Upload
mark-cross
View
213
Download
0
Embed Size (px)
Citation preview
Strong Authentication Project
CD/DCD/Computer Security TeamFermi National Accelerator Laboratory
Mark [email protected]/630-840-2965
Matt [email protected]/630-840-3461
http://www.fnal.gov/cd/security/strongauth/
Philosophy
"Scientific thinking and invention flourish best where people are allowed to communicate as much as possible unhampered.”
-- Enrico Fermi
Why Stronger Authentication? Reduce effort spent on intrusions &
recovery; Regulatory climate is demanding increased
attention to access controls; Management has agreed with the goals
outlined in SLCCC-TWG white paper: Alternatives to Reusable Passwords: Robust Authentication
Requirements Acceptable improvement in access controls:
– must be adaptable to:• changes in system security requirements;• new threats;• changes in computing styles;• network connectivity;• security options;
– must allow for trust relationships with other secure domains or realms;
– allow for some form of access by trusted individuals outside of trusted domains;
Requirements Acceptable to the user community. There
will be some increased inconvenience, but...– A single identifier can authorize access to
multiple systems;– Fewer account name & password combinations
to remember, maybe only one! Run II schedule:
– Implementation may be staged but must offer meaningful improvement for Collider Run-II (i.e. mid-next year);
Project Goals
Primary -– Prevent network disclosure of passwords.
Secondary -– Provide a single-signon environment.– Integrate AFS accounts & systems.– Simplify account management, especially
terminations - take this burden off the system administrators.
– Enforce password policies.
Strong Authentication - System Design
Four Realms Strengthened Realm
– Kerberos authentication required for all network logins.
Untrusted Realm– Hosts, on- or off-site, from which direct logins
to Strengthened realm are not permitted. Trusted Realm
– An outside Kerberos realm with which we cross-authenticate.
Portal– Gateway between Untrusted and Strengthened.
Kerberos Kerberos version 5 is a protocol for
authentication of users and services (collectively called principals.)– Created at MIT, circa 1987.– Designed for use over insecure networks.– Still under active development.– Several commercial products are built on it.– Many Universities and Labs use it.
AFS uses the Kerberos version 4 protocol. DCE uses Kerberos 5.
Enforcing Password Security To avoid exposing Kerberos passwords,
non-Kerberos network logins must be replaced with Kerberos - initial tickets must be obtained locally!– Easily configured.– May be verified by network scan.– Anonymous FTP is still allowed.
Password policies (dictionary check, aging, quality) are enforced by the master KDC.
Portal
Provides authentication for users who lack Kerberos software or secure network channels, and obtains their initial tickets.– Hardware tokens (CryptoCard)– One-time passwords (S/Key)
Untrusted to untrusted
Untrusted
Untrusted
Strengthened to untrusted
Strengthened
Untrusted
Strengthened to untrusted
Strengthened to strengthened
Strengthened
Strengthened
Key DistributionCenter
Untrusted to strengthened
Untrusted
Strengthened
Key DistributionCenter
Pilot Project
OSS Department Build Cluster & CDF Run II Analysis Prototype:– Interim user, developer documentation;– Interim libraries & API’s for required OS’s &
languages;– Interim kerberos principals, hw tokens;– Standard MIT distribution for required OS’s +
specific local applications;– 32 systems
Fin...