[vpn] Schneir's 'Weak Link' Observation (was Two Factor Authe ntication)

Dan McGinn-Combs Dan.McGinn-Combs at geac.com
Thu Apr 11 16:07:26 EDT 2002


Of course you are correct about hackers and compliance. But the problem is
that policies and procedures are there to provide a baseline against which
the hacker will show up like a sore thumb (whatever that means).

In general, you are right, there are no "fool proof" security schemes. Any
fool can break them (and often do) by schmoozing someone for a passkey, pin
number, skey card, etc. But if a company doesn't have policies for how to
implement security -- AND AUDIT AGAINST THEM -- it will never be able to
maintain any kind of security.

Dan


> -----Original Message-----
> From: Christopher Gripp [mailto:cgripp at axcelerant.com] 
> Sent: Thursday, April 11, 2002 2:47 PM
> To: Rick Smith at Secure Computing; vpn at securityfocus.com
> Subject: [vpn] Schneir's 'Weak Link' Observation (was Two 
> Factor Authentication)
> 
> 
> Schneir often seems stuck on the concept of 'the weakest 
> link' when discussing security issues.  It's a valid point 
> but he tends to focus on, what I consider to be an elementary 
> topic, quite a bit.
> 
> Everyone understands that if I give my PIN and my token to 
> someone then there is a security breach.
> 
> The problem with policies and procedures is that they require 
> COMPLIANCE to be effective and the bad guys don't usually 
> COMPLY with the rules.
> 
> I don't believe there are ANY full proof authentication 
> mechanisms.  Unless there is a piece of information known 
> only by one person, such as a PIN, and that person is willing 
> to go to the grave vs. revealing it, then multiple factors of 
> authentication are only slightly more difficult to subvert.
> 
> Christopher Gripp 
> Systems Engineer 
> Axcelerant
> 
> "Impartiality is a pompous name for indifference, which is an 
> elegant name for ignorance."  G.K. Chesterton
> 
> > 
> > Someone posted an observation attributed to Bruce Schneier
> > that deprecates multi-factor authentication mechanisms in 
> > cases where technical or procedural weaknesses allow one or 
> > more factors to be undermined. I disagree with Schneier on 
> > this point of terminology, since such weaknesses exist in 
> > just about every authentication technique. It's better to 
> > call it "weak" or "poorly implemented" two-factor 
> > authentication than try to spin new terminology to capture 
> > the distinctions in Schneier's example.
> > 
> > 
> > Rick.
> > smith at securecomputing.com            roseville, minnesota
> > "Authentication" in bookstores http://www.visi.com/crypto/
> > 
> > 
> > VPN is sponsored by SecurityFocus.com
> > 
> > 
> 
> VPN is sponsored by SecurityFocus.com
> 

VPN is sponsored by SecurityFocus.com





More information about the VPN mailing list