13. Network Protocols

  Рет қаралды 183,928

MIT OpenCourseWare

MIT OpenCourseWare

Күн бұрын

MIT 6.858 Computer Systems Security, Fall 2014
View the complete course: ocw.mit.edu/6-8...
Instructor: Nickolai Zeldovich
In this lecture, Professor Zeldovich discusses the Kerberos authentication service.
License: Creative Commons BY-NC-SA
More information at ocw.mit.edu/terms
More courses at ocw.mit.edu

Пікірлер: 32
@veramentegina
@veramentegina 4 жыл бұрын
I love Dr. Nickolai's enthusiasm and passion in lecturing. Pleasure to listen to him teaching. He makes it fun.
@عبدالغني-ب9ص
@عبدالغني-ب9ص 7 ай бұрын
In kerberos once the auth is a success a TGT is issued and presented to the TGS, once the TGS confirms the TGT the user is granted access to the service. Auth -> auth service TGT -> ticket granting ticket (temporary validity) TGS -> ticket granting server The combination of these three is royally referred to as The Key Distribution Center. The KDC serves as the central authority responsible for authenticating users, issuing tickets, and facilitating secure communication within the Kerberos realm.
@JMROMERO95
@JMROMERO95 9 жыл бұрын
I think this was a really good lecture... However, I'd suggest to change the title. It must be called "Kerberos protocol" or something like that. But still, very, very, veeeery good lecture. :)
@noguide
@noguide 6 жыл бұрын
I don't know how many other OCW MIT courses you have done, but what I have observed is that MIT's approach to teaching seems to be to use a case study, like Kerberos in this lecture, to explain general principles, rather than the other way around, as is often the case in lesser universities. They have a long history of teaching non trivial concepts, and must have found that this approach is better pedagogically, and rather than starting the lectures with pure theory they have found that starting with something concrete works much better. MIT's goal is also to teach students how to think critically about systems, rather than just taking theory at face value. This is best accomplished with case studies. This approach is very obvious in the prereq for this course, the excellent 6.033. Why else do you think the professor asks so many questions, why this, why that, make students participate? It is so that students can discover, think about and learn general principles from a concrete example, rather than memorizing blindly. This kind of interaction is only possible during a lecture; you can learn theory by reading a book (or books), which by now should be obvious to you that you must do to complement the lecture. This lecture actually forms a continuum with the next lecture (SSL & HTTPS). Why start with a less familiar protocol, like Kerberos? The reason is that it deals with a simpler problem, at a smaller scale. Conclusion: this is lecture is not really about Kerberos, and the title is right. I want to stress this point, because it is crucial if you don't want to be disappointed by MIT OCW courses: MIT's philosophy is not to teach specific technologies or the latest fads, but rather to hammer in timeless principles that will be applicable to whichever technology happens to be in vogue. Once you understand the general principles well, learning the details by yourself is a walk in the park. If you don't like this approach then you should try other courses.
@captain6876
@captain6876 4 жыл бұрын
@@noguide manz sounds offended.
@jamesf6039
@jamesf6039 Жыл бұрын
@@captain6876 Your comment is useless garbage
@TheLous113
@TheLous113 3 жыл бұрын
How to discover the password by brute force as the teacher asked at the minute 31:15? The password is hashed on Kc. But the attacker does not know the Kc, only the encrypted message: {{Tc,s}Ks, Kc,s}Kc. He can try brute force the encrypted message: {{Tc,s}Ks, Kc,s}Kc, but he has no idea what is the true value of {{Tc,s}Ks, Kc,s}Kc, he can try all Kc possibles, include the correct key, and he won't know if the result found is the correct one.
