120 likes | 271 Views
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | ondrej@ sevecek.com | www.sevecek.com |. Smart Card and Certificate Logon. Smart card logon. Motivation Kerberos smart card logon vs. TLS client certificate authentication CA requirements
E N D
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | ondrej@sevecek.com | www.sevecek.com | Smart Card and Certificate Logon
Smart card logon • Motivation • Kerberos smart card logon vs. TLS client certificate authentication • CA requirements • Certificate requirements • Enrollment agents
Motivation • Passwords shorter than 12 chars are insecure • Can be cracked from • AD, local databases, password caches, NLTM and Kerberos traffic, LDAP simple bind, stored passwords, … • Windows passwords are MD4 • Certificates are SHA-1 or SHA2 • random keys, not transported easily without smart cards
SHA-1 problems • General brute-force attack at 2^80
Windows passwords • 8 characters password? • 80^8 possible passwords • 2^x = 80^8 ?? • x * log 2 = 8 * log 80 • x = 8 * log 80 / log 2 • x ~= 51 • 10 characters ~= 2^63 • 12 characters ~= 2^76
Kerberos vs. TLS • Kerberos TGT generation • password • PKINIT with certificate • TLS client certificate logon • require client certificate • prevents before-authentication attacks
CA requirements • Trusted • NTAuth trusted • CRL/OCSP available
Certificate Requirements • Domain Controllers • name of the domain • Smart Card Logon + Kerberos Authentication • User certificates • Kerberos PKINIT: Smart Card Logon • TLS client certificate auth: Client Authentication
Enrollment Agent • aka Registration Authority (RA) • Generates requests signed by its own RA certificate • AD CS can apply more granular policies
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | ondrej@sevecek.com | www.sevecek.com | Smart card and certificate logon Thank you!