44
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin © 2008 Course Technology

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Embed Size (px)

Citation preview

Page 1: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2nd ed.

10Authenticating Users

By Whitman, Mattord, & Austin © 2008 Course Technology

Page 2: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Learning Objectives

Explain why authentication is a critical aspect of network security

Explain why firewalls authenticate and how they identify users

Describe user, client, and session authentication List the advantages and disadvantages of popular

centralized authentication systems Discuss the potential weaknesses of password

security systems Discuss the use of password security tools Describe common authentication protocols used by

firewalls Slide 2Firewalls & Network Security, 2nd ed. - Chapter 10

Page 3: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

The Authentication Process in General

The act of identifying users and providing network services to them based on their identity

Two forms– Local authentication

– Centralized authentication service (often uses two-factor authentication)

Slide 3Firewalls & Network Security, 2nd ed. - Chapter 10

Page 4: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

How Firewalls Implement the Authentication Process

1. Client makes request to access a resource2. Firewall intercepts the request and prompts

the user for name and password3. User submits information to firewall4. User is authenticated5. Request is checked against firewall’s rule

base6. If request matches existing allow rule, user is

granted access7. User accesses desired resources

Slide 4Firewalls & Network Security, 2nd ed. - Chapter 10

Page 5: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

How Firewalls Implement the Authentication Process (continued)

Slide 5Firewalls & Network Security, 2nd ed. - Chapter 10

Page 6: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Firewall Authentication Methods

User authentication Client authentication Session authentication

Slide 6Firewalls & Network Security, 2nd ed. - Chapter 10

Page 7: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

User Authentication

Basic authentication; user supplies username and password to access networked resources

Users who need to legitimately access your internal servers must be added to your access control lists (ACLs)

Slide 7Firewalls & Network Security, 2nd ed. - Chapter 10

Page 8: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

User Authentication (continued)

Slide 8Firewalls & Network Security, 2nd ed. - Chapter 10

Page 9: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Client Authentication

Same as user authentication but with additional time limit or usage limit restrictions

When configuring, set up one of two types of authentication systems– Standard sign-on system

– Specific sign-on system

Slide 9Firewalls & Network Security, 2nd ed. - Chapter 10

Page 10: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Client Authentication (continued)

Slide 10Firewalls & Network Security, 2nd ed. - Chapter 10

Page 11: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Session Authentication

Required any time the client establishes a session with a server of other networked resource

Slide 11Firewalls & Network Security, 2nd ed. - Chapter 10

Page 12: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Comparison of Authentication Methods

Slide 12Firewalls & Network Security, 2nd ed. - Chapter 10

Page 13: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Centralized Authentication

Centralized server maintains all authorizations for users regardless of where user is located and how user connects to network

Most common methods– Kerberos

– TACACS+ (Terminal Access Controller Access Control System)

– RADIUS (Remote Authentication Dial-In User Service)

Slide 13Firewalls & Network Security, 2nd ed. - Chapter 10

Page 14: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Process of Centralized Authentication

Slide 14Firewalls & Network Security, 2nd ed. - Chapter 10

Page 15: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Kerberos

Provides authentication and encryption through standard clients and servers

Uses a Key Distribution Center (KDC) to issue tickets to those who want access to resources

Used internally on Windows 2000/XP Advantages

– Passwords are not stored on the system– Widely used in UNIX environment; enables

authentication across operating systems

Slide 15Firewalls & Network Security, 2nd ed. - Chapter 10

Page 16: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Kerberos Authentication

Slide 16Firewalls & Network Security, 2nd ed. - Chapter 10

Page 17: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

TACACS+

Latest and strongest version of a set of authentication protocols for dial-up access (Cisco Systems)

Provides AAA services– Authentication– Authorization– Auditing

Uses MD5 algorithm to encrypt data

Slide 17Firewalls & Network Security, 2nd ed. - Chapter 10

Page 18: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

RADIUS

Centralized dial-in authentication service that uses UDP

Transmits authentication packets unencrypted across the network

Provides lower level of security than TACACS+ but more widely supported

Slide 18Firewalls & Network Security, 2nd ed. - Chapter 10

Page 19: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

TACACS+ and RADIUS Compared

Strength of security Filtering characteristics Proxy characteristics NAT characteristics

Slide 19Firewalls & Network Security, 2nd ed. - Chapter 10

Page 20: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Strength of Security

Slide 20Firewalls & Network Security, 2nd ed. - Chapter 10

Page 21: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Filtering Characteristics

Slide 21Firewalls & Network Security, 2nd ed. - Chapter 10

Page 22: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Proxy Characteristics

RADIUS– Doesn’t work with generic proxy systems, but a

RADIUS server can function as a proxy server TACACS+

– Works with generic proxy systems

Slide 22Firewalls & Network Security, 2nd ed. - Chapter 10

Page 23: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

NAT Characteristics

RADIUS– Doesn’t work with NAT

TACACS+– Should work through NAT systems

Slide 23Firewalls & Network Security, 2nd ed. - Chapter 10

Page 24: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Password Security Issues

Passwords that can be cracked (accessed by an unauthorized user)

