Executive Summary
This white paper provides a
v2 operating systems:
Pluggable Authentication Module Kerberos
Kerberos Client Software
HP Kerberos Server
Generic Security Service Application Programming Interface
Secure Internet Services (SIS)
The subsequent sections of this document discuss these in detail.
The paper concludes with a brief discussion of Kerberos protocol interoperability with other systems.
Problem Statement
The Internet is a vast place that connects millions of people from all corners of the globe to each other everyday. In such a network, information can be lost, stolen, corrupted, or misused. Another drawback of the internet is that it is difficult for individuals to confirm their identity to one another. Confidentiality is very important for some types of information, such as information related to banking and medical. It is therefore important that a user, who wants to access this kind of information online, be able to confirm that the user is who he/she claims to be. This process is called authentication. Kerberos plays a major role in authentication.
Traditionally, a process was set in place called Authentication by Assertion. Authentication by assertion works as follows:
When a user runs a program that accesses a network service, the program (called the client) asserts to the service that it is running on behalf of the user. This provides a very low level of security.
Consider the example of Berkeley rlogin. If a user rlogins to an account under his own name, but on another machine, and if the user's .rhosts is set correctly, the rlogin program will assert the user's identity to the rlogin daemon on the remote machine, and the daemon does not require a password for login. This can become disastrous if an attacker is somehow able either to convince the rlogin
program that he/she is the legitimate user, or to rewrite a mutant version of rlogin asserting that identity to the remote machine.
An alternative to this situation is to require a user to enter a password each time he/she accesses a network service. This is a very
Kerberos fixes these problems because it provides