Hans-Werner_Braun%UMich-MTS.Mailnet@MIT-MULTICS.ARPA (07/30/85)
Lots of people appear to be thinking that a verification of IP addresses, e.g., in the case of SMTP is not necessary. I am not sure whether and where this was already discussed before, but I get the impression that the proliferation of low cost workstations connected to, say, campus computer networks might change our minds in two to three years in an environment where most of the power (besides parts of routing) will go to these hosts. I presume that this will be a newly evolving problem which could not easily show up so far. What are the suggested measures against faked message headers in that case? IP source verification? Something else? Or is this considered to be no problem at all? -- Hans-Werner
alt%sri-lanka@sri-tsc.ARPA (E. Howard Alt) (07/30/85)
One good way to do authentication is with encryption of the public key variety. The person would encrypt the message with his private key, and people would decrypt the information with his public key (carried along with the message) to read the headers and text. No one can change the headers of text of the message, because they can't make ciphertext that will be decrypted with his public key. You can't lie about who sent the message because you wouldn't be able to decrypt the message. Simple, eh? The logistics are a bit more complicated... Howard.
alt%sri-lanka@sri-tsc.ARPA (E. Howard Alt) (07/31/85)
One good way to do authentication is with encryption of the public key variety. The person would encrypt the message with his private key, and people would decrypt the information with his public key (carried along with the message) to read the headers and text. No one can change the headers of text of the message, because they can't make ciphertext that will be decrypted with his public key. You can't lie about who sent the message because you wouldn't be able to decrypt the message. Simple, eh? The logistics are a bit more complicated... Howard.
salex@RICE.ARPA (Scott Alexander) (07/31/85)
So you check my ip addr and it agrees with my name in the host table. But if this is my workstation, I can cause it to build ip packets w/ any addr I like. So now instead of just faking the HELO command I have to fake ip packets, too. On an ethernet, even checking the ethernet addr doesn't tell you anything since I can often reset it. There is no way to get around faking mail. You can make it harder. The people with whom I have dealt who are willing to go to the trouble to fake mail are willing to format ip packets also. Scott Alexander Rice University salex@rice (713) 527-6012
stef@uci-icsa.ARPA (Einar Stefferud) (07/31/85)
The authentication of network mail issue has been discussed many times over the last decade, in various discussion lists, including header-people and msggroup. Each such discussion has ended by recognizing that authenication always requires some kind of out-of-band verification mechanism, like the county recorder for property deeds and important legal documents. Use of encryption fits this solution. The keys are issued/distriuted out of band (or you have done something magic to include the key in the message in such a way that it cannot be faked). Sending the public key in the message is not the case I mean here. it is the private keys that go out of band. It is important to note that the need for authentication is relative to the cost of being unsure of a sender's identity. In most netmail cases, it is easy to verify by checking back via reply mail (or forwarding back a copy) to the supposed sender. This is going out of band again though. And, I must agree that SMTP is rather too promiscuous for me as we populate our local area networks with Unix Class Workstations which are administered by whoever happens to be at the console in too many cases. I worry about them in more ways than just mail! In too many cases, anyone can become root and can then use those privs to attack other hosts, and ... Sigh! Stef
Hans-Werner_Braun%UMich-MTS.Mailnet@MIT-MULTICS.ARPA (07/31/85)
Ok, but you'd have to be careful not to mess up IP routing back to you. I was not intending to say that IP source verification would resolve all the SMTP authentication problems but rather asking what others think whether it would be a worthwile thing to do to improve the situation to some extend, even while confusing layering. -- Hans-Werner
jordan@ucbvax.ARPA (Jordan Hayes) (08/01/85)
Hmmm... what's wrong with faked headers? Why should e-mail be any different from snail mail? All you can do is "postmark" what you get with time/date and where you think it's from. Caveat reader... ------------ Jordan Hayes jordan@UCB-VAX.BERKELEY.EDU UC Berkeley ucbvax!jordan +1 (415) 835-8767 37' 52.29" N 122' 15.41" W
Mats_Ohlin_FOA2%QZCOM.MAILNET@MIT-MULTICS.ARPA (08/07/85)
Within the Commission of the European Communities there is a project OSIS (Open Shops for Information Services) that aims to develop a "smart card" including a chips for RSA-encryption used so that (only) the legitimate user could produce (using the secret key) signed (and timestamped) messages that anyone could decrypt (using the public key) thus verifying the identity of the sender. The interational banking organisations are very interested as well - even if the first step aims to provide a simple, non-contract technique for data base users to get access. The OSIS project also includes contracting procedures via electronic media.
darling@uwmacc.UUCP (Jean Darling) (08/07/85)
We are bringing up a local TCP/IP network connecting a heterogeneous bunch of operating systems. One of the things we want our network to do for us is allow certain peripheral output devices (plotter, photo- typesetter, laser printer, etc) to be shareable by any authorized user on the network (under our administration, they have to pay!). We expect to have some sort of global authorization system which would contain network ids and passwords. We will need some kind of global queues for these devices as well. We are beginning the process of designing some network servers to do this sort of thing, but we'd prefer not to re-invent the wheel. The authentication problem comes up for PC users of the network; we *think* that having a network password would protect us fairly well, and perhaps would take care of making sure the right PC user is collecting the right mail. Perhaps we would have to use the encryption scheme to make sure someone wasn't pretending to be the authorization server. [How feasible is it to try to treat some local IP addresses like ports, available to PCs on a first-come first-served basis? (These addresses could only be known locally...users from outside would have to mail to the gateway nameserver machine.)] Please help clear away the fog. Any comments, suggestions, or pointers to references will be welcomed. Jean Darling