Does SSL protect you, or is it a condom that is open at both ends?

Written by ArticSoft


Forrepparttar last five or so years, SSL has been paraded asrepparttar 132030 technology that securesrepparttar 132031 Internet. All you have to do is look and seerepparttar 132032 padlock onrepparttar 132033 bottom ofrepparttar 132034 screen and you can be sure it’s safe.

Is it true?

SSL is a technology for providing a secure connection between two places. It provides secure links, or pipes between wherever it starts and wherever it stops.

What it does not do is actually secure any ofrepparttar 132035 data that passes throughrepparttar 132036 pipe, or really know where either end ofrepparttar 132037 pipe actually is. What you can be sure of is that anything put into one end ofrepparttar 132038 pipe is going to come out whereverrepparttar 132039 other end is.

But surelyrepparttar 132040 data is fully protected? Yes, whilstrepparttar 132041 data is inrepparttar 132042 pipe it is protected. Now, assuming – and unfortunately that’s what we have to do – that you know for sure where each end ofrepparttar 132043 pipe is, and you are sure that each end is very secure, and you know for certain who is at each end, then you’re OK. If any of those is not true then you do have a problem.

My data is SSL protected betweenrepparttar 132044 server, and me so why should I worry? Well no one atrepparttar 132045 server end really knows whomrepparttar 132046 data is from because they don’t know what your identity is. They assume that data arriving throughrepparttar 132047 pipe is right, and that your identity can be presumed fromrepparttar 132048 data, notrepparttar 132049 other way around. Unfortunately there are hacker attacks that divert your link through their own site, where they can pretend to each end that they arerepparttar 132050 other entity without either end beingrepparttar 132051 wiser. (This is called a man-in-the-middle attack using web site spoofing.)

The Problems with Secure Email

Written by ArticSoft


The ideal system that everyone is searching for –repparttar silver bullet, is to have top security automatically regardless of who you are sending to and what product(s) they happen to be using. The reality is that many e-mail packages are not themselves secure, and do not interoperate cleanly with anything but their own products.

Forrepparttar 132029 time being you are better off keeping your security outside of your e-mail or word processing package, and exchanging attachments that are fully protected and not relying upon any ofrepparttar 132030 different systems that people are using. That way you increaserepparttar 132031 security ofrepparttar 132032 result and do not have to rely on complex interactions between proprietary systems.

It may not be as elegant, but it will take you a lot further than relying on a specific e-mail service and will give you, forrepparttar 132033 time being, a much more secure result.

Introduction

Forrepparttar 132034 last ten years or so we have become increasingly reliant on e-mail. It is ubiquitous, and unlike real mail it can chase us from continent to continent in seconds. For better or worse we now haverepparttar 132035 ability to conductrepparttar 132036 next worst thing to conversation, but in writing.

Of course, and despite allrepparttar 132037 advice, we treat this ability as if it wererepparttar 132038 same as personal conversation. Private. Offrepparttar 132039 record. We also assume that no-one else is going to be able to read it, and that it can’t ever get intorepparttar 132040 wrong hands.

Slowly but surely we are finding out,repparttar 132041 hard way, that, as inrepparttar 132042 words ofrepparttar 132043 song, “It ain’t necessarily so.” What we are doing is like sending picture postcards throughrepparttar 132044 mail. It appears that everyone from our e-mail administrator to halfrepparttar 132045 hacking community can pick up what we are doing, even offrepparttar 132046 internal network.

Enterrepparttar 132047 answer – secure e-mail (Se-mail?). Run it just like ordinary mail but click onrepparttar 132048 secure button and you’re done. Shangri-La! But is it for real or is it yet another ofrepparttar 132049 IT pipe dreams?

Silver Bullet Syndrome

This is not a new disease. Far from it. This is a regular epidemic every time someone goes nearrepparttar 132050 IT security allergy. Somehow or other it seems obvious to anyone thatrepparttar 132051 immense complexity ofrepparttar 132052 computer can be made safe and secure by a single act (the laying on of hands perhaps?). Despiterepparttar 132053 fact that every day experience teaches us how difficult it is to get a computer to anything without us making a significant contribution, security is supposed to happen without any thought or planning (even less than putting something in a brown envelope rather than a see-through folder).

Manufacturers have been quick to recognize two things. The first has been that they need to service their customers more so that they can charge more. The second is that despite allrepparttar 132054 claims about standards in security,repparttar 132055 cold hard reality is that there are hardly any.

What, no standards?

Well, almost none. We have S/MIME (version 2 or 3?) to sort out how you might sign and encrypt streams going from one e-mail client to another. That’s fine except that you need ‘PKI’ standards sitting behind S/MIME to make it useful, and there seem to be more of those than you can shake a stick at. This is a case where there are so many different standards (and even more interpretations of them) that in effect you have no standards.

If you want to think about standards in terms of manufacturer’s products (after all, dominant suppliers and monopolies set standards of a kind) thenrepparttar 132056 picture is more like this. We have Outlook Express and Outlook (notrepparttar 132057 same thing even if they are fromrepparttar 132058 same stable) and HotMail. To that we must add Eudora, Lotus Notes and AOL (Compuserve). We have an increasing number of web-mail products such as Yahoo and Lycos, just in caserepparttar 132059 others weren’t enough. And we haven’t yet begun to mention allrepparttar 132060 various brands of ‘secure’ mail that exist, including PGP. Can you believe that all of these interoperate smoothly and seamlessly with each other?

So we can conclude that standards are not yet in a position to help us.

Our objectives

Somewhere inrepparttar 132061 security debate, you lose, as we seem in danger of doing, sight of what your objective actually is becauserepparttar 132062 technology debate is so much more confusing.

The objective forrepparttar 132063 user might be summarized as follows (borrowing fromrepparttar 132064 paper world):

- to be certain what they send goes torepparttar 132065 right person/place; - to be certain thatrepparttar 132066 right person/place can readrepparttar 132067 information; - to be able to use signed information as proof to a court or other body; - to stoprepparttar 132068 wrong people from reading personal and private information.

Some of these wishes are more difficult than others. Just as inrepparttar 132069 paper world, you can’t stop anyone seeingrepparttar 132070 address onrepparttar 132071 outside of a letter,repparttar 132072 same is true of e-mail. If someone alters that address, it doesn’t go torepparttar 132073 right place, and if someone altersrepparttar 132074 return address (in many countries it is written onrepparttar 132075 back ofrepparttar 132076 envelope)repparttar 132077 recipient may not know where it has come from or it may not, if delivery fails, be returned torepparttar 132078 correct sender.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use