Shared Flashcard Set

Details

CCIE Security 3
Security Protocols
29
Engineering
Professional
11/15/2009

Additional Engineering Flashcards

 


 

Cards

Term

What are the characteristics of TACACS+ protocol?

 

(transport, AAA mechanism, auth protocols, encryption)

Definition

TCP port 49

 

Separates each of the mechanisms of AAA

 

Supports PAP/CHAP, IPX, X.25

 

Encrypts entire body of packets between user and server using MD5-HMAC

Term
What are the steps in (a successful) TACACS+/Radius authentication?
Definition

1. Client connects to Network Access Server/NAS

2. NAS contacts AAA server for username prompt displayed to user. User enters username. NAS forwards username.

3.  NAS gets password prompt displayed to user. User enters password. NAS forwards login info to AAA

(2-3) User can pass login info via PAP/CHAP

4. TACACS+ returns ACCEPT / RADIUS returns Access-Accept

5. Authorization phase, if enabled for TACACS+

6. Accounting takes place, if enabled for TACACS+

Term
What are the 4 types of responses a TACACS+ daemon has in response to a login attempt?
Definition

ACCEPT - user is authenticated and service allowed

 

REJECT - user fails to authenticate

 

ERROR - error occured during authentication; NAS will typically try an alternative authentication method.

 

CONTINUE - user prompted for additional authentication information

Term
What are the responses a TACACS+ daemon returns for authorization?
Definition

REJECT - user is not authorized

 

ACCEPT - user is authorized; response contains data in the form of attributes determining what services user can access.

Term

What are the characteristics of RADIUS protocol?

 

(transport, encryption)

Definition

Pre-RFC: UDP ports 1645, 1646

RFC 2138: UDP ports 1812, 1813

 

Password info is encrypted w/ MD5; remainder of packet not encrypted (including username, authorization, accounting)

Term
What are the basic commands to enable radius?
Definition

aaa new-model

 

aaa authentication ... (define method lists)

 

radius-server host <ip> auth-port <port> key <secret>

 

(default port is 1645; not used for auth if set to 0)

Term
What are the 4 types of responses a Radius daemon has in response to a login attempt?
Definition

ACCESS-ACCEPT - user is authenticated

 

ACCESS-REJECT - user failed/not authenticated

 

CHALLENGE - additional data requested of user

 

CHANGE-PASSWORD - user asked to select new password

Term
What are the main differences between Radius vs. TACACS+ protocols?
Definition

UDP vs. TCP

 

encrypt password only vs. encrypt entire packet

 

combines authentication/authorization vs. separates AAA mechanisms

 

TACACS offers multiprotocol support; provides per-user/per-group authorization of commands

Term
What are the characteristics of SSL?
Definition

Secure Sockets Layer

 

Standard for authenticated/encrypted communication between web clients & servers. Maintains security & integrity of transmission channel.

 

Application dependent - allows application protocols (HTTP, FTP, Telnet) to be layered on top.

Term
What are the two phases of SSL handshake?
Definition

1. server authentication

 

2. optional client authentication

Term
What takes place during the server authentication phase of SSL handshake?
Definition

1. Server responds to client request by sending certificate and cipher preferences.

 

2. Client generates & sends master key encrypted with server's public key.

 

3. Server retrieves master key. Server authenticates to client using return message encrypted with master key.

Term
What takes place during the client authentication phase of SSL handshake?
Definition

1. Server sends challenge to client.

 

2. Client authenticates to server with client's digital signature and public key certificate.

Term
What is the purpose of digital certificates / PKI and what problems does it resolve?
Definition

Hierarchical framework for managing digital security attributes.

 

Resolves key management issues and offers nonrepudiation (sender cannot back out of claim of sending a message)

 

Protects against identity theft, eavesdropping, man-in-the-middle attacks

Term
What are the prerequisites for digital certificates / PKI (for VPN)?
Definition

Public Key Infrastructure

 

Certificate can be issue by 3rd party Certificate Authority (CA) server trusted by both peers

 

Peers must be in same organizational unit; both peers much generate public+private key pairs.

