SlideShare a Scribd company logo
Single Sign-on with Kerberos Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008
Introduction: Services Example of network services Email Shell Accounts Websites Each traditionally responsible for authenticating users Duplicate user information LDAP solves duplication problem by acting as directory service User must still authenticate each time service is accessed
Single Sign-on Motivation Gets rid of constant password prompts System administrator manages one group of users instead of several groups for different services User only has one password to remember Technique used to validate user's identity only once and give secure access to all network services
Project Outline Setup Kerberos  Popular mechanism used to achieve single sign-on Setup 3 virtual machines on a network Setup various network services SSH FTP NFS Mail
LDAP Overview Lightweight Directory Access Protocol Stores information about users, groups, DNS, or any database utilizing service Can add, modify, and query for information
LDAP Choice Chose OpenLDAP Created in 1998 Loosely based on LDAP server at University of Michigan Uses insecure communication mechanism “ One of the team members may have killed himself if we used a proprietary implementation” Other LDAP choices Active Directory by Microsoft Open Directory by Novell Red Hat Directory Server by Red Hat
SSL Overview Secure Socket Layer Protocol used to ensure that data transferred over networks are encrypted Prevents tampering and eavesdropping Use OpenSSL Implements SSL and newer protocol TLS (Transport Layer Security)‏
Kerberos Overview Way to securely prove one's identity over network Open source application developed by MIT  Made up of two parts Authentication server Ticket granting server Ticket is granted after user authenticated Use symmetric key cryptography Expires after period of time User presents ticket to service Service authenticates user without prompting for password
Kerberos Diagram
Project Design 3 Virtual Machines named Kenny, Cartman, and Stan Cartman (Debian Lenny)‏ Central server LDAP, Kerberos, NTPserver Stan (Debian Lenny)‏ Secondary server Mail, NFS, FTP Kenny (Ubuntu 8.04)‏ Client All three run SSH servers Kenny and Cartman mount Stan's NFS share Does not accept RSA or DSA keys in SSH Mail client on Kenny does not store passwords
LDAP Setup Serves as base for user information Used BDB database for backend Challenge to find different configuration files on Debian and Ubuntu Tell name services to use LDAP Configure PAM (Pluggable Authentication Modules) to authenticate against LDAP Removed all local accounts from machines
SSL Setup Generate certificates Problems with pointing to correct certificates Needed to fix configuration files Problems with nomenclature References to ldaps or StartTLS protocols Changed configuration from ldaps to ldap and enabled StartTLS
Kerberos Setup Create and initialize realm Create principles for all hosts, users, and services Change PAM from using LDAP to Kerberos LDAP still needed for other reasons Install Kerberos keys into the key stores of all clients All machines must have the correct date and time Validate session for ticket Example principles: host/stan@VAST.UCCS.EDU imap/stan@VAST.UCCS.EDU [email_address] root/admin@VAST.UCCS.EDU
Kerberos (contd)‏ User authentication handled by Kerberos, but user information (user id, groups, shell, home directory, etc) still handled by LDAP. Users must recreate their password, so migrating from LDAP on a large network may not be feasible.
SSH Setup Modify the SSH Server configuration to accept GSSAPI (Kerberos) credentials GSSAPIAuthentication yes GSSAPICleanupCredentials yes GssapiKeyExchange yes AllowTcpForwarding yes Modify the SSH Client configuration to send GSSAPI credentials when connecting GSSAPIAuthentication yes GSSAPIDelegateCredentials yes Users only need to log in once to SSH anywhere, or use any other Kerberos services.
FTP Setup Setup FTP on Stan Needed package “krb5-ftpd” “ Kerberized” version of FTP Problem in not realizing that server daemon, inetd, wasn't installed Manages services by mapping them to a specific ports and launches correct services Used “krb-ftp” command on Kenny to test FTP Came with the”krb-client” package
NFS Setup NFSv4 Setup Server Added principles to Kerberos Modified exports file Ensure RPC services were starting correctly (idmap)‏ Setup Client RPC services (idmap)‏ Import Kerberos Keys Recreated key files on all machines Verified permissions and mount points Setup to automatically mount home directories
IMAP Server Set up dovecot (popular IMAP server) with secure SSL extensions on Stan. Kerberos used for authentication, regular password authentication disabled LDAP used for user information (e.g. path to their mail directories)‏ Set up a quick-n-dirty postfix install to allow delivery of mail (no Kerberos though)‏
IMAP Client Used thunderbird on Kenny as IMAP client Must tell thunderbird to use Kerberos Option is “Use secure authentication” (different than SSL/TSL)‏ Client can receive email after logging in to the desktop without being asked for a password. Bonus: Thunderbird doesn’t have to store your email password anywhere, so it’s more secure.
Future Directions Add firewall security Add more services such as Apache Add multiple platforms Add security to SMTP
References Debian (www.debian.org)‏ Ubuntu (ubuntuforums.org)‏ en.gentoo-wiki.com Chris

More Related Content

PDF
Kerberos presentation
PPTX
Kerberos Authentication Process In Windows
PDF
Deep Dive In To Kerberos
PPTX
Kerberos
PPT
Authentication Application in Network Security NS4
PPTX
Kerberos Authentication Protocol
PPT
Using Kerberos
Kerberos presentation
Kerberos Authentication Process In Windows
Deep Dive In To Kerberos
Kerberos
Authentication Application in Network Security NS4
Kerberos Authentication Protocol
Using Kerberos

What's hot (20)

RTF
Kerberos case study
PDF
Kerberos
PPTX
Kerberos authentication
PPTX
Kerberos
PPTX
Kerberos : An Authentication Application
PPT
Kerberos (1)
PDF
An Introduction to Kerberos
PPTX
Kerberos
PPTX
Kerberos
PPTX
Kerberos and its application in cross realm operations
PPTX
Kerberos explained
PPTX
Rakesh raj
PPTX
kerberos
PPTX
Kerberos protocol
PPT
Kerberos
PPTX
SPS Ozarks 2012: Kerberos Survival Guide
PPTX
Kerberos
PPTX
Kerberos
PPTX
Kerberos survival guide-STL 2015
Kerberos case study
Kerberos
Kerberos authentication
Kerberos
Kerberos : An Authentication Application
Kerberos (1)
An Introduction to Kerberos
Kerberos
Kerberos
Kerberos and its application in cross realm operations
Kerberos explained
Rakesh raj
kerberos
Kerberos protocol
Kerberos
SPS Ozarks 2012: Kerberos Survival Guide
Kerberos
Kerberos
Kerberos survival guide-STL 2015
Ad

Viewers also liked (11)

PDF
Using NoSQL databases to store RADIUS and Syslog data
PDF
Plone and Single-Sign On - Active Directory and the Holy Grail
PPTX
Transport Layer Security
PDF
SSL/TLS
PPTX
Transport Layer Security (TLS)
PPT
Secure Socket Layer (SSL)
PPTX
Ssl (Secure Socket Layer)
PPT
Secure Socket Layer
PPT
Introduction to Secure Sockets Layer
PDF
SAP Single Sign-On 2.0 Overview
PDF
Instant Single Sign-On and Two-Factor Authentication
Using NoSQL databases to store RADIUS and Syslog data
Plone and Single-Sign On - Active Directory and the Holy Grail
Transport Layer Security
SSL/TLS
Transport Layer Security (TLS)
Secure Socket Layer (SSL)
Ssl (Secure Socket Layer)
Secure Socket Layer
Introduction to Secure Sockets Layer
SAP Single Sign-On 2.0 Overview
Instant Single Sign-On and Two-Factor Authentication
Ad

Similar to SSO with kerberos (20)

PDF
Building Open Source Identity Management with FreeIPA
ODP
PPTX
ODP
PPTX
Presentation1.pptx
PDF
Computer network (4)
PPT
Introduction to distributed security concepts and public key infrastructure m...
PPT
Windows Server2008 Overview 090222022333 Phpapp01
PPT
Windows Server2008 Overview
PPT
Chapter 06
PPTX
Implementation of secure email server in cloud environment copy1
PPT
Chapter 03
ODP
Ubuntu For Intranet Services
PPTX
Hadoop security
DOCX
Install ldap server
DOCX
Install ldap server
PPTX
Linux Based Network Proposal
PPT
Application layer protocols
PPTX
System and network administration network services
PDF
Kamailio - Secure Communication
Building Open Source Identity Management with FreeIPA
Presentation1.pptx
Computer network (4)
Introduction to distributed security concepts and public key infrastructure m...
Windows Server2008 Overview 090222022333 Phpapp01
Windows Server2008 Overview
Chapter 06
Implementation of secure email server in cloud environment copy1
Chapter 03
Ubuntu For Intranet Services
Hadoop security
Install ldap server
Install ldap server
Linux Based Network Proposal
Application layer protocols
System and network administration network services
Kamailio - Secure Communication

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
A comparative analysis of optical character recognition models for extracting...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

SSO with kerberos

  • 1. Single Sign-on with Kerberos Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008
  • 2. Introduction: Services Example of network services Email Shell Accounts Websites Each traditionally responsible for authenticating users Duplicate user information LDAP solves duplication problem by acting as directory service User must still authenticate each time service is accessed
  • 3. Single Sign-on Motivation Gets rid of constant password prompts System administrator manages one group of users instead of several groups for different services User only has one password to remember Technique used to validate user's identity only once and give secure access to all network services
  • 4. Project Outline Setup Kerberos Popular mechanism used to achieve single sign-on Setup 3 virtual machines on a network Setup various network services SSH FTP NFS Mail
  • 5. LDAP Overview Lightweight Directory Access Protocol Stores information about users, groups, DNS, or any database utilizing service Can add, modify, and query for information
  • 6. LDAP Choice Chose OpenLDAP Created in 1998 Loosely based on LDAP server at University of Michigan Uses insecure communication mechanism “ One of the team members may have killed himself if we used a proprietary implementation” Other LDAP choices Active Directory by Microsoft Open Directory by Novell Red Hat Directory Server by Red Hat
  • 7. SSL Overview Secure Socket Layer Protocol used to ensure that data transferred over networks are encrypted Prevents tampering and eavesdropping Use OpenSSL Implements SSL and newer protocol TLS (Transport Layer Security)‏
  • 8. Kerberos Overview Way to securely prove one's identity over network Open source application developed by MIT Made up of two parts Authentication server Ticket granting server Ticket is granted after user authenticated Use symmetric key cryptography Expires after period of time User presents ticket to service Service authenticates user without prompting for password
  • 10. Project Design 3 Virtual Machines named Kenny, Cartman, and Stan Cartman (Debian Lenny)‏ Central server LDAP, Kerberos, NTPserver Stan (Debian Lenny)‏ Secondary server Mail, NFS, FTP Kenny (Ubuntu 8.04)‏ Client All three run SSH servers Kenny and Cartman mount Stan's NFS share Does not accept RSA or DSA keys in SSH Mail client on Kenny does not store passwords
  • 11. LDAP Setup Serves as base for user information Used BDB database for backend Challenge to find different configuration files on Debian and Ubuntu Tell name services to use LDAP Configure PAM (Pluggable Authentication Modules) to authenticate against LDAP Removed all local accounts from machines
  • 12. SSL Setup Generate certificates Problems with pointing to correct certificates Needed to fix configuration files Problems with nomenclature References to ldaps or StartTLS protocols Changed configuration from ldaps to ldap and enabled StartTLS
  • 13. Kerberos Setup Create and initialize realm Create principles for all hosts, users, and services Change PAM from using LDAP to Kerberos LDAP still needed for other reasons Install Kerberos keys into the key stores of all clients All machines must have the correct date and time Validate session for ticket Example principles: host/stan@VAST.UCCS.EDU imap/stan@VAST.UCCS.EDU [email_address] root/admin@VAST.UCCS.EDU
  • 14. Kerberos (contd)‏ User authentication handled by Kerberos, but user information (user id, groups, shell, home directory, etc) still handled by LDAP. Users must recreate their password, so migrating from LDAP on a large network may not be feasible.
  • 15. SSH Setup Modify the SSH Server configuration to accept GSSAPI (Kerberos) credentials GSSAPIAuthentication yes GSSAPICleanupCredentials yes GssapiKeyExchange yes AllowTcpForwarding yes Modify the SSH Client configuration to send GSSAPI credentials when connecting GSSAPIAuthentication yes GSSAPIDelegateCredentials yes Users only need to log in once to SSH anywhere, or use any other Kerberos services.
  • 16. FTP Setup Setup FTP on Stan Needed package “krb5-ftpd” “ Kerberized” version of FTP Problem in not realizing that server daemon, inetd, wasn't installed Manages services by mapping them to a specific ports and launches correct services Used “krb-ftp” command on Kenny to test FTP Came with the”krb-client” package
  • 17. NFS Setup NFSv4 Setup Server Added principles to Kerberos Modified exports file Ensure RPC services were starting correctly (idmap)‏ Setup Client RPC services (idmap)‏ Import Kerberos Keys Recreated key files on all machines Verified permissions and mount points Setup to automatically mount home directories
  • 18. IMAP Server Set up dovecot (popular IMAP server) with secure SSL extensions on Stan. Kerberos used for authentication, regular password authentication disabled LDAP used for user information (e.g. path to their mail directories)‏ Set up a quick-n-dirty postfix install to allow delivery of mail (no Kerberos though)‏
  • 19. IMAP Client Used thunderbird on Kenny as IMAP client Must tell thunderbird to use Kerberos Option is “Use secure authentication” (different than SSL/TSL)‏ Client can receive email after logging in to the desktop without being asked for a password. Bonus: Thunderbird doesn’t have to store your email password anywhere, so it’s more secure.
  • 20. Future Directions Add firewall security Add more services such as Apache Add multiple platforms Add security to SMTP
  • 21. References Debian (www.debian.org)‏ Ubuntu (ubuntuforums.org)‏ en.gentoo-wiki.com Chris