Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at the University of Pennsylvania



Similar documents
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Leverage Active Directory with Kerberos to Eliminate HTTP Password

CS 356 Lecture 28 Internet Authentication. Spring 2013

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

How to build an Identity Management System on Linux. Simo Sorce Principal Software Engineer Red Hat, Inc.

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Kerberos and Active Directory symmetric cryptography in practice COSC412

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Authentication Application

Implementing a Kerberos Single Sign-on Infrastructure

HOBCOM and HOBLink J-Term

Key Management and Distribution

How To Use Kerberos

Mac OS X Directory Services

OpenHRE Security Architecture. (DRAFT v0.5)

IceWarp Server - SSO (Single Sign-On)

Key Management and Distribution

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

A Secure Authenticate Framework for Cloud Computing Environment

Using Kerberos for Web Authentication. Wesley Craig University of Michigan

CA SiteMinder SSO Agents for ERP Systems

Digital certificates and SSL

Evaluation of different Open Source Identity management Systems

Single Sign-on (SSO) technologies for the Domino Web Server

Internal Server Names and IP Address Requirements for SSL:

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Enabling Active Directory Authentication with ESX Server 1

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Active Directory Compatibility with ExtremeZ-IP

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

API-Security Gateway Dirk Krafzig

identity management in Linux and UNIX environments

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Public Key Applications & Usage A Brief Insight

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Juniper Networks Secure Access Kerberos Constrained Delegation

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Authentication Applications

Device-Centric Authentication and WebCrypto

Two SSO Architectures with a Single Set of Credentials

Advanced Administration

TIBCO Spotfire Platform IT Brief

Cornerstones of Security

Charles Firth Managing Macs in a Windows World

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

External and Federated Identities on the Web

CTS2134 Introduction to Networking. Module Network Security

Entrust Managed Services PKI

SECURELINK.COM ENTERPRISE REMOTE SUPPORT NETWORK

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION

Introduction to Computer Security

Taming the beast : Assess Kerberos-protected networks

Security + Certification (ITSY 1076) Syllabus

Kerberos authentication made easy on OpenVMS

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Lecture 10 - Authentication

information security and its Describe what drives the need for information security.

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Web Applications Access Control Single Sign On

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Kerberos and Single Sign-On with HTTP

Enterprise Remote Support Network

Guide to SASL, GSSAPI & Kerberos v.6.0

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Building A Secure Microsoft Exchange Continuity Appliance

Likewise Security Benefits

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Single Sign On In A CORBA-Based

Transcription:

Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at the University of Pennsylvania Shumon Huque & Deke Kassabian University of Pennsylvania Internet2 Fall Member Meeting September 21st 2005, Philadelphia, PA 1

Historical PennNet Authentication System Home grown Not standards based, relied on custom network protocols Reusable passwords transmitted in the clear Not highly available No Single Sign-On capability We needed something a lot better 2

New Requirements Standards based Cryptographic authentication Mutual authentication Single Sign-On High Availability Wide application support 3

Cryptographic Authentication No password or long term key is transferred over the network Users prove their identity to a service by performing a cryptographic operation,usually on a quantity (nonce) supplied by the server Crypto operation based on user s secret key or password 4

Single Sign-On (SSO) An authentication system Login or sign-on once (per time period) User is automatically authenticated to subsequent network services, without being prompted for his authentication credentials again (eg. password) SSO!= password synchronization + caching 5

Why Single Sign-On? Convenience and security? Huh? You cannot be serious! Convenience: Users have a single password and only need to use it once (per day) Security (on true SSO systems): Passwords on central authn server(s) only Easier to defend a smaller set of computers Centralized password quality enforcement Users will (probably) be less cavalier about password security 6

Candidate Authentication Systems Kerberos Public Key Infrastructure (PKI) 7

Kerberos Standards based strong authentication system Authentication mediated by trusted 3rd party Key Distribution Center (KDC) Uses secret key cryptography Provides mutual authentication Provides single sign-on capability Can optionally support: Hardware tokens, smartcards, pubkey crypto Inter-domain authentication mechanisms exist 8

Kerberos (cont) Employs passwords but they are never transmitted over the network Other cryptographic credentials (tickets and authenticators) are sent over the network instead 9

Mediated Authentication A trusted third party mediates the authentication process Called the Key Distribution Center (KDC) Each user and service shares a secret key with the KDC KDC generates a session key, and securely distributes it to communicating parties Communicating parties prove to each other that they know the session key 10

Mediated Authentication 11

Mediated Authentication 12

Kerberos (roughly) 13

Kerberos with Single Sign-On Ticket Granting Service (TGS): A special Kerberos authenticated service, that allows user to obtain tickets for other services Kerberos client software automatically obtains these tickets as needed Co-located at the KDC Ticket Granting Ticket (TGT): Ticket used to access the TGS and obtain service tickets Limited-lifetime session key: TGS sessionkey Shared by user and the TGS 14

