Re: Cryptanalysis of SecurID (ACE/Server)

New Message Reply About this list Date view Thread view Subject view Author view

Perry E. Metzger (perry@piermont.com)
Thu, 01 Oct 1998 19:53:27 -0400


"John Moore" writes:
> > Okay. So, we've changed the problem from stealing the laptop to
> > stealing the token in the guy's wallet. Could you explain why this is
> > better in some way?

> Yes. The two fact works if the guy doesn't have a laptop. If he is using
> some other system to make access (yes, I know, it could have a trojan in
> it).

As I've noted, however, you can hijack the guy's TCP session if he
isn't running some sort of cryptographic authentication on the entire
connection anyway. If you want to use SecurID from a telnet from some
random machine, you are asking to be hacked.

Perry


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:15:19