The Rainbow Books


                                                              NCSC-TG-017
                                                       Library No. 5-235,479
                                                                  Version 1

                                   FOREWORD
A Guide to Understanding Identification and Authentication in Trusted Systems
provides a set of good practices related to identification and authentication (I & A).
We have written this guideline to help the vendor and evaluator community under-
stand the requirements for I & A, as well as the level of detail required of
I & A at all classes, as described in the Department of Defense Trusted Computer Systems
Evaluation Criteria. In an effort to provide guidance, we make recommendations in
this technical guideline that are not requirements in the Criteria.

The I & A Guide is the latest in a series of technical guidelines published by the Na-
tional Computer Security Center. These publications provide insight to the Trusted
Computer Systems Evaluation Criteria requirements for the computer security vendor
and technical evaluator. The goal of the Technical Guideline Program is to discuss
each feature of the Criteria in detail and to provide the proper interpretations with
specific guidance.

The National Computer Security Center has established an aggressive program to
study and implement computer security technology. Our goal is to encourage the
widespread availability of trusted computer products for use by any organization
desiring better protection of its important data. One of the ways we do this is by the
Trusted Product Evaluation Program. This program focuses on the security features
of commercially produced and supported computer systems. We evaluate the pro-
tection capabilities against the established criteria presented in the Trusted Comput-
er System Evaluation Criteria. This program, and an open and cooperative business
relationship with the computer and telecommunications industries, will result in the
fulfillment of our country's information systems security requirements. We resolve to
meet the challenge of identifying trusted computer products suitable for use in pro-
cessing delicate information.

 I invite your suggestions for revising this technical guideline.  We will review this
document as the need arises.






Patrick R. GALLAGHER, JR.                                            1 September 1991
Director
National Computer Security Center

ACKNOWLEDGMENTS The National Computer Security Center extends special recognition and acknowledgment to James Anderson and to Lt. CoI. Rayford Vaughn (USA) as coauthors of this document. Lt. Patricia R. Toth (USN) is recognized for the develop- ment of this guideline, and Capt. James A. Muysenberg (USAF) is recognized for its editing and publication. We wish to thank the many members of the computer security community who enthusiastically gave their time and technical expertise in reviewing this guideline and providing valuable comments and suggestions. ii
TABLE OF CONTENTS FOREWORD................................................. ACKNOWLEDGMENTS 11 1.0 INTRODUCTION 1 1.1 Background 1 1.2 Purpose 1 1.3 Scope 1 1.4 Control Objective 2 2.0 OVERVIEW OF PRINCIPLES 3 2.1 Purpose of I&A 3 2.2 The I&A Process 4 2.3 Aspects of Effective Authentication 5 2.4 Security of Authentication Data 9 3.0 MEETING THE TCSEG REQUIREMENTS 11 3.1 C1 Requirements 11 3.1.1 I & A Requirements 11 3.1.2 Other Related Requirements 11 3.1.3 Comments 11 3.2 C2 Requirements 12 3.2.1 I&A Requirements 12 3.2.2 Other Related Requirements 12 3.2.3 Comments 13 3.3 81 Requirements 14 3.3.1 I & A Requirements 14 3.3.2 Other Related Requirements 14 3.3.3 Comments 15 3.4 82 Requirements 15 3.4.1 I & A Requirements 15 3.4.2 Other Related Requirements 16 3.4.3 Comments 16 3.5 83 (and A1) Requirements 16 3.5.1 I & A Requirements 16 3.5.2 Other Related Requirements 17 3.5.3 Comments 17 iii
IDENTIFICATION & AUTHENTlCATION GUIDELINE 4.0 POSSIBLE METHODS OF IMPLEMENTATION 19 4.1 Something A User Knows (Type 1 Method) 19 4.2 Something A User Has (Type 2 Method) 20 4.3 Something a User Is (Type 3 Method) 21 4.4 Comments 21 GLOSSARY 25 BIBLIOGRAPHY 29 iv
1.0 INTRODUCTION 1.1 BACKGROUND The principal goal of the National Computer Security Center (NCSC) is to en- courage the widespread availability of trusted computer systems. In support of this goal the NCSC created a metric, the DoD Trusted Computer System Evaluation Cri- teria (TCSEC) [3], against which computer systems could be evaluated. The TCSEC was originally published on 15 August 1983 as CSC-STD-001 -83. In December 1985 the Department of Defense adopted it, with a few changes, as a Department of Defense Standard, DoD 5200.28-STD. DoD Directive 5200.28, Securi- ty Requirements for Automatic Information Systems (A 155) [11], requires the TCSEC be used throughout the Department of Defense. The TCSEC is the standard used for evaluating the effectiveness of security controls built into DoD AlSs. The TCSEC is divided into four divisions: D, C, B, and A. These divisions are ordered in a hierarchical manner, with the highest division (A) being reserved for systems providing the best available level of assurance and security. Within divisions C and B are subdivisions known as classes, which are also ordered in a hierarchical manner to represent different levels of security in these divisions. 1.2 PURPOSE This document provides guidance to vendors on how to design and incorporate effective identification and authentication (l & A) mechanisms into their systems. It's also written to help vendors and evaluators understand I & A requirements. Exam- ples in this document a;e not the only way of accomplishing identification or authen- tication. Nor are the recommendations supplementary requirements to the TCSEC. The only measure of TCSEC compliance is the TCSEC itself. 1.3 SCOPE Computer security is founded upon the notion of controlling access between AlS users and the data within the AlS. The concept of controlled access relies upon establishing identifying information for the AlS users, such that this information can be used to determine whether the user has the proper clearance or identity to ac- cess a given data object. In this manner, the I & A requirements are central to the
IDENTIFICATION & AUTHENTICATlON GUIDELINE system's identification and authentication of users, and thus the enforcement of the Mandatory Access Control (MAC) and Discretionary Access Control (DAC) policies. I & A also provides the audit mechanism the information it needs to associate ac- tions with specific users. 1.4 CONTROL OBJECTIVE Identification is part of the accountability control objective. The accountability control objective states: "Systems that are used to process or handle classified or other sensitive informa- tion must assure individual accountability whenever either a mandatory or discretion- ary security policy is invoked. Furthermore, to assure accountability the capability must exist for an authorized and competent agent to access and evaluate account- ability information by a secure means, within a reasonable amount of time, and with- out undue difficulty." [3, p. 76] The fundamental identification requirement states: "Individual subjects must be identified. Each access to information must be mediat- ed based on who is accessing the information and what classes of information they are authorized to deal with. This identification and authorization information must be securely maintained by the computer system and be associated with every active element that pertorms some security-relevant action in the system." [3, p. 4] 2
2.0 OVERVIEW OF PRINCIPLES Identification and authentication requirements are found together throughout all evaluation classes. They are directly related in that "identification" is a statement of who the user is (globally known) whereas "authentication" is proof of identification. Authentication is the process by which a claimed identity is verified. The l & A proce- dures of a system are critical to the correct operation of all other trusted computing base (TCIS) security features. 2.1 PURPOSE OF I&A The strength of I & A procedures directly impacts the ability of the other TCB mechanisms to fulfill their function. For example, the strength of an audit mechanism and the assurance of correctness in the audit is dependent upon the I & A mecha- nism. If l & A is successfully circumvented, then all audited actions become unreli- able, because an incorrect ID could be associated with auditable actions. In this sense, the l & A requirement is the foundation for other TClB functional requirements (figure 1). A TCB, using security-relevant data structures, controls access to a system, de- termines authorized access to objects within a system, and associates audited actions* with specific individuals based on their identity. In controlling access to a system, the TCIS acts as the first line of defense. Once the TCIS identifies the user as a unique entity or a member of a group, it then accurately determines what access privileges the user may be assigned with re- spect to the data protected by the system. If the system has a C1 rating, group AUDIT DAC MAC; IDENTIFICATION AND AUTNENTICATION #figure 1 Auditing of & A mechanisms begins at C2. 3
IDENTIFICATION & AUTHENTICATION GUIDELINE membership provides sufficient granularity for enforcing the l & A requirements. In C2 or higher rated systems, l & A enforcement must ~e at the individual user level. Systems at the B and A levels enforce a mandatory access control policy and use the l & A mechanism to establish an authorized security level or levels at which the user will operate during a given session. The user's identity determines which functions or privileges the user can exer- cise on a system. In some systems (e.g., transaction systems), functional access may be the predominant expression of security policy. A common case of functional access found in many systems is the control of access to the system seCurity offi- cer's functions based on his identity. The purpose of a device also may determine functions or privileges the user can exercise on a system. For example, the same physical mechanisms protecting system hardware normally protect the device commonly called the "operator's con- sole." The user of this device is ordinarily subject to stronger physical controls and administrative procedures than are other users of the system. In some cases, ac- cess to the device implies physical access to the data (all storage media) that the TCB is charged to protect. In B1 and lower rated systems, the l & A requirements may be relaxedt for the user of the operator's console if the device is protected by the same physical security mechanisms protecting the system itself. Auditing functions in trusted systems are a TCB responsibility. Certainly, accu- rate identification of an individual user is required for proper attribution of actions taken on behalf of the individual by the system. Again, the strength of the l & A mechanism directly affects the reliability and assurance of correct audit functions. 2.2 THE l&A PROCESS The identification and authentication process (typically called "Iogin") starts with a user establishing communications with the TCB. (In B2 andiabove TCBs, this is done by invoking a Trusted Path, which is guaranteed by design to be an inviolable ---------------------------- *Discretionary access controls, enforced at the C level and higher, are dependent upon effective and reliable I & A. **See Interpretations ct -cl-02-83 and ci -cl-04-86 on the NCSC DockMaster Eva __Announcements forum. B2 and above require the operator to log on, but operator logon is optional at B1 and below. 4
OVERVIEW OF PRINCIPLES communication path between the user and the TCIS.) Once the user is communicat- ing with the TCIS, the user identifies himself (i.e., claims-an identity). Either as part of the transmission claiming an identity or in response to a prompt from the TCIS, the user supplies one or more authentication elements as proof of identity. The TCIS, using the claimed identity and authentication elements as parameters, validates the supplied information against an authentication database. If the informa- tion from the user satisfies the TClB validation process, the TCIS completes the login by establishing a user session, and associating the user's identity and access con- trol information with that session. In C1-C2 systems, this access control information may merely be a recording of the user identity to compare to access control infor- mation associated with files. In 191-Al systems, the TClIS also associates a specific security level (within the valid range for the user) with the user session for use in making mandatory access control decisions. At C2 and above, the TCB is able to record (audit) the success or failure of a new login. If the login succeeded, the TCB then completes any necessary actions to establish the user session. 2.3 ASPECTS OF EFFECTIVE AUTHENTICATION Users' identities are verified using one of three generic methods: something they know (type 1), something they have (type 2), or something they are (type 3). While the requirements of the TCSEC can be met by any ONE of these different methods, systems using two or more methods can result in greater system security. Systems using only one method of authentication may be more vulnerable to com- promise of the authenticator, thus multiple methods are preferred. Examples of type 1 mechanisms include passwords, passphrases, PINs (Per- sonal Identification Numbers), and data about one's self or famiy members. Type 2 mechanisms include real and electronic keys, challenge resport.se generators, and magnetic-strip cards or badges. The final category, type 3, includes fingerprints, reti- nal patterns, DNA patterns, and hand geometry. To be effective, authentication mechanisms must uniquely and unforgeably identify an individual. "Authentication by knowledge" (type 1) and "authentication by ownership" (type 2) mechanisms are limited in effectiveness through only being as- sociated with a person by possession. A person possesses knowledge or some 5
