Page 38 - StudyBook.pdf
P. 38

22     Chapter 1 • General Security Concepts: Access Control, Authentication, and Auditing

                 CHAP is used to periodically verify the identity of the peer using a three-way
             handshake.This is done upon initial link establishment, and may be repeated any-
             time after the link has been established.

                  1. After the link establishment phase is complete, the authenticator sends a
                      “challenge” message to the peer.

                  2. The peer responds with a value calculated based on an ID value, a random
                      value, and the password using a “one-way hash” function such as MD5.
                  3. The authenticator checks the response against its own calculation of the
                      expected hash value. If the values match, the authentication is acknowl-
                      edged; otherwise the connection should be terminated.

                  4. At random intervals, the authenticator sends a new challenge to the peer,
                      and repeats steps 1 to 3.
                 CHAP operates in conjunction with PPP to provide protection of the creden-
             tials presented for authentication, and to verify connection to a valid resource. It
             does not operate with encrypted password databases, and therefore is not as strong a
             protection as other levels of authentication.The shared secrets may be stored on
             both ends as a cleartext item, making the secret vulnerable to compromise or
             detection. CHAP may also be configured to store a password using one-way
             reversible encryption, which uses the one-way hash noted earlier.This provides
             protection to the password, because the hash must match the client wishing to
             authenticate with the server that has stored the password with the hash value.
             CHAP is better than Password Authentication Protocol (PAP), however, since PAP
             sends passwords across the network in cleartext.

             Certificates

             Certificates are created by a trusted third party called a Certification Authority (CA),
             which may also be called a Certificate Authority. CAs are systems that create, dis-
             tribute, store, and validate digitally created signature and identity verification infor-
             mation about machines, individuals, and services.This CA may be a commercially
             available service point, such as Verisign or Thawte.A CA can also be created within
             an enterprise to manage and create certificates that are used only within an organi-
             zation or with trusted partners.A certificate from a reputable provider indicates that
             the server being accessed is legitimate. CAs may also grant certificates for software
             signing.This process indicates to the individual downloading the software that it has
             been manufactured or written by the specified individual or company.The path for




          www.syngress.com
   33   34   35   36   37   38   39   40   41   42   43