[LWN Logo]
[Timeline]
Date:         Mon, 17 Jul 2000 04:00:01 -0500
From: InfoSec News <isn@C4I.ORG>
Subject:      [ISN] CRYPTO-GRAM, July 15, 2000
To: ISN@SECURITYFOCUS.COM

Forwarded By: Bruce Schneier <schneier@counterpane.com>

                  CRYPTO-GRAM

                 July 15, 2000

               by Bruce Schneier
                Founder and CTO
       Counterpane Internet Security, Inc.
            schneier@counterpane.com
           http://www.counterpane.com


A free monthly newsletter providing summaries, analyses, insights, and
commentaries on computer security and cryptography.

Back issues are available at http://www.counterpane.com.  To subscribe
or unsubscribe, see below.


Copyright (c) 2000 by Counterpane Internet Security, Inc.


** *** ***** ******* *********** *************

In this issue:
      Full Disclosure and the CIA
      Counterpane Internet Security News
      More Counterpane Internet Security News
      News
      Even the President Can't Choose a Good Password
      The Doghouse:  Intuit QuickBooks
      Full Disclosure and Lockmaking
      Security Risks of Unicode
      Crypto-Gram Reprints
      Comments from Readers


** *** ***** ******* *********** *************

           Full Disclosure and the CIA



On its Web site, the New York Times published a previously classified
1954 CIA document about the overthrow of the Iranian government.  I'm
not sure how the New York Times got its hands on the document, but the
newspaper decided to redact the names of Iranian citizens involved in
the plot.

The document was a scanned PDF file.  What the Times did was to create
an overlay on the pages, and drew black boxes over the names they
wanted to obscure.  The result was a file that still had the original
digital information, but contained extra commands to obscure that
information.  Predictably, someone reverse-engineered the original
names (it was suprisingly easy) and posted the restored document.
The Times panicked and removed the original document, but it's too
late; copies are available on various sites worldwide.

Reactions to this have been bizarre, and almost uniformly missing the
point.  Here's one, by William Hugh Murray: "Protecting the identity
of intelligence sources is one of the few legitimate reasons for
government secrecy.  A 'freedom of information activist' does not
serve his own cause, much less our national interest, by such reckless
behavior."  Ignoring Murray's hubris in claiming to know someone's
motivations more strongly than he, what does this case have to do with
government secrecy?  It was the New York Times that decided to redact
the document, not the CIA.  The people who gave us the Pentagon Papers
decided, on their own, not to release information that the CIA
released to them.  This is very different than the government trying
to keep secrets.  The last time I checked, the Times is not part of
the intelligence community.

John Young, the activist Murray slams, makes classic full-disclosure
arguments.  The information was been published by the New York Times.
Even though it took some work to extract, people are extracting it.
Given this truth, it is better to release the information so that
everyone can have access to it -- not only those random few who
reverse-engineered the PDF file.  Young said "Those folks who are
named have a stake in knowing about it."

The opposing side has an equally predictable reaction: The information
should be kept secret.  Just because the New York Times erred and made
the information available to a few people doesn't mean that we should
compound the error and make the information available to everyone.

It's a complicated question, made even more muddy by the New York
Times's decision to redact the document.  If the CIA gave the New York
Times the document in unredacted form, why did the Times decide to
limit the public's knowledge of this information?

To me, this is a classic example of the power of full disclosure.
The information in question -- the names of the Iranian citizens --
has been released to the public.  Initially, it was known by only
those few who had the means to reverse-engineer the PDF file, and
those who learned as the information spread.  Left to its own devices,
this information would spread slowly.  Maybe someone who wants to do
these people harm would learn about this information; he certainly
already knows that this information exists.  Maybe some of the people
named would learn that they are named, and be able to take appropriate
action.  But this process is slow and haphazard.

Better is to release the information to everyone, quickly.  This
limits the damage that can be done.  The people named are more likely
to find out they are named, and they are more likely to find out about
it quickly.  Those who want to take advantage of the relative secrecy
of the information cannot.  Everyone knows, and this levels the
playing field.  It is the situation where only a few random people
know, and others find out piecemeal, that is unstable and dangerous.

News articles:
<http://www.wired.com/news/politics/0,1283,37205,00.html>
<http://www.securityfocus.com/news/51>

The document:
<http://cryptome.org/cia-iran-all.htm>

** *** ***** ******* *********** *************

       Counterpane Internet Security News



Counterpane is pleased to announce a new insurance tie-in with Lloyd's
of London.  This is an exclusive offering for Counterpane customers:
if Counterpane monitors your network, then you can purchase this
insurance.  For the first time ever, organizations can buy insurance
against hacking without a security audit and without regard to the
particular security products they use.  Organizations can also buy,
for the first time ever, warranty coverage that protects their
customers against loss of income and data.

Computer security has always been sold as "threat prevention."
Encryption, firewalls, anti-virus, PKI...these are all technologies
that prevent particular threats.  Threat prevention is a cost, and if
an organization doesn't understand the threats, then it might not be
willing to pay for prevention.  Real business security, on the other
hand, is about risk management.  Risk management is not a cost, it's a
way to make money.  If one organization can manage its risk better
than another, then it will be more profitable.  Smart companies
embrace risk, look for more of it, and figure out how to do business
in the face of it.

Looking at computer security as a risk management tool, there are many
more options than threat prevention.  There is detection and response:
managing risk by finding attacks in process and stopping them.  And
there is insurance: packaging risk and selling it to someone else.
These are the future of computer security, not prophylactic
technologies that promise a magical security blanket.

From the beginning, I have maintained that Counterpane Internet
Security will address the real problems in network security.  I have
never believed that simply installing products will ever protect you,
and have focused on the process of security.  One part of that process
is Managed Security Monitoring, which is what Counterpane's business
is.  The other part is insurance.  Now Counterpane customers, and only
Counterpane customers, have access to both.

Summary of the offering:

Counterpane Internet Security Inc., Lloyd's of London, Frank Crystal &
Co., and SafeOnline Ltd. have jointly developed a first-of-its-kind,
comprehensive risk management insurance solution specifically targeted
to meet the needs of today's e-businesses.

Up to $100 million in protection available.

Two products available:

1.  Internet Asset and Income Protection Coverage provides insurance
for Counterpane's Managed Security Monitoring customers who incur a
loss of or damage to information assets resulting from a breach of
security or technology failure.  Also covers business interruption due
to loss of use due to a breach.

2.  Internet Asset and Income Protection Warranty Plan for ISPs/ASPs
that utilize Counterpane's Managed Security Monitoring services; this
is a turnkey, insurance-backed warranty plan to extend the Internet
Asset and Income Protection to their customers.

These insurance products are sold through authorized insurance brokers.

Quick Summary:
<http://www.counterpane.com/pr-lloydssl.html>

Press Release:
<http://www.counterpane.com/pr-lloyds.html>

Q&A:
<http://www.counterpane.com/pr-lloydsqa.html>

White Paper describing the insurance offering and its context:
<http://www.counterpane.com/pr-lloydswp.html>

Press Coverage:
<http://news.cnet.com/news//0-1005-200-2232221.html?tag=st.cn.sr.ne.1>
<http://www.internetwk.com/story/INW20000710S0001>
<http://www.computerworld.com/cwi/story/0,1199,NAV47_STO46992,00.html?am>
<http://www.zdnet.com/zdnn/stories/news/0,4586,2600511,00.html>
<http://www.crn.com/dailies/digest/dailyarchives.asp?ArticleID=18243>
<http://slashdot.org/articles/00/07/10/139201.shtml>

** *** ***** ******* *********** *************

     More Counterpane Internet Security News



More information on Counterpane's Managed Security Monitoring service
can be found at: <http://www.counterpane.com/oursol.html>
<http://www.counterpane.com/coverage.html>

Bruce Schneier is speaking at BlackHat (July 26) and DefCon (July 29) in
Las Vegas.
<http://www.blackhat.com>
<http://www.defcon.org>

Bruce Schneier will address the Digital Commerce Society of Boston on August 1.

