Timothy J. Miller wrote:
Roy Keene (Contractor) wrote:
Thus if your workstation is in a significantly increased position of
risk (i.e., you do not apply security patches, and are not on a
network that blocks known-bad attackers, and there is no IDS/IPS) then
any e-mail you send is at a significantly increased risk of being
tampered with, and any encrypted transmission are at a significantly
increased risk of being intercepted with.
This is only true if you're leaving the card in the reader. I would say
don't do that; the card should only be inserted when the card is needed
for an operation, limiting the window during which malicious code can
piggyback an authenticated card session (or start its own).
This is always true of the box is ever compromised and the card is ever used.
Thunderbird could easily change your email messages before sending them out
(i.e., before signing as well), and they would be correctly signed since it
would prompt your for the PIN and you would give it. Or Thunderbird could send
its own email, signed using your CAC, using your PIN once you have given it
Fundamentally this is a trusted path issue and is as true on managed as
well as unmanaged machines. If you're interested in the problem, I
recommend Balfanz & Felton's paper "Handheld computers can be better
smart cards" as a starting point. (ObNameDrop: I was at USENIX SEC'99
where this paper was presented.)
I agree. However, it's a matter of degrees.
I will read the paper further, but an initial glance seems to suggest that they
agree with me on the current state of affairs -- the stack must be protected
diligently. (Another note, moving the stack to a mobile PC doesn't remove this
factor, it just shifts it.. what happens when the Handlheld computer gets
compromised through a vulnerability in its cryptographic API, or even worse if
the user is not following security guidelines and connects the device to many
untrusted networks ?)
Certainly, it still happens on a network that follows DISA guidelines,
but it happens very infrequently and is almost always detected.
Isn't the illusion of security grand? ;) Seriously--as has been
reported recently in the open media--there have been multiple,
long-running intrusions into DoD networks that went undetected for months.
If you compare the number of long-running intrusions into DoD networks that have
gone undetected for months against the number of long-running intrusions into
non-DoD networks that have gone undetected for months I think you will agree
that that latter number is significantly greater.
Thus, my conclusion that DoD networks are far safer (less intrusions, quicker
detection), and my assertion that following DISA guidelines make them that way.
-- Tim
------------------------------------------------------------------------
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle
--
Roy Keene (Contractor)
Office of Network Management (Code 7030.8)
Naval Research Laboratory
Stennis Space Center, MS 39529
DSN 828-4827
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle