Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security News

Security By Obscurity — a New Theory 265

mikejuk writes "Kerckhoffs' Principle suggests that there is no security by obscurity — but perhaps there is. A recent paper by Dusko Pavlovic suggests that security is a game of incomplete information and the more you can do to keep your opponent in the dark, the better. In addition to considering the attacker's computing power limits, he also thinks it's worth considering limits on their logic or programming capabilities (PDF). He recommends obscurity plus a little reactive security in response to an attacker probing the system. In this case, instead of having to protect against every possible attack vector, you can just defend against the attack that has been or is about to be launched."
This discussion has been archived. No new comments can be posted.

Security By Obscurity — a New Theory

Comments Filter:
  • Nature disagrees (Score:3, Interesting)

    by Anonymous Coward on Saturday October 01, 2011 @06:21PM (#37579816)

    Camouflage is the oldest and most natural form of security on the planet.

  • by jhoegl ( 638955 ) on Saturday October 01, 2011 @06:22PM (#37579824)
    There is another way to look at this.

    Imagine you have gold behind a locked door. Now imagine you have 50 locked doors.

    This is your security through obscurity.
  • by telekon ( 185072 ) <canweriotnow&gmail,com> on Saturday October 01, 2011 @06:24PM (#37579840) Homepage Journal

    Kerckhoff's Principle specifically applies to cryptosystems. Not only does TFA describe more of a generalized application to systems and code, but it's not really describing 'security through obscurity.' It's describing informational arbitrage, i.e., profiting (not necessarily financially) from an imbalance of knowledge on one side of a two-participant game.

    The dynamic adaptive approach has its merits, particularly as it is increasingly clear that most security is only the illusion of security, maintained until it is breached. But traditional 'security through obscurity' refers to systems for which the only security measure in place is maintaining the secrecy of a protocol, algorithm, etc.

    It seems to me the ideal approach is a balanced one, that embraces the UNIX philosophy: cover the 90% of most common attack vectors with proven security measures (and update practices as needed), and take a dynamic adaptive approach to the edge cases, because those are the ones most likely to breach if you've done the first 90% correctly.

  • Missing the point? (Score:4, Interesting)

    by nine-times ( 778537 ) <nine.times@gmail.com> on Saturday October 01, 2011 @06:35PM (#37579898) Homepage

    Well maybe I'm wrong, but I always thought the complaints of "security by obscurity" were not that obscurity couldn't be helpful to security, but that it was a bad idea to rely on obscurity.

    It seems obvious to me that the more complete the attacker's knowledge, the greater the chance of a successful attack. If an attacker knows which ports are opened, which services are running, which versions of which software are running which services, and whether critical security patches have been applied, for example, it's much easier for them to find an attack vector if there is one. You're more secure if attackers don't know that information about your systems, because it forces them to discover it. That takes additional time and effort, and they may not be able to discover that information at all.

    However (and here's the point), it's not a good idea to leave your systems wide open and insecure and hope that attackers don't discover the holes in your security. It's not smart to rely on the attacker's ignorance as the chief (or only) form of protection, because a lot of times that information can be discovered. It's true that "obscurity" is a form of security, but it's a fairly weak form that doesn't hold up over time. The truth tends to out.

  • by thegarbz ( 1787294 ) on Saturday October 01, 2011 @06:41PM (#37579940)

    Which means that the real security is the lock on the door.

    But that is also just obscurity in another form. The obscure part is that the attacker doesn't know the combination to the lock, or doesn't know how the tumblers specifically are keyed. Otherwise a key could be made up.

    All security is obscurity, just different levels of it. In some schemes the obscure value is shared (hidden directory on the server that isn't crawled but can none the less be accessed by a direct link). Some obscure values aren't (public key encryption).

    The hiding the key under the rock is analogous to using a weak form of obscurity to hide a strong one. Which in this case is no better than the obscurity of not letting anyone know that the door lock doesn't actually work anyway.

  • Not exactly. (Score:4, Interesting)

    by khasim ( 1285 ) <brandioch.conner@gmail.com> on Saturday October 01, 2011 @09:03PM (#37580682)

    There are other ways to have obscurity.

    What if you put the lock for the door underneath one of the many flower pots, and perhaps even have a completely non-functional keyhole on the door itself.

    That isn't "obscurity" in the context of "security THROUGH obscurity". The word "through" is important there.

    You can have a functional security system and add misdirection to that without reducing the overall security of the system. But the system, in the end, still depends upon the original security model. Once the correct key hole is known, the lock still must be cracked.

    You can add obscurity without making the security dependent upon the obscurity.

For God's sake, stop researching for a while and begin to think!

Working...