IDENTIFICATION & AUTHENTICATION GUIDELINE Type 1 = Authentication by Knowledge (Something They Know) Type 2 = Authentication by Ownership (Something They Have) Type 3 = Authentication by Characteristic (Something They Are) figure 2 identifying object, but since the user is not physically attached to the authentication information, the authentication information could be lost, stolen, or otherwise com- promised. What distinguishes the first two types is how effectively each can be protected; each has advantages and disadvantages. The principal weakness of type 1 is dupli- cation. Not only is it usually very easy to learn something someone else knows, but it may be possible to guess the information without even having access to it. No special tools, skills, or equipment are required to duplicate "authentication by knowl- edge." One can often break it by a simple brute force guessing attack using auto- mated techniques. The most important advantage of this type of authentication item is this: the user can take it anywhere and change it whenever a compromise should occur. An- other advantage is its simplicity, since such information tends to be easily represent- ed to the TCB without special equipment. Any authentication data must ultimately be encoded in some form in the TCB's authentication database, and in this sense a copy of the information has to be kept by the TCB to be usable in authentication. Since a character string can usually represent type 1, it's easy to store it for later use by the TCB. Although type 1 is easy to copy if it's genuinely unique, such as a nonsense word or number, it may be easier to guard it than a physical object. This is because an item of knowledge, although easily copied, is always fully in the possession of the person it identifies. Unlike a key, card, or other physical device, "authentication by knowledge" can't be stolen while temporarily left sitting on a desk, can't acciden- tally fall out of a pocket, and often can't be forcefully stolen unless the person steal- ing it can verify it is correct. Yet the ease of duplication makes type 1 always an imperfect form of authentication and thus requires conscientious protection to re- main effective. 6
OVERVIEW OF PRINCIPLES By comparison, "authentication by ownership" has its major strength in the diffi- culty of duplication. Type 1 is, in fact, an example of type 2. So when we speak of type 2 we will, by convention, mean a physical object rather than an item of knowl- edge. While such objects require more effort to guard from theft, they can be made using special equipment or procedures that are generally unavailable. Hence, dupli- cating them is more costly than the value of whatever is to be gained by falsifying them. This discourages their duplication, although it doesn't necessarily prevent du- plication by a determined intruder. The third type of authentication item, "authentication by characteristic," is much stronger than the first two. After all, the goal of authentication is to verify who you are, and type 3 is very closely tied to this. A major obstacle with this type of authentication is the difficulty of building cost- effective peripherals that can obtain a complete enough sample of a characteristic to entirely distinguish one individual from another. Cost is also a factor in identifying type 2. But in type 3, the authentication item itself can be designed to simplify identi- fication by the TCB. Conventional computer peripherals usually cannot easily en- code "authentication by characteristic." While it may be easy to build devices that confirm someone's distinguishing features such as weight or finger length, the addi- tior of more detail to completely distinguish one person from another can substan- tially increase the cost. Fortunately, an adequately unique identification doesn't require every detail about a person. Thus, specific methods such as fingerprinting or eye retinal scans may be used alone, reducing costs in comparison with a total examination of all a person s physical attributes. Even these methods incur greater costs than simple use of a password, which requires no additional hardware at all, and they are not guaranteed to be infallible. Identical twins for instance would not be distinguishable by DNA readers, and might not be distinguishable by other spec;ific tests of physical characteristics. In the imaginary case of entirely identical twins, the two individuals might be solely distinguished by things in the "authentication by knowledge" cate- gory. Not only do the various types of authentication methods have cost and feasibil- ity tradeoffs, but an adequate certainty of authentication may require several meth- ods. (Each is subject to an amount of error at the most theoretical level.) One would 7
IDENTIFICATION & AUTHENTICATION GUIDELINE expect greater assurance from a combination of type 1 and type 2 mechanisms than either used alone. Likewise, type 3 may provide more assurance than the combina- tion of types 1 and 2 together. Potential approach choices are shown in figure 3, where type 12 represents the use of type 1 and type 2 mechanisms. Direct comparisons of strength relationships are not possible unless one knows the exact implementation mechanism; however, one can theorize that some such re- lationships are likely. One might argue that type 2 is stronger than type tin terms of assurance, and type 123 is probably stronger than type 12. Singular mechanisms may offer the needed assurance at lower levels, whereas higher levels may require combinations to achieve adequate assurance. Possible Authenticatiort Approaches Type-I Type 12 Type 2 Type 13 Type 23 Type 3 Type 1 = Authentication by Knowledge Type 2 = Authentication by Ownership Type 3 = Authentication by Characteristic figure 3 8
