search
HomeBackend DevelopmentPHP TutorialIntroduction to Kerberos_PHP Tutorial

Introduction to Kerberos Information can use the ticket-granting ticket obtained through this verification to access multiple services, that is, SSO (Single Sign On). Since a shared key is established between each Client and Service, the protocol is quite secure.

Conditions

Let’s first look at the prerequisites of the Kerberos protocol:

Client and KDC, KDC and Service already have their own shared keys before the protocol works, and Since the messages in the protocol cannot penetrate the firewall, these conditions restrict the Kerberos protocol from being used within an organization, making its application scenarios different from X.509 PKI.



Process

The Kerberos protocol is divided into two parts:

1. Client sends its identity information to KDC, and KDC gets it from Ticket Granting Service TGT (ticket-granting ticket), and uses the key between the Client and the KDC before the protocol starts to encrypt the TGT and reply to the Client.

At this time, only the real Client can use the key between it and the KDC to decrypt the encrypted TGT, thereby obtaining the TGT.


(This process avoids the unsafe method of the client sending the password directly to the KDC in order to pass the verification)

2. The client uses the TGT obtained previously to request the KDC for tickets for other services, thus Authentication through other services.

The focus of the Kerberos protocol lies in the second part, and the introduction is as follows:

1. The Client sends the previously obtained TGT and the service information to be requested (service name, etc.) to the KDC. The Ticket Granting Service in the KDC will generate a Session Key between the Client and the Service for the Service to authenticate the Client. The KDC then packages the Session Key together with the user name, user address (IP), service name, validity period, and timestamp into a Ticket (this information is ultimately used by the Service to authenticate the Client) and sends it to the Service. However, the Kerberos protocol does not Send the Ticket directly to the Service, but forward it to the Service through the Client. So there is a second step.

2. At this time, the KDC forwards the just Ticket to the Client. Since this Ticket is for the Service and cannot be seen by the Client, the KDC uses the key between the KDC and the Service before the protocol starts to encrypt the Ticket and then sends it to the Client. At the same time, in order to share the secret (the Session Key created by KDC for them in the first step) between Client and Service, KDC uses the key between Client and it to encrypt the Session Key and return it to the Client together with the encrypted Ticket.

3. In order to complete the delivery of the Ticket, the Client forwards the Ticket just received to the Service. Since the Client does not know the key between the KDC and the Service, it cannot modify the information in the Ticket. At the same time, the Client decrypts the received Session Key, then packages its user name and user address (IP) into an Authenticator, encrypts it with the Session Key, and sends it to the Service.

4. After receiving the Ticket, Service uses the key between it and the KDC to decrypt the information in the Ticket, thereby obtaining the Session Key, user name, user address (IP), service name, and validity period. Then use the Session Key to decrypt the Authenticator to obtain the user name and user address (IP), and compare it with the user name and user address (IP) decrypted in the previous Ticket to verify the Client's identity.

5. If the Service returns a result, return it to the Client.

kinit - Obtain and cache Kerberos ticket-granting ticket

kinit is used to obtain and cache Kerberos ticket-granting tickets. This tool is similar in functionality to the kinit tool that are commonly found in other Kerberos implementations, such as SEAM and MIT Reference implementations.

The user must be registered as a principal with the Key Distribution Center (KDC) prior to running kinit.

SYNOPSIS

kinit [ commands ] []

Summary

In summary, the Kerberos protocol mainly does two things

1. Secure delivery of tickets.

2. Secure release of Session Key.

Coupled with the use of timestamps, the security of user authentication is guaranteed to a large extent. And using the Session Key, the messages passed between the Client and the Service after passing the authentication can also be guaranteed by Confidentiality (confidentiality) and Integrity (integrity). However, since an asymmetric key is not used, it cannot be non-repudiation, which also limits its application. However, relatively speaking, it is much simpler to implement than the X.509 PKI identity authentication method.

