logo_kerberos.gif

Projects/Revocation

From K5Wiki
< Projects(Difference between revisions)
Jump to: navigation, search
m
m
Line 20: Line 20:
 
# http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7817.pdf
 
# http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7817.pdf
 
# http://tools.ietf.org/html/draft-ietf-krb-wg-cammac-07
 
# http://tools.ietf.org/html/draft-ietf-krb-wg-cammac-07
  +
# http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf (Class FAU_ARP)

Revision as of 14:53, 30 July 2014

This is an early stage project for MIT Kerberos. It is being fleshed out by its proponents. Feel free to help flesh out the details of this project. After the project is ready, it will be presented for review and approval.


Contents

Purpose

Introduce a Revocation functionality into Kerberos eco-system.

Possible scenarios and approaches

  1. Support “Black list” on KDC: KDC stores information about jeopardized clients together with the timestamp when the accident was recorded (e. g. Client lost mobile phone with some active security-sensitive applications and informed KDC about it). If desired, the Application Server may get an access to this information (perhaps, through a special channel/protocol) and acts accordingly;
  2. Application server observes some malicious activity (e.g. through audit log analysis) and reports it to KDC. KDC acts accordingly. Ideally, the Client (person or service) is also informed (via email or some other communication channel) that his/her credentials are jeopardized;
  3. KDC learns that client is jeopardized or his/her credentials are changed or revoked, and dispatches warnings to all services that expressed interest in this functionality and may be potentially affected by the accident. The warning is sent only if the ticket for the particular service exists and is still valid.
  4. Forensics: Application server observes the malicious action. It informs KDC about the accident, but continues to serve the intruder to allow some time to track down the originator of the attack.

Lightweight approach under CAMMAC umbrella

KDC learns that client is jeopardized or his/her credentials are changed or revoked, and incorporates the revocation information into AD-CAMMAC container for every newly issued ticket.

References

  1. http://nvlpubs.nist.gov/nistpubs/ir/2012/NIST.IR.7817.pdf
  2. http://tools.ietf.org/html/draft-ietf-krb-wg-cammac-07
  3. http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf (Class FAU_ARP)
Personal tools