Lecture 3 A Authentication
Lecture 3 A Authentication
Contents
Verifying User and Host Identity
Assessing traditional static password schemes
Authentication
Creating a good quality password policy
The impact of password sniffing
Protecting against social engineering attacks
Authenticating hosts
Address-spoofing
Solutions for wireless networks
Authentication
Authentication is the process of reliably verifying the identity of someone (or
something).
There are lots of examples of authentication in human interaction.
we recognize each others' faces when we meet.
we recognize each others' voices on the telephone.
we are authenticated by the customs official who checks us against the picture on
our passport.
A guard might authenticate you by comparing you with the picture on your badge.
A mail order company might accept as authentication the fact that you know the
Users must enter their passwords into the system at authentication time.
Employees may not disclose their passwords to anyone. This includes administrators and IT
managers.
Creating a good quality password policy
Verification
Validation of information supplied against a table of possible values based on
search.
Authentication of People
Weakness
Traditional password scheme is vulnerable to eavesdropping over an insecure
network.
Solutions?
One-time password (OTP)
these are passwords used once only.
future values cannot be predicted from older values.
Password generation
either generate a printed list, and keep matching list on system to be accessed.
or use an algorithm based on a one-way function f.
Authentication of People
What you Have
Magnetic Card, Magnetic Key
possess item with required code value encoded.
High Quality
Secret
Chosen from large space
Computationally infeasible to guess
Computer vs. Person
Computer has both.
Person has neither.
Authentication of People
Computers:
(Long) high-quality secret
Hidden key (encrypted by password)
Types of Authentication
1. Password-based authentication
Authenticating oneself by showing a secret password to the remote peer (and to the
network).
Always vulnerable to eavesdropping attack.
Usually protection: limit frequency of incorrect password entries.
2. Address-based authentication
Authenticating oneself by using a physically-secured terminal/computer.
Conceptually similar to password-based authentication.
3. Cryptography-based authentication
authenticating oneself by showing evidence of a secret key to the remote peer (and to the
network) but without exposing the secret to the peer (or to the network).
Note: secret key can be obtained from a password.
Password Based Authentication
Passwords
an old idea.
military uses.
everybody knows password of day.
Password Based Authentication
in password based authentication we have a secret quantity.
you have to state it to prove you know it.
has a number of problems.
Problems with Passwords
Eavesdropping
On-line guessing of password
Off-line cracking
Security of password file
Problems with Passwords
1. Eavesdropping
passwords must be uttered to be used.
most people don't watch.
but they are not the people you are worried about.
wiretapping is a more sophisticated problem.
if the password is sent from across a network then eavesdropping is possible.
for example, a traditional telnet connection is unsecured – no cryptography. so an
attacker who can eavesdrop, eg., on the port in use, simply gets to see the password.
Problems with Passwords
2. Trojan Horses
A trojan horse is a useful, or apparently useful, program, which also performs
unwanted/harmful functions.
If a user can be induced to run a trojan horse which mimics the log in program
then the trojan can capture the user’s password.
The password can then be sent to the author of the trojan.
Problems with Passwords
3. On-Line Guessing
I can impersonate you if I can guess your password.
Some systems enforce easily guessable passwords (not really a good idea, but
some do it – would be better to disallow).
Some people use easily guessable passwords.
With enough guesses even obscure passwords can be guessed.
Executing users who get their password wrong would probably be
unacceptable.
Can make sure that guesses have to be typed.
Problems with Passwords
4. Locking Accounts
can lock accounts after too many failed attempts.
but then easy for someone to deny access.
can cut-off connection after a number of failed attempts and require it to be
reestablished.
can have system response be very slow.
Problems with Passwords
5. Off Line Password Guessing
passwords more vulnerable if off-line guessing possible.
off line attack - an intruder captures a quantity that is derived from password.
attacker then takes their time trying to compute password.
Problems
humans usually are not willing to remember 64 bits.
Problems with Passwords
Memorable Passwords
if the password was pronounceable, rather then fully random.
can get enough randomness in 16 characters.
humans won't remember those either.
User Chosen
humans choose poor passwords.
to be proof against off-line attacks passwords need to be ~32 characters long.
humans certainly won't remember those.
Conclusion
passwords will be vulnerable to off-line guessing.
Password Based Authentication
Alternatives
One-time passwords.
But then occasionally need new list.
A set of passwords.
Use only some at each login, on a challenge-response basis.
Eavesdropper has to listen many times.
Password Files
If password file disclosed all passwords vulnerable.
Attacker usually wants any password, not a particular one.
Can use dictionary to attempt to crack some passwords.
Password files must be at least as well protected as anything else.
Password Based Authentication
Other Problems with Passwords
users will give passwords to others.
will write them down.
put them in programs.
will forget them.
Multiple Uses
users may have multiple accounts.
may use same passwords for all.
easier to remember.
break one, break into all.
Password Based Authentication
In Person
Turn up to administrator's terminal.
Authenticate using documents.
Type in password.
Inconvenient.
Gives access to sensitive terminal.
Administrator Chosen
Administrator chooses good password
Gives it to user
Instructs them to change it immediately
Pre-Expired
As before, but password already expired.
Must be changed immediately.
Password Based Authentication
Storing User Passwords
How does a server know Alice‘s password?
Alice's authentication information is individually configured into every server.
One location stores Alice's information and servers retrieve it when needed.
One location stores Alice's information and servers which want to authenticate Alice send Alice's
Biometrics
what you are.
measure physical characteristics.
hard to loan or steal.
Biometric
Examples
retinal scanner
fingerprint scanner
handprint reader
Voiceprints
keystroke timing
Signatures
Problems
Hard to keep biometric quantities secret.
Reader needs tamper-resistant secret.
Cryptographic Authentication
Attacks
eavesdropper learns nothing.
but Bob must store Alice's secret to check X.
so intruder gets Alice's secret.
The Impact of Password Sniffing
If a hacker can't guess your password, there are other ways he/she can try to get it. One way which has
become very popular is called “password sniffing”.
A password sniffer is a software application that scans and records passwords, that are used or
broadcasted on a computer or network interface. It listens to all incoming and outgoing network traffic
and records any instance of a data packet that contains a password.
A password sniffer installs on a host machine and scans all incoming and outgoing network traffic. A
password sniffer may be applied to most network protocols, including HTTP, Internet Message Access
Protocol (IMAP), file transfer protocol (FTP), POP3, Telnet (TN) and related protocols that carry
passwords in some format. In addition, a password sniffer that is installed on a gateway or proxy server
can listen and retrieve all passwords that flow within a network.
A password sniffer is primarily used as a network security tool for storing and restoring passwords.
However, hackers and crackers use such utilities to sniff out passwords for illegal and malicious purposes.