Specific process

(Note: This process uses symmetric encryption; this process occurs in a certain Kerberos realm; lowercase letters c, d, e is the message sent by the client, and the capital letters A, B, E, F, G, H are the messages sent back by each server)

First, the user uses the program on the client (the user's own machine). Login:

  1. The user enters their user ID and password into the client.
  2. The client program runs a one-way function (mostly hash) to convert the password into a key. This is the "user key" (K_client) of the client (user). The trusted AS also obtains the same key as this key through some secure means.

Subsequently, client authenticates (client gets ticket for ticket (TGT) from AS):

  1. Client sends 1 message to AS (Note : The user does not send the key (K_client) to the AS, nor the password):
  • A clear text message containing the user ID, such as "User Sunny wants to request a service" (Sunny is the user ID)
  • AS checks the validity of the user ID, and then returns 2 messages:
    • Message A: "Client-TGS session key" encrypted by user key (K_client) (K_TGS-session) (The session key is used for future communication (session) between the client and TGS)
    • Message B: "Ticket Authorization Ticket" (TGT) encrypted by TGS key (K_TGS) ( TGT includes: client-TGS session key (K_TGS-session), user ID, user URL, TGT validity period)
  • The client decrypts A with its own key (K_client) to get the client -TGS session key (K_TGS-session). (Note: The client cannot decrypt message B because B is encrypted with the TGS key (K_TGS)).
  • Then, the service authorizes (the client gets the ticket (T) from the TGS):

    1. The client sends the following 2 messages to the TGS:
    • Message c: Message B (K_TGS encrypted TGT), and the service ID of the service you want to obtain (note: not the user ID)
    • Message d: Client-TGS session secret The "authentication character" encrypted by the key (K_TGS-session) (the authentication character includes: user ID, timestamp)
  • TGS uses its own key (K_TGS) to decrypt B in c to obtain TGT, Thus, the client-TGS session key (K_TGS-session) provided by AS is obtained. Then use this session key to decrypt d to get the user ID (authentication), and then return 2 messages:
    • Message E: "Client-Server Ticket" encrypted by the server key (K_SS) ( T) (T includes: client-SS session key (K_SS-session), user ID, user URL, T validity period)
    • Message F: Client-TGS session key (K_TGS-session) encryption After the "client-SS session key" (K_SS_session)
  • the client decrypts F with the client-TGS session key (K_TGS-session) to obtain the client-SS session key ( K_SS_session). (Note: The client cannot decrypt message E because E is encrypted with the SS key (K_SS)).
  • Finally, service request (client gets service from SS):

    1. Client sends 2 messages to SS:
    • Message e: Message E
    • Message g: "New authenticator" encrypted by client-server session key (K_SS_session) (new authenticator includes: user ID, timestamp)
  • SS decrypts e/E with its own key (K_SS) to obtain T, thereby obtaining the client-server session key (K_SS_session) provided by TGS. Then use this session key to decrypt g to get the user ID (authentication), and then return a message (confirmation letter: confirming that the identity is true and willing to provide services):
    • Message H: client-server session The "new timestamp" encrypted by the key (K_SS_session) (the new timestamp is: the timestamp sent by the client plus 1)
  • The client uses the client-server session key (K_SS_session) Decrypt H and get the new timestamp.
  • The client checks that the timestamp is updated correctly, then the client can trust the server and send a service request to the server (SS).
  • Server (SS) provides services.
  • Defects

    • Fails at a single point: it requires continuous response from the central server. When the Kerberos service ends, no one can connect to the server. This shortcoming can be compensated by using a composite Kerberos server and a defective authentication mechanism.
    • Kerberos requires that the clocks of the hosts participating in the communication are synchronized. Tickets have a validity period, so if the host's clock is out of sync with the Kerberos server's clock, authentication will fail. The default setting requires that the clock times differ by no more than 10 minutes. In practice, a Network Time Protocol daemon is often used to keep host clocks synchronized.
    • Management protocols are not standardized and there are some differences in server implementation tools. RFC 3244 describes password changes.
    • Because the keys used by all users are stored in the central server, compromising the security of the server will compromise the keys of all users.
    • A dangerous client will compromise user passwords.

