Transcript Chapter 4-2
Chapter 4 – Protection in General-Purpose Operating
Systems
Section 4.5 User Authentication
In this section
Authentication
Passwords
Effective passwords
Breaking passwords
One-Time Systems
Biometrics
User Authentication
Most software and OS base there security on knowing
who the user is
Authentication based on 1 of 3 qualities:
Something the user knows – Passwords, PIN, passphrase
Something the user has – Key, license, badge, username
Something the user is – physical characteristics or
biometrics
Two forms of these can be combined together
Passwords as Authenticators
Most common authentication mechanism
Password – a word unknown to users and computers
Problems with passwords:
Loss
Use – time consuming if used on each file or access
Disclosure – if Malory finds out the password might
cause problems for everyone else.
Revocation – revoke one persons right might cause
problems with others
Additional Authentication
Information
Placing other condition in place can enforce the
security of a password
Other methods:
Limiting the time of access
Limiting the location of access
Multifactor Authentication is using additional
forms of authentication
The more authentication factors cause more for the
system and administrator to manage
Attacks on Passwords
Figuring out a password
Try all possible passwords
Try frequently used passwords
Try passwords likely for the user
Search for the system password list
Ask the user
Loose-Lipped Systems
Authentication system leaks information about the
password or username
Provides information at inconvenient times
Exhaustive Attack
Brute force attack is when the attacker tries all possible
passwords
Example:
26 (A-Z)character password of length 1 to 8 characters
One password per millisecond would take about two
months
But we would not need to try every password
Password Problems
Probable Passwords
Passwords Likely for a user
Weakness is in the users choice
Weakness is in the control of the system
Look at table 4-2 on page 225
Figure 4-15 Users’ Password Choices.
Password Selection Criteria
Use characters other than just A-Z
Choose long passwords
Avoid actual names or words
Choose an unlikely password
Change the password regularly
Don’t write it down
Don’t tell anyone else – beware of Social Engineering
One-Time Passwords
Password that changes every time
Also known as a challenge-response systems
F(x)=x+1 - use of a function
F(x)=r(x) – Seed to a random number generator
F(a b c d e f g) = b d e g f a c – transformation of a
character string
F(E(x))=E( D (E (x)) + 1 ) – Encrypt value must be
decrypted and run through a function
The Authentication Process
Slow response from system
Limited number of attempts
Access limitations
Fixing Flaws with a second level of protection
Challenge-Response
Impersonation of Login
Biometrics
Biometrics are biological authenticators
Problems with Biometrics
Still a relatively new concept
Can be costly
Establishing a threshold
Single point of failure
False positives
Speed can limit accuracy
Forgeries are possible