OVERVIEW OF PRINCIPLES 2.4 SECURITY OF AUTHENTICATION DATA Identification and authentication data (like most transmissions) is vulnerable to interception (e.g., eavesdropping, spoofing) by an intruder interposed between the user and the TCB. As a consequence, the connection between a user and the trust- ed computer requires protection commensurate with the sensitivity of the data the system processes. Due to government regulations, systems used to process classi- fied data must meet stringent physical security standards that include protection of the connection of a terminal to the TCB. (This protection can involve putting the computer and its terminals in a physically secure area, protecting the wireways be- tween the terminals and the computer, or using cryptography to protect the trans- missions.) Unclassified systems may require similar protection. Additionally, 192 and higher rated systems must have trusted paths. Networks provide many opportunities for intruders to intercept the l & A data. One-time passwords can help protect against that possibility. The user authentication data must be stored, protected, and maintained by the TCB. It should be accessible only to the System Security Officer (550). However, even the 550 should be barred from seeing the actual plain text version of the data (for example, the passwords used by the users.) To assure only the 550 can ac- cess and manipulate the l & A database, a unique and possibly extended special 550 identification and authentication procedure must be embedded in the TCB. The TCB should use this procedure to verify the identity of the 550 (and perhaps the device used) when that individual maintains the l & A database. Besides interception, operator misfeasance or unauthorized physical access could compromise I & A data. This may be done by mishandling off-line versions of the data in such forms as system backup files, fault-induced system dumps, or list- ings. To protect I & A data from this kind unauthorized disclosurq,, the data could be stored in encrypted form. Several so-called one-way transformations (non-invertible functions) of authentication data exist that could serve the function (see Purdy [10]). However, if one uses one-way transformations, it's important it be a true non- invertible transformation. For an example of how an ad hoc one-way transformation was broken, see Downey's paper [4]. 9
IDENTIFICATION & AUTHENTICATION GUIDELINE The authentication database needs protection from general access whether the database is encrypted or not. Even in an encrypted form, a database may be sub- ject to a "catalog attack." (Such an attack was highly successful during the Novem- ber 1988 INTERNET attack by a network worm program. [5]) A catalog attack is conducted by encrypting a dictionary of probable authentication data (e.g., pass- words). The attacker then matches the ciphertexts of the authentication database with the ciphertext of the dictionary to discover legitimate authenticators. If the data- base stores both the user's identification and authentication in encrypted form, the attacker must find a user's identification AND authenticator (e.g., the password) in COMBINATION. However, the need to protect the transformation mechanism re- mains. 10
3.0 MEETING THE TCSEC REQUIREMENTS This chapter describes the I & A requirements from the TCSEC and their interac- tion with related TCSEC requirements. 3.1 C1 REQUIREMENTS 3.1.1 I & A Requirements "2.1.2.1 Identification and Authentication The TCB shall require users to identI'y themselves to it before beginning to perform any other actions that the TCB is expected to mediate. Furthermore, the TCB shall use a protected mechanism (e.g., passwords) to authenticate the user's identity. The TCB shall protect authentication data so that it cannot be accessed by any un- authorized user." 3.1.2 Other Related Requirements "2.1.1.1 Discretionary Access Control The enforcement mechanism (e.g., self/group/public controls, access control lists) shall allow users to speci~ and control sharing of those objects by named in- diviauals or defined groups or both." 3.1.3 Comments The related Discretionary Access Control (DAC) requirement, allowing users to control sharing by defined groups, means it's sufficient to identify users as a mem- ber of a group. Individual identity is NOT required at C1. Thus, it's acceptable to have a collective identity such as "Purchasing," authenticated with a password con- trolling access to a purchasing file. The TCSEC requires no additional information. And, without individual accounting, auditing isn't possible or required. What is sufficient authentication? This is a difficult question, since it interacts critically with how the Trusted System is used, combined with the assurances and design features associated with the ratings. (See Guidance for Applying the Depart- ment of Defense Trusted Computer System Evaluation Criteria in Specific Environ- ments [7].) The C1 requirement specifies only the use of a protected mechanism 11
IDENTIFICATION & AUTHENTICATION GUIDELINE and gives, as an example, passwords. As discussed elsewhere in this guideline, passwords can be an effective authentication mechanism if conscientiously applied. 3.2 C2 REQUIREMENTS 3.2.1 I & A Requirements "2.2.2.1 Identification and Authentication The TCB shall require users to identify themselves to it before beginning to perform any other actions that the TCB is expected to mediate. Furthermore, the TCB shall use a protected mechanism (e.g., passwords) to authenticate the user's identity. The TCB shall protect authentication data so that it cannot be accessed by any un- authorized user. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identify each individual ADl° system user. The TCB shall also provide the capability of associating this identity with all au- ditable actions taken by that individual." 3.2.2 Other Related Requirements "2.2.1.1 Discretionary Access Control The enforcement mechanism . . . shall allow users to speci~ and control shar- ing of. . . objects by. . . defined groups of individuals . . . . These access con- trols shall be capable of including or excluding access to the granularity of a single user. . "2.2.2.2 Audit ... The TCB shall be able to record the following types of events: use of identi- fication and authentication mechanisms,.. . actions taken by computer opera- tors and system administrators and/or system security officers . . . . For each recorded event, the audit record shall identify: date and time of the event, user, type of event, and success or failure of the evenv;. For identification/ authentication events the origin of request (e.g., terminal ID) shall be included in the audit record. . . . The ADP system administrator shall be able to selec- tively audit... one or more users based on individual identity." 12
