This
story appeared on Network World Fusion at
http://www.nwfusion.com/columnists/2001/00344238.html
'Net
Insider
Talking to a
mirage?
By Scott Bradner
Network World, 02/05/01
Security
is expensive. It's expensive in terms of complexity, management and non-ease of
use. It's also expensive in terms of the processing power required. But
attempts to minimize the impact of the latter on Web servers are now affecting
the very security that is being sought.
Web security is pretty good
stuff. The basic idea is that you want to set up secure communication between
yourself and a server that you are sure is the right one. At the same time, the
server wants to be sure that it's talking to you and not someone down the
street.
The server has a digital certificate your browser uses to be
sure it is communicating with the right server. You authenticate yourself to
the server with your digital certificate or with a logname/password
combination. Thus, the server knows who you are. You, as a user, authenticate
yourself to an authenticated server - just the right level to be securing - and
the communication is encrypted - what more could you want?
By the way,
I say Web security is at "just the right level" because the
authentication is taking place at the user level and not the system level, as
is the case with many VPN products and services.
VPNs can be used
between firewalls, in which case the communication inside the firewalls is open
to eavesdropping, and the identity of the servers and users is not assured.
VPNs can also be used between remote computers and a firewall. The result here
is not much different - insecure internal communications and no server
authentication. In addition, if the remote computer is compromised, the first
line of corporate defense is breached.
But there is a disturbing, if
understandable, trend that undermines some of the security of a secure Web
environment. This is the movement to separate front-end processors that are
used to off-load some of the computing-intensive work from the Web servers.
These front-end processors mimic the server you're trying to connect to. They
have a digital certificate for that server, so your browser thinks it's talking
to the actual server. The front-end processor does the encryption and
decryption, and communicates with the actual Web server using unencrypted
datastreams.
Since this is all in a data center, one might think that
it's all OK security-wise. But it's not. The data is now exposed to
eavesdropping, where it previously had not been.
Also, if the
front-end processor is compromised, all the servers it front-ends for are
compromised. But more importantly, you as a user can no longer be sure what you
are talking to. Transparent proxies, Network Address Translation systems and
firewalls have already compromised the original end-to-end Internet model, and
I guess this is just another little step along the path. But I don't have to
feel good about it.
Disclaimer: Harvard's original model is long gone
or this column would be more pious. But the university has not expressed a view
on Internet transparency.
All contents copyright 1995-2002 Network
World, Inc. http://www.nwfusion.com