<<

Solution Brief : Two-Factor Authentication

Place graphic in this box

Challenges The Password as you Know it is Dead: • With recent increases in processing power and the ability Welcome to the World of Two-Factor Authentication to outsource password cracking to the cloud, password-only based authentication is no longer In 2012, researchers at Fortinet’s FortiGuard Labs published a report that sufficient to secure your critical predicted a marked increase in businesses migrating to two-factor authenti- data. cation in 2013. Three months into the New Year, after a data breach forced • There are currently four ways the company to reset 50 million of its users’ passwords, Evernote announced to manage passwords, none of plans to adopt two-factor authentication as a better means of securing its which are completely infallible. This necessitates the need for users’ data. Other companies that have also recently made that transition businesses to investigate multiple include Amazon, Apple, Dropbox, eBay, Facebook, Google and Microsoft. factors of authentication.

Objectives According to TechNavio, the global two-factor authentication market is • Understand the multiple factors expected to grow 20.8% between 2011-2015 (1). According to Markets and of authentication available today, Markets, the multi-factor authentication market will reach $5.45 billion by the pros and of each and 2017(2). Finally, Fortinet’s FortiAuthenticator platform, which complements determine the best ones to the FortiToken range of two-factor authentication tokens for secure remote choose for your environment and unique business requirements. access, has recently seen triple digit growth.

Implementing two-factor authentication Why Single Factor Authentication is Doomed lets you solve network authentication security problems affordably by adding “In the early days of authentication, plain text passwords were often a second factor for strong authentica- sufficient, as the number of threat vectors were minimal and processing tion. You cannot always trust your us- horsepower and password repositories weren’t readily available to just ers with your network security. Relying anyone,” said Richard Henderson, security strategist and threat researcher solely on static passwords for remote for Fortinet’s FortiGuard Labs. “As newer password cracking tools, faster access to your VPN and web sites processors and always-on Internet connections arrived, plain text passwords provides only weak authentication, started to come under fire. With the advent of cloud cracking services, such because your users’ passwords are as Cloud Cracker, which leverages the power of distributed , 300 vulnerable to theft or guessing, as well million password attempts can be made in as few as 20 minutes for around as dictionary and brute-force attacks. www.fortinet.com 1 Solution Brief : Two-Factor Authentication

$17, meaning even a strong, encrypted password to utilize the incredible power in today’s CPUs can be cracked with a little patience.” means that it’s likely just a matter of when and not There are basically four ways to manage network if these types of encryption of passwords fall. Keep passwords today and none of them are invulnerable in mind that given enough time and resources, no on their own: type of password encryption is infallible.” 1. Plain Text: This is the weakest method of password management, because if an attacker Adding Another Factor of Authentication manages to steal a plain text password file, the Two–factor authentication, also referred to as multi- passwords of the server’s user accounts can be factor authentication, strong authentication and easily swiped. The Australian Tax Office (ATO), The 2-step verification, consists of two of the following UK’s Government Communications Headquarters three methods of authentication: (GCHQ) and retailer Tesco are all recent examples of companies that have been breached and • Something a user “knows:” This can be a subsequently admitted to storing their passwords password, challenge question or finger swipe in plain text. movement over the face of a mobile device. This is commonly known as a knowledge factor. 2. Basic Encryption: This approach encrypts and stores an individual password (known as a • Something a user “has:” This can consist of a small “hashed” file). However, a stolen file that’s been hardware device, such as a smart card, USB key fob hashed once really isn’t that much more secure or a keychain dongle or a smartphone token, which than storing the password in plain text. Advances in generates a unique one-time password that’s sent CPU speeds and the availability of new password to or generated by an application on a user’s mobile cracking software and both lookup and rainbow phone. This is known as a possession factor. tables (precalculated tables of values that can be • Something a user “is:” This typically involves cross-referenced) means that it’s only a matter of a biometric reader that detects something that computing resources and time before most hashed validates something uniquely personal, such as a password files are broken open. fingerprint, iris or voice. This type of authentication 3. Random String Encryption: This adds a is known as an inherence factor. random string to each password and then encrypts The following user authentication options represent that value, which prevents an attacker from storing a few the most popular solutions available today tables of precalculated values and looking for along with a few of their pros and cons. matches (this is known as a “salted hash”). Salted Passwords hashes aren’t infallible, though: if the salt used is too short, or if the same salt has been used to salt The best thing about a password is that it’s all passwords, then it’s possible to crack them open something a user knows or is easily remembered. relatively easily. It’s the easiest (and least expensive) authentication option to implement from an IT perspective and 4. Multiple Encryption Passes: This refers to the a user doesn’t need to possess an extra piece of ability to encrypt an already encrypted value. The hardware in their pocket or wallet. On the other process, also referred to as “stretching,” enables hand, if a password is not complex enough, it can a value to be encrypted multiple times. However, be easily guessed. If it’s too complex, it could be there is much debate about whether this greatly forgotten. If a computer has been compromised improves security or not. with a botnet using a key logger, any password “Salted hashes and stretches are more secure is easily swiped. Managing multiple passwords than plain text or encrypted passwords for the time for multiple Websites is cumbersome. Software being,” Henderson continued. “However, the ability 2 www.fortinet.com Solution Brief : Two-Factor Authentication password crackers can crack simple passwords Smartphone Tokens in minutes and cloud cracking services can crack Smartphone tokens are a lot like hardware tokens complex passwords in a few hours. except that the authentication password is sent Smart Cards to or generated by an application on the user’s There are two types of smart cards (memory and mobile phone. The benefit to this approach is microprocessor). The advantages of these cards that a user doesn’t need to carry around an are that their small, thin form factor makes them extra piece of hardware in their wallet or pocket. easy to carry around in a Like hardware tokens, wallet or a pocket, and they’re more secure than they can store a user’s passwords, and there’s identity and PIN. The cons no need for a user to are that they require a remember complex reader on the computing passwords. However, device, those readers like hardware tokens, could conceivably be smartphone tokens are compromised, the not impenetrable against cards must be issued hackers. FortiGuard Labs and tracked, they can has studied instances of be easily lost, stolen or the Zitmo Android botnet shared, they must be in watching for two-factor a user’s possession to authentication codes Fortinet’s FortiToken-200 Provides Hardware-Based and sharing them with access the computing Authentication for Your Network device, it becomes a command and control locked after a number of bad attempts, and the server. card can break. Biometrics Hardware Tokens There are two types of biometric user authentication: Like smart cards, hardware tokens have many physiological includes fingerprint, facial, iris, retina of the same pros and cons. Hardware tokens and hand geometry scans and behavioral includes are more secure than passwords and more voice recognition, gates, keystroke/signature scans. secure than smartphone tokens, as they’re less The main advantage to biometric authentication is susceptible to key logging hacks or other forms that authentication is coded to an individual, so of malware designed to steal authentication there’s no need to remember a complex password credentials; they can be used for login and or carry another hardware device. On the other transaction authentication and users don’t have to hand, these types of measurements are based on remember complex passwords. On the other hand, patterns and patterns hardly ever match precisely, hardware tokens come at an additional cost (for the which opens possibility for false positives and dongle itself as well as any additional software and false negatives. A pattern recognition that is too hardware needed to manage the authentication), lax could allow the wrong user into a system. One they must be in the possession of the user at login, that’s too strong could prevent a legitimate user multiple tokens may be required to access multiple from accessing a system. Websites. Hardware tokens can be hacked though, as was the case with RSA’s SecurID back in 2011. Two-Factor Authentication Best Practices Protecting sensitive data online by using multiple www.fortinet.com 3 Solution Brief : Two-Factor Authentication

