Table of Contents
Conditions
Home Backend Development PHP Tutorial Introduction to Kerberos_PHP Tutorial

Introduction to Kerberos_PHP Tutorial

Jul 12, 2016 am 08:59 AM
android

Introduction to Kerberos Information can use the ticket-granting ticket obtained through this verification to access multiple services, that is, SSO (Single Sign On). Since a shared key is established between each Client and Service, the protocol is quite secure.

Conditions

Let’s first look at the prerequisites of the Kerberos protocol:

Client and KDC, KDC and Service already have their own shared keys before the protocol works, and Since the messages in the protocol cannot penetrate the firewall, these conditions restrict the Kerberos protocol from being used within an organization, making its application scenarios different from X.509 PKI.



Process

The Kerberos protocol is divided into two parts:

1. Client sends its identity information to KDC, and KDC gets it from Ticket Granting Service TGT (ticket-granting ticket), and uses the key between the Client and the KDC before the protocol starts to encrypt the TGT and reply to the Client.

At this time, only the real Client can use the key between it and the KDC to decrypt the encrypted TGT, thereby obtaining the TGT.


(This process avoids the unsafe method of the client sending the password directly to the KDC in order to pass the verification)

2. The client uses the TGT obtained previously to request the KDC for tickets for other services, thus Authentication through other services.

The focus of the Kerberos protocol lies in the second part, and the introduction is as follows:

1. The Client sends the previously obtained TGT and the service information to be requested (service name, etc.) to the KDC. The Ticket Granting Service in the KDC will generate a Session Key between the Client and the Service for the Service to authenticate the Client. The KDC then packages the Session Key together with the user name, user address (IP), service name, validity period, and timestamp into a Ticket (this information is ultimately used by the Service to authenticate the Client) and sends it to the Service. However, the Kerberos protocol does not Send the Ticket directly to the Service, but forward it to the Service through the Client. So there is a second step.

2. At this time, the KDC forwards the just Ticket to the Client. Since this Ticket is for the Service and cannot be seen by the Client, the KDC uses the key between the KDC and the Service before the protocol starts to encrypt the Ticket and then sends it to the Client. At the same time, in order to share the secret (the Session Key created by KDC for them in the first step) between Client and Service, KDC uses the key between Client and it to encrypt the Session Key and return it to the Client together with the encrypted Ticket.

3. In order to complete the delivery of the Ticket, the Client forwards the Ticket just received to the Service. Since the Client does not know the key between the KDC and the Service, it cannot modify the information in the Ticket. At the same time, the Client decrypts the received Session Key, then packages its user name and user address (IP) into an Authenticator, encrypts it with the Session Key, and sends it to the Service.

4. After receiving the Ticket, Service uses the key between it and the KDC to decrypt the information in the Ticket, thereby obtaining the Session Key, user name, user address (IP), service name, and validity period. Then use the Session Key to decrypt the Authenticator to obtain the user name and user address (IP), and compare it with the user name and user address (IP) decrypted in the previous Ticket to verify the Client's identity.

5. If the Service returns a result, return it to the Client.

kinit - Obtain and cache Kerberos ticket-granting ticket

kinit is used to obtain and cache Kerberos ticket-granting tickets. This tool is similar in functionality to the kinit tool that are commonly found in other Kerberos implementations, such as SEAM and MIT Reference implementations.

The user must be registered as a principal with the Key Distribution Center (KDC) prior to running kinit.

SYNOPSIS

kinit [ commands ] []

Summary

In summary, the Kerberos protocol mainly does two things

1. Secure delivery of tickets.

2. Secure release of Session Key.

Coupled with the use of timestamps, the security of user authentication is guaranteed to a large extent. And using the Session Key, the messages passed between the Client and the Service after passing the authentication can also be guaranteed by Confidentiality (confidentiality) and Integrity (integrity). However, since an asymmetric key is not used, it cannot be non-repudiation, which also limits its application. However, relatively speaking, it is much simpler to implement than the X.509 PKI identity authentication method.

Specific process

(Note: This process uses symmetric encryption; this process occurs in a certain Kerberos realm; lowercase letters c, d, e is the message sent by the client, and the capital letters A, B, E, F, G, H are the messages sent back by each server)

First, the user uses the program on the client (the user's own machine). Login:

  1. The user enters their user ID and password into the client.
  2. The client program runs a one-way function (mostly hash) to convert the password into a key. This is the "user key" (K_client) of the client (user). The trusted AS also obtains the same key as this key through some secure means.

