On 071216 at 01:50, Nelson Bolyard wrote:
> Steffen Schulz wrote, On 2007-12-12 10:34:
> > On 071209 at 03:55, Nelson Bolyard wrote:
> >> If FF doesn't have any built-in UI for SRP, I think I have a harder time
> >> justifying the inclusion of SRP in NSS.  I think it's a feature that
> >> would be included exclusively for use in the browser, so if the browser
> >> can't use it "out of the box", there may be push back on it.
> > SRP is a great protocol also for authentication against your email
> > provider or WLAN[1] access point. It adds KCM through the user password,
> > an entity that needs to be managed anyway. 
> 
> That last sentence seems to depend on the assumption that passwords (and
> more generally, shared secrets) are unavoidable, necessary, and
> desirable.  I don't share that view. 

No, me neither. The assumption is that pw-based logins will continue
to stay around quite for some time. Distribution of (useful)
certificates or tokens seems to be very difficult in many environments.
The (probably many) reasons for this don't seem to be all that clear
and difficult to address.

Maybe the breakthrough will come tommorrow morning, maybe next week.  I
think we should invest a little effort to tighten what we have to use
every day.

> But even with SRP, shared secret systems continue to have many major
> drawbacks (e.g. users tend to re-use the same password for many
> servers, or tend to write them down and/or store them insecurely.)

Jep.

> > It's not only protecting your password but also strengthens
> > authentication in the face of the common PKI dilemma.
> 
> The common PKI dilemma?

I'm not very keen on discussing that stuff...what I think of as 'the'
pki dilemma are the consequences of the tradeoff that is done by
delegating trust relations. The introduced trust delegation concept
makes the problem of distributing identity information manageable.  But
its still a hard problem except for closed environments *and* most
people really don't understand why and when to trust Verisign to
athenticate Amazon. I'd have a hard time myself to explain to my mum
why one should trust verisign more than the person at the airport that
I ask to look after my luggage. 'Because it would ruin their business'
is pretty incomplete.

That issue is actually not all of what I meant above, although the
other stuff could be regarded as consequences:

- people don't understand trust delegation to unknown parties(Verisign?)
- most phishing sites don't even use SSL. People haven't even startet
  to attack SSL(maybe because it's secure)
- most of the time, protocol failures are not due to attacks: its easy
  to do things wrong + we're still stuck with the distribution problem
- It fails badly(of course I want to continue, why'd you think I
  clicked that link?! How would I know if it's secure before starting
  the transmission?)

> > That said, I agree that web-authentication is the major use case
> > for TLS-SRP in NSS.
> Let me make my original point in another way.  It was a suggestion
> that you should either (a) contribute code to the browser so that it
> will have the UI necessary to make use of TLS-SRP, or (b) work with
> the browser developers to get them to agree to develop that code.

I found previous attempts in bugzilla to do something in this area.
I'll see if I can reach someone over there..

> > [1] Actually a huge problem, think of PEAP, LEAP, EAP-TLS,
> > EAP-TTLS, the Cisco-crap etc. All failed attemps to provide secure
> > pw-auth in a not-so-secure PKI environment.
> I would have said: All attempts to keep shared secret authentication
> alive in the presence of protocols that don't need it.

And hopefully, with usb-tokens and smartcard readers getting cheaper,
the day will come where such solutions have sufficient software support
to be usable. I don't think we're there yet, it's a lot of work to
deploy tokens at home and it's easy to make mistakes. I've seen the
needed functionality in software suites from security vendors,
expensive products that are targeted at other companies, not end users.



regards,
/steffen
-- 
Bildet Olsenbanden!
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to