In an in­creas­ing­ly digitized world where private and com­mer­cial data is stored and trans­mit­ted elec­tron­i­cal­ly, cy­ber­crime is an ever-growing problem. Through the use of ar­ti­fi­cial in­tel­li­gence, hackers are finding more ways to optimize their attacks. For this reason, en­crypt­ing data through elec­tron­ic security pro­ce­dures is more important than ever. Find out what Kerberos au­then­ti­ca­tion is all about, how it works, and what its strengths and weak­ness­es are.

$1 Domain Names – Grab your favorite one
  • Simple reg­is­tra­tion
  • Premium TLDs at great prices
  • 24/7 personal con­sul­tant included
  • Free privacy pro­tec­tion for eligible domains

What is Kerberos?

Kerberos is an au­then­ti­ca­tion service used in open or unsecure computer networks. Thus, the security protocol au­then­ti­cates service requests between two or more trusted hosts over an untrusted network such as the Internet. Cryp­to­graph­ic en­cryp­tion and a trusted third party are used to au­then­ti­cate client-server ap­pli­ca­tions and verify user iden­ti­ties.

Kerberos is main­tained as an open-source project by the Kerberos Con­sor­tium. It has its origins in the 1980s when the Mass­a­chu­setts Institute of Tech­nol­o­gy (MIT) developed the protocol for its Athena project at the time. Today, Kerberos is the standard Microsoft Windows au­tho­riza­tion tech­nol­o­gy. However, Kerberos im­ple­men­ta­tions exist for other operating systems such as Apple OS, FreeBSD, UNIX, and Linux. Microsoft in­tro­duced its version of the Kerberos protocol in Windows 2000. It became a standard protocol for websites and single sign-in im­ple­men­ta­tions across various platforms.

Fact

Kerberos au­then­ti­ca­tion got its name from Greek mythology – the legendary three-headed dog Kerberos (also known as Cerberus), which guards the entrance to the un­der­world. In the tales, Kerberos has a ser­pen­tine tail and a par­tic­u­lar­ly ag­gres­sive demeanor, which makes it an effective guardian. In the case of the Kerberos protocol, the three heads represent the client, the server, and the Key Dis­tri­b­u­tion Center (KDC). The latter acts as a “trusted third party”.

Users, computers, and services that use Kerberos rely on the KDC, which provides two functions in a single process: au­then­ti­ca­tion and ticketing. So-called “KDC tickets” au­then­ti­cate all parties by verifying the identity of all nodes – the starting and ending points of logical con­nec­tions. In doing so, the Kerberos au­then­ti­ca­tion process uses con­ven­tion­al shared-secret cryp­tog­ra­phy that prevents trans­mit­ted data packets from being read or modified. This also protects them from eavesdrop and replay attacks.

Tip

Want to use the cloud to access your data anytime, anywhere, without com­pro­mis­ing on security? Use HiDrive cloud storage from IONOS that protects your sensitive data with end-to-end en­cryp­tion and ad­di­tion­al two-factor au­then­ti­ca­tion.

What’s the dif­fer­ence between Kerberos and NTLM?

Kerberos and NTLM are network protocols that form a subgroup in the Internet Protocols (IPs) family. Both are au­then­ti­ca­tion methods that use TCP (Trans­mis­sion Control Protocol) or UDP (User Datagram Protocol). NTLM stands for NT LAN Manager and was developed before Kerberos. It is a challenge-response au­then­ti­ca­tion protocol in which the target computer requests a password, which is then verified and stored as password hashes for further use.

Tip

Find out how TCP and IP interact in our com­pre­hen­sive guide on TCP/IP.

One of the main dif­fer­ences between Kerberos and NTLM is third-party ver­i­fi­ca­tion. In that way, Kerberos has a stronger en­cryp­tion function than NTLM because the extra step adds another layer of security. NTLM, meanwhile, can be cracked rel­a­tive­ly easily, which is why it is con­sid­ered insecure these days and should not be used. However, both au­then­ti­ca­tion protocols are still im­ple­ment­ed in the Windows au­then­ti­ca­tion module.

The Security Support Provider (SSP) Negotiate, which acts as the ap­pli­ca­tion layer between the Security Support Provider Interface (SSPI) and the other SSPs, au­to­mat­i­cal­ly chooses between Kerberos and NTLM au­then­ti­ca­tion in a ne­go­ti­a­tion process. If available, the Kerberos protocol is used, otherwise NTLM is used.

While Kerberos is usually im­ple­ment­ed in Microsoft products starting with Windows 2000 and Windows XP, there are other common security protocols for web browsing, messaging, and email. For example, the security protocol SSL or TLS encrypts the con­nec­tion between a web server and a browser. This ensures that all data trans­mit­ted remains protected and cannot be read. Just like Kerberos, SSL works with the TCP protocol, but uses a public-key en­cryp­tion method.

Tip

For the best possible pro­tec­tion of your data and your customers’ data, IONOS uses highly secure SSL en­cryp­tion tech­nol­o­gy including wildcard SSL cer­tifi­cate when securing your vServers and your domain.

How does Kerberos au­then­ti­ca­tion work?

To help un­der­stand how Kerberos au­then­ti­ca­tion works, we'll break it down into its core com­po­nents. Here are the main com­po­nents involved in a typical Kerberos workflow:

  • Client: The client acts “on behalf” of the user and initiates com­mu­ni­ca­tion when a service request is made.
  • Hosting server: This is the server that hosts the service that the user wants to access.
  • Au­then­ti­ca­tion Server (AS): The AS performs the desired client au­then­ti­ca­tion. If the au­then­ti­ca­tion is suc­cess­ful, the AS issues a ticket to the client, the TGT (Ticket Granting Ticket). This ticket assures the other servers that the client is au­then­ti­cat­ed.
  • Ticket Granting Server (TGS): The TGS is an ap­pli­ca­tion server that issues service tickets.
  • Key Dis­tri­b­u­tion Center (KDC): The KDC consists of the Au­then­ti­ca­tion Server (AS) and the Ticket Granting Server (TGS).

Now let’s move on to the protocol flow, which is shown in the diagram.

Step 1: The client makes an encrypted request to the au­then­ti­ca­tion server. When the AS receives the request, it searches the Kerberos database for the password based on the user ID. If the user has entered the correct password, the AS decrypts the request.

Step 2: After verifying the user, the AS issues a Ticket Granting Ticket (TGT), which is sent back to the client.

Step 3: The client now sends the TGT to the TGS. Together with the TGT, the client “explains” the reason for accessing the hosting server. The TGS decrypts the ticket using the secret key shared between the AS and the TGS.

Step 4: If the TGT is valid, the TGS issues a service ticket for the client.

Step 5: The client sends the service ticket to the hosting server. The server decrypts the ticket using the secret key shared between the server and TGB.

Step 6: If the secret keys match, the hosting server allows the client to access the service. The service ticket de­ter­mines how long the user is allowed to use the service. Once the access expires, it can be renewed with the Kinit command by going through the entire Kerberos au­then­ti­ca­tion protocol again.

Strengths and weak­ness­es of Kerberos

Kerberos is con­sid­er­ably more secure than NTLM. In fact, third-party au­tho­riza­tion makes it one of the most secure ver­i­fi­ca­tion protocols in the IT world. In addition, passwords are never shared in plain text. “Secret keys” are trans­mit­ted in the system only in encrypted form. Kerberos also makes it very easy to track who requested what and when.

Trans­par­ent and accurate logs are essential for security audits in or­ga­ni­za­tions of all sizes. They also have excellent access control to the log. What’s more, the service lets users and service systems au­then­ti­cate each other. At every step of the au­then­ti­ca­tion process, both users and server systems know they are dealing with an authentic coun­ter­part. And over the years, many security experts have tried to hack the open-source project, resulting in con­tin­u­ous im­prove­ments.

Naturally, Kerberos has some vul­ner­a­bil­i­ties. For example, if the Kerberos server fails, users cannot log in. Fallback au­then­ti­ca­tion mech­a­nisms and secondary servers often serve as a solution to this problem. There are also strict timing re­quire­ments: The date/time con­fig­u­ra­tions of the hosts involved must always be syn­chro­nized within pre­de­fined limits. Otherwise, au­then­ti­ca­tions fail because tickets are only available to a limited extent.

Some legacy systems are not com­pat­i­ble with third-party au­then­ti­ca­tion mech­a­nisms. And although the passwords in Kerberos au­then­ti­ca­tion are usually secure, they can now be cracked by hackers through brute force attacks or stolen through phishing attacks. This is one reason why mul­ti­fac­tor au­then­ti­ca­tion (MFA) is becoming an in­creas­ing­ly popular means of pro­tect­ing online iden­ti­ties.

Note

By default, Windows does not perform Kerberos au­then­ti­ca­tion if the host name is an IP address. It then falls back on other enabled au­then­ti­ca­tion protocols such as NTLM, which must be disabled manually. Learn how to find your find IP address here.

Go to Main Menu