Page 258 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 258
Wireless Networks
Notes 14.6 Security Policies
Most IT environments have some type of remote access. VPN, e-mail, and many other services
expose your user accounts to the world.
Proper password aging policies will naturally take care of old or unused accounts. The idea
behind password aging is that after a certain amount of time, a password expires. A password
is less prone to compromise if it is changed frequently. Likewise, if an account is compromised,
its usefulness will be limited to the amount of time left before the expiry timer concludes. Aging
account passwords can reduce exposure if brute-force, social engineering, or sniffing attempts
are successful.
The strength of the password itself is also extremely important. It is imperative that the systems
requiring users to change their passwords also enforce some level of strictness with regards
to what passwords are accepted. An un-guessable password makes brute-force attacks—the
premiere method by which accounts are compromised—mostly futile. An exhaustive brute-
force attack will eventually discover all passwords, given enough time, but the idea is to use a
password of sufficient length, so that it can’t be guessed in a reasonable amount of attempts. The
successful guessing attempts normally find extremely trivial passwords, such as ones that are the
same as the username. In next week’s article we’ll explore the password strength issue in more
detail, when we dispel many myths about password security. For now, just know that password
strength is quite important.
Account aging, that is the disabling of unused accounts, is just as important as having a decent
password policy. Unused accounts are probably the second most commonly compromised. If you
don’t have a password aging policy, at least be certain to disable old or unused accounts. Ideally,
though, password aging should be your priority. There’s a few different ways to implement
password aging. The aging of a password will naturally disable unused accounts. A since a user
must login to be given notice that their password has expired, and if they fail to do so within
a certain amount of time, the account itself can be disabled. The question is then, “how do we
implement this enterprise-wide?”
In practical terms, Windows Active Directory and various Unix-based LDAP servers support the
setting of password policies. Unfortunately, simply enabling password expiry will be problematic.
Services that use LDAP may not implement the necessary “goo” to talk about expired accounts.
They simply get an authentication failure, and the user won’t know why. This also happens
with Active Directory, for example a VPN user will not be able to authenticate with an expired
password until they first login to an actual Windows machine and set a new password.
There are two viable solutions. Well, one that “works,” and one that is truly viable. It would
work to require that all systems that authenticate users implement password aging. Each system
would have to keep track of these policies, possibly previously used passwords, and of course
they would have to implement the mechanism by which a user can be notified and subsequently
change their password. Not likely.
The only viable solution, then, is to use a central authentication system. CAS, a central
authentication system for Web-based applications, is the ideal solution. CAS is extremely
popular, and it provides an extremely effective and secure method by which users can be centrally
authenticated, complete with a method to support changing passwords on expired accounts.
Example: Kerberos-based services like AD in Windows or a Kerberos-enabled LDAP
server in Unix provide authentication for workstations and other site-local applications, but with
the drawbacks previously mentioned.
Interestingly enough, it should be noted that improving security through account aging requires
central authentication, which provides the added benefit of single sign-on. Now, don’t forget that
single sign-on can mean two things: having the same password everywhere, or using a “ticket”
252 LOVELY PROFESSIONAL UNIVERSITY