RE: Cryptanalysis of SecurID (ACE/Server)

New Message Reply About this list Date view Thread view Subject view Author view

John Moore (jmoore@speedchoice.com)
Thu, 1 Oct 1998 17:01:36 -0700


> -----Original Message-----
> From: Perry E. Metzger [mailto:perry@piermont.com]
> Sent: Thursday, October 01, 1998 4:53 PM
> To: John Moore
> Cc: CodherPlunks
> Subject: Re: Cryptanalysis of SecurID (ACE/Server)
>
>
>
> "John Moore" writes:
> > > Okay. So, we've changed the problem from stealing the laptop to
> > > stealing the token in the guy's wallet. Could you explain why this is
> > > better in some way?
>
> > Yes. The two fact works if the guy doesn't have a laptop. If he is using
> > some other system to make access (yes, I know, it could have a trojan in
> > it).
>
> As I've noted, however, you can hijack the guy's TCP session if he
> isn't running some sort of cryptographic authentication on the entire
> connection anyway. If you want to use SecurID from a telnet from some
> random machine, you are asking to be hacked.

And if the other guy has, let's say, encrypted VPN access? SSH? HTTPS? After
all, I might just be going to a secure website to do my work.


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:15:19