[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Security Issues (was JSTOR) Pt. 2.
- To: <liblicense-l@lists.yale.edu>
- Subject: RE: Security Issues (was JSTOR) Pt. 2.
- From: "Morgan, James J" <morganj@iupui.edu>
- Date: Sun, 15 Dec 2002 11:26:07 EST
- Reply-To: liblicense-l@lists.yale.edu
- Sender: owner-liblicense-l@lists.yale.edu
Actually there are a couple of easy ways to extend access to IP-authenticated resources to remote users, such as alumni groups, or in our case physican faculty in off-campus hospital locations. If you want to provide access to a limited set of ip-restricted resources, Ezproxy works fine. If you want to provide complete access to campus resources, various providers offer VPN solutions. Jim Morgan Indiana University School of Medicine -----Original Message----- From: John Durno [mailto:jdurno@ola.bc.ca] Sent: Fri 12/13/2002 9:23 AM To: liblicense-l@lists.yale.edu Subject: Re: Security Issues (was JSTOR) Pt. 2. Ann Okerson writes: >The ori ginal question is this: if we know that IP authentication has=20 >this particular problem, then when should we continue to use it, and=20 >when/how should we be either abandoning it or trying to improve it?=20 ... We are probably stuck with IP address authentication for the next few years, but we should at least be thinking about what will replace it. As mentioned earlier, IP address authentication has one distinct advantage: it communicates nothing about the user except that they have access to a particular network. In such an environment it is very difficult to determine which individual users are accessing what content. Not impossible, but generally more trouble than it would be worth. However, the main reason why IP authentication has become the baseline for providing access to research databases is that it is very simple to implement. The client network doesn't have to configure their network at all, they just have to supply some numbers to the remote host. On the server side, there is obviously a certain amount of recordkeeping involved, but basically, nothing is simpler than checking the IP address of an incoming request against a bunch of IPs stored in a database. However, IP authentication is a pretty blunt instrument. As noted earlier in the discussion, it isn't very secure: it's open to spoofing, and one misconfigured proxy server anywhere on any subscriber's network can = create a significant breach. One other problem that hasn't been mentioned yet, but which might be an issue for some institutions: what if you want to give network access to a group of people who aren't covered by your database licence agreements, for example alumni? There probably are workarounds for this, such as reserving a pool of your IP addresses for the purpose, but this can be difficult to implement depending on your network architecture. So what might replace IP authentication? It's too early to say, but there are a number of possibilities. Certainly the problem of user authentication extends way beyond library users accessing research databases. Microsoft, the Sun-led Liberty Alliance, and AOL are all developing solutions to the problem, although many pundits are concerned that their solutions will make a disturbing amount of personal data available to commercial interests. But if one of these solutions becomes widely accepted as a defacto standard in the world of commerce, there will probably be some pressure for libraries to adopt it as well. One initiative that sounds quite promising is Shibboleth ( http://shibboleth.internet2.edu/index.html ), described on their web site as "an open source implementation to support inter-institutional sharing of web resources subject to access controls." It retains the main advantage of IP authentication, in that Shibboleth makes it possible to maintain the privacy of the user by restricting the amount of personal information communicated between client and server, while at the same time providing finer-grained control if required. It would definitely address the problems with IP authentication that have been discussed here. The downside is that Shibboleth is not as easy to implement as IP authentication in that it will require significant configuration on both the client and the server side. But then, nothing will be as easy to implement as basic IP address authentication. John Durno Email: jdurno@ola.bc.ca
- Prev by Date: RE: Message from Kevin Guthrie, JSTOR's President
- Next by Date: Re: Security Issues (was JSTOR) Pt. 2.
- Prev by thread: Re: Security Issues (was JSTOR) Pt. 2.
- Next by thread: Re: Security Issues (was JSTOR) Pt. 2.
- Index(es):