Subsequently, client authenticates (client gets ticket for ticket (TGT) from AS):

  1. Client sends 1 message to AS (Note : The user does not send the key (K_client) to the AS, nor the password):
  • A clear text message containing the user ID, such as "User Sunny wants to request a service" (Sunny is the user ID)
  • AS checks the validity of the user ID, and then returns 2 messages:
    • Message A: "Client-TGS session key" encrypted by user key (K_client) (K_TGS-session) (The session key is used for future communication (session) between the client and TGS)
    • Message B: "Ticket Authorization Ticket" (TGT) encrypted by TGS key (K_TGS) ( TGT includes: client-TGS session key (K_TGS-session), user ID, user URL, TGT validity period)
  • The client decrypts A with its own key (K_client) to get the client -TGS session key (K_TGS-session). (Note: The client cannot decrypt message B because B is encrypted with the TGS key (K_TGS)).
  • Then, the service authorizes (the client gets the ticket (T) from the TGS):

    1. The client sends the following 2 messages to the TGS:
    • Message c: Message B (K_TGS encrypted TGT), and the service ID of the service you want to obtain (note: not the user ID)
    • Message d: Client-TGS session secret The "authentication character" encrypted by the key (K_TGS-session) (the authentication character includes: user ID, timestamp)
  • TGS uses its own key (K_TGS) to decrypt B in c to obtain TGT, Thus, the client-TGS session key (K_TGS-session) provided by AS is obtained. Then use this session key to decrypt d to get the user ID (authentication), and then return 2 messages:
    • Message E: "Client-Server Ticket" encrypted by the server key (K_SS) ( T) (T includes: client-SS session key (K_SS-session), user ID, user URL, T validity period)
    • Message F: Client-TGS session key (K_TGS-session) encryption After the "client-SS session key" (K_SS_session)
  • the client decrypts F with the client-TGS session key (K_TGS-session) to obtain the client-SS session key ( K_SS_session). (Note: The client cannot decrypt message E because E is encrypted with the SS key (K_SS)).
  • Finally, service request (client gets service from SS):

    1. Client sends 2 messages to SS:
    • Message e: Message E
    • Message g: "New authenticator" encrypted by client-server session key (K_SS_session) (new authenticator includes: user ID, timestamp)
  • SS decrypts e/E with its own key (K_SS) to obtain T, thereby obtaining the client-server session key (K_SS_session) provided by TGS. Then use this session key to decrypt g to get the user ID (authentication), and then return a message (confirmation letter: confirming that the identity is true and willing to provide services):
    • Message H: client-server session The "new timestamp" encrypted by the key (K_SS_session) (the new timestamp is: the timestamp sent by the client plus 1)
  • The client uses the client-server session key (K_SS_session) Decrypt H and get the new timestamp.
  • The client checks that the timestamp is updated correctly, then the client can trust the server and send a service request to the server (SS).
  • Server (SS) provides services.
  • Defects

    • Fails at a single point: it requires continuous response from the central server. When the Kerberos service ends, no one can connect to the server. This shortcoming can be compensated by using a composite Kerberos server and a defective authentication mechanism.
    • Kerberos requires that the clocks of the hosts participating in the communication are synchronized. Tickets have a validity period, so if the host's clock is out of sync with the Kerberos server's clock, authentication will fail. The default setting requires that the clock times differ by no more than 10 minutes. In practice, a Network Time Protocol daemon is often used to keep host clocks synchronized.
    • Management protocols are not standardized and there are some differences in server implementation tools. RFC 3244 describes password changes.
    • Because the keys used by all users are stored in the central server, compromising the security of the server will compromise the keys of all users.
    • A dangerous client will compromise user passwords.

    Reference:
    http://idior.cnblogs.com/archive/2006/03/20/354027.html
    http://bey2nd.blog.163.com/ blog/static/12063183120141275250466/
    http://docs.oracle.com/javase/1.5.0/docs/tooldocs/windows/kinit.html

    www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/1097745.htmlTechArticleKerberos Introduction Kerberos protocol: The Kerberos protocol is mainly used for identity authentication (Authentication) of computer networks. Its characteristic is that users only You need to enter the identity verification information once to use this verification...
    Statement of this Website
    The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

    Hot AI Tools

    Undresser.AI Undress

    Undresser.AI Undress

    AI-powered app for creating realistic nude photos

    AI Clothes Remover

    AI Clothes Remover

    Online AI tool for removing clothes from photos.

    Undress AI Tool

    Undress AI Tool

    Undress images for free

    Clothoff.io

    Clothoff.io

    AI clothes remover

    AI Hentai Generator

    AI Hentai Generator

    Generate AI Hentai for free.

