Authentication in real world: Kerberos, SSH and SSL
Where are we?
Think about Authentication
Use of Password over a Network
Use of Challenges to Defend Against Password Replay
The “O(N2) Password Management Problem”
What is Kerberos?
Kerberos: etymology
How Kerberos Tickets Work (Daily Experience)
Kerberos Authentication
Kerberos Terminology and Abbreviations
Kerberos Authentication (Detail)
Kerberos Authentication w/ TGS
Kerberos Authentication w/ TGS (Detail)
Kerberos’ Stateless Model
Scaling Kerberos
Kerberos Authorization and Accounting
Advantages of Kerberos
Kerberos caveats
Summary of Kerberos
Ssshhhhh....
Simplified SSH Protocol
Actual SSH Protocol
Comparing to stored KUS
Accept and Save
ssh philosophy
ssh.com’s SSH
ssh Error
ISO/OSI Model SSL: Security at Transport Layer
Security at the Transport Layer Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
An example of key exchange using public/private keys
Acknowledgements
Author: Zheng Ma
E-mail: zheng.ma@yale.edu