt0088 cryptography and network security
Bt0088  cryptography and network securityBt0088  cryptography and network security
Bt0088 cryptography and network security
 

Similar to Current standard implementations for security/authorization in distributed computing infrastructures

I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
MehediHasanShaon1
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
Dhaval Bhatia
 
ok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.pptok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.ppt
SmeetaJavalagi
 

Similar to Current standard implementations for security/authorization in distributed computing infrastructures (20)

Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
Lecture13certaficate.pdf
Lecture13certaficate.pdfLecture13certaficate.pdf
Lecture13certaficate.pdf
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Jerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.pptJerad Bates - Public Key Infrastructure.ppt
Jerad Bates - Public Key Infrastructure.ppt
 
Jerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).pptJerad Bates - Public Key Infrastructure (1).ppt
Jerad Bates - Public Key Infrastructure (1).ppt
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
IS - User Authentication
IS - User AuthenticationIS - User Authentication
IS - User Authentication
 
Lecture17
Lecture17Lecture17
Lecture17
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vanda
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network securities cn
Network securities cnNetwork securities cn
Network securities cn
 
ok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.pptok_mary_pki1234public_key_encryption.ppt
ok_mary_pki1234public_key_encryption.ppt
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Current standard implementations for security/authorization in distributed computing infrastructures

