Kerberos Flashcards

(42 cards)

1
Q

Password, PIN, images, etc.

A

Something user knows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smart cards, keys, tokens

A

Something user possess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fingerprint, face, retina

A

Something user is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Voice pattern, handwriting style, typing rhythm

A

Something the user does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Method to ensure two similar encrypted passwords have different hash

A

Salting passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If k is compromised, all leaked. Reveals two users have same passowrd

A

Cannot encrypt all passwords with same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protected from passive eavesdroppers and active malicious users

A

Security in kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Users shouldn’t notice authentication taking place

A

transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

large numbers of users and servers

A

scalability in kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

eavesdropping, tampering, replay

A

malicious user eavesdrops, tampers, or replays other users’ conversation to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malicious user with access to workstation pretends to be user from same workstation

A

user impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malicious user changes network address of his workstation to impersonate another workstation

A

network address impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

trusted authentication service on network

A

trusted third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • password can never travel over network
  • password cannot be stored in any form on client machine
  • password should never be stored in unecrypted form
  • user is asked to enter password only once per work session
A

Kerberos password design objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application server cannot contain authentication info for their users?

A
  • admin can disable account of any user by acting in single location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Both user and application must prove authenticity

A

mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Proves that user has authenticated

18
Q

encrypts ticket with key known to server, but not user

A

authentication server

19
Q

client cannot ___ or ____ contents of ticket

A

know or modify

20
Q

Malicious user may steal service ticket of another user on same workstation

A

Ticket hijacking

21
Q

Server must verify that the user who is presenting the ticket is the same user to whom the ticket was issued

A

Ticket hijacking

22
Q

Attacker can misconfigure the network so that he receives messages addressed to a legitimate server

A

No server authentication

23
Q

Server must prove identity to users

A

No server authentication

24
Q

Receving ticket from client is not enough to guarantee authenticity

A

Replay attack

25
Client sends _____ where the username and current timestamp are included and encrypts it with the session key
the authenticator
26
Critical for machines to be time synchronized
Using session key for authentication
27
Server remembers authenticators which have arrived within the last 2 minutes and reject them if they are replicas
Replay cache
28
Prove identity once to obtain a special ___ ticket
Ticket Granting Service
29
Use ___ to get tickets for any network service
TGS
30
Client cannot forge or tamper with it
TGS ticket
31
Used to obtain service ticket and short-term session key for each network service
TGS ticket
32
Network divided into realms
Kerberos in large networks
33
- Get ticket from home-realm TGS from home-realm KDC - Get ticket for remote realm TGS from home realm TGS - Get ticket from remote service from realms TGS - use remote realm ticket to acccess service
Kerberos in large networks
34
Separate session key for each user-server pair
Short term session keys
35
Long-term secrets used only to derive short-term keys
Short term session keys
36
Used to prevent replays with synchronized clocks
Authenticator
37
Symmetric cryptography only
Kerberos
38
Server can access other servers on user's behalf
Kerberos v5
39
Better user-server authentication
Kerberos v5
40
Separate subkey for each user-server session instead of re-using session key contain in ticket
Kerberos v5
41
Authentication via subkeys, not timestamp increments
Kerberos v5
42