Defending against attacks: Simulation and working of Kerberos protocol for mutual authentication
Procedure
This experiment simulates the Kerberos authentication protocol. Follow these steps to complete the simulation:
Initiate Authentication:
- Select the Client as the source and the Authentication Server (AS) as the destination.
- This represents the client requesting a Ticket-Granting Ticket (TGT).
- Draw the line to represent this request.
Receive TGT:
- The AS will respond to the Client. Select the AS as the source and the Client as the destination.
- This simulates the AS sending the TGT and a session key to the client.
- Draw the line for this step.
Request Service Ticket:
- Select the Client as the source and the Ticket-Granting Server (TGS) as the destination.
- The client sends the TGT to request a service ticket.
- Draw the corresponding line.
Receive Service Ticket:
- The TGS validates the TGT and sends a service ticket to the client.
- Select the TGS as the source and the Client as the destination.
- Draw this communication line.
Access the Service:
- The client can now request access to the desired service (e.g., a file server).
- Select the Client as the source and the Service/Server as the destination.
- Draw the line representing the service request with the service ticket.
Verify Your Work:
- Once you have drawn all the lines representing the Kerberos workflow, click the Verify button to check if the sequence is correct.
Note: Select the source and destination for each step carefully. After selecting them, choose the appropriate label for the communication and click "Create Line".