Re: [perpass] Stopping password sniffing -- FIDO

=JeffH <Jeff.Hodges@KingsMountain.com> Thu, 14 November 2013 19:43 UTC

Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A2BA21E8126 for <perpass@ietfa.amsl.com>; Thu, 14 Nov 2013 11:43:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.627
X-Spam-Level:
X-Spam-Status: No, score=-101.627 tagged_above=-999 required=5 tests=[AWL=0.638, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZQVo+lkEX+oY for <perpass@ietfa.amsl.com>; Thu, 14 Nov 2013 11:43:43 -0800 (PST)
Received: from oproxy13-pub.mail.unifiedlayer.com (oproxy13-pub.mail.unifiedlayer.com [69.89.16.30]) by ietfa.amsl.com (Postfix) with SMTP id 7DDB721E8130 for <perpass@ietf.org>; Thu, 14 Nov 2013 11:43:38 -0800 (PST)
Received: (qmail 15611 invoked by uid 0); 14 Nov 2013 19:43:11 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy13.mail.unifiedlayer.com with SMTP; 14 Nov 2013 19:43:11 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=7Y4jKNZFmVfhsAAePbPiGASEVow9p5HrrpVhFTPP5zQ=; b=HqA1B1373er4v58bSxf4GpV3J6ihRhaTqm8+4mfaUAO8h6+fofB3uyUg2ZGHg9bj4fnpfExsRLW5kXjEsbrsQHFEUl3t6IOHrzAaraoGhEyROF5IJ+YWE8AeSht/4C2G;
Received: from [24.4.122.173] (port=58153 helo=[192.168.11.15]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.82) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1Vh2op-0002BW-M5 for perpass@ietf.org; Thu, 14 Nov 2013 12:43:11 -0700
Message-ID: <528527CE.4090102@KingsMountain.com>
Date: Thu, 14 Nov 2013 11:43:10 -0800
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130330 Thunderbird/17.0.5
MIME-Version: 1.0
To: perpass <perpass@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [perpass] Stopping password sniffing -- FIDO
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Nov 2013 19:43:48 -0000

 > In terms of minimizing password pain/insecurity, you should check out the
 > work of the Fido Alliance, which seems very promising to me.  They are
 > trying to cook up a protocol to describe the use of various 2-factor
 > hardware such as smart cards, USB keys, number dongles, biometrics, and so
 > on, so that you can use that stuff without getting tied to a particular
 > vendor/implementation. Yubikey has some very slick demos.

Here's some further context...

RSA Europe 2013 "Scalable Authentication"
<http://www.rsaconference.com/events/eu13/agenda/sessions/555/scalable-authentication>


see also..

http://fidoalliance.org/


HTH,

=JeffH