3 Flashcards

1
Q

def authN e schema authN

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authN factors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

generic authN protocol e problemi generali

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

password based authN

A

pwd sniffing, MITM, pwd captured via server spoofing o phishing, pwd duplication, attacchi contro db, crypto function invecchiate, pwd guessing offline, pwd enumeration (main usare dictionary words)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

dictionary attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

rainbow table

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

salt

A

{id,salt,salted hash} , permette di usare stessa pwd su più server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

strong authN

A

no formal definition, ce ne sono varie, mfa con authenticator indipendenti e diversi, tecnica è strong/weak in base a threat a cui deve resistere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

challenge-response authN

A

f non invertivile , challenge deve essere nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

symmetric cra

A

problema pwd storata in chiaro a verifier ->scram (channel binding e mutual authN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

mutual symmetric CRA e relativo attacco

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

gsm

A

A3 authN , A5 stream cypher, A8 per generazione chiave di sessione -> debole funzione comp128 (clonabile sim)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

asymm cra

A

implementa peer authN,verifier non stora nessun segreto, lento (pki issues), problema integrità chiavi pubbliche

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

otp

A

come vengono generate? (device lento/insicuro vs veloce/sicuro)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

s/key system

A

mitm possibile , server authN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

generazione pwds s/key

17
Q

totp

A

devono essere sincronizzati, tempo diviso in slot (perchè?) , una run per slot, vengono considerati anche t+1 e t-1, attacchi di desincronizzazione (fake ntp, femtocell)

18
Q

rsa secure id

A

es totp, 2 fattori (knowledge e ownership)
2 modi (con o senza tastierino)

19
Q

eotp

A

più run possibili in poco tempo, vengono considerati anche c+1,c+2, potrei aver premuto inavvertitamente il bottone
precomputazione possibile a client e server (non me lo devo portare dietro)

20
Q

ootp

A

push over tls meglio di sms(voip), devo comunque comunicare pwd (no authN factor)

21
Q

authn of humain being

22
Q

tecniche biometriche e problemi

23
Q

kerberos

A

basato su ttp (truste 3rd party), usato per non http, pwd mai trasmessa, client authN obbligatoria, server opzionale
ticket usati per autenticare un client a un server, encryptati con la chiave del target server, bound to ip address of client

24
Q

kerberos funzioni di versioni recenti

A

extended ticket timelife, inter realm-authN, , ticket forwardable e extensibili, algo flexibility, pre-authN per evitare pwd enumeration e dictionary atk,as_req con pk crypto

25
Q

sso

A

unica autenticazione x accedere a + servizi o sistemi , fictious/integral sso

26
Q

oath

A

hotp hmac-otp nasato su counter o tempo, obiettivo è interoperability tra più sistemi di autentivazione

27
Q

fido

A

make the user experience in authN simple
biometric authN (no pwd), 2-factor authN
biometric mai lascia user device (privacy)
asymm challenge

28
Q

fido registration

A

no x.509 cert

29
Q

fido login

30
Q

fido security

A

solo x quella sfida solo x quel sito, new key pair every registration (no likability among different services usati da user), no phishing because authN response can’t be reused: (it’s a signature over various data, including the RP identity),there is no limit because private keys are not stored in the
authenticator but recomputed as needed based on an
internal secret and RP identity

31
Q

fido 2.0

A

roaming authenticator