@عبدالغني-ب9ص
@عبدالغني-ب9ص 7 ай бұрын
couldn't have said better, the system is designed to exhaust the idea of brute forcing. Afterall, how are you suppose to brute force a system that has rate limiting and account lockout policies let alone the other features.
6 жыл бұрын
So I thank God there are Stanford classes available on youtube, while some guys just leave in the middle of lesson
@conallogribin
@conallogribin 3 жыл бұрын
They realise they aren't worthy. it's only fair ;)
@Arbiteroflife
@Arbiteroflife 3 жыл бұрын
This is MIT
@makharsa12
@makharsa12 6 жыл бұрын
Aside from the great lecture, the accent is just top notch. Thanks MIT
@fwily2580
@fwily2580 4 жыл бұрын
Reminds me of my community college teacher.
@RohitSoni010
@RohitSoni010 3 жыл бұрын
Can somebody tell me that " How credentials are synced between server and kdc". Thanks in advance
@taiquangong9912
@taiquangong9912 3 жыл бұрын
Passing the hash would work here.
@peppigue
@peppigue 2 жыл бұрын
I really like this guy, but this particular lecture was a mess. Wish it centered on a visualization of client, server, key server, and attacker. Then point out how each implementation discussed related to/fit in in that picture.
@shyamkedia4202
@shyamkedia4202 3 жыл бұрын
you skip first 20 seconds until you realize you are addicted to them!
@mariofredrick1501
@mariofredrick1501 3 жыл бұрын
nice
@tlopez5069
@tlopez5069 3 жыл бұрын
Which textbooks are used for this course?
@mitocw
@mitocw 3 жыл бұрын
See the Readings section for details: ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/readings/. Best wishes on your studies!
@bikeshack8225
@bikeshack8225 4 жыл бұрын
if I make a comment about wumao will it be censored by youtube?
@YouMeverse
@YouMeverse Ай бұрын
IIT NPTEL lectures are more systematic and better compared to MIT. They are using big boards and chocks, which is very annoying.
@cjonam
@cjonam 3 жыл бұрын
guy just walked away in middle of class..will never happen in india :)
@TheDavidlloydjones
@TheDavidlloydjones 9 жыл бұрын
Higher education over the Internet is *the* killer app of the 21st century. It therefore seems sorta dumb to be cluttering it up with all that stuff at the beginning about classrooms. Or is this yer avvidge normal corroborative detail intended to give some similitude of veracity to an otherwise bald and uninteresting narrative? (Tip o' the 'at...) -dlj.
@MAlgMAlg1
@MAlgMAlg1 6 жыл бұрын
www.reddit.com/r/iamverysmart/
@marineplaysairsoft
@marineplaysairsoft 6 жыл бұрын
www.nimh.nih.gov/health/topics/schizophrenia/index.shtml
@24reyeser
@24reyeser 5 жыл бұрын
This professor is so bad
@captain6876
@captain6876 4 жыл бұрын
Ikr
14. SSL and HTTPS
1:18:18
MIT OpenCourseWare
Рет қаралды 224 М.
19. Anonymous Communication
1:20:13
MIT OpenCourseWare
Рет қаралды 21 М.
"كان عليّ أكل بقايا الطعام قبل هذا اليوم 🥹"
00:40
Holly Wolly Bow Arabic
Рет қаралды 14 МЛН
إخفاء الطعام سرًا تحت الطاولة للتناول لاحقًا 😏🍽️
00:28
حرف إبداعية للمنزل في 5 دقائق
Рет қаралды 84 МЛН
🕊️Valera🕊️
00:34
DO$HIK
Рет қаралды 12 МЛН
1 сквиш тебе или 2 другому? 😌 #шортс #виола
00:36
MIT Introduction to Deep Learning | 6.S191
1:09:58
Alexander Amini
Рет қаралды 658 М.
КАК УСТРОЕН TCP/IP?
31:32
Alek OS
Рет қаралды 186 М.
Necessity of complex numbers
7:39
MIT OpenCourseWare
Рет қаралды 2,6 МЛН
TCP/IP for Programmers
3:03:31
Eli the Computer Guy
Рет қаралды 198 М.
1. Introduction, Threat Models
1:17:13
MIT OpenCourseWare
Рет қаралды 804 М.
OSI and TCP IP Models - Best Explanation
19:20
_Drunk Engineer_
Рет қаралды 483 М.
what is TCP/IP and OSI? // FREE CCNA // EP 3
12:04
NetworkChuck
Рет қаралды 1,1 МЛН
Top 8 Most Popular Network Protocols Explained
6:25
ByteByteGo
Рет қаралды 345 М.
"كان عليّ أكل بقايا الطعام قبل هذا اليوم 🥹"
00:40
Holly Wolly Bow Arabic
Рет қаралды 14 МЛН