textfiles/hacking/accesblt.hac

380 lines
20 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Computer Systems Laboratory Bulletin
November 1991
ADVANCED AUTHENTICATION TECHNOLOGY
Introduction
Computer systems and the information they store and process are
valuable resources which need to be protected. With the current
trend toward networking, compromise of one computer on a network
can often affect a significant number of other machines connected
to the network.
The first step toward securing a computer system is the ability
to verify the identity of users. The process of verifying a
user's identity is typically referred to as user authentication.
Passwords are the method used most often for authenticating
computer users, but this approach has often proven
inadequate in preventing unauthorized access to computer
resources when used as the sole means of authentication. This
bulletin describes advanced authentication technology which can
be used to increase the security of computer systems and
provides guidance in the selection and use of this technology.
User Authentication
Authentication technology provides the basis for access control
in computer systems. If the identity of a user can be correctly
verified, legitimate users can be granted access to system
resources. Conversely, those attempting to gain access without
proper authorization can be denied. As used in this bulletin,
authentication is defined as the act of verifying the identity of
a user. Once a user's identity is verified, access control
techniques may be used to mediate the user's access to data. A
variety of methods are available for performing user
authentication.
The traditional method for authenticating users has been to
provide them with a secret password, which they must use when
requesting access to a particular system. Password systems can
be effective if managed properly (Federal Information Processing
Standard [FIPS] 112), but they seldom are. Authentication which
relies solely on passwords has often failed to provide adequate
protection for computer systems for a number of reasons. If
users are allowed to make up their own passwords, they tend to
choose ones that are easy to remember and therefore easy to
guess. If passwords are generated from a random combination of
characters, users often write them down because they are
difficult to remember.
Where password-only authentication is not adequate for an
application, a number of alternative methods can be used alone or
in combination to increase the security of the authentication
process. The three generally accepted methods for verifying the
identity of a user are based on something the user knows, such as
a password; something the user possesses, such as an
authentication token; and some physical characteristic of the
user, such as a fingerprint or voice pattern.
Token-Based Authentication
Token-based authentication schemes require the system user to
produce a physical token which the system can recognize as
belonging to a legitimate user. These tokens typically contain
information which is physically, magnetically, or electrically
coded in a form which can be recognized by a host system. The
automatic teller machines used by the retail banking industry,
which require the user to carry a magnetic stripe card, are one
example of token-based authentication systems. The most
sophisticated tokens contain one or more integrated circuits
which can store and, in some cases, process information.
Tokens which are manufactured in the form of a credit card with
an onboard microprocessor and memory are commonly referred to as
"smart" cards.
Token-based systems reduce the threat from attackers who attempt
to guess or steal passwords, because the attacker must either
fabricate a counterfeit token or steal a valid token from a user
in addition to knowing the user's password.
Biometric Authentication
Biometric authentication relies on a unique physical
characteristic to verify the identity of system users. Common
biometric identifiers include fingerprints, written signatures,
voice patterns, typing patterns, retinal scans, and hand
geometry. The unique pattern which identifies a user is formed
during an enrollment process, producing a template for that user.
When a user wishes to authenticate to the system, a physical
measurement is made to obtain a current biometric pattern for the
user. This pattern can then be compared against the enrollment
template in order to verify the user's identity. Biometric
authentication devices tend to cost more than password or token-
based systems, because the hardware required to capture and
analyze biometric patterns is more complicated. However,
biometrics provide a very high level of security because the
authentication is directly related to a unique physical
characteristic of the user which is more difficult to
counterfeit. Recent technological advances have also helped to
reduce the cost of biometric authentication systems.
Combination Methods
Passwords, authentication tokens, and biometrics are subject to a
variety of attacks. Passwords can be guessed, tokens can be
stolen, and even biometrics are susceptible to certain attacks.
These threats can be reduced by applying sound design principles
and system management techniques during the development and
operation of an authentication system.
One method which can substantially increase the security of an
authentication system is to use a combination of authentication
techniques. For example, an authentication system might require
users to present an authentication token and also enter a
password. By stealing a user's token, an attacker would still be
unable to gain access to the host system, because the system
would require the user's password in addition to the token.
Implementation Guidelines and Recommendations
An organization must answer numerous questions when it decides to
implement an advanced authentication system. The following
guidelines will assist those responsible for evaluating,
procuring, and integrating these systems.
Risk Analysis - A thorough analysis should be done to
determine what parts of the system in question are vulnerable to
attack, and to prioritize these vulnerabilities in terms of
severity and likelihood.
