From: “Nicolas J. Hammond” <njhm@ns.njh.com>
To: pgut001@cs.auckland.ac.nz
Message Hash: 140c0a2679e28d63ae34e24ec1a0779e75f230f9e08da8cf1f80606250a941b4
Message ID: <199610281736.MAA04140@ns.njh.com>
Reply To: <84648715026895@cs26.cs.auckland.ac.nz>
UTC Datetime: 1996-10-28 18:07:12 UTC
Raw Date: Mon, 28 Oct 1996 10:07:12 -0800 (PST)
From: "Nicolas J. Hammond" <njhm@ns.njh.com>
Date: Mon, 28 Oct 1996 10:07:12 -0800 (PST)
To: pgut001@cs.auckland.ac.nz
Subject: Re: Secure Internet-based Electronic Commerce: The View from Outside the US
In-Reply-To: <84648715026895@cs26.cs.auckland.ac.nz>
Message-ID: <199610281736.MAA04140@ns.njh.com>
MIME-Version: 1.0
Content-Type: text/plain
pgut001@cs.auckland.ac.nz wrote ...
> I've just made a draft copy of this paper available for comment as
> http://www.cs.auckland.ac.nz/~pgut01/paper.htm, a copy of the introduction is
> given below. The whole thing is around 170K long (40 A4 pages when printed).
> If anyone has any comments to make on it, please let me know.
>
> Peter.
1) "...the number of security problems inherent in SMTP are legendary"
Incorrect. SMTP is safe.
Some (most?) implementations of SMTP have not been safe.
There is a big distinction between the protocol and its implementation.
2) "C2...now being applied to networked single-user systems over
multiple windows (which may require different security levels)"
I'm not aware of anyone doing that - doesn't mean it's not happening -
just seems an unusual configuration.
Other than these nits seems a v. thoroughly researched paper.
> Introduction
> ------------
>
> [...]
>
> Because of well-publicized break-ins there has been a steadily increasing
> demand for encryption and related security measures to be included in software
> products. Unfortunately these measures often consist either of "voodoo
> security" techniques where security is treated as a marketing checkbox only,
> or are rendered ineffective by the US governments refusal to allow
> non-americans access to the same security measures which it allows its own
> citizens. Organisations employing such (in)security systems may make
> themselves liable for damages or losses incurred when they are compromised.
> This paper covers the issues of using weak, US government-approved security as
> well as problems with flawed security measures, examines some of the measures
> necessary to provide an adequate level of security, and then suggests several
> possible solutions.
In general you equare security with cryptography - which is fine -
but there are other tools that you need to use in addition to cryptography
to secure a system and network.
--
Nicolas Hammond NJH Security Consulting, Inc.
njhm@njh.com 211 East Wesley Road
404 262 1633 Atlanta
404 812 1984 (Fax) GA 30305-3774
Return to October 1996
Return to “pgut001@cs.auckland.ac.nz”