Questions tagged [kerberos]

Kerberos is a computer network authentication protocol which allows nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades. Its designers aimed it primarily at a client–server model and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication.

16 questions
8
votes
1 answer

What does AES256-CTS-HMAC-SHA1-96 mean in relation to Kerberos?

I'm not completely clueless as to what it means, but I'd like to understand it at a higher level. The highest encryption type used by Active Directory domain controllers for Kerberos authentication traffic is AES256-CTS-HMAC-SHA1-96. The first part:…
Ryan Ries
  • 183
  • 1
  • 1
  • 5
3
votes
0 answers

Why Kerberos isn't using Diffie-Hellman key exchange?

Kerberos transforms the user password to obtain a secret key, which is also stored in the kerberos database. That way what travels through the network is the derived key, not the password itself, which defends against network eavesdropping attacks.…
Bozho
  • 171
  • 4
3
votes
2 answers

What is sent on the initial communication with Kerberos?

When a user wants to communicate with another user (let's say Alice and Bob), what is sent over the network during the initial communication? Alice uses her Kerberos client and enters her password and username. Something which is not clear to…
Lucas Kauffman
  • 504
  • 3
  • 15
3
votes
1 answer

Hashed Password Kerberos PKDF2 AES - ActiveDirectory

I know that in Active Directory environments passwords are stored in the form of hashes depending on encryption types used in the environment. I understand also that when using AES as a symmetric encryption type, the user password goes through PKDF2…
2
votes
1 answer

Protocol that generates keys every 2 minutes using KDC

I am using a Key Distributed Center (KDC) and a key distribution protocol such as Kerberos. In order to limit the amount of ciphertext produced with the same key, I want to renew the session keys every 2 minutes. However, for performance reasons I…
1
vote
0 answers

Kerberos Use of SHA-1

A lot of good information on Kerbero's encryption methods discussed here, but I there is a second question that arises. Does use of SHA-1 in the overall algorithm weaken Kerberos? If so, will security scanners potentially block certain Kerberos…
1
vote
0 answers

Why isn't Kerberos using temporary keys to avoid dictionary attacks?

In the Kerberos protocol, the user sends his ID, the server (Or ticket granting server) ID and a nonce value. The Key Distribution Center uses a key (I assume symmetrical) derived from the client's password to send a message containing the session…
asaf92
  • 121
  • 3
1
vote
0 answers

Break an encryption made with XOR of a key and a known Nonce

My questions is general, but in my case regards the Kerberos protocol and the communication between the client first message and the KDC. Is there some problem in encrypting using a: (secret key XOR public nonce), instead of the reply that only use…
Oron Werner
  • 111
  • 2
1
vote
0 answers

Known plain-text attack on Kerberos

This is a form of the Kerberos protocol I have two questions. Why does this protocol give the opportunity of a known plain-text attack because of no authentication of Joe? And how would an attacker perform a known plain-text attack?
nmq
  • 11
  • 1
1
vote
0 answers

What is the DK function when generating an AES key for Kerberos 5?

I'm trying to understand RFC3962. So far I understood everything, except for the last part: generating the derived key from the PBKDF2 output. To generate an encryption key from a pass phrase and salt string, we use the PBKDF2 function from PKCS #5…
1
vote
0 answers

Hiding the identity of a party within the Kerberos authentication scheme

In the Kerberos authentication protocol, as described here: would it be safer to replace step (1) with: $$ A \rightarrow T : A, E_{K_A{_{T}}}(B, N_A) $$ so that a passive adversary does not know the identity of party B with which A wishes to…
Sebi
  • 281
  • 4
  • 12
1
vote
0 answers

In Kerberos, is the "Authentication Server" the only "Trusted Third Party"? Or is "Ticket Granting Server" also a "Trusted Third Party"?

I know that AS (Authentication Server) is a TTP (Trusted Third Party) because it generates keys for two entities (for the client and the TGS). But what about TGS (Ticket Granting Server)? It also generates keys for two entities (generates for client…
allexj
  • 163
  • 3
0
votes
1 answer

Why are des-cbc-hmac and rc4-hmac-exp considered weak in kerberos?

Kerberos uses des-cbc-hmac (mac and encrypt) and rc4-hmac-exp based on md5 (mac and encrypt I think) in their encryptions. Those encryptions are considered as weak and should not be used. Why are they considered as weak? What attacks can be launched…
adi
  • 175
  • 1
  • 1
  • 8
0
votes
1 answer

What authenticated encryption do kerberos use in windows?

I have learned about the kerberos protocol and seen that the windows version uses a couple of authenticated encryption schemas (like rc4-hmac-md5). What type of authenticated encryption is it? Is it…
adi
  • 175
  • 1
  • 1
  • 8
0
votes
1 answer

Use exported certificate with private key to logon using Kerberos

First I just would like to mention, that my knowledge in windows authentification methods are very limited. So my question: Is it possible to use custom credential provider in windows to log on, that accepts certificate, which I export from…
1
2