Back to Strong Auth Index Page | Computing Division| Fermilab at Work | Fermilab Home
TOC PREV NEXT INDEX
View/print PDF file
Fermilab CD logo Strong Authentication at Fermilab
DRAFT (last updated: September 18, 2001)

Chapter Contents

Chapter 5: Using your CRYPTOCard
  5.1 How does your CRYPTOCard Work?
  5.2 Caring for your CRYPTOCard
  5.3 Usage Notes
  5.4 The First Thing to do: Reset your PIN
    5.4.1 Resetting Initial PIN
    5.4.2 Resetting PIN (General)
  5.5 Log in Using CRYPTOCard (the First Time)
  5.6 Log in Using CRYPTOCard (Subsequently)


Chapter 5: Using your CRYPTOCard


Strengthened machines are configured to respond in portal mode when requests for access come from unKerberized machines. In portal mode the strengthened machine acts as a secure gateway into the strengthened realm, requiring a single-use password for authentication. A CRYPTOCard is a calculator-style, battery-powered device used for generating a single-use password.

5.1 How does your CRYPTOCard Work?

Before we issue you your CRYPTOCard, we initialize it and synchronize it with the Kerberos Key Distribution Center1 (KDC). This process (a) associates the card with your principal, (b) sets an initial PIN on the card, and (c) creates a secret encryption key stored in both the KDC and the card.

The KDC and the CRYPTOCard operate independently on the identical strings using the shared key, and they produce the same result. Roughly half of this resulting string is to be used as the first one-time password, the other half (plus/minus some overlapping bits) is stored for later use as the next string on which both parties will operate. And so on.

The string on which the shared key operates is called the challenge. The portion of the result used as the password is called the response. The first challenge is chosen by the KDC when you use the card.

5.2 Caring for your CRYPTOCard

You will find printed instructions with your new CRYPTOCard. Carefully read Use and Care of your RB-1 Authentication Token, and Battery Replacement.

Here we highlight a few points that we think are important:

5.3 Usage Notes

5.4 The First Thing to do: Reset your PIN

The CRYPTOCard comes with an initial PIN (personal code to prevent use by other individuals) that you are required to reset. The minimum length of the PIN is four digits, but it can be as long as eight. When entering your PIN, you are limited to seven consecutive wrong tries before lockout.

5.4.1 Resetting Initial PIN

  1. Press the ON/OFF button to turn on the card, enter your initial PIN and press ENT.
  2. At the prompt New PIN? enter a new PIN and press ENT.
  3. At the Verify prompt, enter your new PIN again and press ENT. The card displays a preconfigured string which you can ignore.
  4. If you're not going to log on now, you can turn off the card or let it do so automatically.

5.4.2 Resetting PIN (General)

For subsequent PIN changes, turn the card on and enter your PIN followed by ENT. At the Fermilab prompt, press CPIN and proceed from step (2), above.

5.5 Log in Using CRYPTOCard (the First Time)

  1. Turn on your CRYPTOCard and enter your new PIN, followed by ENT.
  2. The card is configured to display the id Fermilab. Press ENT when you see it. You'll see a preconfigured challenge, which you can ignore.
  3. Run ssh, slogin, telnet, or ftp normally on your nonKerberized machine to the strengthened host, and enter your login id at the host prompt. The first time you use the card, the host system (in portal mode) displays the message:

    Press CH/MAC and enter this on the keypad: [12345678]

    Enter the displayed response:

    where 12345678 is a sample eight-digit challenge.

  4. On your CRYPTOCard, press CH/MAC, then type the challenge displayed on the host system into your CRYPTOCard. If you mistype, press CLR and re-enter the challenge. Press ENT to get a response of eight hex digits.
  5. Enter the CRYPTOCard response at the host system prompt (it is not case-sensitive). Press Return, and you should be logged in with Kerberos tickets.
  6. Turn off your CRYPTOCard, or let it do so automatically.

5.6 Log in Using CRYPTOCard (Subsequently)

  1. Turn on your CRYPTOCard and enter your PIN, followed by ENT. (You are limited to seven consecutive wrong-PIN tries before lockout.)
  2. The card is configured to display the id Fermilab. Press ENT when you see it. The CRYPTOCard displays a challenge.
  3. Run ssh, slogin, telnet, or ftp normally on your nonKerberized machine to the strengthened host, and enter your userid at the host prompt. The host system (in portal mode) displays the message:

    Press ENTER and compare this challenge to the one on your display: [12345678]

    Enter the displayed response:

    where 12345678 is a sample eight-digit challenge.

  4. Compare the challenge on the host to the one on the CRYPTOCard:
    1. If the challenges are the same, press Ent again on the CRYPTOCard to get the response. (In this case the KDC and your CRYPTOCard are synchronized. As long as they remain in sync, the CRYPTOCard will generate the right response.)
    2. If the challenges are different (you may see all zeroes), press CH/MAC on the CRYPTOCard and enter the challenge displayed on the host system into the card. (This resynchronizes the CRYPTOCard.) Then press Ent to get the response.
  5. Enter the response at the host system prompt. Press Return and you should be logged in with tickets.
  6. Turn off your CRYPTOCard, or let it do so automatically.

1
The KDC is the "keymaster" of the Kerberos authentication service for all the machines in the realm. It runs on a server maintained by Fermilab's computing security team. Every principal and every initialized CRYPTOCard shares a unique encryption key with the KDC, allowing the KDC to verify the identity of each user/service request.


TOC PREV NEXT INDEX
View/print PDF file
Back to Strong Auth Index Page | Computing Division| Fermilab at Work | Fermilab Home
This page generated on: 09/18/01 15:45:40