Page 173 - StudyBook.pdf
P. 173

Communication Security: Remote Access and Messaging • Chapter 3  157

                 RAS authenticates a user, which means they determine who a user is.A RAS also
                 authorizes the functions the authenticated user may perform.A RAS logs the
                 actions of the user for the duration of the connection. RADIUS was designed to
                 handle the authentication and authorization of dial-in users.
                    RADIUS is the most popular of all the AAA servers, which include RADIUS,
                 TACACS,TACACS+, and DIAMETER.TACACS is another RAS developed
                 during the days of ARPANET.Although TACACS offers authentication and autho-
                 rization, it does not offer any accounting tools.TACACS+ is a proprietary version
                 of TACACS that was developed by Cisco.TACACS+ is considered proprietary
                 because the packet formats are completely different from those in either TACACS
                 or XTACACS, making it incompatible with previous versions.TACACS+ is cred-
                 ited with separating the AAA functions. Unlike previous versions (as well as
                 RADIUS) that used one database for AAA,TACACS+ uses individual databases for
                 AAA.TACACS+ was the first revision to offer secure communications between the
                 TACACS+ client and the TACACS+ server.Another difference between RADIUS
                 and TACACS is that TACACS+ uses TCP as its transport instead of UDP.
                    Another tool that can be used to secure remote communications is SSH. SSH is
                 a cryptographically secure replacement for standard Telnet, rlogin, RSH, and RCP
                 commands. It consists of both a client and server that use public-key cryptography
                 to provide session encryption. It also provides the ability to forward arbitrary ports
                 over an encrypted connection. SSH is concerned with the confidentiality and
                 integrity of the information being passed between the client and the host. Using
                 SSH helps protect against many different types of attack, including packet sniffing,
                 IP spoofing, and the manipulation of data by unauthorized users.
                    There are several vulnerabilities that can be exploited in RAS. Eavesdropping
                 occurs when an attacker simply attaches themselves to a network in a manner that
                 allows users to “hear” all of the traffic being passed over the wire. In data modifica-
                 tion, data is intercepted by a third party (one that is not part of the initial commu-
                 nication), modified, and sent through to the originally intended recipient. In an IP
                 spoof attack, a hacker will listen on a public network (such as the Internet) and
                 examine packets until they believe they have found a trusted host that is allowed to
                 pass data through the firewall. Once the hacker finds this address, they can begin
                 creating packets and sending them to the target network as if from a trusted
                 address. Users who write passwords on sticky notes and put them on their monitor,
                 leave their workstation without locking it with a screensaver, or allow other people
                 to watch while they are entering their usernames or passwords, are often the easiest
                 victims of these attacks.




                                                                              www.syngress.com
   168   169   170   171   172   173   174   175   176   177   178