integrating legacy user authentication with hip
play

Integrating Legacy User Authentication with HIP Jani Hautakorpi - PowerPoint PPT Presentation

T-110.557 Research Seminar on Telecommunications Software Integrating Legacy User Authentication with HIP Jani Hautakorpi (Jani.Hautakorpi@hut.fi) 1 / 11 Contents HIP base exchange Selected legacy user authentication mechanisms:


  1. T-110.557 Research Seminar on Telecommunications Software Integrating Legacy User Authentication with HIP Jani Hautakorpi (Jani.Hautakorpi@hut.fi) 1 / 11

  2. Contents ● HIP base exchange ● Selected legacy user authentication mechanisms: – Digest Access Authentication – EAP (Extended Authentication Protocol) – XAuth (Extended Authentication within IKE) ● Proposal on how to integrate legacy user authentication with HIP ● Real-life scenario 2 / 11

  3. HIP Base Exchange Initiator Responder I1 : trigger exchange select pre-computed R1 R1 : puzzle, D-H, key, sig check sig remain stateless solve puzzle I2 : solution, D-H, {key}, sig check cookie compute D-H check puzzle check sig R2 : sig check sig compute D-H 3 / 11

  4. Digest Access Authentication ● Originally developed for HTTP ● Currently used e.g. with SIP ● Uses challenge / response paradigm: – Challenge: nonce value (hexadesimal data) – Response: checksum from username, password, requested URI, ... ● Verifies that both parties know the shared secret ● Text-based mechanism 4 / 11

  5. EAP ● Originally designed for environment, where IP connectivity was not available ● Today, used also on top of UDP and TCP ● Uses challenge / response paradigm ● Defines e.g. terms: backend authentication server, EAP server and pass-through agent ● Supports many authentication mechanisms ● EAP can be encapsulated either to RADIUS or to DIAMETER packets 5 / 11

  6. XAuth ● Was an attempt to provide legacy user authentication within IKE ● Just an extension to IKE, didn't affect to IKE itself ● Uses secure ISAKMP messages, so transmitted credential are encrypted ● ISAKMP is a binary protocol ● Ability to periodically authenticate users 6 / 11

  7. Authentication Proposal for HIP (1/3) ● At the present, HIP authenticates only host ● Some fundamental ideas behind the proposal: – HIP's puzzle mechanism must be preserved – Users could be logically bound to SAs – Design should be as simple as possible – Adequate level of security for most use cases – Mechanism should be effective (RTT- & time-wise) ● Proposal is a high-level proposal, no bit-level issues discussed 7 / 11

  8. Authentication Proposal for HIP (2/3) Initiator Responder I1 : challenge/response trigger prepare challenge R1 : convey challenge optional RADI- nonce, token challenge US/DIAMETER prepare response I2 : convey response username, H(username, password, token response, nonce, I's HIT, R's HIT) check response after HIP related checks R2 : convey result boolean result code optional RADI- US/DIAMETER check result 8 / 11

  9. Authentication Proposal for HIP (3/3) ● Key features: – Incorporated to HIP base exchange – Uses challenge/response mechanism – Only two-factor authentication allowed – Possibility to use backend authentication servers – Approximately host-wide ACLs can be deployed – Reliable log data can be produced – User authentication does not use asymmetric cryptography 9 / 11

  10. Real-life Scenario 1. DNS ● Resilient to the attacks query / Client Compromised response that has been directed [initiator] DNS server toward DNS ● Attacker has hacked a 2. HIP with legacy aut- DNS server hentication – HI, HIT and IP of the real server has been Real server [responder] changed Fake server [attacker] service ● Attacker cannot get user's credentials 10 / 11

  11. Questions, comments? 11 / 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend