[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: idea for improving security



On Tue, 06 May 2003 13:07:24 -0500
Mark Edgington <edgimar@iit.edu> wrote:

> 
> it doesn't matter if others are 
> connecting to port 80, etc. while he is doing these connections, as long as no-one 
> else is trying to connect to any of the ports in the trigger-sequence list -- this is 
> the only thing which will invalidate the sequence-recognition

Hi,it seems you don't mention that the connection attempts can be memorized
associated to the originating IP, and then the wanted port made available only for this IP.

It looks a bit complex to me, only useful for a private use of a port which is not
publically available, which means only for ssh as other protocols can pass through
a ssh tunnel.

This authentification system won't be vulnerable to ssh exploits, but you're
basically using port numbers as characters of an unencrypted password.

A simplification of your idea with no loss of feature without using ssh may be to
have incoming packets of an unique port appear as dropped from the outside and
still processed (how ??) by a daemon waiting for a password in the packet body.
Passwords can be OTP.

(a bit dirty) is it possible to use snort with a special rule to detect such a traffic,
eventually with another process reading snort log files ?

Alain



Reply to: