21
Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth Authorization o Who can access which resource o ACM represented as ACL or capabilities o Discretionary, mandatory and originator-controlled access control Bell-Lapadula model Role-based model Biba integrity model Summary From the Last Lecture

Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth Authorization o Who can access which resource o ACM

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Single sign-ono Centralized and federated passporto Federated Liberty Alliance and Shibboleth

AuthorizationoWho can access which resourceo ACM represented as ACL or capabilitieso Discretionary, mandatory and originator-

controlled access control Bell-Lapadula model Role-based model Biba integrity model

Summary From the Last Lecture

Page 2: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Today’s security tools work with no coordinated policyo Firewalls and Virtual Private Networkso Authentication and Public Key Infrastructureo Intrusion Detection and limited response

We need better coordinationoNot just who can access what, but policy says

what kind of encryption to use, when to notify IDS

Tools should implement coordinated policieso Policies originate from multiple sourceso Policies should adapt to dynamic threat

conditionso Policies should adapt to dynamic policy changes

Security > Mix Of Point Solutions

Page 3: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

SECURITYAUDIT

RECORDS

GAA: Generic Authentication and Authorization Architecture

INTRUSIONDETECTION

UNDERATTACK

GAA APIEACL

. . .

Authentication

Databases

Web Servers

Firewalls

IPSec

Page 4: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Focus integration efforts on authorization and the management of policies used in the authorization decisiono Applications shouldn’t care about authentication

or identity Separate policy from mechanism

o Authorization may be easier to integrate with applications

oHide the calls to individual security services E.g. key management, authentication, encryption,

audit

GAA: Integration Through Authorization

Page 5: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Positive and negative access right Conditions on each rule - evaluated in a

given order Sample ACL (http://gost.isi.edu/info/gaaapi/eacl.html) oTom cannot login to the hostoLogins from the specified IP address range are

permitted, using either X509 or Kerberos for authentication if previous login attempts <= 3. If the request fails, the number of the failed logins should be updated. The connection duration < 8 h.

oAnyone, without authentication, can check the status of the host if his IP is in specified range

oHost shut downs are permitted, using Kerberos for authentication. On success, the user ID must be logged. On failure, the sysadmin is sent an e-mail

GAA: Extended ACLs

Page 6: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Pre-conditionso What must be true in order to grant request

Request-resulto These conditions must be activated regardless of

whether the access is granted or not Mid-conditions o What must be true during execution of requested

operation Post-conditionso What must be true on completion of requested

operation.

GAA: Conditions

Page 7: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Three Phases of Condition Evaluation

GAA-API

a.isi.edu, connect, Tom

gaa_check_authorization() T/F/U

System State

EACL gaa_get_object_policy_info()

gaa_post_execution_actions() T/F/U

gaa_execution_control() T/F/U

Page 8: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Discretionary policies associated with objectsoRead from existing applications or EACLs

Local policies merged with object policiesoBroadening or narrowing allowed access

Policies imported from policy/state issuersoID system issues state credentials, These

credentials may embed policy as well.Policies embedded in credentials

oThese policies attach to user/process credentials and apply to access by only specific processes

Policies evaluated remotelyoCredential issuers evaluate policies to decide

which credentials to issue.

Policies Originate From Multiple Srcs

Page 9: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Dynamic policy evaluation enables response to attacks:o Lockdown system if attack is detectedo Establish quarantines by changing policy to

establish isolated virtual networks dynamicallyo Allow increased access between coalition

members as new coalitions are formed or membership changes to respond to unexpected events

What Dynamic Policies Enable

Page 10: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Demo Scenario - LockDown You have an isolated local area

network with mixed access to web services (some clients authenticated, some not).

Page 11: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Demo Scenario - LockDown You have an isolated local area

network with mixed access to web services (some clients authenticated, some not).

You need to allow incoming authenticated SSH or IPSec connections.

Page 12: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

You have an isolated local area network with mixed access to web services (some clients authenticated, some not).

You need to allow incoming authenticated SSH or IPSec connections.

When such connections are active, you want to lock down your servers and require stronger authentication and confidentiality protection on all accesses within the network.

Demo Scenario - LockDown

Page 13: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Malicious Code

Page 14: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Disclaimer Some techniques and tools mentioned in

this class could be: o Illegal to use o Dangerous for others – they can crash

machines and clog the networko Dangerous for you – downloading the attack

code you provide attacker with info about your machine

Don’t use any such tools in real networks o Especially not on USC networko You can only use them in a controlled

environment, e.g. DETER testbed

Dangerous

Page 15: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Intrusions Why do people break into computers? What type of people usually breaks into

computers? I thought that this was a security course.

Why are we learning about attacks?

Page 16: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Intrusion Scenario

Reconnaissance Scanning Gaining access at OS, application or

network level Maintaining access Covering tracks

Page 17: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Phase 1: Reconnaissance Get a lot of information about intended

target:o Learn how its network is organizedo Learn any specifics about OS and applications

running

Page 18: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Low Tech Reconnaissance Social engineeringo Instruct the employees not to divulge

sensitive information on the phone Physical break-ino Insist on using badges for access, everyone

must have a badge, lock sensitive equipmento How about wireless access?

Dumpster divingo Shred important documents

Page 19: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Web Reconnaissance Search organization’s web siteo Make sure not to post anything sensitive

Search information on various mailing list archives and interest groupso Instruct your employees what info should not

be postedo Find out what is posted about you

Search the Web with a search engine to find all documents mentioning this companyo Find out what is posted about you

Page 20: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Whois and ARIN Databases When an organization acquires domain

name it provides information to a registrar

Public registrar files contain:o Registered domain nameso Domain name serverso Contact people names, phone numbers,

E-mail addresseso http://www.networksolutions.com/whois/

ARIN databaseo Range of IP addresseso http://whois.arin.net/ui/

Page 21: Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM

Domain Name System What does DNS do? How does DNS work? Types of information an attacker can

gather:o Range of addresses usedo Address of a mail servero Address of a web servero OS informationo Comments