Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University.

Slides:



Advertisements
Similar presentations
Password Cracking Lesson 10. Why crack passwords?
Advertisements

Cryptology Passwords and Authentication Prof. David Singer Dept. of Mathematics Case Western Reserve University.
CSC 474 Information Systems Security
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Sanjay Goel University at Albany, School of Business NYS Center for Information Forensics and Assurance 1 Password Protection.
Sanjay Goel, School of Business/NYS Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Chapter 3 Passwords Principals Authenticate to systems.
CSE331: Introduction to Networks and Security Lecture 23 Fall 2002.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Chapter 4 System Hacking: Password Cracking, Escalating Privileges, & Hiding Files.
Time-Memory tradeoffs in password cracking 1. Basic Attacks Dictionary attack: –What if password is chosen well? Brute Force (online version): –Try all.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
File Protection Mechanisms  All-None Protection Lack of trustLack of trust All or nothingAll or nothing Timesharing issuesTimesharing issues ComplexityComplexity.
Database Security DB0520 Authentication and password security Authentication options – strong, weak Review security environment - Sys Admin privileges.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
G53SEC 1 Authentication and Identification Who? What? Where?
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CNIT 124: Advanced Ethical Hacking Ch 9: Password Attacks.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Chapter 1 – Introduction Part 4 1. Message Authentication Codes Allows for Alice and Bob to have data integrity, if they share a secret key. Given a message.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
Authentication What you know? What you have? What you are?
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Host and Application Security Lesson 8: You are you… mostly.
Understanding Security Policies Lesson 3. Objectives.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Module X (Unix/Linux Password Security)
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Identification and Authentication
I have edited and added material.
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Password Cracking Lesson 10.
CS 465 PasswordS Last Updated: Nov 7, 2017.
Kiran Subramanyam Password Cracking 1.
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Exercise: Hashing, Password security, And File Integrity
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

Identification and Authentication CS432 - Security in Computing Copyright © 2005,2010 by Scott Orr and the Trustees of Indiana University

Section Overview Identity Identity Password Authentication Password Authentication Password System Vulnerabilities Password System Vulnerabilities Two Factor Authentication Two Factor Authentication

References Security in Computing, 3 rd Ed. Security in Computing, 3 rd Ed. Chapter 4 (pgs ) Chapter 4 (pgs ) Online Resources Online Resources Password Security: A Case History by Robert T. Morris and Ken Thompson Password Security: A Case History by Robert T. Morris and Ken Thompson Password Security: A Case History Password Security: A Case History Foiling the Cracker by Daniel V. Klein Foiling the Cracker by Daniel V. Klein Foiling the Cracker Foiling the Cracker

Common OS Security Features Audit Access Control Authentication

Identity and Authentication Why usernames? Why usernames? Grant access to system Grant access to system Control access to resources Control access to resources Accountability Accountability Passwords Passwords Prove you are who you say you are Prove you are who you say you are Often weakest link in system security Often weakest link in system security

Low-Tech Vulnerabilities Shared Passwords Shared Passwords Spoken Spoken Written down near computer Written down near computer Social Engineering Social Engineering Shoulder Surfing Shoulder Surfing Dumpster Diving or “Trashing” Dumpster Diving or “Trashing” Account slips Account slips Manuals/Documentation Manuals/Documentation

Early Authentication Login: scott Password: secret alice:boxcarbob:secretchris:qwertydebbie:aaaaalinda:adnilscott:secrettom:tom1alice:boxcarbob:secretchris:qwertydebbie:aaaaalinda:adnilscott:secrettom:tom1 Password file Welcome… Security was not a concern!

Password Encryption Login: scott Password: secret alice:kDiBZ7 bob: Fq%sd6 chris:3ybIY/debbie:1vaZlRlinda:kAQWNz scott: Fq%sd6 tom:wXmvVqalice:kDiBZ7 bob: Fq%sd6 chris:3ybIY/debbie:1vaZlRlinda:kAQWNz scott: Fq%sd6 tom:wXmvVq Password file Welcome… What if two users have the same password? One-wayHashFq%sd6

Salting the Password Login: scott Password: secret alice: jrhS/T2I bob: 9qW1ky!e chris:d5UTV1w5debbie:b9lvn17jlinda:9sNBXr/Z scott: pAFq%sd6 tom:q.ZFrpuN alice: jrhS/T2I bob: 9qW1ky!e chris:d5UTV1w5debbie:b9lvn17jlinda:9sNBXr/Z scott: pAFq%sd6 tom:q.ZFrpuN Password file Welcome… Encrypted passwords randomized but still readable. One-wayHashpAFq%sd6 Salt? pA

UNIX Password Encryption DESOne-wayHash Password 0x Randomize Salt Asciify VsjqYhTwQiJPw balloons Vs 25 times Valid: A-Za-z0-9./ Newer systems use MD5 now

Lan Manager Password Encryption DESOne-wayHash Password 14charpassword 14CHARPP ASSWORDP DESOne-wayHash 0xAAD3B435B51404EE 0xE79E56A8E5C6F8FE 0xAAD3B435B51404EE

