OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

Size: px
Start display at page:

Download "OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015"

Transcription

1 OS Security Authentication Radboud University Nijmegen, The Netherlands Winter 2014/2015

2 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs) to shared ressources. OS Security Authentication 2

3 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs) to shared ressources. Examples of shared resources Memory Input and Output (I/O) including Files on the harddrive Network Computation cycles on the processor(s) Peripheral hardware (keyboard, screen,... ) OS Security Authentication 2

4 What does that mean for security? Operating system needs to decide whether processes are allowed to perform certain operations Obvious security disasters: One process reading the memory of another process A process reading a secret file A process preventing other processes from operating One process reading (keyboard) input meant for another process OS Security Authentication 3

5 Wait, what about users? Is the process with ID 4321 allowed to read the file /home/peter/os-security/exam-2014.pdf? OS Security Authentication 4

6 Wait, what about users? Is the process with ID 4321 allowed to read the file /home/peter/os-security/exam-2014.pdf? Is user peter allowed to read the file /home/peter/os-security/exam-2014.pdf? OS Security Authentication 4

7 Wait, what about users? Is the process with ID 4321 allowed to read the file /home/peter/os-security/exam-2014.pdf? Is user peter allowed to read the file /home/peter/os-security/exam-2014.pdf? Need to map between a user (human) and a certain operation OS Security Authentication 4

8 Wait, what about users? Is the process with ID 4321 allowed to read the file /home/peter/os-security/exam-2014.pdf? Is user peter allowed to read the file /home/peter/os-security/exam-2014.pdf? Need to map between a user (human) and a certain operation Definition Authentication is the means by which it is determined that a particular entity (typically a human) intends to perform a given operation. OS Security Authentication 4

9 Wait, what about users? Is the process with ID 4321 allowed to read the file /home/peter/os-security/exam-2014.pdf? Is user peter allowed to read the file /home/peter/os-security/exam-2014.pdf? Need to map between a user (human) and a certain operation Definition Authentication is the means by which it is determined that a particular entity (typically a human) intends to perform a given operation. Typically perform user authentication as a login procedure Start a shell mapped to the logged-in user A shell is (basically) an interface to run other programs All programs run from this shell are mapped to the logged-in user OS Security Authentication 4

10 Problems of authentication Authentication is not necessarily perfect. Have to balance Fraud rate: authentication that passed, but should have failed Insult rate: authentication that failed, but should have passed OS Security Authentication 5

11 Problems of authentication Authentication is not necessarily perfect. Have to balance Fraud rate: authentication that passed, but should have failed Insult rate: authentication that failed, but should have passed User authentication does not catch everything: Programs may perform operations that are not requested (or intended) by the user Programs may not perform operations that are requested (or intended) by the user OS Security Authentication 5

12 Problems of authentication Authentication is not necessarily perfect. Have to balance Fraud rate: authentication that passed, but should have failed Insult rate: authentication that failed, but should have passed User authentication does not catch everything: Programs may perform operations that are not requested (or intended) by the user Programs may not perform operations that are requested (or intended) by the user Can perform operation authentication: Ensure that a given operation is performed on request of a given user Only feasible for very important operations OS Security Authentication 5

13 Problems of authentication Authentication is not necessarily perfect. Have to balance Fraud rate: authentication that passed, but should have failed Insult rate: authentication that failed, but should have passed User authentication does not catch everything: Programs may perform operations that are not requested (or intended) by the user Programs may not perform operations that are requested (or intended) by the user Can perform operation authentication: Ensure that a given operation is performed on request of a given user Only feasible for very important operations Worst-case of authentication going wrong: impersonation Authenticating as somebody else lets you perform all operations that this user is allowed to do Authenticating as anybody else lets you perform arbitrary operations OS Security Authentication 5

14 User authentication Can authenticate through something you know (typically a password) something you have (typically a card or token) something you are (biometrics) Multi-factor authentication combines two (or more) means of authentication OS Security Authentication 6

15 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 OS Security Authentication 7

16 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 root may access all files OS Security Authentication 7

17 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 root may access all files root may change permissions on all files OS Security Authentication 7

18 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 root may access all files root may change permissions on all files root may bind programs to network sockets with port number smaller than 1024 OS Security Authentication 7

19 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 root may access all files root may change permissions on all files root may bind programs to network sockets with port number smaller than 1024 root may impersonate any other user A process belonging to root may change its user ID to that of another user Once a process has changed from user ID 0 to another user ID, there is no way back OS Security Authentication 7

20 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 root may access all files root may change permissions on all files root may bind programs to network sockets with port number smaller than 1024 root may impersonate any other user A process belonging to root may change its user ID to that of another user Once a process has changed from user ID 0 to another user ID, there is no way back There are still certain actions that a program run by root cannot do (more next lecture) OS Security Authentication 7

21 The user root UNIX and Linux have a special superuser called root The user ID of root is always 0 root may access all files root may change permissions on all files root may bind programs to network sockets with port number smaller than 1024 root may impersonate any other user A process belonging to root may change its user ID to that of another user Once a process has changed from user ID 0 to another user ID, there is no way back There are still certain actions that a program run by root cannot do (more next lecture) Security nightmare: an attacker who gets root access OS Security Authentication 7

22 The Linux login procedure First process started after OS bootup is called init Main job of init is to start other processes OS Security Authentication 8

23 The Linux login procedure First process started after OS bootup is called init Main job of init is to start other processes init starts a program called getty getty stands for get terminal or get teletypewriter OS Security Authentication 8

24 The Linux login procedure First process started after OS bootup is called init Main job of init is to start other processes init starts a program called getty getty stands for get terminal or get teletypewriter getty starts login init, getty and login all run as root login prompts for username and password OS Security Authentication 8

25 The Linux login procedure First process started after OS bootup is called init Main job of init is to start other processes init starts a program called getty getty stands for get terminal or get teletypewriter getty starts login init, getty and login all run as root login prompts for username and password Bad password: login exits, init starts new getty Good password: login changes to new user and executes a shell OS Security Authentication 8

