Cross-Realm Authentication
Saber Zrelli
zrelli at jaist.ac.jp
Fri Apr 22 13:11:00 EDT 2005
* Douglas E. Engert (deengert at anl.gov) wrote:
> >If my understanding is correct, to establish cross-realm authentication we
> >need to follow these steps :
> >
> >
> > 1 - Admin in EXAMPLE.COM creates the principal
> krbtgt/EXAMPLE1.COM at EXAMPLE.COM
>
> Yes.
>
> >
> >2 - Using the same key , admin in EXAMPLE1.COM creates
> >krbtgt/EXAMPLE.COM at EXAMPLE1.COM
>
> No. Using same key, admin in EXAMPLE1.COM creates
> krbtgt/EXAMPLE1.COM at EXAMPLE.COM
> Same principal name in both realms. (This is the only place where a
> principal in the
> database in not for the same realm, it is used as if it was in a keytab
> file.)
>
> The above gives you one way trust, if you want cross realm to work the
> other way,
> then using a new key, both admins create krbgt/EXAMPLE1.COM at EXAMPLE.COM in
> thier
> realms with this new key.
>
> >
> >3- when a user in EX1.COM asks for a service in EX.COM, his KDC give this
> >client a Service Ticket for krbtgt/EXAMPLE.COM at EXAMPLE1.COM encrypted using
> >the key of krbtgt/EXAMPLE.COM at EXAMPLE1.COM.
> >
>
> Yes.
>
> >4- TGS in EX.COM can decrypt this ticket using the key of the principal
> >krbtgt/EXAMPLE1.COM at EXAMPLE.COM which is the same key as the principal
> >krbtgt/EXAMPLE.COM at EXAMPLE1.COM.
>
> No it uses the same principal, krbtgt/EXAMPLE1.COM at EXAMPLE.COM
Ok, I think I got it now , thanks !
> >>If the KDCs don't share keys, you can't do cross realm. There must
> >>be a trusted path between the user's realm and the server's realm
> >>by having two or more realms share keys.
> >
> >
> >In the question above, I try to understand the motivations that made the
> >cross-realm operations the way they are.
> >
> >I meant that why the KDCs just communicate with each others to get the TGT
> >for the client.
>
> The KDCs do NOT communicate with each other. The client contacts a KDC
> in a realm to get a ticket for the next realm.
Yes, I think I miss expressed my self. I meant that if ever the protocol
that allows a client to get a TGT for a remote realm, was transparent to the
client it would be good.
> In the MIT release there is a test program t_walk_rtree that can
> show what TGTs the client would need to get.
>
> ./t_walk_rtree A.B.X.Y.Z C.D.X.Y.Z
> krbtgt/A.B.X.Y.Z at A.B.X.Y.Z
> krbtgt/B.X.Y.Z at A.B.X.Y.Z
> krbtgt/X.Y.Z at B.X.Y.Z
> krbtgt/D.X.Y.Z at X.Y.Z
> krbtgt/C.D.X.Y.Z at D.X.Y.Z
I would be happy to try it out. I just need to have a couple of realms :-)
> >If KDC-A and KDC-B in the realms A and B share keys. Then
> >why does the client need to be involved in getting this TGT and have to ask
> >KDC-A and KDC-B respectively.
> >
> >Why not just make the KDC-A and KDC-B exchange messages (in an inter-KDC
> >protocol fashion) and get the KDC-A provide the TGT for realm B to the
> >client in realm A.
> >
> >Is such protocol (inter-TGS) seems feasible ?
>
> If you thing you have a better idea, get involved with the IETF krb-wg
> and propose the changes.
I'm looking forward.
> >In access networks the access routers need to get the credentials of the
> >user before granting him any access. Therefore kerberos based auth is not
> >possible in access networks (i.e. to authenticate users before providing
> >Internet connectivity).
>
> This sounds like the IAKERB from a few years ago:
>
> Initial and Pass Through Authentication Using Kerberos V5 and the GSS-API
> (IAKERB)
> <draft-ietf-cat-iakerb-09.txt>
>
> 1. Abstract
>
> This document defines extensions to the Kerberos protocol
> specification (RFC 1510 [1]) and GSSAPI Kerberos protocol mechanism
> (RFC 1964 [2]) that enables a client to obtain Kerberos tickets for
> services where the KDC is not accessible to the client, but is
> accessible to the application server. Some common scenarios where
> lack of accessibility would occur are when the client does not have
> an IP address prior to authenticating to an access point, the client
> is unable to locate a KDC, or a KDC is behind a firewall. The
> document specifies two protocols to allow a client to exchange KDC
> messages (which are GSS encapsulated) with an IAKERB proxy instead of
> a KDC.
>
This draft addresses exaclty my point about using kerberos in access
networks.
Thank you very much.
--
Saber ZRELLI <zrelli at jaist.ac.jp>
Japan Advanced Institute of Science and Technology
Center of Information Science
Shinoda Laboratory
url : http://www.jaist.ac.jp/~zrelli
gpg-id : 0x7119EA78
More information about the Kerberos
mailing list