At WebDefense, in Washington DC (Aug 9), Bruce Schneier will give a
talk entitled "What Level of Security Can We Reasonably Expect?"
<http://www.acius.net/webd_overview.html>

For the full Counterpane conference schedule, see:
<http://www.counterpane.com/conf.html>


** *** ***** ******* *********** *************

                      News



Another interesting article on writing computer viruses:
<http://www.hackernews.com/bufferoverflow/99/nitmar/nitmar1.html>

Software (children's software, no less) that automatically spies on you:
<http://www.salon.com/tech/col/garf/2000/06/15/brodcast/>

The need for security.  Good article.
<http://www.acm.org/crossroads/columns/onpatrol/june2000.html>

Problems with public-key infrastructures.  This article was written well
before I started thinking about the problems:
<http://world.std.com/~dtd/compliance/compliance.ps>

Countries are conducting military reconnaissance on U.S. computer networks:
<http://www.zdnet.com/zdtv/cybercrime/hackingandsecurity/story/0,9955,259057
7,00.html>

Provocative articles on the risks of the new digital signature law:
<http://www.pfir.org/statements/2000-06-17>
<http://www.securityfocus.com/templates/article.html?id=50>

Interesting cryptography story.  A political party in Mexico wants an
encryption key broken, because it believes that the resulting plaintext
will embarrass the ruling party.
<http://www.theregister.co.uk/content/1/11508.html>
<http://www.wired.com/news/politics/0,1283,37337,00.html>

Commentary on the hype surrounding computer-security press coverage.
<http://www.computerworld.com/cwi/story/frame/0,1213,NAV47-68_STO46049,00.html>
I don't agree: I think that the current media hype will desensitize people
to the real threats and the real risks.

NATO releases a virus.  (There's enough odd in this story for me to doubt
its veracity, but who knows.)
<http://www.the-times.co.uk/news/pages/sti/2000/06/18/stinwenws01024.html>

The motives and psychology of the black-hat community.  Another good essay
by Lance Spitzner.
<http://www.securityfocus.com/focus/ids/articles/kye/motives.html?&_ref=3948
32126>

Publius is a system for anonymous, censorship-resistant publishing on the Web.
<http://cs.nyu.edu/waldman/publius/>
<http://www.washingtonpost.com/wp-dyn/articles/A21689-2000Jun29.html>
They're looking for people willing to host a Publius server.

The Secret Service is developing a Electronic Crimes Special Agent
Program.  Agents analyze new security products and alert vendors to
weaknesses.
<http://www.fcw.com/fcw/articles/2000/0626/web-secret-06-27-00.asp>

Failing dot-coms are selling private information:
<http://news.cnet.com/news/0-1007-200-2176430.html>
More proof that they should never be allowed to collect it in the first
place, and that posted privacy policies aren't worth the phosphors they're
displayed on.

The Sega Dreamcast copy-protection scheme has been cracked.  Is anyone
surprised?
<http://www.mhzgaming.com/articles/dc629.htm>
<http://news.cnet.com/news/0-1005-200-2181596.html>

Special news report on Echelon:
<http://www.zdnet.co.uk/news/specials/2000/06/echelon/>
The government of France is investigating:
<http://dailynews.yahoo.com/h/nm/20000704/ts/france_usa_dc_1.html>
<http://news6.thdo.bbc.co.uk/hi/english/world/europe/newsid%5F819000/819210.
stm>

Interesting article on the lack of security in Australian government Web sites:
<http://www.theregister.co.uk/content/1/11686.html>
And other articles on the same topic:
<http://www.it.fairfax.com.au/breaking/20000630/A43356-2000Jun30.html>
<http://www.afr.com.au/news/20000701/A44576-2000Jun30.html>

There were rumors of hackers disrupting the Space Shuttle a few years
ago.  Here is what seems to be a coherent story:
<http://news.excite.com/news/ap/000702/20/news-britain-hacker>
NASA denies it:
<http://news.excite.com/news/ap/000703/19/nasa-hacker>
The question to ask is: why in the world are these critical systems
attached to public networks in the first place?

Electronic Commerce: Who Carries the Risk of Fraud?
<http://www.fipr.org/WhoCarriesRiskOfFraud.htm>

NIST has published an index of computer vulnerabilities.  Called ICAT,
it links users into a variety of publicly available vulnerability
databases and patch sites.  ICAT is not itself a vulnerability
database, but instead a searchable index leading one to vulnerability
resources and patch information.  ICAT allows one to search at a fine
granularity, a feature unavailable with most vulnerability databases,
by characterizing each vulnerability by over 40 attributes (including
software name and version number).  ICAT indexes the information
available in CERT advisories, ISS X-Force, Security Focus, NT Bugtraq,
Bugtraq, and a variety of vendor security and patch bulletins.  ICAT
uses the CVE vulnerability naming standard.
<http://csrc.nist.gov/icat>

The insecurity of wireless computing:
<http://www.msnbc.com/news/429748.asp?cp1=1>

New technology for recovering erased data on electronic media:
<http://www.sciencenews.org/20000708/fob1.asp>

Good editorial.  The biggest problem in computer security is the user,
not the computer.
<http://www.osopinion.com/Opinions/DanielHiggs/DanielHiggs1.html>

Lots of "pay-to-surf" sites are springing up, paying users to look at
web advertisements, along with a cottage industry of programs that
help rogue surfers bypass the rules and get paid anyway.
<http://www.wired.com/news/culture/0,1284,37329,00.html?tw=wn20000710>

Social Security numbers of the rich and famous:
<http://news.cnet.com/news/0-1005-200-340248.html>

Internet voting is unsafe (no surprise), says a new study. News
article: <http://www.wired.com/news/politics/0,1283,37504,00.html>
Actual study:
<http://www.voting-integrity.org/text/2000/internetsafe.shtml>

Spam with huge media attachments.  Anyone care to ponder the
implications for virus writers?
<http://adage.com/interactive/articles/20000710/article2.html>

"The Carnivore," from the FBI.  An expert system that seaches through
email. <http://www.zdnet.com/zdnn/stories/news/0,4586,2601502,00.html>
The ACLU complains:
<http://www.wired.com/news/politics/0,1283,37470,00.html>

The Cyber Group Network Corp claims tob have a technology that allows
you to locate a stolen computer, remotely retrieve information from
it, and the destroy it.  Sounds a bit far fetched.  But they take
"security by obscurity to new heights:  "According to Nish Kapoor, a
spokesperson for The Cyber Group Network, the patent pending
technology that makes all this possible is being manufactured and
developed at a remote, top-secret location identified only as 'Area
74.'"  Wow. <http://www.newsbytes.com/pubNews/00/151921.html>

And even worse, software that allows companies to track down (and
presumably prosecute) those who say unkind things about them on the
Internet.  What happened to free speech on the Internet?
<http://www.businessweek.com/bwdaily/dnflash/july2000/nf00707g.htm>


** *** ***** ******* *********** *************

   Even the President Can't Choose a Good Password



According to a story regarding Clinton signing the e-signature bill
with a smart card:

"With a magnetic card and his dog Buddy's name as a password,
President Clinton e-signed a bill Friday that will make electronic
signatures as real as those on paper."

Note his choice of password.  It's five characters, all alphas, and
probably all lower case.  At least he doesn't keep it on a Post-it in
his desk.

<http://www.foxnews.com:80/elections/063000/clinton_ebill.sml>


** *** ***** ******* *********** *************

        The Doghouse:  Intuit QuickBooks



Intuit's QuickBooks is a finance manager for small companies.  It has
lots of great features and is one of the most popular financial
packages available.  Unfortunately, the security sucks.

The earliest versions of QuickBooks stored usernames and passwords in
the clear.  As the version number increased, so did the amount of
obfuscation:  first they XORed the data with a constant mask, then
they added some byte rotations and more bit twiddling.  The latest
versions of QuickBooks use DES to encrypt blocks of data containing a
username and the corresponding password.  This could have made the
system much harder to break, if only the decryption keys weren't
stored in the file.

To verify that the user has the correct password, QuickBooks looks up
the decryption key, decrypts the block, and compares the password the
user typed in to the one it just decrypted.  Nothing prevents an
unauthorized program from performing the same steps and printing out
all the usernames and passwords.


Thanks to Mike Stay for pointing this out.


** *** ***** ******* *********** *************

         Full Disclosure and Lockmaking



"In respect to lock-making, there can scarcely be such a thing as
dishonesty of intention: the inventor produces a lock which he
honestly thinks will possess such and such qualities; and he declares
his belief to the world.  If others differ from him in opinion
concerning those qualities, it is open to them to say so; and the
discussion, truthfully conducted, must lead to public advantage: the
discussion stimulates curiosity, and curiosity stimulates invention.
Nothing but a partial and limited view of the question could lead to
the opinion that harm can result: if there be harm, it will be much
more than counterbalanced by good."

-- Charles Tomlinson's Rudimentary Treatise on the Construction of
Locks, published around 1850.


** *** ***** ******* *********** *************

              Crypto-Gram Reprints



Those of you who have subscribed recently might have missed these
essays from back issues.

Declassifying SKIPJACK:
<http://www.counterpane.com/crypto-gram-9807.html#skip>

The Future of Crypto-Hacking:
<http://www.counterpane.com/crypto-gram-9907.html#hacking>

Bungled SSL:
<http://www.counterpane.com/crypto-gram-9907.html#doghouse>


** *** ***** ******* *********** *************

            Security Risks of Unicode



Unicode is an international character set.  Like ASCII, it provides a
standard correspondence between the binary numbers that computers
understand and the letters, digits, and punctuation that people
understand.  But unlike ASCII, it seeks to provide a code for every
character in every language in the world.  To do this requires more
than 256 characters, the 8-bit ASCII character set; default Unicode
uses 16-bit characters, and there are rules to extend even that.

I don't know if anyone has considered the security implications of
this.

Remember all those input validation attacks that were based on
replacing characters with alternate representations, or that explored
alternative delimiters?  For example, there was a hole in the IRIX Web
server: if you could replace spaces with tabs you could fool the
parser, and you could use hexadecimal escapes, strange quoting, and
nulls to defeat input validation.

The Unicode specification includes all sorts of complicated new escape
sequences.  They have things called UTF-8 and UTF-16, which allow
several possible representations of various character codes, several
different places where control-characters pop through, a scheme for
placing diacriticals and accents in separated characters (looking very
much like an escape), and hundreds of brand new punctuation characters
and otherwise nonalphabetic characters.

The philosophy behind the Unicode spec is to provide all possible
useful characters for applications that are 8- or 16-bit clean.  This
is admirable, but it is nearly impossible to filter a Unicode
character stream to decide what is "safe" in some application and what
is not.

What happens when:

- We start attaching semantics to the new characters as delimiters,
white space, etc?  With thousands of characters and new characters
being added all the time, it will be extremely difficult to categorize
all the possible characters consistently, and where there is
inconsistency, there tends to be security holes.

- Somebody uses "modifier" characters in an unexpected way?

- Somebody uses UTF-8 or UTF-16 to encode a conventional character in
a novel way to bypass validation checks?

With the ASCII character set, we could carefully study a small
selection of characters, categorize them clearly, and make relatively
straightforward decisions about the nature of each character.  And
even here, there have been mistakes (forgetting about tabs,
multicharacter control-sequence snafus, etc).  Still, a careful
designer can figure out a safe way to deal with any possible character
that can come off an untrusted wire by elimination if necessary.

With Unicode, we probably won't be able to get a consistent definition
of what to accept, what is a delimiter under what circumstance, or how
to handle arbitrary streams safely.  It's just a matter of time before
simple validators pass data and upper layer software, trying to be
helpful, attach magic-character semantics, and we have a brand-new
variety of security holes.

Unicode is just too complex to ever be secure.

Unicode:
<http://www.unicode.org/>


My thanks to Jeffrey Streifling, who provided much of the material for this
article.


** *** ***** ******* *********** *************

             Comments from Readers



From: Bernard Peek <Bernard@postar.co.uk>
Subject: Remotely Disabling Software

In the UK there is legal protection against disabling software by
remote commands.  In general this is illegal without the users' prior
consent.  It could be permitted if the user agreed to a software
license that contained appropriate clauses.  As I understand it, in
the absence of a prior agreement any supplier that disabled a program
running on a machine in the UK would be committing an offence within
UK jurisdiction.  Whether they triggered the event from elsewhere is
not a defence.

I believe that one software supplier embedded an undisclosed time-trap
in their program which would disable it.  The trap was sprung if the
supplier failed to switch it off.  They would only do that if the
customer failed to pay the final invoice.

One invoice was disputed and the trap was sprung.  The software
supplier was successfully prosecuted and had to pay a fine and
damages.

I note, with some interest, that some files have security certificates
with expiry dates, and that some programs will not work with expired
files.  I trust that the suppliers of these files have mechanisms in
place to replace all of them prior to their expiry date, or have the
customer's signature on a software license that details the conditions
under which the programs cease to work.


From: Matt Curtin <cmcurtin@interhack.net>
Subject: Breaking DES Keys by Brute Force

In the June 15 issue of CRYPTO-GRAM, you discuss the (in)security of DES
because of its relatively short key length.

 > Concerns about its short key length have dogged the
 > algorithm since the beginning, and in 1998 a brute-
 > force machine capable of breaking DES was built.

John Gilmore and company made an important advancement with Deep Crack
in 1998, breaking DES keys very quickly.  But the first break of a DES
key was actually accomplished in 1997 in software by a team led by
Rocke Verser.  Justin Dolske and I wrote a paper describing the
architecture of the system that was published in the May 1998 special
issue of ;login.

This seems an important thing to mention not just because we can move
the time that it took to break DES keys back another year, but because
it has been demonstrated (twice -- another team did the same thing the
following year) that the key length was so short that it could be
broken in software using only random idle cycles from computers
talking together over a simple protocol.  Before this is dismissed as
an impractical attack, consider that it's believed that recent
distributed denial-of-service attacks have been perpetrated by
attackers who take over others' machines without their knowledge and
then coordinate these "zombie machines" to do their work.  If
attackers can do this for launching DoS attacks, it could be done to
break keys.  (Though because of the inefficiency of the attack, this
won't be used for anyone but attackers with no money, I'd think...)

The technical article is online at
<http://www.interhack.net/pubs/des-key-crack/> and a nontechnical
article (originally written for the press) briefly describing
cryptography, brute force attacks, and our project's success is at
<http://www.interhack.net/projects/deschall/what.html>.


From: Paul Bissex <pb@e-scribe.com>
Subject: Re: Cryptogram 6/15, Williams/Agre

A quick note on J. Christopher Williams' response to Phil Agre.  I
believe Mr. Williams has a legitimate difference of opinion here,
though I do not share his views.  However, to say that "[Agre's] grasp
of basic grammar is less than firm" is simply laughable, especially
after one has struggled through a few dozen lines of Mr. Williams'
stilted prose.

There are few people who write about technology with as much
intelligence, erudition, and accuracy as Phil Agre.  It is unfortunate
that Mr. Williams felt the need to turn his nitpick into a personal
attack.


From: "Jay R. Ashworth" <jra@baylink.com>
Subject: Comments to Schneier on Agre

In comments published in the June Cryptogram, Mr. Williams, you take
issue with the comments by Phil Agre pointed to by, I believe, the
previous edition of the newsletter...

Microsoft wrote:
 > "... This is by-design behavior, not a security
 > vulnerability."

Agre commented:
 > "More odd language.  It's like saying, 'This is a rock,
 > not something that can fall to the ground'.  It's
 > confusing to even think about it.
 > ..."

You observed:
 > The author may be a security or computer expert, but
 > his grasp of basic grammar is less than firm.  The more
 > accurate grammar conversion would be "This is an
 > object thrown to the ground, not a free-falling
 > object."  The statement in and of itself merely assists
 > in defining what can be called "thrown" and what can
 > be called "free-falling" campaign the author suggests.
 > To me the author is seemingly engaging in the same
 > "blame shifting tactic" that he accuses Microsoft of.

The way *I* see this is this:  Agre feels, and I agree with him, that
Microsoft, in its phrasing, is suggesting that since [the behavior in
question] is by design, that it *cannot be* a security vulnerability;
that is, that they are mutually exclusive.

If in fact this is the assertion that Microsoft is trying to cause
people to infer, they are wrong.  For evidence, we need merely look to
one of the most famous security holes of all time: the sendmail DEBUG
command.

Obviously this was placed in the software by design.  Equally
obviously, it was a security vulnerability.  Therefore, it must be
possible for an element of a program to be both of these things.

Therefore, Microsoft's explanation must be disingenuous, as they are
trying to assert that these two descriptions of a part of a program
cannot both simultaneously be true.

The problem isn't Phil doesn't understand the language, it's that
Microsoft is playing fast and loose with it.


From: kragen@pobox.com (Kragen Sitaker)
Subject: Risks of XML

You write:
 > XML and how to secure it:
 > <http://www.zdnet.co.uk/news/2000/20/ns-15500.html>

This topic is sort of like "ASCII and how to secure it."  This
paragraph says it best:

 > And that is the one big problem.  The Internet is as
 > insecure as ever, and ASCII will do nothing to improve
 > it.  In fact, the temptation to intercept and alter an
 > ASCII document containing vital data en route from one
 > banking application to another will lure many an
 > Internet vandal.

Well, in the original, it said XML, not ASCII, but it makes just as
much sense either way.


From: Darren Cervantes <cervante@roguewave.com>
Subject: SOAP Security

Your newsletter was forwarded to me recently.  I am interested in your
opinion on SOAP security issues.  Your recent article suggested that
any SOAP command may be able to sneak through to your machine and do
something malicious.  You state: Firewalls have good reasons for
blocking protocols like DCOM coming from untrusted sources.
Protocols that sneak them through are not what's wanted.

In my understanding of the SOAP protocol, a few things have to happen in
order for an RPC to "sneak" through:
1) An explicit SOAP server has to be set up
2) The SOAP server has to "translate" SOAP to enterprise services or RPCs
2) That server has to be configured to execute particular SOAP services (in
other words if the service isn't defined, it isn't available through SOAP)
3) The server has an opportunity to recognize the SOAP service and refuse
or block it if it is invalid

In addition, in the MS SOAP document, they state that both HTTP
encryption (SSL) and HTTP authentication protocols can be used in
conjunction with any end-point security (presumably authorization).
This would help negate the "untrusted sources" factor.

Based on my understanding, you would have to set up a SOAP server and
an explicit service to "erase harddrive."  You would then have to
allow your server to accept the request.  In a sense, it seems that
this same concern could be equally applied to many other technologies.
If SOAP were to be implemented irresponsibly, it could certainly be
insecure, but isn't it possible to implement it securely?


** *** ***** ******* *********** *************

CRYPTO-GRAM is a free monthly newsletter providing summaries,
analyses, insights, and commentaries on computer security and
cryptography.

To subscribe, visit http://www.counterpane.com/crypto-gram.html or
send a blank message to crypto-gram-subscribe@chaparraltree.com.  To
unsubscribe, visit http://www.counterpane.com/unsubform.html.  Back
issues are available on http://www.counterpane.com.

Please feel free to forward CRYPTO-GRAM to colleagues and friends who
will find it valuable.  Permission is granted to reprint CRYPTO-GRAM,
as long as it is reprinted in its entirety.

CRYPTO-GRAM is written by Bruce Schneier.  Schneier is founder and CTO
of Counterpane Internet Security Inc., the author of "Applied
Cryptography,"  and an inventor of the Blowfish, Twofish, and Yarrow
algorithms.  He served on the board of the International Association
for Cryptologic Research, EPIC, and VTW.  He is a frequent writer and
lecturer on computer security and cryptography.

Counterpane Internet Security, Inc. is a venture-funded company
bringing innovative managed security solutions to the enterprise.

http://www.counterpane.com/

Copyright (c) 2000 by Counterpane Internet Security, Inc.

ISN is hosted by SecurityFocus.com
---
To unsubscribe email LISTSERV@SecurityFocus.com with a message body of
"SIGNOFF ISN".