G 53 SEC Authentication and Identification Who What

  • Slides: 30
Download presentation
G 53 SEC Authentication and Identification Who? What? Where? 1

G 53 SEC Authentication and Identification Who? What? Where? 1

G 53 SEC Coursework • NOT team work • You will need to solve

G 53 SEC Coursework • NOT team work • You will need to solve TWO problems, e. g. firewall AND spam filter • Labs will start week commencing 20 Feb 2012 • Submission deadline will be BEFORE EASTER BREAK • Some useful hints about the coursework will be given to you within the next couple of weeks (after you start working on the problems) 2

G 53 SEC Overview of Today’s Lecture: • Username and Password • Managing Passwords

G 53 SEC Overview of Today’s Lecture: • Username and Password • Managing Passwords • Choosing Passwords • Spoofing Attacks • Protecting the Password File • Single Sign-On • Alternative Approaches • Summary 3

G 53 SEC Username and Password: • Identification – Who you are • Authentication

G 53 SEC Username and Password: • Identification – Who you are • Authentication – The process of verifying a claimed identity • TOCTTOU – time of check to time of use Repeated authentication – at start as well as during a session 4

G 53 SEC Username and Password (continued): First line of defence + Widely accepted

G 53 SEC Username and Password (continued): First line of defence + Widely accepted + Not too difficult to implement - Managing passwords – expensive - Common way of getting in 5

G 53 SEC Exmaples of potential hazards… • forgotten passwords • password guessing •

G 53 SEC Exmaples of potential hazards… • forgotten passwords • password guessing • password spoofing • compromise of the password file Remember User has a vital role in password protection 6

G 53 SEC Managing Passwords: • Password = a secret between user and system

G 53 SEC Managing Passwords: • Password = a secret between user and system Issues • Password ends up in right hands? • Interception? • No password yet? • New passwords – delay ok • Forgotten passwords – instant remedy necessary 7

G 53 SEC Choosing Passwords: • Critical security issue • Keeping probability of guessing

G 53 SEC Choosing Passwords: • Critical security issue • Keeping probability of guessing to minimum Guessing strategies: • Exhaustive search – brute force • Intelligent search – e. g. dictionary attack 8

G 53 SEC continued… Defences: • Change default passwords • Password length • Password

G 53 SEC continued… Defences: • Change default passwords • Password length • Password format • Avoid obvious passwords 9

G 53 SEC continued… Further security improvements: • Password checkers • Password generation •

G 53 SEC continued… Further security improvements: • Password checkers • Password generation • Password aging • Limit login attempts A combination of all those = highest security? 10

G 53 SEC continued… 11

G 53 SEC continued… 11

G 53 SEC continued… • People forget • Contact an operator • Opens a

G 53 SEC continued… • People forget • Contact an operator • Opens a way for a new attack – Social Engineering • Regularly used passwords best remembered Tip - don’t change passwords before the weekend or holidays 12

G 53 SEC Spoofing attacks: • Unilateral authentication – one way • No guarantee

G 53 SEC Spoofing attacks: • Unilateral authentication – one way • No guarantee about end system Spoofing attack • e. g. Fake login screen Prevention • display failed login attempts • trusted path (e. g. ctrl+alt+del) • mutual authentication 13

G 53 SEC continued… Password caching • password temporarily stored (buffer, cache, web page)

G 53 SEC continued… Password caching • password temporarily stored (buffer, cache, web page) • beyond control of user • sometimes for too long . 14

G 53 SEC Protecting the Password File: • Password compared to an entry in

G 53 SEC Protecting the Password File: • Password compared to an entry in a password file • An attractive target for an attacker Protection • Cryptography • Access control enforced by the OS • Combination of the above 15

G 53 SEC Cryptography: One-way Function A function that is relatively easy to compute

G 53 SEC Cryptography: One-way Function A function that is relatively easy to compute but significantly harder to undo or reverse. x f(x) x • f(x) is stored in the password file • f(x) compared to computed f(x’) from x’ supplied by user 16

G 53 SEC Access Control: Access Control Restricts access to files and resource to

G 53 SEC Access Control: Access Control Restricts access to files and resource to users with appropriate privileges • Password file can’t be world readable - Off-line dictionary attacks • or writeable - Change password 17

G 53 SEC continued… Password salting Password + Additional Info (Salt) - > Encrypt

G 53 SEC continued… Password salting Password + Additional Info (Salt) - > Encrypt Remember • Combination of mechanisms can enhance protection • Separate security relevant and openly available data (e. g. /etc/passwd and shadow password files) 18

G 53 SEC Single Sign-On: • Not convenient to repeatedly authenticate • Whether one

G 53 SEC Single Sign-On: • Not convenient to repeatedly authenticate • Whether one or multiple passwords Single Sign-On Password entered once. Stored by system subsequently authenticating on your behalf. and • Convenient • But new problems arise – storage of password 19

G 53 SEC Alternative Approaches used for Authentication: • Something you know • Something

G 53 SEC Alternative Approaches used for Authentication: • Something you know • Something you hold • Who you are • What you do • Where you are 20

G 53 SEC Something You Know: • Knowledge of a “secret” - Password -

G 53 SEC Something You Know: • Knowledge of a “secret” - Password - PIN - Personal Details • Anybody who obtains your secret = YOU • No trace of passing secret to someone else • Can you prove your innocence? 21

G 53 SEC Something You Hold: • Physical token - A key to a

G 53 SEC Something You Hold: • Physical token - A key to a lock - Card (Smart cards, RFID cards) - Identity Tag • Can be lost or stolen • Again the one in possession becomes you • Used in combination with something you know 22

G 53 SEC Something You Are: • Biometric schemes – unique physical characteristics -

G 53 SEC Something You Are: • Biometric schemes – unique physical characteristics - Face - Fingerprints - Iris patterns, etc… • Accuracy of training and authentication • “forged” fingers • Mutilations • Acceptable by users? 23

G 53 SEC Biometrics: 1. Enrolment - Collection and storage of reference templates 2.

G 53 SEC Biometrics: 1. Enrolment - Collection and storage of reference templates 2. Identification – Finding a user in a database of templates 3. Verification - Comparison against the reference template of identified user Matching algorithm – calculates similarity between reference template and current reading. If similarity above certain threshold, accept user. 24

G 53 SEC Biometrics: False positives – Accepting the wrong user False negatives –

G 53 SEC Biometrics: False positives – Accepting the wrong user False negatives – Rejecting a legitimate user A balance needs to be found! State-of-the-art fingerprint recognition schemes have error rates of around 1 -2% 25

G 53 SEC What You Do: • Mechanical Tasks – repeatable and specific to

G 53 SEC What You Do: • Mechanical Tasks – repeatable and specific to individual - Handwritten signatures - Writing speed and pressure - Keyboard typing speed and intervals between keys • Again needs to take into account false positives and negatives 26

G 53 SEC Where You Are: • Location of access - Operator console vs.

G 53 SEC Where You Are: • Location of access - Operator console vs. arbitrary terminal - Office workstation vs. home PC - Geographical location • IP address or GPS for locating users • Not reliable on its own • Should be used in combination with other mechanisms 27

G 53 SEC To remember: - A Password does not authenticate a person! -

G 53 SEC To remember: - A Password does not authenticate a person! - Successful authentication = user knows a particular secret - No way of distinguishing legitimate user and attacker who obtained the user’s credentials 28

G 53 SEC Summary: • Passwords (creation, management) • Attacks on passwords • Alternative

G 53 SEC Summary: • Passwords (creation, management) • Attacks on passwords • Alternative approaches Next Week Access Control 29

G 53 SEC End 30

G 53 SEC End 30