15

Kerberos enabled applications Windows domain authentication E-mail (SMTP/POP/IMAP) File transfer (FTP, SCP) File sharing (NFS, DFS, Samba) Remote Login (TELNET, rlogin, SSH*) Directory (LDAP) Authen frameworks: SASL, GSS-API, TLS 16

Kerberos OS support Microsoft Windows Apple MacOS X Solaris, HP-UX, IBM AIX Linux, *BSD 17

Specific Applications Some applications where Penn has helped implement Kerberos support Qualcomm s Eudora (POP/IMAP/SMTP) Newswatcher (NNTP) Mozilla/Thunderbird (POP/IMAP/SMTP - LDAP soon) 18

Kerberos devoid applications Some notable applications that don t yet have Kerberos support: WWW (HTTP) Workarounds exist; webiso systems like pubcookie, websec KX.509 protocol from UMich Combines Kerberos with short term PK credentials that are then used in SSL/TLS authentication 19

Kerberos devoid applications Attempts to support native Kerberos authentication in HTTP Microsoft s HTTP/SPNEGO/GSS-API Not standards based No channel protection - easily victimized by session hijacking SPNEGO protocol is being repaired IETF efforts in progress Kerberos/GSS-API ciphers in TLS SASL in HTTP 20

Kerberos devoid applications EAP (used by IEEE 802.1x & PANA) Awaiting EAP-GSS, EAP-Kerberos5 (SECMECH) IPSEC IETF KINK protocol under development SNMP (Simple Network Management Protocol) IETF ISMS working group 21

Kerberos devoid applications Interim measure: Deploy Kerberos password verification service Receives Kerberos principal and password over some secure channel, then authenticates against KDC We do this centrally with a RADIUS server infrastructure 22

Other issues Inter-institutional authentication Federations Roaming scholar problem See FWNA work 23

Kerberos caveats KDC is a single point of failure Can have replicated KDC s KDC could be a performance bottleneck Everyone needs to communicate with it frequently Having multiple KDC s alleviates the problem If local workstation is compromised, user s password could be stolen by a trojan horse Only use a desktop machine or laptop that you trust Use hardware token pre-authentication AS exchange vulnerable to offline dictionary attack Solution: Strong password rules, 2-factor authentication 24

Designing for High Availability Multiple Kerberos servers (3) Employ failover model Each KDC in a distinct machine room in a distinct geographic location Each on a distinct (logically & physically isolated) IP subnet Each IP subnet multihomed to 3 campus core routers 25

26

Kerberos future? Make initial exchange invulnerable to dictionary attack: EKE, SRP, SPEKE, SRP, PDM etc Problems: IPR issues PKINIT exists --> but needs PK credentials and possibly PKI Identity privacy Identifier remapping 27

Kerberos & Two-factor auth In addition to a secret password, user is required to present a physical item: A small electronic device: h/w authentication token Generates non-reusable numeric responses Could employ challenge response Called 2-factor authentication, because it requires 2 things: Something the user knows (password) Something the user has (hardware token) 28

29

Two-factor deployment Token technology selection Infrastructure setup Authentication server infrastructure Redundancy, high availability important Manage, distribute, initialize tokens Problem resolution: diagnosis & repair of faulty tokens Money :-) 30

Are Biometrics the answer? Fingerprint, retina print, iris print etc Could be useful as an additional authentication factor, but.. 31

Are Biometrics the answer? Users may be reluctant to have biometric data stored in central databases Privacy objections, linkage with health Reliability? Biometric measurements noisy by nature Low level of secrecy People leave fingerprints everywhere Iris images may be captured by photography Irrevocable nature How do you change a compromised biometric? 32

Revocation protocol :-) 33

Public Key Infrastructure (PKI) A system for managing public keys & certificates A Certification Authority (CA) or hierarchy of Certication Authorities Protocols for key acquisition, validation, distribution and revocation. The CA maintains directories of digitally signed associations of public keys and their owners. IETF standards in progress: PKIX (an X.509 derivative) and SPKI. 34

35

PKI If used properly, one of the most secure systems around (for now) Great scalability characteristics (some gotchas..) 36

PKI outstanding issues Authentication of the CA or CA chain Protection of user s private keys Certificate Revocation Credential Mobility Single Sign-on issues Challenging user education problems 37

PKI issue 1 How can the CA or CA chain be properly authenticated? Most protocols that employ PKI explicitly ignore this problem Software often comes initialized with root CA public keys And hope that no-one ever encounters trojans or malware 38

PKI Issue 2 How do we enforce adequate protection of a user s private key? 39

40

PKI issue 3 Certificate Revocation How do users and servers get up-to-date CRLs? How does the system enforce that it s users are using up-to-date CRLs? 41

42

PKI issue 3 (cont) Certificate revocation (cont) Online Certificate Status Protocol (OCSP) Which deployments use OCSP? Do they introduce a performance and reliability problem? 43

44

PKI issue 4 Credential Mobility IETF SACRED working group Various password based protocols for key retrieval Smartcards and tokens for transport Need token readers everywhere! 45

PKI issue 5 No good Single Sign-On solution today Long term exposure of private key is not good 46

PKI issue 6 User Education Public Key crypto places undue burden on users to rigorously validate keys and certificates And provides no way to secure user s compliance in these tasks Teaching unsavvy users about key management and key hygiene is difficult (probably impossible) Is PKI a good consumer technology? 47

Useful applications for PKI Server to server authentication Inter-institutional authentication eg. Federated authentication systems like Shibboleth What about PKI only for managing server certificates? More manageable than user AuthN but still has issues (see previous slides) 48

Do you trust your CA? A CA can protect you from anyone they are not taking money from. - Matt Blaze January 2001: Verisign issued two Class-3 certificates to an unknown individual with the common name Microsoft Corporation 49

Speaker change.. 50

Unified Namespace Decided in 1995 to unify disjoint user namespaces at Penn Developed a basic name registry service (PennNames) and tools for applications Coordinated with application owners from throughout Penn Group effort to resolve name conflicts over the course of 6 or 7 years (fairly painful) 51

Why do we care about Unified Namespace? Reduces confusion and misdirected communications Provides a simpler handle for a broad range of campus IT services Simplified design of campus-wide authentication system Probably simplifies future work on centralized authorization 52

Authentication & Authorization The act of verifying someone s identity The process by which users prove their identity to a service (and vice versa Mutual authentication ) Doesn t specify what a user is allowed or not allowed to do (Authorization) 53

What do we have so far? We know that the user is who they claim to be (authentication) We don t know anything about them (roles, affiliations) We don t know what they can do (privileges) 54

Simple Scenario Hi! I m Mark! (Identity) And here is my PennKey and password to prove it. (Authentication) I want to connect to the IMAP server to read my mail. (Authorization) And now I want to shut down the DNS server. (Authorization) 55

Authorization Decisions Is the user on a list of approved users? Is the user a member of an approved group? 56

The Not-So-Good Old Days Every application on its own to make authorization decisions In practice, many assumed that authentication was good enough ( if you can log in, you re in ) Every application must maintain its own access control lists or eligibility/ privilege rules 57

A Better Way Make authorization decisions according to local eligibility policy using central role and privilege definitions All Senior Law Faculty Any staff in my department, except the birthday boy 58

High Level AuthZ Design App Servers AuthZ Service University Source Systems Access Control Lists Distributed Management, Local Data 59

High Level AuthZ Design (usually after an AuthN) AuthN Service App Servers AuthZ Service University Source Systems Access Control Lists Distributed Management, Local Data 60

Likely Components Grouper and Signet as elements of the AuthZ service Web UI that allows distributed management of central store of local data Application access to the AuthZ service by widely available mechanisms/protocols like LDAP 61

Benefits of Centralization Consistent application of authority rules (Many) privileges for an individual can be viewed in one place Allows for a historical view of privileges over time Allows for automatic revocation based on status or affiliation changes Facilitates hierarchical control of authority 62

Making the case for centralization Stay in compliance with a growing list of policy mandates Consistent rules Easy auditing Save both dollars and time Automated privilege changes Less specific knowledge needed for every application 63

Challenges of centralization Sufficient motivation for change Users and application providers may need related education Resources, control Centralized authentication forces units to relinquish control Perhaps some software engineering required to separate authentication from authorization 64

Challenges of centralization Units must understand current authorization/privilege policies This will likely trigger a thorough review of those policies (probably not a bad thing, but takes time) Units must translate those policies into new format 65

Summing up Unified user name space (PennNames) Addressing several password issues (many passwords, varying rules, poor password handling practices) with central AuthN Driving towards secure and practical single signon through the native use of Kerberos Working on two-factor AuthN possibilities Pulling together relevant directory, AuthN, AuthZ technology pieces, plus policies, and physical identification, towards early stage Identity Management 66

References Kerberos: An Authentication Service for Computer Networks Neuman and Ts o, IEEE Communications, Sep 1994 RFC 4120: The Kerberos Network Authentication Service (V5) Neuman, Yu, Hartman, Raeburn, 2005 Updates RFC 1510: Kohl & Neuman RFC 3280: Internet X.509 PKI: Certificate & Certificate Revocation List Profile Housley, Polk, Ford, Solo 67

References (cont) Compliance Defects in Public-Key Cryptography Don Davis, 6th USENIX Security Symposium, 1996 http://www.usenix.org/publications/library/proceedin gs/sec96/davis.html PennNet Central Authentication Infrastructure http://www.huque.com/~shuque/doc/2004-03-p21- authn.html 68

References (cont) Internet2 Middleware Initiative http://middleware.internet2.edu/ Signet http://middleware.internet2.edu/signet/ Grouper http://middleware.internet2.edu/signet/ Shibboleth http://shibboleth.internet2.edu/ 69

Questions or comments? Shumon Huque shuque -AT- isc.upenn.edu Deke Kassabian deke -AT- isc.upenn.edu 70