The 7.x versions of PGP support a "key reconstruction" feature. You have 
to have the corporate product suite to set this up as it uses a key 
reconstruction server. The whole scheme is cryptographically secure but 
does rely on the user to setup a Question/Answer list to recover the 
key. If your Questions and Answers are not so good (Mother's maiden 
name, etc.) then you weaken the whole scheme.

   --Noah--


On Monday, March 11, 2002, at 09:07  AM, Randall Laura wrote:

> Does anyone have a copy of the PGP Corporate Desktop file encryption
> software. It is no longer available for download at pgp.com due to
> product maintenance. Also, does anyone know if PGP Corporate Desktop
> supports Key Recovery of lost keys?
>
> Thanks,
> Laura
>
> Peter Lee wrote:
>>
>> ----- Original Message -----
>> From: Mike Shaw <[EMAIL PROTECTED]>
>> To: <[EMAIL PROTECTED]>
>> Sent: Thursday, March 07, 2002 06:25
>> Subject: VLAN as a DMZ
>>
>>> There are definitely textbook reasons (secondary compromize issues, 
>>> etc),
>>> but does anyone know of a specific technical reason why using a VLAN 
>>> for a
>>> DMZ segment is a bad idea (cisco 5500 switch)?
>>>
>>
>> Provided it's properly designed so there is no way for machines in the 
>> DMZ
>> VLAN to communicate with the switch (to change the VLAN memberships - 
>> Telnet
>> is not your only concern here, remember SNMP), AND that the switch 
>> (L3/RSM)
>> does not route between the DMZ VLAN and the other VLAN's, AND the only
>> connection between the DMZ VLAN and the internal network is via a 
>> filtering
>> device like a firewall, then I can't see that it's much different from
>> having the DMZ on a physically separate backplane.
>>
>> However, from an operational perspective, it's harder to manage.
>> Personally, I'd never do it, I think the risk of someone accidentally
>> cross-patching the DMZ and other VLAN's, or plugging a machine into the
>> wrong VLAN, is too high.  I do have at least one gov customer who does 
>> it.
>>
>>> The VLAN would have no telnet interface living on it, and no level 3
>>> switching/routing going to/from it.  It'd be just an isolated segment.
>> The
>>> only thing I could think of would be that someone could spoof the
>>> frame-tagging or something.
>>>
>>
>> This should not be an issue, as you should only see tagged frames on 
>> trunked
>> links.  Certainly all the VLAN networks I've ever worked with have 
>> worked in
>> this way.  Even if a malicious entity can inject tagged frames into the
>> (untagged) segment, unless the receiving device is expecting tagged 
>> frames
>> then the packets are basically dropped, because the Ethertype field is 
>> not
>> IP, ARP, ARP reply or something else the protocol stack was expecting.
>>
>> On the other hand, my very flimsy understanding of Cisco VLAN's is 
>> that the
>> switches can be in some sort of "auto" mode, where if they see a tagged
>> frame they'll automatically process it as a trunked link.  This could 
>> be an
>> issue for you.
>>
>> The other thing which could be an issue is CDP.  You'll want to turn 
>> it off
>> on the DMZ VLAN, otherwise a malicious entity could capture 
>> information of
>> use in mounting further attacks.
>>
>> Unless you have really pressing reasons (like backplane bandwidth or
>> rackspace) for doing so, from a risk management perspective I think a
>> physically separate DMZ backplane makes a lot of sense :-)
>

Reply via email to