Page 37 - StudyBook.pdf
P. 37

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  21

                    Kerberos uses a time stamp and we need to understand where and when the
                 time stamp is used. Previously mentioned was the concept of non-repudiation (see
                 Chapter 9), which is one reason for the use of the time stamps. In the case of
                 Kerberos, the time stamp is also used to limit the possibility of replay or spoofing of
                 credentials (see Chapter 2). Replay is the capture of information, modification of
                 the captured information, and retransmission of the modified information to the
                 entity waiting to receive the communication. If unchecked, this allows for imper-
                 sonation of credentials when seeking access. Spoofing is the substitution of
                 addressing or authentication information to try to attain access to a resource based
                 on information acceptable to the receiving host, but not truly owned by the
                 sender.The initial time stamp refers to any communication between the entity
                 requesting authentication and the KDC. Normally, this initial time period will not
                 be allowed to exceed ten minutes if based on the MIT Kerberos software default.
                 Microsoft’s Kerberos implementation has a five-minute time delta. If clocks are not
                 synchronized between the systems, the credentials (tickets) will not be granted if
                 the time differential exceeds the established limits. Session tickets from the KDC to
                 a resource must be presented within this time period or they will be discarded.The
                 session established between the resource server and the requesting entity is also
                 time-stamped, but generally lasts as long as the entities logon credential is valid.
                 This can be affected by system policies like logon hour restrictions, which are
                 defined in the original access token.TGT tickets are not part of the default five-
                 minute period. Rather, they are cached locally on the machine, and are valid for
                 the duration of the logged-on session.

                 CHAP

                 One of the methods that can be used to protect information when using remote
                 access to a resource is the Challenge Handshake Authentication Protocol (CHAP).
                 CHAP is a remote access authentication protocol used in conjunction with Point-
                 to-Point Protocol (PPP) to provide security and authentication to users of remote
                 resources.You will recall that PPP replaced the older Serial Line Internet Protocol
                 (SLIP). PPP not only allows for more security than SLIP, but also does not require
                 static addressing to be defined for communication. PPP allows users to use dynamic
                 addressing and multiple protocols during communication with a remote host.
                 CHAP is described in RFC 1994, available at www.ietf.org/rfc/rfc1994.txt
                 ?number=1994.The RFC describes a process of authentication that works in the
                 following manner:






                                                                              www.syngress.com
   32   33   34   35   36   37   38   39   40   41   42