⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc1510.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Network Working Group                                            J. KohlRequest for Comments: 1510                 Digital Equipment Corporation                                                               C. Neuman                                                                     ISI                                                          September 1993            The Kerberos Network Authentication Service (V5)Status of this Memo   This RFC specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" for the standardization state and status   of this protocol.  Distribution of this memo is unlimited.Abstract   This document gives an overview and specification of Version 5 of the   protocol for the Kerberos network authentication system. Version 4,   described elsewhere [1,2], is presently in production use at MIT's   Project Athena, and at other Internet sites.Overview   Project Athena, Athena, Athena MUSE, Discuss, Hesiod, Kerberos,   Moira, and Zephyr are trademarks of the Massachusetts Institute of   Technology (MIT).  No commercial use of these trademarks may be made   without prior written permission of MIT.   This RFC describes the concepts and model upon which the Kerberos   network authentication system is based. It also specifies Version 5   of the Kerberos protocol.   The motivations, goals, assumptions, and rationale behind most design   decisions are treated cursorily; for Version 4 they are fully   described in the Kerberos portion of the Athena Technical Plan [1].   The protocols are under review, and are not being submitted for   consideration as an Internet standard at this time.  Comments are   encouraged.  Requests for addition to an electronic mailing list for   discussion of Kerberos, kerberos@MIT.EDU, may be addressed to   kerberos-request@MIT.EDU.  This mailing list is gatewayed onto the   Usenet as the group comp.protocols.kerberos.  Requests for further   information, including documents and code availability, may be sent   to info-kerberos@MIT.EDU.Kohl & Neuman                                                   [Page 1]RFC 1510                        Kerberos                  September 1993Background   The Kerberos model is based in part on Needham and Schroeder's   trusted third-party authentication protocol [3] and on modifications   suggested by Denning and Sacco [4].  The original design and   implementation of Kerberos Versions 1 through 4 was the work of two   former Project Athena staff members, Steve Miller of Digital   Equipment Corporation and Clifford Neuman (now at the Information   Sciences Institute of the University of Southern California), along   with Jerome Saltzer, Technical Director of Project Athena, and   Jeffrey Schiller, MIT Campus Network Manager.  Many other members of   Project Athena have also contributed to the work on Kerberos.   Version 4 is publicly available, and has seen wide use across the   Internet.   Version 5 (described in this document) has evolved from Version 4   based on new requirements and desires for features not available in   Version 4.  Details on the differences between Kerberos Versions 4   and 5 can be found in [5].Table of Contents   1. Introduction .......................................    5   1.1. Cross-Realm Operation ............................    7   1.2. Environmental assumptions ........................    8   1.3. Glossary of terms ................................    9   2. Ticket flag uses and requests ......................   12   2.1. Initial and pre-authenticated tickets ............   12   2.2. Invalid tickets ..................................   12   2.3. Renewable tickets ................................   12   2.4. Postdated tickets ................................   13   2.5. Proxiable and proxy tickets ......................   14   2.6. Forwardable tickets ..............................   15   2.7. Other KDC options ................................   15   3. Message Exchanges ..................................   16   3.1. The Authentication Service Exchange ..............   16   3.1.1. Generation of KRB_AS_REQ message ...............   17   3.1.2. Receipt of KRB_AS_REQ message ..................   17   3.1.3. Generation of KRB_AS_REP message ...............   17   3.1.4. Generation of KRB_ERROR message ................   19   3.1.5. Receipt of KRB_AS_REP message ..................   19   3.1.6. Receipt of KRB_ERROR message ...................   20   3.2. The Client/Server Authentication Exchange ........   20   3.2.1. The KRB_AP_REQ message .........................   20   3.2.2. Generation of a KRB_AP_REQ message .............   20   3.2.3. Receipt of KRB_AP_REQ message ..................   21   3.2.4. Generation of a KRB_AP_REP message .............   23   3.2.5. Receipt of KRB_AP_REP message ..................   23Kohl & Neuman                                                   [Page 2]RFC 1510                        Kerberos                  September 1993   3.2.6. Using the encryption key .......................   24   3.3. The Ticket-Granting Service (TGS) Exchange .......   24   3.3.1. Generation of KRB_TGS_REQ message ..............   25   3.3.2. Receipt of KRB_TGS_REQ message .................   26   3.3.3. Generation of KRB_TGS_REP message ..............   27   3.3.3.1. Encoding the transited field .................   29   3.3.4. Receipt of KRB_TGS_REP message .................   31   3.4. The KRB_SAFE Exchange ............................   31   3.4.1. Generation of a KRB_SAFE message ...............   31   3.4.2. Receipt of KRB_SAFE message ....................   32   3.5. The KRB_PRIV Exchange ............................   33   3.5.1. Generation of a KRB_PRIV message ...............   33   3.5.2. Receipt of KRB_PRIV message ....................   33   3.6. The KRB_CRED Exchange ............................   34   3.6.1. Generation of a KRB_CRED message ...............   34   3.6.2. Receipt of KRB_CRED message ....................   34   4. The Kerberos Database ..............................   35   4.1. Database contents ................................   35   4.2. Additional fields ................................   36   4.3. Frequently Changing Fields .......................   37   4.4. Site Constants ...................................   37   5. Message Specifications .............................   38   5.1. ASN.1 Distinguished Encoding Representation ......   38   5.2. ASN.1 Base Definitions ...........................   38   5.3. Tickets and Authenticators .......................   42   5.3.1. Tickets ........................................   42   5.3.2. Authenticators .................................   47   5.4. Specifications for the AS and TGS exchanges ......   