CHAPTER 1: INTRODUCTION
Everything old is new again
Existing information-security technologies and processes often resemble historical methods to provide confidentiality, integrity and availability.
In the Middle Ages, the use of castle walls, gates, and drawbridges allowed for certain people to come or go only as desired by those in charge. Today, a firewall ensures that data can only enter or leave specific network ports as defined by configured filtering-rule sets. Similarly, Julius Caesar utilised primitive cryptography thousands of years ago to transmit instructions and guidance to his Roman army. While cryptography still has its place among military engagements, it also helps us protect everything from our private photos to credit card numbers for online shopping.
Authentication is no different, with a rich history of methods proving that you are who you say you are before certain privilege or authorisation is granted.
If youâve ever seen a signet ring, you may have been intrigued that it could provide a means to ensure that a document was sealed by a certain party whose ring symbol you knew of. What if you received a letter from a person that was sealed with a signet ring and then met them in person? Would presenting their ring as proof of identity satisfy you? What if the letter they had sealed included information about a scar on their face and a code word theyâd say to you upon first meeting?
Within authentication security, the method to prove identity breaks down into three âfactor classesâ, each with their own pros and cons. The previous example involving the signet ring and letter actually encompasses all three of the factor classes rather succinctly.
1 The signet ring represents âwhat you haveâ.
2 The facial scar represents âwhat you areâ.
3 The code word represents âwhat you knowâ.
Today, authentication factor classes are better represented by a slightly more tech-forward list:
1 A smartphone represents âwhat you haveâ.
2 A fingerprint represents âwhat you areâ.
3 A password represents âwhat you knowâ.
The capabilities afforded to us by modern technology provide a wealth of means to handle our existing factor classes in new ways. As youâll read, this opens up exciting possibilities for authentication security as weâve known it for decades.
Youâve been using two-factor for years
For the majority of people worldwide, passwords and personal identification numbers (PINs) are how users authenticate themselves to systems and services in their daily lives. These values are representative of the âwhat you knowâ factor class. Much like a predetermined code word, a password is really an agreement between a system and a user that, each time they âmeetâ, the password will validate that the user coming back to the system is who they claim to be.
However, if youâve used an ATM or bought something with a debit card, youâve actually engaged in using two-factor authentication. By possessing the debit card (what you have) and typing a PIN (what you know), youâve utilised two factor classes for one authentication process.
Mixing factor classes leads to better security because itâs unlikely that a criminal could compromise both authentication mechanisms. Imagine if someone stole your wallet at a bar one night. They may now have your debit card (something you had), but without the PIN (something you know) they are unable to withdraw funds. If, one day, someone saw your PIN over your shoulder as you entered it into an ATM, they may know that value but still not have the card they need to present to the machine.
Since the ATM security we know today was patented back in the 1960s, it would seem reckless if the banking industry took away one of those factors of authentication to access your financial accounts. Amazingly, though, the majority of people who have used online banking for decades still wield only a password as their means to achieve the same goal.
Many of the technologies we use today (like online banking), have grown organically as capabilities to provide advanced functions to customers have become more realistic. Indeed, 15 years ago there were few cheap, reliable, easy-to-use and efficient means for two-factor authentication to be added to everyoneâs online banking experiences. As a result, weâre now seeing financial institutions play catch-up in the digital world to gain parity with their physical banking counterparts.
Authentication securityâs naming problem
One of the biggest issues with authentication security is the inability of the industry to name the technology clearly and concisely. Further, even well informed technologists and companies quite often use authentication security terms incorrectly, leading to unnecessary confusion. This point is well noted by the usage of so-called âsecurity imagesâ.
Security images are really a staple of the online financial industryâs attempt to provide additional protection to customer accounts without frustrating their users. Typically, a customer will select an image from a list of perhaps twenty that will be shown to them upon logging into their account. The usage of that image, however, is often conflated with the wrong type of security focus.
A security image can actually provide a benefit to customers by appearing when they are prompted to type their username and password into a site. If a user doesnât see their specific image shown, they can be implicitly warned that a criminal may be attempting to steal their credentials through the usage of a fraudulent website. Unfortunately, this security benefit is often used incorrectly by treating it as a âsecond factorâ, which it most certainly is not.
Remember, two-factor authentication requires two different factor classes to be used for one authentication transaction. A password is something the banking customer knows â and so is the security image. As a phishing-mitigation technique, security images may suffice, but do not accomplish the goals of two-factor authentication. While two steps from the same factor class isnât necessarily bad, itâs not as secure as using two factor classes.
