21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter CHAPTER 8 8<br />

Authentication and Key Exchange<br />

At first glance, it may not be clear that authentication and key exchange are two topics<br />

that go together. But they do. This chapter is really all about secure connection<br />

establishment—everything the client and server need to do before they start talking.<br />

Generally, the server will need to authenticate the client; the client will need to make<br />

sure the server is the correct machine (not some attacker). Then the two parties will<br />

need to come to some agreement on how to communicate securely beyond that, also<br />

agreeing on an encryption key (or a set of keys).<br />

Yes, authentication doesn’t always happen over an insecure network connection—it<br />

is certainly possible to authenticate over a console or some other medium where network<br />

attacks pose little to no risk. In the real world, however, it’s rare that one can<br />

assume a secure channel for authentication.<br />

Nonetheless, many authentication mechanisms need some kind of secure channel,<br />

such as an authenticated SSLconnection, before they can offer even reasonable security<br />

levels.<br />

In this chapter, we’ll sort through these technologies for connection establishment.<br />

Note that in these recipes we cover only standalone technologies for authentication<br />

and key exchange. In Chapter 9, we cover authentication with SSL/TLS, and in<br />

Chapter 10, we cover authentication in the context of public key infrastructures<br />

(PKI).<br />

8.1 Choosing an Authentication Method<br />

<strong>Problem</strong><br />

You need to perform authentication, and you need to choose an appropriate method.<br />

362<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!