    Hot Article

    R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
    2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
    Hello Kitty Island Adventure: How To Get Giant Seeds
    1 months ago By 尊渡假赌尊渡假赌尊渡假赌
    Two Point Museum: All Exhibits And Where To Find Them
    1 months ago By 尊渡假赌尊渡假赌尊渡假赌

    Hot Tools

    Notepad++7.3.1

    Notepad++7.3.1

    Easy-to-use and free code editor

    SublimeText3 Chinese version

    SublimeText3 Chinese version

    Chinese version, very easy to use

    Zend Studio 13.0.1

    Zend Studio 13.0.1

    Powerful PHP integrated development environment

    Dreamweaver CS6

    Dreamweaver CS6

    Visual web development tools

    SublimeText3 Mac version

    SublimeText3 Mac version

    God-level code editing software (SublimeText3)

    New report delivers damning assessment of rumoured Samsung Galaxy S25, Galaxy S25 Plus and Galaxy S25 Ultra camera upgrades New report delivers damning assessment of rumoured Samsung Galaxy S25, Galaxy S25 Plus and Galaxy S25 Ultra camera upgrades Sep 12, 2024 pm 12:23 PM

    In recent days, Ice Universe has been steadily revealing details about the Galaxy S25 Ultra, which is widely believed to be Samsung's next flagship smartphone. Among other things, the leaker claimed that Samsung only plans to bring one camera upgrade

    Samsung Galaxy S25 Ultra leaks in first render images with rumoured design changes revealed Samsung Galaxy S25 Ultra leaks in first render images with rumoured design changes revealed Sep 11, 2024 am 06:37 AM

    OnLeaks has now partnered with Android Headlines to provide a first look at the Galaxy S25 Ultra, a few days after a failed attempt to generate upwards of $4,000 from his X (formerly Twitter) followers. For context, the render images embedded below h

    IFA 2024 | TCL\'s NXTPAPER 14 won\'t match the Galaxy Tab S10 Ultra in performance, but it nearly matches it in size IFA 2024 | TCL\'s NXTPAPER 14 won\'t match the Galaxy Tab S10 Ultra in performance, but it nearly matches it in size Sep 07, 2024 am 06:35 AM

    Alongside announcing two new smartphones, TCL has also announced a new Android tablet called the NXTPAPER 14, and its massive screen size is one of its selling points. The NXTPAPER 14 features version 3.0 of TCL's signature brand of matte LCD panels

    Vivo Y300 Pro packs 6,500 mAh battery in a slim 7.69 mm body Vivo Y300 Pro packs 6,500 mAh battery in a slim 7.69 mm body Sep 07, 2024 am 06:39 AM

    The Vivo Y300 Pro just got fully revealed, and it's one of the slimmest mid-range Android phones with a large battery. To be exact, the smartphone is only 7.69 mm thick but features a 6,500 mAh battery. This is the same capacity as the recently launc

    New report delivers damning assessment of rumoured Samsung Galaxy S25, Galaxy S25 Plus and Galaxy S25 Ultra camera upgrades New report delivers damning assessment of rumoured Samsung Galaxy S25, Galaxy S25 Plus and Galaxy S25 Ultra camera upgrades Sep 12, 2024 pm 12:22 PM

    In recent days, Ice Universe has been steadily revealing details about the Galaxy S25 Ultra, which is widely believed to be Samsung's next flagship smartphone. Among other things, the leaker claimed that Samsung only plans to bring one camera upgrade

    Samsung Galaxy S24 FE billed to launch for less than expected in four colours and two memory options Samsung Galaxy S24 FE billed to launch for less than expected in four colours and two memory options Sep 12, 2024 pm 09:21 PM

    Samsung has not offered any hints yet about when it will update its Fan Edition (FE) smartphone series. As it stands, the Galaxy S23 FE remains the company's most recent edition, having been presented at the start of October 2023. However, plenty of

    Motorola Razr 50s shows itself as possible new budget foldable in early leak Motorola Razr 50s shows itself as possible new budget foldable in early leak Sep 07, 2024 am 09:35 AM

    Motorola has released countless devices this year, although only two of them are foldables. For context, while most of the world has received the pair as the Razr 50 and Razr 50 Ultra, Motorola offers them in North America as the Razr 2024 and Razr 2

    Xiaomi Redmi Note 14 Pro Plus arrives as first Qualcomm Snapdragon 7s Gen 3 smartphone with Light Hunter 800 camera Xiaomi Redmi Note 14 Pro Plus arrives as first Qualcomm Snapdragon 7s Gen 3 smartphone with Light Hunter 800 camera Sep 27, 2024 am 06:23 AM

    The Redmi Note 14 Pro Plus is now official as a direct successor to last year'sRedmi Note 13 Pro Plus(curr. $375 on Amazon). As expected, the Redmi Note 14 Pro Plus heads up the Redmi Note 14 series alongside theRedmi Note 14and Redmi Note 14 Pro. Li

    See all articles