Security Basics mailing list archives
RE: Re: Concepts: Security and Obscurity
From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Wed, 18 Apr 2007 12:53:28 +1000
Here I fully agree with Karl in the start of this post. Where I differ is that I do believe that "security through obscurity" is a determinable question. There are experiments that could be run to determine this question - it is just not a question which has been determined as yet (unless there is a paper someone on the list can provide?) There are a few proposed experiments that may go a long way to answer this which have been proposed, either way - and either outcome - I look forward to the results. Regards, Craig Craig Wright Manager of Information Systems Direct +61 2 9286 5497 Craig.Wright () bdo com au BDO Kendalls (NSW) Level 19, 2 Market Street Sydney NSW 2000 GPO Box 2551 Sydney NSW 2001 Fax +61 2 9993 9497 www.bdo.com.au Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system. Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au. BDO Kendalls is a national association of separate partnerships and entities. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of levinson_k () securityadmin info Sent: Wednesday, 18 April 2007 10:22 AM To: security-basics () securityfocus com Subject: Re: Re: Concepts: Security and Obscurity Whether passwords count as obscurity is a question asked frequently over the years. Like Craig, I tend to agree with the wikipedia definition of security through obscurity, which suggests it applies to systems that use the secrecy of design / implementation details to provide security. http://en.wikipedia.org/wiki/Security_through_obscurity So with this definition, it would depend more on how the passwords were technically implemented, rather than whether or not passwords are used. Passwords are the piece of authentication data you want to protect, and not the method of protecting that authentication. The design is what you'd evaluate for obscurity, not the data. If you are discussing an early port knocking implementation without any cryptographic methods where the authenticator is a packet sent to a series of ports in order, that gets fuzzy. I tend to consider that to be a password like a keypad PIN or a numerical door lock, though some could argue that connecting to ports in akin to a network authentication protocol that relies on secrecy. And it gets even fuzzier if you're talking more recent port knocking implementations that are open source (not secret in their implementation details) and that use cryptographic functions for authentication. I'd say that asking whether port knocking apps are examples of obscurity is like asking whether operating systems are obscurity: some of them might use obscurity entirely, partly or not at all, it all depends on their implementation. Note that the definition of obscurity above (using secrecy of design details for security) seems to include closed source software. That might be the best example we should be using of obscurity, because open source vs. closed source is a religious question that will never be answered to everyone's satisfaction. Just like security through obscurity. kind regards, Karl Levinson http://securityadmin.info
Current thread:
- RE: RE: Re: Concepts: Security and Obscurity, (continued)
- RE: RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- Re: Re: Concepts: Security and Obscurity TheGesus (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- Re: Re: Concepts: Security and Obscurity TheGesus (Apr 17)
- Re: Re: Concepts: Security and Obscurity levinson_k (Apr 17)
- RE: RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Nhon Yeung (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Re: Concepts: Security and Obscurity Craig Wright (Apr 17)
- RE: Concepts: Security and Obscurity Craig Wright (Apr 19)
- Re: Re: Concepts: Security and Obscurity Lord Bane (Apr 23)