{"id":5357,"date":"2022-11-11T18:20:34","date_gmt":"2022-11-11T10:20:34","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=5357"},"modified":"2022-11-11T18:20:34","modified_gmt":"2022-11-11T10:20:34","slug":"kerberos-%e5%8d%8f%e8%ae%ae%e5%ad%a6%e4%b9%a0","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/5357.html","title":{"rendered":"Kerberos \u534f\u8bae\u5b66\u4e60"},"content":{"rendered":"\n<p>=Start=<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7f18\u7531\uff1a<\/h4>\n\n\n\n<p>\u5176\u5b9e\u5f88\u65e9\u5c31\u60f3\u597d\u597d\u5b66\u4e60\u4e86\u89e3\u4e00\u4e0b Kerberos \u534f\u8bae\uff0c\u4f46\u82e6\u4e8e\u8fd9\u4e2a\u534f\u8bae\u786e\u5b9e\u4e0d\u5bb9\u6613\u7406\u89e3\uff0c\u4e14\u6ca1\u6709\u9047\u5230\u5408\u9002\u7684\u573a\u666f\u5e2e\u52a9\u6d88\u5316\uff0c\u6240\u4ee5\u4e4b\u524d\u53ea\u662f\u6536\u96c6\u4e86\u4e00\u5806\u8d44\u6599\uff0c\u770b\u4e86\u51e0\u5f20\u56fe\uff0c\u5bf9\u4e8e\u5b9e\u9645\u7684\u6570\u636e\u4ea4\u4e92\u6d41\u7a0b\u4ee5\u53ca\u4e3a\u4ec0\u4e48\u8fd9\u4e48\u8bbe\u8ba1\uff0c\u80fd\u89e3\u51b3\u4ec0\u4e48\u95ee\u9898\u8fd8\u662f\u4e0d\u591f\u4e86\u89e3\uff0c\u61f5\u61f5\u61c2\u61c2\u7684\u3002\u4e0a\u6b21\u521a\u597d\u627e\u673a\u4f1a\u7814\u7a76\u4e86\u4e00\u4e0b CAS \u534f\u8bae\uff0c\u4e86\u89e3\u5230CAS\u534f\u8bae\u7684\u8bbe\u8ba1\u601d\u8def\u5438\u6536\u4e86 Kerberos \u534f\u8bae\u7684\u601d\u60f3\uff0c\u518d\u52a0\u4e0a\u627e\u5230\u4e86\u51e0\u7bc7\u5f88\u597d\u7684\u6587\u7ae0\uff0c\u8fd9\u6b21\u7ec8\u4e8e\u5bf9 Kerberos \u534f\u8bae\u6709\u4e86\u4e00\u5b9a\u7684\u4e86\u89e3\uff0c\u7b80\u5355\u8bb0\u5f55\u4e00\u4e0b\uff0c\u65b9\u4fbf\u4ee5\u540e\u53c2\u8003\u3001\u590d\u4e60\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u6b63\u6587\uff1a<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n\n\n\n<h4 class=\"wp-block-heading\">Kerberos \u534f\u8bae\u7684\u76ee\u6807\u548c\u4f5c\u7528<\/h4>\n\n\n\n<p><strong>Kerberos \u534f\u8bae\u65e8\u5728\u5728\u5f00\u653e\u4e14\u4e0d\u5b89\u5168\u7684\u7f51\u7edc\u4e0a\u63d0\u4f9b\u53ef\u9760\u7684\u8eab\u4efd\u9a8c\u8bc1\u3002<\/strong>\u5728\u8fd9\u79cd\u7f51\u7edc\u73af\u5883\u4e2d\uff0c\u4e3b\u673a\u4e4b\u95f4\u7684\u901a\u4fe1\u53ef\u80fd\u4f1a\u88ab\u62e6\u622a\u6216\u76d1\u542c\uff0c\u4f46\u662f\u7f51\u7edc\u4e2d\u7684\u4e3b\u673a\u672c\u8eab\u662f\u5b89\u5168\u53ef\u4fe1\u7684\uff0c\u5373<strong>\u53ef\u4fe1\u4e3b\u673a\u5728\u4e0d\u53ef\u4fe1\u7f51\u7edc\u4e0a\u7684\u8eab\u4efd\u9a8c\u8bc1<\/strong>\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u4e3a\u4ec0\u4e48\u9700\u8981 Kerberos \u534f\u8bae<\/h4>\n\n\n\n<p>Kerberos \u534f\u8bae\u7684\u76ee\u7684\u662f\u8eab\u4efd\u9a8c\u8bc1\u3002\u65e2\u7136\u662f\u8eab\u4efd\u9a8c\u8bc1\uff0c\u90a3\u6211\u76f4\u63a5\u8f93\u5165\u7528\u6237\u540d\u5bc6\u7801\u4e0d\u5c31\u597d\u4e86\uff0c\u4e3a\u4f55\u8981\u6709Kerberos\u8fd9\u6837\u4e00\u4e2a\u590d\u6742\u7684\u4e1c\u897f\uff1f\u4e3e\u4f8b\u6765\u8bf4\uff0c\u6709A\u3001B\u3001C\u4e09\u4e2a\u670d\u52a1\u5668\uff0c\u5206\u522b\u63d0\u4f9b\u4e0d\u540c\u7684\u670d\u52a1\uff0cuser\u8981\u8bbf\u95eeA\u3001B\u3001C\u90fd\u9700\u8981\u8f93\u5165\u7528\u6237\u540d\u5bc6\u7801\uff08\u8fd9\u8fd8\u662f\u4e0d\u540c\u670d\u52a1\u4f7f\u7528\u76f8\u540c\u5bc6\u7801\u7684\u7b80\u5355\u60c5\u51b5\uff09\uff0c\u4f46\u662fA\u3001B\u3001C\u6ca1\u5fc5\u8981\u90fd\u5b58\u4e00\u4efduser\u7684\u5bc6\u7801\uff0c\u6240\u4ee5\u5c31\u884d\u751f\u51fa\u4e00\u4e2a\u4e2d\u592e\u670d\u52a1\u5668D\u6765\u4e13\u95e8\u5b58\u50a8\u7528\u6237\u540d\u5bc6\u7801\uff1b\u5982\u679cuser\u901a\u8fc7\u4e86D\u7684\u8ba4\u8bc1\uff0c\u90a3\u5c31\u662f\u5408\u6cd5\u7684\u8eab\u4efd\uff0c\u5c31\u53ef\u4ee5\u4f7f\u7528A\u3001B\u3001C\u4e2d\u7684\u4efb\u4f55\u4e00\u4e2a\u670d\u52a1\uff0c\u6240\u4ee5user\u9700\u8981\u544a\u8bc9A\u3001B\u3001C\u5b83\u901a\u8fc7\u4e86D\u7684\u8ba4\u8bc1\u3002<strong>\u5982\u4f55\u8bc1\u660e\u8fd9\u4e2a\u4e8b\u60c5\uff0c\u4ee5\u53ca\u4fe1\u606f\u5728\u7f51\u7edc\u4f20\u8f93\u8fc7\u7a0b\u5982\u4f55\u9632\u6b62\u88ab\u622a\u83b7\u7be1\u6539\u800c\u5047\u5192\u7b49\u7b49\uff0c\u89e3\u51b3\u8fd9\u4e9b\u95ee\u9898\u5c31\u9760 Kerberos \u534f\u8bae\u3002<\/strong><\/p>\n\n\n\n<p>\u4ee5\u4e0a\u8fd9\u4e9b\u770b\u4e0a\u53bb\u662f\u4e0d\u662f\u548c\u73b0\u5728\u5927\u5bb6\u5e38\u542c\u5230\u548c\u7528\u5230\u7684 SSO \u534f\u8bae\u89e3\u51b3\u7684\u95ee\u9898\u5f88\u50cf\uff1f\u524d\u6bb5\u65f6\u95f4\u6211\u5728\u770b CAS \u534f\u8bae\u65f6\u5c31\u6709\u6587\u7ae0\u63d0\u5230 CAS \u534f\u8bae\u7684\u8bbe\u8ba1\u53c2\u8003\u4e86 Kerberos \u534f\u8bae\u7684\u601d\u60f3\uff0c\u800cCAS\u534f\u8bae\u73b0\u5728\u662f\u4f7f\u7528\u975e\u5e38\u5e7f\u6cdb\u7684 SSO \u534f\u8bae\uff0c\u4e5f\u662f\u4e00\u4e2a\u7b80\u5355\u800c\u5f3a\u5927\u7684\u57fa\u4e8e\u7968\u636e\u7684(ticket-based)\u534f\u8bae\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Kerberos \u534f\u8bae\u4e2d\u7684\u4e00\u4e9b\u6982\u5ff5\u3001\u540d\u8bcd\u89e3\u91ca<\/h4>\n\n\n\n<p>Kerberos\u7684\u6807\u5fd7\u662f\u4e09\u5934\u72d7\uff0c\u72d7\u5934\u5206\u522b\u4ee3\u8868\u4ee5\u4e0b\u89d2\u8272\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Client<\/li><li>KDC(Key Distribution Center)<\/li><li>Service<\/li><\/ul>\n\n\n\n<p>KDC \u8d1f\u8d23\u7968\u636e\u7684\u7ba1\u7406\uff0c\u4f46\u662f KDC \u4e0d\u662f\u4e00\u4e2a\u72ec\u7acb\u7684\u670d\u52a1\uff0c\u5b83\u4e3b\u8981\u7531\u4ee5\u4e0b\u4e24\u670d\u52a1\u7ec4\u6210\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>AS, Authentication Service \u5bf9client\u8fdb\u884c\u8ba4\u8bc1\u5e76\u751f\u6210TGT<\/li><li>TGS, Ticket Granting Service \u4e3aclient\u751f\u6210\u7279\u5b9a\u670d\u52a1\u7684ST<\/li><\/ul>\n\n\n\n<p>\u5728\u6df1\u5165\u4e86\u89e3 Kerberos \u534f\u8bae\u7684\u539f\u7406\u4e4b\u524d\uff0c\u5148\u6574\u7406\u4ecb\u7ecd\u4e00\u4e0b Kerberos \u534f\u8bae\u7684\u51e0\u4e2a\u5927\u524d\u63d0\uff0c\u6709\u52a9\u4e8e\u7406\u89e3\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>\u5728 Kerberos \u534f\u8bae\u4e2d\u4e0d\u4ec5\u7528\u6237(client)\u6709\u5bc6\u7801\uff0c\u670d\u52a1(service)\u4e5f\u6709\u5bc6\u7801\uff0c\u800c KDC \u77e5\u9053\u6240\u6709\u7684\u5bc6\u7801\uff0c\u5bc6\u7801\u5b58\u50a8\u5728\u5355\u4e2a\u96c6\u4e2d\u5f0f\u6570\u636e\u5e93\u4e2d\u3002<\/strong><\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Kerberos \u534f\u8bae\u57fa\u4e8e Ticket \u5b9e\u73b0\u8eab\u4efd\u8ba4\u8bc1\uff0c\u800c\u975e\u5bc6\u7801\uff0c\u4e14\u5bc6\u7801\u4e0d\u4f1a\u4ee5\u660e\u6587\u5f62\u5f0f\u901a\u8fc7\u7f51\u7edc\u53d1\u9001\u3002<\/mark>\u5982\u679c\u5ba2\u6237\u7aef\u65e0\u6cd5\u5229\u7528\u7528\u6237\u5bc6\u94a5\uff0c\u89e3\u5bc6\u51fa KDC \u8fd4\u56de\u7684\u52a0\u5bc6Ticket\uff0c\u5219\u8ba4\u8bc1\u65e0\u6cd5\u901a\u8fc7\uff0c\u4e5f\u5c31\u6ca1\u6709\u540e\u7eed\u6d41\u7a0b\u3002<\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u5ba2\u6237\u7aef(client)\u5c06\u4f9d\u6b21\u4e0e Authentication Service, Ticket Granting Service \u4ee5\u53ca\u76ee\u6807Service\u8fdb\u884c\u4ea4\u4e92\uff0c\u5171\u4e09\u6b21\u4ea4\u4e92\u3002<\/mark><\/li><li>\u5ba2\u6237\u7aef(client)\u4e0e\u5176\u4ed6\u670d\u52a1\u4ea4\u4e92\u65f6\uff0c\u90fd\u5c06\u83b7\u53d6\u5230\u4e3b\u8981\u5305\u542b\u4e24\u6761\u5185\u5bb9\u7684\u8fd4\u56de\uff0c\u5176\u4e2d\u4e00\u6761\u53ef\u4ee5\u901a\u8fc7\u7528\u6237\u5bc6\u94a5\u89e3\u5bc6\u51fa\uff0c\u53e6\u5916\u4e00\u6761\u5c06\u65e0\u6cd5\u89e3\u5bc6\u51fa\uff08\u9700\u8981\u7528\u4f1a\u8bdd\u5bc6\u94a5\u6216\u670d\u52a1\u5bc6\u94a5\u624d\u80fd\u89e3\u51fa\uff09\u3002<\/li><li><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u5ba2\u6237\u7aef(client)\u60f3\u8981\u8bbf\u95ee\u7684\u76ee\u6807\u670d\u52a1(service)\uff0c\u5c06\u4e0d\u4f1a\u76f4\u63a5\u4e0eKDC\u4ea4\u4e92\uff0c\u800c\u662f\u901a\u8fc7\u80fd\u5426\u6b63\u786e\u89e3\u5bc6\u51fa\u5ba2\u6237\u7aef\u7684\u8bf7\u6c42\u6765\u8fdb\u884c\u8ba4\u8bc1\u3002<\/mark><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Kerberos \u534f\u8bae\u7684\u8ba4\u8bc1\u6d41\u7a0b<\/h4>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"532\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2022\/11\/krbmsg.gif\" alt=\"\" class=\"wp-image-5358\"\/><\/figure>\n\n\n\n<ol class=\"wp-block-list\"><li>AS_REQ is the initial user authentication request (i.e. made with kinit) This message is directed to the KDC component known as Authentication Server (AS);<\/li><li>AS_REP is the reply of the Authentication Server to the previous request. Basically it contains the <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-foreground-color\">TGT (encrypted using the TGS secret key)<\/mark><\/strong> and <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">the session key (encrypted using the secret key of the requesting user)<\/mark>\u2014\u2014\u4f1a\u8bdd\u5bc6\u94a51\uff0c\u7531AS\u968f\u673a\u751f\u6210<\/strong>;<\/li><li>TGS_REQ is the request from the client to the Ticket Granting Server (TGS) for a service ticket. This packet includes the TGT obtained from the previous message and <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">an authenticator generated by the client and encrypted with the session key<\/mark><\/strong>;<\/li><li>TGS_REP is the reply of the Ticket Granting Server to the previous request. Located inside is the requested <strong>service ticket (encrypted with the secret key of the service)<\/strong> and <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">a service session key generated by TGS<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-foreground-color\">\uff08\u2014\u2014\u4f1a\u8bdd\u5bc6\u94a52\uff0c\u7531TGS\u968f\u673a\u751f\u6210\uff09<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\"> and encrypted using the previous session key generated by the AS<\/mark><\/strong>;<\/li><li>AP_REQ is the request that the client sends to an application server to access a service. The components are the <strong>service ticket obtained from TGS with the previous reply<\/strong> and <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">an authenticator again generated by the client, but this time encrypted using the service session key (generated by TGS)<\/mark><\/strong>;<\/li><li><strong>AP_REP is the reply that the application server gives to the client to prove it really is the server the client is expecting.<\/strong> This packet is not always requested. <strong>The client requests the server for it only when mutual authentication is necessary.<\/strong><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">Kerberos \u8ba4\u8bc1\u6d41\u7a0b\u4e2d\u7684\u6570\u636e\u4ea4\u4e92<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>PrincipalClient \u53ef\u4ee5\u7b80\u5355\u7406\u89e3\u4e3a username-\u7528\u6237\u540d\uff1b\nPrincipalService \u662f servicename-\u670d\u52a1\u540d\uff1b\nIP_list \u53ef\u4ee5\u7406\u89e3\u4e3a\u53ef\u5408\u6cd5\u4f7f\u7528ticket\u7684\u7f51\u7edc\u5730\u5740\u8303\u56f4\uff08\u5982\u679c\u89e3\u5bc6\u51fa\u6765\u7684IP\u5730\u5740\u4e0d\u5728IP_list\u8303\u56f4\u5185\uff0c\u53ef\u4ee5\u8ba4\u4e3a\u6b64ticket\u65e0\u6548\uff09\uff1b\nLifetime \u53ef\u4ee5\u7406\u89e3\u4e3a\u8fc7\u671f\u65f6\u95f4\u6216\u8005\u8bf4\u6709\u6548\u751f\u547d\u5468\u671f\u8303\u56f4\uff1b\nTgtRealm \u53ef\u4ee5\u7406\u89e3\u4e3a\u7b7e\u53d1tgt\u7684\u4e3b\u4f53\nTimestamp \u7b7e\u53d1\u65e5\u671f\u65f6\u95f4\u6233\n\nSK_TGS \u7531 AS \u968f\u673a\u751f\u6210\u7684\u5728 client \u548c TGS \u4e4b\u95f4\u5171\u4eab\u7684\u4f1a\u8bdd\u5bc6\u94a5(sessionkey)\nSK_Service \u7531 TGS \u968f\u673a\u751f\u6210\u7684\u5728 client \u548c Service \u4e4b\u95f4\u5171\u4eab\u7684\u4f1a\u8bdd\u5bc6\u94a5(sessionkey)\uff0c\u548c Authenticator \u4e00\u8d77\u9a8c\u8bc1\u4e92\u76f8\u7684\u8eab\u4efd\n\nK_User \u662f\u7528\u6237\u7684\u5bc6\u7801\uff0c\u53ea\u6709\u7528\u6237\u548c KDC(AS+TGS) \u77e5\u9053\nK_TGS \u662f TGS \u7684\u5bc6\u7801\uff0c\u53ea\u6709 KDC(AS+TGS) \u77e5\u9053\nK_Service \u662f Service \u7684\u5bc6\u7801\uff0c\u53ea\u6709 Service \u548c KDC(AS+TGS) \u77e5\u9053\n\nAuthenticator \u8eab\u4efd\u9a8c\u8bc1\u5668\uff0c\u7531 client \u751f\u6210\u7684\u8d77\u5230\u9a8c\u8bc1\u8eab\u4efd\u4f5c\u7528\u7684\u5185\u5bb9\uff0c\u662f\u4f7f\u7528\u5404\u9636\u6bb5\u7684\u4f1a\u8bdd\u5bc6\u94a5(sessionkey)\u5bf9 {PrincipalClient, Timestamp} \u8fdb\u884c\u52a0\u5bc6\u751f\u6210\u7684\n\n\u8bf7\u6c421\uff1a\nAS_REQ = ( PrincipalClient , PrincipalService , IP_list , Lifetime )\n&gt;&gt;&gt; \u7531 client \u5411 AS \u53d1\u8d77\u7684\u8bf7\u6c42\uff0c\u5185\u5bb9\u5305\u542b\u81ea\u5df1\u7684\u7528\u6237\u540d\u3001\u76ee\u6807\u670d\u52a1\u540d\u3001\u7f51\u7edc\u5730\u5740\u3001\u7533\u8bf7\u7968\u8bc1\u6709\u6548\u671f\u7b49\u4e3b\u8981\u4fe1\u606f\n\n\n\u54cd\u5e941\uff1a\nTGT = ( PrincipalClient , TgtRealm , IP_list , Timestamp , Lifetime , SK_TGS )\nAS_REP = { PrincipalService , Timestamp , Lifetime , SK_TGS }K_User { TGT }K_TGS\n&gt;&gt;&gt; \u7531 AS \u8fd4\u56de\u7ed9 client \u7684\u54cd\u5e94\uff0c\u5185\u5bb9\u662f \u4f7f\u7528\u7528\u6237\u5bc6\u7801\u52a0\u5bc6\u7684{\u76ee\u6807\u670d\u52a1\u540d\u3001\u7b7e\u53d1\u65e5\u671f\u65f6\u95f4\u6233\u3001\u7968\u8bc1\u6709\u6548\u671f\u3001client\u548cTGS\u5171\u4eab\u7684\u4f1a\u8bdd\u5bc6\u94a5} + \u4f7f\u7528TGS\u5bc6\u7801\u52a0\u5bc6\u7684TGT \uff0c\u5176\u4e2dTGT\u91cc\u9762\u5305\u542b\u4e86\u4e00\u4e2aclient\u548cTGS\u5171\u4eab\u7684\u4f1a\u8bdd\u5bc6\u94a5\uff0c\u662f\u7531 AS \u968f\u673a\u751f\u6210\u7684\uff0cTGS\u53ea\u6709\u5728\u7528\u81ea\u5df1\u7684\u5bc6\u7801\u6210\u529f\u89e3\u5bc6\u4e4b\u540e\u624d\u80fd\u63d0\u53d6\u51fa\u8fd9\u4e2a\u4f1a\u8bdd\u5bc6\u94a5\n\n\n\u8bf7\u6c422\uff1a\nAuthenticator = { PrincipalClient , Timestamp }SK_TGS\nTGS_REQ = ( PrincipalService , Lifetime , Authenticator) { TGT }K_TGS\n&gt;&gt;&gt; \u7531 client \u5411 TGS \u53d1\u8d77\u7684\u8bf7\u6c42\uff0c\u5185\u5bb9\u5305\u542b\u76ee\u6807\u670d\u52a1\u540d\u3001\u7968\u8bc1\u6709\u6548\u671f\u548c\u8eab\u4efd\u9a8c\u8bc1\u5668Authenticator-1\uff08\u8fd9\u4e2a\u8eab\u4efd\u9a8c\u8bc1\u5668\u662f\u7528\u4e0a\u9762\u7684\u4f1a\u8bdd\u5bc6\u94a5\u8fdb\u884c\u52a0\u5bc6\u751f\u6210\u7684\u5185\u5bb9\uff0c\u7528\u6765\u9a8c\u8bc1 client \u7684\u8eab\u4efd\uff09\uff0c\u8fd8\u6709\u4e00\u4e2a\u7528TGS\u5bc6\u7801\u52a0\u5bc6\u7684TGT\n\n\n\u54cd\u5e942\uff1a\nServiceTicket = ( PrincipalClient , PrincipalService , IP_list , Timestamp , Lifetime , SK_Service )\nTGS_REP = { PrincipalService , Timestamp , Lifetime , SK_Service }SK_TGS { ServiceTicket }K_Service\n&gt;&gt;&gt; \u7531 TGS \u8fd4\u56de\u7ed9 client \u7684\u54cd\u5e94\uff0c\u5185\u5bb9\u662f \u4f7f\u7528\u4e0a\u4e00\u6b65\u4e2d\u4f1a\u8bdd\u5bc6\u94a5\u52a0\u5bc6\u7684{\u76ee\u6807\u670d\u52a1\u540d\u3001\u7b7e\u53d1\u65e5\u671f\u65f6\u95f4\u6233\u3001\u7968\u8bc1\u6709\u6548\u671f\u3001client\u548cService\u5171\u4eab\u7684\u4f1a\u8bdd\u5bc6\u94a5} + \u4f7f\u7528\u670d\u52a1\u5bc6\u7801\u52a0\u5bc6\u7684ServiceTicket \uff0cclient\u548cService\u5171\u4eab\u7684\u4f1a\u8bdd\u5bc6\u94a5\u662f\u7531 TGS \u968f\u673a\u751f\u6210\u7684\uff0cService \u53ea\u6709\u5728\u7528\u81ea\u5df1\u7684\u5bc6\u7801\u6210\u529f\u89e3\u5bc6\u4e4b\u540e\u624d\u80fd\u63d0\u53d6\u51fa\u8fd9\u4e2a\u4f1a\u8bdd\u5bc6\u94a5\n\n\n\u8bf7\u6c423\uff1a\nAuthenticator = { PrincipalClient , Timestamp }SK_Service\nAP_REQ = Authenticator { ServiceTicket }K_Service\n&gt;&gt;&gt; \u7531 client \u5411 Service \u53d1\u8d77\u7684\u8bf7\u6c42\uff0c\u5185\u5bb9\u5305\u542b\u8eab\u4efd\u9a8c\u8bc1\u5668Authenticator-2\uff08\u8fd9\u4e2a\u8eab\u4efd\u9a8c\u8bc1\u5668\u662f\u7528\u4e0a\u9762\u7684\u4f1a\u8bdd\u5bc6\u94a5\u8fdb\u884c\u52a0\u5bc6\u751f\u6210\u7684\u5185\u5bb9\uff0c\u7528\u6765\u9a8c\u8bc1 client \u7684\u8eab\u4efd\uff09+ \u4f7f\u7528 Service \u5bc6\u7801\u52a0\u5bc6\u7684 ServiceTicket\n\n\n\u54cd\u5e943\uff1a\nAP_REP \u662f\u670d\u52a1\u7aef\u7ed9\u5ba2\u6237\u7aef\u7684\u54cd\u5e94\u5305\uff0c\u7528\u6765\u8bc1\u660e\u6211\u786e\u5b9e\u662f client \u6240\u671f\u671b\u7684 service \uff0c\u56e0\u4e3a\u6211\u6709 SK_Service \u80fd\u6b63\u786e\u89e3\u5bc6\u4e0a\u4e00\u6b65\u4f60\u63d0\u4f9b\u7684 Authenticator \u4ece\u800c\u5b8c\u6210\u4e86\u53cc\u5411\u8ba4\u8bc1\uff08\u4e00\u822c\u4e0d\u9700\u8981\uff0c\u4e00\u822c\u60c5\u51b5\u4e0b\u53ea\u9700\u8981 service \u80fd\u591f\u9a8c\u8bc1 client \u662f\u771f\u7684\u5c31\u884c\uff0cclient \u5f88\u5c11\u8981\u6c42 service \u4e5f\u662f\u771f\u7684\uff09\u3002<\/code><\/pre>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n\n\n\n<p>Designing an Authentication System: a Dialogue in Four Scenes<br><a href=\"http:\/\/web.mit.edu\/kerberos\/dialogue.html\">http:\/\/web.mit.edu\/kerberos\/dialogue.html<\/a><\/p>\n\n\n\n<p>KERBEROS PROTOCOL TUTORIAL<br><a href=\"https:\/\/www.kerberos.org\/software\/tutorial.html\">https:\/\/www.kerberos.org\/software\/tutorial.html<\/a><\/p>\n\n\n\n<p>Explain like I\u2019m 5: Kerberos<br><a href=\"https:\/\/www.roguelynn.com\/words\/explain-like-im-5-kerberos\/\">https:\/\/www.roguelynn.com\/words\/explain-like-im-5-kerberos\/<\/a><\/p>\n\n\n\n<p>\u4e00\u6587\u641e\u5b9aKerberos<br><a href=\"https:\/\/zhuanlan.zhihu.com\/p\/266491528\">https:\/\/zhuanlan.zhihu.com\/p\/266491528<\/a><\/p>\n\n\n\n<p>Kerberos-FAQ<br><a href=\"http:\/\/www.di-srv.unisa.it\/~ads\/corso-security\/www\/CORSO-0001\/kerberos\/ref\/kerberos-faq.html\">http:\/\/www.di-srv.unisa.it\/~ads\/corso-security\/www\/CORSO-0001\/kerberos\/ref\/kerberos-faq.html<\/a><\/p>\n\n\n\n<p>\u5173\u4e8e Kerberos \u6bcf\u4e2a\u4eba\u90fd\u5e94\u8be5\u77e5\u9053\u8fd9\u4e9b<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/gLg0pdVRWl3hJMB5au61rw\">https:\/\/mp.weixin.qq.com\/s\/gLg0pdVRWl3hJMB5au61rw<\/a><\/p>\n\n\n\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u5176\u5b9e\u5f88\u65e9\u5c31\u60f3\u597d\u597d\u5b66\u4e60\u4e86\u89e3\u4e00\u4e0b Kerberos \u534f\u8bae\uff0c\u4f46\u82e6\u4e8e\u8fd9\u4e2a\u534f\u8bae\u786e\u5b9e\u4e0d\u5bb9\u6613\u7406\u89e3\uff0c\u4e14 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25],"tags":[1876,1197,1853,1872,1877,1875],"class_list":["post-5357","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","tag-kdc","tag-kerberos","tag-sso","tag-tgt","tag-1877","tag-1875"],"views":1557,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=5357"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5357\/revisions"}],"predecessor-version":[{"id":5359,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5357\/revisions\/5359"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=5357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=5357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=5357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}