MEETING THE 7CS£C REQUIREMENTS 3.2.3 Comments Beginning at the C2 level, individual users are identified. The access control re- quirement mandates using individual identity for access decisions. lf group-based access control is available, membership in the group is based on the identity of the individual rather than a user providing a group name with an authenticator. This is an important distinction. With a group identifier, a collective name and shared authenti- cator is valid. With individual identifiers, a unique individual ID, verified through unique authentication, is used to determine membership in the group, with group identification then used to access the data. In this latter implementation, the system can audit the actions of the individual, thus ensuring individual accountability. Strengthening the requirement for individual identity is the audit requirement. This means the system administrator can audit the actions of any one or more us- ers, based on individual identity. l & A must distinguish operators, system administra- tors, and system security officers from ordinary users in order to record security related events as actions initiated by the individuals performing those roles. Since in- dividuals performing those roles may also be ordinary users of the system, it's nec- essary to distinguish the people when acting as ordinary users. As an example, in one (network) system with many individuals performing ad- ministrator or security officer tasks, the system established an identifier associated with the role being performed (e.g., System Administrator (SA)). In an extended log- on, a two-step identification and authentication occurred; first as the SA, and then as the individual performing that role. If the individual wasn't recognized as one of those authorized the SA functions, the logon ended and the system audited the event. Audit records taken of actions done by the SA incorporated the individual's identity. Later examination of the audit records permitted collection of all actions by the SA in time-sequenced order. Within the SA function, the system identified individuals performing in the SA role. Since this was a very large international time- sharing system, two or more people might be doing SA functions totally indepen- dently of each other. The system recorded all their activities under the SA identity, and within each record were the identities of the individuals actually performing the function. 13
IDENTIFICATION & AUTHENTICATION GUIDELINE Finally, the related audit requirement calls for identification of the origin of I & A events. The example given is from a terminal, but, in some systems, it may be a stored batch procedure (PROC on some systems) activated by an -operator from the operator's console. In this case, the audit record should contain both the operator's console ID and an indication the operator ran the job for some individual identified in the batch procedure. The origin of a connection is often joined with the user's identi- ty to insure the terminal's location is approved to handle classified material at the user's authorized level. 3.3 B1 REQUIREMENTS 3.3.1 I & A Requirements "3.1.2.1 Identification and Authentication The TCB shall require users to identily themselves to it before beginning to perform any other actions that the TCB is expected to mediate. Furthermore, the TCB shall maintain authentication data that includes information for verifying the identity of individual users (e.g., passwords) as well as information for determining the clearance and authorizations of individual users. This data shall be used by the TCB to authenticate the user's identity and to ensure that the security level and authorizations of subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user. The TCB shall protect authentication data so that it cannot be acces- sed by any unauthorized user. The TCB shall be able to enforce individual account- ability by providing the capability to uniquely identily each individual ADP system user. The TCB shall also provide the capability of associating this identity with all au- ditable actions taken by that individual." 3.3.2 Other Related Requirements "3.1.1.4 Mandatory Access Control ... Identification and authentication data shall be used by the TCB to authenti- cate the user's identity and to ensure that the security level and authorization of subjects external to the TCB that may be created to act on behalf of the in- dividual user are dominated by the clearance and authorization of that user." 14
MEETING THE TCSEC REQUIREMENTS 3.3.3 Comments B1 is the first rating level in which access and data movement control based on sensitivity levels of subjects and objects takes place. For an unprivileged user, the & A data is used to determine the user's current authorization level, which the TCB compares with its user database containing authorization ranges for each user. If the logon information is correct and his level is valid, the TCB lets him on the system. Then the TCB moderates the access to files based on the user's current level and the label on the file or object the user is trying to get to. Since the sensitivity level is represented by the clearance and category of access, and object access permis- sion is determined by the sensitivity associated with both the subject (outside of the TCB) and the object, the authorization of a subject becomes a component of the au- thentication requirement. The meaning of the term "authorizations" in this section includes functional roles assigned to individuals. The authorizations associated with user roles (e.g., SA, 550, operator) define modes of access that may or may not be controlled by a label-processing (or MAC) policy, depending upon the particular system. One can have a system where a user, acting as an authorized 550, may add new users, de- lete users, or modify their authentication data to increase or decrease their autho- rized access, all without any sensitivity label associated with the records or the 550's actions. Such actions are, of course, subject to audit. The better approach uses MAC mechanisms to provide additional support for administrative least privi- lege. Here the user, as the 550, must still log onto the system at whatever level is necessary to do his work. 3.4 B2 REQUIREMENTS 3.4.1 I & A Requirements "3.2.2.1 Identification and Authentication The TCB shall require users to identily themselves to it before beginning to perform any other actions that the TCB is expected to mediate. Furthermore, the TCB shall maintain authentication data that includes information for verilying the identity of indi- vidual users (e.g., pass words) as weh as information for determining the clearance and authorizations of individual users. This data shall be used by the TCB to authen- ticate the user's identity and to ensure that the security level and authorizations of 15
