Client And The Server Steps example essay topic

554 words
ssh Used to protect against IP spoofing and source routingSSLUsed to provide security for general Internet servicesSATANUsed for remote scanning of Unix and firewall systemsKerberosUsed to reduce system vulnerability to. r hosts attacks Features of the Client / Server authentication exchange: The client uses the session key from the credentials obtained for the server for a KRB AP REP message The client and server share an encryption key that can be used by the application The client verifies that the time stamp field matches that in the authenticator it sent to the serverotherBegins with a prefix followed by a colon and the rest of the namedomainConsists of components separated by periods. 500. Contains an equals sign with the components separated by slashesreservedHas no names assigned to it. Steps used in the authentication process of Kerberos are sequenced as: A: The client sending a request to the Authentication Server for a ticket: The TIcket Granting Ticket being supplied to the client: The client requesting a ticket from the Ticket Granting Server: A Ticket for the application server or the TIcket Granting Server being provided: The Client transmitting the ticket containing the client's identity: The session key shared by the client authenticating the client and the server Steps involved in the search for network vulnerabilities by SATAN: Scanning the hosts within a proximity level away from the target Generating reports from the database with the search information Initiating a search when informed about the target. 1 Local users gain read access to files on the local system 2 Local users gain execute access to non root-owned files 3 Local users gain write access to root-owned files 4 Remote users gain read access to files on the system 5 Remote users gain execute access to non root-owned files 8 Remote users across a firewall gain write access to files Method involved in the phase of obtaining access to a system during a network attack: Exploiting existing holes on a UNIX system Solution to the Kerberos workstation authentication problem is: requesting an r cmd. ticket. Features of KRB PRIV exchange: The client the cipher text to the recipient, after the user data and control info are encrypted The recipient verifies that the operating system's report of the sender's address matches the sender's address in the message The application decrypts the cipher text and processes the resultant plaintext Features of the inter-realm operation include the: exchange of keys btw n 2 realms registration of the client Features of the Ticket Granting Service exchange: The client makes a request for the Ticket Granting Ticket for the destination realm The encryption and decryption do not take place with the client's key The Kerberos database is queried to retrieve the record for the requested server Features of the Authentication Service exchange: The processing of the KRB AS REQ message results in the creation of a ticket for the client to present to the server The client can specify a number of options in the KRB AS REQ request message, such as to check whether the ticket should be postdated The client sends its own identity and the identity of the server to the Key Distribution Center The client verifies the KRB AS REP message by comparing the came and cream fields in the reply with the request.