FORESEC Academy FORESEC Academy Security Essentials (II) ACCESS CONTROL AND PASSWORD MANAGEMENT FORESEC Academy Agenda Access Control - Techniques - Models Passwords - Password Cracking - Password Management FORESEC Academy Key Terms & Principles Data Owner Data Custodian Separation of duties Least Privilege FORESEC Academy Access Control Techniques Discretionary (DAC) Mandatory (MAC) Role-based Rule-based List-based Token-based FORESEC Academy Lattice Techniques Access Matrix - Objects - Subjects Bell-LaPadula Biba Clark-Wilson FORESEC Academy Lattice Techniques (2) Bell-LaPadula Designed for Military Environment Address only Confidentiality Rules - Simple Security Property - Star Property (* Property) - Strong Star Property FORESEC Academy Lattice Techniques (3) Biba Model for Integrity Suited for Commercial Environment Rules - Simple Integrity Property - Integrity Start Property Information only flow downwards FORESEC Academy Lattice Techniques (4) Clark-Wilson Integrity Model Use an access triple - Subject, Program, Object Prevent loss or corruption of data Ensure well formed transactions FORESEC Academy Access Management Account administration Maintenance Monitoring Revocation FORESEC Academy Access Control Models State machine Information flow Covert channels Non-interference FORESEC Academy Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) FORESEC Academy Centralized Control TACACS RADIUS Domains & Trusts Active Directory Kerberos FORESEC Academy Access Control: Biometrics Hand: Fingerprint, hand geometry Eye: retina, iris Face: Thermograms, Photo Voice print Mannerisms: keystroke, tread, handwriting FORESEC Academy Access Control: Biometrics (2) Key factors in selecting biometrics: Reliability - FRR, FAR, CER, EER User friendliness Cost FORESEC Academy Single Sign-On (SSO) User only have to log on once Credentials are carried with user Simplifies User management Allow centralized management User only has to remember one set of credentials FORESEC Academy Single Sign-On (2) Can take different forms: - Scripts - Directory Services - Kerberos - Thin Clients Security Issues Interoperability Issues FORESEC Academy Access Control: Passwords FORESEC Academy What is Password Cracking? Discovering a plan text password given an encrypted password. FORESEC Academy Methods of Password Cracking Dictionary attack Hybrid attack Brute force attack FORESEC Academy Unix Password Cracking - Crack Name: Crack Operating System: Unix Brief Description: Crack is a "password guessing" program that is designed to quickly identify accounts having weak passwords given a Unix password file. FORESEC Academy Crack Available from ftp://ftp.cerias.purdue.edu/pub/tools/unix/pwdutils/crack Features - Configurable password cracking - Modular approach with various scripts - Combining and extracting password files - Works with any crypt() implementation FORESEC Academy Configuring Crack Download Crack file Unzip the file using gzip - gunzip -r crack5.0.tar.gz Untar the file - tar -xvf crack5.0.tar Read manual.txt Edit the script file Compile program - Crack -makeonly - Crack -makedict FORESEC Academy Running Crack Run Crack with a password file - Crack [options] [-fmt format] [file ...] - Crack myfile Pipe output to a file - Crack myfile > output Run Reporter script to see results - ./Reporter [-quiet] [-html] FORESEC Academy Effectiveness of Crack User Eric password eric – CRACKED User John password john1234 User Mike password 5369421 User Mary password #57adm7# User Sue password sue – CRACKED User Lucy password 12345 – CRACKED User Pat no password – CRACKED User Tim password password – CRACKED User Cathy password 55555 – CRACKED User Frank password abcde – CRACKED User Tom password mnopqr User Karen password bbbbbbbb - CRACKED FORESEC Academy How to Protect Against it Enforce a strong password policy Use shadow passwords Use one-time passwords Use passwd to enforce strong passwords