[59955] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: User negligence?

daemon@ATHENA.MIT.EDU (Stephen Sprunk)
Sun Jul 27 23:51:23 2003

From: "Stephen Sprunk" <stephen@sprunk.org>
To: "Jamie Reid" <Jamie.Reid@mbs.gov.on.ca>
Cc: <wb8foz@nrk.com>, <chris@UU.NET>,
	"North American Noise and Off-topic Gripes" <nanog@merit.edu>
Date: Sun, 27 Jul 2003 22:38:20 -0500
Errors-To: owner-nanog-outgoing@merit.edu


Thus spake "Jamie Reid" <Jamie.Reid@mbs.gov.on.ca>
> All that user end security devices do is put more non-repudiable
> onus on the user, so that when it fails, the service provider is
protected,
> and the user is cryptographically guaranteed to be SOL.
> ... and when the database gets compromised, nobody will believe that
> the user isn't responsible, because "The System is Perfect".

I hope this was in jest...  All it will take is one expert witness to show
the system is not perfect and there's hundreds of ways the bank (or even a
smart criminal) could defraud the user.

> Biometrics are an excellent example of this. They are a single factor
> authentication technology, maybe two factor if there is a PIN,

There are now techniques to copy latent fingerprints off surfaces and
produce counterfeits that have been shown to fool _all_ commercially
available fingerprint gear -- and it costs less than $2 per use.

Biometrics is a failure because there is no shared secret; once a user
submits to a test (either knowingly or not), the validator has all the
information necessary to spoof that person _for the rest of their life_.

S

Stephen Sprunk         "God does not play dice."  --Albert Einstein
CCIE #3723         "God is an inveterate gambler, and He throws the
K5SSS        dice at every possible opportunity." --Stephen Hawking



home help back first fref pref prev next nref lref last post