Security Basics mailing list archives

RE: Re: Concepts: Security and Obscurity


From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Wed, 18 Apr 2007 12:53:28 +1000

Here I fully agree with Karl in the start of this post. 

Where I differ is that I do believe that "security through obscurity" is
a determinable question. There are experiments that could be run to
determine this question - it is just not a question which has been
determined as yet (unless there is a paper someone on the list can
provide?)

There are a few proposed experiments that may go a long way to answer
this which have been proposed, either way - and either outcome - I look
forward to the results.

Regards,
Craig



Craig Wright
Manager of Information Systems

Direct +61 2 9286 5497
Craig.Wright () bdo com au

BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
GPO Box 2551 Sydney NSW 2001
Fax +61 2 9993 9497
www.bdo.com.au

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

The information in this email and any attachments is confidential.  If you are not the named addressee you must not 
read, print, copy, distribute, or use in any way this transmission or any information it contains.  If you have 
received this message in error, please notify the sender by return email, destroy all copies and delete it from your 
system. 

Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls.  
You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or 
Director of BDO Kendalls.  It is your responsibility to scan this communication and any files attached for computer 
viruses and other defects.  BDO Kendalls does not accept liability for any loss or damage however caused which may 
result from this communication or any files attached.  A full version of the BDO Kendalls disclaimer, and our Privacy 
statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au.

BDO Kendalls is a national association of separate partnerships and entities.

-----Original Message-----

From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of levinson_k () securityadmin info
Sent: Wednesday, 18 April 2007 10:22 AM
To: security-basics () securityfocus com
Subject: Re: Re: Concepts: Security and Obscurity


Whether passwords count as obscurity is a question asked frequently over
the years.  Like Craig, I tend to agree with the wikipedia definition of
security through obscurity, which suggests it applies to systems that
use the secrecy of design / implementation details to provide security. 

http://en.wikipedia.org/wiki/Security_through_obscurity

So with this definition, it would depend more on how the passwords were
technically implemented, rather than whether or not passwords are used.
Passwords are the piece of authentication data you want to protect, and
not the method of protecting that authentication.  The design is what
you'd evaluate for obscurity, not the data.

If you are discussing an early port knocking implementation without any
cryptographic methods where the authenticator is a packet sent to a
series of ports in order, that gets fuzzy.  I tend to consider that to
be a password like a keypad PIN or a numerical door lock, though some
could argue that connecting to ports in akin to a network authentication
protocol that relies on secrecy.  

And it gets even fuzzier if you're talking more recent port knocking
implementations that are open source (not secret in their implementation
details) and that use cryptographic functions for authentication.  

I'd say that asking whether port knocking apps are examples of obscurity
is like asking whether operating systems are obscurity: some of them
might use obscurity entirely, partly or not at all, it all depends on
their implementation.

Note that the definition of obscurity above (using secrecy of design
details for security) seems to include closed source software.  That
might be the best example we should be using of obscurity, because open
source vs. closed source is a religious question that will never be
answered to everyone's satisfaction.  Just like security through
obscurity.

kind regards,
Karl Levinson
http://securityadmin.info


Current thread: