




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
Chapter
15用戶認證《計算機與網(wǎng)絡(luò)安全》本章內(nèi)容?3/22/2020?2?華中農(nóng)業(yè)大學(xué)信息學(xué)院遠程用戶認證基于對稱加密的遠程用戶認證Kerberos基于非對稱加密的遠程用戶認證聯(lián)合身份管理Kerberos
is
an
authentication
service
developed
as
partof
Project
Athena
at
MIT,
and
is
one
of
the
best
known
and
most
widelyimplementedtrusted
third
party
keydistribution
systems.Kerberos
provides
a
centralized
authentication
server
whose
functionis
to
authenticate
users
to
servers
and
servers
to
users.
Unlike
most
otherauthenticationschemes,
Kerberos
relies
exclusively
on
symmetric
encryption,
makingno
use
of
public-keyencryption.
Two
versions
of
Kerberosare
in
common
use:
v4
&
v5.§15.1遠程用戶認證原理?3/22/2020?3?華中農(nóng)業(yè)大學(xué)信息學(xué)院鑒定階段核實階段認證方式?知道什么?擁有什么?靜態(tài)生物特征?動態(tài)生物特征基于網(wǎng)絡(luò)的最重要的認證方式是?加密密鑰?用戶口令A(yù)uthentication
Protocols
are
used
to
convince
parties
of
each
others
identity
and
to
exchange
session
keys.
Theymay
be
one-way
or
mutual.Central
to
the
problemof
authenticated
key
exchange
are
two
issues:
confidentiality
and
timeliness.
To
prevent
masquerade
and
to
preventcompromise
of
session
keys,
essential
identification
and
session
key
information
must
be
communicated
in
encrypted
form.
This
requires
the
priorexistence
of
secret
orpublic
keys
that
can
be
used
for
this
purpose.
The
second
issue,
timeliness,
is
important
because
of
the
threat
of
messagereplays.Stallings
discussesa
number
of
protocols
that
appeared
secure
but
were
revised
after
additional
analysis.
These
examples
highlight
the
difficulty
ofgettingthings
right
in
the
area
of
authentication.§15.1.1認證協(xié)議?3/22/2020?4?華中農(nóng)業(yè)大學(xué)信息學(xué)院用于確認通信的參與者,并交換會話密鑰。認證可以是單向的也可以是相互的。主密鑰應(yīng)該是?保密的–保護會話密鑰?有時間性–防止重放攻擊發(fā)布的協(xié)議往往發(fā)現(xiàn)有缺陷需要修訂Replay
Attacks
are
where
avalid
signed
message
is
copied
and
later
resent.
Such
replays,
at
worst,
could
allow
an
opponent
to
compromise
asession
key
or
successfullyimpersonate
another
party.
At
minimum,
a
successful
replay
can
disrupt
operations
bypresenting
parties
withmessages
that
appear
genuine
but
are
not.[GONG93]
lists
the
examples
above
of
replay
attacks.Possible
countermeasures
include
the
use
of:?
sequence
numbers
(generally
impractical
since
must
remember
last
number
used
with
every
communicating
party)?
timestamps
(needs
synchronized
clocks
amongst
all
parties
involved,
which
can
be
problematic)?
challenge/response
(using
unique,
random,
unpredictable
nonce,
but
not
suitable
for
connectionless
applications
because
of
handshakeoverhead)§15.1.1相互認證?3/22/2020?5?華中農(nóng)業(yè)大學(xué)信息學(xué)院重放攻擊當(dāng)有效的簽名消息被拷貝,之后又重新被發(fā)送?簡單重放?可檢測的重放?不可檢測的重放?不加修改的逆向重放(對稱密碼)解決辦法包括:?序列號(通常不可行)?時間戳(需要同步時鐘)?隨機數(shù)/響應(yīng)(目前的常用方法)Replay
Attacks
are
where
avalid
signed
message
is
copied
and
later
resent.
Such
replays,
at
worst,
could
allow
an
opponent
to
compromise
asession
key
or
successfullyimpersonate
another
party.
