KEMBAR78
Authentication | PPTX
AUTHENTICATION
THE AUTHENTICATION PROCESS
• AUTHENTICATION
• ACT OF CONFIRMING THE IDENTITY OF A POTENTIAL USER
• VERIFY IDENTITY BY PROVIDING ONE OR MORE OF:
• SOMETHING YOU KNOW
• SOMETHING YOU HAVE
• SOMETHING YOU ARE
• SOMETHING YOU DO
• MULTIFACTOR
• NETWORK AUTHENTICATION FORMS:
• LOCAL AUTHENTICATION
• MOST COMMON FORM OF AUTHENTICATION
• CENTRALIZED AUTHENTICATION SERVICE
AUTHENTICATION SERVICES
• AUTHENTICATION - PROCESS OF VERIFYING CREDENTIALS
• AUTHENTICATION SERVICES PROVIDED ON A NETWORK TO AUTHENTICATE,
AUTHORIZE, AND ACCOUNTABILITY
• COMMON TYPES OF AUTHENTICATION SERVERS:
• KERBEROS
• RADIUS
• TACACS
• LDAP
• SAML
CENTRALIZED AUTHENTICATION
• ALLEVIATES THE NEED TO PROVIDE EACH SERVER ON THE NETWORK WITH A SEPARATE DATABASE
OF USERNAMES AND PASSWORDS
• SUBSTANTIAL DOWNSIDE:
• AUTHENTICATION SERVER BECOMES A SINGLE POINT OF FAILURE
• DIFFERENT AUTHENTICATION METHODS
• KERBEROS,
• TACACS+
• RADIUS
4
RADIUS
• RADIUS (REMOTE AUTHENTICATION DIAL IN USER SERVICE) -
DEVELOPED IN 1992 AND BECAME INDUSTRY STANDARD
• ORIGINALLY DESIGNED FOR REMOTE DIAL-IN ACCESS TO CORPORATE NETWORK
• TRANSMITS UNENCRYPTED AUTHENTICATION PACKETS ACROSS THE NETWORK
• REMOTE IN NAME ALMOST MISNOMER: RADIUS AUTHENTICATION USED FOR
MORE THAN CONNECTING TO REMOTE NETWORKS
• WITH DEVELOPMENT OF IEEE 802.1X PORT SECURITY FOR BOTH WIRED AND
WIRELESS LANS, RADIUS SEEN EVEN GREATER USAGE
RADIUS: CLIENTS
• RADIUS CLIENT IS NOT DEVICE REQUESTING AUTHENTICATION
• RADIUS CLIENT IS DEVICE LIKE WIRELESS AP OR DIAL-UP SERVER RESPONSIBLE
FOR SENDING USER
CREDENTIALS AND CONNECTION
PARAMETERS IN FORM OF RADIUS
MESSAGE TO RADIUS SERVER
• RADIUS SERVER AUTHENTICATES AND
AUTHORIZES RADIUS CLIENT REQUEST AND
SENDS BACK RADIUS MESSAGE RESPONSE
• RADIUS CLIENTS ALSO SEND RADIUS
ACCOUNTING MESSAGES TO RADIUS SERVERS
KERBEROS
• KERBEROS - AUTHENTICATION SYSTEM DEVELOPED AT MIT THAT USES
ENCRYPTION AND AUTHENTICATION FOR SECURITY
• MOST OFTEN USED IN EDUCATIONAL AND GOVERNMENT SETTINGS
• NOT RECOMMENDED FOR AUTHENTICATION OF OUTSIDE USERS
• SENDS PASSWORDS IN CLEARTEXT
• KERBEROS TICKET:
• CONTAINS INFORMATION LINKING IT TO THE USER
• USER PRESENTS TICKET TO NETWORK FOR A SERVICE
• DIFFICULT TO COPY
• EXPIRES AFTER A FEW HOURS OR A DAY
FIREWALLS
• SOME FIREWALLS PROVIDE A VARIETY OF AUTHENTICATION METHODS
• FIREWALLS ARE NOT JUST FOR PACKET FILTERING ANYMORE
• MOST FIREWALLS MAKE USE OF ONE OR MORE WELL-KNOWN SYSTEMS
• RADIUS AND TACACS+
TERMINAL ACCESS CONTROL ACCESS CONTROL SYSTEM
(TACACS)
• TERMINAL ACCESS CONTROL ACCESS CONTROL SYSTEM
PLUS(TACACS+) - AUTHENTICATION SERVICE COMMONLY USED ON UNIX
DEVICES
• COMMUNICATES BY FORWARDING USER AUTHENTICATION INFORMATION TO A
CENTRALIZED SERVER
• LATEST AND STRONGEST VERSION OF A SET OF AUTHENTICATION PROTOCOLS
DEVELOPED BY CISCO SYSTEMS
• PROVIDE THE AAA SERVICES
• AUTHENTICATION, AUTHORIZATION, ACCOUNTING
• USES A HASHING ALGORITHM (MD5) TO KEEP THE PASSWORD ITSELF A SECRET
COMPARISON OF RADIUS AND TACACS+
• FILTERING CHARACTERISTICS
• TACACS+ USES TCP PORT 49
• RADIUS USES UDP PORT 1812 AND 1813
• SEE TABLE 3-3
• NAT CHARACTERISTICS
• RADIUS DOESN’T WORK WITH NETWORK ADDRESS TRANSLATION (NAT)
• TACACS+ SHOULD WORK WITH NAT SYSTEMS
• STATIC IP ADDRESS MAPPINGS WORK BEST FOR BOTH
PASSWORD SECURITY ISSUES
• MANY AUTHENTICATION SYSTEMS DEPEND IN PART OR ENTIRELY ON
PASSWORDS
• METHOD IS TRULY SECURE ONLY FOR CONTROLLING OUTBOUND INTERNET
ACCESS
• PASSWORD GUESSING AND EAVESDROPPING ATTACKS ARE LIKELY ON INBOUND
ACCESS ATTEMPTS
• AVOID VULNERABILITIES BY ENSURING THAT NETWORK’S AUTHORIZED USERS
• PROTECT THEIR PASSWORDS EFFECTIVELY
• OBSERVE SOME SIMPLE SECURITY HABITS
THE SHADOW PASSWORD SYSTEM
• LINUX STORES PASSWORDS IN THE /ETC/SHADOW FILE
• IN ENCRYPTED FORMAT USING A ONE-WAY HASH FUNCTION
• LINUX STORES USER NAMES IN THE /ETC/SHADOW FILE
• SHADOW PASSWORD SYSTEM
• FEATURE OF THE LINUX OPERATING SYSTEM
• ENABLES THE SECURE STORAGE OF PASSWORDS
• FILE HAS RESTRICTED ACCESS
• PASSWORDS ARE STORED ONLY AFTER BEING ENCRYPTED WITH THE SALT VALUE
AND AN ENCODING ALGORITHM
• ON WINDOWS THE FILE IS CALLED SAM
• THE HASHES ARE STORED IN THE WINDOWS SAM FILE. THIS FILE IS LOCATED ON YOUR
SYSTEM AT C:WINDOWSSYSTEM32CONFIG BUT IS NOT ACCESSIBLE WHILE THE OPERATING
SYSTEM IS BOOTED UP.
ONE-TIME PASSWORD SOFTWARE
• TWO TYPES OF ONE-TIME PASSWORDS ARE AVAILABLE:
• CHALLENGE-RESPONSE PASSWORDS
• AUTHENTICATING COMPUTER OR FIREWALL GENERATES A RANDOM NUMBER (THE CHALLENGE) AND SENDS IT
TO THE USER, WHO ENTERS A SECRET PIN OR PASSWORD (THE RESPONSE)
• PASSWORD LIST PASSWORDS
• USER ENTERS A SEED PHRASE, AND THE PASSWORD SYSTEM GENERATES A LIST OF PASSWORDS
CERTIFICATE BASED AUTHENTICATION
• USE OF DIGITAL CERTIFICATES TO AUTHENTICATE USERS
• MUST SET UP A PUBLIC-KEY INFRASTRUCTURE (PKI)
• GENERATES KEYS FOR USERS
• USER RECEIVES A CODE CALLED A PUBLIC KEY
• GENERATED USING THE SERVER’S PRIVATE KEY
• USES THE PUBLIC KEY TO SEND ENCRYPTED INFORMATION TO THE SERVE
802.1X WI-FI AUTHENTICATION
• PROVIDES FOR AUTHENTICATION OF USERS ON WIRELESS NETWORKS
• REQUIRES THE USE OF A SMART CARD OR DIGITAL CERTIFICATE
• WI-FI USES OF EXTENSIBLE AUTHENTICATION PROTOCOL (EAP)
• ENABLES A SYSTEM THAT USES WI-FI TO AUTHENTICATE USERS ON OTHER KINDS
OF NETWORK OPERATING
SUMMARY
• FIREWALLS CAN MAKE USE OF MANY DIFFERENT AUTHENTICATION SCHEMES:
USER, CLIENT, SESSION
• CENTRALIZED AUTHENTICATION SYSTEM
• FIREWALL WORKS IN TANDEM WITH AUTHENTICATION SERVER
• SINGLE-WORD, STATIC PASSWORD SYSTEMS
• RECEIVE A PASSWORD FROM A USER, COMPARE IT AGAINST A DATABASE OF
PASSWORDS, AND THEN GRANT ACCESS IF A MATCH IS MADE
• ONE-TIME PASSWORD SYSTEMS
• GENERATE A PASSWORD EACH TIME THE USER ATTEMPTS TO LOG ON TO THE
NETWORK

Authentication

  • 1.