factors of authentication is the best policy for How much work will it take for initial setup and ensuring the safety and integrity of data. However, roll-out? when matching authentication methods to your Integration with the existing software needs, don’t assume that any two methods will platform: will the solution “drop-in” into your work for your particular purpose. existing infrastructure? Will any custom software It should be noted that, while two-factor development be required to integrate the solution? authentication can offer greater protection, Ability to meet security requirements/regulatory there are two types of attacks (masquerade and compliance: does your line of business or session hijacking) that can undermine any type industry have any unique regulatory or reporting of authentication. A masquerade attack is exactly requirements that may require a certain type of what it sounds like: an attack that’s able to assume implementation? Will choosing a specific solution a falsely-claimed digital identity and thus bypass meet those requirements? the authentication mechanism. Session hijacking, also known as TCP session hijacking, happens The security of the tool itself: is the encryption when an attacker surreptitiously obtains a session algorithms used strong enough for your needs? ID and takes control of an already authenticated Vendor support: what sort of support or assistance session. It’s important to note that no two-factor can you expect from the developer of your solution? authentication strategy can protect against a session hijack – ensuring all data is transmitted Cost: what’s the per-user cost to implement? using SSL and HTTPS will help mitigate the chances Maintenance contracts? Additional costs to support of session hijacking taking place. the implementation at the Help Desk? One important thing to keep in mind when planning Future flexibility: will upgrades be available? out an authentication strategy: some types of two-factor authentication are stronger than Two-factor authentication is an idea that is ready others. In some cases, even a single factor may for wide-scale adoption. At FortiGuard, we believe be inherently more secure than some two-factor the best way to keep a network and its users safe implementations: a scan of the veins in a user’s is to use technologies like two-factor authentication hands will be more secure than a simple password as part of a multi-layered security strategy. Adding and one-time password card. two-factor authentication provides another layer of solid protection on top of any current security Before You Buy infrastructure. Some factors you want to consider before Footnotes: purchasing a solution to implement two-factor (1):http://www.prbuzz.com/technology/95904-new-research-on- two-factor-authentication-market. authentication: (2):http://www.marketsandmarkets.com/PressReleases/multi- The tool’s ease of use: How hard is it going to be factor-authentication.asp to train your IT staff in its day-to-day operation?

GLOBAL HEADQUARTERS EMEA SALES OFFICE APAC SALES OFFICE LATIN AMERICA SALES OFFICE Fortinet Inc. 120 rue Albert Caquot 300 Beach Road 20-01 Prol. Paseo de la Reforma 115 Int. 702 1090 Kifer Road 06560, Sophia Antipolis, The Concourse Col. Lomas de Santa Fe, Sunnyvale, CA 94086 France Singapore 199555 C.P. 01219 United States Tel: +33.4.8987.0510 Tel: +65.6513.3730 Del. Alvaro Obregón Tel: +1.408.235.7700 Fax: +33.4.8987.0501 Fax: +65.6223.6784 México D.F. Fax: +1.408.235.7737 Tel: 011-52-(55) 5524-8480 www.fortinet.com/sales

Copyright© 2013 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herein were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any guarantees.4 Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. www.fortinet.com