home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!caen!hellgate.utah.edu!cc.usu.edu!jrd
- From: jrd@cc.usu.edu (Joe Doupnik)
- Newsgroups: comp.sys.novell
- Subject: Re: Security Patches - How Secure???
- Message-ID: <1992Nov19.083022.61028@cc.usu.edu>
- Date: 19 Nov 92 08:30:22 MDT
- References: <1992Nov19.030232.10943@umr.edu>
- Organization: Utah State University
- Lines: 38
-
- In article <1992Nov19.030232.10943@umr.edu>, rfranken@mcs213i.cs.umr.edu (Richard Brett Frankenberger) writes:
- > I hate to be the one to start another security discussion here, but inquiring
- > minds want to know ... (seriously, I believe Netowrk administrators should
- > have access to this information) ...
- >
- > Novell recently released patches designed to counteract HACK.EXE. It appears
- > that this will prevent HACK.EXE and anything like it from working.
- <history part omitted>
- > What I am looking for here is either:
- >
- > (a) a statement that this CAN BE DONE. (I would not expect details, as
- > they could be used by a hacker to gain access, although hacker's will probably
- > figure this out before too long); or
- >
- > (b) A detailed explanation of why it cannot be done. There is no danger in
- > disclosing protocol details if it won't do hacker any good. A statement from
- > someone simply saying this CANNOT BE DONE doesn't mean much - I would much
- > rather have it stand up to the scrutiny of the net. (Unix and TCP/IP).
- > (And novell has applied for a patent, no there should be no trouble with the
- > disclosing of how it works)
- >
- > Does anyone have any information in this area?
- >
- > - Brett (rfranken@cs.umr.edu)
- -----------------
- Rather than expend lots of bandwidth on inconclusive results may
- I recommend reading up on Kerberos, part of the MIT Project Athena, as
- a start. There is no 100% guaranteed, foolproof, absolute, "statement",
- way of preventing spoofing or other break-ins; people are deviously clever.
- Don't forget to shred and burn your user's scrap paper, check their picture
- idents, voice prints, telephone lines, leakage of video display signals
- (Tempest qualification) and so on. Certainly never put info on a Unix machine
- because it leaks like a sieve. And watchout for spoof servers (while the real
- ones are unplugged) and bogus backup tapes. Kerberos makes a good try at
- net.security, but it is not without cost and pain. Meanwhile, ordinary users
- are the largest security holes, by far. In other words, if the game is
- security then view the whole situation.
- Joe D.
-