CS 356 Lecture 28 Internet Authentication. Spring 2013



Similar documents
Authentication Application

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Authentication Applications

Authentication Applications

Chapter 15 User Authentication

Cryptography and Network Security Chapter 14

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Entrust Managed Services PKI

Key Management and Distribution

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

How To Use Kerberos

Key Management and Distribution

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Cryptography and network security CNET4523

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

How To Understand And Understand The Security Of A Key Infrastructure

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Cryptography and Network Security

Implementing Secure Sockets Layer on iseries

How To Make A Trustless Certificate Authority Secure

Introduction to Network Security Key Management and Distribution

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

Information Security Basic Concepts

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Architecture of Enterprise Applications III Single Sign-On

Standards and Products. Computer Security. Kerberos. Kerberos

Chapter 7 Transport-Level Security

Overview. SSL Cryptography Overview CHAPTER 1

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Public Key Infrastructure for a Higher Education Environment

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Security Assertion Markup Language (SAML)

Security Digital Certificate Manager

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Snow Agent System Pilot Deployment version

Network Security Essentials Chapter 5

A Secure Authenticate Framework for Cloud Computing Environment

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

[SMO-SFO-ICO-PE-046-GU-

How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Contents at a Glance. 1 Introduction Basic Principles of IT Security Authentication and Authorization in

Using etoken for Securing s Using Outlook and Outlook Express

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Cornerstones of Security

Security Digital Certificate Manager

Chapter 4 Virtual Private Networking

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Ciphire Mail. Abstract

Chapter 7 Managing Users, Authentication, and Certificates

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Certificate Management

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Neutralus Certification Practices Statement

Network Security Protocols

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

TELSTRA RSS CA Subscriber Agreement (SA)

This Working Paper provides an introduction to the web services security standards.

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Configuring Security Features of Session Recording

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Client Server Registration Protocol

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Lecture VII : Public Key Infrastructure (PKI)

OpenHRE Security Architecture. (DRAFT v0.5)

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

Single Sign-on (SSO) technologies for the Domino Web Server

/ Preparing to Manage a VMware Environment Page 1

Savitribai Phule Pune University

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

CS Final Exam

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Lecture 9 - Network Security TDTS (ht1)

WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW. Entrust All rights reserved.

SAM Context-Based Authentication Using Juniper SA Integration Guide

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Chapter 17. Transport-Level Security

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

WEB SERVICES SECURITY

Public Key Infrastructure (PKI)

Installation and Configuration Guide

NETWORK ADMINISTRATION AND SECURITY

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Transcription:

CS 356 Lecture 28 Internet Authentication Spring 2013

Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database Security (skipped) Chapter 6 Malicious Software Networking Basics (not in book) Chapter 7 Denial of Service Chapter 8 Intrusion Detection Chapter 9 Firewalls and Intrusion Prevention Chapter 10 Buffer Overflow Chapter 11 Software Security Chapter 12 OS Security Chapter 22 Internet Security Protocols Chapter 23 Internet Authentication Applications

Chapter 23 Internet Authentication Applications

Kerberos Overview initially developed at MIT software utility available in both the public domain and in commercially supported versions issued as an Internet standard and is the defacto standard for remote authentication overall scheme is that of a trusted third party authentication service requires that a user prove his or her identity for each service invoked and requires servers to prove their identity to clients

Kerberos Protocol involves clients, application servers, and a Kerberos server designed to counter a variety of threats to the security of a client/server dialogue obvious security risk is impersonation servers must be able to confirm the identities of clients who request service use an Authentication Server (AS) user initially negotiates with AS for identity verification AS verifies identity and then passes information on to an application server which will then accept service requests from the client need to find a way to do this in a secure way if client sends user s password to the AS over the network an opponent could observe the password an opponent could impersonate the AS and send a false validation

Kerberos Overview 2. AS verifies user's access right in database, creates ticket-granting ticket and session key. Results are encrypted using key derived from user's password. once per user logon session 1. User logs on to workstation and requests service on host. request ticketgranting ticket ticket + session key request servicegranting ticket ticket + session key Kerberos Authentication Server (AS) Ticketgranting Server (TGS) 3. Workstation prompts user for password and uses password to decrypt incoming message, then sends ticket and authenticator that contains user's name, network address, and time to TGS. once per type of service request service 4. TGS decrypts ticket and authenticator, verifies request, then creates ticket for requested server. 5. Workstation sends ticket and authenticator to server. once per service session provide server authenticator 6. Server verifies that ticket and authenticator match, then grants access to service. If mutual authentication is required, server returns an authenticator. Figure 23.1 Overview of Kerberos

Kerberos Realms a Kerberos environment consists of: a Kerberos server a number of clients, all registered with server a number of application servers, sharing keys with server this is referred to as a realm networks of clients and servers under different administrative organizations generally constitute different realms if multiple realms: their Kerberos servers must share a secret key and trust the Kerberos server in the other realm to authenticate its users participating servers in the second realm must also be willing to trust the Kerberos server in the first realm