Windows Password Encryption 6-14 character passwords6-14 character passwords Stored in registry and filesStored in registry and files Backwards compatible with LAN Manager (2 nd entry)Backwards compatible with LAN Manager (2 nd entry) Password 16-bit character Unicode SAM MD4 One-way Hash

Weak Passwords No passwords used No passwords used Smoking Joes Smoking Joes Information about user Information about user Dictionary Attacks Dictionary Attacks Modification of user ID or name Modification of user ID or name Modification of dictionary(s) word(s) Modification of dictionary(s) word(s) Keyboard patterns Keyboard patterns Any systematic, algorithmic generator Any systematic, algorithmic generator

Dictionary Attacks alice:###### bob: 9qW1ky!e scott: pAFq%sd6 tom:######alice:###### bob: 9qW1ky!e scott: pAFq%sd6 tom:###### Quick but only catches weaker passwords One-wayHashpAFq%sd6 Salt? pA aaback…secrecysecretsecrete…zurichzygoteaaback…secrecysecretsecrete…zurichzygote Match!!! Dictionary /etc/passwd

Klein’s Tests (1990) Type of words in dictionary % of Broken passwords /usr/dict/words30.6% Common names 16.5% User/account name 11.2% Male/Female names 9.1% Phrases and patterns 7.5% System names 4.1% 24.2% of all passwords tested were broken. Source: Dan Klein, Foiling the Cracker

Selecting Strong Passwords At least 14 characters in length At least 14 characters in length Mix of case, numbers and special characters Mix of case, numbers and special characters Something you can remember Something you can remember Techniques Techniques License plating (becoming weaker) License plating (becoming weaker) Acronyms from phrases Acronyms from phrases Passphrases Passphrases

Pass Phrase Examples smo smo Poor Poor ardl79BEf76357 ardl79BEf spaces 14 spaces Hard to remember Hard to remember Good Good MydogSkiplovestoplayfetcheveryday MydogSkiplovestoplayfetcheveryday 33 spaces 33 spaces Easier to remember Easier to remember Better Better Myd0gSkipluvs2playfetchev3ryday Myd0gSkipluvs2playfetchev3ryday 31 spaces 31 spaces Easier to remember Easier to remember Limit Duplicate letters –substitute with numbers, punctuation, or special characters Limit Duplicate letters –substitute with numbers, punctuation, or special characters Best Best

Brute Force Attacks alice:###### bob: 9qW1ky!e scott: pAFq%sd6 tom:###### Effective but very slow! One-wayHashpAFq%sd6 Salt? pA aaa…secressecretsecreu…zzzzzzzyzzzzzzzz Match!!! (Hybrids - will try rule-based dictionary attacks first) /etc/passwd

Rainbow Tables Brute force attacks are time consuming Brute force attacks are time consuming Alternative – Calculate all hashes ahead of time (Time/Memory tradeoff) Alternative – Calculate all hashes ahead of time (Time/Memory tradeoff) Look hash up in table to find password Look hash up in table to find password Space saved by grouping into chains Space saved by grouping into chains Salting can defeat system Salting can defeat system

Creating Tables Index I HashIndexReduce IHHHI o o o IH IIHHHI IIHHHI IH IH

Rainbow Cracking Obtain password hash to crack Obtain password hash to crack Does it match any hash at end of chains? Does it match any hash at end of chains? Yes: Stop (password is in this chain) Yes: Stop (password is in this chain) No: Reduce password and rehash No: Reduce password and rehash Repeat until match Repeat until match Keep track of number of checks Keep track of number of checks Iterate through chain to get password Iterate through chain to get password

Minimizing Password Threats User Education!!! User Education!!! Shadow Passwords Shadow Passwords More secure password changing programs More secure password changing programs System-wide weak-password checks System-wide weak-password checks Password Aging Password Aging Maximum time between changes Maximum time between changes Minimum time between changes Minimum time between changes

UNIX /etc/shadow Username Username Encrypted password Encrypted password Day last changed Day last changed Minimum # days between changes Minimum # days between changes Maximum # days between changes Maximum # days between changes Notify # days before account expires Notify # days before account expires Account Inactivation Account Inactivation Expire # days after max change (Linux) Expire after # days of inactivity (Solaris) Expiration day Expiration day Flags (unused) Flags (unused) Example: sorr: $1$KHvoRlZt$n3z6SWZa09tMU5EC4FTr9/ :12784:3:90:7::13149:

Biometrics Source:

Security Concerns of Biometrics U Uludag, U. and A. Jain (2004). Attacks on biometric systems: a case study in fingerprints.

Two Factor Authentication Something You know Something You are Something You have

Challenge/Response OTP Login: scott otp 87 mj1492 Response: Welcome…OTPCalculator Seq #: 87 Seed: mj1492 Pass Phrase: Open me! DOG FOX ONE TOO DOG FOX ONE TOO

Synchronized OTP Login: scott SecureID Code: Welcome… Changes every minute Beware of Race Condition Attacks

Misc. Access Control Failed attempt lockouts Failed attempt lockouts Password reuse restrictions Password reuse restrictions User can only log in if certain conditions are met: User can only log in if certain conditions are met: Time of Day Time of Day Day of Week Day of Week Location or Terminal Location or Terminal Unique for each user Unique for each user