Kerberos, Software Flaws and Malware




CS166

Chris Pollett

Nov 26, 2012

Outline

Kerberos

Motivation for Kerberos

Kerberos KDC

Kerberos Tickets

Kerberized Login

Kerberized Login

Kerberos Login

Alice Requests "Ticket to Bob"

Alice wants a ticket to Bob

Alice Uses Ticket to Bob

Using a ticket to Bob

Kerberos -- What's used for what

Kerberos Questions

Kerberos Alternatives

Kerberos Keys

Quiz

Which of the following is true?

  1. The ESP/AH phase of IPsec is used for mutual authentication
  2. SSL guarantees mutual authentication
  3. The Public Key variant of IKE phase 1 allows for plausible deniability.

Software and Security

Bad Software is Ubiquitous

Software Issues -- Good Guy/Bad Guy Roles

Complexity

Some examples of numbers of lines of code

Lines of Code and Bugs

Software Security Topics

Program Flaws

Example

char array[10];
for(i = 0; i < 10; ++i )
    array[i] = 'A';
array[10] = 'B'; 

Secure Software

Program Flaws

Possible Buffer Overflow Attack Scenario

Buffer Overflow

int main()
{
    int buffer[10];
    buffer[20] = 37;
}

Simple Buffer Overflow