08-17-2005 02:49 PM
08-18-2005 11:05 AM
Very Interesting Mike!
I don't really see this as a security concern however. There are many layers available to tighten up before even exposing the lookout process authentication. Additionally, I believe the lookout.sec file would need to be made available to the remote client to properly authenticate in the first place. Also, you can enable object specific security if needed.
Nice to know for sure!!
Ed
08-18-2005 11:17 AM
08-18-2005 11:46 AM
Point taken, and I'm not suggesting it shouldn't be corrected by NI.
You can lock down the local machines to prevent running anything like that, and of course you should have some physical security in place to prevent installation of root kits etc. If you can't trust the people with physical access to the machine, and you don't have other measures in place to prevent corruption, you have bigger problems than lookout only using the first 8 characters!!
Cheers,
Ed
08-18-2005 12:20 PM - edited 08-18-2005 12:20 PM
Message Edited by Mike@DTSI on 08-18-2005 12:23 PM
08-18-2005 02:38 PM
Thank you Mike, for reporting this issue along with the steps to reproduce. After following your outline, I was able to observe this for myself firsthand. I have already submitted this (just this afternoon) to our Lookout R&D team in order to address the problem.
Regards,
Jeff M.
Applications Engineering, National Instruments
08-18-2005 03:04 PM
08-18-2005 04:07 PM
			
    
	
		
		
		08-18-2005
	
		
		11:32 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 - last edited on 
    
	
		
		
		12-12-2024
	
		
		08:49 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 by 
				
		
		
			Content Cleaner
		
		
		
		
		
		
		
		
	
			
		
08-19-2005 09:55 AM
Mike,
Thank you for your feedback regarding Lookout security. I understand your concerns with password checking beyond 8 characters. Lookout passwords are not designed to be the only line of defense against intrusion. As erblock mentioned there are many other layers available to increase system security.The lookout.sec file should be protected against remote intrusion by enabling appropriate Windows permissions on that file. Make sure unauthorized users cannot access the User Account Manager or copy over the lookout.sec file with their own version of the file. Do this by making sure Lookout is the only application in the Windows startup folder, and selecting "User cannot switch to another program" in the Lookout System Options. You must install the NT keyboard driver filter to enable this option in Windows NT. This prevents an operator from toggling out of the Lookout and modifying lookout.sec or deleting process related security files of the form "processname.lka". This also prevents users from running other applications, such as brute force cracking tools, on the same machine. In cases where security is of extremely high concern the PC can be placed in a locked cabinet or room with only the keyboard and mouse accessible through a small window.
I don’t mean to trivialize your concerns about system security. Ensuring that our customers are able to adequately secure their systems is always a consideration in our product development process.
One of the greatest benefits of Lookout 6 is, as Khalid mentioned, is the Citadel 5 database. Lookout 6.0 also offers improved driver compatibility support, including improvements to the Modbus and Modbus Slave driver objects. The Lookout user interface was also updated to simplify the development process.
Regards,
Nick Folse