One Time Password Access to Any Server without Changing the Server



Similar documents
Painless Migration from Passwords to Two Factor Authentication

Security Evaluation CLX.Sentinel

Phishing by data URI

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

white paper Malware Security and the Bottom Line

New Tricks For Defeating SSL In Practice. Moxie Marlinspike

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Basic Security Considerations for and Web Browsing

Egress Switch Best Practice Security Guide V4.x

Overview of Domain SSL

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

Quick Start Guide to Logging in to Online Banking

How to use Google Cloud Print

The Key to Secure Online Financial Transactions

Junos Pulse VPN Client Installation

How To Set Up A Sartorius Mailbox In Outlook On A Non-Standard Pc On A Windows Xp Oracle 365 On A Pc Oracle365 On A Sertorius Mailbox On A Microsoft Office365 On Pc Orca 2 On A

MySpam filtering service Protection against spam, viruses and phishing attacks

Enterprise Knowledge Platform

Ciphermail Gateway PDF Encryption Setup Guide

WHY YOU NEED AN SSL CERTIFICATE

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Tips for Banking Online Safely

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

How To Install the Virtual Learning App

2X SecureRemoteDesktop. Version 1.1

General Security Best Practices

The PA-4000 Series can add visibility and control into your network for webmail applications to stop incoming threats and limit uploaded data.

Two Factor Zero Knowledge Proof Authentication System

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Cyber Security. Maintaining Your Identity on the Net

USER GUIDE WWPass Security for (Outlook) For WWPass Security Pack 2.4

Malware & Botnets. Botnets

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

SSL EXPLAINED SSL EXPLAINED

Electronic Pickpockets Are Right Behind You Andrew Case Senior Security Analyst

The Shortcut Guide To

Dashlane Security Whitepaper

That Point of Sale is a PoS

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

How To Set Up Dataprotect

Anti-Phishing Best Practices for ISPs and Mailbox Providers

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v ONWARDS)

Deploying Secure Internet Connectivity

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Web Conferencing Version 8.3 Troubleshooting Guide

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

NeoMail Guide. Neotel (Pty) Ltd

Secure Mail Registration and Viewing Procedures

MaaS360 Mobile Enterprise Gateway

White Paper. The Principles of Tokenless Two-Factor Authentication

MaaS360 Mobile Enterprise Gateway

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Internet Banking Attacks. Karel Miko, CISA DCIT, a.s. (Prague, Czech Republic)

P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems

Overview of Extended Validation (EV) SSL

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Token User Guide. Version 1.0/ July 2013

Hosted Microsoft Exchange Client Setup & Guide Book

Configuring your client to connect to your Exchange mailbox

In the Cloud. Scoville Memorial Library February, 2013

Sync Security and Privacy Brief

USER GUIDE WWPass Security for Windows Logon

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Basics of SSL Certification

8x8 Click2Pop User Guide

Accessing vlabs using the VMware Horizon View Client for OSX

How to Configure Captive Portal

Virtual Appliance for VMware Server. Getting Started Guide. Revision Warning and Disclaimer

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Livezilla How to Install on Shared Hosting By: Jon Manning

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Course Content: Session 1. Ethics & Hacking

How To Understand The History Of The Web (Web)

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Student ANGEL FAQs. General Issues: System Requirements:

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

PASSWORD MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Certified Secure Computer User

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Okta/Dropbox Active Directory Integration Guide

INTRODUCTION TO CLOUD STORAGE

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Configure Outlook 2013 to connect to Hosted Exchange

Manual. Netumo NETUMO HELP MANUAL Copyright Netumo 2014 All Rights Reserved

How To Use Secureanything On A Mac Or Ipad (For A Mac)

Internet Banking System Web Application Penetration Test Report

Download and Launch Instructions for WLC Client App Program

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

WHY YOU NEED AN SSL CERTIFICATE Introduction

Threat Events: Software Attacks (cont.)

Know the Risks. Protect Yourself. Protect Your Business.

