home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Danny Amor's Online Library
/
Danny Amor's Online Library - Volume 1.iso
/
bbs
/
society
/
society.lha
/
PUB
/
isoc_news
/
1-3
/
n-1-3-040.33.3a
< prev
next >
Wrap
Text File
|
1995-07-21
|
4KB
|
84 lines
N-1-3-040.33, "Protecting Passwords, Part II", by Jeffrey I.
Schiller*, <jis@mit.edu>
In the last issue of the Internet Society News, we discussed the
importance of protecting passwords from Network Snooping. We
identified four methods to protect passwords from observation as they
traversed the network. We covered "one-time" password schemes as well
as hand held authentication devices (sometimes referred to as "Tokens"
or "Smart Cards").
In this issue, we will talk about Cryptographic Network Authentication
Protocols. These protocols permit you to authenticate yourself across
the Internet to foreign hosts or services without ever revealing your
password "in the clear". Two systems are available today on the
Internet, Kerberos from MIT and SPX from Digital Equipment
Corporation.
Kerberos is based on the U.S. Data Encryption Standard (DES)
algorithm. Kerberos is utilized by having a trusted Key Distribution
Center (KDC). Each host computer system and every network user have a
secret encryption key which is shared with the KDC system. Hosts
store their secret in protected files. User's keys are a function of
their password.
When logging in via a Kerberos authenticated login, rather than typing
a password over the network in the clear, you (or more properly, the
software on the local workstations or terminal server) obtain a set of
encrypted "tickets" from the KDC system. These tickets are encrypted
in your password, so are meaningless to someone who doesn't have your
password. However, you can decrypt them. You then present these
tickets to host servers instead of a password when you wish to login
(or use a particular network service, say for example to fetch your
mail from a Post Office server).
It is also possible for two (or more) separate Kerberos "realms" to
share a key and then permit their user's to use services in other
realms. Yet each realm maintains its own administrative control.
Digital Equipment Corporation's SPX system works very similarly to
Kerberos. However, it takes advantage of the RSA Public Key
encryption technology as well as using DES. RSA Public Key technology
provides some technical advantages over simply using DES alone. The
most important of these is the ability to build a hierarchy of SPX
domains (realms) that can scale to the size of the entire Internet.
SPX also conforms to the X.509 Directory Authentication specification.
How to obtain these systems
The current "production" version of Kerberos (version 4) is available
within the U.S. by anonymous FTP to host "athena-dist.mit.edu." Look
in the /pub/kerberos directory for a README file that explains how to
get the distribution. All are welcome to peruse /pub/kerberos/doc
which contains documentation and papers written about kerberos that go
into far more detail then space will allow here.
Version 5 Kerberos (the version compatible with the OSF DCE) is
available AS BETA TEST SOFTWARE (as of this writing) in
/pub/kerberos5.
All software that uses cryptography is subject to COCOM export control
laws. If you are outside of the U.S., you may wish to consult an
"archie" server for locations that may have versions of Kerberos
written outside of the U.S.
SPX is available via anonymous FTP from crl.dec.com, in the
/pub/DEC/SPX directory. Note: SPX IS BETA TEST SOFTWARE and the
current version will not operate after December of 1992 (as of this
writing it isn't known what plans are being made for using it after
December). Check the README files there for more information. SPX
also comes with a documentation kit that explains its design as well
as provides installation information.
Next time we'll discuss the activities of the Common Authentication
Technology Working Group of the Internet Engineering Task Force
(IETF). The CAT group is working on a common programming API which
allows programmers to write applications which will run on top of any
authentication protocol. Both Kerberos and SPX support the CAT API.
*MIT Network Manager, Massachusetts Institute of Technology