[risks] Risks Digest 23.17

From: RISKS List Owner (risko@private)
Date: Tue Feb 03 2004 - 17:03:51 PST

  • Next message: RISKS List Owner: "[risks] Risks Digest 23.18"

    RISKS-LIST: Risks-Forum Digest  Tuesday 2 February 2004  Volume 23 : Issue 17
    
       FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
       ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
    
    ***** See last item for further information, disclaimers, caveats, etc. *****
    This issue is archived at http://www.risks.org as
      http://catless.ncl.ac.uk/Risks/23.17.html
    The current issue can be found at
      http://www.csl.sri.com/users/risko/risks.txt
    
      Contents: [REMINDER: RISKS CANNOT RESPOND to Challenge-Responses.  Sorry!]
    How to Hack an Election (Hendrik)
    UK: Vital e-crime evidence often destroyed (Iain Thomson via Keith A Rhodes)
    Security Holes at DMVs Nationwide Lead to ID Theft and Safety Concerns
      (Monty Solomon)
    Porn viewers work for hackers (Robin Burke)
    January clearance sale (Scott Nicol)
    Re: Spirit Rover humbled (Jim Griffith)
    A scary thing (Erann Gat)
    Phishing and a new IE security patch (Sidney Markowitz)
    MyDoom and SCO (Steve Wildstrom)
    RISKS actually gets *relatively little* MyDoom Traffic (Chris Smith)
    Re: Risks of virus scanners (Paul Tomblin, Alan J Rosenthal)
    Re: The risks of naming (Robert de Bath)
    Re: Drunk unlocks police car with own key (D. Joseph Creighton, David Hollman)
    "Loss of Identity" theft (Terry A. Ward)
    REVIEW: "Kerberos: The Definitive Guide", Jason Garman (Rob Slade)
    Abridged info on RISKS (comp.risks)
    
    ----------------------------------------------------------------------
    
    Date: Sun, 1 Feb 2004 11:57:48 +0900
    From: Hendrik <hiz--rsk@private>
    Subject: How to Hack an Election (*NYT* editorial)
    
    *The New York Times* had the following editorial on line on 31 Jan 2004, at
    http://www.nytimes.com/2004/01/31/opinion/31SAT1.html - they conclude with
    the remark "Given the growing body of evidence, it is clear that electronic
    voting machines cannot be trusted until more safeguards are in place." I
    wonder what safeguards they envision that would allow us to trust electronic
    voting.  
    
      How to Hack an Election
    
      Concerned citizens have been warning that new electronic voting technology
      being rolled out nationwide can be used to steal elections. Now there is
      proof. When the State of Maryland hired a computer security firm to test
      its new machines, these paid hackers had little trouble casting multiple
      votes and taking over the machines' vote-recording mechanisms. The
      Maryland study shows convincingly that more security is needed for
      electronic voting, starting with voter-verified paper trails.  [...]
    
      They were disturbingly successful. It was an "easy matter," they reported,
      to reprogram the access cards used by voters and vote multiple times. They
      were able to attach a keyboard to a voting terminal and change its vote
      count. And by exploiting a software flaw and using a modem, they were able
      to change votes from a remote location.  [...]
    
    ------------------------------
    
    Date: Fri, 30 Jan 2004 11:41:24 -0500
    From: "Keith A Rhodes" <RhodesK@private>
    Subject: UK: Vital e-crime evidence often destroyed
    
    [I wonder if these are the same forensic experts who couldn't figure out how
    the Bank of England scam software worked?]
    
    Vital e-crime evidence often destroyed; National High Tech Crime Unit warns
    firms to leave computer forensics to the experts
    By Iain Thomson, vnunet, 29 Jan 2004, http://www.vnunet.com/News/1152379
    
    Companies that fall victim to computer crime may be inadvertently destroying
    evidence in their efforts to find the perpetrators. Detective Chief
    Superintendent Len Hynds, of the National High Tech Crime Unit (NHTCU), said
    that its Confidentiality Charter, launched in December 2002, was encouraging
    more businesses than ever to report computer crime.  But there are sometimes
    problems with gathering evidence if preliminary investigations have been
    carried out before the police are called in.
    
    Speaking at the Homeland and Corporate Security Summit in London DCS Hynds
    said: "There are examples of companies which wrestle with problems for
    months without calling us and that can lead to problems in the evidential
    trail. The private sector is going to be key to being even more effective in
    solving crimes. However, we need to develop common standards in terms of
    dealing with high-tech crime between the private and public sectors."
    
    Cyber-criminals are becoming ever more sophisticated in their
    activities. Tactics include hiding files that are disguised as bad sectors
    on a hard drive, and using other PCs as mail servers to shield illegal
    activities.
    
    Michael Colao, senior consultant at Dresdner Kleinwort Wassertein, said:
    "What we see is well-meaning IT professionals going in and doing what you
    see on every bad crime film: they muddy the waters. You only have one
    opportunity to collect the evidence you need to prove your case. Human
    resources send in well-meaning IT help desk staff who don't know what they
    are doing and ruin the evidence. You need a professional computer forensic
    team in there as soon as possible."
    
    ------------------------------
    
    Date: Mon, 2 Feb 2004 09:50:52 -0500
    From: Monty Solomon <monty@private>
    Subject: Security Holes at DMVs Nationwide Lead to ID Theft and Safety Concerns
    
    CDT (http://www.cdt.org/) has issued a report entitled "Unlicensed Fraud"
    (http://www.cdt.org/privacy/20040200dmv.pdf) documenting rampant internal
    fraud and lax security at state motor vehicle administration offices across
    the country placing the reliability of all driver's license at risk. While
    heavy public attention has been placed on new national standards and new
    technologies for driver's licenses, studying local news reports from
    throughout 2003 CDT finds that basic management processes to stop bribery
    and theft are lacking. In the report, CDT offers policy recommendations to
    address this dire issue. February 2, 2004
    
    ------------------------------
    
    Date: Wed, 28 Jan 2004 13:48:42 -0600
    From: "Robin Burke" <rburke@private>
    Subject: Porn viewers work for hackers
    
    The following article describes an attack against the web images (so-called
    "CAPTCHAS") that are used to prevent robots from using certain web
    applications such as the creation of free e-mail accounts.  The images are a
    form of "Turing Test", easy for a human user of normal ability to process,
    but difficult for a piece of software. The attack involves routing the
    CAPTCHA image to a page that advertises free porn.  Users have to decode the
    CAPTCHA to get the advertised images and in doing so, unwitting assist
    spammers in creating bogus e-mail addresses.
    
    "But at least one potential spammer managed to crack the CAPTCHA test.
    Someone designed a software robot that would fill out a registration form
    and, when confronted with a CAPTCHA test, would post it on a free porn
    site. Visitors to the porn site would be asked to complete the test before
    they could view more pornography, and the software robot would use their
    answer to complete the e-mail registration."
    
    http://www.post-gazette.com/pg/03278/228349.stm (Relevant section is
    near the end)
    
    One poster to a related thread in Slashdot
    (http://slashdot.org/article.pl?sid=04/01/28/1344207) reported that his
    site shut down its (CAPTCHA-protected) free e-mail service recently due
    to a sharp increase in spammer-generated accounts.
    
    Robin Burke, Associate Professor, School of Computer Science,
    Telecommunications, and Information Systems, DePaul University
    http://josquin.cti.depaul.edu/~rburke/
    
    ------------------------------
    
    Date: Sat, 31 Jan 2004 11:42:04 -0500
    From: Scott Nicol <snicol@private>
    Subject: January clearance sale
    
    Buy something, get whatever you can stuff into your parka free!
    
    That's right, go into a <name of big home-improvement store deleted to
    protect the guilty> when the outside temperature is a little cold (say, 10
    degrees F).  Pick up a $2 screwdriver and a $100 multimeter.  Pay for the $2
    screwdriver, but stuff the $100 multimeter in your jacket.  When the fancy
    schmancy EAS (Electronic Article Surveillance) system goes off as you are
    walking out the door, don't worry, the clerks will ignore it and yell to you
    "you're fine - that thing always goes off when its cold".
    
    I saw this happen about a dozen times while waiting in line at <big home
    improvement store>.  I have no idea if the customer had a $100 multimeter in
    their jacket, but then again, neither did the employees of the store!
    
    I couldn't find technical details on Checkpoint EAS systems
    <http://www.checkpointsystems.com/content/eas/default.aspx>, but Sensormatic
    <http://www.sensormatic.com/EAS/default.asp> provided details such as
    <http://www.sensormatic.com/EAS/EASGetDocument.asp?FileName=Digital Pro-Max
    DS NUS.pdf>, which states "Ambient Temperature: 0 C to 50 C (32 F to 122 F)"
    
    This particular problem would likely only affect stores with sensors near
    very large outside doors, such as home improvement and warehouse stores.
    
    ------------------------------
    
    Date: Tue, 03 Feb 2004 17:56:25 -0500
    From: griffith@private (Jim Griffith)
    Subject: Re: Spirit Rover humbled (RISKS-23.15)
    
    I'm so disappointed that PGN didn't go with the obvious pun --
      that Spirit was willing, but its flash was weak...
    
      [Thanks, but I didn't think Rover's park was worse than its plight.  PGN]
    
    ------------------------------
    
    Date: Wed, 28 Jan 2004 17:44:28 -0800
    From: Erann Gat <gat@private>
    Subject: A scary thing
    
    I just had a scary thing happen to me.  I got the following e-mail:
    
      Return-path: <remind@private-grt.oscar.aol.com>
      Date: Wed, 28 Jan 2004 20:12:08 -0500 (EST)
      From: Netscape Registration <remind@private-grt.oscar.aol.com>
      Subject: Information you requested
      To: gat@private
      Original-recipient: rfc822;gat@private
    
      Dear User,
    
      The information that you requested from Netscape is below:
    
      ******
    
      Thank you,
    
      Netscape Registration
      http://home.netscape.com/
    
    except that where the ******* is there was a password that I often use for
    low security applications.
    
    Trick is, I have never to my recollection signed up with Netscape.  To say
    nothing of the fact that the e-mail didn't come from Netscape (none of the
    received headers were from netscape).
    
    ------------------------------
    
    Date: Wed, 04 Feb 2004 10:16:16 +1300
    From: Sidney Markowitz <sidney@private>
    Subject: Phishing and a new IE security patch
    
    RISKS 23.16 mentioned phishing with URLs of the form
    http://reasonable.site.name @criminal.site.ip.address/index.html which use
    the username:password@hostname format of URL for social engineering.
    
    Microsoft has just released a security update for Internet Explorer which
    deals with vulnerabilities caused by some special characters preventing the
    entire URL from being displayed in the browser's address bar and status
    line. That vulnerability has been used with phishing URLs like the above to
    suppress display the portion of the URL starting from the '@'.
    
    They went one step further, however, and eliminated all support for the
    username:password@hostname syntax in http URLs in the Internet Explorer
    browser, with optional registry entries to allow or remove the support from
    programs that embed IE as an object.
    
    The Microsoft Knowledge Base article about the security update is at
    http://support.microsoft.com/default.aspx?kbid=834489
    
    It refers to information about the URL syntax at
    "INFO: URL Syntax for Authentication Without Dialog Prompt"
    http://support.microsoft.com/default.aspx?kbid=200351
    
    I have seen some objections to Microsoft unilaterally dropping support for a
    URI syntax allowed in RFC 2396, thereby breaking websites that use this form
    of URL for user logins. I think in this case Microsoft did the Right Thing
    for security. RFC 2396 applies to the generalized URI, which includes, for
    example http:// and ftp:// URLs. The specifics for the http: case (RFC 1738,
    2616, etc.) do not use that syntax, while ftp: does. Username password
    syntax in an http URL was always a nonstandard extension that introduced
    various security vulnerabilities.
    
    ------------------------------
    
    Date: Mon, 2 Feb 2004 16:34:32 -0500
    From: "Steve Wildstrom" <steve_wildstrom@private>
    Subject: MyDoom and SCO
    
    Writing on Feb. 2, it's very hard to assess what the real impact of the
    MyDoom-generate denial of service was on SCO. We do know that,
    notwithstanding the hype and heavy breathing from anti-virus companies, that
    it had little or no impact on the performance of the Internet as a whole.
    
    It's very hard to assess what is going on at SCO, because www.sco.com
    <http://www.sco.com/>  was mostly inaccessible from Wednesday, Jan. 28
    on (I'm indebted to Netcraft <http://www.netscraft.com/>  for their
    site-performance reporting.). Darting on Wednesday, my efforts to reach
    the SCO site variously generated forbidden access (403) errors, time
    outs, or sporadic availability.  At some point on Sunday, DNS entries
    for ww.sco.com were removed; later traffic to the site was directed to a
    Google search page. On Monday, SCO transferred the site to
    www.thescogroup.com <http://www.thescogroup.com/> . According to
    Netcraft, that server lies within the same IP address space as
    www.sco.com <http://www.sco.com/> , so it would appear that whatever is
    happening to the server, SCO's network is holding up fine.
    
    Netcraft also reported on the afternoon of Feb. 2 that in anticipation
    of the MyDoom.B phase of the attack, Microsoft has shortened the TTL for
    www.microsoft.com <http://www.microsoft.com/>  to 60. MyDoom.B appears
    to have gotten significantly less distribution than the A variant.
    
    I think the real untold story of MyDoom is that network administrators,
    especially at the big ISPs, have gotten much better at containing the
    damage from these attacks. MyDoom may have been the fastest spreading
    virus ever, but it seemed much less disruptive than SoBig.F last summer.
    After the first few hours, the main virus-related traffic I saw was the
    continuing stream of spurious bounce messages and the phony "you have
    sent a virus" alerts. It wouldn't be hard to eliminate those messages
    completely-turn off the virus alert feature, which has been rendered
    worthless by return address spoofing, and don't sent bounce messages in
    reply to messages bearing known signatures, like the MyDoom generated
    ones.
    
    Steve Wildstrom, BusinessWeek Technology & You columnist
    1200 G St NW Suite 1100, Washington, DC 20005
    
    ------------------------------
    
    Date: Tue, 3 Feb 2004 02:12:49 -0500 (Eastern Standard Time)
    From: Chris Smith <smith@private>
    Subject: RISKS actually gets *relatively little* MyDoom Traffic
    
    I note that you had 2528 new e-mails between Jan 27 and Feb 2, under a week.
    
    Over the week beginning 26 Jan at 3PM, I *personally* received over 30,000
    e-mails involving MyDoom.  That's just me -- I'm not an ISP or anything.  I
    haven't kept really close tabs, but I estimate this is between 700 and 1000
    megabytes.
    
    There are two reasons for this.  The first is subtle. As finally detailed at
    the bottom of Symantec's info page on MyDoom at
    http://securityresponse.symantec.com/avcenter/venc/data/w32.novarg.a@private
    one of the lesser known behaviours of MyDoom is the key. After finding an
    e-mail address by searching locally on the infected machine, MyDoom then
    also uses a combination of the domain and a list of common usernames. Almost
    all of the names are common given names - except mine: smith
    
    I maintain an address at a popular freemail/webmail site, using this
    username. Thus whenever an instance of MyDoom finds any e-mail from this
    site, there is a chance it has found me as well.  This isn't even one of the
    REALLY BIG webmail sites. Although I've got lots, I expect anyone at hotmail
    or aol with a name on the MyDoom list has even more.
    
    The second reason everyone knows - bounces back to spoofed From:
    addresses. I estimate that between 1/3 and 1/2 of my e-mails are of this
    variety.
    
    The volume of bounces and directs together makes clear that
    MyDoom uses these made-up addresses both for From: and To: addresses.
    
    It is worth noting that the vast majority of MyDoom traffic contains spoofed
    From: and From_ (sender) information.  Implementation of something like
    Sender Permitted From (SPF) could have stopped most of these in their
    tracks. MyDoom has effectively converted me into an SPF evangelist - because
    if the history of worms has shown us anything, it's that once a technique is
    shown to be useful to worms, it isn't RISK that it will show up again - it
    is pretty much certain.
    
    Anyone who argues that there are too many RISKs with something like SPF will
    have to provide me with a good alternative.
    
    Even after all this, I refuse to accept that my name is a RISK.
    
    ------------------------------
    
    Date: Mon, 2 Feb 2004 21:29:16 +0000 (UTC)
    From: ptomblin+netnews@private (Paul Tomblin)
    Subject: Re: Risks of virus scanners (Bellovin, RISKS-23.14)
    
    > Why are the good guys trying to teach people to click on attachments?
    
