Global Information Assurance Certification Paper - GIAC Certifications

Page created by Gregory Fowler
 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Michael Kelly
               Version 1.2e

                                          Is Single Sign on a Security Risk?

                                                                                                s.
                                                                                             ht
                                                                                         rig
               Introduction

                                                                                     ull
               There used to be a time when the majority of computer operators and people alike
               maintained one user ID and password. With the introduction of platforms such as

                                                                                     f
               Microsoft Windows, and with the continual lowering of hardware costs capable of

                                                                                  ns
               hosting
               Key      Unix systems.
                    fingerprint = AF19 This
                                        FA27is2F94
                                               no longer
                                                    998Dthe case.DE3D
                                                          FDB5    ManyF8B5
                                                                       of the06E4
                                                                              applications
                                                                                   A169 4E46hosted by

                                                                               tai
               high end systems like Mainframes have been distributed amongst multiple client server

                                                                            re
               systems. If this didn’t cause organizations enough foods for thought, lets add e-
               commerce to the equation. With each different OS, Application and security database

                                                                        or
               introduced comes its own unique group of issues. Every day that passes organizations

                                                                     th
               change not only the technology they use but also the people that maintain the
               environment. This extremely fast progression has introduced many concerns for
                                                                 Au
               organizations large and small.
                                                              2,

               What is the issues progression has introduced?
                                                          00
                                                       -2

               It is inevitable that with progression comes some amount of pain. Without
               understanding all the issues it would be very difficult to investigate an SSO Solution.
                                                   00

               Once the issues are understood it will be easier to determine if SSO is a security risk or a
                                                20

               technology that helps alleviate security risks. Some of these issues are.
                                            te

                       Introduction of new OS, Application and Security Databases
                                          tu

                       Social Engineering
                       Continual changing of human resources
                                       sti

                       Security
                                    In

               Introduction of new OS, Application and Security Databases
                               NS

               There are hundreds if not a thousand of different OS/Applications and Security databases
                           SA

               within the industry today. Many organizations have internally developed applications
               that authenticate to proprietary databases. As it is rare that all these different components
                        ©

               are managed and maintained by the same (Ever changing) department, it is less likely that
               standardization has taken place. User name and password restrictions would all benefit
               from standardization. The many user ids and passwords that users have to manage causes
               confusion. A good percentage of a users time is spent login onto system resources.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
               “The Securities Industries Association, based in Washington, D.C., found that users
               spend an average of 44.4 hours a year logging on to (an average of) four applications a
               day.”

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
www-4.ibm.com/software/network/globalsignon/library/whitepapers/overview.html

               More and more organizations are moving towards e-commerce. Providing services and
               product to customer’s worldwide introduces an even greater need for user control. Many

                                                                                               s.
               of the databases previously used for internal applications only have now been web

                                                                                            ht
               enabled. It is important that a mechanism be in place to allow customer to transparently

                                                                                        rig
               navigate across multiple web servers.

                                                                                    ull
               Social engineering

                                                                                     f
               With the introduction of so many systems it is possible that users will forget their user id

                                                                                  ns
               or password
               Key           and= eventually
                    fingerprint   AF19 FA27lock themselves
                                             2F94  998D FDB5out.DE3D
                                                                 Unfortunately
                                                                       F8B5 06E4 thisA169
                                                                                      happens
                                                                                           4E46frequently.

                                                                               tai
               Help desk personnel are overwhelmed with the amount of calls regarding password reset

                                                                            re
               and account activation.

                                                                        or
               “META Group reports that 15-30% of all support calls are caused by forgotten or expired

                                                                     th
               passwords. The cost to manually reset passwords ranges from $15-30 per call, and on
               average, users call help desks with a password problem 4 times a year..”
                                                                 Au
               http://www.courion.com/solutions/index.asp
                                                              2,
                                                          00

               This can increase the possibility of an individual social engineering the Help Desk. Under
                                                       -2

               high stress people are less likely to follow the guidelines that are in place. Guidelines
               that dictate being absolutely positive the person that is requesting the password reset is
                                                   00

               who they say they are. Solutions have been developed to reduce the security risk of
                                                20

               social engineering.
                                            te

               These types of systems allow end users to answer a variety of questions through
                                         tu

               automated telephone services. Once the correct response has been entered the account is
               reset and in some cases e-mailed back to the end user. These types of systems are
                                      sti

               widely used within the Internet community. If you forget your password on one of the
                                    In

               popular search engine e-mail systems, you can select to have a new one created.
               Answering the correct question will reveal a new password.
                               NS

               Continual changing or human resources
                           SA

               The technology is not the only frequent change within an organization. People come and
                        ©

               go and along with that come the variety of user accounts across the enterprise. As users
               have so many accounts it becomes extremely hard for administrators to track and
               deactivate/delete accounts as people leave the organization.

