12
Fear and Loathing of 2fa Igor Bulatenko

Fear and Loathing of 2fa

Embed Size (px)

Citation preview

Page 1: Fear and Loathing of 2fa

Fear and Loathing of 2fa

Igor Bulatenko

Page 2: Fear and Loathing of 2fa

• Social engineering

• Online-bruteforce

• Server compromise

• Client compromise

How they steal your pass

Page 3: Fear and Loathing of 2fa

• https://twofactorauth.org/providers/ (Use web.archive.org)

• Auth methods

• Flexibility

• System cover

• API (auth + admin)

How to choose

Page 4: Fear and Loathing of 2fa

• Interactive• SMS code• Token code• Phone call code• App code

• Non-interactive• Mobile app push• Phone call confirmation

Auth methods

Page 5: Fear and Loathing of 2fa

• *nix

• Windows

• Databases

• Web apps

• All others

System coverage

Page 6: Fear and Loathing of 2fa

• Native 2fa since OpenSSH 6.2 (https://lwn.net/Articles/544640/)

• Password/keyboard interactive

• Force command

• Non native support via pam_radius

• Bulk actions

• Server-level switch

*nix auth

Page 7: Fear and Loathing of 2fa

• Authentication provider

• Protected methods (local/RDP/winrm/…)

• Server-level switch

Windows

Page 8: Fear and Loathing of 2fa

• Oracle DB• Radius auth• DB Links• IDE multiple sessions• Bulk actions• User-level switch

• Postgresql• pam_auth

Databases

Page 9: Fear and Loathing of 2fa

• LDAP/Radius

• Interactive/non-interactive

• Splitter in password

Auth proxy

Page 10: Fear and Loathing of 2fa

• Non android/iOS devices

• Non smartphone devices

• Bulk actions

Common cases

Page 11: Fear and Loathing of 2fa

• RSA SecureID like

• HOTP

• Yubikey

Tokens

Page 12: Fear and Loathing of 2fa

Q&A