17
Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka [email protected]/630-840-2965 Matt Crawford [email protected]/630-840-3461 http://www.fnal.gov/cd/security/strongauth/

Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka [email protected]/630-840-2965 Matt Crawford

Embed Size (px)

Citation preview

Page 1: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Strong Authentication Project

CD/DCD/Computer Security TeamFermi National Accelerator Laboratory

Mark [email protected]/630-840-2965

Matt [email protected]/630-840-3461

http://www.fnal.gov/cd/security/strongauth/

Page 2: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Philosophy

"Scientific thinking and invention flourish best where people are allowed to communicate as much as possible unhampered.”

-- Enrico Fermi

Page 3: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Why Stronger Authentication? Reduce effort spent on intrusions &

recovery; Regulatory climate is demanding increased

attention to access controls; Management has agreed with the goals

outlined in SLCCC-TWG white paper: Alternatives to Reusable Passwords: Robust Authentication

Page 4: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Requirements Acceptable improvement in access controls:

– must be adaptable to:• changes in system security requirements;• new threats;• changes in computing styles;• network connectivity;• security options;

– must allow for trust relationships with other secure domains or realms;

– allow for some form of access by trusted individuals outside of trusted domains;

Page 5: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Requirements Acceptable to the user community. There

will be some increased inconvenience, but...– A single identifier can authorize access to

multiple systems;– Fewer account name & password combinations

to remember, maybe only one! Run II schedule:

– Implementation may be staged but must offer meaningful improvement for Collider Run-II (i.e. mid-next year);

Page 6: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Project Goals

Primary -– Prevent network disclosure of passwords.

Secondary -– Provide a single-signon environment.– Integrate AFS accounts & systems.– Simplify account management, especially

terminations - take this burden off the system administrators.

– Enforce password policies.

Page 7: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Strong Authentication - System Design

Page 8: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Four Realms Strengthened Realm

– Kerberos authentication required for all network logins.

Untrusted Realm– Hosts, on- or off-site, from which direct logins

to Strengthened realm are not permitted. Trusted Realm

– An outside Kerberos realm with which we cross-authenticate.

Portal– Gateway between Untrusted and Strengthened.

Page 9: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Kerberos Kerberos version 5 is a protocol for

authentication of users and services (collectively called principals.)– Created at MIT, circa 1987.– Designed for use over insecure networks.– Still under active development.– Several commercial products are built on it.– Many Universities and Labs use it.

AFS uses the Kerberos version 4 protocol. DCE uses Kerberos 5.

Page 10: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Enforcing Password Security To avoid exposing Kerberos passwords,

non-Kerberos network logins must be replaced with Kerberos - initial tickets must be obtained locally!– Easily configured.– May be verified by network scan.– Anonymous FTP is still allowed.

Password policies (dictionary check, aging, quality) are enforced by the master KDC.

Page 11: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Portal

Provides authentication for users who lack Kerberos software or secure network channels, and obtains their initial tickets.– Hardware tokens (CryptoCard)– One-time passwords (S/Key)

Page 12: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Untrusted to untrusted

Untrusted

Untrusted

Page 13: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Strengthened to untrusted

Strengthened

Untrusted

Strengthened to untrusted

Page 14: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Strengthened to strengthened

Strengthened

Strengthened

Key DistributionCenter

Page 15: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Untrusted to strengthened

Untrusted

Strengthened

Key DistributionCenter

Page 16: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Pilot Project

OSS Department Build Cluster & CDF Run II Analysis Prototype:– Interim user, developer documentation;– Interim libraries & API’s for required OS’s &

languages;– Interim kerberos principals, hw tokens;– Standard MIT distribution for required OS’s +

specific local applications;– 32 systems

Page 17: Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka kaletka@fnal.gov/630-840-2965 Matt Crawford

Fin...