next we have our Kerberos technology. Now our curb Bo's technology is going to utilize P k I an asymmetric encryption in order to help us authenticate ourselves in our network and help us to access resource is on our network without having to authenticate ourselves every single server that we access
and pass our credentials to every single service that we need to utilize.
curveballs comes from our Greek mythology as our 33 headed guard of the underworld. In our in our set up in our network, in our security curb, Rose is going to be our three headed guard of our network covers. We is named as such because it has three main heads
and the three heads of Curb Rose, at least in our network anyway, are going to be our key distribution center, our authentication service and our ticket granting service. Now we're gonna talk about each of those in in more detail, but for now, just know that that's our three main components are key distribution center authentication service
and our ticket granting service.
Now, curb rose is very typical in a Windows domain, especially were with using authentication using our active directory and then using our user permissions and our user privilege levels in orderto access, different service is on our network. Essentially, Curb Rose is going to hand out tickets
that allow us to access. Different service is on the network
rather than having to every time we need to access the file or every time we need to access a particular part of our network sending all of these different servers are user name and password. We just send them a service ticket. That way we can still access these different components on our network, but we're not handing our credentials to everybody who asks for them.
We're just handing the service ticket
so it makes it a lot more secure, and it lets us be able to communicate with other people on our network without actually sending them are logged in user name and password.
So our purpose relies on a trusted third party who is who hands out our tickets. That air passed between everybody. So our Kerberos relies on trusting our ticket granting service because our ticket granting service is anarchy Distribution center is going to be the person who
verifies that all of these tickets
are who they say they are, because we because where it's like when we get on the train when we buy our tickets Way may show I d and show who we are, that we are who we say we are. And then we get our ticket to board the train and we don't show our I d to anybody else. We just give our ticket to everybody.
But in order that we that ticket is trusted,
it needs to be issued by someone who is trusted. We need to make sure that that ticket is issued by the by the train by the front desk of the train station. So we need to make sure that that ticket is granted is granted by someone who's trusted.
So let's take a look at our Let's take a look at our co bro's connection here.
So right here we have a computer that is turned off at the moment,
and we were walking in. We're getting started for work day, so we're gonna turn on our we're gonna turn on our computer and were prompted with the log in screen. It says, Enter your user name and password,
so we enter a user name and password and as we do
where sending our user name and password
to the authentication service.
So the authentication service is going to we're going to send our user name and password. So user name slash password
to the authentication service and say, Hey,
I'm here and I need to get a ticket granting ticket,
so I need to get a ticket that says, I'm I am who I say I am.
So I'm gonna go. I'm gonna send this username and password to get my ticket granting ticket.
The authentication service is part of our key distribution center, and our authentication service is going to say Okay, you're good. That usually the password past Maybe this is active directory that's handling this in our authentication service is saying, yes, you are who you say you are.
So I'm going to let the ticket granting service in our key distribution server know that know your user name and know to be on the lookout for you.
So you passed authentication.
So the computer is now also going to request a ticket granting ticket.
So what's doing is it's requesting from the key distribution center, it's say, hey,
I need a ticket granting ticket. I need it. I need a ticket to get on the train or I need a ticket to get into the fair.
So the ticket granting ticket is going to take. That is going to take the ticket granting ticket, and then it's going to take our users up
public key, and he's going to say, OK,
it's gonna take our user's password is gonna hash it with it and it's going to say OK,
here's your ticket granting ticket. If you are who you say you are, you'll be able to read this. So if we aren't who we say we are, we won't be able to read that ticket granting ticket. If we are, then we will be able to read it.
So we're able to were able to read that ticket granting ticket were alive for our session or get to go were logged into our computer.
But now we need to access this file server.
We're not going to send the ticket granting ticket to the file server. We're not going to send our user name and password to the file server. We're gonna send our ticket granting ticket back to the ticket granting system and say, I need a service ticket. I need a service that allows me to authenticate and begin a session
with the file server.
So we send this ticket granting ticket.
The ticket granting service sends us back a service ticket,
and then we send the service ticket
The file server sees this service ticket verifies that it was issued by the ticket granting service because if this service ticket, the service ticket has to be issued by the ticket granting service because the ticket granting service puts its own signature on the service ticket.
If anyone else tries to forge that, it's not gonna work because that service ticket
is not only signed, but it's also time stamped by the ticket granting service. It's time stamped with an expiration time.
So we then send that service ticket to the network to the network device, in this case, a file server, and say, Hey,
this is me. I have a service ticket that authenticates me. So I need you to start sending the files. I need to initiate a session with you.
So then our file server after it checks that service ticket will say Okay. Yeah, but everything checks out. Your service tickets checks out, is now going to initiate a session back to us.
This prevents us from having to send our user name and password to the file server. Just in case that file servers compromise. They they are not getting our user name and password. They're all they're getting is they're getting a service ticket. And all that service ticket is good for is the connection between us and the file server for a limited amount of time.
all about all of our tickets in Arco, bro, set up our all time stamped. Our ticket granting ticket is time stamped for the duration that we're going to be logged in if we're still logged in and still performing network functions when our ticket is about to expire, a ticket granting ticket is about to expire. Then are
well, actually go back out transparently.
We'll go back out and will renew, and we'll get a new ticket granting ticket. And this all happens in the background.
if our time expires, then we'll get a session time out. This this is like if you're connected to a remote server and they you authenticate with them. They're using Curb Rose and then you get a message that says, Hey, your session timed out are taking, granting ticket timed out. We weren't performing functions. We didn't keep
re issuing and keep getting new ticket granting tickets.
So are ticket granting. Picket ran out. We tried to ask for a service ticket and then the ticket granting service said Sorry. Your ticket granting ticket is expired. It's no longer good.
just remember from our curb, Bo's Arco bro's standpoint are big things that we need to remember are going to be. Our three heads are key distribution center, which is made up of our authentication service, which is who we send a username and password to our ticket granting service that sends us our ticket granting ticket
in our service ticket
and then our that's our three heads
key distribution center, our authentication service and our ticket granting service. These are all our curb rose authentication method, and it allows us to only have to pass our user name and password to our authentication service and then be able to receive tickets that we used to get into the fair and then get into our different network functions.
Subsequently requesting these service tickets which let the file server know that we have been authenticated and what we have permissions to.