Steffen Schulz wrote, On 2007-12-12 10:34:
> On 071209 at 03:55, Nelson Bolyard wrote:
>> If FF doesn't have any built-in UI for SRP, I think I have a harder time
>> justifying the inclusion of SRP in NSS.  I think it's a feature that
>> would be included exclusively for use in the browser, so if the browser
>> can't use it "out of the box", there may be push back on it.
> 
> SRP is a great protocol also for authentication against your email
> provider or WLAN[1] access point. It adds KCM through the user password,
> an entity that needs to be managed anyway. 

That last sentence seems to depend on the assumption that passwords (and
more generally, shared secrets) are unavoidable, necessary, and
desirable.  I don't share that view.  I'll agree that SRP is an
improvement over most other protocols for shared-secret based
authentication, and that if the application REQUIRES shared secret
authentication, it's a good way to go.  But even with SRP, shared secret
systems continue to have many major drawbacks (e.g. users
tend to re-use the same password for many servers, or tend to write them
down and/or store them insecurely.)

> It's not only protecting your password but also strengthens
> authentication in the face of the common PKI dilemma.

The common PKI dilemma?

> That said, I agree that web-authentication is the major use case for
> TLS-SRP in NSS.

Let me make my original point in another way.  It was a suggestion that
you should either (a) contribute code to the browser so that it will
have the UI necessary to make use of TLS-SRP, or (b) work with the
browser developers to get them to agree to develop that code.

NSS generally only includes features that are wanted and used by at
least one of the major products that use NSS.  NSS shared libraries
don't include many features that aren't used by any of those products.
(The exception to this rule are old features that have fallen into
disuse, such as the old "export" cipher suites, and SSL2, but those were
widely used when they were added.)

Most major new contributions of code to NSS in the past, such as the ECC
code in NSS 3.11 or the Camellia code for NSS 3.12, or the DHE code (a
few years back) have been accompanied by patches to extend the browser
UI as necessary to enable these new features to be used in the browser.
In other cases, the browser UI development was done by the
Mozilla core UI developers themselves.

For SRP, the issue is that presently there doesn't appear to be any
mozilla product (or other major NSS-based product) that is asking for
TLS-SRP support.  So, unless the UI code is contributed along with SRP,
the new TLS-SRP code will be an orphan, a feature in NSS that none of
NSS's major users use. That could (and I think would) prove to be an
impediment to including TLS-SRP in NSS.

It would be fine if a representative of an NSS-based product spoke up
and said "Yeah, we'd really like to have SRP, and would do the work to
support it in our product if it was added to NSS."  But I haven't read
anything like that yet.

> [1] Actually a huge problem, think of PEAP, LEAP, EAP-TLS, EAP-TTLS,
>     the Cisco-crap etc. All failed attemps to provide secure pw-auth
>     in a not-so-secure PKI environment.

I would have said: All attempts to keep shared secret authentication
alive in the presence of protocols that don't need it.

/Nelson

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to