Strong Authentication Plan Why What When How it affects You.

Slides:



Advertisements
Similar presentations
SCSC 455 Computer Security
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Using Kerberos the fundamentals. Computer/Network Security needs: Authentication Who is requesting access Authorization What user is allowed to do Auditing.
The Kerberos Authentication System Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka Matt Crawford.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Basic Computer Security. Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and responsibilities.
Security Essentials for Desktop System Administrors.
Kerberos: A Network Authentication Tool Seth Orr University of Missouri – St. Louis CS 5780 System Administration.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Working with Workgroups and Domains
Data Security.
BIF713 Operating Systems & Project Management Instructor: Murray Saul
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Enforcing Concurrent Logon Policies with UserLock.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
W2K and Kerberos at FNAL Jack Mark
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Fermilab Computer Security & Strong Authentication Project Mark Kaletka Computing Division Operating Systems Support Department.
File sharing requirements of remote users G. Bagliesi INFN - Pisa EP Forum on File Sharing 18/6/2001.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Module 10: Windows Firewall and Caching Fundamentals.
6/14/2001Liz Buckley-Geer - Ely Meeting1 Strong Authentication and what it means for MINOS Liz Buckley-Geer Fermilab.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Strong Authentication Matt Crawford CD/DCD/Computer Security Team.
LM/NTLMv1 Retirement Hosted by LSP Services.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Computer Security Sample security policy Dr Alexei Vernitski.
Strong Authentication at FNAL Goals Design Status.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Getting Connected to NGS while on the Road…
Module 4 Remote Login.
Control system network security issues and recommendations
Unit 27: Network Operating Systems
Computer Security Distributed System Security
Getting Connected to NGS while on the Road…
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Chapter 3 – Operating Systems
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Strong Authentication Plan Why What When How it affects You

Why F We need to protect our computers from Internet turmoil F DOE expects us to exercise due diligence to prevent unauthorized use of lab computers F DOE expects us to keep track of who is using lab computers F In both cases we are much better off making our own policies than awaiting more restrictive policies to be prescribed

Why F Of 11 FIREs during the year May, 1998 to April, 1999, u 6 arose from null, weak or stolen passwords (OS default accounts, off-site sniffers, bad cgi) u 4 others spread through.rhosts, sniffers or cracked password files. F We can no longer allow network disclosure of useful passwords

Goals F Prevent disclosure of login passwords. u Without asking superhuman diligence. u This does not apply to non login passwords (eg ) F Positive centralized control over access. F Secondary - u Provide a single-signon environment. u Simplify account management, especially terminations - take this burden off the system administrators. u Integrate AFS accounts & systems. u Enforce password policies.

What F Separate authentication (who you are - centralized) from authorization (what you are allowed to do – local) F Lab computers that are accessible from the outside internet will not allow password based remote logins, commands or file transfer F Usage is only granted after central authentication, using unforgeable tickets or single-use passwords

Design Criteria F Allow the work to get done. F Requiring some change in habits is acceptable. Radical changes would hinder successful deployment. F Users without special software or hardware on their systems must be provided some way to authenticate. F Must be adaptable to changes in u System security requirements u Computing styles

System Design F Kerberos F On-site systems must be configured so that network logins do not prompt for or accept a password. Access requires: u Kerberos credentials (obtained from local system), or u Challenge-response one-time authenticator (CryptoCard) F For off-site systems, we compromise: u Other secure (e.g., encrypted) access allowed to those systems.

Centralized Authentication F Authentication (identification of who you are) is done by the centralized Kerberos Key Distribution Centers (KDCs) F You must either log on to Kerberos on your local [the one your fingers are touching] system (without exposing your password over the network), or log on remotely using a one time password (supplied by your CryptoCard) F Once logged on, your Kerberos ticket grants you further access to lab systems

Local Authorization F Local sys admins create accounts on their own systems F Usage is granted to holders of particular Kerberos tickets rather than through password challenge/response F Accounts with same user name automatically give access to that Kerberos user (default can be changed) F Accounts can be shared amongst multiple Kerberos users without sharing passwords (with accountability)

Infrastructure F KDCs run just the essential services. u TGS, kadmin, 2 flavors of password changing, “524”, kprop, NTP and secure encrypted login. F KDCs physically secured, but those in less-secured areas don’t store master database key on disk. F Account deactivation to be placed under control of CNAS.

