Page 987 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 987

decrypts the symmetric key using a hash of the user’s password.





                             Note that the client’s password is never transmitted over


                  the network, but it is verified. The server encrypts a symmetric key
                  using a hash of the user’s password, and it can only be decrypted
                  with a hash of the user’s password. As long as the user enters the
                  correct password, this step works. However, it fails if the user
                  enters the incorrect password.



               When a client wants to access an object, such as a resource hosted on
               the network, it must request a ticket through the Kerberos server. The

               following steps are involved in this process:

                1.  The client sends its TGT back to the KDC with a request for access
                    to the resource.

                2.  The KDC verifies that the TGT is valid and checks its access control
                    matrix to verify that the user has sufficient privileges to access the
                    requested resource.

                3.  The KDC generates a service ticket and sends it to the client.

                4.  The client sends the ticket to the server or service hosting the
                    resource.


                5.  The server or service hosting the resource verifies the validity of
                    the ticket with the KDC.

                6.  Once identity and authorization is verified, Kerberos activity is
                    complete. The server or service host then opens a session with the
                    client and begins communications or data transmission.

               Kerberos is a versatile authentication mechanism that works over local
               LANs, remote access, and client-server resource requests. However,
               Kerberos presents a single point of failure—the KDC. If the KDC is

               compromised, the secret key for every system on the network is also
               compromised. Also, if a KDC goes offline, no subject authentication
               can occur.

               It also has strict time requirements and the default configuration
   982   983   984   985   986   987   988   989   990   991   992