Review of draft-hartman-webauth-phishing-05

Christian Vogt <christian.vogt@nomadiclab.com> Wed, 22 August 2007 15:31 UTC

Return-path: <ietf-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1INsAu-0005GS-F8; Wed, 22 Aug 2007 11:31:16 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1INsAs-0005GM-Ez for ietf@ietf.org; Wed, 22 Aug 2007 11:31:14 -0400
Received: from n2.nomadiclab.com ([193.234.219.2]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1INsAr-0004Eu-Nw for ietf@ietf.org; Wed, 22 Aug 2007 11:31:14 -0400
Received: from n2.nomadiclab.com (localhost [127.0.0.1]) by n2.nomadiclab.com (Postfix) with ESMTP id 99F58212D28; Wed, 22 Aug 2007 18:31:11 +0300 (EEST)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by n2.nomadiclab.com (Postfix) with ESMTP id 347DC212D27; Wed, 22 Aug 2007 18:31:11 +0300 (EEST)
Message-ID: <46CC56BF.2070701@nomadiclab.com>
Date: Wed, 22 Aug 2007 18:31:11 +0300
From: Christian Vogt <christian.vogt@nomadiclab.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.0.12) Gecko/20070604 Thunderbird/1.5.0.12 Mnenhy/0.7.5.0
MIME-Version: 1.0
To: hartmans-ietf@mit.edu
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: ClamAV using ClamSMTP
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 1a1bf7677bfe77d8af1ebe0e91045c5b
Cc: ietf@ietf.org
Subject: Review of draft-hartman-webauth-phishing-05
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Errors-To: ietf-bounces@ietf.org

Sam,

I reviewed your document on "Requirements for Web Authentication Resistant to
Phishing".  I think the document is very useful.  Here are some comments:

The document provides guidance on designing secure authentication mechanisms
for Web services.  The goal is to replace HTML-form- and password-based
mechanisms that are commonly used today.  The document is a valuable step
forward in the combat against phishing.  However, below are a few issues that
Sam might want to address before this documents becomes RFC.

Section 3.1 (Capabilities of Attackers):

The 1st paragraph lists mechanisms by which an attacker can trick a victim user
into accepting a spoofed Web site.  One of them is "on-path network attacks".  I
am unsure what is meant by this.  It could refer to attacks on DNS, but those
attacks are listed separately.  It could also refer to MiTM attacks on TLS
connection establishment, but it is assumed that certificates are available.  In
consequence, I would assume that it refers to the process of obtaining a
certificate.  But this is unclear and should be clarified.

Section 3.1 (Capabilities of Attackers):

The 2nd paragraph of section 3.1 describes which components of a UI an attacker
might be able to forge.  The text differentiates between components that are
based on special knowledge about the user (such as an account balance or
transaction history), and components that do not require such knowledge (such as
a loginpage).  What I am missing here is some thoughts on how far forgery of the
latter type of component could enable forgery of the former type.

Reusing the examples in parentheses, an attacker might be able to trick a victim
user into providing a password via a spoofed login page, and then retrieve the
user's current account balance and transaction history from the legitimate site
in order to subsequently print it on another spoofed page.

Section 4.3 (No Password Equivalents):

The terms "strong/weak password equivalence" seem to be used differently in this
document than in [draft-iab-auth-mech], which is uses as a reference in this
document.  In [draft-iab-auth-mech], the terms are used to describe a dependency
between login credentials for different systems, while in this document, they
are used for the data exchanged between an authenticator and an authenticatee.

Section 8 (Security Considerations):

Paragraph 5 mixes two issues:

  (i)  Web sites using both the proposed authentication mechanism and
       a legacy, HTML-based mechanism for backwards compatibility

  (ii) users who take the same password for Web sites with the proposed
       authentication mechanism and Web sites with a legacy
       authentication mechanism

These two issues are orthogonal and should be separated.

While the document suggests a solution for issue (ii) -- which calls for users
not to use the same password for different Web sites --, there is no suggested
solution for issue (i).  One possible solution could be provide a mechanism by
which users can disable access through legacy authentication mechanisms.
Re-enabling access for legacy authentication mechanisms could be accomplished
only through the proposed authentication mechanism.  Maybe Sam wants
to add this to his draft...

Editorial:

- General

    Abbreviation "UI" is never spelled out.  I'd recommend spelling
    it out everywhere.

- Abstract

    s/providers and users and for /providers and users, and/

    s/These requirements may serve/These requirements may also serve/ ?

- Section 4.1

    s/Passwords and OTher Methods/Passwords and Other Methods/

    s/do not have smart cards/do not have smart card readers/

    s/access to other resources may/access to other resources--may/

- Section 4.2

    s/security community has/security community has done/

- Section 4.3

    s/No Password EquivelentsN/o Password Equivalents/

- Section 4.6

    s/the the/the/

Best regards,
- Christian




_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf