Pertemuan 04 Pengamanan Akses Sistem Matakuliah

advertisement
Matakuliah
Tahun
Versi
: H0242 / Keamanan Jaringan
: 2006
:1
Pertemuan 04
Pengamanan Akses
Sistem
1
Learning Outcomes
Pada akhir pertemuan ini, diharapkan
mahasiswa akan mampu :
– Mahasiswa dapat menerapkan keamanan
akses sistem
2
Outline Materi
• Proteksi Password
• Strategi Password
3
Authentication
• Verifying the identity of another entity
• Two interesting cases (for this class):
– Computer authenticating to another
computer
– Person authenticating to a computer
• Two issues:
– How authentication information is
stored (at both ends)
– Authentication protocol itself
4
Password-based protocols
• Any password-based protocol is
vulnerable to an off-line dictionary attack
if server is compromised
• Goal: password-based protocol should be
secure against off-line attacks when
server is not compromised
– Unfortunately, this has not been the
case in practice (e.g., telnet, cell
phones, etc.)
5
Password selection
• User selection of passwords is typically
very weak
– Lower entropy password makes
dictionary attacks easier
• Typical passwords:
– Derived from account names or
usernames
– Dictionary words, reversed dictionary
words, or small modifications of
dictionary word
6
Password Selection
•
•
•
•
Non-alphanumeric characters
Longer phrases
Can try to enforce good password selection
But these types of passwords are difficult for
people to memorize and type!
7
Centralized Password Storage
• Authentication storage node
– Central server stores password; servers
request the password to authenticate
user
• Auth. facilitator node
– Central server stores password; servers
send information from user to be
authenticated by the central server
• Note that central server must be
authenticated!
8
Authentication Protocols
• Server stores H(pw); user sends pw
– Secure against server compromise, but
not eavesdropping (or replay attacks)
• Server stores pw, sends R; user sends
H(pw,R)
– Secure against eavesdropping, but not
server compromise (or dictionary attack)
• Can we achieve security against both?
9
Authentication of People
•
•
•
•
What you know (passwords)
What you have (keys)
What you are (biometric devices)
Where you are (physical)
10
Access Control
• State of a system
– Includes, e.g., current memory contents,
all secondary storage, contents of all
registers, etc.
• Secure states
– States in which the system is allowed to
reside
– Security policy defines the set of secure
states
– Security mechanism ensures that system
never leaves secure state
11
Access Control List (ACL)
• Instead of storing central matrix, store each
column with the object it represents
– Stored as pairs (s, r)
• Subjects not in list have no rights
– Can use wildcards to give default rights
12
Potential problems
• What if one process gives capabilities to
another? (Possibly indirectly)
– Can lead to security violation
• One solution: assign security
classifications to capabilities
– E.g., when capability created, its
classification is the same as the
requesting process
– Capability contains rights depending on
the object to which it refers
13
Example
• Cryptographic key used to encrypt a file
– A file cannot be “read” unless the subject
has the encryption key
– Can also enforce that requests from n
users are required in order to read data
(and-access), or that any of n users are
able to read data (or-access)
14
Cryptographic secret sharing
• (t, n)-threshold scheme to share a “key”
• Using this to achieve (t, n)-threshold
encryption
• Shamir secret sharing
15
Another example
• Type checking
• Label memory locations as either data or
instructions
– Do not allow execution of type data
– Can potentially be used to limit buffer
overflows
16
Download