home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!portal!cup.portal.com!Chris_F_Chiesa
- From: Chris_F_Chiesa@cup.portal.com
- Newsgroups: comp.os.vms
- Subject: Re: Failures in system security.
- Message-ID: <69768@cup.portal.com>
- Date: Wed, 18 Nov 92 09:39:32 PST
- Organization: The Portal System (TM)
- References: <1duniqINNkrp@gap.caltech.edu>
- <1992Nov13.100241.254@rlgsc.com> <1e2e81INN9h4@gap.caltech.edu>
- <1992Nov16.154413.13758@ncsa.uiuc.edu> <1992Nov17.004401.256@rlgsc.com>
- Lines: 33
-
- Robert "Bob" Gezelter (gezelter@rlgsc.com) writes:
-
- > [...] Any validation scheme which starts out with
- >"Believe the credentials that the person who just walked in the
- >door is holding" is an incident waiting to happen. As I noted
- >earlier in this thread, the fact that an incomming request
- >appears to have come from a privileged user on another node is,
- >for most intents and purposes, a useless piece of information.
-
- If we can't trust the "credentials that the person who just walked in the
- door is holding," then what credentials CAN we trust? I submit that the
- answer is "NONE!" The Unix world, as I understand it, hands off the respon-
- sibility to a "trusted" central authority -- is this what Kerberos is? --
- but this just pushes the problem off on someone else: it becomes the "central
- authority"'s responsibility to decide whether HE can trust the credentials
- borne by those who come looking for his blessing. And how do we, in turn,
- KNOW that we can trust that central authority? System failure, software bugs,
- malicious hacking, or -- heck -- bribing a human central-authority-system-
- manager could easily lead to falsified credentials even from the "trusted"
- central authority. Any security system invented by Man can be spoofed by Man.
-
-
- Either we reach a point, somewhere, in ANY security scheme, where we MUST
- trust information given to us by some other party -- OR we trust NO one and
- the system is secure by means of being totally inaccessible -- in which case
- it may as well not exist. What use are computing resources that no one can
- get to? I guess there are standards committees in existence whose function,
- basically, is to define the arbitrary point at which we draw the line and
- commit ourselves to trusting second- (or third- or fourth- or...) hand cre-
- dentials.
-
- Chris Chiesa
- Chris_F_Chiesa@cup.portal.com
-