IDENTIFICATION & AUTHENTICATION GUIDELINE subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user. The TCB shall protect authentication data so that it cannot be accessed by any unauthorized user. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identily each individual ADP system user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individ- ual." "3.2.2.1.1 Trusted Path The TCB shall support a trusted communication path between itself and [the] user for initial login and authentication. Communications via this path shall be initiated exclusively by a user." 3.4.2 Other Related Requirements "3.2.3.1.4 Trusted Facility Management The TCB shall support separate operator and administrator functions." 3.4.3 Comments The trusted path requirement is the principal addition at this level. The B2 level is the first rating level providing sufficient architectural support for trusted paths in an operating system. This requirement ensures that at the B2 level and above, the indi- vidual user logging in is in unforgeable communication with the TCB, and not some program masquerading as a TCB. Otherwise, the user may be spoofed into divul- ging his authentication data to an application program. The requirement' to support separate operator and administrator functions could place an additional burden on the l & A function to distinguish individuals acting in those roles. To this end, the (functional) authorizations associated with the authenti- cation data from the B1 requirement can be effectively used. 3.5 B3 (AND A1) REQUIREMENTS 3.5.1 l & A Requirements "3.3.2.1 Identification and Authentication The TCB shall require users to identily themselves to it before beginning to perform any other actions that the TCB is expected to mediate. Furthermore, the TCB shall 16
MEETING THE TCSEC REQUIREMENTS maintain authentication data that includes information for verilying the identity of indi- vidual users (e.g., pass words) as well as information for determining the clearance and authorizations of individual users. This data shall be used by the TCB to authen- ticate the user's identity and to ensure that the security level and authorizations of subjects external to the TCB that may be created to act on behalf of the individual user are dominated by the clearance and authorization of that user. The TCB shall protect authentication data so that it cannot be accessed by any unauthorized user. The TCB shall be able to enforce individual accountability by providing the capability to uniquely identily each individual ADP system user. The TCB shall also provide the capability of associating this identity with all auditable actions taken by that individ- ual." "3.3.2.1.1 Trusted Path The TCB shall support a trusted communication path between itself and users for use when a positive TCB-to-user connection is required (e.g., login, change subject security level). Communications via this trusted path shall be activated ex- clusively by a user or the TCB and shall be logically isolated and unmistakably distinguishable from other paths." 3.5.2 Other Related Requirements "3.3.1.1 Discretionary Access Control The TCB shall define and control access between named users and named objects (e.g.,files and programs) . . . . These access controls shall be capable of specify- ing, for each named object, a list of named individuals and a list of groups of named individuals with their respective modes of access to that object. Fur- thermore, for each Such named object, it shall be possible to specify a list of named individuals and a list of groups of named individuals for which no ac- cess to the object is to be given...." 3.5.3 Comments The trusted path's use is generalized to "when[ever] a positive TCB-to-user connection is required," not just for login. In 193 systems, other TCB-to-user commu- nications may be going on, hence the requirement to logically isolate and to distin- guish the TRUSTED path from all other paths. Note that the TCB can start the trusted path if necessary. 17
IDENTIFICATION & AUTHENTICATION GUIDELINE The distinction between trusted path at B3 and trusted path at B2 hinges on whether the TCB needs to be aware of a previous context. In the B2 case, the only requirement for trusted path is at Iogin. In the B3 case, a trusted path may be re- quired for a user to change security levels or to initiate another process at a differ- ent security level from the one he is now in. An example of the TCB starting the trusted path could be telling a user his security level has been changed as request- ed. The principal impact of this requirement is the establishment of a trusted path between a user (i.e., an individual) and the TCB, not a process-subject, nor any oth- er user-surrogates. It's as important for the person connecting to the TCB to be as- sured of the identity of the TCB as it is for the TCB to be assured of the identity of the individual. Earlier work in computer security suggested re-authentication as an assurance mechanism to cover cases of this kind. If the system has such a capabil- ity, the time between (re)authentications should be a configuration parameter. The related Discretionary Access Control requirement has two components; first, each named object (already controlled by the Mandatory Access controls) shall also be under Discretionary Access controls. Second, lists of named individuals or groups authorized or specifically denied access must be maintained for each named object. 18
4.0 POSSIBLE METHODS OF IMPLEMENTATION There are a wide variety of implementation methods possible `for identifying and authenticating people. The challenge to the TCB designer is how to integrate the method chosen into the rest of the TCB design in such a way that the chosen tech- nique cannot be bypassed or penetrated. The most frequent method of identifying individuals is still the claimed identity authenticated with a password. A reasonable discussion of the issues is carried in Hoffman [8], although it's not complete with re- spect to all the problems. The following discussion serves as a set of good exam- ples or a general guideline only. There are many other acceptable methods of l & A. 4.1 SOMETHING A USER KNOWS (TYPE 1 METHOD) This method is almost entirely focused on passwords. In the past, eight charac- ter passwords have been more or less the standard on most systems providing user identification and authentication, although there is no specified standard for pass- word length. The Department of Defense Password Management Guidehne [2] rec- ommends a minimum of six characters. Two appendices in that guideline discuss the parameters affecting the choice of password length. The guideline also strongly recommends automating password generation. A description of a pronounceable password generator can be found in Gasser's pa- per [6]. As indicated above, simple passwords are sufficient for the lower rating classes. As one moves up in the ratings, the password or passphrase system should be- come more sophisticated. In the higher classes the password scheme should be some variation of the one-time password schemes or a combination of techniques, as depicted in figure 3. In a one-time password scheme, the system provides the user with an initial password to authenticate his claimed identity. During the initial Iogon, the user receives a new password for the next logon. In the earliest conception of this ap- proach, no one was concerned for wiretapped lines intercepting the users' pass- words, since all lines were within protected wireways. The only concerns were for someone masquerading as another user without being discovered or for users writ- ing down their passwords so they wouldn't forget them. 19
IDENTIFICATION & AUTHENTICATION GUIDELINE In modern applications, particularly with personal computers used as terminals, the TCB could encrypt the next password for the user; The user would receive his next password, decrypt it with his (personal, unique) decrypt key, and save it for his next session. Other proposals include storing personal data about an individual, such as your grandmother's maiden name, the age of your father when he was married, the mid- dle name of your 3rd sister, etc. This method falls short of the TCSEC requirements for a variety of reasons. It's difficult to administer for any reasonable number of users, and, even if one randomizes the challenge, the total number of available an- swers is too small. Personal information relevant to an individual is normally avail- able from public sources and not protected. 4.2 SOMETHING A USER HAS (TYPE 2 METHOD) This type contains several artifact approaches to providing positive identity of users. The schemes span a wide range, from magnetic strip readers to various forms of ignition keys (some with cryptographic subsystems, others merely alternate forms of the magnetic strip reader). An interesting form of "something one has" that combines the artifact with a password scheme is typified by a one-time password (challenge and response) device. The device is a calculator-sized unit that, if keyed correctly by a user with a personal identification number (PIN), generates a correct one-time response to a password challenge issued by a server host. Possession of the device alone does not let one obtain the correct response to a random challenge. One must have the artifact and know the PIN to use it. There's no known way to read the PINs set in this particular product, so loss of the device may be an inconvenience rather than a security breach of major magnitude if report- ed immediately. While it's possible such devices could be stolen from the rightful user, the secu- rity breach might be manageable, unless the user doesn't report the loss immediate- ly or carelessly writes the PIN down. Furthermore, if one augments the mechanism with the standard password approach to form a Type 12 method, one gets much greater assurance. 20
POSSIBLE METHODS OF IMPLEMENTATION There's a tendency to require total security for simple devices (locking them in safes or restricting where they may be carried). Manyiimes all that's needed is the ability to detect the loss or compromise of the device. 4.3 SOMETHING A USER IS (TYPE 3 METHOD) This category of authentication includes all the biometric schemes, such as fingerprint readers, lip print readers, retinal scanners, DNA analyzers, and dynamic signature readers. Some claim these devices have substantial resolution powers, virtually eliminating false acceptance, while keeping the false rejections at a reason- able level. However, the statistical nature of the acceptance or rejection is some- thing to consider. We noted earlier one could double up the authentication mechanisms for higher rated systems so authentication is based on two indepen- dent elements, for example a fingerprint reader and a password (type 13 method). Such a scheme would virtually eliminate false acceptance of the l & A procedure. In a doubled up authentication scheme, the system shouldn't accept either one of the elements unless the other element is also correct. The vendors of biometric devices have a harder time than those who are con- tent with simple passwords, since it's virtually impossible to change the biometric parameter being measured. However, it may be possible to copy the biometric pa- rameter in such a way to gain access to a system as though one is the actual user. If an intruder interposes himself between the measuring device and the TCB, absent a protected path, he can copy the reading for replay at a later time. As this may be possible regardless of the authentication technique used, this suggests either mak- ing the authentication· element be one-time, or protecting the path between authenti- cation entry (measurement) and the TCB against interception. 4.4 COMMENTS The requirements for identification and authentication are st5ressed heavily in the direction of authentication. One claims an identity, then must prove it to the operat- ing system. It's "theoretically" possible to have self-identifying authentication (or it might be called self-authenticating identification). Examples of such might be a --------------- *Martin, in his book, reported false acceptance of a voice recognizor at 1%, and a hand geometry reader at 0.5 to 0.05%, depending on the measurement tolerances. The voice recognizor had a false rejection of 1%, while the hand geometry reader was "very low." [9] 21
IDENTIFICATION & AUTHENTICATION GUIDELINE fingerprint reader or a DNA analysis of cells scraped from the skin. Of course, it's always (and probably incorrectly) assumed one can maintain the integrity of one's skin or fingerprints. However, it might be possible to'copy fingerprints onto a latex finger (or fingers), and obtaining a patch of skin might not be as difficult as one might imagine. Even for self-identifying authentication, the protection of the authenti- cation· mechanism is key to its successful application. As indicated above, if applied in situations calling for application of lower rating classes, such methods that combine identification and authentication could very well be sufficient. In situations where higher classes are called for, the methods could be combined with another generic authenticator. In effect this erects a second access barrier for systems used in higher risk situations. How much authentication is enough has not been adequately addressed to date and is a matter for discussion between the site accreditor or site certifying officer and the vendor. One could require multiple authentication mechanisms for any claimed identity for higher level systems. However effective such a requirement might be, it would be quite expensive for those myriads of systems NOT at special hazard but which use B2 or higher ranked systems in quasi-system high environ- ments because of their label processing provisions. (Quasi-system high environ- ments are those where all users are given all clearances and categories within the organization, but the data must be properly labeled to exercise control on where it's exported.) Perhaps this is a point of application for an l & A subsystem, to augment one built into a TCB. The principal recommendation is it be a different basic mecha- nism. If the built-in authenticator is based on authentication by characteristic, the & A subsysteni could be either authentication by ownership (type 2) or authentica- tion by knowledge (type 1). Conventional wisdom says password systems can be good enough, but better means of authentication may be required. In general, one would expect the lower rated systems to use simpler mecha- nisms than the higher rated systems. At C1, simple type 1 me'chanisms or any of the simplest artifact schemes (e.g., lock combinations or keys to locked doors to terminal rooms for a user population known to the system only as defined groups) might be sufficient, based on the site where the system is used. At C2, any of the random pronounceable password systems or any of the sim- pler artifact (e.g., a challenge response table) or biometric systems (e.g., 22
POSSIBLE METHODS OF IMPLEMENTATION measurement of hand geometry, inter-ocular distance, or other Bertillon measures) seem appropriate. At B1, passphrases, random pronounceable passwords of at least 8 characters, challenge-response schemes, one-time passwords, advanced artifacts (e.g., termi- nal Iogon "keys" or magnetic striped cards), or biometric systems (e.g., fingerprints, retinal images, or voice images) might be appropriate. For higher levels (B2, 03, and Al), authentication could be based on at least two of the three generic ways of verifying identity. A magnetic striped card and a password, a PIN used to start a challenge-response device, or a biometric device and a password could be used in combination to increase the "work factor" of at- tempting to subvert or diagnose the authentication parameter(s). Although not specifically addressed in the TCSEC, the evaluation process must consider the strength of the l & A mechanism in relation to the evaluation class. The assurance associated with a chosen mechanism must be appropriate for the evalu- ated class. As an aside, the strength of the l & A mechanism should also be based on the environment the system will be used in and the risk of losing the data on the sys- tem. Remember, it's possible that a C2 system running at system high with very sensitive data would need a high assurance l & A mechanism just as an Al system would. It's interesting to observe that password systems have rarely failed to perform their function on the systems protected. The bulk of password failures is due to mis- feasance, sharing of passwords with an otherwise unauthorized individual, or care- less handling of passwords (at least as serious as equivalently careless handling of safe combinations). Some agencies treat careless handling of passwords with the same degree of seriousness as leaving safes unlocked and unattended. For mul- tilevel systems handling classified data, the password is classified at the highest lev- el of information authorized the user to whom it belongs. One can manage a password scheme properly with frequent changes of pass- words and a pronounceable random password generator used to eliminate some of the simpler guessing attacks. It's true people can misuse the system by not treating their passwords properly (e.g., by writing them on their terminals, by deliberately 23
IDENTIFICATION & AUTHENTICATION GUIDELINE giving them away, or allowing them to be observed by others when used). Neverthe- less, the low cost and high degree of effectiveness make passwords the authentica- tion method of choice for most systems. If users are allowed to pick their own specific authenticators, their behavior is stereotypical enough to permit diagnosis and recovery of the selected authentica- tion. This is especially true of systems permitting users to pick their own passwords. As a consequence, the technique of a system administrator making the (initial) se- lection of the authenticator is better security practice than it appears at first glance. 24
GLOSSARY ASSURANCE A measure of confidence that the security features and architecture of an automated information system accurately mediate and enforce the security policy. AUDIT TRAIL A chronological record of system activities that is sufficient to enable the reconstruction, reviewing, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event in a transaction from its inception to final results. AUTHENTlCATE Verify a claimed identity as legitimate and belonging to the claimant. AUTHORIZATION An individual's right to access or use an object. CRYPTOGRAPHY The principles, means, and methods for rendering information unintelligible, and for restoring encrypted information to intelligible form. DISCRETIONARY ACCESS CONTROL (DAC) A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject. DISCRETIONARY ACCESS PRIVILEGE Access granted to objects based on the identity of a subject and/or the groups to which they belong. DOMINATE Security level S, dominates security level S2 if the hierarchical classification of S, is greater than or equal to that of S2 and the non-hierarchical categories of S, include all those of S2 as a subset. 25
IDENTIFICATION & AUTHENTIcATIoN GUIDELINE IDENTITY A unique name or number assigned to an individual using a system. LEAST PRIVILEGE The principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use. MANDATORY ACCESS CONTROL (MAC) A means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity. OBJECT A passive entity that contains or receives information. Access to an object potentially implies access to the information it contains. Examples of objects are: records, blocks, pages, segments, files, directories, directory trees, programs, bits, bytes, words, fields, processors, video displays, keyboards, clocks, printers, and network nodes. SENSITIVITY LABEL A piece of information that represents the security level of an object and that describes the sensitivity (e.g., classification) of the data in the object. The TCB uses sensitivity labels as the basis for mandatory access control decisions. SPOOFING An attempt to gain access to a system by posing as an authorized user. Synonymous with impersonating, masquerading, or mimicking. SUBJECT An active entity, generally in the form of a person, process, or device that causes information to flow among objects or changes the system state. Technically, a process/domain pair. 26
GLOSSARY TRUSTED COMPUTING BASE (TCB) The totality of protection mechanisms within a- computer system -including hardware, firmware, and software -the combination of which `is responsible for enforcing a security policy. It creates a basic protection environment and provides additional user services required for a trusted computer system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (e.g., a user's clearance) related to the security policy. TRUSTED PATH A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. This mechanism can only be activated by the person or the Trusted Computing base and cannot be initiated by untrusted software. VERIFY To prove the truth of by presenting evidence or testimony; substantiate. 27