http://arswiki.org/wiki/index.php?title=Securing_ARS#Securing_Communications_Over_the_Wire

1) Is the user name sent as clear text?
Yes, if no encryption level is configured

2) Is the password sent as clear text?
Never

3) Are both the user name and passwords sent as clear text?
Never

4) Is the encryption a hex or linear conversion of the contents of the
password field (and username field)? Or is it a better encrytpion
algorithm than that?
I elieve it's a proprietary encryption format, unless one of the
encryption levels is in use, in which case, it is a (potential)
proprietary password encryption wrapped in the level of encryption
you've configured.

5) What is the kind of algorithm that is used for this encryption?
Something that an average hacker with standard hacking tools available
pretty much as freewares could hack into? Or is it using a proprietry
algorithm that hasn't been broken into as yet?
See the link

On the bit about encryption to an Oracle db, I received this note from
Doug a while back:
-------------- begin message ---------------------
Axton,

Just curious whether you have tried to turn on the Oracle encryption
between the AR System server and the database?  Did you have trouble
with it?

We believe that there is no problem.  If you have the Oracle feature
for this area turned on and configured correctly, you should have
encrypted traffic between the AR System and the database.  There is
nothing you need to do on the AR System side.

We do call the Oracle libraries and if you have the right things
configured on the Oracle side, you should be good to go.

If you have found differently, I would like to know.  I do know that
we have had more than one customer test this and they seemed happy
with the result of their test.

Doug
-------------- end message ---------------------

The free encryption is:
Standard Security: 512-bit RSA algorithm with cipher block chaining
for the public/private key pair. For the session key, it :uses a DES
(Data Encryption Standard) 56-bit algorithm.

It's the strength of the key exchange that is weak.  Modern desktop
computers can crack these in less than a day.  See
http://www.rsasecurity.com/rsalabs/node.asp?id=2108 for some
interesting bits on cracking DES.

Axton

On 8/21/06, Joe DeSouza <[EMAIL PROTECTED]> wrote:
**

Thanks Mathew,

Good information. Good to have basic encryption for free I guess but like
you said if you want the real good stuff you got to buy it. I think we are
more interested in the premium package and are looking on that option
currently

Joe.



----- Original Message ----
From: Carey Matthew Black <[EMAIL PROTECTED]>
To: [email protected]
Sent: Monday, August 21, 2006 9:39:28 AM
Subject: Re: Encryption and Remedy ARS 6.3


Joe,

(
I know this is now an old thread, but there were some details that
were left out that I think are necessary to understand this topic. So
here they are....
)

Remedy's API has not passed the password in the clear for years. The
password value has been ONLY encoded with an propritary format. (Maybe
since v1 if memory serves?) Yes that is not encryption strenght, but
it is better than "clear text". And yes the user name was in the clear
as well as the rest of the data to/from the ARS server.


In v5 Remedy started offering "for cost" encryption packages.

In v6 they "give you" a "lowest level" package for free. ( There is
some config settings too, but it is all server side as long as your
users are using v6 clients. Please verify if the default on your
version/patch is on or off. I believe the default is OFF so that they
do not break older clients. V7 or V8 might change that. :) The "free"
strength is 56 Bit based. Which should be strong enough to keep the
rif-raf out. But for the seriously security minded (DOD types) you
really need the uber encryption package that is still a "for cost" add
on. (and likley a performance drag to some extent. You get nothing for
free. Especially when it comes to encryption. :)

The other thing of note is that the encryption packages (all of them,
even the free one) encryptes all communications and not just password
values. (VERY un-like the days of old) So there are other advantages
to even using the 56 Bit level.

Ref:
ConfigGuide-630.pdf Page: 291 (and around that area)
    Encrypt-Security-Policy
    Encrypt-Public-Key-Expire
    Encrypt-Data-Encryption-Algorithm

HTH

--
Carey Matthew Black
Remedy Skilled Professional (RSP)
ARS = Action Request System(Remedy)

Solution = People + Process + Tools
Fast, Accurate, Cheap.... Pick two.
Never ascribe to malice, that which can be explained by incompetence.



On 8/17/06, Joe DeSouza <[EMAIL PROTECTED]> wrote:
> **
>
>
> Hello Listers,
>
> To the best of my knowledge the Remedy User Tool sends authentication
> information as clear text over the network.. Correct me if I am wrong..
>
> So if the above is right, I do remember Remedy used to sell an encryption
> product. Any information on this would be appreciated.
>
> If no encryption product is used, how does the Mid-Tier client send the
> authentication information? Clear Text????
>
> Rgds
>
> Joe D'Souza
> Remedy Developer / Consultant,
> BearingPoint,
> Virginia.
>  __20060125_______________________This posting was
> submitted with HTML in it___

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org

__20060125_______________________This posting was submitted
with HTML in it___

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at http://www.wwrug.org

Reply via email to