SlideShare a Scribd company logo
KERBEROS
1
O m a l P e r e r a
o m a l p e r e r a . g i t h u b . i o
Undergraduate,
BSc. (Special) Information Systems.
CCNA (640-802)
Content
● Introduction
● History
● Why Kerberos
● Authenticating using Kerberos
● Kerberos components
● Application of Kerberos
● Advantages
● Disadvantages
● Firewall vs Kerberos?
● References
2
Introduction
● A protocol for authentication
● Developed at MIT in the mid 1980’s
● Uses tickets to authenticate
● Avoids saving passwords locally
● Avoids sending passwords over the internet
● Involves a trusted third party
● Built on symmetric-key cryptography
3
History
● Initially developed to protect network services provided by Project Athena
● Protocol is based on Needham-Schroeder symmetric key protocol
● Versions 1-3 occurred only internally at MIT
● Version 4 was designed by Steve Miller and Clifford Neuman in late 1980s
● Version 5 was designed by Neuman and Kohl in 1993
4
Why Kerberos?
● Kerberos is mature
● Kerberos meets the requirements of modern distributed systems
● Kerberos is architecturally sound
● Kerberos is already in place
5
Authenticating using Kerberos
Fig 1 - Steps to authenticate
6
Kerberos Components
7
Kerberos Components
8
Key Distribution Center (KDC)
● One Kerberos server  one region
● Distribution Center contains the
○ Authentication Service
○ the Ticket-Granting Service
○ master database for Kerberos
● Services are implemented as a single daemon
9
Authentication Service
● handles user authentication / verifying that principals are correctly identified
● Consists Servers in the KDC + security clients
● security server accesses the registry database to perform queries
then updates and to validate user logins
Ticket-Granting Service
● Once authenticated, a principal will be granted a TGT and a ticket
session key
● Your credentials = ticket + its associated key
● credentials are stored in a credentials cache, a file in a directory in the
principle
10
The Kerberos Database
● Database contains all of the
○ realm’s Kerberos principals their passwords
○ other administrative information about each principal
● The master KDC contains the primary copy of the database,
which it propagates at regular intervals to the slave KDCs
Kerberos Components
11
Kerberos Utility Programs
● OpenVMS provides different user interface programs
○ original UNIX style
○ DCL version
○ X Windows version
12
Kerberos Registry
● Kerberos registry can be manipulated in several ways
● It is initially created via the KRB$CONFIGURE
● Other tools
● Kadmin - kinit - Klist
● Kdestroy - Kpasswd -kdb5_util - Dumps or loads the
Kerberos database for save and restore
Applications of Kerberos
● Microsoft Windows
● Email, FTP, network file systems, other applications have been kerberized
● Local authentication
● Authentication for network protocols
● Secure windows systems
13
Advantages
● Passwords are never sent across the network unencrypted
● Client and application services mutually authenticated
● Tickets have a limited lifetime
● Authentication through Authentication Service has to happen only once
● Sharing secret keys is more efficient than public keys
14
Disadvantages
● Single point of failure. it requires continuous availability of a central server
● Only provides authentication for clients and services
● Vulnerable to users making poor password choices
● Has strict time requirements
15
Firewall vs Kerberos?
● Firewalls
○ Assumes that the bad guys are from outside
○ But real threats are from insiders
● Kerberos
○ assumes that network connections are the weak link in network
security
○ Strong authentication compared to firewalls
16
References
● http://h41379.www4.hpe.com/doc/83final/ba554_90008/ch01s03.html
● https://docs.oracle.com/cd/E18752_01/html/816-4557/intro-27.html
● https://people.eecs.berkeley.edu/~fox/summaries/glomop/kerb_limit.html
● http://searchsecurity.techtarget.com/news/1308058/Kerberos-Authentication-with-some-drawbacks
● https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.3/com.ibm.isam.doc/wrp_config/reference/ref_s
pnego_authe_lim.html
● https://www.slideshare.net/dotanp/kerberos-explained
● http://web.mit.edu/sipb/doc/working/guide/guide/node20.html
● https://www.kerberos.org/about/FAQ.html
● http://computing.help.inf.ed.ac.uk/why-do-we-need-kerberos
17
Copyrights
○ All the images, figures are credited to its original authors.
○ Presentation is for educational use.
○ Cover page image – https://www.freepik.com/
18
19

More Related Content

PPT
Troubleshooting Linux Kernel Modules And Device Drivers
PPTX
Linux file system
PPT
KEY
Hardware supports for Virtualization
ODP
Distributed operating system(os)
PDF
Docker Overview - Rise of the Containers
PPT
Linux file system
Troubleshooting Linux Kernel Modules And Device Drivers
Linux file system
Hardware supports for Virtualization
Distributed operating system(os)
Docker Overview - Rise of the Containers
Linux file system

What's hot (20)

PPTX
Virtualization And Containerization.pptx
PDF
Linux Internals - Part II
PDF
systemd
PDF
Processes and Threads
PDF
PPTX
Parallel Programming
PPT
Linux
PPTX
Data center virtualization
PPTX
File Management – File Concept, access methods, File types and File Operation
PPTX
Introduction to Data Center Network Architecture
PPT
PDF
A deep dive into Android OpenSource Project(AOSP)
PPTX
Cloud Deployment
PPTX
4. install and configure hyper v
PPT
Linux architecture
PPTX
User management
PDF
New Trends in software development
PPT
Linux Administration
PPTX
Distributed Systems Introduction and Importance
PDF
Virtualization Technology Overview
Virtualization And Containerization.pptx
Linux Internals - Part II
systemd
Processes and Threads
Parallel Programming
Linux
Data center virtualization
File Management – File Concept, access methods, File types and File Operation
Introduction to Data Center Network Architecture
A deep dive into Android OpenSource Project(AOSP)
Cloud Deployment
4. install and configure hyper v
Linux architecture
User management
New Trends in software development
Linux Administration
Distributed Systems Introduction and Importance
Virtualization Technology Overview
Ad

Similar to Kerberos for Distributed System Security - Omal Perera (20)

PPTX
Kerberos
PPTX
kerberos
PDF
PPTX
Kerberos
PDF
An Introduction to Kerberos
RTF
Kerberos case study
PPTX
Kerberos
PPTX
Kerberos
DOCX
Rakesh
DOCX
Rakesh
PPT
Using Kerberos
PPTX
1. Kerberos is an auth protocol llllllllllllllllllllll
PPTX
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
PPT
Kerberos full with detailed explanation tkerberos.ppt
PDF
Kerberos Security in Distributed Systems
PPTX
Kerberos : An Authentication Application
PDF
Kerberos Protocol
PDF
BAIT1103 Chapter 3
PPTX
Rakesh raj
PPT
Kerberos Presentation: Provides a centralized authentication server to authen...
Kerberos
kerberos
Kerberos
An Introduction to Kerberos
Kerberos case study
Kerberos
Kerberos
Rakesh
Rakesh
Using Kerberos
1. Kerberos is an auth protocol llllllllllllllllllllll
IS UNIT 3 PPT- PART 2.pptx is very helpful for engineering students of any El...
Kerberos full with detailed explanation tkerberos.ppt
Kerberos Security in Distributed Systems
Kerberos : An Authentication Application
Kerberos Protocol
BAIT1103 Chapter 3
Rakesh raj
Kerberos Presentation: Provides a centralized authentication server to authen...
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx

Kerberos for Distributed System Security - Omal Perera

  • 1. KERBEROS 1 O m a l P e r e r a o m a l p e r e r a . g i t h u b . i o Undergraduate, BSc. (Special) Information Systems. CCNA (640-802)
  • 2. Content ● Introduction ● History ● Why Kerberos ● Authenticating using Kerberos ● Kerberos components ● Application of Kerberos ● Advantages ● Disadvantages ● Firewall vs Kerberos? ● References 2
  • 3. Introduction ● A protocol for authentication ● Developed at MIT in the mid 1980’s ● Uses tickets to authenticate ● Avoids saving passwords locally ● Avoids sending passwords over the internet ● Involves a trusted third party ● Built on symmetric-key cryptography 3
  • 4. History ● Initially developed to protect network services provided by Project Athena ● Protocol is based on Needham-Schroeder symmetric key protocol ● Versions 1-3 occurred only internally at MIT ● Version 4 was designed by Steve Miller and Clifford Neuman in late 1980s ● Version 5 was designed by Neuman and Kohl in 1993 4
  • 5. Why Kerberos? ● Kerberos is mature ● Kerberos meets the requirements of modern distributed systems ● Kerberos is architecturally sound ● Kerberos is already in place 5
  • 6. Authenticating using Kerberos Fig 1 - Steps to authenticate 6
  • 9. Key Distribution Center (KDC) ● One Kerberos server  one region ● Distribution Center contains the ○ Authentication Service ○ the Ticket-Granting Service ○ master database for Kerberos ● Services are implemented as a single daemon 9 Authentication Service ● handles user authentication / verifying that principals are correctly identified ● Consists Servers in the KDC + security clients ● security server accesses the registry database to perform queries then updates and to validate user logins
  • 10. Ticket-Granting Service ● Once authenticated, a principal will be granted a TGT and a ticket session key ● Your credentials = ticket + its associated key ● credentials are stored in a credentials cache, a file in a directory in the principle 10 The Kerberos Database ● Database contains all of the ○ realm’s Kerberos principals their passwords ○ other administrative information about each principal ● The master KDC contains the primary copy of the database, which it propagates at regular intervals to the slave KDCs
  • 12. Kerberos Utility Programs ● OpenVMS provides different user interface programs ○ original UNIX style ○ DCL version ○ X Windows version 12 Kerberos Registry ● Kerberos registry can be manipulated in several ways ● It is initially created via the KRB$CONFIGURE ● Other tools ● Kadmin - kinit - Klist ● Kdestroy - Kpasswd -kdb5_util - Dumps or loads the Kerberos database for save and restore
  • 13. Applications of Kerberos ● Microsoft Windows ● Email, FTP, network file systems, other applications have been kerberized ● Local authentication ● Authentication for network protocols ● Secure windows systems 13
  • 14. Advantages ● Passwords are never sent across the network unencrypted ● Client and application services mutually authenticated ● Tickets have a limited lifetime ● Authentication through Authentication Service has to happen only once ● Sharing secret keys is more efficient than public keys 14
  • 15. Disadvantages ● Single point of failure. it requires continuous availability of a central server ● Only provides authentication for clients and services ● Vulnerable to users making poor password choices ● Has strict time requirements 15
  • 16. Firewall vs Kerberos? ● Firewalls ○ Assumes that the bad guys are from outside ○ But real threats are from insiders ● Kerberos ○ assumes that network connections are the weak link in network security ○ Strong authentication compared to firewalls 16
  • 17. References ● http://h41379.www4.hpe.com/doc/83final/ba554_90008/ch01s03.html ● https://docs.oracle.com/cd/E18752_01/html/816-4557/intro-27.html ● https://people.eecs.berkeley.edu/~fox/summaries/glomop/kerb_limit.html ● http://searchsecurity.techtarget.com/news/1308058/Kerberos-Authentication-with-some-drawbacks ● https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.3/com.ibm.isam.doc/wrp_config/reference/ref_s pnego_authe_lim.html ● https://www.slideshare.net/dotanp/kerberos-explained ● http://web.mit.edu/sipb/doc/working/guide/guide/node20.html ● https://www.kerberos.org/about/FAQ.html ● http://computing.help.inf.ed.ac.uk/why-do-we-need-kerberos 17
  • 18. Copyrights ○ All the images, figures are credited to its original authors. ○ Presentation is for educational use. ○ Cover page image – https://www.freepik.com/ 18
  • 19. 19

Editor's Notes

  • #3: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #4: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #5: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #6: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #7: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #8: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #9: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #10: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #11: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #12: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #13: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #14: Local Autentication - login using su in OpenBSD Autentication Local Network - Remote login - Remote shell Secure Windows Systems -SSP security support Provider – API system used in windows {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #15: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #16: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #17: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #18: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #19: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}
  • #20: {{#Omal Perera, #omalperera, #kerberos, #distributedSystems, #security, #CCNA}}