Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication. Describe the different types of authentication credentials. List and explain the authentication models. Define authentication servers and present Kerberos. Security+ Guide to Network Security Fundamentals, Third Edition 2 Definition of Authentication Authentication can be defined in two contexts: – The first is viewing authentication as it relates to access control. – The second is to look at it as one of the three key elements of security: Authentication, Authorization, and Accounting. Security+ Guide to Network Security Fundamentals, Third Edition 3 Authentication and Access Control Terminology Access control is the process by which resources or services are granted or denied. It is composed of 4 steps: 1. Identification: The presentation of credentials or identification. 2. Authentication : The verification of the credentials to ensure that they are genuine (authentic) and not fabricated. 3. Authorization: Granting permission for admittance (permission to enter). 4. Access: is the right to use specific resources. Security+ Guide to Network Security Fundamentals, Third Edition 4 Authentication, Authorization, and Accounting (AAA) Information security rests on three key pillars (AAA) that determine who the user is: Authentication; what the user can do: Authorization; and what the user did: Accounting. • • Authentication − Provides a way of identifying a user. − Controls access by requiring valid user credentials. Authorization (Access Control) − Determines whether the user has the authority to carry out certain tasks (e.g. resources or services a user is permitted..). − Often defined as the process of enforcing policies. Security+ Guide to Network Security Fundamentals, Third Edition 5 Authentication, Authorization, and Accounting (AAA) • Accounting (Auditing) − Measures the resources a user “consumes” during each network session (e.g. record session begins and ends, services being used..) − Recorded accounting information can then be used in different ways: • To find evidence of problems. • For billing. • For planning. Security+ Guide to Network Security Fundamentals, Third Edition 6 Authentication, Authorization, and Accounting (AAA) (continued) AAA servers – Servers dedicated to performing AAA functions. – Can provide significant advantages in a network. Security+ Guide to Network Security Fundamentals, Third Edition 7 Authentication Credentials Types of authentication, or authentication credentials can be classified into three main categories: • What the user knows (passwords). • What the user has (token, key, proximity card). • What the user is (standard/behavioral/cognitive biometrics). Security+ Guide to Network Security Fundamentals, Third Edition 8 One-Time Passwords Standard passwords are the most common form of authentication credentials, and are typically static in nature. One-time passwords (OTP) – Dynamic passwords that change frequently. – Systems using OTPs generate a unique password on demand that is not reusable. – The most common type is a time-synchronized OTP, and is used in conjunction with a token (small device). • The token and a corresponding authentication server share the same algorithm. • Each algorithm is different for each user’s token. Security+ Guide to Network Security Fundamentals, Third Edition 9 One-Time Passwords (continued) Security+ Guide to Network Security Fundamentals, Third Edition 10 One-Time Passwords (continued) Security+ Guide to Network Security Fundamentals, Third Edition 11 One-Time Passwords (continued) There are several variations of OTP systems such as Challenge-based OTPs. – Authentication server displays a challenge (a random number) to the user. – User then enters the challenge number into the token • Which then executes a special algorithm to generate a password. – Because the authentication server has this same algorithm, it can also generate the password and compare it against that entered by the user. Security+ Guide to Network Security Fundamentals, Third Edition 12 Standard Biometrics Standard biometrics uses a person’s unique characteristics (e.g. fingerprints, faces, hands, retinas..)for authentication. Fingerprint scanners are the most common type of standard biometric device, and are of two types: – Static fingerprint scanner – Dynamic fingerprint scanner Disadvantages of standard biometrics: – Costs – Readers are not always foolproof. Security+ Guide to Network Security Fundamentals, Third Edition 13 Standard Biometrics (continued) Static fingerprint scanner Security+ Guide to Network Security Fundamentals, 2e 14 Standard Biometrics (continued) Dynamic fingerprint scanner Security+ Guide to Network Security Fundamentals, Third Edition 15 Behavioral Biometrics Behavioral biometrics authenticates by normal actions that the user performs. The most promising behavioral biometrics are: − Keystroke dynamics − Voice recognition − Computer footprinting Security+ Guide to Network Security Fundamentals, Third Edition 16 Behavioral Biometrics Keystroke dynamics – Attempt to recognize a user’s unique typing rhythm. – Keystroke dynamics uses two unique typing variables: • Dwell time: Time it takes for a key to be pressed an then released. • Flight time: Time between keystrokes (both “down” when the key is pressed and “up” when the key is released, are measured). Security+ Guide to Network Security Fundamentals, Third Edition 17 Security+ Guide to Network Security Fundamentals, Third Edition 18 Behavioral Biometrics (continued) Security+ Guide to Network Security Fundamentals, Third Edition 19 Behavioral Biometrics (continued) Security+ Guide to Network Security Fundamentals, Third Edition 20 Behavioral Biometrics (continued) Voice recognition – Used to authenticate users based on the unique characteristics of a person’s voice (e.g. user’s size of the head and user’s age). – Phonetic cadence • Speaking two words together in a way that one word “bleeds” into the next word. • Becomes part of each user’s speech pattern. Computer footprint – When and from where a user normally accesses a system. Security+ Guide to Network Security Fundamentals, Third Edition 21 Cognitive Biometrics Cognitive biometrics is related to the perception, thought process, and understanding of the user. – Considered to be much easier for the user to remember because it is based on the user’s life experiences, and make it very difficult for an attacker to imitate. Examples of cognitive biometrics: – One example of cognitive biometrics is based on a life experience that the user remembers. – Another example of cognitive biometrics requires the user to identify specific faces. Security+ Guide to Network Security Fundamentals, Third Edition 22 Security+ Guide to Network Security Fundamentals, Third Edition 23 Authentication Models Authentication credentials can be combined to provide extended security, hence creating different authentication models. Single and multi-factor authentication – One-factor authentication • Using only one authentication credential. – Two-factor authentication • Enhances security, particularly if different types of authentication methods are used. – Three-factor authentication • Requires that a user present three different types of authentication credentials. Security+ Guide to Network Security Fundamentals 24 Authentication Models (continued) Single sign-on – Identity management • Using a single authenticated ID to be shared across multiple networks. – Federated identity management (FIM) • When those networks are owned by different organizations. • One application of FIM is called single sign-on (SSO). It consists in using one authentication to access multiple accounts or applications. Security+ Guide to Network Security Fundamentals, Third Edition 25 Authentication Models (continued) Windows Live ID – Originally introduced in 1999 as .NET Passport. – Requires a user to create a standard username and password. – When the user wants to log into a Web site that supports Windows Live ID, the user will first be redirected to the nearest authentication server. – Once authenticated, the user is given an encrypted timelimited “global” cookie. Security+ Guide to Network Security Fundamentals, Third Edition 26 Authentication Models (continued) Windows CardSpace – Feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy. – It allows users to create and use virtual business cards that contain information that identifies the user. Security+ Guide to Network Security Fundamentals, Third Edition 27 Authentication Models (continued) Security+ Guide to Network Security Fundamentals, Third Edition 28 Authentication Servers Authentication can be provided on a network by a dedicated AAA or authentication server. The most common type of authentication server is Kerberos. Security+ Guide to Network Security Fundamentals, Third Edition 29 Kerberos Kerberos Definition – An authentication system developed by the Massachusetts Institute of Technology (MIT), to provide authentication between networked users (clients) and services (e.g. File system server, remote login server). – Authentication is achieved through a central server called “Key Distribution Center” (KDC). It consists of two parts: • Authentication Server (AS): It issues “Ticket Granting Tickets” TGT. • Ticket Granting Server (TGS): It issues service tickets. – Tickets contain specific user information, and restrict what a user can do. – Tickets expire after a few hours or a day. Security+ Guide to Network Security Fundamentals, Third Edition 30 Kerberos Kerberos Architecture Kerberos KDC AS Ticket Mail Server TGS Ticket Printer Server Client Security+ Guide to Network Security Fundamentals, Third Edition 31 Kerberos Security+ Guide to Network Security Fundamentals, Third Edition 32 Kerberos (you may remove this slide if you wish) Advantages − Strong authentication. − Single Sign-on (SSO) capability. Disadvantages − Single point of failure (Centralized KDC). − Authentication Server could be compromised. − TGT could be stolen to access network services. − Subject to password guessing. Security+ Guide to Network Security Fundamentals, Third Edition 33 Summary • Access control is the process by which resources or services are denied or granted. • AAA are the basic pillars of security: – Authentication: verifying that a person requesting access to a system is who he claims to be. – Access control: regulating what a subject can do with an object. – Auditing: review of the security settings. Security+ Guide to Network Security Fundamentals, Third Edition 34 Summary • There are three types of authentication methods (what the user knows, has, and is). • Authentication credentials can be combined to provide extended security. • Authentication can be provided on a network by a dedicated AAA or authentication server (e.g. Kerberos). Security+ Guide to Network Security Fundamentals, Third Edition 35 References • Derek Konigsberg, Kerberos: The Network Authentication Protocol, Linux Enthusiasts and Professionals. [Online] Available: http://www.logicprobe.org/~octo/pres/pres_kerberos.pdf Security+ Guide to Network Security Fundamentals, Third Edition 36