![]() ![]() ![]() ![]() |
|
|
|
| ![]()
[RFC 1510]
The UNIX kdestroy command erases tickets to prevent reuse. The KDC (Key Distribution Center) runs on every DC as a principal named krbtgt. A network that includes a Kerberos server is called a realm. Novell NetWare 5 Secure Authentication Services (SAS) provides an infrastructure for Kerberos-based user authentication. It is part of Novell's NetWare BorderManager Authentication Services 3 Enhancement Pack.
| ![]() ![]() ![]() |
|
SubProtocol | Process | Note |
---|---|---|
Preauthentication | User creates long term key | |
When a user logs on with password, the Kerberos client running on the workstation converts that password to an encryption key, saves result in its credentials cache. | ||
1. AS (Authentication Service) Exchange |
1. The client sends a timestamp in a KRB_AS_REQ![]() | |
2. If the KDC is sure the decrypted timestamp is within parameters, it invents a logon session key![]() ![]() ![]() | ||
The client decrypts it, extracts the TGT, and stores them in its credentials cache. | ||
2. TGT (Ticket Granting Ticket) Exchange | 3. Client sends a KRB_TGT_REQ![]() | |
4. If, after the KDC decrypts and evaluates the timed authenticator and finds it valid,
the KDC assembles and sends a KRB_TGT_REP![]() | ||
The Client receives it, decrypts the service session key with its own logon session key, and extracts the TGT for the desired service for storage in its credentials cache. | ||
3. CS (Client/Server) Exchange | 5. The Client assembles and sends a time-stamped KRB_AP_REQ![]() | |
6. The service decrypts the TGT with its long term key.
It then extracts the client's authentication data and authenticator stored in the TGT.
If the timestamp in the authenticator is within acceptable limits, the service
assembles and sends a KRB_AP_REP![]() | ||
Client receives it and decrypts the session key with the service session key and extracts. It then extracts the server's authenticator and makes sure its timestamp is within policy limits. |
| ![]() Session Keys are Short-Term Symmetric keys. Enforcement of logon restrictions using Kerberos is determined by a Group Policy, which is set to "Yes" by default.
The starttime and endtime (expiration) which Tickets are valid are set based on a
Group Policy The Maximum lifetime that a user ticket can be renewed is by default 7 days. By default, the Maximum lifetime for a service ticket is 60 minutes and 10 hours for a TGT. By default, the Maximum tolerance for synchronization of computer clocks is 5 minutes.
| ![]() ![]() ![]() |
Related:
![]()
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page ![]() Thank you! |