Dan McDonald writes:
> > We have changes for the OpenSolaris CIFS client that
> > implement SMB  
> > "signing".  For an Overview of SMB signing, see:
> > http://support.microsoft.com/kb/887429
> 
> You really should also put this on security-discuss.  In fact, I think I'll 
> do that now!

[Added author back into cc-list.]

> I won't even begin to discuss the merits of how secure CIFS signing may or 
> may not be, but given the deployment environment out there, I think you're 
> approaching this the right way.

One of the things I mentioned in looking at this posting was that it'd
be good to have something in the documentation that we supply to
customers that provides some information about the relative security
that this feature provides.

Is it as good as running 256-bit AES and IPsec everywhere?  Probably
not.  Is it better than rot13?  Likely so.  I don't know where it
falls in that spectrum, though, and customers will need to know what
to do with it.

We probably don't need to tell customers not to deploy it, or run down
MSFT's work here, but we will likely need to be able to say something
like, "this provides only integrity protection, and with modern
machines, and a small sample of protected traffic, it'd be trivial to
brute-force the keys in a short period of time, so make sure you have
firewalls and other guards in place, more so than you would for SSL,
Kerberos, ssh, or IPsec."  (Assuming some of that is true ... I have
no idea whether it is.)

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to