looks like there is an error, in Kerberos the Client does not send the password to AS
@balakumarveluАй бұрын
best & quick video
@Jumper53 Жыл бұрын
Thx super helpfull😊
@beymax1210 Жыл бұрын
Very good demonstration can i know which software you used and seriously i loved the speech voice can you tell me how yoou generatedd it
@proudestberozgaar7 ай бұрын
00:04 Kerberos is a single sign-on network authentication protocol 00:22 Kerberos contains three essential components 00:39 Kerberos facilitates secure authentication process. 00:57 Client's password sent to authentication server 01:13 Authentication server sends the client a TGT 01:31 Client requests ticket from Key Distribution Center (KDC) 01:44 Client forwards key to file server 02:03 Kerberos provides time-limited access to file server
@ggxue Жыл бұрын
different key = the next object secret key
@crazyrider755010 ай бұрын
Wow well understood ❤lots of love from India❤
@DailyLearnings1 Жыл бұрын
0:53 password is never shared on network in Kerberos
@egasimov2 жыл бұрын
For the first time, client sends data {username(userId) in plain text && password encrypted with his hashed(password)} In Kerberos system, Authentication server verifies the client by trying do decrypt the encrypted text - user's password, with the key - hashed password (corresponds to userId in database). Does it enough for Kerberos to be able to decrypt the cipher text successfully and allows Authentication Server fully verify client ? How to be sure that decrypted text is actuall password of user ? One solution might come to mind is just by recomputing its hash and comparing them. Could you, please clarify ?
@andrey2604 Жыл бұрын
you are little bit wrong, user sends only plaintext userid on first step, then auth server creates 2 messages: 1.) ticket granting session key encrypted with users password hash, 2.) ticket granting ticket + copy of a tg session key, encrypting it with the secret only known to ticket granting server and send these messages back to client, where user can decrypt one of them using its hashed password.
@enzoscandelt3350 Жыл бұрын
is the kerberos server in another machine?
@hyp3rvirus7 күн бұрын
wrong thing. Server or service has never connected to KDC because KDC knows both of keys of client and server. So TGS server sends encrypted Ticket (not Token) by Server key to client. Then client connects to Server. The Server decrypts TGS by key from keytab then both create established GSS context that lives 8 hours.
@mustafacagal4300 Жыл бұрын
The user doesn't send password to server in Kerberos.
@albanec4702 Жыл бұрын
yep, they make a shared secret(watch Diffie-Hellman for example)