Term
What are the steps in CA enrollment for Digital Certificates?
Definition

1. Host generates a public/private key pair; obtains CA server's public key and certificate

 

2. Host sends its ID info & public key to CA server, encrypted with CA's public key

 

3. CA authenticates/approves the enrollment request; signs certificate with peer's info encrypted using CA private key

 

4. Host decrypts with CA's public key and saves certificate

Term

What are the characteristics of EAP?

 

What is the the IEEE standard?

 

How is it configured?

Definition

Extensible Authentication Protocol

 

standard for authenticating hosts on L2 switches. (non-authorized users put in Guest VLAN/denied)

 

IEEE 802.1x

 

 

aaa authentication dot1x

Term
What are the three (four) entities in 802.1x and their roles?
Definition

supplicant - client; host accessing LAN

 

AAA server - eg. ACS, Radius, etc.

 

authenticator - network device; initiates authentication process; relay between supplicant and AAA server

 

optional: PAE / Port Access Entity - daemon for functionality of 802.1 standard

Term
What are the characteristics of SCEP?
Definition

Simple Certificate Enrollment Protocol

 

Lightweight, HTTP-based protocol for enrollment of VPN devices to a certificate authority

Term

How does PKI resolve the problem of compromised keys?

 

What are its downsides?

Definition

Certificate Revocation Lists (CRLs) - contain all certificates that are no longer valid

 

All hosts must check for fresh CRL after the old one expires and compare any certificate with most recently updated list

 

Cons: Refreshing process can take several hours.

Term
What are the steps to revoke a certificate?
Definition

1. CA administrator requested to revoke certificate (additional authentication may be needed)

 

2. CA administrator places certificate on the CRL

 

3. New CRL published for CA server

 

4. End users check CA for a new CRL after their old CRL has expired

Term

What is the radius attribute for vendor specific values?

 

What data does it contain?

 

What value is used to identify Cisco?

Definition

Attribute 26 is for Vendor Specific Attribtues (VSA)

 

Contains vendor-id, vendor-type, vendor-length, vendor-data. The format of vendor-data is defined by the vendor.

 

Vendor-ID = 9 for Cisco

Term
What are the steps for connection setup of a wireless client to a WLAN?
Definition

1. Probe request from client to AP (specifying SSID)

2. Probe response from AP in infrastructure BSS to client

 

3. Client decides on AP and sends authentication request.

4. (Authentication takes place.) Authentication response from AP to client

 

5-6. Association request/response

Term

What kind of security does WEP involve?

 

What are its vulnerabilities?

Definition

uses a static preshared key

 

cons: administratively difficult to change keys for entire network/clients; weak encryption

Term
What were the three key improvements in Cisco's interim solution to WEP vulnerabilities?
Definition

Dynamic Key Exchange - key dynamically agreed on by devices instead of statically preshared

 

User Authentication with EAP/802.1x - login information (user/pwd, radius, etc) required to connect

 

Unique Key per Packet - encryption key for packets changes with every packet

Term
What are the characteristics of War Driving and War Chalking?
Definition

War Driving - connecting to unsecured APs for free wireless access

 

War Chalking - marking areas where there is free or unsecured wireless access for others to use

Term

What are the characteristics of PEAP?

 

(What is its purpose and how does it work)

Definition

Protected Extensible Authentication Protocol

 

Method for securely transferring authentication information (NOT encryption protocol) over wireless

 

1. Uses server side public key certificates to authenticate the AAA server.

2. Creates encrypted SSL/TLS connection to AAA

3. Authentication takes place inside tunnel

Term
What are the characteristics of TLS?
Definition

Transport Layer Security

 

Successor to SSL. Encrypts network connections at Transport layer end-to-end.

 

RSA security with 1024 and 2048 bit strengths.

 

Additionally performs mutual authentication, requiring certificate at client side also.

Term
What are the characteristics of TKIP?
Definition

Temporal Key Integrity Protocol

 

Replacement for WEP; Part of WPA

 

- key mixing secret root key to RC4 cipher

- anti-replay sequence counter

- 64-bit message integrity check (MICHAEL)

- every packet with unique encryption key

 

Term

In 802.1x, what is the purpose of the command "device authorize"?

 

Where is it configured?

Definition

Statically authorizes (or unauthorizes) a supplicant  if the supplicant does not "understand" 802.1X.

 

Configured on IOS or NAC for Cat Switch

Supporting users have an ad free experience!