On 04/05/13 18:40, Mark McCullough wrote:

On 2013 Apr 5, at 21:28 , Robert Hajime Lanning wrote:

On 04/05/13 17:36, Edward Ned Harvey (lopser) wrote:
I believe radius only handles password authentication.  If you have a cert 
infrastructure, it's best to use cert first and username/password only as a 
second factor.

Even if you have a 9-char long password full of complex mix caps and symbols, a 
brute force attack can crack that in days.  If you want security, you really 
need to go for certs.

A lot of people don't really care about security though.   ;-)

Then why everywhere I go that uses things like a RADIUS gateway to AD, my 
account gets locked after 3 failed attempts?

Because they don't care about security.

Auto-locking accounts creates a denial of service vulnerability.  It becomes 
trivial to lock out (and keep locked out) any administrator account, or more 
sensitive accounts like database and application accounts.

Real security involves actually securing the host, rather than ignoring it.  (I've been 
on this soapbox many times before, so I won't repeat myself, much.)  Disable unused 
accounts, don't just set a "strong" password.  If an account can be remotely 
logged into and execute arbitrary command, but more than one user has the ability to look 
up the authentication credentials, then that account has no individual accountability and 
is a weak point on your system.  Even more so if it has any privileges beyond regular 
user.  (One of the worst examples is credentialed scanning that wants unlimited root 
access via passwordless sudo).

But on the flip side, the first rule of computer security comes in as well, "Don't 
have a computer."  (There's no such thing as 100% security.)

What, you wanted me an easy answer?


Admin accounts MUST NOT have the ability to login via wifi/vpn/what ever. Who lets root/Administrator login to your public accessible WiFi/VPN?

For VPN, I have yet to be at a place that uses Certs. They all use either password (if they don't care much), or password + token code of some kind. (I have used RSA SecureID and Verisign VIP.)

BTW, either the Cert MUST be on a PKCS#11 token, or you must be using passwords with it. Otherwise you are not authenticating the user, you are authenticating the device.

BTW, this thread was about WiFi, not hosts. And it drifted to the topic of WPA2-PSK versus WPA2-Enterprise (RADIUS). Of course there is 802.11x, which is usually backed by (again) RADIUS. Usually the RADIUS server is just a gateway to AD. As AD tends to be the Identity Management system.

So, in the end, we are just looking for two factor authorization. Something you have and something you know. Password+Token code or password+certificate.

The password+token tends to be the most used, as it is the easiest and most compatible to support.

--
Mr. Flibble
King of the Potato People
_______________________________________________
Tech mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/

Reply via email to