[1076] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Thoughts on the next target.

daemon@ATHENA.MIT.EDU (Frank Willoughby)
Tue Jun 24 14:27:55 1997

Date: Tue, 24 Jun 1997 09:13:24 -0500
To: "Marcus Leech" <mleech@nortel.ca>
From: Frank Willoughby <frankw@in.net>
Cc: dpj@world.std.com (David P. Jablon), cryptography@c2.net

At 09:59 PM 6/23/97 -0500, Marcus Leech wrote:
8< [snip]

>Brute-forcing the SecurID hash algorithm, for example would require
>  that someone violate their license agreement with Security Dynamics/RSA.
>  "Algorithm Thieves today showed that SecurID cards aren't as secure
>   as manufacture claims".

Actually, an attacker doesn't need to crack the SecurID hash algorithm.
It's too much trouble & doesn't get you anywhere.  Just let the user 
log in to the system, disable the user's system (flooding attack) & take 
over the session (session hijacking).  

Any authentication-only mechanism (SecurID, Digital Pathways, S/Key, 
etc.) is vulnerable to this attack.  The only serious defense against
session hijacking requires end-to-end encryption (of course).  8^)



>----------------------------------------------------------------------
>Marcus Leech                   Mail: Dept 8M86, MS 238, CAR
>Systems Security Architect     Phone:    (ESN) 393-9145  +1 613 763 9145
>Systems Security Services      Fax:      (ESN) 395-1407  +1 613 765 1407
>Nortel Technology              mleech@nortel.ca
>-----------------Expressed opinions are my own, not my employer's------
>
>
>
The opinions of the author of this mail may not necessarily be 
representative of the opinions of Fortifed Networks, Inc.

Fortified Networks, Inc. - http://www.fortified.com/
Expert (vendor-neutral) Computer and Network Security Consulting
Phone: (317) 573-0800     Fax:   (317) 573-0817

home help back first fref pref prev next nref lref last post