什麼是Kerberos
流程:
Key Distribution Center (KDC)
Principle Identifiers
protocol
\(\text{TGT}\) 用來給 \(S_A\),且 \(KDC\) 不儲存任何狀態資訊
用session key而不是master key減少對password的使用
password的攻擊更困難
Multiple KDC
Key Version Numbers
保障Encryption及Integrity:
Network Layer Addresses in the Tickets
Kerberos v4的限制:
Kerberos 4 | Kerberos 5 | |
---|---|---|
TGT-Reply | \(k_A\{\text{"KDC"},\) \(S_A\) \(,\) \(\text{TGT}\)\(\}\) | \(k_A\{S_A\},\) \(\text{TGT}\) |
Ticket-Reply | \(S_A\{\text{"R"},k_{AR},\text{ticket}_R\}\) | \(S_A\{\text{"R"},k_{AR}\},\) \(\text{ticket}_R\) |
不會雙重加密 \(\text{TGT},\text{ticket}_R\)
網路架構
可以用additional headers的方式被加到IPv4, IPv6的能力
包含authentication, confidentiality(保密) 和 key management
IPsec在transport layer以上是對應用程式透明
應用:
| IP Header | Payload |
| IP Header | IPsec Header | Protected Payload |
IPsec支援兩種mode
transport mode:
Tunnel Mode:
AH(Authentication Header protocol)
AH 的位置
ESP Protocol(Encapsulated Security Payload)
NULL Encryption
ESP in two modes
ESP v.s. AH
AH | ESP |
payload confidentiality | |
outer IP header 的integrity | |
Inner IP header 的integrity | |
Payload integrity | |
Replay protection (用sequence number) | |
Data source authentication |
Aggressive mode | Main mode |
支援 authentication 和 session key establishment | |
3 messages | 6 messages |
額外保護endpoint identifiers | |
強制執行 | |
跟DoS protection有問題 |
Dos (Denial of Service) protection with cookies
Typical Anti-DoS Cookie
Signatures, Aggressive Mode
IKEv2和IKEv1比較
IKEv1 | IKEv2 |
---|---|
較少RFCs | |
較少phase 1 exchanges的選擇 | |
在IKE exchange (phase1)時IPsec的一對SA已建立 | |
chile SA建立 | |
不強制用cookies |
TLS session
TLS connection
Handshake protocol
是由Server決定要哪種方法
\(\text{PRF}\) 是一個 pseudo random function
ChangeCipherSpec Protocol
Session Resumption(恢復)
Record Protocol
Validation (Certificate) 是由 application 所做,而非TLS/SSL