[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <44192C75.1341.68E44EE4@nick.virus-l.demon.co.uk>
Date: Wed Mar 15 20:14:41 2006
From: nick at virus-l.demon.co.uk (Nick FitzGerald)
Subject: HTTP AUTH BASIC monowall.
Simon Smith wrote:
> I am not missing your point. It is me who is not being clear about
> what I am asking hence why everyone is telling me one thing when I really
> want to hear something else. I want to protect the authentication data
> within the SSL session because I do not trust the HTTP BASIC auth and I
> most certainly do not trust the end users to always do whats right. I want
> a technology to protect the data, not a user who can be social engineered
> into doing something wrong.
Ahhh -- so the solution you are really looking for is this long-kept,
deep dark security guru guide to success (I hope none of the real
security ninjas decide to kill me for divulging it as I'm not supposed
to know):
Never tell anyone anything!
If you don't tell anyone the passwords to anything, then they can never
disclose them, no matter how cruel and unusual the torture applied to
them (or whatever more subtle SE measures that may be employed by a
really determined attacker).
Of course, if you are one of the employees or others involved in
setting the system up in the first place (or at least in securing it
post-installation), you cannot tell yourself those passwords either.
But damn, you alkready know them because your told yourself while
(re-)setting them...
Quick -- devise a script to automatically change all the initial
passwords you know to ones randomly generated by the script at runtime
and that are not recorded anywhere by the script and you'll be set.
Of course, _no-one_ will be able to use your IT system for anything
useful, but it will be darned secure, as even connecting electrodes to
_your_ genitals and repeatedly applying just short of fatal shocks will
_never_ result in disclosure of any working access mechanism, nor will
any less subtle means (exclusing some based on physical access).
But at least you will have what you say you want -- a technoloy that
protects your data "and not a user who can be social engineered into
doing something wrong".
Seriously -- you have missed the most basic aspect of computer
security. It is a _process_ evolving and changing over time as your
technology uses and needs change _AND_ it is not about risk prevention
but all about risk mediation and management...
What you are asking for is nonsensical within that proper undrstanding
of the nature and role of computer security, which is why you are both
getting the "wrong" kind of responses and struggling to "sensibly"
frame your question to get the answer you (think you) want.
If people are involved in using a system it will be fallible. You can
always manage that fallibility a bit better than you are now, but
depending on the value of the material being "protected" there will
always be a point where the cost of ratcheting any more security into
your system is not worth the resulting (miniscule) increase achieved.
It seems that you have particularly unrealistic expectations in this
regard...
Regards,
Nick FitzGerald
Powered by blists - more mailing lists