D-Link DFL-2500 User Guide - Page 151

Password Criterion

Page 151 highlights

132 Chapter 17. User Authentication c) Something the user knows The secret information that only the involved user knows and keeps, such as the most commonly used Password or a Shared secret phrase. The difficulty of using method a) is that it requires some special devices to scan and read the feature presented, which are relatively expensive. Another risk that may cause this to fail is that the features are almost impossible to have substitutes; in case the user loses the feature by accident, nothing can be used for replacement. Therefore, the more commonly used methods for network services are (b) and (c). There are also potential risks by using either of these methods, for example, the keys may be intercepted, the card can be stolen, people tend to use weak passwords that are easy to guess, and they may be bad on keeping any secret, and so on. Thus, these two approaches are often combined to have add one factors and security levels. For example, a passcard is often granted to a person with a password. User authentication is frequently used in services, such as HTTP, FTP, and VPN. D-Link firewalls use Username/Password as primary authentication method, strengthened by encryption algorithms. The basic concepts of encryption is covered by 20.2 Introduction to Cryptography. More advanced and secure means of authentication, such as the Public-private Key System, X.509 Certificate, IPsec& IKE, IKE XAuth, and ID List are introduced in: 20.2.2 Authentication & Integrity, and 22 VPN Protocols & Tunnels. 17.1.2 Password Criterion In the Username/Password coupling, the username(account name) as an identifier tells who you are, and the password severs as an authenticator to prove that this is true. To penetrate certain system and obtain the user or administrator's privileges, the password is often subject to attacks. Attacks There are mainly three different ways to attack a password: • Guess: Try possible cases. Passwords that are chosen from a dictionary, or user's personal information, such as name, telephone number, and birth date are vulnerable to this attack. • Find: D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

132
Chapter 17. User Authentication
c) Something the user knows
The secret information that only the involved user knows and keeps,
such as the most commonly used
Password
or a
Shared secret
phrase.
The difficulty of using method a) is that it requires some special devices to
scan and read the feature presented, which are relatively expensive.
Another risk that may cause this to fail is that the features are almost
impossible to have substitutes; in case the user loses the feature by
accident, nothing can be used for replacement.
Therefore, the more commonly used methods for network services are (b)
and (c). There are also potential risks by using either of these methods, for
example, the keys may be intercepted, the card can be stolen, people tend
to use weak passwords that are easy to guess, and they may be bad on
keeping any secret, and so on. Thus, these two approaches are often
combined to have add one factors and security levels. For example, a
passcard is often granted to a person with a password.
User authentication is frequently used in services, such as HTTP, FTP, and
VPN. D-Link firewalls use
Username/Password
as primary authentication
method, strengthened by encryption algorithms. The basic concepts of
encryption is covered by
20.2 Introduction to Cryptography
. More advanced
and secure means of authentication, such as the
Public-private Key System
,
X.509 Certificate
,
IPsec& IKE
,
IKE XAuth
, and
ID List
are introduced in:
20.2.2 Authentication & Integrity
, and
22 VPN Protocols & Tunnels
.
17.1.2
Password Criterion
In the
Username/Password
coupling, the username(account name) as an
identifier
tells who you are, and the password severs as an
authenticator
to
prove that this is true. To penetrate certain system and obtain the user or
administrator’s privileges, the password is often subject to attacks.
Attacks
There are mainly three different ways to attack a password:
Guess:
Try possible cases. Passwords that are chosen from a dictionary, or
user’s personal information, such as
name
,
telephone number
, and
birth date
are vulnerable to this attack.
Find:
D-Link Firewalls User’s Guide