This leads us into the other aspect of naming that goes sideways for people: âI thought two-factor authentication was called [insert phrase or acronym] instead!â Hereâs a quick breakdown:
⢠Two-factor authentication: use of two factor classes to provide authentication. This is also represented as â2FAâ and âTFAâ.
⢠Multi-factor authentication: use of two or more factor classes to provide authentication. This is also represented as âMFAâ.
⢠Two-step verification: use of two independent steps for authentication that might not involve two separate factor classes. This is also represented as â2SVâ.
⢠Strong authentication: authentication beyond simply a password. May be represented by the usage of âsecurity questionsâ, or could be layered security like two-factor authentication.
Factor classes, when used together, are often referred to as primary and secondary methods of authentication. This book will typically discuss the secondary form of authentication used and implies that a password or PIN is the primary method. While certain facilities, government agencies or even corporations may not use a âwhat-you-knowâ factor in their authentication process, most readers will likely do just that for the foreseeable future.
Looking down a road to greater adoption
I would suspect that many readers of this book have been using computing technologies for perhaps decades and likely had little to no interaction with two-factor authentication up to this point. The reason for this could vary wildly, but one reason is that unless your employers made you use it, few people would ever think that they could or should use such a level of authentication security for their day-to-day activities. Part of this reasoning goes to the fact that, until rather recently, the cost and complexity of deploying and using methods in this technology space were very prohibitive for most peopleâs lives.
Technologies best known to existing users of two-factor authentication will likely be hardware-based. Thatâs to say, their second factor would be âwhat you haveâ, such as a hardware token that would generate a one-time password (OTP) value. These devices typically range between US$25 and US$100, and for a business that you were a customer of, itâs unlikely they would just give them out to everyone (for free, anyway). Further, even if your financial institution or stock-trading company offered you one, you may have been annoyed at the prospect of having to carry a device on your keyring or in your wallet to log in online.
These two points (cost and end-user frustration) have unfortunately been traits of authentication security for decades. This isnât to say that successful authentication vendors were doing anything wrong, simply that technology was not yet at the level necessary to reduce the costs and complexity associated with making security applicable for most usersâ needs. Could you imagine the effort and cost of supplying the millions of customers of a multinational bank with hardware tokens? Taking on the overheads of purchasing, shipping, managing and supporting such an effort would be extremely unwise.
The road to adoption, while slow overall, has sped up within just the past decade due to technologies such as Cloud computing and smartphones, relieving much of the cost and complexity of widely deploying and managing a proper two-factor authentication solution. The addition of open standards for OTP generation has allowed vendors to build hardware that works on any number of platforms, helping to reduce cost and create more incentive for organisations to make the investment to buy devices they can use with a number of vendors.
As you learn more about the technologies, standards, risks and use cases of two-factor authentication throughout this book, be mindful to figure out what will work best for your needs. There are a wide variety of vendors, methods and implementation styles available to complement the specific goals that you or your organisation have.
CHAPTER 2: RISKS TO ONE-FACTOR AUTHENTICATION
Our solutions are also our problems
Depending on your level of computing technology experience, you may be more or less familiar with three major models in architecture:
1 Mainframe computing
2 Clientâserver computing
3 Cloud-mobile computing
Each of these models represents a fundamental shift in the way computing architects leverage resources (memory, storage, processing power, etc.) and how those resources are made available to end-users.
In mainframe computing, the resources were highly centralised, with perhaps a couple of large machines that would allow many users to access them and share resources. A clientâserver model, however, shifted much of the computing resources and effort down to individual workstations for users, while offsetting server needs down to a minimal amount â usually focused on data storage and file sharing. Lastly, and most recently, the era of Cloud-mobile has decentralised computing to the point where a service may be entirely separate from the architecture of the business using it. Today, the Cloud-mobile era that allows the two-factor authentication market to prosper has also made the need for such authentication all the more real.
Networks in mainframe and clientâserver models were often tied to private and highly restricted networks that afforded a sense of security to the data and services behind firewalls and intrusion prevention systems. Similar to the castle walls we spoke of previously, these older models of computing architecture were predicated on keeping bad people out and good data in. However, once an attacker breaks through these walls, many of these networks are soft and malleable to those wishing to do harm. This reality is even more concerning when you consider organisations are moving their data, processing power and even their email into âthe Cloudâ.
Companies like Google and Salesforce.com are stunning examples of how meaningful Cloud computing can be for big businesses, universities, and other entities that want to solve large-scale problems, but not take on the responsibility of managing their own servers, data centres and software updates. It also shouldnât come as a shock that both of these companies offer two-factor authentication to protect sensitive data from criminals who wish to steal it.
Attacking password-only security
On 18 December 2013, journalist Brian Krebs released information on his website that stated that retailer Target had been bre...