John Denker wrote:
We need to talk about threat models:
  a) The purveyors of the system in question don't have any clue
   as to what their threat model is.  I conjecture that they might
   be motivated by the non-apt analogies itemized above.
  b) In the system in question, there are myriad reasons why Joe
   would need to log in.  If Joe wanted to do something nefarious,
   it would take him less than a second to come up with a seemingly
   non-nefarious pretext.  When the approver approves Joe's login,
   the approver has no idea what the consequences of that approval
   will be.  The two-person login requires the approver to be
   present at login time, but does not require the approver to
remain present, let alone take responsibility what Joe does after login.
  c) The only threat model I can come up with is the case where
   Joe's password has been compromised, and nobody else's has.
   Two-person login would provide an extra layer of security
   in this case.  This threat is real, but there are other ways
   of dealing with this threat (e.g. two-factor authentication)
   ... so this seems like quite a lame justification for the
   two-person login.
  d) Or have I overlooked something?


OK, putting on the devil's advocate hat & cape here...

Consider the latest case with SocGen where a trader goes rogue (so the news has it at least). One might argue that the system you are talking about provides a control over that.


From the foregoing, you might conclude that the two-person login
system is worthless security theater ... but harmless security
theater, and therefore not worth worrying about either way.


There is the possibility of compliance controls. In audits and sarbanes-oxley and other things there is frequent talk of dual control and 4 eyes principle. Now, it could be that these points can be "easily" covered by employing a system that "enforces" this. Often, auditors will be convinced if they can see something in place, and not feel the need to audit the system itself. The auditor's job is done when he can safely say "management has put in place procedures..." and the system you mention meets that protocol in words at least.


But the plot thickens.  The purveyors have implemented two-person
login in a way that manifestly /reduces/ security. Details available on request.

So now I throw it open for discussion.  Is there any significant
value in two-person login? That is, can you identify any threat that is alleviated by two-person login, that is not more wisely alleviated in some other way?


It might be useful for management to decree that all juniors must work with a senior watching over. Also e.g., critical systems where two systems administrators work together. In linux there is a program called screen(1) that allows two sysadms to share the same screen and type together. This has a lot of value when "two minds are better than one." But, yes, this is not quite what you are describing.

Also, it might be a control to enforce other procedures. If the sysadm is given the controls to some departmental system, then instead of just waltzing in and playing with it, he has to ask the non-techie boss, who then asks what the story is. This way she can know that the appropriate procedures are in place, such as notification to users.

It's far easier to figure out what the sysadm is up to if he is forced to have a conversation every time he wants to log in... this addresses your point b above, in that it now clearly labels any disaster as something the sysadm should have told the boss about before, instead of leaving it in the murky area of "of course I intended to scrub the disks, that's my job!"


If so, is there any advice you can give on how to do this right? Any DOs and DON"Ts?


I'd expect a proper physical token to be the manager's login mechanism. If it was a password he typed in there would be too much incentive to share the password.

iang

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to