On 2010/10/28 03:12 PDT, Jean-Marc Desperrier wrote: > Nelson B Bolyard wrote: >> [...] It because none of them: J-PAKE, SPEKE, SRP, or for that >> matter, good old CRAM-MD5 address the NUMBER ONE problem with passwords. > > >> PHISHING. > > They are a very significant progress with regard to that actually. > >> What do JPAKE, SPEKE and SRP claim to give you that CRAM-MD5 does not? > > ZERO-KNOWLEDGE
That's resistance to something other than phishing. That's dealing with an untrustworthy peer, with whom you WANT to trust, to the point that you do give that party an authenticator of some sort. That's NOT the big problem. > The server can not attack by brute-force the content of the exchange to > deduce what you password is. Right, so the attacker just asks you for it, very convincingly. > Now, that's not it : What they truly bring is that if you are misled > into making an handshake with a phishing site, you don't give to that > site any information about what your password might be. Sorry, untrue. The attacker puts up a password dialog. You type your password into it. You give away your password. Maybe YOU (JMD) don't, but then, you (JMD) aren't the typical phishing victim. You have a good idea what to look out for. The phishing victim does not, and so enters his password anywhere that asks, because he cannot (or will not) distinguish between the places where he should and those where he shouldn't. > If you are tricked into making the handshake with the wrong site, > there's no bad consequence. Right. That attack is not to get you to HANDSHAKE with the wrong site. It's to get you to connect to the wrong site that ASKS YOU TO ENTER YOUR PASSWORD. > So the risk is to be tricked into entering your password inside a field > that doesn't do a handshake, but instead just sends copy of it to the > pirate. Right. > Therefore password exchange solution that relies on you entering the > password inside a standard web page are still strongly vulnerable to the > phishing problem, and there's no progress over older password schemes. Right. > But if the password is entered inside an element that is unambiguously > the GUI of your browser, web site can not do a phishing attack against > it any more, and the solution is actually quite good. ... ASSUMING that the user is bright enough to understand the difference between chrome and non-chrome, and which one is trustworthy ... but years of experience have shown us that most users are not. For years, and to this very day, web sites put lock icons in the pages to try to convince the users that the page is secure. My own bank does it! MOST users still have no clue about trust of chrome vs trust of web page content. Not a clue. I had a bank account "executive" sit in front of a browser once, and "instruct" me in how to use the browser to do on-line banking. I sat through his presentation (despite having been a user of online banking for over a decade by then) to see how well HE understood it. He informed me that he was specially trained by his bank to train customers in how to lower their risk of being swindled. The FIRST THING he told me was to look for the lock icon in the web page content to be sure I was looking at a "secure page", before typing in my bank password. I asked him what was the difference between that lock icon and the one down in the corner of the window, against the background that matched the window border (he was using MSIE). He had never noticed that lower icon before, and had no idea what it meant. So much for his special training. No, passwords simply have NO PLACE in protecting the average user from phishing. And it doesn't matter whether the password is used to derive a session encryption key, or just as an authentication token. The user is just as vulnerable either way. A password user's best protection against attack is simply appearing to be a low-value target. There are so many of them waiting to be attacked that the trick is to appear to be less worth attacking than one of the millions of others. > Therefore the actual gap in security between the two is : > - A : An attaquer that find a way to create a windows that tricks users > to believe it's the genuine Firefox GUI for the password, without having > to use chrome privilege. No need to convince the user that it's "genuine Firefox GUI" because the user has no idea what the significance of that is. Any ordinary web page with a password field in the page content will suffice. > - B : An attaquer that uses the usual weaknesses of passwords to get > access without phishing the user. Those usual weaknesses being that > passwords are frequently very weak, but the worst I believe is that > users frequently reuse them. So the attacker could obtain the value of > the password of the user at another site, and use it to guess accurately > what he's using at the protected site. Yup. That's another reason why you don't want the user to be able to use a secret that he can carry in his head, because he will invariably choose a dictionary word. Here's a fun fact. DO you know any zealous Christians? If so, odds are VERY HIGH that they use a password that is some combination of "love" and "God" (e.g. LoveGod or GodisLove) for their passwords. I know this because Christian people who I help frequently tell me this, and they think they've all cleverly come up with something that no-one else will ever guess! > Hardware protected private keys have a much more significant added value > than software ones when compared to those schemes. Unfortunately they > are still very little used. Except in China, surprisingly (Banks there > have distributed millions of PKI hardware token to identify on their web > sites) Yeah, the Russian banks all do this, too. Why can't the bankers in the free world have as much of a clue about network security as those in Eastern Europe and Asia? There seems to be a group of people who have accepted the notion that passwords MUST be the solution. They spend a huge amount of time, coming up with one new scheme after another that has some "provable" resistance to some attack, but not against the easiest and most successful attack: ASK the user for his password. They're living in denial. They just delay the day when REAL solutions finally get deployed. If Mozilla wants to join that pack, ... Sigh. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto