[5672] in Kerberos

home help back first fref pref prev next nref lref last post

Re: authentication secure?

daemon@ATHENA.MIT.EDU (Sam Hartman)
Fri Aug 11 11:09:46 1995

To: Art Houle <houle@acns.fsu.edu>
Cc: Sam Hartman <hartmans@MIT.EDU>, Joe Beiter <jwb@wilbur.hhisland.com>,
        kerberos@MIT.EDU
In-Reply-To: Your message of "Fri, 11 Aug 1995 09:11:18 EDT."
             <Pine.SUN.3.91.950811090212.9146A-100000@acns.fsu.edu> 
Date: Fri, 11 Aug 1995 10:59:25 EDT
From: Sam Hartman <hartmans@MIT.EDU>

>>>>> "Art" == Art Houle <houle@acns.fsu.edu> writes:

    Art> 'tap the phone line..'

    Art>   That is an interesting point of exposure.  If this was a
    Art> voice transaction that would be simple. Since modems
    Art> negotiate the modulation scheme, it seams that connecting to
    Art> the pair of wires is the easiest part of this. Setting up a
    Art> listening modem for the correct modulation scheme would
    Art> require some archane knowledge and tools that few hackers
    Art> have access to. As someone who has hardware and software
    Art> background, I see this as the hardest part. Unless I work for
    Art> a modem manufacturer, or am willing to wirewrap my own
    Art> hardware, this seems beyond the normal modems capabilities.

    Art> ..comments?

    Art> As once mentioned in a security lecture on kerberos , the
    Art> easier solution is to bribe someone.

	This used to be trivial; below 2400 baud, you can actually
disable the carrier generator on some modems and actually get it to
listen to the conversation.  I suspect it's also fairly trivial under
ISDN for those with sufficient clue.

	Socially accepted practice at MIT ais that you can type your
root instance password over a dialup line *directly connected to a
workstation*.  However, you are expected to change your password as
soon as you get to a secure location.  Also, this is only done in
emergencies.  The general rule of thumb is only type passwords over an
end-to-end secure channel, and with the availability of SLIP/PPP, this
just really isn't that hard to accomplish.

	Social engineering is probably cheaper than connecting a modem
to a phone line.  However, we can only do so much about social
attacks; we can be as paranoid as we like about technical attacks.

--Sam


    Art> Art Houle e-mail: houle@acns.fsu.edu Academic Computing &
    Art> Network Services Voice: 644-2591 Florida State University
    Art> FAX: 644-8722



home help back first fref pref prev next nref lref last post