Microservices Expo Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz

Related Topics: Microservices Expo, Cloud Security

Microservices Expo: Blog Feed Post

Passwords Suck: Learn About and Use Multi-Factor Authentication

Passwords are essential to our daily lives because they provide a facet of authentication security

Passwords suck.
They are long, hard to remember (even if you have easier-to-remember phrases), more so when new, and are largely a difficulty for users to user properly.  Combined with the fact that many users choose easy-to-guess or easy-to-ascertain passwords based off of commonly-known facts about themselves and that they will try all of their passwords when told one isn’t working…the list goes on.

Passwords are essential to our daily lives because they provide a facet of authentication security — the ability to confirm that you are who you say you are, because you know something someone else does not.  In security circles, this type of password authentication is known as “something you know.”  In authentication security experts have long pointed out that just having “something you know” is not good enough. Three key facets are required for good authentication:

  • Something you know
  • Somewhere you are
  • Something you have

Something you know is a password or passphrase, pin, code, or pattern that you transmit to a party in order to identify yourself.  Somewhere you are is a location which is restricted or confirmed through GPS.  Something you have is more commonly used, and includes tokens, RFID chips, badges, USB keys, CAC cards, and much more.  These facets of authentication security, when blended together, form multi-factor authentication.  The most common form of multi-factor authentication is Something You Have and Something you Know.  This is what is commonly referred to when “Dual-factor authentication“ is mentioned.

Why would you use multi-factor authentications?  For the same reasons you might want to have multiple core routers in your datacenter, multiple employees performing the same job, or tape backups — redundancy.

Consider the following scenario:

Acme company is deploying a new web application for their business partners to better access manufacturing information.  Unfortunately a SQL injection bug made it’s way into the production version, and a hacker managed to steal the database of usernames and passwords.  In a single-factor password-based authentication scheme, the hacker would be able to crack hashed passwords in the database, login, and steal property from Acme business partners.  Fortunately, Acme issues each customer a token which securely and pseudo-randomly generates a secure PIN every 10 seconds.  Partners using the site use this as a secondary confirmation mechanism and will be unable to perform any actions without first providing a valid PIN.

Hacker halted.

Properly encrypted passwords would have also stopped this attacker from gaining access to user accounts, but what if the users or user accounts themselves were targeted?  Even if someone guesses, cracks, or steals their way into a user password or access, without the token they will be unable to access systems with just a password.

Deploying dual-factor authentication can be as easy as turning it on in Google, deploying turnkey Active Directory solutions, purchasing solutions for websites, or adjusting Linux Pluggable Authentication Module (PAM) and authentication settings.

A Final Note:

Password security is important as a barrier to entry, but proper password procedures ensure that post-breach data theft including password databases are less severe.  Proper password storage is essential to provide time post-breach for an organization to reassess and refactor security policy and reset affected user accounts.

Usually when a breach occurs involving passwords, we are talking about a Windows SAM credential dump or a SQL database (Unix/Linux passwords are automatically stored correctly with proper security measures).  Ensure that Windows machines are NOT useing Lanman hashes, and consult your web developers to be sure that passwords are not being stored as simple hashes.

A proper password hash algorithm should look like this:

hash(hash(password) + salt)

Where the hash() function is a non-trivial (read: not MD5 or Base64) hash and the salt is a random string of data added to the password in order to slow password cracking by defeating rainbow tables and pre-generated brute-force dictionaries.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Microservices Articles
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...