3 factors of fail sec360 5-15-13

48
BARRY CAPLIN 3 FACTORS OF F AIL WED. MAY 15, 2013, 2:35P

description

Passwords weakness has been in the news again lately. But we have known for some time that passwords alone are not a good authentication or access control mechanism. Strong and practical authentication is very challenging. There are “strong” schemes, but they often don’t work well for users. Security practitioners are familiar with the 3 factors of authentication: something you know; something you have, and; something you are. Each of these have fundamental flaws. I like to think of them as: something you forgot; something you lost, and; something you were! We will take a look at the current state of authentication, examine weaknesses in authentication factors, introduce the fourth factor of authentication and consider some solutions.

Transcript of 3 factors of fail sec360 5-15-13

Page 1: 3 factors of fail   sec360 5-15-13

BARRY CAPL

IN

3 FACTO

RS OF

FAIL

WED. M

AY 1

5, 2013, 2

:35P

Page 2: 3 factors of fail   sec360 5-15-13

WELCOME TO SECURE360 2013

Don’t forget to pick up your Certificate of Attendance at the end of each day.

Please complete the Session Survey front and back, and leave it on your seat.

Are you tweeting? #Sec360

Page 3: 3 factors of fail   sec360 5-15-13

The Authentication Problem

Secure360

Wed. May 15, 2013

[email protected]

[email protected] @bcaplin

http://about.me/barrycaplin

http://securityandcoffee.blogspot.com

Barry CaplinChief Information Security Officer

MN Dept of Human Services

Page 4: 3 factors of fail   sec360 5-15-13

http://about.me/barrycaplin

securityandcoffee.blogspot.com

Page 5: 3 factors of fail   sec360 5-15-13
Page 6: 3 factors of fail   sec360 5-15-13

Authentication is Authentication is thethe Challenge Challenge

Page 7: 3 factors of fail   sec360 5-15-13

And The Challenge is…And The Challenge is… People need to:

Enter BuildingsUse SystemsUse Data

Page 8: 3 factors of fail   sec360 5-15-13

And The Challenge is…And The Challenge is…The Right People need to:Enter BuildingsUse SystemsUse Data

Page 9: 3 factors of fail   sec360 5-15-13

Guiding PrincipleGuiding Principle

Minimum Necessary

Page 10: 3 factors of fail   sec360 5-15-13

We Usually Think Of…We Usually Think Of…SS

Page 11: 3 factors of fail   sec360 5-15-13

It was a busy year

And Passwords Get StolenAnd Passwords Get Stolen

Page 12: 3 factors of fail   sec360 5-15-13

And Bad Choices Are MadeAnd Bad Choices Are Made

Page 13: 3 factors of fail   sec360 5-15-13

3 Factors of Authentication3 Factors of Authentication1. Something You Know2. Something You Have3. Something You Are (or Do)

Page 14: 3 factors of fail   sec360 5-15-13

3 Factors of Auth FAIL3 Factors of Auth FAIL1. Something You Forgot2. Something You Lost3. Something You Were (or

Did)

Page 15: 3 factors of fail   sec360 5-15-13

1. Something You Forgot1. Something You ForgotP@sswOrd5PINsCombinations“Secret” PhrasesPicture IdentificationPatterns

Page 16: 3 factors of fail   sec360 5-15-13

Used by…Used by…

Page 17: 3 factors of fail   sec360 5-15-13

Not SimpleNot SimpleCan’t be easily guessableFalse positives

Grant rights to wrong personActions attributable to you!

So not simple/guessable…But simple is memorable…

Page 18: 3 factors of fail   sec360 5-15-13

Complexity RequirementsComplexity RequirementsMake Guessing Difficult

Common: 8 char, upper/lower, numeric, special

Smart Users CircumventNonsense/Random great

But impossible to remember

Page 19: 3 factors of fail   sec360 5-15-13

To Make It WorseTo Make It WorseExpiration

“best practice”Like changing your house locks every 30 days!

Secret Questions – too simple, too guessableAnswers on FacebookRemember… don’ t have to be true!

Help Deskssocial engineering and process hacks (ask Mat

Honan)

Page 20: 3 factors of fail   sec360 5-15-13

3 More Issues3 More IssuesBad Choices

NYG1@nts! meets requirements

Shoulder SurfingComplex => slow to enter

Writing DownNot bad if done well

Page 21: 3 factors of fail   sec360 5-15-13

To Make It WorseTo Make It WorseSocial EngineeringPhishing

Page 22: 3 factors of fail   sec360 5-15-13
Page 23: 3 factors of fail   sec360 5-15-13

SolutionsSolutionsLength

Better than Complexity!Long phrases easier to rememberWhy do some sites have max

length???Vaults

Use ‘em!Don’t forget the main password!

OTP (One Time Passwords)Fixes many issues except delivery

Page 24: 3 factors of fail   sec360 5-15-13

Something You LostSomething You Losta.k.a. 2-factor auth – id/pw + hard

tokenStatic/Dynamic

Page 25: 3 factors of fail   sec360 5-15-13

OTP DeliveryOTP DeliveryHard Token

Time (RFC 6238) or Sequence-basedAlso Smart Cards, Key Cards

Soft TokensProgram or AppDevice independence

SMSPaper

Page 26: 3 factors of fail   sec360 5-15-13

ChallengesChallengesHard Tokens

Can be lostWorse – often kept with laptopMultiple systems = multiple tokens

Soft Tokens – better because people don’t lose their phones…

… Oh Wait…

Page 27: 3 factors of fail   sec360 5-15-13

SolutionSolutionI still like this when implemented well

Google AuthSMSSmart phonesPaper

Page 28: 3 factors of fail   sec360 5-15-13

Something You WereSomething You WereUsually means biometricsOldest form of IDAnimals, babies, tribes/groups –

sensesMixed reliability

Page 29: 3 factors of fail   sec360 5-15-13

BiometricsBiometricsFalse Positives – bad for securityFalse Negatives – bad for business

Page 30: 3 factors of fail   sec360 5-15-13

BiometricsBiometricsSome common choicesIris/retinal scan, fingerprint, palm print/geometryLess commonVoice, typing cadence, “bottom” print

Page 31: 3 factors of fail   sec360 5-15-13

BiometricsBiometricsBest auth method for use in

movies!

Page 32: 3 factors of fail   sec360 5-15-13

ChallengesChallengesLogisticsRegistration, hardware/people,

“failure to enroll” (FER), contaminants on readers

HygienePerception (movie story)Back-end systems

Page 33: 3 factors of fail   sec360 5-15-13

2 Biggest Issues2 Biggest IssuesCan’t change your biometric when you

need toYour biometric can change when it

wants to

Hard to fake (getting easier)Easy to stealNearly impossible to change/fix

Page 34: 3 factors of fail   sec360 5-15-13

Solutions?Solutions?Not bad if used correctlyLocal physical accessVoice-print for automated pw reset

Page 35: 3 factors of fail   sec360 5-15-13

The 4The 4thth Factor FactorRisk-based, location-based, adaptive

auth“somewhere you are” or “something you

are doing”Key need – “rich” user profileCheck against profile, then:

AllowDenyChallenge

Page 36: 3 factors of fail   sec360 5-15-13

Biggest IssueBiggest IssueEstablishing profile

Takes timeHighly non-trivialNeeds much info and/or long/ongoing

relationship

Otherwise degenerates to 1-factor

Newer but promising

Page 37: 3 factors of fail   sec360 5-15-13

Multi-Factor (MFA)Multi-Factor (MFA)Take 2 bad things and combine them together!That makes sense!

Page 38: 3 factors of fail   sec360 5-15-13

Multi-Factor (MFA)Multi-Factor (MFA)Typically 2-factor

ID/pw + tokenSteal one, you can’t get inEither can be “easily” changed

Page 39: 3 factors of fail   sec360 5-15-13

Multi-Factor (MFA)Multi-Factor (MFA)But…

Page 40: 3 factors of fail   sec360 5-15-13
Page 41: 3 factors of fail   sec360 5-15-13

SolutionsSolutionsTypical

1-factor – id/pw for login ; badges for entryOccasional hard token useBut 1-factor only safe in “controlled”

environments

Challenge:Positively id a personEasy to use

Page 42: 3 factors of fail   sec360 5-15-13
Page 43: 3 factors of fail   sec360 5-15-13

User/UseUser/UseCustomerStaffTech workerNewbie

Hardware/softwareControl over hw/swData classificationRegulatoryThreats/Risks

Replay attackAvailabilityWork-aroundsSingle/multi-useEasy to use?

Then do what makes sense!

Page 44: 3 factors of fail   sec360 5-15-13

ExampleExampleBiometrics for entrance into high-security

areaBadges can be lost or used by anyone

Combine with measures like Keywatcher

OTPGoogle Auth or YubikeySmartPhones – can be lost but are often kept

close and rarely left with computerGood choice for online/web-based services

Page 45: 3 factors of fail   sec360 5-15-13

ExampleExampleOnline BankingSystem auth ->

Preselected word/picture ->Id/pw ->

Reauth for large/unusual transaction

Page 46: 3 factors of fail   sec360 5-15-13

ExampleExampleLong passwords + vault

pw’s – with us for a whilePeople make poor pw choicesLong phrases easier to rememberLong random strings better

Better – Add easy-to-use soft fobRemote access + risk-based auth

We have more info about staff

Page 47: 3 factors of fail   sec360 5-15-13

The FutureThe Future

Page 48: 3 factors of fail   sec360 5-15-13