  • 2.
    THE AUTHENTICATION PROCESS •AUTHENTICATION • ACT OF CONFIRMING THE IDENTITY OF A POTENTIAL USER • VERIFY IDENTITY BY PROVIDING ONE OR MORE OF: • SOMETHING YOU KNOW • SOMETHING YOU HAVE • SOMETHING YOU ARE • SOMETHING YOU DO • MULTIFACTOR • NETWORK AUTHENTICATION FORMS: • LOCAL AUTHENTICATION • MOST COMMON FORM OF AUTHENTICATION • CENTRALIZED AUTHENTICATION SERVICE
  • 3.
    AUTHENTICATION SERVICES • AUTHENTICATION- PROCESS OF VERIFYING CREDENTIALS • AUTHENTICATION SERVICES PROVIDED ON A NETWORK TO AUTHENTICATE, AUTHORIZE, AND ACCOUNTABILITY • COMMON TYPES OF AUTHENTICATION SERVERS: • KERBEROS • RADIUS • TACACS • LDAP • SAML
  • 4.
    CENTRALIZED AUTHENTICATION • ALLEVIATESTHE NEED TO PROVIDE EACH SERVER ON THE NETWORK WITH A SEPARATE DATABASE OF USERNAMES AND PASSWORDS • SUBSTANTIAL DOWNSIDE: • AUTHENTICATION SERVER BECOMES A SINGLE POINT OF FAILURE • DIFFERENT AUTHENTICATION METHODS • KERBEROS, • TACACS+ • RADIUS 4
  • 5.
    RADIUS • RADIUS (REMOTEAUTHENTICATION DIAL IN USER SERVICE) - DEVELOPED IN 1992 AND BECAME INDUSTRY STANDARD • ORIGINALLY DESIGNED FOR REMOTE DIAL-IN ACCESS TO CORPORATE NETWORK • TRANSMITS UNENCRYPTED AUTHENTICATION PACKETS ACROSS THE NETWORK • REMOTE IN NAME ALMOST MISNOMER: RADIUS AUTHENTICATION USED FOR MORE THAN CONNECTING TO REMOTE NETWORKS • WITH DEVELOPMENT OF IEEE 802.1X PORT SECURITY FOR BOTH WIRED AND WIRELESS LANS, RADIUS SEEN EVEN GREATER USAGE
  • 6.
    RADIUS: CLIENTS • RADIUSCLIENT IS NOT DEVICE REQUESTING AUTHENTICATION • RADIUS CLIENT IS DEVICE LIKE WIRELESS AP OR DIAL-UP SERVER RESPONSIBLE FOR SENDING USER CREDENTIALS AND CONNECTION PARAMETERS IN FORM OF RADIUS MESSAGE TO RADIUS SERVER • RADIUS SERVER AUTHENTICATES AND AUTHORIZES RADIUS CLIENT REQUEST AND SENDS BACK RADIUS MESSAGE RESPONSE • RADIUS CLIENTS ALSO SEND RADIUS ACCOUNTING MESSAGES TO RADIUS SERVERS
  • 7.
    KERBEROS • KERBEROS -AUTHENTICATION SYSTEM DEVELOPED AT MIT THAT USES ENCRYPTION AND AUTHENTICATION FOR SECURITY • MOST OFTEN USED IN EDUCATIONAL AND GOVERNMENT SETTINGS • NOT RECOMMENDED FOR AUTHENTICATION OF OUTSIDE USERS • SENDS PASSWORDS IN CLEARTEXT • KERBEROS TICKET: • CONTAINS INFORMATION LINKING IT TO THE USER • USER PRESENTS TICKET TO NETWORK FOR A SERVICE • DIFFICULT TO COPY • EXPIRES AFTER A FEW HOURS OR A DAY
  • 8.
    FIREWALLS • SOME FIREWALLSPROVIDE A VARIETY OF AUTHENTICATION METHODS • FIREWALLS ARE NOT JUST FOR PACKET FILTERING ANYMORE • MOST FIREWALLS MAKE USE OF ONE OR MORE WELL-KNOWN SYSTEMS • RADIUS AND TACACS+
  • 9.
    TERMINAL ACCESS CONTROLACCESS CONTROL SYSTEM (TACACS) • TERMINAL ACCESS CONTROL ACCESS CONTROL SYSTEM PLUS(TACACS+) - AUTHENTICATION SERVICE COMMONLY USED ON UNIX DEVICES • COMMUNICATES BY FORWARDING USER AUTHENTICATION INFORMATION TO A CENTRALIZED SERVER • LATEST AND STRONGEST VERSION OF A SET OF AUTHENTICATION PROTOCOLS DEVELOPED BY CISCO SYSTEMS • PROVIDE THE AAA SERVICES • AUTHENTICATION, AUTHORIZATION, ACCOUNTING • USES A HASHING ALGORITHM (MD5) TO KEEP THE PASSWORD ITSELF A SECRET
  • 10.
    COMPARISON OF RADIUSAND TACACS+ • FILTERING CHARACTERISTICS • TACACS+ USES TCP PORT 49 • RADIUS USES UDP PORT 1812 AND 1813 • SEE TABLE 3-3 • NAT CHARACTERISTICS • RADIUS DOESN’T WORK WITH NETWORK ADDRESS TRANSLATION (NAT) • TACACS+ SHOULD WORK WITH NAT SYSTEMS • STATIC IP ADDRESS MAPPINGS WORK BEST FOR BOTH
  • 11.
    PASSWORD SECURITY ISSUES •MANY AUTHENTICATION SYSTEMS DEPEND IN PART OR ENTIRELY ON PASSWORDS • METHOD IS TRULY SECURE ONLY FOR CONTROLLING OUTBOUND INTERNET ACCESS • PASSWORD GUESSING AND EAVESDROPPING ATTACKS ARE LIKELY ON INBOUND ACCESS ATTEMPTS • AVOID VULNERABILITIES BY ENSURING THAT NETWORK’S AUTHORIZED USERS • PROTECT THEIR PASSWORDS EFFECTIVELY • OBSERVE SOME SIMPLE SECURITY HABITS
  • 12.
    THE SHADOW PASSWORDSYSTEM • LINUX STORES PASSWORDS IN THE /ETC/SHADOW FILE • IN ENCRYPTED FORMAT USING A ONE-WAY HASH FUNCTION • LINUX STORES USER NAMES IN THE /ETC/SHADOW FILE • SHADOW PASSWORD SYSTEM • FEATURE OF THE LINUX OPERATING SYSTEM • ENABLES THE SECURE STORAGE OF PASSWORDS • FILE HAS RESTRICTED ACCESS • PASSWORDS ARE STORED ONLY AFTER BEING ENCRYPTED WITH THE SALT VALUE AND AN ENCODING ALGORITHM • ON WINDOWS THE FILE IS CALLED SAM • THE HASHES ARE STORED IN THE WINDOWS SAM FILE. THIS FILE IS LOCATED ON YOUR SYSTEM AT C:WINDOWSSYSTEM32CONFIG BUT IS NOT ACCESSIBLE WHILE THE OPERATING SYSTEM IS BOOTED UP.
  • 13.
    ONE-TIME PASSWORD SOFTWARE •TWO TYPES OF ONE-TIME PASSWORDS ARE AVAILABLE: • CHALLENGE-RESPONSE PASSWORDS • AUTHENTICATING COMPUTER OR FIREWALL GENERATES A RANDOM NUMBER (THE CHALLENGE) AND SENDS IT TO THE USER, WHO ENTERS A SECRET PIN OR PASSWORD (THE RESPONSE) • PASSWORD LIST PASSWORDS • USER ENTERS A SEED PHRASE, AND THE PASSWORD SYSTEM GENERATES A LIST OF PASSWORDS
  • 14.