Product Evaluation and Selection - Once the risks associated with
a host system have been identified, this information can be used
to select an authentication system which provides adequate
protection against these risks. In addition, the authentication
system will have to meet several other requirements in order to
function effectively in a given environment. The organization
responsible for selecting the authentication system should decide
whether sufficient in-house expertise exists to evaluate the
available options. In some cases, it is more cost-effective to
hire a consultant who is familiar with the available technology.
Whether the evaluation is done in-house or by a consultant, the
following items should be considered:
o Sources of information - A variety of sources should be used
when evaluating authentication systems. Vendor product
literature can be very helpful in describing specific
details of product operation, and in understanding the range
of products offered. There are several annual conferences
devoted to computer security, network access control, and
authentication technology. In addition to the papers
presented at these conferences, there are usually large
vendor exhibit halls and product forums. Many
organizations, particularly those in the government sector,
have published information on the selection and integration
of advanced authentication technology. These publications
are often the result of practical experience gained during
the implementation of these systems, and so can be
particularly useful.
o Integration into existing environment - This factor is
discussed further in the next section, but is an important
consideration when selecting a product. All other features
of an authentication system may be irrelevant if the product
cannot be integrated into the customer's computing
environment.
o Custom design - Sometimes an organization's needs cannot be
met by a commercially available product. In these cases,
the organization may decide to do a custom design using
in-house resources. This alternative is most practical for
large organizations with experienced system design and
support groups, or for smaller organizations with a high
level of expertise in computer access control systems.
Vendors are often willing to work with customers to modify
existing products or design new products to meet custom
requirements. An arrangement which often works well is for
the customer and vendor to work together on the design of
the system, and for the vendor to then manufacture the
product.
o Cost and performance - The relationship between cost and
performance can be relatively complex for authentication
technology. Similar products from different vendors may
vary widely in cost, depending on the vendor's manufacturing
and development techniques and marketing philosophies. In
general, devices with a higher performance level will cost
more, but individual cases should be evaluated carefully.
The general approach should be to procure the authentication
system which provides the required level of security and
other performance factors at a minimum cost.
o Accuracy - The accuracy of an authentication system refers
to the ability of that system to correctly identify
authorized system users while rejecting unauthorized users.
Since this is the primary function of an authentication
system, accuracy is directly related to the level of
security provided by the system. Vendors may not be
objective about producing and interpreting the results of
tests which quantify the accuracy of the authentication
process with regard to the vendor's particular products.
For these reasons, an organization may wish to run
independent tests to determine the accuracy of an
authentication system in terms which are relevant to the
environment in which the system will be used.
o Reliability - An authentication system should be capable of
operating in its intended environment for a reasonable
period of time. During this time, the system is expected to
perform at or above a level which ensures an appropriate
amount of protection for the host system. If the
authentication system fails, the chances for unauthorized
access during the failure should be minimized.
o Maintainability - All hardware and software systems require
some form of maintenance. The components of an
authentication system should be evaluated to determine the
level of maintenance which the system will require. One
goal in the design of an authentication system should be to
minimize the maintenance requirements within the constraints
of system cost, performance, and available technology.
o Commercial availability - Large-scale networking of computer
systems and distributed computing are relatively recent
developments, and are the driving forces behind the need for
more effective methods for authenticating system users.
Unfortunately, the market for advanced authentication
technology is not fully developed and is somewhat unstable.
Many commercially available authentication systems have not
yet been sold in quantity. An organization that is
considering the use of this technology should evaluate the
vendor's ability to produce systems that meet specific
quality control standards and in sufficient quantity to meet
the user's requirements. Contracts written to procure
authentication systems should provide some form of
protection for the customer in the event that the vendor is
unable to produce systems in the quantities required.
o Upgradeability - Because the technology of advanced
authentication systems is continually developing, any
authentication system should be able to accommodate the
replacement of outdated components with new ones. A modular
approach to the design of an authentication system, with
clearly defined interfaces between the system components,
facilitates the process of upgrading to new technology.
o Interoperability - A wide variety of computing platforms and
security architectures are in use today. Any authentication
system should be designed to work with as many of these
diverse platforms as possible, or at least to require a
minimum of modifications to work in different environments.
o Reputation of manufacturer - Obtaining satisfactory service
during the selection, installation, and long-term operation
of an authentication system can be difficult if the
manufacturer is uncooperative. Customers can request a list
of references from prospective vendors for products and
services which have been provided to other customers in the
past. In addition, the resumes of key individuals working
on the vendor's staff can sometimes be examined to determine
whether an adequate level of expertise is available.
o Training programs - Some form of training is usually
necessary for the people who will be using and maintaining
an authentication system. An effective training program is
of critical importance to the success of any new system.
Vendors should offer training appropriate for everyday users
of the system, and also for the system administrators who
will be responsible for managing the system.
System Integration - The integration of an authentication
system into an existing computer environment can be very
difficult. Most operating systems do not contain well-defined
entry points for replacing the default authentication mechanism
supplied with the operating system. This is partly because there
is no widely accepted standard for the interface between an
operating system and an authentication device. Until such a
standard becomes available, there are three general options:
o In some cases, the vendor who provides the authentication
system may have already integrated it into certain operating
systems. If the authentication system meets the
requirements of the customer and the customer is using the
specified operating system, then the system integration has
already been accomplished.
o Operating system vendors may select certain security
architectures for incorporation into their systems. If
these architectures include an authentication technology
which the customer finds acceptable, then the operating
system may be purchased with the appropriate authentication
mechanism as part of the package.
o It may be necessary to customize the authentication system
and perhaps modify the host operating system so that the two
can communicate. This will involve cooperation between the
operating system vendor, the authentication system vendor,
and the customer, unless the customer has sufficient
expertise to perform the integration in-house. A
prototyping approach is strongly recommended, due to the
complexity of this type of project. Implementing such a
system on a small scale first can be very helpful in
determining what problems will be encountered in a
full-scale implementation.
System Maintenance - After an authentication system has
been selected and installed, it must be maintained. Maintenance
costs can easily exceed the initial acquisition cost if the
system is to be in operation for a reasonable length of time. It
is therefore important that long-term plans for system
maintenance be developed by the customer or provided by the
vendor in the initial stages of the procurement cycle.
Provisions must be made for assigning responsibilities for system
administration so that new users can be enrolled, inactive
accounts deleted, and system malfunctions identified and
corrected.
The majority of network authentication systems employ some form
of cryptography, which means that some form of cryptographic key
management system will be necessary. The key management
component may be provided by the authentication system vendor,
but the process of maintaining and distributing keys usually
requires active participation by the host system. Since the
security of a cryptographic system is directly related to the
level of protection provided for the cryptographic keys, it is
essential for the vendor or customer to develop a system for
managing these keys effectively. Also, the host computer system
will probably evolve over time through the addition of new
software and hardware, and these changes may require
corresponding modifications or upgrades to the authentication
system to maintain compatibility.
Summary
Password-based authentication is the most widely used method for
verifying the identity of persons requesting access to computer
resources. However, authentication based only on passwords often
does not provide adequate protection. The use of authentication
tokens, biometrics, and other alternative methods for verifying
the identity of system users can substantially increase the
security of an authentication system. The proliferation of
networked computer systems and the corresponding increase in the
potential for security violations makes it even more critical
those who design and operate computer systems to understand and
implement effective authentication schemes.
References
Guideline on User Authentication Techniques for Computer
Network Access Control, National Institute of Standards and
Technology (U.S.), Federal Information Processing Standards
Publication 83, National Technical Information Service,
Springfield, VA, September 1980.
Computer Data Authentication, National Institute of Standards
and Technology (U.S.), Federal Information Processing
Standards Publication 113, National Technical Information
Service, Springfield, VA, May 1985.
Biometric Access Control Device Evaluation Criteria (Draft
Report), DCI Intelligence Information Handling Committee,
Access Control Subcommittee, Community Headquarters Building,
Washington, DC 20505, February 1991.
Smart Card Technology: New Methods for Computer Access
Control, National Institute of Standards and Technology
(U.S.), NIST Special Publication 500-157, September 1988.
Financial Institution Sign-On Authentication for Wholesale
Financial Transactions, American National Standard X9.26,
American National Standards Committee X9, American Bankers
Association, May 1990.
Password Usage, National Institute of Standards and
Technology (U.S.), Federal Information Processing Standards
Publication 112, National Technical Information Service,
Springfield, VA, May 1985.
For More Information
For further information on NIST's ongoing work in advanced
authentication technology, contact Jim Dray, Computer Security
Division, Room A216, Technology Building, National Institute of
Standards and Technology, Gaithersburg, MD 20899, (301) 975-
3356.
Downloaded From P-80 International Information Systems 304-744-2253