Access management
* know for test
Subjects
- user or sw that requests access
Objects
- resources networks, servers, data
Identification
- associating a subject with computer/network account
Authentication
Authorization
Accounting
AAA Server
A Server which handles Authentication, Authorization and Accounting
RADIUS, TACACS+, Kerberos
Authentication Factors
* know for test
Something you know
Something you have
Something you are/do
MFA
Multi Factor Authentication
- two or more authentication factors are used to authenticate user
2FA
Two-Factor Authentication
requires two of the three authentication factors
something you know and something you have
or
something you know and something you are
NOT two of the same thing: something you know and something else you know
Authentication Attributes
* know for test
somewhere you are
something you can do
-perform an action uniquely
something you exhibit
-behavior or trait unique to you
someone you know
-web of trust
OS Authentication Provider
OS Authentication Provider
OS sw arch and code providing access mechanisms to provide authentication before starting a shell for subject
-usually is a knowledge based authentication using a password or PIN
Win Authentication
Linux Authentication
Single Sign-on (SSO)
Windows OS Authentication
Interactive login
network login
Local - interactive login
Local Security Authorization (LSA) compares submitted credentials to hash stored in the Security Accounts Manager (SAM)
Network login:
The LSA submits credentials to a network service (Kerberos, or NT Lan Manager (NTLM for older OSs)
Linux OS Authentication Provider
Local interactive shell logins, passwords are checked against hashes in /etc/shadow
Network interactive shell logins, SSH (tcp over port 22) is used, which uses key pairs instead of passwords
SSO - Single Sign-On
Allows the system to authentication once to a local device and be authenticated to compatible application servers without having to enter credentials again
Kerberos framework provides this service
Kerberos Authentication Summarized
Utilizes a Key Distribution Center (KDC) to provide encrypted tickets to a client for use in establishing an authenticated connection to the App Server. Once this mutual authentication has occurred, client-server actions then take place.
Clients and App Servers rely on a Key Distribution Center (KDC) to vouch for their identity
Runs on TCP or UDP port 88
Kerberos Authorization - gory details
Assumes principle has been Authenticated and has a Ticket Granting Ticket and a Ticket Granting Session session key
The client should decrypt the TGS session key with users hashed password
The client sends two messages to the KDC:
- a copy of the TGT and the name of the application it wishes to access; TGT is already encrypted by the KDC’s secret key
- an authenticator consisting of time-stamped client ID encrypted using the TGS session key
The KDC TGS will decrypt both messages
- uses the KDC’s secret key for the TGT and app svr name message
- uses the TGS session key for the authenticator message
The KDC TGS responds with
- Service session key for use between the app svr and the principle
- Service ticket containing info about the user, encrypted with the app srvs secret key
The client forwards two messages to the app svr:
- the Service Ticket, previously encrypted by the KDC using the app svrs secret key
- a time-stamped authenticator encrypted with the session key
The app svr decrypts
- the service ticket to obtain the session key with its secret key, confirming the message has not been tampered
- the authenticator message with the session key
- sends to the client the timestamp used in the authenticator, encrypted by the session key
The client decrypts the authenticator and concludes the app svr is trustworthy
This is called mutual authentication
The server now responds to the clients requests
Authentication Protocols for use with remote access protocols (serial link or VPN)
PAP - Password Authentication Protocol
CHAP - Challenge Handshake Authentication Protocol
Password Attacks
Plain text passwords and protocols (PAP, basic HTTP/FTP and Telnet) should not be used
Online Attacks - should lock after a number of failed attempts, evidence shows up in logs as several failed attempts then a successful login, or successful logon at usually times or locations
Password Spraying - horizontal brute force online attack; attack uses common passwords against multiple usernames
Offline Attacks - attacker has a db of hashed password (win - NTDS.DIT, linux - /etc/shadow) so attacker does not have to interact with authentication system. Indication of such an attack is the access of the file in the system logs.
Password Attacks - Brute Force and Dictionary Attacks
Brute Force - use every combination of character space, difficult for longer passwords due to time and compute power needed
Dictionary - tries to match hashes of plaintext words to a captured hash. Rainbow tables help to speed up the matching. Using salt in hashes helps thwart this type of attack.
EAP / IEEE 802.1
EAP - Extensible Authentication Protocol
IEEE 802.1X
IEEE 802.1x Port based Network Access Control (NAC) protocol
The AAA svr can be a RADIUS(UDP 1812/1813) or TACACS+ (UDP/TCP 49)
See diagram
RADIUS Server
An Authentication Authorization and Auditing server used in a network
See diagram for details
Uses UDP over ports 1812 (Authentication and Authorization) and 1813 (auditing)
Shares secrets with the NAP (Network Access Point)
The NAP is the go between of the Supplicant and the RADIUS AAA server
TACACS+
Terminal Access Controller Access-Control System
Biometric Authentication
FRR - False Rejection Rate
-lower sensitivity, the lower the error rate
FAR - False Acceptance Rate
-lower sensitivity, the higher the error rate
CER - Cross-over Error Rate - the sweet spot
-where FRR and FAR curves meet
recall the diagram Error Rate (y-axis) vs Sensitivity of Sensor (x-axis)
Higher security with FRR, but less usable since no one gets in
Higher FAR can lead to security breaches
Smart Card Authentication using Kerberos - ordered steps
For Kerberos Authentication using a smart card:
Key Management Devices
Smart Card - has a crypto processor
USB Key - if it has a crypto processor
TPM - Trusted Platform Module
- a secure crypto processor enclave implemented on devices within the CPU
HSM - hardware security module
2 Biometric scanning steps
2. A feature extraction module to record the features to uniquely identify the target