[lug] open port
rise
rise at knavery.net
Thu Mar 28 12:53:46 MST 2002
On Thu, 28 Mar 2002, Riggs, Rob wrote:
> Personally, I think AUTH stinks. It is only valid in a trusted environment.
> It made sense when everyone logged in to a central server to read and send
> mail. When 99% of all mail is composed on individual workstations and
> relayed through a central server, it is a waste of bandwidth.
Rant warning (not directed at you, Rob, you're right about using it as
an authentication mechanism):
The Identification Protocol[0] stinks _as an authentication mechanism_
because it isn't one. It's meant to be an identification mechanism,
in this case something that hands you an opaque token that you can
take to the server admin of the remote site and say "figure out who
this person is and LART them". The now self-perpetuating confusion or
laziness of developers and admins who ended up handing out usernames
instead of something truly opaque has ruined it for the rest of us[1].
The RFC writer whose first example is a username probably should have
been more careful, but the standard is clear. And yes, there is "OTHER
support" and some servers do provide cryptographic tokens.
Yet another useful protocol or service gone down in flames because of
people who didn't bother to read and understand the RFCs (or the Fine
Manual) before writing conceptually broken software and actively wrong
documentation.
RFC1413
http://www.ietf.org/rfc/rfc1413.txt?number=1413
----
The Identification Protocol (a.k.a., "ident", a.k.a., "the Ident
Protocol") provides a means to determine the identity of a user of
a particular TCP connection. Given a TCP port number pair, it
returns a character string which identifies the owner of that
connection on the server's system.
...
The information returned by this protocol is at most as trustworthy
as the host providing it OR the organization operating the host. For
example, a PC in an open lab has few if any controls on it to prevent
a user from having this protocol return any identifier the user
wants. Likewise, if the host has been compromised the information
returned may be completely erroneous and misleading.
The Identification Protocol is not intended as an authorization or
access control protocol. At best, it provides some additional
auditing information with respect to TCP connections. At worst, it
can provide misleading, incorrect, or maliciously incorrect
information.
The use of the information returned by this protocol for other than
auditing is strongly discouraged. Specifically, using Identification
Protocol information to make access control decisions - either as the
primary method (i.e., no other checks) or as an adjunct to other
methods may result in a weakening of normal host security.
----
[0] Yes, almost everyone calls it auth, that's part of the problem -
it was badly named and has now been renamed (for 1993 values of
"now"), but nobody bothers to remember or find out.
[1] I don't run an ident server anymore either, largely because I
figure it's now a lost cause. One day that may change (hmm, ident
meets ipsec could be fun).
--
Jonathan Conway rise at knavery.net
history is paling & my surge protection failed, & so I FRIED
- Concrete Blonde, "Fried"
More information about the LUG
mailing list