49   5.4.1. KRB_KDC_REQ definition .........................   49   5.4.2. KRB_KDC_REP definition .........................   56   5.5. Client/Server (CS) message specifications ........   58   5.5.1. KRB_AP_REQ definition ..........................   58   5.5.2. KRB_AP_REP definition ..........................   60   5.5.3. Error message reply ............................   61   5.6. KRB_SAFE message specification ...................   61   5.6.1. KRB_SAFE definition ............................   61   5.7. KRB_PRIV message specification ...................   62   5.7.1. KRB_PRIV definition ............................   62   5.8. KRB_CRED message specification ...................   63   5.8.1. KRB_CRED definition ............................   63   5.9. Error message specification ......................   65   5.9.1. KRB_ERROR definition ...........................   66   6. Encryption and Checksum Specifications .............   67   6.1. Encryption Specifications ........................   68   6.2. Encryption Keys ..................................   71   6.3. Encryption Systems ...............................   71   6.3.1. The NULL Encryption System (null) ..............   71   6.3.2. DES in CBC mode with a CRC-32 checksum (descbc-crc)71Kohl & Neuman                                                   [Page 3]RFC 1510                        Kerberos                  September 1993   6.3.3. DES in CBC mode with an MD4 checksum (descbc-md4)  72   6.3.4. DES in CBC mode with an MD5 checksum (descbc-md5)  72   6.4. Checksums ........................................   74   6.4.1. The CRC-32 Checksum (crc32) ....................   74   6.4.2. The RSA MD4 Checksum (rsa-md4) .................   75   6.4.3. RSA MD4 Cryptographic Checksum Using DES   (rsa-md4-des) .........................................   75   6.4.4. The RSA MD5 Checksum (rsa-md5) .................   76   6.4.5. RSA MD5 Cryptographic Checksum Using DES   (rsa-md5-des) .........................................   76   6.4.6. DES cipher-block chained checksum (des-mac)   6.4.7. RSA MD4 Cryptographic Checksum Using DES   alternative (rsa-md4-des-k) ...........................   77   6.4.8. DES cipher-block chained checksum alternative   (des-mac-k) ...........................................   77   7. Naming Constraints .................................   78   7.1. Realm Names ......................................   77   7.2. Principal Names ..................................   79   7.2.1. Name of server principals ......................   80   8. Constants and other defined values .................   80   8.1. Host address types ...............................   80   8.2. KDC messages .....................................   81   8.2.1. IP transport ...................................   81   8.2.2. OSI transport ..................................   82   8.2.3. Name of the TGS ................................   82   8.3. Protocol constants and associated values .........   82   9. Interoperability requirements ......................   86   9.1. Specification 1 ..................................   86   9.2. Recommended KDC values ...........................   88   10. Acknowledgments ...................................   88   11. References ........................................   89   12. Security Considerations ...........................   90   13. Authors' Addresses ................................   90   A. Pseudo-code for protocol processing ................   91   A.1. KRB_AS_REQ generation ............................   91   A.2. KRB_AS_REQ verification and KRB_AS_REP generation    92   A.3. KRB_AS_REP verification ..........................   95   A.4. KRB_AS_REP and KRB_TGS_REP common checks .........   96   A.5. KRB_TGS_REQ generation ...........................   97   A.6. KRB_TGS_REQ verification and KRB_TGS_REP generation  98   A.7. KRB_TGS_REP verification .........................  104   A.8. Authenticator generation .........................  104   A.9. KRB_AP_REQ generation ............................  105   A.10. KRB_AP_REQ verification .........................  105   A.11. KRB_AP_REP generation ...........................  106   A.12. KRB_AP_REP verification .........................  107   A.13. KRB_SAFE generation .............................  107   A.14. KRB_SAFE verification ...........................  108Kohl & Neuman                                                   [Page 4]RFC 1510                        Kerberos                  September 1993   A.15. KRB_SAFE and KRB_PRIV common checks .............  108   A.16. KRB_PRIV generation .............................  109   A.17. KRB_PRIV verification ...........................  110   A.18. KRB_CRED generation .............................  110   A.19. KRB_CRED verification ...........................  111   A.20. KRB_ERROR generation ............................  1121.  Introduction   Kerberos provides a means of verifying the identities of principals,   (e.g., a workstation user or a network server) on an open   (unprotected) network.  This is accomplished without relying on   authentication by the host operating system, without basing trust on   host addresses, without requiring physical security of all the hosts   on the network, and under the assumption that packets traveling along   the network can be read, modified, and inserted at will. (Note,   however, that many applications use Kerberos' functions only upon the   initiation of a stream-based network connection, and assume the   absence of any "hijackers" who might subvert such a connection.  Such   use implicitly trusts the host addresses involved.)  Kerberos   performs authentication under these conditions as a trusted third-   party authentication service by using conventional cryptography,   i.e., shared secret key.  (shared secret key - Secret and private are   often used interchangeably in the literature.  In our usage, it takes   two (or more) to share a secret, thus a shared DES key is a secret   key.  Something is only private when no one but its owner knows it.   Thus, in public key cryptosystems, one has a public and a private   key.)   The authentication process proceeds as follows: A client sends a   request to the authentication server (AS) requesting "credentials"   for a given server.  The AS responds with these credentials,   encrypted in the client's key.  The credentials consist of 1) a   "ticket" for the server and 2) a temporary encryption key (often   called a "session key").  The client transmits the ticket (which   contains the client's identity and a copy of the session key, all   encrypted in the server's key) to the server.  The session key (now   shared by the client and server) is used to authenticate the client,

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -