User authentication Flashcards
Identification
Correctly identifying a user or entity
How a user claims identity to the system
(User authentication) Establishing the validity of the claim
Digital User Auth (NIST SP-800) establish confidence in user identities that are presented electronically to an information system.
-> base for access control and user accountability
-> ensuring authenticity lets admins to set permissions and audit a users activity
NIST 800-63 Guideline
Enrollment and Identity Proofing
IAL1: No requirement to a specific real-life identity. Any attributes +authentication process are self-asserted.
IAL2: Supports real-world existence, claimed identify and verifies applicant is associated with real-world identity. Adds remote or physical identity proofing
IAL3: Physical presence for identity proofing.
Authentication Architectural Model
- An applicant applies to a registration authority (RA) to become a subscriber of a credential service provider (CSP).
RA is a trusted entity vouches identity to the CSP. - CSP engages in an exchange with the subscriber
CSP issues electronic credential to the subscriber
credential is a data structure that authoritateively binds an identity and added attributes to a token possessed by the subscriber and can be verified when presented in an authentication transaction.
It could be an encryption key or password
Token can be issued by CSP, generated by subscriber or provided by third party - User is registered.
=Authentication process= - The claimant want to be authenticated by a verifier through an authentication protocol showing the veryfying token
- Verifier confirms with CSP that claimant is the subscriber present in credentials
- Verifier passes on an assertion about the identity of the subscriber to the RP.
Includes identity information about a subscriber, name, and id or other attributes. - RP uses authenticated information to make access control or authorization decisions
It must prevent impersonation and uncontrolled transferability
Means of Authentication
Something the individual knows: password, PIN, answers to questions
Something the individual possessess: keycards, smart cards physical keys (token)
Something the individual is (static biometric): fingerprint, retina, face
Something the individual is (dynamic biometric): voice pattern, handwriting characteristics, typing rythm.
Multifactor authentication
Using a combination of more than one means of authentication
The strength increases based on the n number of means combined
NIST 800-63 - Assurance Level
Degree of confidence in vetting process + degree of confidence claimant is subscriber
L1: Little or no confidence -> credentials provided
L2: Some confidence -> credentials through a secured channel
L3: High confidence -> restricted services high value, 2 ind authentication techniques
L4: Very high confidence -> restricted services highest value, MFA and in-person registration
Impact: low, moderate and high
Risk: low, moderate and high
Potential Impact Categories for Authentication
- Incovenience, distress, or damage to standing or reputation
- Financial loss or org. liability
- Harm to org programs or interests
- Unauth release of sensitive information
- Personal safety
- Civil or criminal violations
If low -> L1, 2 or 3 for harm, unauth release of information and personal safety
If Mod -> L2 or L3, L4 if it’s personal safety
if High -> L4 assurance level
Password-Based authentication
claimant provides ID + password
- has access to system
- has certain privileges
- Discretionary Access Control
Password Auth - Attack - Offline Dictionary
If password is saved as a one-way hash in DB
Attack:
attacker bypasses controls and checks hashes against DB
Countermeasure:
- Controls to prevent unauth access
- Intrusion detection to identify a compromise
- Rapid reissuance of passwords
Password Auth - Attack - Specific Account / Guessing against single user
Attack:
attacker targets an account and tries to guess its password. (of a single user by using information retrieved)
Countermeasures:
- Lockout mechanism after a number of failed login. Up to 5 intents
Countermeasures (Single user):
- User training in password creation, and length of time until password change
Password Auth - Attack - Popular Password
Attack:
attacker uses popular password to guess against a list of IDs
Countermeasures:
- Inhibit common passwords
- Scan IPs of authentication requests and client cookies for submission patterns
Password Auth - Attack - Workstation Hijacking
Attack:
Logged-in workstation unattended
Countermeasure:
- Automatically lock workstation after period of inactivity
- Intrusion detection schemes changes in user behavior
Password Auth - Attack - Exploiting user mistakes
Attack:
Users might:
- write down the password
- share it without security controls
- use a default system password
- give it in a social engineering attack
Countermeasures:
- User training
- Intrusion detection
- Simpler passwords with other auth mechanism
Password Auth - Attack - Exploiting multiple password use
Attack:
Password shared through different devices in a network increases attack surface
Countermeasures:
Policy that forbids reusing same password for different devices
Password Auth - Attack - Electronic Monitoring
Attack:
Password sent through network is vulnerable to eavesdropping
Countermeasure:
Advanced encryption