Schneier On Un-Authentication 336
Trailrunner7 writes "Bruce Schenier writes on Threatpost.com: 'In computer security, a lot of effort is spent on the authentication problem. Whether it is passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated — and hopefully more secure — ways for you to prove you are who you say you are over the Internet. This is important stuff, as anyone with an online bank account or remote corporate network knows. But a lot less thought and work have gone into the other end of the problem: how do you tell the system on the other end of the line that you are no longer there? How do you un-authenticate yourself? My home computer requires me to log out or turn my computer off when I want to un-authenticate. This works for me because I know enough to do it, but lots of people just leave their computer on and running when they walk away. As a result, many office computers are left logged in when people go to lunch, or when they go home for the night. This, obviously, is a security vulnerability.'"
How do you un-authenticate? (Score:1, Informative)
I lock my computer when I walk away (Score:3, Informative)
Re:I lock my computer when I walk away (Score:5, Informative)
I'll save you a keystroke, windows-L works too.
Re:I lock my computer when I walk away (Score:1, Informative)
Yup. And/or hopefully your competent sysadmins have configured (and locked down the ability to change) the screensaver timeout to a reasonable threshold of 15 minutes or so.
Re:I lock my computer when I walk away (Score:3, Informative)
If no activity for X minutes, lock the PC and send an email reminder to the user that says "Hey Dumbass, lock your PC when you leave".
Yeah, because I never sit at my desk for ten minutes on a phone call or reviewing paper notes.
Solutions that work, but are too bulky. (Score:5, Informative)
Back before ease of use eclipsed security, I once encountered a military system where the access terminal was surrounded by a small fence. Opening the gate in the fence forced an immediate logout.
Nobody would tolerate that today. Except, maybe, for an ATM.
Put the onus on the client (Score:3, Informative)
You make the client system re-authenticate after a configurable amount of time, and that authentication comes via central storage of authentication passwords/tokens. For example, Keychain.
My laptop is set up with SSHKeychain, and it has options for locking my Keychain. If I activate the screensaver and don't come back within 3 minutes or so, it locks the keychain, and any program that wants to use a stored password triggers a password authenticaton dialog box for the system keychain password.
This puts the power of security in the hands of the user or organization. Computer at home, no roommates? Probably not an issue to lock your keychain any time except when you shut down your computer. Work in a cube? After 5-10 minutes of inactivity or whenever you lock your screensaver.
Location based devices.. (Score:3, Informative)
Some places use smartcards, the card must be in the slot or it locks your screen... The same card is also used to open the doors so if you leave the room without taking the card then you can't get back in. Most people had the card attached to their belt or similar.
Another idea is to track the location of your phone using bluetooth (10 meters range), if you walk too far away it loses signal and locks the screen.
Re:applies the burninator (Score:3, Informative)
Re:Effective way to keep screens locked (Score:2, Informative)
You used someone else's credentials so that you could obtain a physical object for free, and you caused actual monetary damages for an innocent victim. This is not comparable to a nebulous "it's not real stealing" case like downloading music or movies. You committed either theft, fraud, or both, in a very real-world sense.
Re:Effective way to keep screens locked (Score:3, Informative)
This is brilliant!
Or it would be if I, as the sysadmin, couldn't easily send email in anyone's name...
Wow. Don't you feel important? Except that, really, ANYONE can send an email as ANYONE else, at ANY TIME. Here's a tip: type the following in a telnet prompt, where your ISP's mail server is called "smtp.myisp.com"
# telnet smtp.myisp.com 25
HELO foobar
MAIL FROM: billgates@microsoft.com
RCPT TO: samjones109@yahoo.com
SUBJECT: Free drinks on the house!
Hey! I gots my billions of dollars so come down to Joe's bar at 5:30 and drinks are on me!
-Billie Richboy. .
Congratulations! You've just faked being Bill Gates to Sam Jones! Wasn't that hard?
A few times, I've gotten a cheap kick sending text messages via the SMS gateway to cell phone users from themselves. It helped out once when I had a gal friend whose ex-boyfriend was giving her grief - freaked her ex out to send messages that looked to him like they came from his phone: ("Just leave me alone...")
Re:I lock my computer when I walk away (Score:3, Informative)
Windows doesn't support it in a multi-user network environment. I don't know why, but it doesn't.
Re:TLS/SSL (Score:3, Informative)