home *** CD-ROM | disk | FTP | other *** search
- Submitted-by: epstein@trwacs.uucp (Jeremy Epstein)
-
- In article <1991Jul2.224427.784@uunet.uu.net>, peter@Sugar.NeoSoft.com (Peter da Silva) writes:
- > Submitted-by: peter@Sugar.NeoSoft.com (Peter da Silva)
- >
- > In article <1991Jun28.192719.17816@uunet.uu.net> jmcarli@ns.PacBell.COM (Jerry M. Carlin) writes:
- > > The BIG problem I see with 1003.6 is lack of I&A; identification and
- > > authentication. What has been lacking for a LONG time is decent login.c,
- > > passwd.c etc functionality including ability to develop local rules
- > > passwords. We've seen a number of reimplementations of these functions
- > > on the net precisely because the current ones are so bad & inconsistant.
- >
- > Yes. We need to be able to do the following things:
- >
- > Allow or deny access on a per-port or per account basis (for example,
- > disable ttyM025 and user3... we have this, but it's not
- > very clean and quite inconsistent for the per-port stuff).
- > Allow or deny access on a scheduled basis (only allow backup to log
- > in from 2AM through 10AM, all others are kept off from 2AM
- > through 6AM).
- > Allow or deny access to port/account combinations (for example,
- > ttyM020 only allows user1 and user2 on, all others get
- > "permission denied", root and backup can only log in to
- > console or ttyf01, and "telnet" can't log in on any network
- > ports).
- > And other combinations (allow user1 on ttyM020 from 5PM through 8AM
- > and all day weekends).
-
- I'm a member of the 1003.6 working group, but speaking for myself only.
-
- All of these ideas are good ones, but they miss the point. 1003.6 is
- extending 1003.1 and 1003.2 to add security relevant features. 1003.1
- has no mention of either login or passwd; 1003.2 mentions passwd (although
- I'm not sure that it will make it into the standard), but with many weasel-
- words. [For example, the passwd command *may* (according to 1003.2) simply
- give you instructions on how to change your password, such as contacting your
- security administrator, getting a brain transplant, or whatever.]
-
- In the near future we'll see many systems which don't even use passwords
- for authentication (I assume there are already some out there, but I'm
- not sure). You'll see smart cards, voiceprints, retina scans, fingerprint
- analysis, etc. It's not a good idea to specify a password-based scheme as
- a standard when technology is already growing beyond that.
-
- Even if you do accept a password-based scheme, what rules do you want to
- enforce? Should the standard use the DoD password guidelines (no words,
- randomly chosen pronouncable syllables)? Password ageing? There are
- undoubtedly other international standards which may conflict with the DoD
- guidelines.
-
- Having said all that, once there is some agreement on a meta-mechanism for
- authenticating users I think it's entirely reasonable to define a mechanism
- for rules. What Peter da Silva suggests are some good ones, but there's
- much more...for example, you might be allowed or denied access based on the
- results of a breathalyzer (sp?) attached to the side of the system (i.e.,
- if you're drunk, no playing footside with top secret information). There's
- more than simple yes/no decisions that Peter suggests: depending on the time
- of day, day of the week, login terminal, etc., you may have different
- privileges available to you, be audited differently, have different clearances
- available (you may only be able to access "unclassified" data from ttya,
- but "secret" from ttyb), etc.
-
- Incidentally, 1003.1 has no notion of what a "user" is, which means breaking
- major new ground for any such extensions.
-
- 1003.6 will be going to ballot soon (I hope!) with the current proposed
- standard. I assume that we'll then put in another request to pursue additional
- areas of security standardization, possibly including some of the topics
- discussed by Peter and Jerry Carlin.
-
- Again, I speak only for myself, and not for 1003.6 or my employer.
- --
- Jeremy Epstein UUCP: uunet!trwacs!epstein
- Trusted X Research Group Internet: epstein@trwacs.fp.trw.com
- TRW Systems Division Voice: +1 703/876-8776
- Fairfax Virginia
-
-
- Volume-Number: Volume 24, Number 35
-
-