    CERTIFICATE BASED AUTHENTICATION •USE OF DIGITAL CERTIFICATES TO AUTHENTICATE USERS • MUST SET UP A PUBLIC-KEY INFRASTRUCTURE (PKI) • GENERATES KEYS FOR USERS • USER RECEIVES A CODE CALLED A PUBLIC KEY • GENERATED USING THE SERVER’S PRIVATE KEY • USES THE PUBLIC KEY TO SEND ENCRYPTED INFORMATION TO THE SERVE
  • 15.
    802.1X WI-FI AUTHENTICATION •PROVIDES FOR AUTHENTICATION OF USERS ON WIRELESS NETWORKS • REQUIRES THE USE OF A SMART CARD OR DIGITAL CERTIFICATE • WI-FI USES OF EXTENSIBLE AUTHENTICATION PROTOCOL (EAP) • ENABLES A SYSTEM THAT USES WI-FI TO AUTHENTICATE USERS ON OTHER KINDS OF NETWORK OPERATING
  • 16.
    SUMMARY • FIREWALLS CANMAKE USE OF MANY DIFFERENT AUTHENTICATION SCHEMES: USER, CLIENT, SESSION • CENTRALIZED AUTHENTICATION SYSTEM • FIREWALL WORKS IN TANDEM WITH AUTHENTICATION SERVER • SINGLE-WORD, STATIC PASSWORD SYSTEMS • RECEIVE A PASSWORD FROM A USER, COMPARE IT AGAINST A DATABASE OF PASSWORDS, AND THEN GRANT ACCESS IF A MATCH IS MADE • ONE-TIME PASSWORD SYSTEMS • GENERATE A PASSWORD EACH TIME THE USER ATTEMPTS TO LOG ON TO THE NETWORK

Editor's Notes

  • #6 RADIUS RADIUS (Remote Authentication Dial In User Service) - Developed in 1992 and became industry standard Originally designed for remote dial-in access to corporate network Remote in name almost misnomer: RADIUS authentication used for more than connecting to remote networks With development of IEEE 802.1x port security for both wired and wireless LANs, RADIUS seen even greater usage
  • #12 Lightweight Directory Access Protocol (LDAP) X.500 defines protocol for client application access Directory Access Protocol (DAP) Lightweight Directory Access Protocol (LDAP) -Simpler subset of DAP Designed to run over TCP/IP Has simpler functions Encodes protocol elements simpler way than X.500 Secure LDAP - LDAP over SSL (LDAPS) LDAP injection attacks - Attacks when user input not properly filtered
  • #13 Lightweight Directory Access Protocol (LDAP) X.500 defines protocol for client application access Directory Access Protocol (DAP) Lightweight Directory Access Protocol (LDAP) -Simpler subset of DAP Designed to run over TCP/IP Has simpler functions Encodes protocol elements simpler way than X.500 Secure LDAP - LDAP over SSL (LDAPS) LDAP injection attacks - Attacks when user input not properly filtered
  • #15 Lightweight Directory Access Protocol (LDAP) X.500 defines protocol for client application access Directory Access Protocol (DAP) Lightweight Directory Access Protocol (LDAP) -Simpler subset of DAP Designed to run over TCP/IP Has simpler functions Encodes protocol elements simpler way than X.500 Secure LDAP - LDAP over SSL (LDAPS) LDAP injection attacks - Attacks when user input not properly filtered
  • #17 Security Assertion Markup Language (SAML): Steps 1-3 User attempts to reach website of service provider that requires username and password Service provider generates SAML authentication request encoded and embedded into URL Service provider sends redirect URL to user's browser that includes encoded SAML authentication request, which then sent to identity provider Identity provider decodes SAML request and extracts embedded URL, then attempts authenticate user either by asking for login credentials or checking for valid session cookies Identity provider generates SAML response that contains authenticated user's username Identity provider encodes SAML response and returns that information to the user's browser Within the SAML response, mechanism so that user’s browser can forward information back to service provider, either by displaying a form that requires the user to click on a Submit button or by automatically sending to the service provider. Service provider verifies the SAML response by using the identity provider’s public key; if response successfully verified, user is logged in