    I would think antivirus software companies would seem to have a very large
    incentive to keep users doing the stupid things that get them infected.  If
    people stopped clicking on attachments, the AV companies would be out of
    business overnight.
    
    Paul Tomblin <ptomblin@private> http://xcski.com/blogs/pt/
    
    ------------------------------
    
    Date: Tue,  3 Feb 2004 11:25:52 -0500 (EST)
    From: flaps@private (Alan J Rosenthal)
    Subject: Re: Risks of virus scanners (Bellovin, RISKS-23.15)
    
    > Why are the good guys trying to teach people to click on attachments?
    
    But opening "attachments" is a fact of ms-win life.  The commonest text-like
    file format is the Microsoft Word (.doc) format.  When people turn ms-word
    files into e-mail messages, they generally do so by "attaching" them.  So
    ms-win users are used to opening attachments, routinely.
    
    I don't think it's useful to tell people not to open attachments, because
    this is simply infeasible.  They _are_ going to open attachments.  In fact,
    the message to all telling them not to open attachments is likely to be a
    .doc file attachment (unless it's powerpoint, or a flash animation).
    
    I think that what ms-win needs is a clearer separation between data and
    program.  There need to be file formats which are not programmable, which
    can be viewed safely.  Assuming that plain text is (for no real reason) not
    an option, Microsoft could lead the way by releasing a version of its office
    suite which does not implement "macros".  Very few users will miss them, and
    everyone else will be impressed by Microsoft's technical mastery in
    producing word processors which are incapable of transmitting viruses.
    
    ------------------------------
    
    Date: Wed, 28 Jan 2004 07:48:21 +0000 (GMT)
    From: Robert de Bath <robert$@mayday.cix.co.uk>
    Subject: Re: The risks of naming (Anderson, RISKS-23.14)
    
      R. de Bath
      R. Debath
      R. Bath
      R. De'ath
    
    And thats in ONE language!  (The 'proper' surname is "de Bath")
    
    Rob (Robert de Bath <robert$ @ debath.co.uk>) <http://www.cix.co.uk/~mayday>
    
      [In addition, Arabic names seem to have many variants.  PGN]
    
    ------------------------------
    
    Date: Tue, 3 Feb 2004 14:39:51 -0600 (CST)
    From: "D. Joseph Creighton" <djc@private>
    Subject: Re: Drunk unlocks police car with own key (RISKS-23.16)
    
    I own a 1999 Sonoma and a 2000 Chevy Venture, both built by General Motors.
    
    The combination ignition/pass key is interchangeable to open either vehicle's
    door but will not start the other vehicle, presumably due to the chipped key
    required by the newer model (the Sonoma does not have it).  One hopes that,
    even though the mechanical door locks are being shared, the chips would have
    a 1:1 mapping of keys to ignitions.
    
    Incidentally, my dealer didn't think of it as a RISK when I first brought
    it to their attention.  They felt I should consider it a feature since so
    many others pay to have this done.
    
    D. Joseph Creighton [ESTP] | Systems Analyst, Database Technologies, IST
    Joe_Creighton@private | University of Manitoba  Winnipeg, MB, Canada, eh?
    
    ------------------------------
    
    Date: Tue, 3 Feb 2004 15:39:28 -0500
    From: "Dave Brunberg" <DBrunber@private>
    Subject: Re: Drunk unlocks police car with own key
    
    Forget keys, one time I was on a business trip to St. John's, Newfoundland.
    I rented a maroon Oldsmobile Alero from the National Car Rental at the
    airport.  The car was equipped with a keyless entry system on the key-ring.
    I rent so many cars that most of the time I forget what kind of car I'm
    driving on any given trip.  One day, I went into a local supermarket,
    leaving my rental parked in a spot near the entrance after locking it
    remotely.  Upon exiting the store, I walked over to my Alero, pressed the
    unlock button on the keychain, and hopped in.  I inserted the key and
    started the engine.  At this point I noticed that my briefcase was not on
    the passenger seat where I had left it.  After a moment of panic, it took
    about three seconds to realize that I was in somebody else's car.  I turned
    it off, got out, and pressed the lock button on the remote.  The car locked
    itself and I went looking for my rental, which was in a spot two rows over
    behind a big pickup truck.
    
    What are the odds of having not only a matching door/ignition key, but also the keyless entry remote?
    
    David W. Brunberg
    
    ------------------------------
    
    Date: Tue, 3 Feb 2004 14:14:23 -0800 (PST)
    From: David Hollman <dhollm@private>
    Subject: Re: Drunk unlocks police car with own key (RISKS-23.16)
    
    This story SOUNDS quite apocryphal [, like urban legends noted in]
    http://www.snopes.com/autos/law/copcar.asp.  In fact, things might be much
    worse than this story indicates, and I have a personal example to
    demonstrate.
    
    Last year I took a train out to my parent's from the city; in the parking
    lot they left me a car complete with a magnetic hide-a-key box for the car
    key which I did not have. Upon opening the box, I found there was a house
    key instead!
    
    After fruitlessly searching for another key I decided to try the house key
    on a lark, and to my great surprise it actually OPENED the driver's-side
    door of the car (which was a 1991 Jeep Cherokee).
    
    Sadly for me this key did not actually start the car. However, since I was
    in an extremely out-of-the-box frame of mind, I jammed a paperclip in the
    ignition, heard the distinctive buzzing, turned the "key" and STARTED THE
    CAR!
    
    (See photo - http://daiv.ods.org/sockimages/display/1526.jpg).
    
    The blade on a friend's pocketknife later accomplished the same trick.
    
    NB0: This was actually my dad's system of security through obscurity. Since
    putting the car key in a hide-a-key box is very insecure he would leave a
    house key which he knew would open the door, and then would hide the
    ignition key inside the car. The flaw? Not telling me this in advance!
    
    NB1: Getting into the car was never the primary concern anyway, since on a
    Cherokee you can grip the rubber of the rear window and easily pull the
    window out of the door, then climb into the trunk. Useful if you lock your
    keys in.
    
    NB2: On a Grand Cherokee (at least models from the late 90s) you can
    *always* open the rear window using the button on the door. This will set
    off the alarm if locked, but it opens regardless!
    
    ------------------------------
    
    Date: Mon, 26 Jan 2004 21:55:32 -0700
    From: "Terry A. Ward" <terrywa@private>
    Subject: "Loss of Identity" theft
    
    I was recently the executor of a relative's estate and was shocked to
    discover that I was able to cancel his private health insurance, his
    veteran's health benefits, one dozen credit cards, and all of his retirement
    direct deposit payments with simple phone calls. At no time did anyone ask
    me to prove that I was who I said I was or whether I had executor power over
    his estate. I simply presented a plausible sounding story, knew his social
    security number and his account numbers and was able to close his accounts
    over the phone. To make it even more interesting our last names are not even
    the same!
    
    The possibility for mischief should be obvious with such an insecure system.
    Not exactly computer-related but very scary indeed.
    
    ------------------------------
    
    Date: Wed, 28 Jan 2004 08:33:21 -0800
    From: Rob Slade <rslade@private>
    Subject: REVIEW: "Kerberos: The Definitive Guide", Jason Garman
    
    BKKRBSDG.RVW   20031018
    
    "Kerberos: The Definitive Guide", Jason Garman, 2003, 0-596-00403-6,
    U$34.95/C$54.95
    %A   Jason Garman
    %C   103 Morris Street, Suite A, Sebastopol, CA   95472
    %D   2003
    %G   0-596-00403-6
    %I   O'Reilly & Associates, Inc.
    %O   U$34.95/C$54.95 800-998-9938 fax: 707-829-0104 nuts@private
    %O  http://www.amazon.com/exec/obidos/ASIN/0596004036/robsladesinterne
      http://www.amazon.co.uk/exec/obidos/ASIN/0596004036/robsladesinte-21
    %O   http://www.amazon.ca/exec/obidos/ASIN/0596004036/robsladesin03-20
    %P   253 p.
    %T   "Kerberos: The Definitive Guide"
    
    Kerberos is not flashy, but it is a venerable and mature technology.  Yes,
    it has limited scalability, but most of the "successful" PKI (Public Key
    Infrastructure) projects are small enough that they could easily have been
    accomplished with Kerberos technology: an eminently elegant solution to the
    problem of communicating and authenticating over any channel that is, or
    must be, assumed to be insecure.
    
    Chapter one provides a history, base concepts, and variants of Kerberos.
    Terms and components are given in chapter two.  The Needham-Schroeder work,
    and the idea of ticket-granting, is in chapter three.  Implementation, in
    chapter four, reviews design, UNIX and Windows servers, and special
    considerations for a mixed environment.  The troubleshooting chapter, five,
    for once comes early enough in a book to be of use.  Security aspects
    external to Kerberos, and specific settings for different implementations,
    are covered in chapter six.  Chapter seven looks at some generic support for
    applications, as well as some specific programs that already have Kerberos
    support built in.  Cross realm trust is one of the advanced topics, but most
    of chapter eight concentrates on special requirements for Windows.  Chapter
    nine is a kind of review of the book, involving the various topics that have
    been discussed in a sample Kerberos installation.  Chapter ten looks at the
    future of Kerberos, with possible public key additions, Web applications,
    and smartcards.  An appendix contains an administrative command list.
    
    While Kerberos may not be as highly regarded as the more mathematically
    complex asymmetric cryptographic systems, it still have many uses, and this
    book provides the outline, background, and details to help you take full
    advantage of them.
    
    copyright Robert M. Slade, 2003   BKKRBSDG.RVW   20031018
    rslade@private      slade@private      rslade@private
    http://victoria.tc.ca/techrev    or    http://sun.soci.niu.edu/~rslade
    
    ------------------------------
    
    Date: 28 Jan 2004 (LAST-MODIFIED)
    From: RISKS-request@private
    Subject: Abridged info on RISKS (comp.risks)
    
     The RISKS Forum is a MODERATED digest.  Its Usenet equivalent is comp.risks.
    => SUBSCRIPTIONS: PLEASE read RISKS as a newsgroup (comp.risks or equivalent)
     if possible and convenient for you.  Alternatively, via majordomo,
     send e-mail requests to <risks-request@private> with one-line body
       subscribe [OR unsubscribe]
     which requires your ANSWERing confirmation to majordomo@private .
     If Majordomo balks when you send your accept, please forward to risks.
     [If E-mail address differs from FROM:  subscribe "other-address <x@y>" ;
     this requires PGN's intervention -- but hinders spamming subscriptions, etc.]
     Lower-case only in address may get around a confirmation match glitch.
       INFO     [for unabridged version of RISKS information]
     There seems to be an occasional glitch in the confirmation process, in which
     case send mail to RISKS with a suitable SUBJECT and we'll do it manually.
       .UK users should contact <Lindsay.Marshall@private>.
    => SPAM challenge-responses will not be honored.  Instead, use an alternative 
     address from which you NEVER send mail!
    => The INFO file (submissions, default disclaimers, archive sites,
     copyright policy, PRIVACY digests, etc.) is also obtainable from
       http://www.CSL.sri.com/risksinfo.html
     The full info file may appear now and then in future issues.  *** All
     contributors are assumed to have read the full info file for guidelines. ***
    => SUBMISSIONS: to risks@private with meaningful SUBJECT: line.
     *** NEW: Including the string "notsp" at the beginning or end of the subject
     *** line will be very helpful in separating real contributions from spam.
     *** This attention-string may change, so watch this space now and then.
    => ARCHIVES: ftp://ftp.sri.com/risks [subdirectory i for earlier volume i]
     http://www.risks.org redirects you to the Lindsay Marshall's Newcastle archive
     http://catless.ncl.ac.uk/Risks/VL.IS.html      [i.e., VoLume, ISsue]
       Lindsay has also added to the Newcastle catless site a palmtop version 
       of the most recent RISKS issue and a WAP version that works for many but 
       not all telephones: http://catless.ncl.ac.uk/w/r
     http://the.wiretapped.net/security/info/textfiles/risks-digest/ .
    ==> PGN's comprehensive historical Illustrative Risks summary of one liners:
        http://www.csl.sri.com/illustrative.html for browsing,
        http://www.csl.sri.com/illustrative.pdf or .ps for printing
    
    ------------------------------
    
    End of RISKS-FORUM Digest 23.17
    ************************
    



    This archive was generated by hypermail 2b30 : Tue Feb 03 2004 - 17:35:47 PST