The Authentication Jungle
An overview of all sorts of authentication technologies
Karol Babioch Security Engineer kbabioch@suse.de
The Authentication Jungle An overview of all sorts of authentication - - PowerPoint PPT Presentation
The Authentication Jungle An overview of all sorts of authentication technologies Karol Babioch Security Engineer kbabioch@suse.de New authentication standards ... 2 Some authentication technologies ... 3 - Authentication theory -
Karol Babioch Security Engineer kbabioch@suse.de
2
3
Karol Babioch Security Engineer kbabioch@suse.de
Karol Babioch Security Engineer kbabioch@suse.de
6
7
→ Should be difficult to clone
8
– Resiliency to guessing (brute force, online, offline) – Resiliency to phishing – Resiliency to theft – Resiliency to physical observation – Resiliency to internal observation – No trusted third parties – Explicit user-consent – Unlinkability
– Memorywise effortless – Scalable for users – Nothing to carry – Easy recovery from loss
– Cost per user – Server compatible – Browser compatible – Maturity – Non proprietary
9
Karol Babioch Security Engineer kbabioch@suse.de
Karol Babioch Security Engineer kbabioch@suse.de
12
13
14
– Less entropy than expected – Regular changes bad idea
15
16
17
– Single accounts – Whole domain
– Single-Sign-On & Federation
Karol Babioch Security Engineer kbabioch@suse.de
19
– Easy to calculate the hash value value for any given data – Computationally difficult to calculate an input with a given hash value – Unlikely that two (slightly) different messages have the same hash value
– SHA1 (e.g. git) – SHA2 (256, 384, 512) – SHA3 – MD5 – MD4
– Message integrity – Digital signatures – Authentication
20
21
Karol Babioch Security Engineer kbabioch@suse.de
23
– SMS – Smart card (chipTAN) – (Smartphone) apps – Different devices (Notifications from Google on Android, etc.) – Hardware tokens (RSA SecurID, YubiKey, U2F, etc.)
24
25
26
27
28
29
30
Karol Babioch Security Engineer kbabioch@suse.de
32
– AES – DES, 3DES – Blowfish – Twofish – RC4
– ECB – CBC – OFB – XTS
33
– Public – Private
– RSA – DH (Diffie Hellman) – ECC (Elliptic Curve Cryptography)
– Encryption – Authentication – Key agreement – Signatures – Verification
34
Karol Babioch Security Engineer kbabioch@suse.de
36
37
38
39
40
– Valid before – Valid after – Common name – Public key – Issuer – ...
41
Karol Babioch Security Engineer kbabioch@suse.de
43
– Encryption – Signatures / Verification – Authentication
– Everybody can create key pairs – Distribution via keyservers – Authentication via keysigning
44
45
46
– Snowden vs. Glenn Greenwald
→ In daily communication: Utterly broken (in my opinion)
– Can be part of supply chain security – Software distribution
Karol Babioch Security Engineer kbabioch@suse.de
48
– Nothing to loose for service providers!
49
– Generates and delivers JavaScript
– Processes JavaScript → Forwards request to authenticator – Acts as “proxy” between Authenticator and RP
– hardware token (USB, Bluetooth, NFC, etc.) – Software / operating system (e.g. Windows Hello (?))
50
– Create and register new public key
– Use previously registered public key to sign a challenge
51
52
53
54
– Browser support – Users – Servers & application
– RSA: PKCS1v1.5 padding – ECC: ECDAA
55
Karol Babioch Security Engineer kbabioch@suse.de
Karol Babioch Security Engineer kbabioch@suse.de
Karol Babioch Security Engineer kbabioch@suse.de
59
– Containing (among other things) user information
– Distinguished Name (DN) → Username – Bind → Authentication
60
61
Karol Babioch Security Engineer kbabioch@suse.de
Karol Babioch Security Engineer kbabioch@suse.de
69
– Ticket-granting ticket (TGT, “master” ticket) can be obtained from central server (KDC) – TGT to get any additional tickets for services – Service tickets for individual services
70
71
Karol Babioch Security Engineer kbabioch@suse.de
73
– Can use all sorts of mechanisms: Passwords, IPs, Kerberos, etc.
– Does not care how IdP performs authentication, just “consumes” assertions
74
75
76
77
– HTTP Redirect, HTTP POST, HTTP Artifact, SOAP, PAOS
– Web Browser SSO Profile – Enhanced Client or Proxy (ECP) Profile – Single Logout Profile
– Description of URL endpoints, signing & encryption keys, etc.
78
79
Karol Babioch Security Engineer kbabioch@suse.de
81
– Relying Party (RP) – Identity Provider (IdP)
82
83
84
85
86
87
88
89
90
Karol Babioch Security Engineer kbabioch@suse.de
92
– Annoy / blame service providers that do not yet support it
– teach your friends and family how to use them