At
minimum,
a
successful
replay
can
disrupt
operations
bypresenting
parties
withmessages
that
appear
genuine
but
are
not.[GONG93]
lists
the
examples
above
of
replay
attacks.Possible
countermeasures
include
the
use
of:?
sequence
numbers
(generally
impractical
since
must
remember
last
number
used
with
every
communicating
party)?
timestamps
(needs
synchronized
clocks
amongst
all
parties
involved,
which
can
be
problematic)?
challenge/response
(using
unique,
random,
unpredictable
nonce,
but
not
suitable
for
connectionless
applications
because
of
handshakeoverhead)§15.1.2單向認證?3/22/2020?6?華中農(nóng)業(yè)大學(xué)信息學(xué)院當(dāng)收發(fā)雙方不能在同一時間在線時(eg.email)有明確的頭信息以被郵件系統(tǒng)轉(zhuǎn)發(fā)希望對內(nèi)容進行保護和認證A
two-level
hierarchy
of
symmetric
encryption
keys
can
be
used
to
provide
confidentiality
for
communication
in
a
distributed
environment.Usually
involves
the
use
of
a
trustedkey
distribution
center
(KDC).
Each
party
in
the
network
shares
a
secret
master
key
with
the
KDC.
The
KDC
is
responsible
for
generating
session
keys,
and
for
distributing
those
keys
to
the
partiesinvolved,
using
the
master
keys
toprotectthese
session
keys.15.2
基于對稱加密的遠程用戶認證?3/22/2020?7?華中農(nóng)業(yè)大學(xué)信息學(xué)院如前所述,需要兩層密鑰。可信的KDC,
Key
Distribution
Center?每個用戶與KDC共享一個主密鑰?KDC產(chǎn)生通信方之間所用的會話密鑰?主密鑰用于分發(fā)會話密鑰The
Needham-Schroeder
Protocol
is
the
original,
basic
key
exchange
protocol.
Used
by
2
parties
who
both
trusted
a
common
key
server,
itgives
one
party
the
info
needed
to
establish
a
session
key
with
the
other.
Note
that
since
the
key
server
chooses
the
session
key,
it
is
capable
ofreading/forging
any
messages
between
A&B,
which
is
why
they
need
to
trust
it
absolutely!Note
that
allcommunications
is
between
A&KDC
and
A&B,
B&KDC
don"t
talk
directly
(thoughindirectly
a
message
passes
from
KDC
via
A
to
B,
encrypted
in
B"s
key
so
that
A
is
unable
to
read
or
alter
it).
Other
variations
of
key
distribution
protocols
can
involve
direct
communicationsbetween
B&KDC.Needham-Schroeder協(xié)議?3/22/2020?8?華中農(nóng)業(yè)大學(xué)信息學(xué)院有第三方參與的密鑰分發(fā)協(xié)議KDC作為AB會話的中介協(xié)議:A
->
KDC:
IDA
||
IDB
||
N1KDC
->
A:
EKa
[Ks
||
IDB
||
N1
||
EKb
[Ks
||
IDA]
]A
->
B:
EKb
[Ks
||
IDA]B
->
A:
EKs[N2]A
->
B:
EKs[
f
(N2)
]There
is
acritical
flaw
in
the
protocol,
as
shown.
Itcan
be
corrected
by
either
using
timestamps,
or
an
additional
nonce,
with
respectiveadvantages
and
limitations.This
example
emphasises
the
need
to
be
extremelycareful
in
codifyingassumptions,
and
tracking
the
timeliness
of
the
flow
of
info
in
protocols.Designing
secure
protocols
is
not
easy,
and
should
not
be
done
lightly.
Great
care
and
analysis
is
needed.Needham-Schroeder協(xié)議?3/22/2020?9?華中農(nóng)業(yè)大學(xué)信息學(xué)院用于安全地分發(fā)AB之間通信所用的會話密鑰
存在重放攻擊的風(fēng)險,如果一個過時的會話密鑰被掌握?則消息3可以被重放以欺騙B使用舊會話密鑰,使B遭到破壞解決的辦法:?時間戳(Denning
81)?使用一個額外的臨時會話號(Neuman
93)添加時間戳:A
->
KDC:
IDA
||
IDBKDC
->
A:
EKa
[Ks
||
IDB
||
T
||
Eb
[Ks
||
IDA||T]]A
->
B:
EKb
[Ks
||
IDA
||T]B
->
A:
EKs[N1]A
->
B:
EKs[
f
(N1)
]?3/22/2020?10?華中農(nóng)業(yè)大學(xué)信息學(xué)院防止壓制重放攻擊:A
->
B:
IDA
||
NaB->KDC:
IDB||Nb||E(Kb,[IDA||Na||Tb])KDC->A:
EKa
[IDB
||Na||Ks||
Tb]
||
EKb
[IDA||
Ks
||Tb]||NbA
->
B:
EKb
[IDA
||
Ks
||
Tb]||EKs[Nb]?3/22/2020?11?華中農(nóng)業(yè)大學(xué)信息學(xué)院Using
symmetric
encryption,
withsome
refinement,
the
KDC
strategy
isa
candidate
for
encrypted
electronic
mail.
Because
we
wishto
avoidrequiring
that
the
recipient
be
on
line
at
the
same
time
as
the
sender,
steps4
and
5
must
be
eliminated,
leaving
the
protocol
as
shown.Thisapproach
guaranteesthat
only
the
intended
recipient
of
a
message
will
be
able
toreadI,
and
also
provides
a
level
of
authentication
that
the
sender
is
A.
As
specified,
theprotocol
does
notprotect
against
replays.
You
could
rely
on
timestamp
in
the
message,
though
delays
make
this
problematic.對稱加密方法-單向認證?3/22/2020?12?華中農(nóng)業(yè)大學(xué)信息學(xué)院可以變化對KDC的使用,但是不能使用臨時交互號:A->KDC:
IDA
||
IDB
||
N1KDC
->
A:
EKa[Ks
||
IDB
||
N1
||
EKb[Ks||IDA]
]A
->
B:
EKb[Ks||IDA]
||
EKs[M]不能抗重放攻擊?可以引入時間戳到信息中但email的處理中存在大量延時,使得時間戳用途有限。Kerberos
is
an
authentication
service
developed
as
partof
Project
Athena
at
MIT,
and
is
one
of
the
best
known
and
most
widelyimplementedtrusted
third
party
keydistribution
systems.Kerberos
provides
a
centralized
authentication
server
whose
functionis
to
authenticate
users
to
servers
and
servers
to
users.
Unlike
most
otherauthenticationschemes,
Kerberos
relies
exclusively
on
symmetric
encryption,
makingno
use
of
public-keyencryption.
Two
versions
of
Kerberosare
in
common
use:
v4
&
v5.§15.3
Kerberos?3/22/2020?13?華中農(nóng)業(yè)大學(xué)信息學(xué)院由MIT開發(fā)在分布式網(wǎng)絡(luò)中提供有第三方參與的基于私鑰的認證?允許用戶通過訪問分布在網(wǎng)絡(luò)中的服務(wù)?沒有必要相信所有工作站?然而都信任認證中心服務(wù)器兩個版本:4
&
5The
first
published
report
on
Kerberos
[STEI88]
listed
the
requirements
shownabove.
To
support
these
requirements,
Kerberos
is
a
trustedthird-party
authentication
service
that
uses
a
protocol
based
on
that
proposed
by
Needhamand
Schroeder
[NEED78],
whichwas
discussed
inChapter
7.Kerberos要求?3/22/2020?14?華中農(nóng)業(yè)大學(xué)信息學(xué)院第一份Kerberos的需求報告:?安全性?可靠性?透明性?可伸縮性用基于Needham-Schroeder的認證協(xié)議實現(xiàn)The
core
of
Kerberos
is
the
Authentication
and
Ticket
GrantingServers
–
these
are
trusted
by
all
users
and
servers
and
must
be
securelyadministered.
