csci e-170 computer security, usability & privacy hour #1: passwords

34
CSCI E-170 CSCI E-170 Computer Computer Security, Security, Usability & Usability & Privacy Privacy Hour #1: Passwords Hour #1: Passwords

Upload: lincoln-poock

Post on 15-Dec-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

CSCI E-170CSCI E-170Computer Computer Security, Security,

Usability & Usability & PrivacyPrivacy

Hour #1: PasswordsHour #1: Passwords

Page 2: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

First, AdministriviaFirst, Administrivia• Homework:

– HW#3 (forensics) collected– HW#4 (hashing) assigned.

• Quiz #1:– November 9th

– Covers privacy policies, security policies, HCI usability, tempest, disk forensics, network security appliances, transactional privacy, physical security, passwords, biometrics, hashing, symmetric encryption, asymmetric encryption, MD5, SHA-1, DES, AES, RSA, Diffie-Helman, PEM, PGP, S/MIME.

Page 3: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

HW #3HW #3• Due today!• Please comment in class and on

website about what you learned.• Forensics would be a good final

project!

Page 4: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

HW #4HW #4• Assigned today.• Makes heavy use of MD5/SHA-1

– If you don’t know the basics of hashing, read WSCP Chapter 3 & Chapter 4.

• Easy to spend a lot of time on this. But you shouldn’t have to.

• Some programming is required. But not much. If you have a problem, please email the staff.

Page 5: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Identification, Authentication, Identification, Authentication, and Authorizationand Authorization

• Identification: – You give your name

• Authentication: – You’ve proven that it’s really you.

• Authorization:– We’ve looked your identity up in the database

and we know what you’re allowed to do.

• Most say “authentication” when they mean identification or authorization.

• You can authenticate without identifying.

Page 6: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Classical AuthenticationClassical Authentication• Something that you know

– password– pass phrases

• Something that you are– fingerprint– face print

• Something that you have– tokens– smartcards

}biometrics

Page 7: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Passwords: What are they good Passwords: What are they good for?for?

• Today passwords are the #1 means of authenticating users on a day-to-day basis.– Email, Websites, ATMs, Doors, Lockers,

etc.

• Password Recovery:– Challenge/response questions– Knowledge of previous transactions

Page 8: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

How many passwords do How many passwords do must you remember?must you remember?

Page 9: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Why the explosion of Why the explosion of passwords?passwords?

• Need to protect configuration information– BIOS passwords, VChip, Cell Phones, etc.

• Web services need persistent identification of users over time

• No national/international identification service

Page 10: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Alternatives to many Alternatives to many passwordspasswords

• Single-sign on:– Master password unlocks others– PKI: password unlocks private key

• Examples:– Microsoft Passport– Gnu Keyring

(gnukeyring.sourceforge.net)

Page 11: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Observed StrategiesObserved Strategies• “Low security” & “high security” passwords• Standard password that’s changed for every host

– password-ebay– password-paypall– password-fas

• Change password periodically– Every 3-6 months– (Problems if you don’t manage to change all of your

passwords.)

• Always use “password reset” and get emailed a password.

• Write passwords down

Page 12: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Anderson: 3 types of Anderson: 3 types of password concernspassword concerns

1. disclosure2. reliability to

enter3. ability to

remember

Page 13: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Concern #1: DisclosureConcern #1: Disclosure• Will the user break the system

security by disclosing the password to a third party, whether accidentally, on purpose, or as a result of deception?

Page 14: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Concern #2: Concern #2: Reliability to enterReliability to enter

• Will the user enter the password correctly with a high enough probability?

Page 15: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Concern #3: Concern #3: Ability to rememberAbility to remember

• Will users remember the password, or will they have to either write it down or choose one that’s easy for the attacker to guess?

Page 16: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Can you write down Can you write down passwords?passwords?class discussion

Page 17: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Can you write down these Can you write down these passwords?passwords?

Can you Can you remember them?remember them?

What if you hadWhat if you hadto remember 40 to remember 40 of them?of them?

http://gs2.sp.cs.cmu.edu/art/random/archive/archive_0104/

Page 18: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

A Password PolicyA Password Policy• “The root password for each machine shall

be too long to remember, at least 16 alpha and numeric characters chosen at random by the system;

• it shall be written on a piece of paper and kept in an envelope in the room where the machine is located;

• it may never be divulged over the telephone or used over the network;

• it may only be entered at the console of the machine that it controls.” [Anderson, p. 37]

Page 19: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Anderson’s Research Anderson’s Research Problems in Passwords:Problems in Passwords:

• What is the best way to enforce user compliance with a password policy?

• Can we design interactive password systems that are better?

• Can we use multiple passwords?– Mother’s maiden name– Password– Amount of last purchase– Dog’s nickname– Your favorite color…

Page 20: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Threats to PasswordsThreats to Passwords• What are the threats against passwords?

– Guessing– Brute force search– Shoulder surfing– Discovering passwords that are written down– Passwords collected at one website used for

another

• Kinds of attacks:– Offline– Online

Page 21: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Eavesdropping risksEavesdropping risks• Physical device --- key grabber• Trojan Horse• Tapped lines• Video Camera

… The need for trusted path

Page 22: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Kinds of Attacks:Kinds of Attacks:• Targeted attack on one account• Attempt to penetrate any account on

a system• Attempt to penetrate any account on

any system• Service denial attack

Page 23: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Protecting against Online Protecting against Online Attacks:Attacks:

• Defenses Against Guessing:– Exponential back-off– Lock out– Notification– “Cracking”

• Dangers of lock-out– Ebay doesn’t use it; why not?

Page 24: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Protecting against Offline Protecting against Offline AttacksAttacks

• What do you do?

Page 25: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Restricting PasswordsRestricting Passwords• Does it make sense to mandate symbols

and numbers in passwords? – # of letters: 52 (26 lower + 26 UPPER)– # of symbols: 30– # of 8 letter passwords: 528

– # of 7 character passwords with 1 symbol: (527)(30)(8)

– How about forcing 1 number and 1 symbol?• (526)(30)(8)(10)(7)

Page 26: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

More on restrictionsMore on restrictions• Different systems have different

restrictions.– Some require special characters– Some forbid special characters.

• Why?

Page 27: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Password Generating Password Generating AlgorithmsAlgorithms

• Multics generated passwords that were “easy to remember.”

• What’s wrong with giving advice on how to generate passwords?

• What’s the alternative?• Programmatically picking passwords

that are easy-to-remember

Page 28: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Developer Developer RecommendationsRecommendations

• Force users to change passwords regularly• Password != Username• Require 8 or more characters• Require a mix of alpha, numeric, and

special characters• Deny Access After a number of failed

Attempts• Do not send passwords “in the clear”• Do not assign “default passwords”• Overwrite passwords in memory as quickly

as possible

Page 29: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Restrictions on Passwords: Restrictions on Passwords: RecommendationsRecommendations

• 1-14 characters vs. 1-127 characters vs. 10-127 characters– Recommendation: Mandate minimums,

but allow people to type extra characters

– If you can’t handle a special character, change it to a character you can handle.

– ATM networks used to ignore all characters after first 4

Page 30: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Recommendations on Recommendations on Password Aging:Password Aging:

• What should we do?• Should we mandate password

changes?• Should we remember old passwords

and forbid them?

Page 31: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Case Sensitivity: Case Sensitivity: RecommendationsRecommendations

• Some passwords are case-sensitive; some are not.– If your passwords are not case-sensitive,

they must be longer.

• Check password with case-flipped for CAPS LOCK ON accident.

Page 32: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Password RecoveryPassword Recovery• What’s the best way to do it?• Automatic vs. Manual• “What is your favorite Color?”

Page 33: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Password Recovery: Password Recovery: RecommendationsRecommendations

• Send a link that expires quickly.• Specially log the IP address of the

browser that clicks the link. • Don’t send the password!

Page 34: CSCI E-170 Computer Security, Usability & Privacy Hour #1: Passwords

Web Password HashingWeb Password Hashing• Internet Explorer plug-in that sends a

hash of the password to every website.– Hash depends on your password &

remote website– Defeats phishing!

• http://crypto.stanford.edu/PwdHash/• http://crypto.stanford.edu/PwdHash/P

wdHash.ppt