200 likes | 409 Views
Windows and Smart Card Logon. Ing. Ondřej Ševeček | GOPAS a.s. | MC S M:Directory | MVP:Enterprise | CEH | MCSE:Windows2012 ondrej@sevecek.com | www.sevecek.com |. GOPAS: info@gopas,cz | www.gopas.cz | www.facebook.com/P.S.GOPAS. Certificate logon. Motivation
E N D
Windows and Smart Card Logon Ing. Ondřej Ševeček | GOPAS a.s. | MCSM:Directory | MVP:Enterprise| CEH | MCSE:Windows2012 ondrej@sevecek.com | www.sevecek.com | GOPAS: info@gopas,cz| www.gopas.cz | www.facebook.com/P.S.GOPAS
Certificate logon • Motivation • Kerberos smart card logon vs. TLS client certificate authentication • CA requirements • Certificate requirements • Enrollment agents
Assumption • We are as secure as possible on Windows with standard Ethernet • no LM hashes • no plaintext passwords • no intrusion detection • Kerberos where possible • NTLMv2 if a must
Motivation • Passwords shorter than 12 chars are insecure • Can be cracked from • AD, local databases, password caches, NLTM and Kerberos traffic, LDAP simple bind, stored passwords, … • Windows passwords are MD4 • cracking, Rainbow tables • Certificates are SHA-1 or SHA2 • random keys, not transported easily without smart cards
SHA-1 problems • General brute-force attack at 2^80
Windows passwords • 8 characters password? • 80^8 possible passwords • 2^x = 80^8 ?? • x * log 2 = 8 * log 80 • x = 8 * log 80 / log 2 • x ~= 51 • 10 characters ~= 2^63 • 12 characters ~= 2^76
Cracking 8 characters passwords • single CPU in Cain • 25 years • 10 low-end GPUs in Distributed Password Recovery • days • Rainbow table • minutes • 576 GB
Kerberos • Rainbow tables inefficient due to salting • NTLMv2 as well • Can use smart cards • Armoring on Windows 8/2012 • Better services such as delegation, compound authentication, claims • Newer algorithms • AES
Kerberos vs. TLS • Kerberos TGT generation • password • PKINIT with certificate • TLS client certificate logon • require client certificate • prevents before-authentication attacks
CA requirements • Trusted • NTAuth super-trusted • CRL/OCSP available
CA best practices • Do not bother with hierarchy and offline roots • May be on a DC • the same threat and security level • Always make CRL available on public DNS • could be made internet accessible in the future
Certificate requirements • Domain Controllers • name of the domain • Smart Card Logon + Kerberos Authentication • User certificates • Kerberos PKINIT: Smart Card Logon • TLS client certificate auth: Client Authentication
Enrollment Agent • aka Registration Authority (RA) • Generates requests signed by its own RA certificate • AD CS can apply more granular policies
Thank you! ondrej@sevecek.com | www.sevecek.com | GOPAS: info@gopas,cz| www.gopas.cz | www.facebook.com/P.S.GOPAS
Pripravované konferencie, semináre Raňajky na tému: 11.11. 2013 To najdôležitejšie o TLS a SSL na Windows – Ondřej Ševeček ShowIT 2014 11.-13.02.2014 Technická IT konferencia 60 prednášok Novinky z oblasti BackOffice, Development a Security Perlička: EthicalHacking Prekvapenie: moderovaný speaker panel