Forgive me for arguing, but I believe the time alloted for guessing that
third factor is even less than indicated below.  Of course, by token, I am
referring to what RSA calls a "keyfob."  Is that what you are referring to
as well?

Here is what I understand to be the process, from reading the manuals we
have:
1.  Upon issuance to the user, you synch the token/keyfob with the the RSA
server DB.
2.  A 6-digit code displays for 1 minute on the token.
3.  If used for authentication within that 1 minute period, it is
"time-stamped" as to when you entered the Passcode (PIN + code) and has an
additional 1 minute latency period.  Meaning that if you dial-up and enter
your passcode, 30-seconds into the code, you have 1:30 to connect to the
dial-up server and be authenticated.
4.  If you enter the same code after the display has rolled over however,
that code is no longer valid, as the timestamp when you entered it will no
longer match with the timestamp on the server for when that code was valid.

So the short version is that if you enter the code while it's displaying on
the token, it's good for 1 minute with a 1 minute latency period.  If you
don't enter the number while it's viewable, then you've missed your window
of opportunity, because it was only good for one minute.  Oh and BTW...if
you are trying to guess the code and miss it three times, regardless of
length of time between guesses, it will lock your token until an admin can
reset it.

That's how I understand the process.

-----Original Message-----
From: Roger Seielstad [mailto:[EMAIL PROTECTED] 
Sent: Friday, September 19, 2003 5:44 AM
To: Exchange Discussions
Subject: RE: OWA front end server - licensing and security


It doesn't stop key logging per se, but it renders it ineffective.

The SecurID tokens use a three factor[1] authentication system, in which the
third piece is a 6 digit, one time use code. That code is good for exactly 3
minutes, and once used cannot be used again.

Therefore, logging the authentication process is useless, as you'll only get
2 of the 3 factors, and for the third factor, you have a 1 in 1,000,000
chance, reset every three minutes, to guess that last part.

Roger
--------------------------------------------------------------
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.

[1] They call it 2 factor, but you need a username, a PIN, and the securID
token number to log in - that's either 3 or 11, depending on how much of a
geek you are.

:::: snip ::::

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Web Interface: 
http://intm-dl.sparklist.com/cgi-bin/lyris.pl?enter=exchange&text_mode=&lang=english
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to