  • 1. Current standard implementations for security/authorization in distributed computing infrastructures Michele Orrù – VincenzoCiaschini INFN-CNAF For the complete webinar (with sound) please go: http://www.ogfeurope.eu/tutorials.aspx
  • 2.
  • 4. Digital Signature and Digital Certificates
  • 5.
  • 6.
  • 7. An entity: an user, a service, or a machine
  • 9. Some data providing a proof of identity
  • 11. Verify the identity of the principal
  • 13. Map an entity to some set of privileges
  • 15. Encrypt the message so that only the recipient can understand it
  • 17. Ensure that the message has not been altered in the transmission
  • 19.
  • 20. Really fast, but if we need to distribute the keys to principals we have O(n2) keys
  • 21.
  • 22. every user has two keys, one private and one public
  • 23. a message encrypted by one key can be decrypted only by the other one
  • 24. it is hard (computationally unfeasible) to derive the private key from the public one
  • 25. Thousand times slower than symmetric one, but if we need to distribute the keys to principals we have just O(n) keys
  • 27.
  • 28. given M, it must be easy to calculate H(M) = h
  • 29. given h, it must be difficult to calculate M = H-1(h)‏
  • 30. given M, it must be difficult to find M’ such that H(M) = H(M’)A birthday attack is a name used to refer to a class of brute-force attacks. It gets its name from the surprising result that the probability that two or more people in ‏ a group of 23 share the same birthday is greater that 50%: such a result is called a birthday paradox. From many years Philippe Oechslin published a famous paper named “Making a Faster Cryptanalytic Time-Memory Trade-Off”: RainbowCrack is a general propose implementation of this paper. It can find collisions on MD5, SHA1, LM, NTLM hashes.
  • 31. Digital Signature Suppose we have two users, Michele and Vincenzo, that want to communicate respecting principles such as Integrity and Non-repudiation Michele calculates the hash of the message Michele encrypts the hash using his private key: the encrypted hash is the digital signature. Michele sends the signed message to Vincenzo. Vincenzo calculates the hash of the message and verifies it with the one received by Michele and decyphered with Michele’s public key. If hashes equal: message wasn’t modified. Michele cannot repudiate it.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Online Certificate Status Protocol (OCSP): a service hosted by the CA which verifies the validity of the certificatesCA certificates are self-signed
  • 41. Which CA can you trust in Grid? EUGridPMA(http://www.eugridpma.org/) “The EUGridPMA is the international organization to coordinate the trust fabric for e-Science grid authentication in Europe. It collaborates with the regional peers APGridPMA for the Asia-Pacific and The Americas Grid PMA in the International Grid Trust Federation. The charter document defines the group's objective, scope and operation. It is the basis for the guidelines documents on the accreditation procedure, the Authentication profile for X.509 secured "classic" certification authorities and other IGTF recognised Profiles". RPMs and DEB metapackages are available for almost every Linux distribution
  • 42.
  • 43. Michele verifies CA signature in Vincenzo’s certificate;
  • 44. Michele sends to Vincenzo a challenge string;
  • 45. Vincenzo encrypts the hash of the challenge string with his private key;
  • 46. Vincenzo sends encrypted hash challenge to Michele
  • 47. Michele uses Vincenzo’s public key to decrypt the hash.
  • 48. Michele compares the decrypted string with the has of original challenge
  • 49.
  • 50. X.509 Proxy Certificate On the Grid the user does not use his own long living certificate: security problems may arise. The solution is to use an X.509 Proxy Certificate (GSI extension to X.509 Identity Certificates). According to RFC 3820: “Use of a proxy credential is a common technique used in security systems to allow entity A to grant to another entity B the right for B to be authorized with others as if it were A. In other words, entity B is acting as a proxy on behalf of entity A.”
  • 51. X.509 Proxy Certificate Has a limited lifetime Is signed by the normal end entity certificate or by another proxy Delegation = remote creation of a (second level) proxy credential Allows remote process to authenticate on behalf of the user
  • 52. Virtual Organizations and VOMS To submit to the Grid, personal certificates are not the end of the story. Users MUST join at least one of the groups allowed to use the Grid resources = Virtual Organization (VO) VOMS (Virtual Organization Membership Service) extends the proxy info with VO membership, group and role.
  • 54.
  • 55.
  • 56. Kerberos aims The user's password must never travel over the network; The user's password must never be stored in any form on the client machine; The user's password should always be encrypted in the authentication server database; The user is asked to enter a password only once per work session. Therefore users can transparently access all the services they are authorized for. This characteristic is known as Single Sign-On; Not only do the client have to prove that he is who he says, but, when requested, the application server must prove its authenticity to the client as well. This characteristic is known as Mutual authentication; Following the authentication and authorization phases, the client and server must be able to encrypt the connection. Kerberos provides support for the generation and exchange of an encryption key K'A to be used to encrypt data.
  • 57.
  • 60.
  • 61.
  • 62. Authentication Server (AS): replies to the initial authentication request from the client, when the user, not yet authenticated, must enter his password.
  • 63.
  • 64. Kerberos operations: AS - AS_req: First user request (kinitcommand) - AS_rep: it contains the TGT ticket (encrypted using the TGS secret key) and the session key (encrypted using the secret key of the requesting user)
  • 65. Kerberos operations: TGS - TGS_req: includes the TGT obtained from the previous message and an authenticator generated by the client and encrypted with the session key - TGS_rep: the requested service ticket (encrypted with the secret key of the service) and a service session key generated by TGS and encrypted
  • 66. Kerberos operations: AP - AP_req: the service ticket (from TGS) with the previous reply and an authenticator generated by the client, but encrypted using the service session key - AP_rep: the reply that the application server gives to the client to prove it really is the server the client is expecting (only on Mutual Auth)
  • 67.
  • 68. kx509: standalone client that acquires a short-term X.509 certificate from the KCA and stores it in the local user;s Kerberos ticket file. The certificate can be used by PKI-aware applications trough the kpkcs11 library
  • 69. kpkcs11: library that exports the PKCS#11 interface.
  • 70.
  • 71. with Mutual Auth, man-in-the-middle attacks are unfeasible
  • 72. BUT some authentication layers such as PAM on Unix systems, does not use the whole Kerberos auth process by default: they use a shortcut of the first step (see Kerberos operations: AS), trying to decrypt the AS_REP using the password provided by the user, completely ignoring the ticket-granting ticket (TGT).
  • 73.
  • 74. the replay attack requires the ability to listen on the network as well as the ability to send fake packets
  • 75.
  • 76.
  • 77. The trust relationships between each node is ABUSEDAs we have discussed before, “Kerberos does not provide any guarantees if the machines or services being used are vulnerable”. Hijacking Kerberos tickets always starts compromising a kerberized system, and gaining root access to it.
  • 78. Kerberos attack techniques Kerberos Hijacking: practical demonstration # ls -al /tmp/krb* -rw------- 1 vincenzo eng 383 Aug 28 08:19 /tmp/krb6bb_89763_AX98k3 <-- FREE ACCESS! # klist Ticket cache: FILE:/tmp/krb6bb_6425 <-- expected filename Default principal: michele@target Valid starting Expires Service principal 08/28/09 12:14:50 08/28/09 22:14:50 krbtgt/target@target renew until 09/05/07 12:14:39 Let change the file to the expected name run klist: # cp /tmp/krb6bb_89763_AX98k3 /tmp/krb6bb_6425 # klist Ticket cache: FILE:/tmp/krb6bb_6425 Default principal: vincenzo@target <---we are now Vincenzo! Valid starting Expires Service principal 08/28/07 08:19:42 08/28/07 18:19:42 krbtgt/target@target renew until 09/05/07 08:19:42
  • 79.
  • 80. Implementation of an Authentication and Authorization Infrastructure (AAI)
  • 81. Based on Security Assertion Markup Language (SAML)
  • 82. SAML is an OASIS XML-based standard for exchanging A&A data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions)
  • 83. A Shibboleth Federation allows cross-domain Single-sign On (SSO)
  • 84. Service providers don’t need anymore to maintain username and password DBs
  • 85.
  • 86.
  • 87.
  • 88.
  • 91. Java Authentication and Authorization Service (JAAS)and Java DataBase Connectivity (JDBC) used to interface the existent infrastructure with Shibboleth.
  • 93.
  • 96.
  • 98.
  • 99.
  • 100. Shibboleth Identity -> VOMS Identity
  • 101.

Editor's Notes

  1. AES was announced by National Institute of Standards and Technology (NIST). May 26, 2002
  2. VOMS allows distributed collaborations to centrally manage user roles and capabilities. The VOMS user credentials provide additional role and capability data to application service providers that can then be used to make more fully-informed authorization decisions.
  3. MIT developed Kerberos to protect network services provided by Project Athena. The protocol was named after the Greek mythological character Kerberos (or Cerberus), known in Greek mythology as being the monstrous three-headed guard dog of Hades. Several versions of the protocol exist; versions 1–3 occurred only internally at MIT.
  4. http://www.citi.umich.edu/projects/kerb_pki/
  5. Timestamps : Time-based authenticators shrink the time window during which the authenticator can be reused.Ticket can be address-full, meaning that IP addresses for which tickets have been generated get embedded inside the ticket. Thus the server is able to verify these addresses against the connection source IP address. While it might represent a true challenge to enforce address-full tickets in a realistic environment, very few common services actually verify these addresses, in fact none in a Microsoft Windows environment and only KDC services under Unix environment.Replay cache : a server can store previously submit authenticators during their lifetime and detect their reuse. The last countermeasure is to use keyed cryptographic checksum in upper layer protocol using the session key (unknown by the replaying attacker).
  6. Hijacking kerberos tickets always starts compromising a kerberized system, and gain root access: - privilege escalation - password sniffing - shoulder surfing
  7. Key benefits:Relieves remote service providers from having to manage user lists for every institution that uses their servicesAllows "home institutions" to protect the identities of their users from remote service providersLeverages existing authentication systems at home institutionsFlexible, distributed architecture supports a variety of usage scenarios
  8. Without AAI: - Different login processes - Often IP-based authorization - Many resources not protected due to difficulties With AAI: - Single login process for the users - Many new resources (that weren’t protected when AAI was not implemented) now become available for the users
  9. Shibboleth is a Java web appWeb/application Servers supportedTomcat/jboss Apache + Tomcat/JbossIIS + Tomcat/JBoss