home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!newsgate.watson.ibm.com!news.ans.net!cmcl2!rlgsc.com!gezelter
- From: gezelter@rlgsc.com
- Newsgroups: comp.os.vms
- Subject: Re: Failures in system security.
- Message-ID: <1992Nov19.115004.257@rlgsc.com>
- Date: 19 Nov 92 11:50:03 EST
- References: <1duniqINNkrp@gap.caltech.edu><1992Nov13.100241.254@rlgsc.com> <69768@cup.portal.com>
- Organization: Robert Gezelter Software Consultant, Flushing, NY
- Lines: 52
-
- In article <69768@cup.portal.com>, Chris_F_Chiesa@cup.portal.com writes:
- > Robert "Bob" Gezelter (gezelter@rlgsc.com) writes:
- >
- >> [...] Any validation scheme which starts out with
- >>"Believe the credentials that the person who just walked in the
- >>door is holding" is an incident waiting to happen. As I noted
- >>earlier in this thread, the fact that an incomming request
- >>appears to have come from a privileged user on another node is,
- >>for most intents and purposes, a useless piece of information.
- >
- > If we can't trust the "credentials that the person who just walked in the
- > door is holding," then what credentials CAN we trust? I submit that the
- > answer is "NONE!" The Unix world, as I understand it, hands off the respon-
- > sibility to a "trusted" central authority -- is this what Kerberos is? --
- > ...
- > central authority. Any security system invented by Man can be spoofed by Man.
- >
- >
- > ...
- >
- > Chris Chiesa
- > Chris_F_Chiesa@cup.portal.com
- --
- Chris,
-
- I may not have stated my point as clearly as is possible.
-
- There are two cases: your local machine authenticates
- information, or somewhere outside authenticates information.
- Challenge based authentication schemes are governed by this fact.
- Kerberos (which is based upon private key cryptography) and
- similar schemes using public key cryptography involve a level of
- authentication for the installation offering to confirm
- credentials. Present schemes do not.
-
- Consider a gross simplification. As an example, if in a public key
- crypto based authentication system, I decode your message using
- your public key (which means that it was encoded using your
- private key), I have a fair degree of certainty that you
- generated it. I am not, for the most part, making assumptions
- about central authority (yes.. I know that you could bribe an
- official to mis-publish your public key in the book, but that
- would be easily detected in most cases).
-
- - Bob
- +--------------------------------------------------------------------------+
- | Robert "Bob" Gezelter E-Mail: gezelter@rlgsc.com |
- | Robert Gezelter Software Consultant Voice: +1 718 463 1079 |
- | 35-20 167th Street, Suite 215 Fax: (on Request) |
- | Flushing, New York 11358-1731 |
- | United States of America |
- +--------------------------------------------------------------------------+
-