home *** CD-ROM | disk | FTP | other *** search
-
-
- N-1-3-040.33, "Protecting Passwords, Part II", by Jeffrey I.
- Schiller*, <jis@mit.edu>
-
-
- In the last issue of the Internet Society News, we discussed the
- importance of protecting passwords from Network Snooping. We
- identified four methods to protect passwords from observation as they
- traversed the network. We covered "one-time" password schemes as well
- as hand held authentication devices (sometimes referred to as "Tokens"
- or "Smart Cards").
-
- In this issue, we will talk about Cryptographic Network Authentication
- Protocols. These protocols permit you to authenticate yourself across
- the Internet to foreign hosts or services without ever revealing your
- password "in the clear". Two systems are available today on the
- Internet, Kerberos from MIT and SPX from Digital Equipment
- Corporation.
-
- Kerberos is based on the U.S. Data Encryption Standard (DES)
- algorithm. Kerberos is utilized by having a trusted Key Distribution
- Center (KDC). Each host computer system and every network user have a
- secret encryption key which is shared with the KDC system. Hosts
- store their secret in protected files. User's keys are a function of
- their password.
-
- When logging in via a Kerberos authenticated login, rather than typing
- a password over the network in the clear, you (or more properly, the
- software on the local workstations or terminal server) obtain a set of
- encrypted "tickets" from the KDC system. These tickets are encrypted
- in your password, so are meaningless to someone who doesn't have your
- password. However, you can decrypt them. You then present these
- tickets to host servers instead of a password when you wish to login
- (or use a particular network service, say for example to fetch your
- mail from a Post Office server).
-
- It is also possible for two (or more) separate Kerberos "realms" to
- share a key and then permit their user's to use services in other
- realms. Yet each realm maintains its own administrative control.
-
- Digital Equipment Corporation's SPX system works very similarly to
- Kerberos. However, it takes advantage of the RSA Public Key
- encryption technology as well as using DES. RSA Public Key technology
- provides some technical advantages over simply using DES alone. The
- most important of these is the ability to build a hierarchy of SPX
- domains (realms) that can scale to the size of the entire Internet.
- SPX also conforms to the X.509 Directory Authentication specification.
-
- How to obtain these systems
-
- The current "production" version of Kerberos (version 4) is available
- within the U.S. by anonymous FTP to host "athena-dist.mit.edu." Look
- in the /pub/kerberos directory for a README file that explains how to
- get the distribution. All are welcome to peruse /pub/kerberos/doc
- which contains documentation and papers written about kerberos that go
- into far more detail then space will allow here.
-
- Version 5 Kerberos (the version compatible with the OSF DCE) is
- available AS BETA TEST SOFTWARE (as of this writing) in
- /pub/kerberos5.
-
- All software that uses cryptography is subject to COCOM export control
- laws. If you are outside of the U.S., you may wish to consult an
- "archie" server for locations that may have versions of Kerberos
- written outside of the U.S.
-
- SPX is available via anonymous FTP from crl.dec.com, in the
- /pub/DEC/SPX directory. Note: SPX IS BETA TEST SOFTWARE and the
- current version will not operate after December of 1992 (as of this
- writing it isn't known what plans are being made for using it after
- December). Check the README files there for more information. SPX
- also comes with a documentation kit that explains its design as well
- as provides installation information.
-
- Next time we'll discuss the activities of the Common Authentication
- Technology Working Group of the Internet Engineering Task Force
- (IETF). The CAT group is working on a common programming API which
- allows programmers to write applications which will run on top of any
- authentication protocol. Both Kerberos and SPX support the CAT API.
-
-
- *MIT Network Manager, Massachusetts Institute of Technology
-