21.03.2013 Views

Problem - Kevin Tafuro

Problem - Kevin Tafuro

Problem - Kevin Tafuro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution<br />

The correct method depends on your needs. When a server needs to be authenticated,<br />

and the client does not, SSL/TLS is a popular solution. When mutual authentication<br />

is desirable, there are a whole bevy of options, such as tunneling a traditional<br />

protocol over SSL/TLS or using a dedicated protocol. The best dedicated protocols<br />

not only perform mutual authentication but also exchange keys that can then be<br />

used for encryption.<br />

Discussion<br />

An authentication factor is some thing that contributes to establishing an identity.<br />

For example, a password is an authentication factor, as is a driver’s license. There are<br />

three major categories of authentication factors:<br />

Things you know<br />

This category generally refers to passwords, PIN numbers, or passphrases. However,<br />

there are systems that are at least partially based on the answers to personal<br />

questions (though such systems are low on the usability scale; they are<br />

primarily used to reset forgotten passwords without intervention from customer<br />

service people, in order to thwart social engineering attacks).<br />

Things you have<br />

ATM cards are common physical tokens that are often implicitly used for<br />

authentication. That is, when you go to an ATM, having the card is one factor in<br />

having the ATM accept who you are. Your PIN by itself is not going to allow<br />

someone to get money out in your name.<br />

Things you are<br />

This category generally refers to biometrics such as fingerprints or voice analysis.<br />

It includes things you have that you are not going to lose. Of course, an<br />

attacker could mimic your information in an attempt to impersonate you.<br />

No common authentication factors are foolproof. Passwords tend to be easy to<br />

guess. While cryptography can help keep properly used physical tokens from being<br />

forged, they can still be lost or stolen. And biometric devices today have a significant<br />

false positive rate. In addition, it can be simple to fool biometric devices; see http://<br />

www.puttyworld.com/thinputdeffi.html.<br />

In each of these major categories, there are many different technologies. In addition,<br />

it is easy to have a multifactor system in which multiple technologies are required to<br />

log in (supporting the common security principle of defense in depth). Similarly, you<br />

can have “either-or” authentication to improve usability, but that tends to decrease<br />

security by opening up new attack vectors.<br />

Choosing an Authentication Method | 363<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!