               Security
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

               Each operating system and application has its own set of security requirements for both
               user id and password. Some security databases by default requires that the first character

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                  Author retains full rights.
of the password be a numeric. Other operating systems will not allow repeating
               characters within a password. For example AAMIKE would fail because the letter A
               follows the first letter A. As many operating systems have such a diverse set of
               restrictions it is possible that organizations will remove the restrictions (Where possible)
               to reduce the amount of user frustration and calls to the help desk. This also is in an

                                                                                                s.
               effort to reduce the amount of sticky notes taped to monitors containing the user id and

                                                                                             ht
               password. Security often competes with convenience in many different areas within an

                                                                                         rig
               organization. Reducing password restrictions for end user convenience may or may not
               be an acceptable sacrifice.

                                                                                     ull
               What is Single Sign On?

                                                                                     f
                                                                                  ns
               SSOfingerprint
               Key  in short is =theAF19
                                     ability to authenticate
                                          FA27   2F94 998D once
                                                             FDB5and never
                                                                  DE3D     have06E4
                                                                         F8B5   to repeat
                                                                                     A169the4E46
                                                                                             process for

                                                                               tai
               the duration of the session. Many solutions are available throughout the market that

                                                                            re
               provides SSO capabilities. As a whole they all provide some form of Authentication,
               Authorization, Access control and password synchronization. SSO solutions are

                                                                        or
               available for both organizations moving towards e-commerce as well as enterprise

                                                                     th
               networked environments.

               Authentication and Authorization
                                                                 Au
                                                              2,

               Authentication is the process of a user being identified as who they say they are. SSO
                                                          00

               applications either take advantage of the existing databases within the organizations or
                                                       -2

               require the implementation of a proprietary database. Software vendors such as Novell
               and Microsoft have developed highly scalable Databases (Also known as Directories)
                                                   00

               that can be implemented into existing environments. These databases provide central
                                                20

               repositories for user information and can be integrated into some of the available SSO
               solutions. Once a user has successfully authenticated they are then authorized to access
                                            te

               various system resources. There are different types of authentications
                                          tu

               Single Factor—Single factor authentication is when the user is only required to produce
                                       sti

               one piece of information. The most common single factor authentication method would
                                    In

               be passwords (Something you know). Biometrics (Something you are) although
               considered more secure than a password, when used independently it is still referred to as
                               NS

               Single Factor Authentication.
                           SA

               Two Factor —Two factor authentication is the combination of two single factor
               authentications. During an authentication process if a user is asked for both his password
                        ©

               (Something you know) and a digital certificate (Something you own) then this would
               become a two factor authentication.

               Typically SSO products contain a central server. The central server is responsible for
               authenticating
               Key fingerprintthe user against
                                = AF19         one of
                                        FA27 2F94     the security
                                                   998D   FDB5 DE3Ddatabases
                                                                        F8B5within
                                                                              06E4 the
                                                                                    A169organization.
                                                                                           4E46
               This is usually the database where all the users accounts exist. Security databases such as
               Windows NT SAM, Active Directory and IBM’s RACF are common authentication

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
options with SSO Products. These all provide single factor authentication. Extending
               security databases to support tokens and PKI would provide two factor authentication.

               Within an enterprise environment users authenticate to the central server with the aid of
               client code. Once the user has successfully authenticated to the central server the

                                                                                               s.
               network logon is allowed to continue.

                                                                                            ht
                                                                                        rig
                                                                                    ull
                                                                                    f
                                                                                 ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                              tai
                                                                           re
                                                                       or
                                                                    th
                                                                Au
                                                             2,
                                                         00
                                                      -2
                                                  00
                                               20
                                            te
                                         tu
                                      sti
                                   In
                               NS

               Access Control
                           SA

               The level of access control that SSO can provide will differ depending on the solution as
               well as the intended end users.
                        ©

               SSO solutions for Web Servers typically provide content protection for web-enabled
               applications. After a user has successfully authenticated they are then allowed to access
               areas of the web server that the associated roll permits. A role is a list of ACL associated
               with one or more user Id’s. Once authenticated, the user is then granted a session id. The
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
               session can be used to validate the user as they move about multiple web servers without
               requiring multiple authentications. This provides SSO for Web Users.

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                   Author retains full rights.
Users of corporate networks are presented with a graphical interface of applications they
               are allowed to access. The user points and clicks the application they want to launch.
               The credentials for that user (e.g. Non standardized user id) and application information
               are retrieved from the central server and provided to the application.

                                                                                               s.
               SSO products achieve transparent sign on in one of two ways.

                                                                                            ht
                                                                                        rig
               Scripted—Scripted Sign On is the process of playing keystrokes back to an application.
               When the application is launched, the keystrokes are played back to the application as if

                                                                                    ull
               the user was typing it in. The user Id and passwords are stored in the scripts as variables.
               Storing critical information as variables allows one script to be shared by many users for

                                                                                     f
               the same application. The variables values are pulled down from the central server at

                                                                                  ns
               application
               Key          launch.
                    fingerprint     Scripted
                                = AF19  FA27Sign
                                              2F94On998D
                                                      has to be initiated
                                                           FDB5           by the06E4
                                                                  DE3D F8B5      end user.
                                                                                      A169Automatically
                                                                                           4E46

                                                                               tai
               launching the applications at logon would create multiple unnecessary active sessions to

                                                                            re
               the applications

                                                                        or
               Integrated—Integrated SSO allows for tight integration with applications. Applications

                                                                     th
               that have been developed to integrate with SSO allow for information to be passed about
               the user without the need for scripts. The process is invisible to the end user. In addition
                                                                 Au
               the SDK’s provided with SSO solutions allow for the same integration with proprietary
               applications.
                                                              2,
                                                          00

               Password\account status Synchronization
                                                       -2

               Password synchronization is the ability to synchronize passwords around the corporate
                                                   00

               network. This is a vital aspect for SSO and can be considered the Back Bone of the
                                                20

               solution. Passwords are captured from one or more security databases and then
               distribute vie the central server around the enterprise network.
                                            te
                                         tu

               The central server is typically the controlling component of a SSO solution. Disabling
               accounts from the central server triggers a chain of events that propagate down to the
                                      sti

               desired systems disabling the user account. The propagation of account status would also
                                    In

               occur if the maximum bad logon count was reached.
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                  Author retains full rights.
s.
                                                                                            ht
                                                                                        rig
                                                                                    ull
                                                                                     f
                                                                                  ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
                                                                            re
                                                                        or
                                                                     th
                                                                 Au
                                                              2,
                                                          00
                                                       -2
                                                   00

               Conclusion
                                                20

               Security Personnel become concerned that SSO and password synchronization creates a
                                            te

               security risk. If the password is the same across all security databases then the users
                                          tu

               account is only as secure as the weakest operating systems security. There are many
                                       sti

               aspects of SSO that counteract the concern.
                                    In

                   •   Less Secured systems can be excluded from the SSO Enterprise environment.
                       Many of the solutions available are multi tier by design and don’t require all users
                               NS

                       or systems to participate. Careful consideration can be given to who and what is
                           SA

                       included within the SSO Enterprise.

                   •
                        ©

                       Administrators are able to enforce more stringent password restrictions across the
                       environment from the central server. Restrictions such as minimum length,
                       password expiry time and invalid dictionary lists. Individual OS and application
                       restrictions can be brought inline with the central servers configuration.
               Key•fingerprint
                      Password = AF19  FA27 2F94reduces
                                 Synchronization   998D FDB5
                                                           users DE3D   F8B5With
                                                                 confusion.  06E4only
                                                                                   A169
                                                                                      one4E46
                                                                                          password to
                      remember it is less likely that the password will be wrote down on a piece of
                      paper.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                  Author retains full rights.
•   SSO products that allow end users to reset the password after successfully
                       answering a variety of questions reduces help desk cost and risk of social
                       engineering.

                   •   Employees that leave organizations can quickly be deactivated on all systems

                                                                                                 s.
                       from one location.

                                                                                              ht
                                                                                          rig
                   •   Authentication to less secure operating systems can be enhanced with two factor
                       authentication.

                                                                                      ull
                   •

                                                                                     f
                       With little intervention required to sign on to applications the process is less likely

                                                                                  ns
                       to fail and cause volume helpdesk calls
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
               Systems are vulnerable to attack. The strongest security databases have weaknesses that

                                                                            re
               can be exploited. Host based and Network based vulnerability assessment tools help to
               ensure that system configuration is inline with internal policy’s. SSO facilitates the

                                                                        or
               authentication process and removes a good deal of pain from end users, helpdesk and

                                                                     th
               administrators.
                                                                 Au
               SSO, Vulnerability assessment and intrusion detection can all help to improve the level of
               security within an organization. After all, Security is all about layers.
                                                              2,
                                                           00
                                                       -2

               http://www.eu.microsoft.com/windows2000/sfu/psync.asp
                                                   00

               http://www.novell.com/products/nds/details.html
                                                20

               http://www.networkcomputing.com/1006/1006f12.html
                                             te
                                          tu

               http://www-
               4.ibm.com/software/network/globalsignon/library/whitepapers/overview.html
                                       sti
                                    In

               http://www.microsoft.com/windows2000/server/evaluation/features/dirlist.asp
                               NS

               http://www.courion.com/solutions/index.asp
                           SA

               http://www.fipass.com/corporate/authentication.asp
                        ©

               http://www.win2000mag.com/Articles/Index.cfm?ArticleID=526

               http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=53&PID=3449
               195
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
               http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=55&PID=3449
               195#sso

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                     Author retains full rights.
http://www.blockade.com/products/blk_prod_ov.pdf

               http://www.hut.fi/~totervo/netsec98/sso.html

                                                                                             s.
                                                                                          ht
                                                                                      rig
                                                                                  ull
                                                                                   f
                                                                                ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                             tai
                                                                          re
                                                                      or
                                                                   th
                                                               Au
                                                            2,
                                                        00
                                                     -2
                                                 00
                                              20
                                           te
                                        tu
                                     sti
                                  In
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002              As part of GIAC practical repository.              Author retains full rights.
Last Updated: April 20th, 2019

       Upcoming Training

SANS Northern Virginia- Alexandria 2019                        Alexandria, VA           Apr 23, 2019 - Apr 28, 2019         Live Event

SANS Pen Test Austin 2019                                      Austin, TX               Apr 29, 2019 - May 04, 2019         Live Event

Community SANS New York SEC401                                 New York, NY             May 06, 2019 - May 11, 2019 Community SANS

SANS Security West 2019                                        San Diego, CA            May 09, 2019 - May 16, 2019         Live Event

Community SANS Omaha SEC401                                    Omaha, NE                May 13, 2019 - May 18, 2019 Community SANS

Community SANS Annapolis Junction SEC401                       Annapolis Junction, MD   May 13, 2019 - May 18, 2019 Community SANS

SANS Northern VA Spring- Reston 2019                           Reston, VA               May 19, 2019 - May 24, 2019         Live Event

SANS New Orleans 2019                                          New Orleans, LA          May 19, 2019 - May 24, 2019         Live Event

SANS Autumn Sydney 2019                                        Sydney, Australia        May 20, 2019 - May 25, 2019         Live Event

SANS Atlanta 2019                                              Atlanta, GA              May 28, 2019 - Jun 02, 2019         Live Event

San Antonio 2019 - SEC401: Security Essentials Bootcamp Style San Antonio, TX           May 28, 2019 - Jun 02, 2019             vLive

SANS San Antonio 2019                                          San Antonio, TX          May 28, 2019 - Jun 02, 2019         Live Event

Mentor Session - SEC401                                        Austin, TX               Jun 01, 2019 - Jun 29, 2019            Mentor

Mentor Session @work - SEC401                                  Birmingham, AL            Jun 03, 2019 - Jul 08, 2019           Mentor

SANS London June 2019                                          London, United           Jun 03, 2019 - Jun 08, 2019         Live Event
                                                               Kingdom
Mentor Session - SEC401                                        Tysons, VA                Jun 08, 2019 - Jul 13, 2019           Mentor

Community SANS Tampa SEC401                                    Tampa, FL                Jun 10, 2019 - Jun 15, 2019 Community SANS

SANS Kansas City 2019                                          Kansas City, MO          Jun 10, 2019 - Jun 15, 2019         Live Event

SANSFIRE 2019                                                  Washington, DC           Jun 15, 2019 - Jun 22, 2019         Live Event

Community SANS Raymondville SEC401                             Raymondville, TX         Jun 17, 2019 - Jun 22, 2019 Community SANS

SANSFIRE 2019 - SEC401: Security Essentials Bootcamp Style     Washington, DC           Jun 17, 2019 - Jun 22, 2019             vLive

SANS Cyber Defence Canberra 2019                               Canberra, Australia       Jun 24, 2019 - Jul 13, 2019        Live Event

Community SANS Cupertino SEC401                                Cupertino, CA            Jun 24, 2019 - Jun 29, 2019 Community SANS

SANS Cyber Defence Japan 2019                                  Tokyo, Japan              Jul 01, 2019 - Jul 13, 2019        Live Event

SANS Charlotte 2019                                            Charlotte, NC             Jul 08, 2019 - Jul 13, 2019        Live Event

Community SANS Ottawa SEC401                                   Ottawa, ON                Jul 08, 2019 - Jul 13, 2019   Community SANS

SANS Cyber Defence Singapore 2019                              Singapore, Singapore      Jul 08, 2019 - Jul 20, 2019        Live Event

Pittsburgh 2019 - SEC401: Security Essentials Bootcamp Style   Pittsburgh, PA            Jul 08, 2019 - Jul 13, 2019            vLive

SANS London July 2019                                          London, United            Jul 08, 2019 - Jul 13, 2019        Live Event
                                                               Kingdom
SANS Pittsburgh 2019                                           Pittsburgh, PA            Jul 08, 2019 - Jul 13, 2019        Live Event

SANS Columbia 2019                                             Columbia, MD              Jul 15, 2019 - Jul 20, 2019        Live Event
You can also read