Password vulnerabilities Lax security habits

Slide 24Firewalls & Network Security, 2nd ed. - Chapter 10

Page 25: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Passwords That Can Be Cracked

Ways to crack passwords– Find a way to authenticate without knowing the

password– Uncover password from system that holds it– Guess the password

To avoid the issue– Protect passwords effectively– Observe security habits

Slide 25Firewalls & Network Security, 2nd ed. - Chapter 10

Page 26: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Password Vulnerabilities

Built-in vulnerabilities– Often easy to guess– Often stored visibly– Social engineering

To avoid the issues– Choose complicated passwords– Memorize passwords– Never give passwords out to anyone

Slide 26Firewalls & Network Security, 2nd ed. - Chapter 10

Page 27: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Lax Security Habits

To maintain some level of integrity, draw up a formal Memorandum of Understanding (MOU)

Slide 27Firewalls & Network Security, 2nd ed. - Chapter 10

Page 28: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Password Security Tools

One-time password software Shadow password system

Slide 28Firewalls & Network Security, 2nd ed. - Chapter 10

Page 29: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

One-Time Password Software

Password is generated using a secret key Password is used only once, when the user

authenticates Different passwords are used for each

authentication session Types

– Challenge-response passwords– Password list passwords

Slide 29Firewalls & Network Security, 2nd ed. - Chapter 10

Page 30: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Shadow Password System

A feature of Linux that stores passwords in another file that has restricted access

Passwords are stored only after being encrypted by a randomly generated value and an encoding formula

Slide 30Firewalls & Network Security, 2nd ed. - Chapter 10

Page 31: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Other Authentication Systems

Single-password systems One-time password systems Certificate-based authentication 802.1x Wi-Fi authentication

Slide 31Firewalls & Network Security, 2nd ed. - Chapter 10

Page 32: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Single-Password Systems

Operating system password Internal firewall password

Slide 32Firewalls & Network Security, 2nd ed. - Chapter 10

Page 33: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

One-Time Password Systems

Single Key (S/Key) SecurID Axent Pathways Defender

Slide 33Firewalls & Network Security, 2nd ed. - Chapter 10

Page 34: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Single Key (S/Key)

Uses multiple-word rather than single word passwords– User specifies single-word password and the

number of times it is to be encrypted– Password is processed by a hash function n

times; resulting encrypted passwords are stored on the server

Never stores original password on the server

Slide 34Firewalls & Network Security, 2nd ed. - Chapter 10

Page 35: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

SecurID

Uses two-factor authentication– Physical object

– Piece of knowledge Most frequently used one-time password

solution with FireWall-1

Slide 35Firewalls & Network Security, 2nd ed. - Chapter 10

Page 36: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

SecurID Tokens

Slide 36Firewalls & Network Security, 2nd ed. - Chapter 10

Page 37: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Axent Pathways Defender

Uses two-factor authentication and a challenge-response system

Slide 37Firewalls & Network Security, 2nd ed. - Chapter 10

Page 38: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Certificate-Based Authentication

FireWall-1 supports the use of digital certificates to authenticate users

Organization sets up a public key infrastructure (PKI) that generates keys to users– User receives a code (public key) that is

generated using the server’s private key and uses the public key to send encrypted information to the server

– Server receives the public key and can decrypt the information using its private key

Slide 38Firewalls & Network Security, 2nd ed. - Chapter 10

Page 39: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

802.1x Wi-Fi Authentication

Supports wireless Ethernet connections Not supported by FireWall-1 802.1x protocol provides for authentication of

users on wireless networks Wi-Fi uses Extensible Authentication Protocol

(EAP)

Slide 39Firewalls & Network Security, 2nd ed. - Chapter 10

Page 40: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Wireless Authentication

Slide 40Firewalls & Network Security, 2nd ed. - Chapter 10

Page 41: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Chapter Summary

Overview of authentication and its importance to network security

How and why firewalls perform authentication services

Types of authentication performed by firewalls– User

– Client

– Session

Slide 41Firewalls & Network Security, 2nd ed. - Chapter 10

Page 42: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Chapter Summary (continued)

Generally, users supply:– Something they have (such as a smart card) or– Something they know (such as a password) or– Both

Latest authentication systems measure or evaluate a physical attribute, such as a fingerprint or voiceprint

Slide 42Firewalls & Network Security, 2nd ed. - Chapter 10

Page 43: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Chapter Summary (continued)

In a centralized authentication system:– Firewall works with an authentication server– Authentication server handles

• Username and password maintenance/generation• Login requests• Auditing

Examples of centralized authentication systems:– Kerberos– TACACS+– RADIUS

Firewalls & Network Security, 2nd ed. - Chapter 10 Slide 43

Page 44: FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology

Chapter Summary (continued)

Passwords– Important part of virtually every authentication

system– Take one of two general forms:

• Single-word– User password compared against database of

passwords; access granted if match is made– Vulnerable to ability of hackers to determine

passwords, to user error, and to bad security habits• One-time passwords

– Generated dynamically each time user attempts to log on to network

– Secret key used to generate single- or multiple-word password

Firewalls & Network Security, 2nd ed. - Chapter 10 Slide 44