home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.isis
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!rpi!batcomputer!cornell!ken
- From: ken@cs.cornell.edu (Ken Birman)
- Subject: Re: Security in ISIS
- Message-ID: <1992Aug31.185652.21586@cs.cornell.edu>
- Organization: Cornell Univ. CS Dept, Ithaca NY 14853
- References: <barry.715250287@citr.uq.oz.au>
- Date: Mon, 31 Aug 1992 18:56:52 GMT
- Lines: 60
-
- In article <barry.715250287@citr.uq.oz.au> barry@citr.uq.oz.au (Barry Kitson) writes:
- >Hi all,
- >
- > Thanks for your previous response (Ken) but it's only
- >encouraging me :^)
-
- Actually, thats what the user group is for!
-
- >
- > How well is security handled by Isis? I know about the
- >authentication necessary for joining, or becoming a client of
- >a group (presenting "credentials"), and about the remote
- >execution password requirements (a la UNIX), but are there any
- >other useful security mechanisms built in? Does Isis do anything
- >to protect the RPCs from being replayed or edited?
-
- Now:
- The current ISIS system is pretty weak; you would need to use Kerberos
- (or DCE, which can be used with ISIS) and invoke Kerberos routines to
- encrypt messages and generate signatures; the group join and client
- interfaces in ISIS give you a chance to send in "credentials" which
- the group can check and reject.
-
- ISIS also has a way to filter messages so that only messages from
- acceptable sources are delivered.
-
- ISIS does not prevent you from replaying or editing messages, but
- in practice it would be very hard to forge message origin information
- or to "pun" by slipping messages into an ISIS message stream -- ISIS
- has a great deal of channel state and messages that surprise it get
- discarded. Still, this is far from a security environment...
-
- Future:
-
- Mike Reiter has written two TR's on a new, rigorous security architecture
- that he is implementing as part of a new ISIS system being developed at
- Cornell. Mike's stuff is genuinely secure and goes well beyond this
- set of current options. Mike gets email as reiter@cs.cornell.edu.
- The TR's are:
-
- 92-1287* &\parbox[t]{5in}{How to Securely Replicate Services. Michael
- Reiter and Kenneth Birman. June 1992.}
-
- 92-1269* &\parbox[t]{5in}{Integrating Security in a Group Oriented
- Distributed System (replaces 1239). Michael Reiter, Kenneth Birman,
- and Li Gong. February 1992}
-
- Mike's architecture covers all your objectives, could live within
- an orange-book style multi-level security system, and does some nice
- things to achieve fault-tolerance and security both at once...
- >
- > Also, is there any time service available on Isis?
-
- No, we leave this to the OSF and UI Atlas people... Sounds like you need
- DCE; then you can ask "can ISIS be used within DCE" and we can reply "sure".
- (This is no problem...)
- --
- Kenneth P. Birman E-mail: ken@cs.cornell.edu
- 4105 Upson Hall, Dept. of Computer Science TEL: 607 255-9199 (office)
- Cornell University Ithaca, NY 14853 (USA) FAX: 607 255-4428
-