Creating One Time Password (OTP) infrastructures using Open Source sofware



Similar documents
Panoramica su Cloud Computing targata Red Hat AIPSI Meeting 2010

ViSolve Open Source Solutions

Internet Banking Two-Factor Authentication using Smartphones

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

PortWise Access Management Suite

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

Entrust IdentityGuard Comprehensive

Cisco Secure Access Control Server 4.2 for Windows

Swivel Multi-factor Authentication

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

TMS 5.1 OTP Planning Guide. Version 2

2 factor + 2. Authentication. way

Cisco VPN Concentrator Implementation Guide

Single Sign-On Framework in Tizen Contributors: Alexander Kanavin, Jussi Laako, Jaska Uimonen

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

PortWise Access Management Suite

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Cisco ASA Authentication QUICKStart Guide

An Introduction to RSA Authentication Manager Express. Helmut Wahrmann

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000

Guide to Evaluating Multi-Factor Authentication Solutions

Strong Authentication in details

Ensuring the security of your mobile business intelligence

ProtectID. for Financial Services

CRYPTOCard. Strong Two Factor Authentication

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

Apache Server Implementation Guide

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Secure Web Access Solution

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Axway Validation Authority Suite

Two-Factor Authentication Basics for Linux. Pat Barron Western PA Linux Users Group

Implementing Identity Provider on Mobile Phone

NetIQ Advanced Authentication Framework

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

Test Plan Security Assertion Markup Language Protocol Interface BC-AUTH-SAML 1.0

Connecting PTE to Careers in Idaho

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Citrix MetaFrame XP Security Standards and Deployment Scenarios

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

LDAPCON Sébastien Bahloul

DualShield. for PAM RADIUS. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited

Implementation Guide for protecting

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Network Security 1 Module 4 Trust and Identity Technology

Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID

nexus Hybrid Access Gateway

OVERVIEW. DIGIPASS Authentication for Office 365

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Products, Features & Services

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Symantec VIP Integration with ISE

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide

Strong Authentication for Cisco ASA 5500 Series

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

DIGIPASS Authentication for Cisco ASA 5500 Series

PINsafe Multifactor Authentication Solution. Technical White Paper

DIGIPASS Authentication for Check Point Security Gateways

SAML Authentication Quick Start Guide

Single Sign On. SSO & ID Management for Web and Mobile Applications

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

PkBox Technical Overview. Ver

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

RAD-Series RADIUS Server Version 7.1

Product Guide Revision A. McAfee One Time Password 4.1.0

iphone in Business Security Overview

PortWise 4.7. PortWise Sales FAQ. Sales FAQ & Licensing Guide

MIGRATION GUIDE. Authentication Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS

Securing corporate assets with two factor authentication

Safewhere*Identify 3.4. Release Notes

ZyWALL OTPv2 Support Notes

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

RAD-Series RADIUS Server Version 7.3

Enhancing Web Application Security

Ensuring the security of your mobile business intelligence

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

Identity Management: The authentic & authoritative guide for the modern enterprise

Transcription:

Creating One Time Password (OTP) infrastructures using Open Source sofware Giuseppe Gippa Paternò Visiting Researcher Trinity College Dublin

Who am I Visiting Researcher at Trinity College Dublin (Ireland) Solution Architect and EMEA Security Expert in Red Hat Previously Security Solution Architect in Sun and also in IBM Red Hat Certified Security Specialist (RHCSS), Red Hat Certified Architect (RHCA) and Cisco Certified Network Professinal (CCNP) Part of the italian security community sikurezza.org Published books and whitepapers Forensic analisys for local govs More on: http://www.scss.tcd.ie/giuseppe.paterno/ http://www.gpaterno.com/ http://www.linkedin.com/in/gpaterno

Disclaimer I do not speak on behalf of my employer, nor I am authorized to represent it publicly. All and any opinion and results expressed in this presentation are solely mine and do not represent my employer point-of-view. All the tests and any project contribution are done as a TCD researcher out of business hours.

