[154] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

re: what are realistic threats

daemon@ATHENA.MIT.EDU (Dave Kristol)
Thu Sep 29 15:38:10 1994

Date: Thu, 29 Sep 94 09:00:28 EDT
From: dmk@allegra.att.com (Dave Kristol)
To: shirey@mitre.org
Cc: www-buyinfo@allegra.att.com, www-security@ns1.rutgers.edu
Reply-To: dmk@allegra.att.com (Dave Kristol)

shirey@mitre.org (Robert W. Shirey) says:
  > At 10:00 AM 9/28/94 -0400, Dave Kristol wrote:
  > 
  > >Given these definitions, an "active" attack is the same as a "hardware"
  > >attack.
  > 
  > That is *not* the widely-accepted definition, and it will just cause
  > confusion.
  > 
  > Regarding definitions, how about  these (again, from a IRTF/IETF  document
  > in progress):
  > 
  >     A *passive attack* does not modify data or affect system operation
  >     but an *active attack* does.
  > [Lots of valuable stuff deleted]

Okay, I stand corrected.  There's still one class of stuff that seems
to fall in a gray area:  bogus packets introduced by an adversary, such
as for replay attacks or to otherwise fool a host.  Your definition
only makes that an *active attack* if it actually affects system
operation.  The packets were no doubt MEANT to affect system operation,
but perhaps countermeasures thwart the attack.  I think the definition
of *active attack* should reflect intent, not success.


home help back first fref pref prev next nref lref last post