[1086] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Thoughts on the next target.

daemon@ATHENA.MIT.EDU (Marcus Leech)
Tue Jun 24 22:24:15 1997

From: "Marcus Leech" <mleech@nortel.ca>
To: vin@shore.net (Vin McLellan)
Date: Tue, 24 Jun 1997 21:36:03 -0500 (EDT)
Cc: cryptography@c2.net
In-Reply-To: <v03007807afd60310b005@[198.115.179.81]> from "Vin McLellan" at Jun 24, 97 09:26:09 pm

> 	Frank Willoughby <frankw@in.net> is, of course, correct to note
> that any session over TCP/IP (with or without initial user authentication)
> can be hijacked unless it is protected by encryption or some continuous
> message authentication.  (That's why so many sites now use OTPs over SSH.)
> Mr. Willoughby is incorrect, however, in suggesting that the strength of
> the SecurID hash is irrelevant just because session hijacking is possible.
> 
> 	Without going into who, where, might run OTP authentication without
> crypto, let me just point out that an attack able to retrieve a SecurID
> seed would allow a bad guy to whip up his own PRN generator and masquerade
> as the valid user at will.  As Frank explained, session hijacking generally
> requires that the attacker flood or blow off the valid user's machine, in
> order to steal a current _ongoing_ session.  A reversible hash is a threat
> of a different dimension.
> 
In fact, I routinely use SecurID in contexts where "session stealing" isn't
  possible (SSH, and some proprietary ISAKMP-like things I've developed
  over the last couple of years).  If an attack against SecurID *were*
  feasible, I'd certainly be extremely nervous.

-- 
----------------------------------------------------------------------
Marcus Leech                   Mail: Dept 8M86, MS 238, CAR
Systems Security Architect     Phone:    (ESN) 393-9145  +1 613 763 9145
Systems Security Services      Fax:      (ESN) 395-1407  +1 613 765 1407
Nortel Technology              mleech@nortel.ca
-----------------Expressed opinions are my own, not my employer's------

home help back first fref pref prev next nref lref last post