Setting Up . on Your Sprint Power Vision SM Mogul by HTC

Transcription:

One Time Password Access to Any Server without Changing the Server Dinei Florêncio and Cormac Herley Microsoft Research, Redmond Acknowledgements: Eric Lawrence, Ziqing Mao, Nikita Pandey, Erin Renshaw, and Dany Rouhana

The Problem: Passwords do not resist replay Login from malware infected PC Malware now has your password Untrusted machines Internet Cafes Any machine not properly patched/maintained. Unlike phishing, spam or 419 scams Even sophisticated users susceptible Our current best advice: Good luck out there

Other stuff to address this Coping strategies: Type password in reverse order, Cut and paste the password Intersperse random chars (outside of the pwd field focus) between chars On screen keyboard These can help against keyloggers But not browser plugins Or screen and mouse logging Sustained safety: password must not be entered or downloaded to the untrusted machine

Setup: Public PC (or untrusted PC) Publi c PC Login Server E.g. OWA, BoA, PayPal Assume at an untrusted PC everything is logged Every key, every click, every screen, all network traffic Cannot change anything at legacy login server Cannot instal or change anything at public PC No boot from CD, run app from USB etc No browser plug ins, BHO No smartcard reader No choice of browser. Protecting password, not rest of session

Our Solution: Universal Replay Resistant Secure Authentication (URRSA) All you need is an address bar It works from anywhere With (almost) all login servers You can try it today * * Caveats: trial for this conf only. We have not done PEN testing. Please no banking credentials. The password flows through the proxy.

OLD: Single Sign on Server (SiSO) Store PWD in the cloud: Publi c PC Authenticate to SiSO SiSO Proxy PWD1 PWD2 PWD3 Why this is not good enough: PWD1 Login Server E.g. OWA, BoA, PayPal Liability: Server storing millions of PWDs is now a target. Need to authenticate to SiSO proxy. Mishandling authentication may compromise all your accounts.

URRSA: OTP = encrypted pwd Publi c PC OTP to URRSA URSSA Proxy Key1 Key2 Key3 PWD1 Login Server E.g. OWA, BoA, PayPal No need to authenticate to Proxy; Proxy does not store any PWDs, only (worthless) encryption keys.

Publi c PC pwd Login Server E.g. OWA, BoA, PayPal

URRSA Publi c PC E(pwd,key i ) URRSA E 1 E(pwd,key i ) proxy Login Server E.g. OWA, BoA, PayPal Place Proxy as Man In The Middle; Type Encrypted PWD at PC Proxy decrypts once and only once Proxy needs to know key i in advance. HOW?

On the Road: From Public PC Enter E(pwd,key) Publi c PC E(pwd,key i ) URRSA E 1 E(pwd,key i ) Proxy Login Server E.g. OWA, BoA, PayPal Proxy serves as a Man In The Middle

Convert Any Server into One Time Password Server Before you travel: From a trusted PC Truste d PC url, userid key 0 key 1. key 29 URRSA Proxy E(pwd,key 0 ) E(pwd,key 1 ) E(pwd,key 29 )

Registering (safe location) Register (url, userid) Enter password Server generates: User carries E(p,Key 0 ).. E(p,Key 29 )

On the Road: From Public PC Enter E(pwd,key) Publi c PC E(pwd,key i ) URRSA E 1 E(pwd,key i ) Proxy Login Server E.g. OWA, BoA, PayPal Proxy serves as a Man In The Middle

Logging in (unsafe location) Enter (url, userid) This uniquely identifies user For i th login user enters E(p, Key i ) URRSA fwds E 1 E(p, Key i )

How the Password Swap gets Done URRSA B R O W S E R 1 4 6 Contact www.urrsa.com User inputs E(pwd, key i ) Send userid, url 2 Send E(pwd,key i ) Auto Request www.bigbank.com/login User clicks submit P R O X Y 8 Done (remain as MITM 7 For session). 5 W E B S E R V E R Populate login form with actual userid, roguepwd 3 Send userid, pwd Replace roguepwd with actual pwd userid E 1 E(pwd, key i ) B I G B A N K

A few NOT s This is not a SiSo scheme Password is not stored at the proxy (though of course must trust proxy) The proxy does not authenticate the user URRSA decrypts and fwds with agreed upon keys If you re not who you claim then login fails

Two Important Details How does Mapping and Encryption work? How does URRSA get to be MITM?

Mapping strategies PASSWORDS: We need to allow special characters: MyP^3& We ll allow for 128 characters: 26 lower case + 26 UPPER CASE; 10 digits; 66 special symbols (rarely used, but ); But most people use simple passwords Snoopy Standard Mapping would map Snoopy to u\6# Κ We ll Huffman encode the characters We ll use only 32 easy to find characters: ABCDEFGHJKLMNPQRSTUVWXYZ23456789 No confusion sets (e.g., 0 O, l I 1); All easy to find, even on foreign keyboards; All allowed on SMS.

Mapping strategies PASSWORDS: We need to allow special characters: MyP^3& We ll allow for 128 characters: 26 lower case + 26 UPPER CASE; 10 digits; 66 special symbols (rarely used, but ); But most people use simple passwords Snoopy Standard Mapping would map Snoopy to ut6# Κ We ll huffman encode the characters We ll use only 32 easy to find characters: ABCDEFGHJKLMNPQRSTUVWXYZ23456789 No confusion sets (e.g., 0 O, l I 1); All easy to find, even on foreign keyboards; All allowed on SMS.

Current implementation: Input 128 characters => 7 bits/char. Huffman encode: a = 3bits, ^=12 bits Encrypt all PWD bits Maps encrypted bits to OTP => 5 bits/char Thus, pwd maps to ceil(h(pwd)/5) OTP. E.g., Seattle => PJ45JWM9ZT Original PWD Huffman Codes Encrypted 5 bits regroup OTP S e a t 1 0 1 0 1 0 1 1 0 1 0 1 0 0 1 1 0 1 0 1 1 1 0 0 1 0 0 0 1 1 0 1 0 1 1 0 0 1 1 1 0 0 1 0 0 0 1 1 0 1 0 1 1 0 P J 4 5

So how does our Proxy get to be a Man In the Middle? HTTP Proxy Reverse (link translating) Proxy

To use HTTP Proxy: Changing Proxy settings Don t forget to undo settings when you leave!!

Instead use Reverse Proxy (MITM) Publi c PC Modified Request to URRSA Modified doc URRSA Proxy Request to live.com Respond with doc Login Server E.G live.com 1. Request doc.htm from urrsa.com instead of live.com 2. URRSA forwards to live.com 3. URRSA receives doc.htm. Modify all links to point to urrsa.com instead of live.com 4. Fwd modified doc.htm to browser Note: URRSA keeps two separate SSL cxns, one with client, one with server

Demo

Certificates and Browsers URRSA treats each domain as a subdomain E.g. live.com becomes live.com.urrsa.com Wildcard cert for *.urrsa.com Browsers handle wildcard certs differently IE, Safari: one warning per host loaded FireFox, Opera: no errors This fixable, but for now IE: one cert warning for OWA, live.com, facebook,

Don t take our word for it.. Try it yourself www.urrsa.com Can register (i.e. get the OTP s) only from corpnet Don t: Access banking (i.e. send your bank credentials) Access financial sites Do: Try free accounts: hotmail, gmail, yahoo, myspace, PayPal, facebook, Tell us about any problems: feedback@urrsa.com

Resources URRSA: www.urrsa.com

Attacks Session hijacking Vulnerability reduced, since proxy limits attacker actions. (e.g., cannot change pwd). Other limitations/authentication can be added, as proxy knows user is in a hostile environment. OTP stealing : same as above, plus: Stolen OTPs rendered useless by next use; Leaves a clue; user may revoke unused OTPs. Stealing not an attack for Window Mobile version.

Session Hijacking Attack: A resident software awaits until a user logins in, then overtakes the session, and/or asks unauthorized transactions; Why less critical with URRSA: Since all session flows through proxy: Attacker cannot change PWD. We may add other restrictions/authentication, as per Delegate paper.

OTP stealing Attack: A resident software awaits until a user types the OTP, holds off that OTP, and tells user login was not successful. Then asks for a second password, but send first one to the proxy. Keeps second OTP for future use. Why less critical with URRSA: Since all session flows through proxy: Attacker cannot change PWD. We may add other restrictions/authentication, as per Delegate paper. Second PWD useless after User logs in again at other Café. Leaves a clue; may make user suspicious. User may test/revoke. Solved with Windows Mobile version: passwords not requested in sequence.

When does it fail? Password switch doesn t work Site does not use HTML forms E.g. www.firsttechcu.com uses Flash Site does not transmit password E.g. www.livejournal.com sends MD5 of pwd (thanks Faisal) Site restricts format of password sent E.g. Reverse Proxying breaks IIS has 260 charurl limit (Apache served URLs can be longer) Problems with certain special chars, e.g. :, *