Page 43 - StudyBook.pdf
P. 43

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  27

                    To summarize, multi-factor authentication is more secure than other methods,
                 because it adds steps that increase the layers of security. However, this must be bal-
                 anced against the degree to which it inconveniences the user, since this may lead to
                 improper use of the process.

                 Mutual Authentication

                 Mutual authentication is a process where both the requestor and the target entity
                 must fully identify themselves before communication or access is allowed.This can
                 be accomplished in a number of ways.You can share a secret or you can use a
                 Diffie-Hellman key exchange (see Chapter 9) that provides a more secure method
                 of exchange that protects the secret being used for the verification and authentica-
                 tion process.Another method that can be used for mutual authentication is the use
                 of certificates.To verify the identities, the CA must be known to both parties, and
                 the public keys for both must be available from the trusted CA.This is occasionally
                 used with SSL, where both the server and the client have certificates and each is
                 used to confirm the identity of the other host.
                    One area that uses the mutual authentication process is access of a user to a
                 network via remote access or authentication via a RADIUS server.This case
                 requires the presence of a valid Certificate to verify that the machine is the entity
                 that is allowed access to the network. For instance, early implementations of
                 Windows-based RAS servers had the ability to request or verify a particular tele-
                 phone number to try to verify the machine location.With the development of call
                 forwarding technologies, however, it became apparent that this was no longer satis-
                 factory. Mutual authentication allows you to set secure parameters and be more
                 confident that communication is not being intercepted by a Man-in-the-Middle
                 (MITM) attacker (see Chapter 2 and Chapter 9) or being redirected in any way.
                    Mutual authentication provides more secure communications by positively
                 identifying both sides of a communication channel. However, it is often difficult or
                 costly to implement.An example of this is in the online banking industry. Online
                 banks use SSL certificates to confirm that the site the customer is communicating
                 with is indeed the site they are expecting.With mutual authentication, this confir-
                 mation would be expanded so that the online banking site is certain that the user
                 accessing an account is actually who they say they are. Setting up mutual authenti-
                 cation in this manner would involve requiring each user to obtain a certificate
                 from a CA trusted by the online bank. Instructing the user on how to accomplish
                 this would be a daunting task.And what if they need to access their account from a
                 different system? If the certificate is based off of their home computer, they may




                                                                              www.syngress.com
   38   39   40   41   42   43   44   45   46   47   48