[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Basic Flaws in Internet Security and Commerce
>A fine piece of work. The ideas expressed in this paper should scare
>the hell out of everyone who uses NFS for any serious applications,
>which for a fact includes most banks and all investment banks and
>brokage houses. In this particular area I KNOW what is at risk.
>Again, I congratulate the authors on a first-class effort.
>
>
The real issue is not NFS itself but RPC and the interface layer between
the system and these layered services. In fact holes also exist in RLOGIN,
REXEC, and RSH (ports 512,513, and 514).
Cant tell you how many secure systems we have broken because of these
little goodies.
The real issue is that by itself TCP/IP has no security to speak of, and
more importantly the concept of secure messaging goes much farther than
just keeping prying eye's off the data contained within. For instance
Commerce Models require synchonization of process events in order to manage
OLTP properly. TCP/IP in and of itself is really unusable for these tasks
without something like the ISIS messageing protocol and process control
1interface above the protocol stack.
All in all it's a complex nut to crack.
Todd
cheers,
> paul
>
>> From [email protected] Tue Oct 10 03:15:15 1995
>> From: [email protected] (Paul_A Gauthier)
>> To: [email protected], [email protected]
>> Cc: [email protected], [email protected], [email protected],
>> [email protected], [email protected]
>> Subject: Basic Flaws in Internet Security and Commerce
>> Date: Mon, 09 Oct 1995 14:26:06 -0700
>> Sender: [email protected]
>> Content-Length: 10235
>>
Regards,
T. S. Glassey
Chief Technologist
Looking Glass Technologies
[email protected]
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQB1AwUBMFu5E6gNRnWhagU5AQHI+gL+Mwpcd3lAWd8FF06qcG6rnLhIYveHW71a
XC7xh1T0uu8qnYX31yMp17OG28jWpKUbWec1IM9/eXOi+gInA7rKICWczV8zo9Z0
0puxjRRN7yO4KfRb3cPpk+r0p6pDg01Y
=bTYb
-----END PGP SIGNATURE-----