Authentication
Download
Report
Transcript Authentication
COEN 250
Authentication
Authentication
Between human and machine
Between machine and machine
Human Machine Authentication
Authentication protocols are based on
What
E.g. password, pass-phrase, (secret key,
private key).
What
you have.
Physical key, smart card.
What
you know.
you are.
Biometrics.
Where
you are.
E.g. trusted machine, access to room, …
Authentication
Passwords
Predate
computers.
As do some attacks (stealing, guessing)
Older cell phone technology transmits originating
number with a password.
Password good, call goes through.
Eavesdropper receives phone number – password
combination.
Eavesdropper can now clone the phone.
Authentication
Password Attacks
Guessing
On-line
Off-line
Time consuming.
Authentication attempts are usually logged.
Can detect attack long before it is likely to succeed.
Can disrupt the attack.
Attacker needs to steal relevant data from which password(s) can be
determined.
Attacker can use arbitrary amount of computing power.
Capturing Passwords
Eavesdropping
Login Trojan Horse
Authentication
Passwords are stored
On
each server Alice uses.
Centrally: Authentication Storage Node:
Each server retrieves the information when it
wants to authenticate Alice.
Centrally: Authentication
Facilitator Node:
Each server takes Alice’s data and password and
goes to the AFN.
Authentication
Password can be stored
Unencrypted
Simple
Dangerous
Implicitly
as hashes of passwords
As in UNIX, VMS
Encrypted
Hashed
and Encrypted
Authentication
Example: Network Information Service
(Yellow Pages)
Directory
service is the authentication storage
node.
Stores hashed passwords of users.
Typically, hashed passwords list is world readable
Access by claiming to be a server.
NIS
authentication storage node does not
authenticate itself to users.
Allows impersonation of authentication service.
Authentication
Passwords for machine – machine
communication can be made difficult to
guess.
Arbitrary
length
Truly random choice of characters.
Human-machine passwords
Guessable
Subject
to dictionary attack.
Authentication
Dictionary attack
Most
passwords are natural language words.
Or derived from natural language words.
Guess the language.
Use a dictionary to try out all words in the language.
Start with common passwords first.
Replace a single character in a word, attach a
random character, etc.
Authentication
Brute-Force Attack
Generate all possible password.
Sometimes
make assumptions on the
alphabet
only printable character
characters on a key-board
Authentication
Salting
Protects
hashed passwords against an offline
attack.
Brute Force attack attacks all passwords in
password file simultaneously.
Authentication
Salting
Store a salt with each password
Hash depends on salt and password.
Use different salts for different passwords.
Store salt with password.
Authentication
Salting
Brute
force attack, dictionary attack can only
attack a single password.
Authentication
Passwords are compromised:
By
obtaining password file.
Safeguard by
Hashing and Salting
Encryption
By
eavesdropping on an exchange
Use one-way passwords:
Lamport Hash
Authentication
Address Based
Common
Rtools:
in early UNIX
.rhosts
In user home directory
(Computer, Account) pairs
These pairs are allowed access to the user’s account
/etc/hosts.equiv
List of network addresses of “equivalent” machines
Account name on A is equivalent to account name on B.
Users have to have identical account names.
Authentication
Addressed based authentication
threatened by
Access
escalation
Attacker gains access to one hosts.
Access cascades to equivalent hosts / rhosts.
Spoofing
addresses
Very easy to spoof source address.
Harder to intercept traffic back.
Authentication
Ethernet network address impersonation
Easy
on the same link.
Hubs do not protect.
Switches can be spoofed through the ARP
protocol.
Routers are harder to fool, but can be
attacked and provided with misleading routing
data.
Authentication
Cryptographic authentication
Alice
proves her identity to Bob by proving to
Bob that she knows a secret.
Hashes
Secret key cryptography
Public key cryptography.
Human Machine Authentication
Initial password distribution to humans
Pre-expired,
Through mail
Derivable
strong passwords
from common knowledge
Student ID
Human Machine Authentication
Authentication Token
Possession
Magnetic stripe as on credit cards.
Harder to reproduce
“Impossible” to guess
Demand special hardware
Can be lost or stolen
of the token proves right to access.
Add pin or password protection
Are not safe against communication eavesdropping and
forging
Human Machine Authentication
Authentication Token
Smart Card.
Needs to be inserted in a smart card reader.
Card authenticates to the smart card reader.
PIN protected smart cards.
Stops working after a number of false PINs.
Cryptographic challenge / response cards
Card contains a cryptographic key.
Authenticating computer issues a challenge.
Card solves the challenge after PIN is entered.
Harder to crack than PIN protected smart cards because
key is never revealed.
Human Machine Authentication
Authentication Token
Smart
Card.
Readerless smart card (Cryptographic calculator)
Communicates with owner through mini-keyboard and
display.
Authenticating computer issues a challenge to Alice.
Alice types in challenge into readerless smart card.
Readerless smart card solves the challenge.
After Alice puts in her password.
Alice transfers the answer to the computer.
Human Machine Authentication
Biometrics
Retinal
scanner
Fingerprint reader
Face recognition
Iris scanner
Handprint readers
Voiceprints
Keystroke timing
Signatures
Authentication Security Policy
Defining Protection Levels
Partitioning Computing Resources
Usually
necessary (law) to have special
security for sensitive areas:
Human Resources
Accounting
…
Network
can be repartitioned using subnets
with special protection and special procedures
Authentication Security Policy
Defining Protection Levels
Partitioning Computing Resources
Protection
by naming
Increase protection by not making certain systems
visible from the outside
external
firewall
internal DNS
server
internal
firewall
Local LAN
external
DNS server
Internet
Authentication Security Policy
Defining Protection Levels
“Human resources, accounting, and other administrative support
systems shall be physically partitioned from the general network in
such a manner to control the flow of information to and from those
systems”
“Network name services shall be configured to provide Internet
users with generic names to accessible internal systems while
serving meaning full names to internal, organizational users.”
“Network addresses shall be predefined for every system and
network device and may be preloaded or resolved when logged in to
the network.”
“Network address servers and those used to resolve addresses shall
be protected in accordance with best practice appropriate for that
device.”
“Network address servers and those used to resolve addresses shall
be protected in accordance with best practice appropriate for that
device.”
Network Access Control
Typical: One external access point
Connection
to ISP
Gateways: Points where network traffic is
transferred from the organization’s network to
the internet:
Dial-in,
Dial-out
Other external connections
Internet connections
Wireless connections
Network Access Control
“All telephone access to the network shall be centrally protected by
strong authentication controls. Modems shall be configured for dialin or dial-out access but not both. The Network Administrator shall
provide procedures to grant access to modem services. Users shall
not install modems at any other location on the network without
appropriate review and authorization.”
“Any gateway proposed to be installed on the company’s network
that would violate policies or procedures established from these
policies shall not be installed without prior approval of the
Information Security Management Committee.”
“Applications that require gateway services shall be authenticated to
the network. If the service itself cannot be authenticated, services
carried through the gateway shall be subject to authentication
policies described in this document.”
Login Policies
User Identification
Guest accounts
Login Banners
Establish
privacy expectation
Work as “no-trespassing” signs
Login Controls
Login Reporting
User Accounts
Establishment of special privileges
Password Policies
Policies defining strength of passwords
Length
of password
Composition of password
Storage of passwords by users
Default passwords for systems / applications
This problem is going away, but still
Password
Testing
Telecommuting / Remote Access
Policies
Preserve security of IT assets at the
organization
Employee’s
equipment is probably not well
protected
Authentication over the internet / dial-up
Protection of organizational data
Legally
/ Technically
In Transit / Stored / During Processing
Mobile Equipment
Employees work with company equipment
outside of the perimeter
Storing data on removable drives
USB
drives