3. Authentication Methods
ā¢ Type 1: Something you know
ā¢ Easiest and weakest method
ā¢ Type 2: Something you have
ā¢ Type 3: Something you are
ā¢ A fourth type is where you are
5. Static Passwords
ā¢ Reusable passwords that may or may not
expire
ā¢ Typically user-generated
ā¢ Work best when combined with another
authentication type, such as a smart card
or biometric control
6. Passphrases
ā¢ Long static passwords comprised of
words in a phrase or sentence
ā¢ "I will pass the CISSP in 6 months!"
ā¢ Stronger if you use nonsense words, mix
case, and use numbers and symbols
9. Strong Authentication
ā¢ Also called Multifactor Authentication
ā¢ More than one authentication factor
ā¢ Ex: ATM card and PIN
10. Password Guessing
ā¢ May be detected from system logs
ā¢ Clipping levels distinguish malicious
attacks from normal users
ā¢ Ex: more than five failed logins per
hour
ā¢ Account lockout after a number of failed
login attempts
11. Password Hashes and
Password Cracking
ā¢ Plaintext passwords are not usually
stored on a system anymore
ā¢ Password hash is stored instead
ā¢ Password cracking
ā¢ Calculating hash for a long list of
passwords, trying to match the hash
value
12. Password Hashes
ā¢ Stored in /etc/shadow on Unix systems
ā¢ In SAM (Security Accounts Manager) file
(part of the Registry) on Windows
ā¢ Local account hashes stored on local
system drive
ā¢ Domain account hashes stored on
domain controller
ā¢ Hashes also cached on the local
system after a domain login
13. Capturing Hashes
ā¢ May be sniffed from network traffic
ā¢ Or read from RAM with fgdump or
Metasploit's hashdump
ā¢ SAM file is locked while the operating
system is running
15. Dictionary Attack
ā¢ Use a list of possible passwords
ā¢ Fast and efficient technique
ā¢ Countermeasure: password complexity
and length rules
16. Brute Force and Hybrid Attacks
ā¢ Brute Force: try all possible combinations of
characters
ā¢ Slow, but much faster with GPUs (Graphical
Processing Units)
ā¢ Rainbow tables trade time for memory
ā¢ Most effective on unsalted passwords, like
Microsoft's
ā¢ Hybrid attack
ā¢ Uses a dictionary and modifications of the
words, like 1337sp33k
17. Salts
ā¢ A random value added to the password
before hashing
ā¢ If two users have the same password, the
hash is different
ā¢ Makes rainbow tables less useful
18.
19. Password Control
ā¢ Users often write down passwords and
place them somewhere unsafe
ā¢ Like sticky notes on monitors
20. Type 2 Authentication
Something You Have
ā¢ Synchronous Dynamic Token
ā¢ Synchronized with a central server
ā¢ Uses time or counter to change values
ā¢ Ex: RSA's SecureID, Google
Authenticator
ā¢ Asynchronous Dynamic Token
ā¢ Not synchronized with a central server
ā¢ Ex: Challenge-response token
ā¢ User must enter challenge and PIN
21.
22. Type 3 Authentication
Something You Are
ā¢ Enrollment
ā¢ Registering users with a biometric
system
ā¢ Ex: taking fingerprints
ā¢ Should take 2 minutes or less
ā¢ Throughput
ā¢ Time required to authenticate a user
ā¢ Typically 6-10 seconds
23. Accuracy of Biometric Systems
ā¢ False Reject Rate (FRR) -- Type I errors
ā¢ False Accept Rate (FAR) -- Type II errors
ā¢ Crossover Error Rate (CER)
24. Types of Biometric Controls
ā¢ Fingerprints are most common
ā¢ Data is mathematical representation of
minutiae -- details of fingerprint whorls,
ridges, bifurcation, etc.
25.