    Reference:
    http://idior.cnblogs.com/archive/2006/03/20/354027.html
    http://bey2nd.blog.163.com/ blog/static/12063183120141275250466/
    http://docs.oracle.com/javase/1.5.0/docs/tooldocs/windows/kinit.html

    www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/1097745.htmlTechArticleKerberos Introduction Kerberos protocol: The Kerberos protocol is mainly used for identity authentication (Authentication) of computer networks. Its characteristic is that users only You need to enter the identity verification information once to use this verification...
    Statement
    The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
    如何在 iPhone 和 Android 上关闭蓝色警报如何在 iPhone 和 Android 上关闭蓝色警报Feb 29, 2024 pm 10:10 PM

    根据美国司法部的解释,蓝色警报旨在提供关于可能对执法人员构成直接和紧急威胁的个人的重要信息。这种警报的目的是及时通知公众,并让他们了解与这些罪犯相关的潜在危险。通过这种主动的方式,蓝色警报有助于增强社区的安全意识,促使人们采取必要的预防措施以保护自己和周围的人。这种警报系统的建立旨在提高对潜在威胁的警觉性,并加强执法机构与公众之间的沟通,以共尽管这些紧急通知对我们社会至关重要,但有时可能会对日常生活造成干扰,尤其是在午夜或重要活动时收到通知时。为了确保安全,我们建议您保持这些通知功能开启,但如果

    在Android中实现轮询的方法是什么?在Android中实现轮询的方法是什么?Sep 21, 2023 pm 08:33 PM

    Android中的轮询是一项关键技术,它允许应用程序定期从服务器或数据源检索和更新信息。通过实施轮询,开发人员可以确保实时数据同步并向用户提供最新的内容。它涉及定期向服务器或数据源发送请求并获取最新信息。Android提供了定时器、线程、后台服务等多种机制来高效地完成轮询。这使开发人员能够设计与远程数据源保持同步的响应式动态应用程序。本文探讨了如何在Android中实现轮询。它涵盖了实现此功能所涉及的关键注意事项和步骤。轮询定期检查更新并从服务器或源检索数据的过程在Android中称为轮询。通过

    如何在Android中实现按下返回键再次退出的功能?如何在Android中实现按下返回键再次退出的功能?Aug 30, 2023 am 08:05 AM

    为了提升用户体验并防止数据或进度丢失,Android应用程序开发者必须避免意外退出。他们可以通过加入“再次按返回退出”功能来实现这一点,该功能要求用户在特定时间内连续按两次返回按钮才能退出应用程序。这种实现显著提升了用户参与度和满意度,确保他们不会意外丢失任何重要信息Thisguideexaminesthepracticalstepstoadd"PressBackAgaintoExit"capabilityinAndroid.Itpresentsasystematicguid

    Android逆向中smali复杂类实例分析Android逆向中smali复杂类实例分析May 12, 2023 pm 04:22 PM

    1.java复杂类如果有什么地方不懂,请看:JAVA总纲或者构造方法这里贴代码,很简单没有难度。2.smali代码我们要把java代码转为smali代码,可以参考java转smali我们还是分模块来看。2.1第一个模块——信息模块这个模块就是基本信息,说明了类名等,知道就好对分析帮助不大。2.2第二个模块——构造方法我们来一句一句解析,如果有之前解析重复的地方就不再重复了。但是会提供链接。.methodpublicconstructor(Ljava/lang/String;I)V这一句话分为.m

    如何在2023年将 WhatsApp 从安卓迁移到 iPhone 15?如何在2023年将 WhatsApp 从安卓迁移到 iPhone 15?Sep 22, 2023 pm 02:37 PM

