Re: [dix] Agenda bashing

"Ben Laurie" <benl@google.com> Thu, 06 July 2006 12:11 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FyShh-0005zw-RT; Thu, 06 Jul 2006 08:11:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FyShf-0005qj-Kt for dix@ietf.org; Thu, 06 Jul 2006 08:11:31 -0400
Received: from smtp-out.google.com ([216.239.33.17]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyShe-0001Nm-6q for dix@ietf.org; Thu, 06 Jul 2006 08:11:31 -0400
Received: from brian.corp.google.com (brian.corp.google.com [172.24.0.122]) by smtp-out.google.com with ESMTP id k66CBMAt028074 for <dix@ietf.org>; Thu, 6 Jul 2006 13:11:23 +0100
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=received:message-id:date:from:to:subject:in-reply-to: mime-version:content-type:content-transfer-encoding: content-disposition:references; b=OB6N61vY7paFjdXmlIuwygDb5uJCg97wM2jkNMiguaiVZHvfa8o+QOs1j9V4biELj VpJ0jdCS+l17muxAkIIUA==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33]) by brian.corp.google.com with ESMTP id k66C8EsH018177 for <dix@ietf.org>; Thu, 6 Jul 2006 05:11:21 -0700
Received: by smtp-out2.google.com with SMTP id 33so576195fpx for <dix@ietf.org>; Thu, 06 Jul 2006 05:11:21 -0700 (PDT)
Received: by 10.253.1.18 with SMTP id 18mr1496651fpa; Thu, 06 Jul 2006 05:11:21 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Thu, 6 Jul 2006 05:11:21 -0700 (PDT)
Message-ID: <1b587cab0607060511l2a96a136vaebc5c116c6e02cb@mail.google.com>
Date: Thu, 06 Jul 2006 13:11:21 +0100
From: Ben Laurie <benl@google.com>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
In-Reply-To: <44ACA9CF.7090605@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <20060703172550.A182A222425@laser.networkresonance.com> <44A973DC.9040801@cisco.com> <86zmfqa0au.fsf@raman.networkresonance.com> <8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com> <44ACA9CF.7090605@cisco.com>
X-Spam-Score: -4.3 (----)
X-Scan-Signature: e1e48a527f609d1be2bc8d8a70eb76cb
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>, <mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>, <mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/6/06, Eliot Lear <lear@cisco.com> wrote:
> thayes0993@aol.com wrote:
> > I believe that PwdHash does rely on a certain level of proof of the
> > server's identity.  The browser needs to decide that
> > the domain name that the server is presenting actually belongs to it.
> > This is usually done by relying on SSL/TLS.
> > If the false server can convince the browser that it is in fact the
> > targeted domain, then the browser will happily
> > transmit the full credential (H(password, domain)) to the server.
> >
> > PwdHash does NOT require that the proved domain match anything the
> > user has in mind.  That is, the identity
> > does not need to be presented to the user, or compared against
> > anything the user is doing. This seems to be the
> > primary problem in phishing attacks (the last foot).  That's where the
> > real advantage of techniques like PwdHash are.
>
> Pretty neat.  There are two problems that still really need to be
> addressed.  The first is that you need to manage a transition.  It must
> be clearly visible to the user when PwdHash is used and when it is not.
> Otherwise someone just phishes the original password and that's the ball
> game.
>
> Second, PwdHash still relies on the underlying security of the user's
> computer.  I don't know about you but that is a goal I would like to
> address.  I want a means to have a secure opaque channel of
> communication between the server and the smart card.  That's what I'm
> looking for from the IETF.

This seems like a worthy goal, but one that is perhaps orthogonal to
other means of authenticating users. Certainly I'd be violently
opposed to requiring users to have smartcards.

>
> Eliot
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix