Re: [perpass] Stopping packet injection: the network is attacking us (was re Password Sniffing)
Phillip Hallam-Baker <hallam@gmail.com> Tue, 12 November 2013 18:41 UTC
Return-Path: <hallam@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C116111E810B for <perpass@ietfa.amsl.com>; Tue, 12 Nov 2013 10:41:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.498
X-Spam-Level:
X-Spam-Status: No, score=-2.498 tagged_above=-999 required=5 tests=[AWL=0.101, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 49mk6pgFycEG for <perpass@ietfa.amsl.com>; Tue, 12 Nov 2013 10:41:55 -0800 (PST)
Received: from mail-lb0-x22a.google.com (mail-lb0-x22a.google.com [IPv6:2a00:1450:4010:c04::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 6B70A21F9FAB for <perpass@ietf.org>; Tue, 12 Nov 2013 10:41:54 -0800 (PST)
Received: by mail-lb0-f170.google.com with SMTP id z5so1394947lbh.15 for <perpass@ietf.org>; Tue, 12 Nov 2013 10:41:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=oGW8fdbXM87KbYvDdNqqUqJsXoBlVRe2V4S3GZ88QWE=; b=gcIqqZbiUmETAupoO3ZogR9mM1dXq4+h1BB94D93HjKjMSQ/ylczqYiQnxxwR9J5YM VN0zUZCUJZndMNBdfC/pggahNmdNybEQ/I5KGyYGN4sy6ib8vRCnKFYU/FL8QAbu2BRJ zQpH+6KXkHJe/48Ddzs6zyRMHDoGM9BE5L6JEIZnrIsHHsHUuWvL4H52tWS4GO36ur9w RQZxlfysoekTdO9ZH0dSqO/ckUCcnPRG0TLmuV3Kg4IgOKiHA/0uR4FK/ZLZMu3gTQZk z7SAoZF8ZdTbgb4unnF+7oC0zbrocRKPCWH0nmboT1ch1KrGgrphbGI9cWMYPqeAG5Rc 3/rw==
MIME-Version: 1.0
X-Received: by 10.152.116.7 with SMTP id js7mr28361459lab.11.1384281713391; Tue, 12 Nov 2013 10:41:53 -0800 (PST)
Received: by 10.112.46.98 with HTTP; Tue, 12 Nov 2013 10:41:53 -0800 (PST)
In-Reply-To: <33CCA400-9D1A-4A1E-A50D-84E4EE1960EB@icsi.berkeley.edu>
References: <CAMm+Lwh1QPgYzd8Y2DRKsLE7LDq3a5k=T0KCs+9xKxZyptRe2w@mail.gmail.com> <33CCA400-9D1A-4A1E-A50D-84E4EE1960EB@icsi.berkeley.edu>
Date: Tue, 12 Nov 2013 10:41:53 -0800
Message-ID: <CAMm+Lwh2CcPRh33E9JvXpqKGXyARvxf0RfAVg-x1xskYPni9bA@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Nicholas Weaver <nweaver@icsi.berkeley.edu>
Content-Type: multipart/alternative; boundary="001a11c2672acbbe8d04eaff331d"
Cc: perpass <perpass@ietf.org>
Subject: Re: [perpass] Stopping packet injection: the network is attacking us (was re Password Sniffing)
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Nov 2013 18:41:55 -0000
On Tue, Nov 12, 2013 at 8:37 AM, Nicholas Weaver <nweaver@icsi.berkeley.edu>wrote: > > On Nov 12, 2013, at 8:05 AM, Phillip Hallam-Baker <hallam@gmail.com> > wrote: > > > The biggest weakness in Internet protocols is relying on passwords for > authentication. What can we do to make the password mechanisms more secure > and to wean the Internet off passwords? > > > > I don't want to start an NSA rathole here, but I need evidence to > support the above assertion and until the GRU or MOSSAD or PLA or whatever > have their Snowden event, I am limited to using the NSA. > > > > 1) NSA using Password sniffing in Attack: > http://boingboing.net/2013/11/11/gchq-used-fake-slashdot-linke.html > > Thats false. They didn't use password sniffing in this attack. And > overall reporting on that was pretty dismal. > > This was targeting information for a QUANTUMINSERT attack [1], aka packet > injection/Man-on-the-Side for exploitation. And there was no fake slashdot > page, just fake packets. I wish they were just password sniffing. > The cookie stealing attack is easier to prevent: https://datatracker.ietf.org/doc/draft-hallambaker-httpsession/ Basically the protocol is as follows: 1) Client tells server 'I accept strong cookies' 2) Server sends an algorithm and shared secret in the HTTP channel 3) Client presents the usual cookie plus a MAC value calculated over some of the request and the shared secret exchanged earlier. 4) Server authenticates response in the same way. The mechanism can be optionally bound to the TLS channel and the request content. The initial exchange is preferably protected by TLS but this is not essential. The main objective is to avoid repeated transfer of a bearer credential. If plaintext exchange is going to be frequent, a DH exchange should be available as an option. -- Website: http://hallambaker.com/
- [perpass] Stopping password sniffing Phillip Hallam-Baker
- Re: [perpass] Stopping password sniffing Watson Ladd
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Tim Bray
- [perpass] Stopping packet injection: the network … Nicholas Weaver
- Re: [perpass] Stopping password sniffing Robin Wilton
- Re: [perpass] Stopping packet injection: the netw… Robin Wilton
- Re: [perpass] Stopping packet injection: the netw… Nicholas Weaver
- Re: [perpass] Stopping password sniffing Bjoern Hoehrmann
- Re: [perpass] Stopping packet injection: the netw… Tim Bray
- Re: [perpass] Stopping password sniffing Robin Wilton
- Re: [perpass] Stopping password sniffing Joe St Sauver
- Re: [perpass] Stopping password sniffing Phillip Hallam-Baker
- Re: [perpass] Stopping packet injection: the netw… Phillip Hallam-Baker
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Ben Laurie
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing Ben Laurie
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing Phillip Hallam-Baker
- Re: [perpass] Stopping password sniffing Stephane Bortzmeyer
- Re: [perpass] Stopping password sniffing Leo Vegoda
- Re: [perpass] Stopping password sniffing Tim Bray
- Re: [perpass] Stopping password sniffing Stephane Bortzmeyer
- Re: [perpass] Stopping password sniffing Phillip Hallam-Baker
- Re: [perpass] Stopping password sniffing Joe St Sauver
- Re: [perpass] Stopping password sniffing Paul Ferguson
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Learmonth, Iain Ross
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing ned+perpass
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing John Levine
- Re: [perpass] Stopping password sniffing Christian Huitema
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing Christian Huitema
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing Ted Lemon
- Re: [perpass] Stopping password sniffing Christian Huitema
- Re: [perpass] Stopping password sniffing Stephen Farrell