The
protocol
includes
a
sequence
of
interactions
between
the
client,
AS,
TGT
and
desired
server.Kerberos
v4概覽?3/22/2020?15?華中農(nóng)業(yè)大學(xué)信息學(xué)院基于第三方的認證方案認證服務(wù)器(AS)?用戶初始與AS對話以標(biāo)識自身?AS發(fā)放一個高度可信的認證證書(ticket
grantingticket,TGT)票據(jù)授權(quán)服務(wù)器(TGS)?用戶接著從TGS以TGT為依據(jù)得到其它訪問服務(wù)The
full
Kerberos
v4
authentication
dialogue
is
shownin
Stallings
Table
14.1,
divided
into
the
3
phases
shown
above.
The
justification
for
eachitem
in
the
messages
is
given
in
Stallings
Table
14.2.Kerberos
v4對話從AS得到授權(quán)票據(jù)(TGT)每個會話進行一次從TGT獲得服務(wù)授權(quán)票據(jù)對每個不同的服務(wù)請求一次客戶/服務(wù)器交換信息以獲得服務(wù)每次服務(wù)時?3/22/2020?16?華中農(nóng)業(yè)大學(xué)信息學(xué)院Stallings
Figure
14.1
diagrammatically
summarizes
the
Kerberos
v4
authenticationdialogue,
with
3
pairs
of
messages,
for
each
phase
listedpreviously.Kerberos
4概覽?3/22/2020?17?華中農(nóng)業(yè)大學(xué)信息學(xué)院A
full-service
Kerberos
environment
consisting
of
aKerberos
server,
a
number
of
clients,
and
anumberof
application
servers
is
referred
to
as
aKerberos
realm.
A
Kerberos
realm
is
aset
of
managed
nodes
that
share
the
same
Kerberos
database,
and
are
partof
the
same
administrativedomain.
If
have
multiple
realms,
their
Kerberos
servers
must
share
keys
and
trust
each
other.Kerberos域?3/22/2020?18?華中農(nóng)業(yè)大學(xué)信息學(xué)院一個Kerberos環(huán)境的構(gòu)成:?一個Kerberos服務(wù)器?客戶,都在AS中已經(jīng)注冊?應(yīng)用服務(wù)器,與AS共享密鑰環(huán)境術(shù)語稱為:域,realm?典型地都是一個單一的行政區(qū)域
如果有多個域,Kerberos服務(wù)器之間必須相互信任且共享密鑰Stallings
Figure
14.2
shows
the
authenticationmessages
where
service
is
beingrequested
fromanother
domain.
The
ticket
presented
to
theremote
server
indicates
the
realm
in
which
the
user
was
originally
authenticated.
The
server
chooses
whether
to
honor
the
remote
request.Oneproblempresented
by
the
foregoing
approach
is
that
it
does
not
scale
well
to
many
realms,
as
each
pair
of
realms
need
to
shareakey.Kerberos域?3/22/2020?19?華中農(nóng)業(yè)大學(xué)信息學(xué)院Kerberos
Version
5
is
specified
in
RFC
1510
and
providesanumber
ofimprovements
over
version
4
in
the
areas
of
environmental
shortcomingsand
technical
deficiencies,
in
areas
as
noted.
See
Stallings
Table
14.3
for
details
of
the
Kerberos
v5
authenticationdialogue.Kerberos版本5?3/22/2020?20?華中農(nóng)業(yè)大學(xué)信息學(xué)院制定于20世紀(jì)90年代中期作為RFC
1510對v4作了改進?環(huán)境缺陷
對加密系統(tǒng)的依賴性,網(wǎng)絡(luò)協(xié)議,字節(jié)序,票據(jù)生命期,向前認證,域間認證?技術(shù)不足兩次加密,非標(biāo)準(zhǔn)模式PCBC,會話密鑰,口令攻擊Kerberos小結(jié)條件--過程--總結(jié)條件:Client與KDC,KDC與Service在協(xié)議工作前已經(jīng)有了各自的共享密鑰,并且由于協(xié)議中的消息無法穿透防火墻,這些條件就限制了Kerberos協(xié)議往往用于一個組織的內(nèi)部,使其應(yīng)用場景不同于X.509
PKI。?3/22/2020?21?華中農(nóng)業(yè)大學(xué)信息學(xué)院Kerberos
過程?3/22/2020?22?華中農(nóng)業(yè)大學(xué)信息學(xué)院1.Client向KDC發(fā)送自己的身份信息,KDC從TicketGranting
Service得到TGT(ticket-granting
ticket),并用協(xié)議開始前Client與KDC之間的密鑰將TGT加密回復(fù)給Client。此時只有真正的Client才能利用它與KDC之間的密鑰將加密后的TGT解密,從而獲得TGT。(此過程避免了Client直接向KDC發(fā)送密碼,以求通過驗證的不安全方式)2.Client利用之前獲得的TGT向KDC請求其他Service的Ticket,從而通過其他Service的身份鑒別。Kerberos
過程Kerberos協(xié)議的重點在于第二部分,簡介如下:?3/22/2020?23?華中農(nóng)業(yè)大學(xué)信息學(xué)院Kerberos
過程?3/22/2020?24?華中農(nóng)業(yè)大學(xué)信息學(xué)院1.Client將之前獲得TGT和要請求的服務(wù)信息(服務(wù)名等)發(fā)送給KDC,KDC中的Ticket
Granting
Service將為Client
和Service之間生成一個Session
Key用于Service對Client的身份鑒別。然后KDC將這個Session
Key和用戶名,用戶地址(IP),服務(wù)名,有效期,時間戳一起包裝成一個Ticket(這些信息最終用于Service對Client的身份鑒別)發(fā)送給Service,不過Kerberos協(xié)議并沒有直接將Ticket發(fā)送給Service,而是通過Client轉(zhuǎn)發(fā)給Service.所以有了第二步。Kerberos
過程?3/22/2020?25?華中農(nóng)業(yè)大學(xué)信息學(xué)院2.此時KDC將剛才的Ticket轉(zhuǎn)發(fā)給Client。由于這個Ticket是要給Service的,不能讓Client看到,所以KDC用協(xié)議開始前KDC與Service之間的密鑰將Ticket加密后再發(fā)送給Client。同時為了讓Client和Service之間共享那個秘密(KDC在第一步為它們創(chuàng)建的Session
Key),KDC用Client與它之間的密鑰將SessionKey加密隨加密的Ticket一起返回給Client。3.為了完成Ticket的傳遞,Client將剛才收到的Ticket轉(zhuǎn)發(fā)到Service.由于Client不知道KDC與Service之間的密鑰,所以它無法篡改Ticket中的信息。同時Client將收到的Session
Key解密出來,然后將自己的用戶名,用戶地址(IP)打包成Authenticator用SessionKey加密也發(fā)送給Service。?3/22/2020?26?華中農(nóng)業(yè)大學(xué)信息學(xué)院Kerberos過程□4.Service收到Ticket后利用它與KDC之間的密鑰將Ticket中的信息解密出來,從而獲得SessionKey和用戶名,用戶地址(IP),服務(wù)名,有效期。然后再用SessionKey將Authenticator解密從而獲得用戶名,用戶地址(IP)將其與之前Ticket中解密出來的用戶名,用戶地址(IP)
做比較從而驗證Client的身份。5.如果Service有返回結(jié)果,將其返回給Client。?3/22/2020?27?華中農(nóng)業(yè)大學(xué)信息學(xué)院Kerberos過程概括起來說Kerberos協(xié)議主要做了兩件事1.Ticket的安全傳遞。2.Session
Key的安全發(fā)布。再加上時間戳的使用就很大程度上的保證了用戶鑒別的安全性。并且利用Session
Key,在通過鑒別之后Client和Service之間傳遞的消息也可以獲得Confidentiality(機密性
Integrity(完整性)的保證。不過由于沒有使用非對稱密鑰自然也就無法具有抗否認性,這也限制了它的應(yīng)用。相對而言它比X.509
PKI的身份鑒別方式實施起來簡單。?3/22/2020?28?華中農(nóng)業(yè)大學(xué)信息學(xué)院Kerberos
總結(jié)Havearange
of
approaches
based
on
the
use
of
public-key
encryption,
which
generallyassume
that
each
of
the
two
parties
is
in
possession
ofthe
current
public
key
of
the
other.
The
central
system
is
knownas
anAuthentication
Server
(AS).
Have
various
protocols
using
timestamps
ornonces,
and
again
flaws
were
found
in
anumberof
the
original
proposals.
See
text
for
details.15.4
基于公鑰加密的遠程認證?3/22/2020?29?華中農(nóng)業(yè)大學(xué)信息學(xué)院需要確保彼此的公鑰提前已經(jīng)獲知
采用一個中心認證服務(wù)器Authentication
Server(AS)用時間戳或臨時交互號的變形協(xié)議A
protocolusing
timestamps
is
provided
in[DENN81]
is
shown
above.
The
central
authentication
server
(AS)
only
provides
public-keycertificates.
The
session
key
is
chosen
and
encrypted
by
A;
hence,
there
is
no
risk
of
exposure
by
the
AS.
The
timestamps
protect
against
replaysof
compromised
keys.
This
protocol
is
compact
but,
as
before,
requires
synchronization
of
clocks.15.4.1雙向認證:Denning
AS協(xié)議?3/22/2020?30?華中農(nóng)業(yè)大學(xué)信息學(xué)院Denning
81協(xié)議描述如下:A
->
AS:
IDA
||
IDBAS
->
A:
EPRas[IDA||PUa||T]
||
EPRas[IDB||PUb||T]A
->
B:
EPRas[IDA||PUa||T]
||
EPRas[IDB||PUb||T]
||EPUb[EPRas[Ks||T]]會話密鑰由A選擇,所以不存在會話密鑰被AS泄密的危險時間戳可用于防止重放攻擊,但需要時鐘同步。?改用臨時交互號Denning
AS協(xié)議的改進(1)?3/22/2020?31?華中農(nóng)業(yè)大學(xué)信息學(xué)院Denning
AS協(xié)議的改進(2)?3/22/2020?32?華中農(nóng)業(yè)大學(xué)信息學(xué)院Have
already
presented
public-key
encryption
approaches
that
are
suited
to
electronic
mail,
including
the
straight
forward
encryption
of
the
entiremessage
for
confidentiality,
authentication,
or
both.
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 產(chǎn)業(yè)扶貧幫扶合同范例
- 供酒店食品合同范例
- 與購房中介合同范例
- 個人增資入股合同范本
- 基于不平衡數(shù)據(jù)的茄子病害分類
- 產(chǎn)品開發(fā)協(xié)議合同范例
- 冰庫買賣合同范例
- 個人終止房屋買賣合同范例
- 教育教學(xué)論文-淺談提高物理課堂教學(xué)質(zhì)量的途徑與方法
- 偽造訂單合同范例
- 醫(yī)院內(nèi)控評價工作報告
- 2021年10月自考00150金融理論與實務(wù)試題及答案含解析
- 智慧化除塵器及控制系統(tǒng)解決方案
- 急診預(yù)檢分診培訓(xùn)
- 建筑垃圾商業(yè)計劃書
- 2024年蘭州市高三診斷考試(一診)地理試卷(含答案)
- 2024春蘇教版《亮點給力大試卷》 數(shù)學(xué)四年級下冊(全冊有答案)
- 小學(xué)中高年級語文整本書閱讀教學(xué)策略
- 2024年青島版數(shù)學(xué)五年級下冊第一單元、第二單元測試題及答案(各一套)
- 自行車的力學(xué)知識研究報告
- 《高危藥品管理》課件
評論
0/150
提交評論