Client Realm A 1. request ticket for local TGS 2. ticket for local TGS 3. request ticket for remote TGS 4. ticket for remote TGS Kerberos AS TGS 7. request remote service Kerberos Kerberos Realms 5 request ticket for remote server 6 ticket for remote server AS Server Realm B TGS Figure 23.2 Request for Service in Another Realm

Kerberos Versions 4 and 5 Kerberos v4 is most widely used version improvements found in version 5: an encrypted message is tagged with an encryption algorithm identifier this enables users to configure Kerberos to use an algorithm other than DES supports authentication forwarding enables a client to access a server and have that server access another server on behalf of the client supports a method for interrealm authentication that requires fewer secure key exchanges than in version 4

Kerberos Performance Issues see larger client-server installations environment: very little if system is properly configured tickets are reusable which reduces traffic Kerberos performance impact in a large-scale Kerberos security is best assured by placing the Kerberos server on a separate, isolated machine motivation for multiple realms is administrative, not performance related

Certificate Authority (CA) certificate consists of: a public key plus a User ID of the key owner signed by a trusted third party typically the third party is a CA that is trusted by the user community (such as a government agency or a financial institution) user can present his or her public key to the authority in a secure manner and obtain a certificate user can then publish the certificate anyone needing this user s public key can obtain the certificate and verify that it is valid by way of the attached trusted signature

X.509 Authentication Service universally accepted standard for formatting public-key certificates widely used in network security applications, including IPsec, SSL, SET, and S/MIME part of CCITT X.500 directory service standards uses public-key crypto & digital signatures algorithms not standardized, but RSA recommended

X.509 Certificates Signature algorithm identifier Period of validity Version Certificate Serial Number algorithm parameters Issuer Name not before not after Version 1 Version 2 Signature algorithm identifier Revoked certificate algorithm parameters Issuer Name This Update Date Next Update Date user certificate serial # revocation date Subject's public key info Subject Name algorithms parameters key Issuer Unique Identifier Subject Unique Identifier Version 3 Revoked certificate Signature!!! user certificate serial # revocation date algorithms parameters encrypted hash Extensions (b) Certificate Revocation List Signature algorithms parameters encrypted hash all versions (a) X.509 Certificate Figure 23.3 X.509 Formats

PKI users Certificate/CRL Repository certificate/crl retrieval certificate publication certificate/crl publication CRL publication PKI management entities Registration authority CRL issuer End entity Certificate authority registration, initialization, certification, key pair recovery, key pair update revocation request Certificate authority cross certification Public Key Infrastructure X.509 (PKIX) Figure 23.4 PKIX Architectural Model

PKIX Management Functions registration initialization certification key pair recovery key pair update revocation request cross certification

Federated Identity Management use of common identity management scheme across multiple enterprises and numerous applications supporting many thousands, even millions of users principal elements are: authentication, authorization, accounting, provisioning, workflow automation, delegated administration, password synchronization, self-service password reset, federation

Identity Management Principal Principal Principals provide attributes Principal Administrators provide attributes Attribute service Attribute service Attribute service Administrator Administrator Data consumers apply references to obtain attribute data Principals authenticate, manage their identity elements Identity Provider Identity control interface Principal authentication Attribute locator Identifier translation Data consumer Data consumer Data consumers obtain identifiers, attribute references Figure 23.5 Generic Identity Management Architecture

Standards Used Extensible Markup Language (XML) Simple Object Access Protocol (SOAP) WS-Security Security Assertion Markup Language (SAML) characterizes text elements in a document on appearance, function, meaning, or context for invoking code using XML over HTTP set of SOAP extensions for implementing message integrity and confidentiality in Web services XML-based language for the exchange of security information between online business partners

Federated Identity Management Initial authentication Workplace.com (employee portal) Links: health benefits etc. User store Name ID Joe 1213 Jane 1410 Ravi 1603 Initial authentication W orkplace.com (employee portal) Links: parts supplier etc. User store Name ID Joe 1213 Jane 1410 Ravi 1603 Dept Eng Purch Purch End user (employee) End user (employee) Health.com User store Name ID Joe 1213 Jane 1410 Ravi 1603 PartsSupplier.com Welcome Joe! Technical doc. Troubleshooting User store Role Engineer Purchaser (a) Federation based on account linking (b) Federation based on roles Initial message authentication Workplace.com Procurement application End user Soap message PinSupplies.com Purchasing Web service Soap message E-ship.com Shipping Web service (b) Chained Web Services Figure 23.6 Federated Identity Scenarios

Summary Kerberos Kerberos protocol Kerberos realms Kerberos versions 4 and 5 Kerberos performance issues X.509 public-key infrastructure PKIX management functions PKIX management protocols federated identity management