    如何将WhatsApp聊天从Android转移到iPhone?你已经拿到了新的iPhone15,并且你正在从Android跳跃?如果是这种情况,您可能还对将WhatsApp从Android转移到iPhone感到好奇。但是,老实说,这有点棘手,因为Android和iPhone的操作系统不兼容。但不要失去希望。这不是什么不可能完成的任务。让我们在本文中讨论几种将WhatsApp从Android转移到iPhone15的方法。因此,坚持到最后以彻底学习解决方案。如何在不删除数据的情况下将WhatsApp

    同样基于linux为什么安卓效率低同样基于linux为什么安卓效率低Mar 15, 2023 pm 07:16 PM

    原因:1、安卓系统上设置了一个JAVA虚拟机来支持Java应用程序的运行,而这种虚拟机对硬件的消耗是非常大的;2、手机生产厂商对安卓系统的定制与开发,增加了安卓系统的负担,拖慢其运行速度影响其流畅性;3、应用软件太臃肿,同质化严重,在一定程度上拖慢安卓手机的运行速度。

    Android中动态导出dex文件的方法是什么Android中动态导出dex文件的方法是什么May 30, 2023 pm 04:52 PM

    1.启动ida端口监听1.1启动Android_server服务1.2端口转发1.3软件进入调试模式2.ida下断2.1attach附加进程2.2断三项2.3选择进程2.4打开Modules搜索artPS:小知识Android4.4版本之前系统函数在libdvm.soAndroid5.0之后系统函数在libart.so2.5打开Openmemory()函数在libart.so中搜索Openmemory函数并且跟进去。PS:小知识一般来说,系统dex都会在这个函数中进行加载,但是会出现一个问题,后

    Android APP测试流程和常见问题是什么Android APP测试流程和常见问题是什么May 13, 2023 pm 09:58 PM

    1.自动化测试自动化测试主要包括几个部分,UI功能的自动化测试、接口的自动化测试、其他专项的自动化测试。1.1UI功能自动化测试UI功能的自动化测试,也就是大家常说的自动化测试,主要是基于UI界面进行的自动化测试,通过脚本实现UI功能的点击,替代人工进行自动化测试。这个测试的优势在于对高度重复的界面特性功能测试的测试人力进行有效的释放,利用脚本的执行,实现功能的快速高效回归。但这种测试的不足之处也是显而易见的,主要包括维护成本高,易发生误判,兼容性不足等。因为是基于界面操作,界面的稳定程度便成了

    See all articles

    Hot AI Tools

    Undresser.AI Undress

    Undresser.AI Undress

    AI-powered app for creating realistic nude photos

    AI Clothes Remover

    AI Clothes Remover

    Online AI tool for removing clothes from photos.

    Undress AI Tool

    Undress AI Tool

    Undress images for free

    Clothoff.io

    Clothoff.io

    AI clothes remover

    AI Hentai Generator

    AI Hentai Generator

    Generate AI Hentai for free.

    Hot Article

    Repo: How To Revive Teammates
    1 months agoBy尊渡假赌尊渡假赌尊渡假赌
    R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
    2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
    Hello Kitty Island Adventure: How To Get Giant Seeds
    1 months agoBy尊渡假赌尊渡假赌尊渡假赌

    Hot Tools

    Dreamweaver Mac version

    Dreamweaver Mac version

    Visual web development tools

    VSCode Windows 64-bit Download

    VSCode Windows 64-bit Download

    A free and powerful IDE editor launched by Microsoft

    MinGW - Minimalist GNU for Windows

    MinGW - Minimalist GNU for Windows

    This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

    PhpStorm Mac version

    PhpStorm Mac version

    The latest (2018.2.1) professional PHP integrated development tool

    SAP NetWeaver Server Adapter for Eclipse

    SAP NetWeaver Server Adapter for Eclipse

    Integrate Eclipse with SAP NetWeaver application server.