HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 132

Communicate with Jane/DSG.COM Ticket: Service Ticket

Page 132 highlights

One day, an entrepreneur in the Bay Area of California decided open up a new business. He had surveyed the city and realized that there were many young single male geeks out there. These geeks were very intellectually sharp, but often lived in studio apartments, ate fast food, worked a lot of hours, and most importantly, most of them would stutter and turn red if a lady talked to them. This entrepreneur had figured out that (1) geeks have a lot of money, (2) geeks like technology, (3) geeks are worried about being taken advantage of, and (4) geeks like ladies. He decided to open up a business to help them out. He called this business "Dating Service for Geeks" or DSG. To become a member of DSG, everyone must first pass extensive background checks, pay monthly dues, and have to go through randomized background checks in the future. Once they became a member, they are issued a software program and a password. The software program connected all the members of the DSG to its Authentication Server where their membership in DSG was proven. Once the DSG authenticated the user as being a member of DSG, the DSG would hand out two more items: A Membership Contact Ticket and a Membership Authenticator, both of which were good for about 24 hours; after which, the member of DSG had to use the software program again. Now the entrepreneur really starts to earn his money - he doesn't bother creating a dating web site like other companies do. He simply tells the members of DSG: simply put your membership identity in the text fields of any of the "free" dating services that you currently are a member of. This process allowed our entrepreneur not to invest in web sites and databases and allowed DSG's members to utilize other dating web sites if they wished. Tom, a member of DSG would login to DSG (using the software program) and get his membership contact ticket and his membership authenticator. He would then begin browsing his favorite dating service web site. Tom found someone he liked, a lady named Jane, and Jane had a DSG membership identifier in her profile. It was Jane/DSG.COM. Tom, using the software program to communicate with the DSG Ticket Service, would contact DSG and use his membership contact ticket to obtain a "Communicate with Jane/DSG.COM" ticket and he would provide his membership authenticator to prove he was Tom (and not have to enter his password again). DSG creates a secret key and places it in the "Communicate with Jane/DSG.COM" ticket and also secures it using Tom's membership authenticator and sends it to Tom. DSG has an email service that requires valid "Communicate with X" DSG tickets to work correctly. Using the DSG software program, Tom can send Jane an email for as long as the "Communicate with Jane" ticket is valid. If Jane wasn't a member of DSG or wasn't authenticated to DSG, then the "Communicate with Jane/DSG.COM" ticket couldn't have been issued. Once communication has been established, Tom and Jane know that both of them have gone through DSG's membership process and the background checks associated with it. Let's correlate some of the analogy back to Kerberos terms: • DSG membership id: principal@REALM • DSG Authentication Service: KDC Authentication Service • DSG Ticket Service: KDC Ticket Granting Service • DSG Membership Authenticator: Authenticator • Membership Contact Ticket: Ticket Granting Ticket • "Communicate with Jane/DSG.COM Ticket": Service Ticket Let's look at some diagrams to help cement this Kerberos knowledge. Refer to Figure 52 - Kerberos Transactions. 132

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

132
One day, an entrepreneur in the Bay Area of California decided open up a new business.
He had surveyed the city
and realized that there were many young single male geeks out there.
These geeks were very intellectually sharp, but often
lived in studio apartments, ate fast food, worked a lot of hours, and most importantly, most of them would stutter and turn red if
a lady talked to them.
This entrepreneur had figured out that (1) geeks have a lot of money, (2) geeks like technology, (3)
geeks are worried about being taken advantage of, and (4) geeks like ladies.
He decided to open up a business to help them
out.
He called this business “Dating Service for Geeks” or DSG.
To become a member of DSG, everyone must first pass
extensive background checks, pay monthly dues, and have to go through randomized background checks in the future.
Once
they became a member, they are issued a software program and a password.
The software program connected all the
members of the DSG to its Authentication Server where their membership in DSG was proven.
Once the DSG authenticated
the user as being a member of DSG, the DSG would hand out two more items: A Membership Contact Ticket and a
Membership Authenticator, both of which were good for about 24 hours; after which, the member of DSG had to use the
software program again.
Now the entrepreneur really starts to earn his money – he doesn’t bother creating a dating web site
like other companies do.
He simply tells the members of DSG: simply put your membership identity in the text fields of any of
the “free” dating services that you currently are a member of.
This process allowed our entrepreneur not to invest in web sites
and databases and allowed DSG’s members to utilize other dating web sites if they wished.
Tom, a member of DSG would login to DSG (using the software program) and get his membership contact ticket and
his membership authenticator.
He would then begin browsing his favorite dating service web site.
Tom found someone he
liked, a lady named Jane, and Jane had a DSG membership identifier in her profile.
It was
Jane/DSG.COM
. Tom, using the
software program to communicate with the DSG Ticket Service, would contact DSG and use his membership contact ticket to
obtain a “Communicate with Jane/DSG.COM” ticket and he would provide his membership authenticator to prove he was Tom
(and not have to enter his password again).
DSG creates a secret key and places it in the “Communicate with
Jane/DSG.COM” ticket and also secures it using Tom’s membership authenticator and sends it to Tom.
DSG has an email
service that requires valid “Communicate with X” DSG tickets to work correctly.
Using the DSG software program, Tom can
send Jane an email for as long as the “Communicate with Jane” ticket is valid.
If Jane wasn’t a member of DSG or wasn’t
authenticated to DSG, then the “Communicate with Jane/DSG.COM” ticket couldn’t have been issued.
Once communication
has been established, Tom and Jane know that both of them have gone through DSG’s membership process and the
background checks associated with it.
Let’s correlate some of the analogy back to Kerberos terms:
DSG membership id: principal@REALM
DSG Authentication Service: KDC Authentication Service
DSG Ticket Service: KDC Ticket Granting Service
DSG Membership Authenticator: Authenticator
Membership Contact Ticket: Ticket Granting Ticket
“Communicate with Jane/DSG.COM Ticket”: Service Ticket
Let’s look at some diagrams to help cement this Kerberos knowledge.
Refer to Figure 52 - Kerberos
Transactions.