Nelson B Bolyard wrote:
[...]  It because none of them: J-PAKE, SPEKE, SRP, or for that
matter, good old CRAM-MD5 address the NUMBER ONE problem with passwords.
>
                                PHISHING.

They are a very significant progress with regard to that actually.

What do JPAKE, SPEKE and SRP claim to give you that CRAM-MD5 does not?

                               ZERO-KNOWLEDGE

The server can not attack by brute-force the content of the exchange to deduce what you password is.

The answer is: they don't require that you share your secret password
directly with the party who you would have authenticate you, [...]

Now, that's not it : What they truly bring is that if you are misled into making an handshake with a phishing site, you don't give to that site any information about what your password might be.

Even if you have a weak password that it is trivial to brute-force.

[...]
The ONLY solutions that actually solve phishing are the ones that the user
CANNOT be tricked into giving away.

If you are tricked into making the handshake with the wrong site, there's no bad consequence.

So the risk is to be tricked into entering your password inside a field that doesn't do a handshake, but instead just sends copy of it to the pirate.

Therefore password exchange solution that relies on you entering the password inside a standard web page are still strongly vulnerable to the phishing problem, and there's no progress over older password schemes.

But if the password is entered inside an element that is unambiguously the GUI of your browser, web site can not do a phishing attack against it any more, and the solution is actually quite good.

A very important point : The easiest way to mimick the GUI of your browser is to be able to execute code locally (or at least with Chrome privileges in the browser). But if you are able to do that, you're also able to mimick the password dialog for software protected private key, and then make the XPCOM calls required to export the private key.

Therefore the actual gap in security between the two is :
- A : An attaquer that find a way to create a windows that tricks users to believe it's the genuine Firefox GUI for the password, without having to use chrome privilege. - B : An attaquer that uses the usual weaknesses of passwords to get access without phishing the user. Those usual weaknesses being that passwords are frequently very weak, but the worst I believe is that users frequently reuse them. So the attacker could obtain the value of the password of the user at another site, and use it to guess accurately what he's using at the protected site.

Hardware protected private keys have a much more significant added value than software ones when compared to those schemes. Unfortunately they are still very little used. Except in China, surprisingly (Banks there have distributed millions of PKI hardware token to identify on their web sites)
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to