26. Retina Scan
ā¢ Laser scan of the capillaries that feed the
retina in the back of the eye
ā¢ Rarely used because of health risks and
invasion-of-privacy issues
ā¢ Exchange of bodily fluids should be
avoided
27. Iris Scan
ā¢ Passive biometric control
ā¢ Can be done without subject's
knowledge
ā¢ Camera photographs the iris (colored
portion of the eye)
ā¢ Compares photo to database
ā¢ Works through contact lenses and glasses
ā¢ High accuracy, no exchange of bodily
fluids
28. Hand Geometry
ā¢ Measure length, width, thickness, and
surface area of hand
ā¢ Simple, can require as little as 9 bytes of
data
29. Keyboard Dynamics
ā¢ How hard a person presses each key
ā¢ Rhythm of keypresses
ā¢ Cheap to implement and effective
31. Voiceprint
ā¢ Vulnerable to replay attack
ā¢ So other access controls must be
combined with it
ā¢ Voices may change due to illness,
leading to a false rejection
32. Facial Scan
ā¢ Also called facial recognition
ā¢ Passive but expensive
ā¢ Not commonly used for authentication
ā¢ Law enforcement and security agencies
use facial recognition at high-value,
publicly accessible targets
ā¢ Superbowl XXXV was the first major
sporting event to use facial recognition
to look for terrorists in 2001 (link Ch 6a)
33. Someplace You Are
ā¢ Location found from GPS or IP address
ā¢ Can deny access if the subject is in the
incorrect location
ā¢ Credit card companies use this
technique to detect fraud
ā¢ Transactions from abroad are rejected,
unless the user notifies the credit card
company of the trip
35. Centralized Access Control
ā¢ One logical point for access control
ā¢ Can provide Single Sign-On (SSO)
ā¢ One authentication allows access to
multiple systems
ā¢ Can centrally provide AAA services
ā¢ Authentication
ā¢ Authorization
ā¢ Accountability
36. Decentralized Access Control
ā¢ Local sites maintain independent
systems
ā¢ Provides more local power over data
ā¢ Risks: adherence to policies may vary
ā¢ Attackers may find the weakest link
ā¢ Note: DAC is Discretionary Access
Control; not Decentralized Access
Control
37. Single Sign-On (SSO)
ā¢ One central system for authentication
ā¢ More convenient for users and
administrators
ā¢ Risks: single point of attack, and
increased damage from a compromise or
unattended desktop
38. Session Management of Single Sign On
ā¢ SSO should always be combined with
dual-factor authentication
ā¢ But an attacker might hijack an
authenticated session
ā¢ Session timeouts and locking
screensavers should be used
ā¢ Users should be trained to lock their
workstations when they leave their desks
39. Access Provisioning Lifecycle
ā¢ Password policy compliance checking
ā¢ Notify users when passwords are about to
expire
ā¢ Identify life cycle changes, such as accounts
inactive for 30 days or new accounts that are
unused for 10 days
ā¢ Revoke access rights when contracts expire
ā¢ Coordinate account revocation with human
resources; include termination, horizontal,
and vertical moves
40. User Entitlement, Access Review,
and Audit
ā¢ Access aggregation occurs when a user
gains more access to more systems
ā¢ Authorization creep --users gain more
entitlement without shedding the old
ones
ā¢ Can defeat least privilege and separation
of duties
ā¢ Entitlements must be regularly reviewed
and audited
41. Federated Identity Management
ā¢ Applies Single Sign-On across
organizations
ā¢ A trusted authority provides a digital
identity above the enterprise level
ā¢ In practice, Facebook seems to be the
world's identity authority
43. SAML
ā¢ Security Assertion Markup Language
ā¢ XML-based framework for exchanging
security information
ā¢ Including authentication data
ā¢ Enables SSO at Internet scale
44. Identity as a Service (IDaaS)
ā¢ Also called "Cloud Identity"
ā¢ Integrates easily with cloud hosted
applications and third party services
ā¢ Easier deployment of two-factor auth.
ā¢ Compounds challenges with internal
identity management and account/
access revocation
ā¢ Larger attack services
ā¢ Ex: Microsoft Accounts (formerly Live ID)
45. Credential Management Systems
ā¢ Password managers, may offer:
ā¢ Secure password generation
ā¢ Secure password storage
ā¢ Reduction in the number of passwords
users must remember
ā¢ Multifactor authentication to unlock
credentials
ā¢ Audit logging of all interactions
46. Integrating Third-party Identity Services
ā¢ Hosting a third-party ID service locally,
within an enterprise
ā¢ Allows internal applications to integrate
with a cloud identity
47. LDAP
ā¢ Lightweight Directory Access Protocol
ā¢ Used by most internal identity services
ā¢ Including Active Directory
ā¢ LDAP uses TCP or UDP 389
ā¢ Can use plaintext transmission
ā¢ Supports authenticated connection and
secure transmissions with TLS
48. Kerberos
ā¢ Third-party authentication service
developed at MIT
ā¢ Prevents eavesdropping and replay
attacks
ā¢ Provides integrity and secrecy
ā¢ Uses symmetric encryption and mutual
authentication
49.
50. Kerberos Operational Steps
1. Principal (Alice) contacts the KDC (Key
Distribution Center) requesting
authentication
2. KDC sends user a session key, encrypted
with Alice's secret key. KDC also sends a
TGT (Ticket Granting Ticket) encrypted
with the TGS's secret key.
3. Alice decrypts the session key and uses it
to request permission from the TGS
(Ticket Granting Service)
51. Kerberos Operational Steps
4. TGS verifies Allice's session key and
sends her a second session key "C/S
session key" to use to print. TGS also
sends a service ticket, encrypted with
the printer's key
5. Alice connects to the printer. Printer
sees a valid C/S session key, so
provides service
52.
53. Time in Kerberos
ā¢ TGT lifetime is typically 10 hours
ā¢ Authenticators contain a timestamp
ā¢ Will be rejected if more than 5 minutes ol
ā¢ Clocks must be synchronized on all
systems
54. Kerberos Weaknesses
ā¢ KDC stores all keys
ā¢ Compromise of KDC exposes them all
ā¢ KDC and TGS are single points of failure
ā¢ Replay attacks possible for lifetime of
authenticator
ā¢ Kerberos 4 allowed one user to request a
session key for another user, which could be
used to guess a password
ā¢ A weakness closed in Kerberos 5
ā¢ Plaintext keys can be stolen from a client's RAM
55. SESAME
ā¢ Secure European System for
Applications in a Multi-vendor
Environment
ā¢ Has new features not present in
Kerberos
ā¢ Most important: public-key encryption
ā¢ This avoids Kerberos' plaintext storage
of symmetric keys
56. RADIUS and Diameter
ā¢ Remote Authentication Dial In User
Service
ā¢ Uses UDP ports 1812 and 1813
ā¢ An AAA server
ā¢ Diameter is RADIUS' successor
ā¢ Uses TCP and can manage policies for
many services from a single server
57. TACACS and TACACS+
ā¢ Terminal Access Controller Access
Control System
ā¢ Uses UDP port 49 and may use TCP port
49
ā¢ TACACS+ is newer
ā¢ Allows two-factor authentication
ā¢ Encrypts all data (RADIUS only encrypts
the password)
ā¢ Not backwards-compatible with TACACS
58. PAP and CHAP
ā¢ Password Authentication Protocol
ā¢ Plaintext transmission
ā¢ Vulnerable to sniffing
ā¢ Challenge Handshake Authentication
Protocol
ā¢ Server sends client a challenge
ā¢ Client adds challenge to secret and
hashes it, and transmits that
ā¢ Resists sniffing attacks
59. Microsoft Active Directory Domains
ā¢ Groups users and network access into
domains
ā¢ Uses Kerberos
ā¢ Domains can have trust relationships
ā¢ One-way or two-way
ā¢ Nontransitive or transitive
ā¢ A transitive trust extends to any other
domain either partner trusts
ā¢ "Friend of a friend"
61. Three Models
ā¢ Discretionary Access Control (DAC)
ā¢ Mandatory Access Control (MAC)
ā¢ Non-Discretionary Access Control
62. Discretionary Access Control (DAC)
ā¢ Owners have full control over assets
ā¢ Can share them as they wish
ā¢ Unix and Windows file systems use DAC
ā¢ User errors can expose confidential data
63. Mandatory Access Control (MAC)
ā¢ Subjects have clearance
ā¢ Objects have labels
ā¢ Typically Confidential, Secret, and Top
Secret
ā¢ MAC is expensive and difficult to
implement
64. Non-Discretionary Access Control
ā¢ Users don't have discretion when
accessing objects
ā¢ Cannot transfer objects to other subjects
ā¢ Two types:
ā¢ Role-Based Access Control (RBAC)
ā¢ Task-based access control
65. Role-Based Access Control (RBAC)
ā¢ Subjects have roles, like Nurse, Backup
Administrator, or Help Desk Technician
ā¢ Permissions are assigned to roles, not
individuals
66. Task-Based Access Control
ā¢ Works like RBAC, but focuses on the
tasks each subject must perform
ā¢ Such as writing prescriptions, restoring
data from a backup tap,or opening a help
desk ticket
68. Content- and Context-Dependent
Access Controls
ā¢ May be added to other systems for defense-
in-depth
ā¢ Content-dependent access control
ā¢ Additional criteria beyond identification and
authorization
ā¢ Employees may be allowed to see their own
HR data, but not the CIO's data
ā¢ Context-dependent access controls
ā¢ Applies additional context, such as time of
day