[3355] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SecurID White Paper - A Comment

daemon@ATHENA.MIT.EDU (Alan Cox)
Mon Sep 16 14:37:38 1996

Date: 	Mon, 16 Sep 1996 09:42:45 +0100
Reply-To: Alan Cox <coxa@cableol.net>
From: Alan Cox <coxa@cableol.net>
X-To:         vin@shore.net
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <v02130504ae5e255e652f@[198.115.177.207]> from "Vin McLellan" at
              Sep 13, 96 07:10:28 am

> powerful freeware packet-manipulation tools like Netcat, it might be about
> to explode -- more of us will doubtless choose to buy link or
> application-level crypto. But it is, and should always be, a cost/benefit
> calculation. Not a bribe to keep the boogieman away.

There is no major cost issue. ssh is free except for a small amount of
extra CPU load. Secure mirroring software using rsync and ssh exists.

>         OTPs serve purposes other than safeguarding network TCP links from
> session stealing. In many organizations, these are seen as valuable
> functions.  OTP tokens offer greater credibility to both audit and

OTP's don't help protect the important stuff. If someone does a session
intercept on your backbone router boy have you got some SERIOUS problems.
Worse with stuff like cisco's a UDP intercept including spraying the
router with a 1st tftp data block including a cisco password waiting for
a boot is just too easy MUCH too easy.

>         Mr. Neuman asserts that SecurIDs provide "no additional  benefit"
> over reusable passwords when used on a cleartext Internet connection. I
> suggest this overstates his case considerably, in light of the current
> prevalence of stolen passwords and replay attacks.  [I'm also a little

I think he is close to right. At the end of the day if you get broken into
you get broken into. The simple securID attacks demonstrated show the
weakness of a pure OTP. Other things show the weakness of pure crypted
channels.

>         When a traveling executive accesses his e-mail server with SecurID
> over the Internet, he might possibly be hijacked.  That might be
> embarrassing... but it's nothing like the danger involved in having a
> Pirate win access the corporate financial reports or development plans, for
> instance. That data, if on another server, could (even likely, would)
> require an _additional_ SecurID token code... or (perhaps best) might be
> simply unavailable through the ACE/Client which serves external network
> links.

Pity if someone emailed to to the travelling executive. Its better to have
blanket coverage simply because human beings make regular stupid mistakes,
even the best ones.

> first identifier, typically the user's name, as the answer needed to all
> race attacks.  (Revising a protocol which has to remain backward compatible
> to ACE/Clients imbedded in some 200 network products from some 50 vendors
> is an interesting challenge;-)

You mean you forgot to include a secure download and reprogram of the client
units. Ah well

Alan

home help back first fref pref prev next nref lref last post