Good afternoon, Anthony,

On Wed, 20 Oct 2010, Anthony Carrico wrote:

On 10/20/2010 01:41 PM, William Stearns wrote:
On Wed, 20 Oct 2010, Anthony Carrico wrote:
 "The YubiKey Wiki

 The portal for software and services supporting the YubiKey
 Everyone is welcome to read, but to avoid misuse only YubiKey users
 can edit. <research papers> <Order your YubiKey>"

    Agreed, this is wiki spam.  I've reverted that entry and one other
I've found so far.  Just like open source software, the wiki is only as
good as what people put into it.  *grin*

Yes, but my point is a little deeper than that. It says, "Everyone is

        (and went completely over my head  :-)

welcome to read, but to avoid misuse only YubiKey users can edit." So,
the implication is that spammers went out of their way to buy a Yubikey.
I have to ask myself, would spammers actually buy a device in order to
advertise a paper mill on a security system's wiki? It seems somewhat
unlikely. If not the yubikey system--as implemented on Yubico's own
site--doesn't actually appear to be working.

I see the argument; web and email spam historically focused on low-hanging fruit, and buying a hardware token to do such a mundane task would seem unlikely. My own counterargument is Blitzmail, the mail front-end used at Dartmouth, and almost nowhere else. The time needed for a spammer of any kind to learn how to get people's blitz passwords would seem useless as that knowledge wouldn't be usable anywhere else. But we _have_ seen deliberate attempts to get passwords, and attempts that take a form that would _only_ apply to blitmail. If I were a spammer and wanted to spend some time trying to break into systems, I probably would consider buying security tokens from multiple vendors and hiring people to identify vulnerabilities. Even one success there might give me access to thousands of people instantly.

Maybe it is more subtle than that (/me strokes stubble). Maybe anyone
CAN edit, and in an effort to discredit the system, Mallory added the
"only YubiKey users can edit" and stuck in some fake spam to lead me
down the garden path!

*evil grin* I can see our plan to catch you in an infinite loop is going along nicely. *evil grin*

You raise an interesting question, and I can't speak to whether there is some deeper issue. Knowing what little I do about the hardware device, I would tend to bet on an issue on the wiki server itself before I'd bet on issues with the hardware or protocol.

If there's an actual issue with their management of the wiki server or service, or one simply doesn't trust authentication to an external company, the natural, intended, and completely encouraged transition is to running one's own in-house authentication server. That, too, is open-source and provided by Yubico. While they'll gladly be the authentication back end for devices as shipped, all of the tools are there for one to run one's own in-house server.
        Cheers,
        - Bill

---------------------------------------------------------------------------
        "Forgiveness is the fragrance that the violet sheds on the heel
that has crushed it."
        -- Mark Twain
--------------------------------------------------------------------------
William Stearns ([email protected], tools and papers: www.stearns.org)
Top-notch computer security training at www.sans.org , www.giac.net
--------------------------------------------------------------------------

Reply via email to