Global IT scenario Even more in this recession phase, the IT budget is getting lower and lower The projects (demand) are increasing with significantly less money available

Lowering TCO "The economic crisis is going to be a catalyst for open source, much like the technology crash of 2001 catapulted Linux front and center" Laurie Wurster, a Gartner analyst. The adoption of Open Source software can lower the TCO and increase your security!

How Open Source can increase Security? Open Source = Open Standards = Choice

The OATH Alliance The Initiative for Open Authentication (OATH) Open alliance of vendors ActiveIdentity, Vasco, Gemalto, Aladdin,... http://www.openauthentication.org/ Created a common algorithm for one time password tokens (HOTP) A common protocol for the interoperability of the several impementations available

What is HOTP An HMAC-Based One-Time Password Algorithm (HOTP) A common shared algorithm that is meant to facilitate the adoption of two-factor authentication Alogorithm published as RFC 4226 The complete standard on: http://www.rfc-editor.org/

HOTP: Internals The algorithm is: HOTP(K,C) = Truncate(HMAC-SHA-1(K,C)) K C Truncate() Shared key between client and server 8-byte counter value syncronized between client and server Perform a dynamic truncation and reduction of the string to extract a 4-byte dynamic binary code. The result must extract minimum a 6-digit code, but also 7 and 8-digit code

Anathomy of HOTP The shared key between the OTP peers (token and authenticator) is an hexadecimal string The lenght is a SHA-1 digest Example of generating a new HMAC 6-digit shared key: dd if=/dev/random bs=4096 count=1 2>/dev/null sha1sum awk '{print $1}'

HOTP implementations Both commercial and open source implementations available Most of the hardware tokens adhere to the HOTP algorithm Few software implementations, most of which proprietary/closed source Some software client available: J2ME, iphone and Windows Mobile Publically available algorithm makes it simple to implement a client

How does it fit all together?

The software An open source OTP server: Only one server implementation available (OTPD), formelly from TRI-D Systems Now I made it available on http://otpd.googlecode.com FreeRADIUS, the popular radius server for Linux Two tested freely available client: oathdsss.jar (DSSS) for Java MIDP (Nokia) itoken (Quest Software) for iphone Also tried some hardware tokens

OTPD server It handle the validation of the One Time Passwords Uses files and LDAP as repository Keeps the state of the OTP token (counter) Supported tokens: HOTP CRYPTOCard Plain old x9.9 (based on DES, unsecure!) It listen to autentication requests

FreeRADIUS Well known high-performance open source RADIUS server Handle authentication and accounting Plug-in based One of the plug-in is rlm_otpd Developed by TRI-D Systems Communicate via Unix sockets with the OTPD server to verify an OTP token

The soft-token An OTP token in software Less secure than an hardware What if my laptop is stolen? A compromise is using a softtoken on a mobile platform Easy to manage Lower costs Better security over a fat client on laptops/desktops Available for most mobile phones

What can I authenticate? Any RADIUS compliant system, ex: VPN systems Wireless LANs Routers/network equipments Core UNIX systems (through pam_radius) Captive portals Any application can use the RADIUS protocol: common APIs available in C, PHP, Python, Ruby, Java (J2EE)

Enteprise scenario

Demo scenario Authentication server: OTP Server FreeRADIUS Server Client UNIX Web application (PHP) Centralized Web Single Sign-On (CAS)

Demo (the clients) Client Unix Interactive log-in Leverage the pam_radius module Web Single Sign-On Based on Yale CAS Customized to login through RADIUS PHP web application Dummy application to demonstrate CAS' capabilities with OTP integration Virtually every application can leverage CAS architecture

Demo scenario (big picture)

Interactive log-in OTP/Radius Server Authentication Request (RADIUS) Log-on request

Web Application OTP/Radius Server Authentication Request (RADIUS) Redirect to CAS' Single Sign-on Portal Web Access

Demo now!

Thank you!! Giuseppe Gippa Paternò Visiting Researcher Trinity College Dublin paternog@cs.tcd.ie http://www.scss.tcd.ie/giuseppe.paterno/ http://www.gpaterno.com/