mailing list archives
RE: Multi-Factor Authentication Concern
From: "Webster, William P CTR FNMOC, N661" <william.p.webster.ctr () navy mil>
Date: Tue, 14 Aug 2007 16:58:41 -0700
Looking at this from a different perspective, and I hate to say
it but Bob is correct, It is a matter of semantics, the authentication
is just a data set, and however that data is entered and stored is
anyone's guess. Why one would want to set multiple people objects into
an authentication model is beyond me, but, the theory is correct. And of
course, as someone earlier pointed out, it kinda leaves the field open
Therefore, it is "OK" as far as the system is concerned, it does
not care what data is used or how it is used, or where it comes from, we
are the ones that make up the rational part of the equation.
My 2 Centz
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of Francois Yang
Sent: Monday, August 13, 2007 11:45
To: Chris Barber
Cc: jsewell () jsewell com; security-basics () securityfocus com
Subject: Re: Multi-Factor Authentication Concern
I think there's a confusion in the way the term is used.
Multi-factor meaning multiple factors to authenticate ONE person.
Not multiple ways to authenticate multiple people.
A factor could be regarded as password, id card, retina scan,
So a multi-factor authentication system would require one person to use
two or more factors to authenticate.
So bob would have to use a password and finger print to authenticate.
Also most of those systems are set to what it can do.
So you can't have all the options and pick and choose which one you want
Like, you won't see a system with password, retina scan, finger print,
id card, etc..and say I want to only use these two authentication out of
the 10 to authenticate the users. Unless I'm wrong.
Hope that makes sense.
On 8/13/07, Chris Barber <cmbarber () gmail com> wrote:
OK, lets take this down to the very basics. single factor
If Bob were to think about it just a bit harder it would be obvious to
him as well.
If Sally new Mike's Username and used her password she would not get
in, even though both were values in the authentication database.
Now we expand the Database to hold more fields (Identity, Password,
Retina Print, Badge number, etc.). All feilds must match one record
in the database or no access is allowed.
Secure Programming 101...
My thoughts, simple as they are.
On 10 Aug 2007 15:21:32 -0000, jsewell () jsewell com
<jsewell () jsewell com> wrote:
I'm having an argument with someone at work about multi-factor
authentication. We'll call him Bob.
Bob claims that in a multi-factor authentication system, the factors
don't need to identify the same person. In other words, Bob thinks it's
perfectly OK for the door to the data-center to open when Jim badges in,
Mike scans his retina, and Sally enters a her PIN.
This is obviously wrong. Bob says "prove it". So I've scoured the
net and books for something that describes multi-factor authentication
as requiring that all factors identify the same person. So far, I can't
Is it so obvious that nobody has bothered to write it down, or am I
wrong in my thinking?
If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked. - White House Cybersecurity
Advisor, Richard Clarke
RE: Multi-Factor Authentication Concern Kandala, Nham (Aug 10)
Re: Multi-Factor Authentication Concern Chris Barber (Aug 13)
Re: Multi-Factor Authentication Concern Yves Bourdic (Aug 15)
RE: Multi-Factor Authentication Concern zenmasterbob123 (Aug 10)
Re: RE: Multi-Factor Authentication Concern subconscienceless (Aug 14)