When F All* lab computers will be “Kerberized” before Dec 31, 2001 F Small number of well justified written temporary exemptions F CDF and D0 are already done F Many central Computing Division servers will be done over the summer F Your division/section has its own timetable and local Kerberos coordinator F * ”All” means computers that run general services (telnet, ftp, rsh, …) that are visible on the general internet

What This Means To You (1) F Does not affect or web access F Need not affect any outbound connections F Does not prevent attaching visiting laptops to network (as long as they cannot be logged in to over the network)

What This Means To You (2) F You will need to get a Kerberos account (principal) (and almost certainly a Cryptocard) F You will need to install some software on your desktop depending on how you use it F System administrators will have additional software to install, but account management will be much easier

Desktop Considerations F If desktop is dumb terminal: use Cryptocard to logon to other lab systems F If desktop has minimal intelligence (PC) but does not accept remote logins: install local kerberos telnet and ftp clients, do local kerberos login, then proceed normally using kerberized versions of clients F If desktop can be logged into remotely: install full local kerberos system, replace network services with kerberized versions

Windows Users (who don’t use UNIX resources) F W2000 users will get a Kerberos principal when they join the W2K domain (a brief visit will be made to your desktop); Kerberos is transparent F Legacy W95/98/NT systems can access W2K resources using NTLMv2 authentication (this is not Kerberos and is temporary)

When away from your desktop (travel, home, …) F Choice of using Cryptocard or installing local Kerberos system, depending on convenience

Deployment Status F 2090 users u 1637 with Cryptocards F 1609 service hosts u 57 off-site F 468,000 TGT’s issued in August u One service principal was granted tickets F Kerberized applications include u CVS u FBS (batch job submission) u SSH (with Cryptocard access)

Golden Rule: Treat your Kerberos password as a sacred object F Do not share with anyone else (much better mechanisms exist for shared accounts) F Do not use same password for any other applications (other passwords are not secure) F Always know who you are talking to when you type your password; do not expose it over the network

Strong Authentication Misunderstandings F “ssh is forbidden” u SSH as a connection method is ENCOURAGED and is in no way forbidden. The statement is that ssh encryption methods are not sufficient to protect passwords in actual use and so even with ssh, Kerberos tickets or CryptoCard challenge/response are the only accepted methods of authentication.

“Kerberos will solve all our security problems and prevent most future incidents” u Kerberos addresses at most half of the security problem: the problem of reliably identifying who is trying to access a system. u Kerberos does nothing explicitly to address the problem of application(OS) exploits. u Kerberos DOES help to reduce the damage from a compromised system.

“Kerberos means there will be no stolen passwords”  It is still possible for people to expose their Kerberos password. The most obvious example of which is writing it down on a sticky note on the terminal.  The lab relies on its computer users to show good common sense and abide by good computing practices. So far, this has been a good bet and allowed us to leave open certain types of usage that have risks associated with them.  The quest for perfection is difficult, expensive and should be avoided. We’re trying for very good.

“Using my CryptoCard makes sure my session is protected”  In fact, it is usually exactly the opposite!  The CryptoCard says nothing about the security of the connection. It was implemented primarily to address the cases of needed to connect to the lab when a secure connection was NOT possible to achieve.  Unless you explicitly know what you are doing, you should assume that everything typed in a CryptoCard authenticated session is available on the wire.

“All this worry is about potential problems that just don’t happen at FNAL”  We regularly (approx monthly) find that “wiretaps” (aka sniffers) are being run watching communications with FNAL.  Cleanup after these incidents has several times meant revalidating hundreds of users.  We have to take reasonable precautions against potential problems.

For more details: F Guide to Strong Authentication at Fermilab user guide, available in printed version or on the web: F Complications discussed there (unattended job submission, Windows and Mac issues, etc) F Questions to