Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Difference between SSL and Kerberos authentication?

I am trying to understand what's the actual difference between SSL and Kerberos authentications, and why sometimes I have both SSL traffic and Kerberos. Or does Kerberos use SSL in any way?

Anyone could help? Thank you!

like image 412
Layla Avatar asked Sep 21 '08 16:09

Layla


People also ask

What is the main difference between SSL and Kerberos?

While SSL uses public-key encryption. Kerberos is not patented; therefore, it provides free services and is open-source software. SSL is patented; hence, it does not provide free services. Kerberos is executed in Microsoft products like Windows 2000, Windows XP, and so on.

What is meant by Kerberos authentication?

Kerberos authentication is a multistep process that consists of the following components: The client who initiates the need for a service request on the user's behalf. The server, which hosts the service that the user needs access to. The AS, which performs client authentication.

What are the 3 main parts of Kerberos?

Kerberos has three parts: a client, server, and trusted third party (KDC) to mediate between them. Clients obtain tickets from the Kerberos Key Distribution Center (KDC), and they present these tickets to servers when connections are established.


1 Answers

SSL uses public key cryptography:

  1. You (or your browser) has a public/private keypair
  2. The server has a public/private key as well
  3. You generate a symmetric session key
  4. You encrypt with the server's public key and send this encrypted session key to the server.
  5. The server decrypts the encrypted session key with its private key.
  6. You and the server begin communicating using the symmetric session key (basically because symmetric keys are faster).

Kerberos does not use public key cryptography. It uses a trusted 3rd party. Here's a sketch:

  1. You both (server and client) prove your identity to a trusted 3rd party (via a secret).
  2. When you want to use the server, you check and see that the server is trustworthy. Meanwhile, the server checks to see that you are trustworthy. Now, mutually assured of each others' identity. You can communicate with the server. 2
like image 143
Chris Avatar answered Oct 10 '22 23:10

Chris