assurance - RE: [Assurance] can two-factor be hacked ?
Subject: Assurance
List archive
- From: Eric Goodman <>
- To: "" <>
- Subject: RE: [Assurance] can two-factor be hacked ?
- Date: Mon, 10 Mar 2014 21:31:31 +0000
- Accept-language: en-US
As everyone else has said, technology alone won't solve the issue. Any interface a user can access via a web browser, an automated system can interface with
the same way. I (and I'm sure many others) have seen some egregious proxy applications deployed, and it's frequently hard to explain to the developers of the proxies why
that's not okay, let alone explaining to the end users why it's a security risk. I've had web developers argue that the IdP login page or even our IdM password change page is just a text/html-based API, as valid to authenticate against as a publicly accessible
LDAP server. I think a key element I haven't seen listed below is to actually have a campus/account system policy that makes it clear that proxying user authentication is
not allowed (or at least when it is allowed). Yes there are always exceptions, but the exceptions should require a true process with express approval of some CISO-like entity. This won't stop true hackers, but it can make it clear to "insiders" who develop
these kinds of things that it's not okay, then at least you have a(n internal) leg to stand on when trying to correct such issues.
If you can't get your campus to agree to such a statement, then it's almost a lost cause. (It probably is a lost cause in that case, but I've always had a sort
on Don Quixote complex around this specific practice…) --- Eric From: [mailto:]
On Behalf Of David Langenberg To get back to the root of the question though: Detection: analyze user/ip-block combinations. See a lot of users from the same address -- check it out & see what it might be (Kiosk, proxy, etc) Prevention: Once you know about a shenanigan like this, leave it up and alone. Record users coming through it (maybe ask a user what the deal is with their access yesterday at 5pm). Once you know it's a bad app, start the education: "Dear
User, you accessed system X via $PROXY at $TIME. This is a violation of policy XYZ and therefore you have lost Assurance Z. You now need to take corrective steps 1, 2, and 3. Further usage of $PROXY will result in disciplinary action". Slap enough hands
and folks will get the idea. Of course, there's a reason they're using bearbucks rather than going directly to Banner... Dave On Fri, Mar 7, 2014 at 12:39 PM, Steven Carmody <> wrote: Hi,
-- Identity & Access Management The University of Chicago |
- [Assurance] can two-factor be hacked ?, Steven Carmody, 03/07/2014
- Re: [Assurance] can two-factor be hacked ?, Cantor, Scott, 03/07/2014
- Re: [Assurance] can two-factor be hacked ?, David Langenberg, 03/07/2014
- RE: [Assurance] can two-factor be hacked ?, Eric Goodman, 03/10/2014
- Re: [Assurance] can two-factor be hacked ?, Tom Scavo, 03/10/2014
- RE: [Assurance] can two-factor be hacked ?, Jones, Mark B, 03/10/2014
- Re: [Assurance] can two-factor be hacked ?, Tom Scavo, 03/10/2014
- RE: [Assurance] can two-factor be hacked ?, Jones, Mark B, 03/11/2014
- Re: [Assurance] can two-factor be hacked ?, Farmer, Jacob, 03/11/2014
- RE: [Assurance] can two-factor be hacked ?, Brian Arkills, 03/11/2014
- Re: [Assurance] can two-factor be hacked ?, Cantor, Scott, 03/11/2014
- Re: [Assurance] can two-factor be hacked ?, Steven Carmody, 03/12/2014
- Re: [Assurance] can two-factor be hacked ?, Tom Scavo, 03/12/2014
- Re: [Assurance] can two-factor be hacked ?, Cantor, Scott, 03/12/2014
- RE: [Assurance] can two-factor be hacked ?, Brian Arkills, 03/11/2014
- Re: [Assurance] can two-factor be hacked ?, Farmer, Jacob, 03/11/2014
- RE: [Assurance] can two-factor be hacked ?, Jones, Mark B, 03/11/2014
- Re: [Assurance] can two-factor be hacked ?, Tom Scavo, 03/10/2014
- RE: [Assurance] can two-factor be hacked ?, Jones, Mark B, 03/10/2014
Archive powered by MHonArc 2.6.16.