* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Web Security
SIP extensions for the IP Multimedia Subsystem wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
TV Everywhere wikipedia , lookup
Computer network wikipedia , lookup
Airborne Networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Network tap wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Computer security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Wireless security wikipedia , lookup
AAA Services • Authentication - • Authorization - • Who ? Management of the user’s identity What can the user do? Management of the granted services Accounting - What did the user do? Logging of activities and auditing Uses of AAA • Two modes: – The character mode access AAA services are used to control administrative access such as Telent or Console access to network devices – The packet mode access AAA services are used to manage remote user network access such as dialup clients or VPN clients T. A. Yang Network Security 2 c.f., Alternative methods to AAA • Examples: – Password-based authentication – Challenge-response authentication • Incomplete access management – Limited to authentication only T. A. Yang Network Security 3 Local vs Centralized Databases in AAA Features Local dB Centralized dB In a central authentication server (remote to the device) Location of user data local on the device Copies of user data Multiple copies (one per device) Single copy Scalability Poor (Given a change, each copy needs to be updated.) Good Single-point failure ? Depends (possibly no) Yes Recommended ? Only for very small networks Yes (especially for larger networks) Network Security 4 T. A. Yang Authentication Protocols in AAA • RADIUS vs TACACS+ • RADIUS – – – – – Remote Authentication Dial In User Service An IETF standard (RFC 2865) Open source s/w Interoperability among RADIUS-based products Client/server authentication btwn a NAS (e.g., a router) and a RADIUS server • A shared secret btwn the client and the server – on UDP (port 1812 for authentication and authorization; port 1813 for accounting) T. A. Yang Network Security 5 RADIUS T. A. Yang • RFC 2865 (2000): http://www.ietf.org/rfc/rfc2865.txt Network Security 6 The Authenticator field • Request Authenticator – The authenticator in the Access-Request packets – Rqts: The value SHOULD be unpredictable and unique over the lifetime of a shared secret • Repetition of a request value in conjunction with the same secret would permit an attacker to reply with a previously intercepted response. • Response Authenticator – The authenticator in the Access-Accept, Access- Reject, and Access-Challenge packets – ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) T. A. Yang Network Security 7 RADIUS • http://www.cisco.com/en/US/tech/tk59/technologi es_tech_note09186a0080094e99.shtml • Example Clients: router, switch, PIX/ASA, VPN3000 • The AccessRequest: contains username, encrypted password, NAS IP address, NAS port number, and session information. T. A. Yang Network Security 8 RADIUS authentication • Note: Both authentication and authorization information are combined in a single Access-Request packet. • Upon receiving an Access-Request, the RADIUS server 1. Validates the shared secret 2. Validates the username and password If not validated, sends an Access-Reject response; 3. Authorizes the user If authorization fails, sends an Access-Reject response; Otherwise, sends an Access-Accept response; T. A. Yang Network Security 9 Security mechanisms in RADIUS • Shared secret btwn the client and the server • In the Access-Request packet, the password is encrypted. MD5 (shared secret + Request Authenticator) XOR the-first-16-octets-of-the-password 16-octet encrypted password • Q: How would the RADIUS server authenticate the encrypted password? T. A. Yang Network Security 10 TACACS+ • TACACS: Terminal Access Controller Access Control System • A Cisco proprietary client/server authentication protocol • A shared secret btwn the client & the server • Can encrypt the entire body of the packet (as indicated by the flags field) • On TCP T. A. Yang Network Security 11 TACACS+ • http://tools.ietf.org/html/draft-grant-tacacs-02 T. A. Yang Network Security 12 TACACS+ • Example interactions: http://www.cisco.c om/en/US/tech/tk5 9/technologies_te ch_note09186a00 80094e99.shtml T. A. Yang Network Security 13 TACACS+ vs RADIUS • Shared: – Client/server based – Authentication btwn a NAS and an authentication server – Shared secret • Differences ? T. A. Yang Network Security 14 TACACS+ vs RADIUS source: http://etutorials.org/Networking/network+management/Part+II+Implementations+on+the+Cisco+Device s/Chapter+9.+AAA+Accounting/High-Level+Comparison+of+RADIUS+TACACS+and+Diameter/ Criterion TACACS+ RADIUS Transport TCP (reliable; more overhead) UDP (unreliable; higher performance) Authentication Can be separated (more and Authorization flexible) Combined Multiprotocol Support IP only Supported (IP, Apple, NetBIOS, Novell, X.25) Supports two methods to Access to Router control the authorization of CLI Commands router commands on a peruser or per-group basis Not supported T. A. Yang Encryption Passwords only Network Security Packet payload 15