"John Howie" <[EMAIL PROTECTED]> writes:

> Todd (and lists),
> 
> You wrote:
> 
> > 
> > This is not completely correct, and I wanted to clarify how an attack
> > against a domain-member's EFS encrypted files can work.  The threat
> > model is this:
> > 
> 
> It is important to distinguish between a weakness in EFS (there is none,
> as described here) and the risk associated with using cached logon
> credentials.

I agree there's no bug here, if that's what you mean.  Whether this is
a 'weakness', risk, vulnerability, or whatever is mainly semantics.
Let's just say it's a property of EFS that its encryption is no
stronger than the user's password in the scenario I outlined.

The underlying point is that many organizations probably have password
policies (complexity requirements and maximum password age) designed
in part to mitigate the risk of the passwords being cracked before
they expire (and become useless).  Often, maximum age is in the
ballpark of 45 days.

The problem is that if someone has obtained a stolen laptop as I
described, the user's password doesn't become useless when it expires
unless the information in the files encrypted with EFS also becomes
useless.

If you want to encrypt information that has long term value, you
probably need to either seriously reevaluate your password complexity
requirements, put smart cards or some other hardware into the mix (as
you mentioned), or use something other than EFS.

-- 
Todd Sabin                                          <[EMAIL PROTECTED]>
BindView RAZOR Team                            <[EMAIL PROTECTED]>

Reply via email to