26 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary OS Security Authentication 9

27 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary Over-the-shoulder attack: password aging (replace passwords after a certain time), user training OS Security Authentication 9

28 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary Over-the-shoulder attack: password aging (replace passwords after a certain time), user training Automated on-line guessing: Limit the number and/or rate of retries, report suspicious number of retries OS Security Authentication 9

29 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary Over-the-shoulder attack: password aging (replace passwords after a certain time), user training Automated on-line guessing: Limit the number and/or rate of retries, report suspicious number of retries Read the password file: Use a (salted) one-way hash, prevent users from reading the file OS Security Authentication 9

30 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary Over-the-shoulder attack: password aging (replace passwords after a certain time), user training Automated on-line guessing: Limit the number and/or rate of retries, report suspicious number of retries Read the password file: Use a (salted) one-way hash, prevent users from reading the file Automated offline attacks: Use a slow one-way hash, good passwords OS Security Authentication 9

31 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary Over-the-shoulder attack: password aging (replace passwords after a certain time), user training Automated on-line guessing: Limit the number and/or rate of retries, report suspicious number of retries Read the password file: Use a (salted) one-way hash, prevent users from reading the file Automated offline attacks: Use a slow one-way hash, good passwords Spoofing attacks (present a fake login window): Trusted path for login OS Security Authentication 9

32 Attacks against passwords and countermeasures Guessing attack: Avoid short passwords and passwords from a dictionary Over-the-shoulder attack: password aging (replace passwords after a certain time), user training Automated on-line guessing: Limit the number and/or rate of retries, report suspicious number of retries Read the password file: Use a (salted) one-way hash, prevent users from reading the file Automated offline attacks: Use a slow one-way hash, good passwords Spoofing attacks (present a fake login window): Trusted path for login Eavesdropping attacks (key logging, acoustic attacks): physical security OS Security Authentication 9

33 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash OS Security Authentication 10

34 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash 1. field: Username OS Security Authentication 10

35 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash 1. field: Username 2. field: Password information, x means that the password hash is separately stored in /etc/shadow OS Security Authentication 10

36 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash 1. field: Username 2. field: Password information, x means that the password hash is separately stored in /etc/shadow 3. field: User ID (assigned to every process started by the user) OS Security Authentication 10

37 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash 1. field: Username 2. field: Password information, x means that the password hash is separately stored in /etc/shadow 3. field: User ID (assigned to every process started by the user) 4. field: Group ID (more later) OS Security Authentication 10

38 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash 1. field: Username 2. field: Password information, x means that the password hash is separately stored in /etc/shadow 3. field: User ID (assigned to every process started by the user) 4. field: Group ID (more later) 5. field: Comment describing the user OS Security Authentication 10

39 /etc/passwd Linux uses the file /etc/passwd to store user login information Each line has 7 fields, separated by :, e.g.: peter:x:1000:1000:peter Schwabe,,,:/home/peter:/bin/bash 1. field: Username 2. field: Password information, x means that the password hash is separately stored in /etc/shadow 3. field: User ID (assigned to every process started by the user) 4. field: Group ID (more later) 5. field: Comment describing the user 6. field: Home directory 7. field: Login program (set to /bin/false or /usr/sbin/nologin for users that are not allowed to log in) OS Security Authentication 10

40 /etc/shadow Traditionally /etc/passwd stored users password hashes Disadvantage: every user can read all hashes Easy to run offline (dictionary) attacks for every user OS Security Authentication 11

41 /etc/shadow Traditionally /etc/passwd stored users password hashes Disadvantage: every user can read all hashes Easy to run offline (dictionary) attacks for every user Better approach: store password hashes in /etc/shadow /etc/shadow is readable only for root Most important information per entry (line) Username Password hash + salt (+algorithm) Password expiration information OS Security Authentication 11

42 /etc/shadow Traditionally /etc/passwd stored users password hashes Disadvantage: every user can read all hashes Easy to run offline (dictionary) attacks for every user Better approach: store password hashes in /etc/shadow /etc/shadow is readable only for root Most important information per entry (line) Username Password hash + salt (+algorithm) Password expiration information Use * or! in the password field to lock the password Locking a password is different from using /bin/false as login program There may be other means to authenticate than the password OS Security Authentication 11

43 Password hashing algorithms Traditionally Linux used crypt for password hashing Truncate the password to 8 characters, 7 bits each Encrypt the all-zero string with modified DES with this 56-bit key Iterate encryption for 25 times (later: up to ) Incorporate a 12-bit (later: 24-bit) salt OS Security Authentication 12

44 Password hashing algorithms Traditionally Linux used crypt for password hashing Truncate the password to 8 characters, 7 bits each Encrypt the all-zero string with modified DES with this 56-bit key Iterate encryption for 25 times (later: up to ) Incorporate a 12-bit (later: 24-bit) salt Use modified DES to prevent attacks with DES hardware Originally computing the hash cost 1 second Too weak nowadays to offer strong protection OS Security Authentication 12

45 Password hashing algorithms Traditionally Linux used crypt for password hashing Truncate the password to 8 characters, 7 bits each Encrypt the all-zero string with modified DES with this 56-bit key Iterate encryption for 25 times (later: up to ) Incorporate a 12-bit (later: 24-bit) salt Use modified DES to prevent attacks with DES hardware Originally computing the hash cost 1 second Too weak nowadays to offer strong protection Sucessors: MD5, bcrypt (based on Blowfish), SHA-2 OS Security Authentication 12

46 Password hashing algorithms Traditionally Linux used crypt for password hashing Truncate the password to 8 characters, 7 bits each Encrypt the all-zero string with modified DES with this 56-bit key Iterate encryption for 25 times (later: up to ) Incorporate a 12-bit (later: 24-bit) salt Use modified DES to prevent attacks with DES hardware Originally computing the hash cost 1 second Too weak nowadays to offer strong protection Sucessors: MD5, bcrypt (based on Blowfish), SHA-2 Password hash string indicates which algorithm to use: $1$: MD5; $2a$, $2b$, $2x$, $2y$: variants of bcrypt $5$: SHA-256; $6$: SHA-512 OS Security Authentication 12

47 Password hashing algorithms Traditionally Linux used crypt for password hashing Truncate the password to 8 characters, 7 bits each Encrypt the all-zero string with modified DES with this 56-bit key Iterate encryption for 25 times (later: up to ) Incorporate a 12-bit (later: 24-bit) salt Use modified DES to prevent attacks with DES hardware Originally computing the hash cost 1 second Too weak nowadays to offer strong protection Sucessors: MD5, bcrypt (based on Blowfish), SHA-2 Password hash string indicates which algorithm to use: $1$: MD5; $2a$, $2b$, $2x$, $2y$: variants of bcrypt $5$: SHA-256; $6$: SHA-512 Better algorithm through Winner announced on Nov 2, 2015: ARGON2 OS Security Authentication 12

48 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters OS Security Authentication 13

49 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters 2. Convert password to all-uppercase OS Security Authentication 13

50 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters 2. Convert password to all-uppercase 3. Pad to 14 bytes OS Security Authentication 13

51 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters 2. Convert password to all-uppercase 3. Pad to 14 bytes 4. Split into two 7-byte halves OS Security Authentication 13

52 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters 2. Convert password to all-uppercase 3. Pad to 14 bytes 4. Split into two 7-byte halves 5. Use each of the halves as a DES key OS Security Authentication 13

53 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters 2. Convert password to all-uppercase 3. Pad to 14 bytes 4. Split into two 7-byte halves 5. Use each of the halves as a DES key 6. Encrypt the fixed ASCII string KGS!@#$% OS Security Authentication 13

54 How about Windows? Traditionally, Windows uses the LM hash (for LanMan hash or LAN manager hash ) Algorithm for LM hash: 1. Restrict password to 14 characters 2. Convert password to all-uppercase 3. Pad to 14 bytes 4. Split into two 7-byte halves 5. Use each of the halves as a DES key 6. Encrypt the fixed ASCII string KGS!@#$% 7. Concatenate the two ciphertexts to obtain the LM hash OS Security Authentication 13

55 LM Hash weaknesses 14 printable ASCII characters give 2 92 passwords OS Security Authentication 14

56 LM Hash weaknesses 14 printable ASCII characters give 2 92 passwords Can crack the halves independently: 2 46 for each half OS Security Authentication 14

57 LM Hash weaknesses 14 printable ASCII characters give 2 92 passwords Can crack the halves independently: 2 46 for each half All characters converted to upper case: 2 43 for each half OS Security Authentication 14

58 LM Hash weaknesses 14 printable ASCII characters give 2 92 passwords Can crack the halves independently: 2 46 for each half All characters converted to upper case: 2 43 for each half No salt, rainbow tables are feasible OS Security Authentication 14

59 LM Hash weaknesses 14 printable ASCII characters give 2 92 passwords Can crack the halves independently: 2 46 for each half All characters converted to upper case: 2 43 for each half No salt, rainbow tables are feasible Passwords shorter than 8 characters produce hash ending in 0xAAD3B435B51404EE OS Security Authentication 14

60 LM Hash weaknesses 14 printable ASCII characters give 2 92 passwords Can crack the halves independently: 2 46 for each half All characters converted to upper case: 2 43 for each half No salt, rainbow tables are feasible Passwords shorter than 8 characters produce hash ending in 0xAAD3B435B51404EE Cracking LM hashes is fairly easy, there are even online services, e.g., OS Security Authentication 14

61 NT hashes LM hash weaknesses were addressed by NT hash (or NTLM) NTLMv1 uses MD4 to hash passwords NTLMv2 uses MD5 to hash passwords Passwords are still unsalted OS Security Authentication 15

62 NT hashes LM hash weaknesses were addressed by NT hash (or NTLM) NTLMv1 uses MD4 to hash passwords NTLMv2 uses MD5 to hash passwords Passwords are still unsalted Until Windows XP, LM hashes were still enabled by default for backwards compatiblity OS Security Authentication 15

63 NT hashes LM hash weaknesses were addressed by NT hash (or NTLM) NTLMv1 uses MD4 to hash passwords NTLMv2 uses MD5 to hash passwords Passwords are still unsalted Until Windows XP, LM hashes were still enabled by default for backwards compatiblity Today, Windows uses multiple different approaches for passwords OS Security Authentication 15

64 NT hashes windows-8-stores-logon-passwords-in-plain-text-3914.html OS Security Authentication 15

65 Weak passwords Largest problem with passwords: weak passwords Remember 1987 Mel Brooks movie Spaceballs OS Security Authentication 16

66 Weak passwords Largest problem with passwords: weak passwords Remember 1987 Mel Brooks movie Spaceballs Most common passwords in 2014 (SplashData list): OS Security Authentication 16

67 Weak passwords Largest problem with passwords: weak passwords Remember 1987 Mel Brooks movie Spaceballs Most common passwords in 2014 (SplashData list): Place 3: OS Security Authentication 16

68 Weak passwords Largest problem with passwords: weak passwords Remember 1987 Mel Brooks movie Spaceballs Most common passwords in 2014 (SplashData list): Place 3: Place 2: password OS Security Authentication 16

69 Weak passwords Largest problem with passwords: weak passwords Remember 1987 Mel Brooks movie Spaceballs Most common passwords in 2014 (SplashData list): Place 3: Place 2: password Place 1: OS Security Authentication 16

70 Weak passwords Largest problem with passwords: weak passwords Remember 1987 Mel Brooks movie Spaceballs Most common passwords in 2014 (SplashData list): Place 3: Place 2: password Place 1: Exercises in 1st semester course include breaking (unsalted) hash of a 7-character random password. Some students typically manage to do that in a week! OS Security Authentication 16

71 Authentication by what you have Very common in the physical world, e.g., keys Digital world: Smart cards, USB tokens Private keys (e.g., for SSH) OS Security Authentication 17

72 Authentication by what you have Very common in the physical world, e.g., keys Digital world: Smart cards, USB tokens Private keys (e.g., for SSH) Can easily combine with password, e.g. on SSH private keys OS Security Authentication 17

73 Authentication by what you have Very common in the physical world, e.g., keys Digital world: Smart cards, USB tokens Private keys (e.g., for SSH) Can easily combine with password, e.g. on SSH private keys Attacks and countermeasures Stealing (or finding): Protect possession OS Security Authentication 17

74 Authentication by what you have Very common in the physical world, e.g., keys Digital world: Smart cards, USB tokens Private keys (e.g., for SSH) Can easily combine with password, e.g. on SSH private keys Attacks and countermeasures Stealing (or finding): Protect possession Copying: Tamper-proof hardware, holograms, anti-counterfeiting techniques OS Security Authentication 17

75 Authentication by what you have Very common in the physical world, e.g., keys Digital world: Smart cards, USB tokens Private keys (e.g., for SSH) Can easily combine with password, e.g. on SSH private keys Attacks and countermeasures Stealing (or finding): Protect possession Copying: Tamper-proof hardware, holograms, anti-counterfeiting techniques Replay attack: device-dependent, use challenge-response OS Security Authentication 17

76 Authentication by what you are Fingerprint (fake fingerprint, cut off finger) iphone-5s-touch-id-hack-in-detail html OS Security Authentication 18

77 Authentication by what you are Fingerprint (fake fingerprint, cut off finger) iphone-5s-touch-id-hack-in-detail html Retina scans OS Security Authentication 18

78 Authentication by what you are Fingerprint (fake fingerprint, cut off finger) iphone-5s-touch-id-hack-in-detail html Retina scans Voice match (distorted by cold, defeated by recordings) OS Security Authentication 18

79 Authentication by what you are Fingerprint (fake fingerprint, cut off finger) iphone-5s-touch-id-hack-in-detail html Retina scans Voice match (distorted by cold, defeated by recordings) Handwriting (low accuracy, easy to fake) OS Security Authentication 18

80 Authentication by what you are Fingerprint (fake fingerprint, cut off finger) iphone-5s-touch-id-hack-in-detail html Retina scans Voice match (distorted by cold, defeated by recordings) Handwriting (low accuracy, easy to fake) Keystroking, timing of keystrokes OS Security Authentication 18

81 Authentication by what you are Fingerprint (fake fingerprint, cut off finger) iphone-5s-touch-id-hack-in-detail html Retina scans Voice match (distorted by cold, defeated by recordings) Handwriting (low accuracy, easy to fake) Keystroking, timing of keystrokes When a password is compromised, change your password. What if your fingerprint is compromised? OS Security Authentication 18

82 Compromising fingerprints... OS Security Authentication 19

83 Pluggable authentication modules Local login is not the only program that needs user authentication: SSH (remote login) Graphical login (GDM, LightDM) Screen locks (screensaver) su and sudo (more next lecture) OS Security Authentication 20

84 Pluggable authentication modules Local login is not the only program that needs user authentication: SSH (remote login) Graphical login (GDM, LightDM) Screen locks (screensaver) su and sudo (more next lecture) Idea: Centralize authentication, make functionality available through library This is handled by Pluggable Authentication Modules (PAM) OS Security Authentication 20

85 Pluggable authentication modules Local login is not the only program that needs user authentication: SSH (remote login) Graphical login (GDM, LightDM) Screen locks (screensaver) su and sudo (more next lecture) Idea: Centralize authentication, make functionality available through library This is handled by Pluggable Authentication Modules (PAM) Add a new module (e.g., for fingerprint authentication), directly available to all PAM enabled programs OS Security Authentication 20

86 PAM design Image from OS Security Authentication 21

87 PAM activities PAM knows 4 different authentication-related activities: auth: The activity of user authentication; typically by password, but can also use tokens, fingerprints etc. account: After a user is identified, decide whether he is allowed to log in. For example, can restrict login times. session: Allocates resources, for example mount home directory, set resource usage limits, print greeting message with information. password: Update the user s credentials (typically the password) OS Security Authentication 22

88 PAM configuration syntax Configuration for program progname is in /etc/pam.d/progname OS Security Authentication 23

89 PAM configuration syntax Configuration for program progname is in /etc/pam.d/progname PAM control flags requisite: if module fails, immediately return failure and stop required: if module fails, return failure but continue sufficient: if module passes, return pass and stop optional: pass/fail result is ignored Image source: OS Security Authentication 23

90 Examples of PAM modules Name Activities Description pam_unix auth, session, Standard UNIX authentication through password /etc/shadow passwords pam_permit auth, account, Always returns true session, password pam_deny auth, account, Always returns false session, password pam_rootok auth Returns true iff you re root pam_warn auth, account, Write a log message to the system log session, password pam_cracklib password Perform checks of the password strength OS Security Authentication 24

91 Some PAM config examples Prevent all users from using su (/etc/pam.d/su) auth requisite pam_deny.so OS Security Authentication 25

92 Some PAM config examples Prevent all users from using su (/etc/pam.d/su) auth requisite pam_deny.so Prevent non-root users to halt (/etc/pam.d/halt) auth sufficient pam_rootok.so auth required pam_deny.so OS Security Authentication 25

93 Some PAM config examples Prevent all users from using su (/etc/pam.d/su) auth requisite pam_deny.so Prevent non-root users to halt (/etc/pam.d/halt) auth sufficient pam_rootok.so auth required pam_deny.so Enforce passwords with at least 10 characters and at least 2 special characters, use SHA-512 for password hash (/etc/pam.d/passwd): password required pam_cracklib.so minlen=10 ocredit=-2 password required pam_unix.so sha512 OS Security Authentication 25

94 Authentication over the network Large corporate networks want to keep user information central User is added to one central directory, can log into any machine OS Security Authentication 26

95 Authentication over the network Large corporate networks want to keep user information central User is added to one central directory, can log into any machine Various simple ways to set up the protocol: Client sends password, server hashes and compares Client sends hash, server compares Server sends hash, client compares OS Security Authentication 26

96 Authentication over the network Large corporate networks want to keep user information central User is added to one central directory, can log into any machine Various simple ways to set up the protocol: Client sends password, server hashes and compares Client sends hash, server compares Server sends hash, client compares Also more complex ways, e.g., challenge-response OS Security Authentication 26

97 Authentication over the network Large corporate networks want to keep user information central User is added to one central directory, can log into any machine Various simple ways to set up the protocol: Client sends password, server hashes and compares Client sends hash, server compares Server sends hash, client compares Also more complex ways, e.g., challenge-response Possible disadvantage of central login server: single point of failure OS Security Authentication 26

98 NTLM and pass the hash Microsoft s LM and NTLM network authentication can send hash from the client, server compares hashes Attacker only needs to obtain the password hash The whole point of storing password hashes is gone Essentially, the hash becomes the password OS Security Authentication 27

99 NTLM and pass the hash Microsoft s LM and NTLM network authentication can send hash from the client, server compares hashes Attacker only needs to obtain the password hash The whole point of storing password hashes is gone Essentially, the hash becomes the password This attack is known as pass the hash attack OS Security Authentication 27

100 NTLM and pass the hash Microsoft s LM and NTLM network authentication can send hash from the client, server compares hashes Attacker only needs to obtain the password hash The whole point of storing password hashes is gone Essentially, the hash becomes the password This attack is known as pass the hash attack Conveniently automated in metasploit OS Security Authentication 27

101 NTLM and pass the hash Microsoft s LM and NTLM network authentication can send hash from the client, server compares hashes Attacker only needs to obtain the password hash The whole point of storing password hashes is gone Essentially, the hash becomes the password This attack is known as pass the hash attack Conveniently automated in metasploit Almost any larger Windows network still has NTLM somewhere OS Security Authentication 27

102 NIS Network Information Service (NIS) invented by Sun Centrally administer users and hosts Server sends hash to the client, client compares Essentially, the advantage of /etc/shadow is lost NIS is still in use today, but not very common anymore OS Security Authentication 28

103 LDAP The Lightweight Directory Access Protocol (LDAP) is a network directory information protocol Developed by the IETF Includes means for user authentication OS Security Authentication 29

104 LDAP The Lightweight Directory Access Protocol (LDAP) is a network directory information protocol Developed by the IETF Includes means for user authentication Different modes involve sending the password to the server OS Security Authentication 29

105 LDAP The Lightweight Directory Access Protocol (LDAP) is a network directory information protocol Developed by the IETF Includes means for user authentication Different modes involve sending the password to the server Use these modes only over a TLS connection OS Security Authentication 29

106 LDAP The Lightweight Directory Access Protocol (LDAP) is a network directory information protocol Developed by the IETF Includes means for user authentication Different modes involve sending the password to the server Use these modes only over a TLS connection Even better: integrate LDAP with Kerberos OS Security Authentication 29

107 Kerberos State-of-the-art network authentication protocol Originally developed at MIT Two main versions: v4 (with some security problems) and v5 Uses challenge-response, symmetric (and asymmetric) crypto OS Security Authentication 30

108 Kerberos State-of-the-art network authentication protocol Originally developed at MIT Two main versions: v4 (with some security problems) and v5 Uses challenge-response, symmetric (and asymmetric) crypto Included in most UNIX/Linux variants Together with LDAP forms the basis of Microsoft s Active Directory OS Security Authentication 30

109 Kerberos State-of-the-art network authentication protocol Originally developed at MIT Two main versions: v4 (with some security problems) and v5 Uses challenge-response, symmetric (and asymmetric) crypto Included in most UNIX/Linux variants Together with LDAP forms the basis of Microsoft s Active Directory More in the lecture Cryptography next semester OS Security Authentication 30

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

OS Security. Authentication. Radboud University Nijmegen, The Netherlands. Winter 2014/2015 OS Security Authentication Radboud University Nijmegen, The Netherlands Winter 2014/2015 What does an OS do? Definition An operating system (OS) is a computer program that manages access of processes (programs)

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

PASSWORDS & ENCRYPTION

PASSWORDS & ENCRYPTION PASSWORDS & ENCRYPTION Villanova University Department of Computing Sciences D. Justin Price Fall 2014 CRYPTOGRAPHY Hiding the meaning of a message from unintended recipients. Open source algorithms are

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.

More information

Hands-On Network Security: Practical Tools & Methods. Hands-On Network Security. Roadmap. Security Training Course

Hands-On Network Security: Practical Tools & Methods. Hands-On Network Security. Roadmap. Security Training Course Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 4 Password Strength & Cracking Roadmap

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 4 Password Strength & Cracking Roadmap

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 3 User Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown User Authentication fundamental security building

More information

Lecture 3 - Passwords and Authentication

Lecture 3 - Passwords and Authentication CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 3 - Passwords and Authentication CSE497b - Spring 2007 Introduction Computer and Network Security Professor

More information

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Linux Platform Security Module 2 Password Authentication Roadmap Password Authentication

More information

Lecture 3 - Passwords and Authentication

Lecture 3 - Passwords and Authentication Lecture 3 - Passwords and Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12 What is authentication? Reliably verifying

More information

Network Security Fundamentals

Network Security Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 4 Password Strength & Cracking Roadmap Password Authentication

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Authentication. Identification. AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

User Authentication Protocols Week 7

User Authentication Protocols Week 7 User Authentication Protocols Week 7 CEN-5079: 2.October.2017 1 Announcement Homework 1 is posted on the class webpage Due in 2 weeks 10 points (out of 100) subtracted each late day CEN-5079: 2.October.2017

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Proving who you are. Passwords and TLS

Proving who you are. Passwords and TLS Proving who you are Passwords and TLS Basic, fundamental problem Client ( user ) How do you prove to someone that you are who you claim to be? Any system with access control must solve this Users and servers

More information

CS530 Authentication

CS530 Authentication CS530 Authentication Bill Cheng http://merlot.usc.edu/cs530-s10 1 Identification vs. Authentication Identification associating an identity (or a claimed identity) with an individual, process, or request

More information

Windows authentication methods and pitfalls

Windows authentication methods and pitfalls Windows authentication methods and pitfalls hashes and protocols vulnerabilities attacks 1996-2013 - P. Veríssimo All rights reserved. Reproduction only by permission 1 EXAMPLE: Windows authentication

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

O/S & Access Control. Aggelos Kiayias - Justin Neumann

O/S & Access Control. Aggelos Kiayias - Justin Neumann O/S & Access Control Aggelos Kiayias - Justin Neumann One system Many users Objects that require protection memory I/O devices (disks, printers) programs and processes networks stored data in general Separation

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 7: User Authentication CS526 Topic 7: User Authentication 1 Readings for This Lecture Wikipedia Password Password strength Salt_(cryptography) Password cracking Trusted

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm http://alphapeeler.sourceforge.net pk.linkedin.com/in/armahmood

More information

Lecture 14 Passwords and Authentication

Lecture 14 Passwords and Authentication Lecture 14 Passwords and Authentication Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422 Major Portions Courtesy Ryan Cunningham AUTHENTICATION Authentication

More information

CNT4406/5412 Network Security

CNT4406/5412 Network Security CNT4406/5412 Network Security Authentication Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 43 Introduction Introduction Authentication is the process

More information

CNIT 125: Information Security Professional (CISSP Preparation) Ch 6. Identity and Access Management

CNIT 125: Information Security Professional (CISSP Preparation) Ch 6. Identity and Access Management CNIT 125: Information Security Professional (CISSP Preparation) Ch 6. Identity and Access Management Authentication Methods Authentication Methods Type 1: Something you know Easiest and weakest method

More information

User Authentication Protocols

User Authentication Protocols User Authentication Protocols Class 5 Stallings: Ch 15 CIS-5370: 26.September.2016 1 Announcement Homework 1 is due today by end of class CIS-5370: 26.September.2016 2 User Authentication The process of

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 7: User Authentication CS526 Topic 7: User Authentication 1 Readings for This Lecture Wikipedia Password Password strength Salt_(cryptography) Password cracking Trusted

More information

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.

More information

Authentication. Chapter 2

Authentication. Chapter 2 Authentication Chapter 2 Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication

More information

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication CIS 6930/4930 Computer and Network Security Topic 6. Authentication 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to

More information

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms Authentication IT443 Network Security Administration Instructor: Bo Sheng Authentication Mechanisms Key Distribution Center and Certificate Authorities Session Key 1 2 Authentication Authentication is

More information

Passwords CSC 193 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Spring 2014

Passwords CSC 193 WAKE FOREST. U N I V E R S I T Y Department of Computer Science. Spring 2014 Passwords CSC 193 WAKE FOREST U N I V E R S I T Y Department of Computer Science Spring 2014 Unix Passwords In Unix, users are identified by user names Authenticated by passwords Therefore to login as

More information

McAfee Certified Assessment Specialist Network

McAfee Certified Assessment Specialist Network McAfee MA0-150 McAfee Certified Assessment Specialist Network Version: 4.0 Topic 1, Volume A QUESTION NO: 1 An attacker has compromised a Linux/Unix host and discovers a suspicious file called "password"

More information

Password cracking. IN Ethical Hacking. Bruvoll & Sørby. Department of Informatics 1 / 46

Password cracking. IN Ethical Hacking. Bruvoll & Sørby. Department of Informatics 1 / 46 Password cracking IN5290 - Ethical Hacking Bruvoll & Sørby Department of Informatics 2018 1 / 46 Agenda About passwords Cracking passwords 2 / 46 About passwords 3 / 46 Passwords as authentication Providing

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

HOST Authentication Overview ECE 525

HOST Authentication Overview ECE 525 Authentication Overview Authentication refers to the process of verifying the identity of the communicating principals to one another Usually sub-divided into Entity authentication Authentication in real-time

More information

PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT B

PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT B PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT 800-63B MOTIVATION DATABASE LEAKAGE ADOBE 152,982,479 Encrypted with 3DES ECB Same password == same ciphertext https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Passwords CIT 380: Securing Computer Systems Slide #1 Topics 1. Password Systems 2. Password Cracking 3. Hashing and Salting 4. UNIX Password Systems 5. Windows Password

More information

Authentication System

Authentication System A Biologically Inspired Password Authentication System Dipankar Dasgupta and Sudip Saha Center for Information Assurance University of Memphis Memphis, TN 38152 Outline Motivation Position Authentication

More information

MODULE NO.28: Password Cracking

MODULE NO.28: Password Cracking SUBJECT Paper No. and Title Module No. and Title Module Tag PAPER No. 16: Digital Forensics MODULE No. 28: Password Cracking FSC_P16_M28 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Nature

More information

Sumy State University Department of Computer Science

Sumy State University Department of Computer Science Sumy State University Department of Computer Science Lecture 1 (part 2). Access control. What is access control? A cornerstone in the foundation of information security is controlling how resources are

More information

Authentication. Steven M. Bellovin January 31,

Authentication. Steven M. Bellovin January 31, Authentication Another trilogy: identification, authentication, authorization ACLs and the like are forms of authorization: what you re allowed to do Identification is whom you claim to be be Authentication

More information

Exam4Free. Free valid exam questions and answers for certification exam prep

Exam4Free.  Free valid exam questions and answers for certification exam prep Exam4Free http://www.exam4free.com Free valid exam questions and answers for certification exam prep Exam : MA0-150 Title : McAfee Certified Assessment Specialist- UH Vendors : McAfee Version : DEMO Get

More information

Information Security & Privacy

Information Security & Privacy IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 8 Feb 24, 2015 Authentication, Identity 1 Objectives Understand/explain the issues related to, and utilize

More information

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1 Computer Security 3e Dieter Gollmann Security.di.unimi.it/1516/ Chapter 4: 1 Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords

More information

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken 0/41 Alice Who? Authentication Protocols Andreas Zeller/Stephan Neuhaus Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken The Menu 1/41 Simple Authentication Protocols The Menu 1/41 Simple

More information

CIT 470: Advanced Network and System Administration. Topics. Namespaces. Accounts and Namespaces. 1. Namespaces 2. Policies

CIT 470: Advanced Network and System Administration. Topics. Namespaces. Accounts and Namespaces. 1. Namespaces 2. Policies CIT 470: Advanced Network and System Administration Accounts and Namespaces CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Namespaces 2. Policies 1. selection 2. lifetime 3. scope

More information

Authentication. Tadayoshi Kohno

Authentication. Tadayoshi Kohno CSE 484 / CSE M 584 (Winter 2013) Authentication Tadayoshi Kohno Thanks to Vitaly Shmatikov, Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Bennet Yee, and many others for sample

More information

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm CIS 4360 Introduction to Computer Security Fall 2010 WITH ANSWERS in bold Name:.................................... Number:............ First Midterm Instructions This is a closed-book examination. Maximum

More information

Passwords. EJ Jung. slide 1

Passwords. EJ Jung. slide 1 Passwords EJ Jung slide 1 Basic Problem? How do you prove to someone that you are who you claim to be? Any system with access control must solve this problem slide 2 Many Ways to Prove Who You Are What

More information

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication)

Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) Attacking Your Two-Factor Authentication (PS: Use Two-Factor Authentication) 08 Jun 2017 K-LUG Technical Meeting Rochester, MN Presented by: Vi Grey Independent Security Researcher https://vigrey.com Who

More information

CSCE 548 Building Secure Software Entity Authentication. Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Entity Authentication. Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Entity Authentication Professor Lisa Luo Spring 2018 Previous Class Important Applications of Crypto User Authentication verify the identity based on something you know

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 13

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 13 CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 13 Announcements Talk today: 3:00 Wu & Chen Auditorium Boon Thau Loo "Declarative Networking: Extensible Networks with Declarative Queries"

More information

Outline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication

Outline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication Outline Security Handshake Pitfalls (Chapter 11 & 12.2) Login Only Authentication (One Way) Login i w/ Shared Secret One-way Public Key Lamport s Hash Mutual Authentication Shared Secret Public Keys Timestamps

More information

Topics. Authentication System. Passwords

Topics. Authentication System. Passwords Passwords Topics 1. Password Systems 2. Password Attacks 3. Mitigating Attacks 4. Graphical passwords 5. One-time passwords Authentication System A: set of authentication information information used by

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric

More information

SCRAM authentication Heikki Linnakangas / Pivotal

SCRAM authentication Heikki Linnakangas / Pivotal SCRAM authentication Heikki Linnakangas / Pivotal pg_hba.conf # TYPE DATABASE USER ADDRESS METHOD # "local" is for Unix domain socket connections only local all all trust # Use plaintext authentication

More information

Hashes, MACs & Passwords. Tom Chothia Computer Security Lecture 5

Hashes, MACs & Passwords. Tom Chothia Computer Security Lecture 5 Hashes, MACs & Passwords Tom Chothia Computer Security Lecture 5 Today s Lecture Hash functions: Generates a unique short code from a large file Uses of hashes MD5, SHA1, SHA2, SHA3 Message Authentication

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

TPM v.s. Embedded Board. James Y

TPM v.s. Embedded Board. James Y TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions

More information

Mike Pilkington. SANS Forensics and IR Summit June, 2011

Mike Pilkington. SANS Forensics and IR Summit June, 2011 Mike Pilkington SANS Forensics and IR Summit June, 2011 Since graduating from UT- for a large oil and gas services company Systems Admin, Network Admin, and Security Analyst My current role focuses on

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 15 February 29, 2012 CPSC 467b, Lecture 15 1/65 Message Digest / Cryptographic Hash Functions Hash Function Constructions Extending

More information

n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems

n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems Outline n Describe the CEH hacking methodology and system hacking steps n Describe methods used to gain access to systems n Describe methods used to escalate privileges Chapter #5: n Describe methods used

More information

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class 1.264 Lecture 27 Security protocols Symmetric cryptography Next class: Anderson chapter 10. Exercise due after class 1 Exercise: hotel keys What is the protocol? What attacks are possible? Copy Cut and

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control

More information

Exam Questions MA0-150

Exam Questions MA0-150 Exam Questions MA0-150 McAfee Certified Assessment Specialist- UH https://www.2passeasy.com/dumps/ma0-150/ 1.An attacker has compromised a Linux/Unix host and discovers a suspicious file called "password"

More information

Linux Systems Security. Access Control and Authentication NETS1028 Fall 2016

Linux Systems Security. Access Control and Authentication NETS1028 Fall 2016 Linux Systems Security Access Control and Authentication NETS1028 Fall 2016 Access Control Authenticating users is the act of trying to verify that a user is who they claim to be We generally rely on the

More information

User Authentication and Passwords

User Authentication and Passwords User Authentication and : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 31 October 2012 Y12S2L11, Steve/Courses/2012/s2/css322/lectures/passwords.tex,

More information

Undergraduate programme in Computer sciences

Undergraduate programme in Computer sciences What is authentication? Security Engineering MSc in Computer Science EIT Master on Security and Privacy Lecture 12 Authentication Massacci Fabio It is the process of verifying a claimed identity by r for

More information

CSCI 667: Concepts of Computer Security

CSCI 667: Concepts of Computer Security CSCI 667: Concepts of Computer Security Lecture 8 Prof. Adwait Nadkarni Derived from slides by William Enck, Micah Sherr, Patrick McDaniel and Peng Ning 1 2 Announcements Project Proposals due Tonight,

More information

Why bother? Default configurations Buffer overflows Authentication mechanisms Reverse engineering Questions?

Why bother? Default configurations Buffer overflows Authentication mechanisms Reverse engineering Questions? Jeroen van Beek 1 Why bother? Default configurations Buffer overflows Authentication mechanisms Reverse engineering Questions? 2 Inadequate OS and application security: Data abuse Stolen information Bandwidth

More information

SCRAM authentication Heikki Linnakangas / Pivotal

SCRAM authentication Heikki Linnakangas / Pivotal SCRAM authentication Heikki Linnakangas / Pivotal pg_hba.conf # TYPE DATABASE USER ADDRESS METHOD # "local" is for Unix domain socket connections only local all all trust # Use plaintext authentication

More information

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy Homework 3 Due: Monday, 11/28/2016 at 11:55pm PT Solution: Will be posted

More information

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Authentication EECE 412. Copyright Konstantin Beznosov

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Authentication EECE 412. Copyright Konstantin Beznosov T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Authentication EECE 412 Copyright 2004-2007 Konstantin Beznosov What is Authentication? Real-world and computer world examples? What is a result

More information

Chapter 5 Authentication and Basic Cryptography

Chapter 5 Authentication and Basic Cryptography Chapter 5 Authentication and Basic Cryptography Resource from : Chapter 8 & 11 Authentication Security+ Guide to Network Security Fundamentals, Third Edition 1 Dr.Sukchatri PRASOMSUK School of Information

More information

Authentication CS 136 Computer Security Peter Reiher January 22, 2008

Authentication CS 136 Computer Security Peter Reiher January 22, 2008 Authentication CS 136 Computer Security Peter Reiher January 22, 2008 Page 1 Outline Introduction Basic authentication mechanisms Authentication on a single machine Authentication across a network Page

More information

CS 111. Operating Systems Peter Reiher

CS 111. Operating Systems Peter Reiher Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources Operating Systems Peter Reiher Page 1 Outline Basic concepts in computer security Design principles for security

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

Operating systems and security - Overview

Operating systems and security - Overview Operating systems and security - Overview Protection in Operating systems Protected objects Protecting memory, files User authentication, especially passwords Trusted operating systems, security kernels,

More information

CYB 610 Project 1 Workspace Exercise

CYB 610 Project 1 Workspace Exercise CYB 610 Project 1 Workspace Exercise I. Project Overview Your deliverables for Project 1 are described below. You will submit your work at the end of Step 6 of Project 1 in your ELM classroom. 1. Non-Technical

More information

Authentication. Steven M. Bellovin September 26,

Authentication. Steven M. Bellovin September 26, Authentication Steven M. Bellovin September 26, 2009 1 Authentication Another trilogy: identification, authentication, authorization ACLs and the like are forms of authorization: what you re allowed to

More information

BTEC Level 3. Unit 32 Network System Security Password Authentication and Protection. Level 3 Unit 32 Network System Security

BTEC Level 3. Unit 32 Network System Security Password Authentication and Protection. Level 3 Unit 32 Network System Security BTEC Level 3 Unit 32 Network System Security Password Authentication and Protection Passwords Why are they important? Passwords are cheap to deploy, but also act as the first line of defense in a security

More information

Outline. V Computer Systems Organization II (Honors) (Introductory Operating Systems) Language-based Protection: Solution

Outline. V Computer Systems Organization II (Honors) (Introductory Operating Systems) Language-based Protection: Solution Outline V22.0202-001 Computer Systems Organization II (Honors) (Introductory Operating Systems) Lecture 21 Language-Based Protection Security April 29, 2002 Announcements Lab 6 due back on May 6th Final

More information

Why bother? Default configurations Buffer overflows Authentication mechanisms Reverse engineering Questions?

Why bother? Default configurations Buffer overflows Authentication mechanisms Reverse engineering Questions? Jeroen van Beek 1 Why bother? Default configurations Buffer overflows Authentication mechanisms Reverse engineering Questions? 2 Inadequate OS and application security: Data abuse Stolen information Bandwidth

More information

Authentication, Passwords. Robert H. Sloan

Authentication, Passwords. Robert H. Sloan Authentication, Passwords Robert H. Sloan authenticate verb [ trans. ] prove or show (something) to be true or genuine : they were invited to authenticate artifacts from the Italian Renaissance. [ intrans.

More information

Goals. Understand UNIX pw system. Understand Lamport s hash and its vulnerabilities. How it works How to attack

Goals. Understand UNIX pw system. Understand Lamport s hash and its vulnerabilities. How it works How to attack Last Updated: Nov 7, 2017 Goals Understand UNIX pw system How it works How to attack Understand Lamport s hash and its vulnerabilities History of UNIX passwords Originally the actual passwords were stored

More information

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem Why secure the OS? Operating System Security Works directly on the hardware but can be adapted during runtime Data and process are directly visible Application security can be circumvented from lower layers

More information

Check List: Linux Machines

Check List: Linux Machines Check List: Linux Machines High Level Install and maintain malware protection software o Install MalWare (Defender) o Install AntiVirus (Microsoft Security Essentials) Account Management o Remove guest

More information

CS System Security Mid-Semester Review

CS System Security Mid-Semester Review CS 356 - System Security Mid-Semester Review Fall 2013 Mid-Term Exam Thursday, 9:30-10:45 you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This is to

More information

Identification Schemes

Identification Schemes Identification Schemes Lecture Outline Identification schemes passwords one-time passwords challenge-response zero knowledge proof protocols Authentication Data source authentication (message authentication):

More information

Overview. Terminology. Password Storage

Overview. Terminology. Password Storage Class: CSG254 Network Security Team: Enigma (team 2) Kevin Kingsbury Tejas Parikh Tony Ryan Shenghan Zhang Assignment: PS3 Secure IM system Overview Our system uses a server to store the passwords, and

More information

Outline Key Management CS 239 Computer Security February 9, 2004

Outline Key Management CS 239 Computer Security February 9, 2004 Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your

More information

Jérôme Kerviel. Dang Thanh Binh

Jérôme Kerviel. Dang Thanh Binh Dang Thanh Binh Jérôme Kerviel Rogue trader, lost 4.9 billion Largest fraud in banking history at that time Worked in the compliance department of a French bank Defeated security at his bank by concealing

More information

Authentication Methods

Authentication Methods CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks

More information