* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Authentication
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer security wikipedia , lookup
Zero-configuration networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Distributed firewall wikipedia , lookup
TV Everywhere wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wireless security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
COEN 250 Authentication Authentication Between human and machine  Between machine and machine  Human Machine Authentication  Authentication protocols are based on  What  E.g. password, pass-phrase, (secret key, private key).  What  you have. Physical key, smart card.  What  you know. you are. Biometrics.  Where  you are. E.g. trusted machine, access to room, … Authentication  Passwords  Predate computers.  As do some attacks (stealing, guessing) Older cell phone technology transmits originating number with a password.  Password good, call goes through.  Eavesdropper receives phone number – password combination.  Eavesdropper can now clone the phone.  Authentication  Password Attacks  Guessing  On-line      Off-line    Time consuming. Authentication attempts are usually logged. Can detect attack long before it is likely to succeed. Can disrupt the attack. Attacker needs to steal relevant data from which password(s) can be determined. Attacker can use arbitrary amount of computing power. Capturing Passwords   Eavesdropping Login Trojan Horse Authentication  Passwords are stored  On each server Alice uses.  Centrally: Authentication Storage Node:  Each server retrieves the information when it wants to authenticate Alice.  Centrally: Authentication  Facilitator Node: Each server takes Alice’s data and password and goes to the AFN. Authentication  Password can be stored  Unencrypted Simple  Dangerous   Implicitly  as hashes of passwords As in UNIX, VMS  Encrypted  Hashed and Encrypted Authentication   Example: Network Information Service (Yellow Pages)  Directory service is the authentication storage node.  Stores hashed passwords of users.  Typically, hashed passwords list is world readable  Access by claiming to be a server.  NIS authentication storage node does not authenticate itself to users.  Allows impersonation of authentication service. Authentication  Passwords for machine – machine communication can be made difficult to guess.  Arbitrary length  Truly random choice of characters.  Human-machine passwords  Guessable  Subject to dictionary attack. Authentication  Dictionary attack  Most passwords are natural language words.  Or derived from natural language words.  Guess the language.  Use a dictionary to try out all words in the language.  Start with common passwords first.  Replace a single character in a word, attach a random character, etc. Authentication Brute-Force Attack  Generate all possible password.   Sometimes make assumptions on the alphabet only printable character  characters on a key-board  Authentication  Salting  Protects hashed passwords against an offline attack.  Brute Force attack attacks all passwords in password file simultaneously. Authentication Salting  Store a salt with each password  Hash depends on salt and password.  Use different salts for different passwords.  Store salt with password.  Authentication  Salting  Brute force attack, dictionary attack can only attack a single password. Authentication  Passwords are compromised:  By  obtaining password file. Safeguard by Hashing and Salting  Encryption   By  eavesdropping on an exchange Use one-way passwords:  Lamport Hash Authentication  Address Based  Common  Rtools:   in early UNIX .rhosts  In user home directory  (Computer, Account) pairs  These pairs are allowed access to the user’s account /etc/hosts.equiv   List of network addresses of “equivalent” machines Account name on A is equivalent to account name on B.  Users have to have identical account names. Authentication  Addressed based authentication threatened by  Access escalation Attacker gains access to one hosts.  Access cascades to equivalent hosts / rhosts.   Spoofing addresses Very easy to spoof source address.  Harder to intercept traffic back.  Authentication  Ethernet network address impersonation  Easy on the same link.  Hubs do not protect.  Switches can be spoofed through the ARP protocol.  Routers are harder to fool, but can be attacked and provided with misleading routing data. Authentication  Cryptographic authentication  Alice proves her identity to Bob by proving to Bob that she knows a secret. Hashes  Secret key cryptography  Public key cryptography.  Human Machine Authentication  Initial password distribution to humans  Pre-expired,  Through mail  Derivable  strong passwords from common knowledge Student ID Human Machine Authentication  Authentication Token  Possession  Magnetic stripe as on credit cards.     Harder to reproduce “Impossible” to guess Demand special hardware Can be lost or stolen   of the token proves right to access. Add pin or password protection Are not safe against communication eavesdropping and forging Human Machine Authentication  Authentication Token  Smart Card.  Needs to be inserted in a smart card reader.  Card authenticates to the smart card reader.   PIN protected smart cards.  Stops working after a number of false PINs. Cryptographic challenge / response cards  Card contains a cryptographic key.  Authenticating computer issues a challenge.  Card solves the challenge after PIN is entered.  Harder to crack than PIN protected smart cards because key is never revealed. Human Machine Authentication  Authentication Token  Smart  Card. Readerless smart card (Cryptographic calculator) Communicates with owner through mini-keyboard and display.  Authenticating computer issues a challenge to Alice.  Alice types in challenge into readerless smart card.  Readerless smart card solves the challenge.  After Alice puts in her password.  Alice transfers the answer to the computer.  Human Machine Authentication  Biometrics  Retinal scanner  Fingerprint reader  Face recognition  Iris scanner  Handprint readers  Voiceprints  Keystroke timing  Signatures Authentication Security Policy Defining Protection Levels  Partitioning Computing Resources  Usually necessary (law) to have special security for sensitive areas: Human Resources  Accounting  …   Network can be repartitioned using subnets with special protection and special procedures Authentication Security Policy Defining Protection Levels  Partitioning Computing Resources  Protection  by naming Increase protection by not making certain systems visible from the outside external firewall internal DNS server internal firewall Local LAN external DNS server Internet Authentication Security Policy Defining Protection Levels      “Human resources, accounting, and other administrative support systems shall be physically partitioned from the general network in such a manner to control the flow of information to and from those systems” “Network name services shall be configured to provide Internet users with generic names to accessible internal systems while serving meaning full names to internal, organizational users.” “Network addresses shall be predefined for every system and network device and may be preloaded or resolved when logged in to the network.” “Network address servers and those used to resolve addresses shall be protected in accordance with best practice appropriate for that device.” “Network address servers and those used to resolve addresses shall be protected in accordance with best practice appropriate for that device.” Network Access Control  Typical: One external access point  Connection  to ISP Gateways: Points where network traffic is transferred from the organization’s network to the internet:  Dial-in, Dial-out  Other external connections  Internet connections  Wireless connections Network Access Control    “All telephone access to the network shall be centrally protected by strong authentication controls. Modems shall be configured for dialin or dial-out access but not both. The Network Administrator shall provide procedures to grant access to modem services. Users shall not install modems at any other location on the network without appropriate review and authorization.” “Any gateway proposed to be installed on the company’s network that would violate policies or procedures established from these policies shall not be installed without prior approval of the Information Security Management Committee.” “Applications that require gateway services shall be authenticated to the network. If the service itself cannot be authenticated, services carried through the gateway shall be subject to authentication policies described in this document.” Login Policies User Identification  Guest accounts  Login Banners   Establish privacy expectation  Work as “no-trespassing” signs Login Controls  Login Reporting  User Accounts  Establishment of special privileges Password Policies  Policies defining strength of passwords  Length of password  Composition of password  Storage of passwords by users  Default passwords for systems / applications  This problem is going away, but still  Password Testing Telecommuting / Remote Access Policies  Preserve security of IT assets at the organization  Employee’s equipment is probably not well protected  Authentication over the internet / dial-up  Protection of organizational data  Legally / Technically  In Transit / Stored / During Processing Mobile Equipment Employees work with company equipment outside of the perimeter  Storing data on removable drives   USB drives