CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Akshat Sharma Samarth Shah
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
What is EAP EAP stands for Extensible Authentication Protocol. Offers a basic framework for authentication. Many different authentication protocols can.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Authentication servers: RADIUS TACACS+
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
IEEE Wireless Local Area Networks (WLAN’s).
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Georgy Melamed Eran Stiller
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Radius Dave Grizzanti Steve Curti. What is RADIUS? Remote Authentication Dial-In User Service (RADIUS) is a protocol for remote user authentication and.
CS682- Session 10 Prof. Katz. Well-Known Attacks By far the most common security vulnerabilities Attacks that Script-Kiddies are capable of performing.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.
Chapter 17 TACACS+.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
SSH Secure Login Connections over the Internet
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Chapter 13 – Network Security
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
WEP Protocol Weaknesses and Vulnerabilities
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Chapter 3: Authentication, Authorization, and Accounting
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
Cody Brookshear Andy Borman
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
AAA Services Authentication -Who ? -Management of the user’s identity Authorization -What can the user do? -Management of the granted services Accounting.
RADIUS Protocol Sowjanya Talasila Shilpa Pamidimukkala.
Cryptography CSS 329 Lecture 13:SSL.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Port Based Network Access Control
Information Security Professionals
Radius, LDAP, Radius used in Authenticating Users
PPP – Point to Point Protocol
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Protection Mechanisms in Security Management
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)

Agenda  Introduction – TACACS+  Format and Header Values  TACACS+ Operations (AAA)  Vulnerabilities  Conclusion

Introduction – TACACS+  TACACS+ (terminal access controller access-control system plus), pronounced as “tack-acks plus”  TACACS+ originated from the TACACS and extended TACACS protocols. But it is not compatible with them.  A Cisco proprietary protocol.  provides the access control for routers, network access servers, and many other networked computing devices through one or more centralized servers.  Provides separate Authentication, Authorization, and Accounting services for server access.

Format and Header Values  Every TACACS+ packet has the 12 byte header.  Always sent in clear text format.

TACACS+ Authentication  who is allowed to gain access to the network.  Using usernames and passwords, or “one time” passwords.  takes place when the user first logs in to a machine or requests a service of it.  packet types: START, CONTINUE and REPLY.  START and CONTINUE are always sent by the client;  REPLY is always sent by the daemon.

TACACS+ Authentication Process  Authentication Process  1. connection request from the user;  2. START packet is sent to the AAA server;  3. REPLY packet is sent back, requesting user name;  4. sends a CONTINUE packet to AAA server with username;  5. REPLY packet is sent back, asking password;  6. sends a CONTINUE packet to AAA server with password;  7. REPLY packet is sent back to indicate a pass/fail of authentication;

TACACS+ Authorization  what a user is allowed to do.  what services the user has access to.  customize the service for the particular user.  An authorization session is defined as a single pair of messages, a REQUEST followed by a RESPONSE.

TACACS+ Authorization Process  Authorization Process  1. resource request from the user; (assuming authentication has already taken place)  2. A REQUEST packet is sent to AAA server for certain service;  3. A REPONSE packet is sent back, indicating a pass or fail;  4. user access is granted or denied;

TACACS+ Accounting  follows the processes of authentication & authorization  maintains complete accounting information  used either for billing purposes of the services or for security reasons.  TACACS+ accounting also uses the two message types: a REQUEST and a REPONSE

TACACS+ Accounting Process  Accounting Process  1. A resource request from user;  2. A REQUEST packet, including START, STOP, or CONTINUE, is sent to AAA server;  3. A RESPONSE packet is sent back, including SUCCESS, ERROR, or FOLLOW;

Vulnerabilities of TACACS+

Lack of Integrity Checking  No integrity checking exists in TACACS+  ‘MD5- encryption stream cipher’ mechanism is used.  Make changes to accounting packets. Example: Modifying elapsed time from 8000 to 1000

2) Vulnerability to replay attacks  No protection against replay attacks.  TACACS+ session starts with sequence number 1.  Accounting sessions have only one packet.  Duplicate accounting records can be produced, with forged task_id fields.

3) Session ID collision  More unique IDs the more stronger the encryption is.  Multiple sessions get the same ID, leading to frequency analysis attack.  Plaintext of one session know leads to decrypt the other session with the same sequence and session ID.  TACACS+ server encrypts reply packet with own session ID.(Mostly when the sequence number of the packet is 2).

4) The Birthday paradox  Session IDs are too small.  Leads to less unique IDs. Example: 100, 000 TACAS+ sessions  20, 000 dial up sessions  1000 matches per moth  Few 100 user passwords.

5) Lack of Padding  No padding in any fields or end of the packet.  Variable size data fields determined from the packet sizes.  Reveals the length of the user passwords.

6) MD5 Context Leak  Theoretical vulnerability  MD5- like hashes(16 bytes long) should be avoided.  TACACS+ packets encrypted by XOR’ing the MD5 hashes.  MD5_1=MD5(session_id, key, version, seq_no)  MD5_2=MD5(session_id, key, version, seq_no, MD5_1)

7) DoS and/or Overflow  Denial of Service – attempt to make resources unavailable to intended users.  Unlike others, it is an implementation defect.  No sanity check  Not check for an integer overflow in calculating the total memory size to allocate.

FIXES  Apply Packet Filtering  Choose Strong Encryption Keys  Avoid running tac_plus as root.

Conclusion  TACACS+ is a Cisco Proprietary protocol facilitating AAA model in Cisco Devices.  It provides AAA communication between AAA client and AAA server.  It improves on TACACS and XTACACS by separating the authentication, authorization and accounting.  More preferred since it uses TCP- reliable protocol.

Reference  [1] “The TACACS+ Protocol”, Version by D. Carrel, Lol Grant, Cisco Systems, January,  [2] “TACACS+ Protocol”, Version by D. Carrel, Lol Grant, Cisco Systems, October, [3] Cisco Access Control Security: AAA Administrative Services, by Brandon Carroll. May 27,  [4] “TACACS+ Authentication for HTTP Server Users”  [5] “TACACS+ and RADIUS Comparison”.

Q & A?  Thanks!