2012-03 multifactor not just for auditors

24
Multifactor AuthN: It Isn’t Just for Auditors Anymore Rob Carter & Shilen Patel, Duke University Fall, 2011 Internet2 Member Meeting

Upload: raleigh-issa

Post on 06-Nov-2014

248 views

Category:

Technology


1 download

DESCRIPTION

2012-03 MultiFactor Not Just For Auditors by Rob Carter, Consultant at Duke Univeristy

TRANSCRIPT

Page 1: 2012-03 MultiFactor Not Just For Auditors

Multifactor AuthN:It Isn’t Just for Auditors Anymore

Rob Carter & Shilen Patel, Duke University

Fall, 2011 Internet2 Member Meeting

Page 2: 2012-03 MultiFactor Not Just For Auditors

But first, a few words from our security office...

Page 3: 2012-03 MultiFactor Not Just For Auditors

Passwords are the problem

Password phishing

5% success rate spearphishing

Some users have had local passwords speared repeatedly

Page 4: 2012-03 MultiFactor Not Just For Auditors

Passwords are the problemHash crackers & GPUs

SO demo: random pw’s on a single std. video card

5-char: 4 min, 8-char: 45 days

Linear decomp, scaling

$25k ==> 8-char ~ 8 hrs

Password reuse + one weak external system...

Page 5: 2012-03 MultiFactor Not Just For Auditors

...and a word from our auditors...

Page 6: 2012-03 MultiFactor Not Just For Auditors

You’ve Got Policy Problems

Institutional expiration, complexity policies considered too weak

Crack efficiency rises faster than password policies harden

maybe always will...

kpmg(sis,erp) ~= FAIL

Page 7: 2012-03 MultiFactor Not Just For Auditors

...and a few from our users...

Page 8: 2012-03 MultiFactor Not Just For Auditors

Passwords are a different kind of problem...

You already make my password impossibly hard

If I have to change it frequently, I’ll have to write it down

If I have to pick one suddenly, it’ll be weak

Isn’t the system already secure?

Page 9: 2012-03 MultiFactor Not Just For Auditors

Guess where that leaves us?

Auditors say we need to do something

Security says we need to do it quickly

Users won’t accept strict password policies

Page 10: 2012-03 MultiFactor Not Just For Auditors

We’ve no way out but up...

Multifactor AuthN seems the answer

Physical factors aren’t phishable

Auditors love N-factor AuthN

Security Office loves it, too

Page 11: 2012-03 MultiFactor Not Just For Auditors

Not all application contexts have the same requirements or capabilities

Institutional security goals often run counter to applications’ ease-of-use goals

Everybody needs a little give and take...

Flexibility is critical

Page 12: 2012-03 MultiFactor Not Just For Auditors

...especially the users.

Tenured Professor: “You use the same password for my HR benefits that I give my secretary so she can read my email. This is an outrage!”

Something’s definitely an outrage, here, but...

...maybe we can use this as a carrot to the auditors’ stick...

...but it’ll require more than the traditional approach to multifactor authentication...

Page 13: 2012-03 MultiFactor Not Just For Auditors

Traditional single-mode multifactor is a non-starter

Authmech = f(organization)

one-size-fits-all -- that always works

University users aren’t exactly a captive audience

Second factors are always attractive targets (viz RSA) -- want to avoid lock-in

Page 14: 2012-03 MultiFactor Not Just For Auditors

Multimode solution seems more attractive...

Authmech = f(app,user) (or even f(app,user,location))

f() = Max(user(app),app(user),institution(app,user))

Prof W. can self-select a higher bar for his logins to his blog, while we can raise the bar for logins to grant mgt.

Another RSA-type hack could force us to change mechanisms...

...and besides... it’s good enough for Google Accounts

Page 15: 2012-03 MultiFactor Not Just For Auditors

Low-hanging fruit strategy

Start with the IDP

700+ on-campus SPs and growing already

If we’re careful, most SPs won’t need to do anything and their users won’t notice anything

Infrastructure behind the IDP can be reused

New apps are largely web-based; older apps continue to grow better web interfaces

Page 16: 2012-03 MultiFactor Not Just For Auditors

But shouldn’t it be the SP’s problem?

Perhaps, but...

...SP<->IDP conversation lacks full negotiation, so...

...negotiation would require multiple SP round-trips,...

...and would likely require app awareness,...

...but application authors aren’t usually that savvy

Page 17: 2012-03 MultiFactor Not Just For Auditors

Guess where we are again?

Page 18: 2012-03 MultiFactor Not Just For Auditors

IDP Login Page (jsp)

Custom multifactor "external" authmech

Plug-In Plug-In Plug-In

Plugin API

AuthSvc

AuthSvc

Rules

Prefs

New IDP external authmechPluggable interface for custom credential verifiers

Recognizes different strength values for different credential types

Computes required strength based on claimed identity and SP making request.

Page 19: 2012-03 MultiFactor Not Just For Auditors

IDP Login Page (jsp)

Custom multifactor "external" authmech

Plug-In Plug-In Plug-In

Plugin API

AuthSvc

AuthSvc

Rules

Prefs

New IDP external authmechIDP Login Extensions

ajaxy and context sensitive

authN options depend on user capabilities and preferences

constrained feedback to defeat incremental attacks

Page 20: 2012-03 MultiFactor Not Just For Auditors

IDP Login Page (jsp)

Custom multifactor "external" authmech

Plug-In Plug-In Plug-In

Plugin API

AuthSvc

AuthSvc

Rules

Prefs

New IDP external authmechData repositories for rules and preferences

IDP stores mech strength rules locally

LDAP stores user, SP specific data

Considering Grouper as replacement for one or both to enhance generality

Page 21: 2012-03 MultiFactor Not Just For Auditors

IDP Login Page (jsp)

Custom multifactor "external" authmech

Plug-In Plug-In Plug-In

Plugin API

AuthSvc

AuthSvc

Rules

Prefs

SP1 SP2

SSO Handler

How’re y’gonna keep ‘em on the farm?

SSO becomes an issue across disparate SPs

Built-in previous session handler doesn’t understand strength

We disable it and supply SSO in the external authmech itself

Page 22: 2012-03 MultiFactor Not Just For Auditors

IDP Login Page (jsp)

Custom multifactor "external" authmech

Plug-In Plug-In Plug-In

Plugin API

AuthSvc

AuthSvc

Rules

Prefs

SP1 SP2

SSO Handler

How’re y’gonna keep ‘em on the farm?

Record authN strength factor (sum) in login context (auth method)

SSO implements >= semantics -- SSO succeeds iff previous session method strength >= current requirement

On SSO failure, require all new creds from user

Page 23: 2012-03 MultiFactor Not Just For Auditors

Novel Use Cases

Sometimes a password may not be required (WS)

If no one specifies anything, UI can look just like before

If an SP explicitly lowers its expectations, new options arise

Default numeric strength requirement = 1 (equiv to “password only”)

Allow OpenID gateway as option for SPs requiring strength < 1

Page 24: 2012-03 MultiFactor Not Just For Auditors

Demos, Demos, Demos