[security] Gathering requirements for in-browser OpenID support
Chris Drake
christopher at pobox.com
Tue Oct 31 16:59:31 UTC 2006
Hi Joaquin,
Browsers cannot do asymmetric cryptography out of the context of the
site you're visiting, so I think "us doubters" might have a valid
point - unless you want to explain how a "stupid user" sitting in
front of IE7 can use EKE?
If EKE *can* prevent phishers from stealing passwords, how do you
explain that no site anyone has ever heard of is doing this today?
I maintain my position: MitM is not a protocol problem - it's a
"stupid user" problem.
Kind Regards,
Chris Drake
Wednesday, November 1, 2006, 2:14:33 AM, you wrote:
JM> It may help those doubters if we now briefly explain how EKEaccomplishes a) and b).
>> For the benefit of me andothers reading this thread, can you briefly
>> explain how you would deploy EKE in a browser to defeat MitM?
JM> By ensuring that the man in the middle:
JM> a) Ends up not in the possession of any authenticationcredentials
JM> b) Can neither understand nor usefully modify the conversation they areproxying.
JM> I'm sure everyone understands how an authenticated public
JM> keyaccomplishes a) and b), so there is no need to read on.
JM> Cordially, Joaquin
JM> a) The authentication credentials are encrypted with public
JM> keys, so thatonly the intended recipient can decrypt* them.
JM> b) The conversation is encrypted with public keys, or with a
JM> session keyexchanged using public keys, so that only the intended
JM> recipient canunderstand* and only the sender can modify*.
JM> * yeah, yeah: easily, soon enough to matter.
More information about the security
mailing list