building a one- time-password token infrastructure · centralized yet distributed no secrets on...

30
Building a One- Time-Password Token Infrastructure Jonathan Hanks & Abe Singer LIGO Laboratory

Upload: others

Post on 03-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Building a One-Time-Password Token

Infrastructure

Jonathan Hanks & Abe Singer

LIGO Laboratory

Page 2: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple
Page 3: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Distributed

Multi-Institution

International

Page 4: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Kerberos

Shibboleth

Grouper

Page 5: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Open Data

Time Critical

No Do-Overs

Remote Access

Single/Common sign-on

Page 6: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Credential Theft

Page 7: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Separate Credential

Non-Replayable

Not for everything

Page 8: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

One Time Passwords

Page 9: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

What does(n’t) OTP solve?

Page 10: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Time Based

Sequence Based

Challenge-Response

One Time Pad

Page 11: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Something you Have

What do(n’t) tokens solve?

Page 12: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Delivery

Rolf

Synchronization

Overhead

Integration

Failures

Page 13: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

One token to rule them all

Physical device

Trust No-one

Distributed, Fault tolerant

Open

Cheap

Page 14: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Custom Authentication Server

PAM

Yubikey

Kerberos

Page 15: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Why?

Ownership

Trust

Capabilities

Page 16: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Architectures

Page 17: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

DCC-Number Title

SP   Internet  

Auth  Server  

SP  

SP  

SP = Service Provider

Page 18: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

DCC-Number Title

SP   Internet   SP  

SP  

Auth  Server  

Auth  Server  

Auth  Server  

Page 19: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

DCC-Number Title

SP   Internet   SP  

SP  

SP  Auth  Server  

Auth  Server  

Page 20: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

DCC-Number Title

SP   Internet   SP  

SP  

SP  Auth  Server  

Auth  Server  

Page 21: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

DCC-Number Title

Architecture

Client

KDC

Service  Provider  

PAM

Auth. Server

Auth. Server

Auth. Server

Page 22: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Replication and Mitigating

Replay Attacks

Replication takes Time

Replicate Data w/o global

locks

Page 23: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Centralized yet Distributed

No Secrets on Endpoints

There can be only one

Modular, Abstracted

Page 24: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Provisioning Users

Make it simple

Make it safe

Page 25: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Supporting Users

Any auth scheme is a

hinderance

Just replace the token

Page 26: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Experiences / Problems

It Works

Tokens get out of sync

When good tokens go bad

Local Account Issues

Page 27: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Kerberos

Page 28: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

We like SSO

Cannot afford to support all

the client systems

Cannot wait for the OTP

extensions to reach end

users

Page 29: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Hijack encrypted timestamp

All kinits support this

No custom client SW required

Page 30: Building a One- Time-Password Token Infrastructure · Centralized yet Distributed No Secrets on Endpoints There can be only one Modular, Abstracted . Provisioning Users Make it simple

Questions?