[109057] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: PIII and Windows GUID serial numbers...

daemon@ATHENA.MIT.EDU (amp@pobox.com)
Tue Mar 9 18:55:03 1999

From: amp@pobox.com
Date: Tue,  9 Mar 1999 16:29:52 -0500
To: cypherpunks@cyberpass.net, Sunder  <sunder@brainlink.com>
Reply-To: amp@pobox.com

goto www.sysinternals.com
or www.systeminternals.com
(I can't remember which as I'm at home and am not online as I type this.)

They have a program that will generate a new GUID for your PC. It is marketed as being useful for 
folx who clone hard disks for use in equipping an office. Methinks it might be useful for the 
paranoid as well.

I'd probably use it at work, but that darned GUID is the token used by NT Domain servers to 
authenticate workstations on a domain. The program at sysinternals.com apparently generates a 
random one when you need it. 

OBCrypto:
I think it would be useful to have one that could generate a specific one as well. One could 
distribute the number far and wide to make sure that the number in question would not be of any 
use to snoopers. Think I'll ask if they would modify their code to make this possible.

amp

------------------------
  From: Sunder <sunder@brainlink.com>
  Subject: Re: PIII and Windows GUID serial numbers... 
  Date: Tue, 09 Mar 1999 14:55:01 -0500 
  To: Eric Cordian <emc@wire.insync.net>
  Cc: jim@acm.org, cypherpunks@cyberpass.net




Eric Cordian wrote:
> 
> I will entertain arguments about plunging being nonsense.  I wlll not
> entertain arguments about "worthless for authentication" being
> nonsense, at least in the strong cryptographic sense.

Speaking of which have you guys see: 

http://www.theregister.co.uk/990307-000006.html

NT apparently does already do a serial number off your MAC address if you
have a NIC.  It's called a GUID. Now last night being curious I ran Regedit
and snooped for everything that said "GUID" and found several of them. Seems
there are lots of these.  Anyone know which one is the "real" GUID and what
the others are for?

-- 
---------------------------- Kaos Keraunos Kybernetos -------------------- 
 + ^ +  Sunder              "The real aim of current policy is to     /|\ 
  \|/   sunder@brainlink.com ensure the continued effectiveness of   /\|/\ 
<--*--> ALLOW FREE EXPORT    OF US information warfare assets against\/|\/ 
  /|\   STRONG CRYPTOGRAPHY! individuals,businesses and governments   \|/ 
 + v +  PROTEST WASSENAAR!!! in Europe and elsewhere" -- Ross Anderson 
---------------------------- http://www.sunder.net -----------------------
RESTRICTED DATA - This material contains RESTRICTED DATA as defined in 
the Atomic Energy Act of 1954. Unauthorized disclosure subject to 
administrative and criminal sanctions. NOFORN ORCON WNINTEL SIOP-ESI CNWDI


---------------End of Original Message-----------------

======================================
Name: amp
Date: 03/09/99    Time: 16:29:52
E-mail: amp@pobox.com

The easiest way to maximize the amount of information 
over a communication line (in the theory's terms) is 
to hook up a random noise generator to it.



home help back first fref pref prev next nref lref last post