Chapter 4: Key Distribution and User Authentication Flashcards

Key Distribution and User Authentication

1
Q

How does the RFC 4949 define user authentication?

A

It is the process of verifying an identity claimed by or for a system entity and it consists of two steps.

  1. Identification: an identifier is presented to the system
  2. Verification/authentication: authentication information is presented or generated to corroborate the binding between the entity and the identifier.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what 4 ways can a secret key be shared?

A
  1. A key could be selected by A and physically delivered to B.
  2. A third party could select the key and physically deliver it to A and B.
  3. If A and B have previously and recently used a key, one party could transmit the new key to the other, using the old key to encrypt the new key.
  4. If A and B each have an encrypted connection to a third party C, C could deliver a key on the encrypted links to A and B.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a permanent key?

A

It is used between entities for the purpose of distributing session keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a key distribution center (KDC)?

A

It provides a session key when communication permission has been granted between two systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is kerberos?

A

It is a key distribution and user authentication service developed at MIT.

It relies exclusively on symmetric encryption.

It provides a centralised authentication server whose function is to authenticate users to servers and servers to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What environmental shortcomings does Kerberos v4 have and how have they been addressed in v5?

A
  1. Encryption system dependence: It requires the use of DES. V5, can use any encryption technique.
  2. Internet protocol dependence: Requires the use of Internet Protocol (IP) addresses. V5, any network address can be used.
  3. Message byte ordering: the sender of a message employs a byte ordering of their choosing. It does not follow established conventions. V5 uses ASN.1, and BER.
  4. Ticket lifetime: the lifetime is limited to ca 21 hours, due to how it is encoded. V5, tickets will have a start time and end time.
  5. Authentication forwarding: Does not allow credentials to be forwarded to other hosts and used by other clients. V5 does.
  6. Inter-realm authentication: interoperability among N realms requires on the order of N^2 Kerberos-to-Kerberos relationships. V5 supports a method that requires fewer relationships.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What technical deficiencies does v4 have?

A
  1. Double encryption: Tickets are encrypted twice, once with the secret key of the target server and once with a secret key known to the client. The 2nd one is redundant.
  2. PSBC encryption: Encryption makes use of a non-standard mode of DES known as propagating cipher block chaining mode. This mode is vulnerable to an attack that involves the interchange of ciphertext blocks.
  3. Session key: The same session key may be used repeatedly to gain service from a server, putting it at risk of a replay attack.
  4. Password attacks: a vulnerability in both versions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the X.509 standard?

A

A universally accepted scheme for formatting public-key certificates. It is used in most network security applications (IPsec, SSL, S/MIME).

It is based on the use of public-key cryptography and digital signatures. It does not dictate the use of a specific DSA nor specific hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What characteristics does a user certificate issued by a CA have?

A
  1. Any user with access to the public key of the CA can verify the user public key that was certified.
  2. No party other than the CA can modify the certificate without being detected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a certificate revocation list?

A

A list containing all revoked but not expired certificates. Each entry in the list consists of the serial number of the revoked certificate and revocation date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is federated identity management?

A

A relatively new concept that deals with the use of a common identity management scheme across multiple enterprises and numerous applications and supporting many thousands, even millions of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is identity management?

A

The what: a centralised, automated approach to provide enterprise-wide access to resources by employees and other authorised individuals.

The Focus: defining an identity for each user, associating attributes with the identity, enforcing a means by which a user can verify their identity.

The Central concept: the use of SSO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 8 typical services provided by a federated identity management system?

A

Point of contact: authentication of users and management of user/server sessions.

SSO protocol services: provides a vendor-neutral security token service that supports SSO.

Trust services: A trust relationship it represented by the security tokens used to exchange information about a user, the cryptographic information used to protect the security tokens, and (optionally) the identity mapping rules applies to the information contained within the token.

Key services: management of keys and certificates.

Identity services: provides the interface to local data stores for identity-related information management.

Authorisation: granting access based on authentication.

Provisioning: account creation and registration. Establishment of access rights.

Management: services related to runtime configuration and deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an identity provider?

A

It associates authentication information with a principal, and attributes and 1+ identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the goal of identity federation?

A

To facilitate the sharing of digital identities so that a user can be authenticated a single time and then access applications and resources across multiple domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the challenge with federated identity management?

A

To integrate multiple technologies, standards and services to provide a secure, user-friendly utility.

17
Q

What are 4 key standards that federated id management makes use of?

A
  • XML
  • SOAP
  • WS-security
  • SAML