Joining Security Realms: A Single Login for NetWare and Kerberos
نویسندگان
چکیده
Accommodating disjoint security realms is a challenge for administrators who have to maintain duplicate data sets and for users who need to recall multiple pass phrases, yet joining security realms together can expose one realm to the weaknesses of the other. In this paper, we compare the Kerberos and NetWare security realms, examine methods of joining the two realms under a single login, and propose an attractive single login design. second section lists some known current security lapses in the two security realms, organized by attacks. The third section discusses security lapses that might be caused by single login. The fourth section presents two single login designs. In the last section, we describe our conclusion, and discuss ways to increase the level of security of the single login. 2. Overview of Security Services We assume the reader is familiar with Kerberos and NetWare security realms, and offer the following overview.
منابع مشابه
IMPROVING THE SECURITY PERFORMANCE IN COMPUTER GRIDS Architecture and Results
Security in computational Grids is mainly based on Grid Security Infrastructure (GSI) for authentication and Virtual Organization Membership Service for authorization. Although these mechanisms provide the required level of security, they lack in performance due to their dependence on public key cryptography. In our proposed security architecture we use a Kerberos-based approach (symmetric cryp...
متن کاملSESAME V2 public key and authorisation extensions to Kerberos
realms (or between realm hierarchies) limits the extent to which Kerberos can be realistically used to secure communications between different organisations, or even to scale across large enterprises which may have divisions operating loosely coordinated security policies, and which find difficulty managing the effort of maintaining shared secrets with each remote realm or group of realms that ...
متن کاملRefining Computationally Sound Mechanized Proofs for Kerberos
Kerberos is designed to allow a user to repeatedly authenticate herself to multiple servers based on a single login. The PKINIT extension to Kerberos modifies the initial round of the protocol to use a PKI instead of long-term shared keys (e.g., password-derived keys). Especially with PKINIT, Kerberos uses a rich collection of cryptographic operations and constructs, and Kerberos, both with and...
متن کاملComputationally Sound Mechanized Proof of PKINIT for Kerberos
Here we report initial results on the formalization and analysis, using the CryptoVerif tool [4, 5, 6], of the public-key extension to the Kerberos protocol, PKINIT [10]. This protocol provides a good test case for analysis techniques because it incorporates many different protocol design elements: symmetric and asymmetric encryption, digital signatures, and keyed hash functions. We are able to...
متن کاملKerberos Interoperability Issues
MIT’s computing environment is a heterogeneous environment that has used Kerberos as a primary authentication method for over a decade. Instead of migrating our existing KDCs to Windows 2000 we have chosen to use cross realm trust to support our Windows 2000 computing environment. During our deployment project we have encountered some interoperability problems and have worked with Microsoft to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995