From dix-bounces@ietf.org Sun Jul 02 00:28:40 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FwtZV-0008OH-1G; Sun, 02 Jul 2006 00:28:37 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FwtZT-0008OC-N8
	for dix@ietf.org; Sun, 02 Jul 2006 00:28:35 -0400
Received: from copa.geek.net.au ([203.217.18.13] helo=srve.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FwtZS-0006Aj-Nt
	for dix@ietf.org; Sun, 02 Jul 2006 00:28:35 -0400
Received: from BLANK (203-217-18-9.perm.iinet.net.au [203.217.18.9])
	by srve.com (8.13.6/8.12.11) with ESMTP id k624SKI0024125
	(version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO);
	Sun, 2 Jul 2006 04:28:22 GMT
Date: Sun, 2 Jul 2006 14:28:25 +1000
From: Chris Drake  <christopher@pobox.com>
X-Priority: 3 (Normal)
Message-ID: <35099585.20060702142825@pobox.com>
To: public-usable-authentication@w3.org
In-Reply-To: <tslac7x6x98.fsf@cz.mit.edu>
References: <tslac7x6x98.fsf@cz.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
X-Spam-Score: 1.2 (+)
X-Scan-Signature: 0e9ebc0cbd700a87c0637ad0e2c91610
Cc: dix@ietf.org, ietf-http-auth@lists.osafoundation.org,
	idworkshop@googlegroups.com
Subject: [dix] Comprehensive list - known Threat and Protection table
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Hi All,

Has anyone attempted to document the threats and/or what protection
we're trying to provide to users ?

If so - please point me - if not - please add-to or amend my list:

########################################
###  Authentication Threat List 1.0  ###
########################################

1. Confidence Tricks

   1.1. phishing emails
    1.1.1. to lure victims to spoof sites
    1.1.2. to lure victims into installing malicious code
    1.1.3. to lure victims towards O/S vulnerabilities to inject
           malicious code
    1.1.4. to lure victims into revealing information directly via
           reply or via embedded FORMS within the email

   1.2. telephone phishing
    1.2.1. to directly extract auth info
    1.2.2. to direct victim to spoof site
    
   1.3. person-to-person phishing / situation engineering
    1.3.1. to directly extract auth info (ask)
    1.3.2. to direct victim to spoof site
    1.3.3. shoulder surfing (aka 4.5.2)
    1.3.4. physical attack - see 4.7

   1.4. typographic attacks
    1.4.1. spoofing (eg: paypa1.com - using a number 1 for a little L)
    1.4.2. direct download of malicious code
    1.4.3. browser exploit injection

   1.5. online phishing
    1.5.1. pop-up/pop-behind windows to spoof sites
    1.5.2. floating <DIV> or similar elements (eg: emulating an entire
           browser UI)


2. Remote Technical Tricks

   2.1. spoof techniques
    2.1.1. vanilla fake look-alike spoof web sites
    2.1.2. CGI proxied look-alike web site (server CGI talks to real
           site in real time - "man in the middle attack")
    2.1.3. popup windows hiding the address bar (3.4.1/3.4.2)
    2.1.4. <DIV> simulated browsers (1.5.2)

   2.2. iframe exploits (eg: 1.5.1/1.1.3) (spammers buy iframes to
        launch 1.5 and 1.4 attacks)
   2.3. p2p filesharing publication of products modified to
        remove/limit protection - PGP, IE7, Mozilla, ...
   2.4. DNS poisoning (causes correct URL to go to spoof server)
   2.5. traffic sniffing (eg: at ISP, telco, WiFi, LAN, phone tap...)
   2.6. proxy poisoning (correct URL returns incorrect HTML)
   2.7. browser exploits (correct URL returns incorrect HTML)
   2.8. targeted proxy attack
    2.8.1. directs to vanilla spoof web site (2.1.1)
    2.8.2. uses CGI re-writing to proxy legitimate site (eg: convert
           HTTPS into HTTP to activate traffic sniffing) (2.1.2)
    2.8.3  activates 5.7
   2.9.  Authorized exploitation - see 3.5.


3. Local Technical Tricks

   3.2. Software vulnerabilities (aka exploits - eg - 1.1.3)
    3.1.1. Known
    3.1.2. Unknown

   3.2. Browser "toolbars" (grant unrestricted DOM access to SSL data)
   
   3.3. Trojans
    3.3.1. Standalone modified/hacked legitimate products (eg: PGP or
           a MSIE7) with inbuilt protection removed/modified.
    3.3.2. Bogus products (eg: the anti-spyware tools manufactured by
           the Russian spam gangs)
    3.3.3. Legitimate products with deliberate secret functionality
           (eg: warez keygens, sony/CD-Rom music piracy-block addins)
    3.3.4. Backdoors (activate remote control and 3.4.1/3.4.2)

   3.4. Viruses
    3.4.1. General - keyloggers, mouse/screen snapshotters
    3.4.2. Targeted - specifically designed for certain victim sites
           (eg paypal/net banking) or certain victim actions (eg:
           password entry, detecting typed credit card numbers)

   3.5. Authorized exploitation (authority (eg: Microsoft WPA/GA,
        Police, ISP, MSS, FBI, CIA, MI5, Feds...) engineer a Trojan or
        Viral exploit to be shipped down the wire to local PC,
        potentially being legitimately signed/authenticated software.)
   
   3.6. Visual tricks
    3.6.1. browser address bar spoofing
    3.6.2. address bar hiding

   3.7. Hardware attacks
    3.7.1. keylogger devices
    3.7.2. TEMPEST
    3.7.3. malicious hardware modification (token mods, token
           substitution, auth device substitution/emulation/etc)

   3.8. Carnivore, DCS1000, Altivore, NetMap, Echelon, Magic Lantern,
        RIPA, SORM...

4. Victim Mistakes

   4.1. writing down passwords
   4.2. telling people passwords
    4.2.1. deliberately (eg: friends/family)
    4.2.2. under duress (see 4.7)
   4.3. picking weak passwords
   4.4. using same passwords in more than one place
   4.5. inattentiveness when entering passwords
    4.5.1. not checking "https" and padlock and URL
    4.5.2. not preventing shoulder surfing
   4.6. permitting accounts to be "borrowed"
   4.7. physical attack (getting mugged)
    4.7.1. to steal auth info
    4.7.2. to acquire active session
    4.7.3. to force victim to take action (eg: xfer money)
   4.8. allowing weak lost-password "questions"/procedures

   
5. Implementation Oversights

   5.1. back button
   5.2. lost password procedures
   5.3. confidence tricks against site (as opposed to user)
   5.4. insecure cookies (non-SSL session usage)
   5.5. identity theft? site trusts user's lies about identity
   5.6. trusting form data
   5.7. accepting auth info over NON-SSL (eg: forgetting to check
        $ENV{HTTPS} is 'on' when performing CGI password checks)
   5.8. allowing weak lost-password "questions"/procedures
   5.9. replay
   5.10. robot exclusion (eg: block mass password guessing)
   5.11. geographical exclusion (eg: block logins from Korea)
   6.12. user re-identification - eg - "We've never seen you using
         Mozilla before"
   6.13. site-to-user authentication
   6.14. allowing users to "remember" auth info in browser (permits
         local attacks by unauthorised users)
   6.15. blocking users from being allowed to "remember" auth info in
         browser (facilitates spoofing / keyloggers)
   6.16. using cookies (may permit local attacks by unauthorised
         users)
   6.17. not using cookies (blocks site from identifying malicious
         activity or closing co-compromised accounts)

   
6. Denial of Service attacks

   6.1. deliberate failed logins to lock victim out of account
   6.2. deliberate failed logins to acquire out-of-channel subsequent
        access (eg: password resets)

        
7. Please contribute to this document!

   7.1. on-list - just reply
   7.2. off-list - send to christopher@pobox.com
   

Contributors:  Chris Drake
v.1.0 - July 2, 2006
#########################################
###  /Authentication Threat List 1.0  ###
#########################################

Kind Regards,
Chris Drake


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 01:02:22 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxGZf-00041x-O7; Mon, 03 Jul 2006 01:02:19 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxGZe-00041s-SP
	for dix@ietf.org; Mon, 03 Jul 2006 01:02:18 -0400
Received: from 216-43-25-66.ip.mcleodusa.net ([216.43.25.66]
	helo=episteme-software.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxGZc-0004ch-IH
	for dix@ietf.org; Mon, 03 Jul 2006 01:02:18 -0400
Received: from [12.105.228.215] (127.0.0.1) by episteme-software.com with
	ESMTP (EIMS X 3.3d22) for <dix@ietf.org>; Mon, 3 Jul 2006 00:02:13 -0500
Mime-Version: 1.0
X-Sender: resnick@resnick1.qualcomm.com
Message-Id: <p07000c11c0cb0029cc83@[12.105.228.215]>
X-Mailer: Eudora [Macintosh version 7.0a12]
Date: Mon, 3 Jul 2006 00:02:11 -0500
To: dix@ietf.org
From: Pete Resnick <presnick@qualcomm.com>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 3e15cc4fdc61d7bce84032741d11c8e5
Subject: [dix] Agenda bashing
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

So, from the conversation so far, these are the 
architectural/protocol issues I think need discussing at the BOF:

- Discussion of the scope and number of the mechanisms. There seem to 
be desires for (1) the ability for the user to identify to the server 
(probably authenticating, preventing phishing as much as possible), 
(2) the ability to transfer user attributes to the server, (3) the 
ability to store user attributes remotely, and (4) the ability for a 
3rd-party to warrant user attribute claims.

- Discussion of the pros and cons of mechanisms that involve changes 
to the user agent versus mechanisms which rely on a separate identity 
server to do all of the work without changing the user agent (e.g., 
DIX).

- Discussion of the types of authentication mechanisms to be used. 
(I read Ben as saying it should be a general mechanism not tied to 
HTTP, Eliot and Terry as saying that the underlying mechanism should 
be common but that there should be HTTP-specific protocol, and John 
as having no interest in solving that particular problem. :-) )

I don't think these discussions need to be spurred by presentations. 
Most of this is going to be a high-level discussion and should 
definitely not reference any particular mechanism. (If logistics 
permit, I'd like to do a "pass the mic" format instead of standing in 
a queue at the mics, and I will do floor control.) With that in mind, 
here's what I have in mind for a meeting agenda:

(Pre-meeting: Find minutes and jabber people - volunteers NOW would 
be useful!!)
- Start passing blue sheets, Agenda bash - 2 minutes
- What problems are we trying to solve? - 1 hour
    - Discuss what sort of authentication/identification from user to 
server is desired
       - Anti-phishing discussion here
    - Discuss what sort of attribute info from user to server is desired
    - Discuss whether remote storage of attributes is desired
    - Discuss whether 3rd-party claims are desired
- What sorts of mechanisms should we use? - 1 hour
    - Discuss downsides of using current web auth mechanisms (i.e., 
user-agent changes)
    - Discuss downsides of using mechanisms that include no user-agent changes
    - Discuss authentication mechanism in light of above discussions
- What work items do we have? - 28 minutes
    - Enumerate work items
    - Enumerate documents (if different than above)
    - Enumerate editors
- End

I have posted this for the agenda web page, but we can always make changes.

pr
-- 
Pete Resnick <http://www.qualcomm.com/~presnick/>
QUALCOMM Incorporated - Direct phone: (858)651-4478, Fax: (858)651-1102

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 03:27:30 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxIq7-0000Et-5V; Mon, 03 Jul 2006 03:27:27 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxIq5-0000Eo-TD
	for dix@ietf.org; Mon, 03 Jul 2006 03:27:25 -0400
Received: from sj-iport-6.cisco.com ([171.71.176.117])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxIq4-0006nf-KP
	for dix@ietf.org; Mon, 03 Jul 2006 03:27:25 -0400
Received: from sj-dkim-4.cisco.com ([171.71.179.196])
	by sj-iport-6.cisco.com with ESMTP; 03 Jul 2006 00:27:24 -0700
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254])
	by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id k637ROto025550
	for <dix@ietf.org>; Mon, 3 Jul 2006 00:27:24 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id k637RNke014122
	for <dix@ietf.org>; Mon, 3 Jul 2006 00:27:23 -0700 (PDT)
Received: from [212.254.247.4] (ams3-vpn-dhcp411.cisco.com [10.61.65.155])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k637M0cT032666
	for <dix@ietf.org>; Mon, 3 Jul 2006 00:22:01 -0700
Message-ID: <44A8C6D8.9010901@cisco.com>
Date: Mon, 03 Jul 2006 09:27:20 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
References: <p07000c11c0cb0029cc83@[12.105.228.215]>
In-Reply-To: <p07000c11c0cb0029cc83@[12.105.228.215]>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-4.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=1550; t=1151911644; x=1152775644;
	c=relaxed/simple; s=sjdkim4001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=cC/Z12RSjXVfOoWzeGUAtZfrr1niWLeb2z7VWmBtRK6wicQkmprUXSHN81qIpUvWuV5+Sy6p
	jOUuW12AJIOth2CJlYR+iQ5WQlOV9icwLcfC4ntBpmVAWQQ/COxmieow;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Pete,
> So, from the conversation so far, these are the architectural/protocol
> issues I think need discussing at the BOF:
>
> - Discussion of the scope and number of the mechanisms. There seem to
> be desires for (1) the ability for the user to identify to the server
> (probably authenticating, preventing phishing as much as possible),
> (2) the ability to transfer user attributes to the server, (3) the
> ability to store user attributes remotely, and (4) the ability for a
> 3rd-party to warrant user attribute claims.

On point (1) in order to fix phishing it is the server that must
properly authenticate to the user (e.g., other way round).

>
>
> - Discussion of the pros and cons of mechanisms that involve changes
> to the user agent versus mechanisms which rely on a separate identity
> server to do all of the work without changing the user agent (e.g., DIX).
>
> - Discussion of the types of authentication mechanisms to be used. (I
> read Ben as saying it should be a general mechanism not tied to HTTP,
> Eliot and Terry as saying that the underlying mechanism should be
> common but that there should be HTTP-specific protocol, and John as
> having no interest in solving that particular problem. :-) )
The focus needs to be on commonality.  We want to avoid having to do
this for each and every protocol separately.  Using something like SASL
would be ideal.

I will not be present in Montreal, but I am very interested in the
problem space, and may propose solutions in the coming months.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 09:22:44 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxONt-0007uP-6K; Mon, 03 Jul 2006 09:22:41 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxONs-0007tw-8j
	for dix@ietf.org; Mon, 03 Jul 2006 09:22:40 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxONq-0002Ha-QM
	for dix@ietf.org; Mon, 03 Jul 2006 09:22:40 -0400
Received: from lois.corp.google.com (lois.corp.google.com [172.24.0.50])
	by smtp-out.google.com with ESMTP id k63DMOV5014758
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:22:29 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=qGoWlF7ehU6v2ysrHM5cg+viZprmEKTEcNXSOz47UV+X3Zg/bBACppXSKctrj26Tu
	s0Ty5bmaN04dxVqN7cOrQ==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by lois.corp.google.com with ESMTP id k63DLpfu019633
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:22:13 -0700
Received: by smtp-out2.google.com with SMTP id 33so431396fpx
	for <dix@ietf.org>; Mon, 03 Jul 2006 06:22:07 -0700 (PDT)
Received: by 10.253.15.18 with SMTP id 18mr454277fpo;
	Mon, 03 Jul 2006 06:22:07 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Mon, 3 Jul 2006 06:22:07 -0700 (PDT)
Message-ID: <1b587cab0607030622s1c9dbad5v5a0ede75454f09e@mail.google.com>
Date: Mon, 3 Jul 2006 14:22:07 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] Updated phishing requirements draft
In-Reply-To: <tslac7x6x98.fsf@cz.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <tslac7x6x98.fsf@cz.mit.edu>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: dff86644adfd94a4a79427a3accd2986
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 6/28/06, Sam Hartman <hartmans-ietf@mit.edu> wrote:
>
>
> Hi.  I submitted a 01 version of my phishing requirements draft Sunday
> evening, but it has not yet popped out the other side so I'm including
> it below.
>
> I've tried to improve it based on review comments.  I did not get a
> chance to address everything; I was focusing on some obvious issues of
> clarity and on refining my thoughts so that the draft reflects my
> current understanding of the area.  I do thank all those who sent
> comments both on the list and privately.  I also thank those who were
> willing to walk through the requirements with me and help me confirm
> that the requirements are sufficient for what I'm trying to achieve.
>
>
>
>
>
>
> Network Working Group                                         S. Hartman
> Internet-Draft                                                       MIT
> Expires: December 27, 2006                                 June 25, 2006
>
>
>        Requirements for Web Authentication Resistant to Phishing
>                  draft-hartman-webauth-phishing-01.txt
>
> Status of this Memo
>
>    By submitting this Internet-Draft, each author represents that any
>    applicable patent or other IPR claims of which he or she is aware
>    have been or will be disclosed, and any of which he or she becomes
>    aware will be disclosed, in accordance with Section 6 of BCP 79.
>
>    Internet-Drafts are working documents of the Internet Engineering
>    Task Force (IETF), its areas, and its working groups.  Note that
>    other groups may also distribute working documents as Internet-
>    Drafts.
>
>    Internet-Drafts are draft documents valid for a maximum of six months
>    and may be updated, replaced, or obsoleted by other documents at any
>    time.  It is inappropriate to use Internet-Drafts as reference
>    material or to cite them other than as "work in progress."
>
>    The list of current Internet-Drafts can be accessed at
>    http://www.ietf.org/ietf/1id-abstracts.txt.
>
>    The list of Internet-Draft Shadow Directories can be accessed at
>    http://www.ietf.org/shadow.html.
>
>    This Internet-Draft will expire on December 27, 2006.
>
> Copyright Notice
>
>    Copyright (C) The Internet Society (2006).
>
> Abstract
>
>    This memo proposes requirements for protocols between web identity
>    providers and users and for requirements for protocols between
>    identity providers and relying parties.  These requirements minimize
>    the likelihood that criminals will be able to gain the credentials
>    necessary to impersonate a user or be able to fraudulently convince
>    users to disclose personal information.  To meet these requirements
>    browsers must change.  Websites must never receive information such
>    as passwords that can be used to impersonate the user to third
>    parties.  Browsers should perform mutual authentication and flag
>
>
>
> Hartman                 Expires December 27, 2006               [Page 1]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    situations when the target website is not authorized to accept the
>    identity being offered as this is a strong indication of fraud.
>
>
> Table of Contents
>
>    1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
>    2.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  5
>    3.  Threat Model . . . . . . . . . . . . . . . . . . . . . . . . .  6
>      3.1.  Capabilities of Attackers  . . . . . . . . . . . . . . . .  6
>      3.2.  Attacks of Interest  . . . . . . . . . . . . . . . . . . .  7
>    4.  Requirements for Preventing Phishing . . . . . . . . . . . . .  8
>      4.1.  Support for Passwords  . . . . . . . . . . . . . . . . . .  8
>      4.2.  Trusted UI . . . . . . . . . . . . . . . . . . . . . . . .  8
>      4.3.  No Password Equivelents  . . . . . . . . . . . . . . . . .  9
>      4.4.  Mutual Authentication  . . . . . . . . . . . . . . . . . .  9
>      4.5.  Authentication Tied to Resulting Page  . . . . . . . . . . 10
>      4.6.  Restricted Identity Providers  . . . . . . . . . . . . . . 11
>      4.7.  Protecting Enrollment  . . . . . . . . . . . . . . . . . . 11
>    5.  Is it the right Server?  . . . . . . . . . . . . . . . . . . . 13
>    6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 14
>    7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
>      7.1.  Normative References . . . . . . . . . . . . . . . . . . . 16
>      7.2.  Informative References . . . . . . . . . . . . . . . . . . 16
>    Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 17
>    Intellectual Property and Copyright Statements . . . . . . . . . . 18
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006               [Page 2]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 1.  Introduction
>
>    Typically, web sites ask users to send a user name and password in
>    order to log in and authenticate their identity to the website.  The
>    user name and plaintext password is often sent over a TLS [RFC4346]
>    encrypted connection.  As a result of this, the server learns the
>    password and can pretend to be the user to any other system where the
>    user has used the same password.  The security of passwords over TLS
>    depends on making sure that the password is sent to the right,
>    trusted server.  TLS implementations typically confirm that the name
>    entered by the user in the URL corresponds to the certificate as
>    described in [RFC2818].
>
>    One serious security threat on the web today is phishing.  Phishing
>    is a form of fraud where an attacker convinces a user to provide
>    confidential information to the attacker believing they are providing
>    the information to a party they trust with that information.  For
>    example, an email claiming to be from a user's bank may direct the
>    user to go to a website and verify account information.  The attacker
>    captures the user name and password and potentially other sensitive
>    information.  Domain names that look like target websites, links in
>    email, and many other factors contribute to phishers' ability to
>    convince users to trust them.
>
>    It is useful to distinguish two targets of phishing.  Sometimes
>    phishing is targeting web authentication credentials such as user
>    name and password.  Sometimes phishing is targeting other
>    confidential information.  This memo presents requirements that
>    significantly reduce the effectiveness of the first category of
>    phishing: these requirements guarantee that even if the user
>    authenticates to the wrong server, that server cannot impersonate the
>    user to a third party.  However to combat phishing targeted at other
>    confidential information the best we can do is try to help the user
>    detect fraud before they release confidential information.
>
>    So, the approach taken by these requirements is to handle these two
>    types of phishing differently.  Users are given some trusted
>    mechanism to determine whether they are typing their password into a
>    secure browser component that will authenticate them to the web
>    server or whether they are typing their password into a legacy
>    mechanism that will send their password to the server.  If the user
>    types a password into the trusted browser component, they have strong
>    assurances that their password has not been disclosed and that the
>    page returned from the web server was generated by a party that
>    either knows their password or who is authenticated by an identity
>    provider who knows their password.  The web server can then use
>    confidential information known to the user and web server to enhance
>    the user's trust in its identity beyond what is available given the
>
>
>
> Hartman                 Expires December 27, 2006               [Page 3]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    social engineering attacks against TLS server authentication.  If a
>    user enters their password into the wrong server but discovers this
>    before they give that server any other confidential information, then
>    there exposure is very limited.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006               [Page 4]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 2.  Requirements notation
>
>    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
>    "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
>    document are to be interpreted as described in [RFC2119].
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006               [Page 5]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 3.  Threat Model
>
>    This section describes the assumed capabilities of phishers,
>    describes assumptions about web security and describes what
>    vulnerabilities exist.
>
>    We assume that the browser and operating system are secure and can be
>    trusted by the end user.  There are many attacks against browsers and
>    operating systems.  However without this assumption we cannot make
>    progress in securing web authentication.  So we will assume that
>    browsers and operating systems are secure and note that other work to
>    improve the security of browsers and operating systems is critical to
>    the security of the entire web authentication system.
>
>    We assume that users have limited motivation to combat phishing.
>    Users cannot be expected to read the source of web pages, understand
>    how DNS works well enough to look out for spoofed domains, or
>    understand URI encoding.  Users do not typically understand
>    certificates and cannot make informed decisions about whether the
>    subject name in a certificate corresponds to the entity they are
>    attempting to communicate with.
>
> 3.1.  Capabilities of Attackers
>
>    Attackers can convince the user to go to a website of their choosing.
>    Since the attacker controls the web site and since the user chose to
>    go to the website the TLS certificate will verify and the website
>    will appear to be secure.  The certificate will typically not be
>    issued to the entity the user thinks they are communicating with, but
>    as discussed above, the user will not notice this.
>
>    The attacker can convincingly replicate any part of the UI of the
>    website being spoofed.  The attacker can also spoof trust markers
>    such as the security lock, URL bar and other parts of the browser UI.
>    There is one limitation to the attacker's ability to replicate UI.
>    The attacker cannot replicate a UI that depends on information the
>    attacker does not know.  For example, an attacker could generally
>    replicate the UI of a banking site's login page.  However the
>    attacker probably could not replicate the account summary page until
>    the attacker learned the user name and password.
>
>    The attacker can convince the user to do anything with the phishing
>    site that they would do with the real target site.  As a consequence,
>    if we want to avoid the user giving the attacker their password, we
>    must transition to a solution where the user would not give the real
>    target site their password.  Instead they will need to
>    cryptographically prove that they know their password without
>    revealing it.
>
>
>
> Hartman                 Expires December 27, 2006               [Page 6]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 3.2.  Attacks of Interest
>
>    The primary attack of interest is an attack in which the user sends
>    confidential information to an unintended recipient.

This contradicts the introduction, which says you are only interested
in authentication credentials.

>    Another significant attack is an attack in which a recipient gains
>    sufficient credentials to impersonate the user to other recipients.
>    The obvious version of this attack is when the recipient learns the
>    password of the user.  However even giving the recipient a time-
>    limited token that can be used to impersonate the user would be an
>    instance of this attack.  Note that some authentication systems such
>    as Kerberos [RFC4120] provide a facility to delegate the ability to
>    act as the user to the target of the authentication.  Such a facility
>    when used with an inappropriately trusted target would be an instance
>    of this attack.
>
>    Of less serious concerns at the present time are attacks on data
>    integrity where a phisher provides false or misleading information to
>    a user.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006               [Page 7]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 4.  Requirements for Preventing Phishing
>
>    This section describes requirements for web authentication solutions.
>    These solutions are intended to prevent phishing targeted at
>    obtaining web authentication credentials.  These requirements will
>    make it more difficult for phishers to target other confidential
>    information.
>
>    The requirements discussed here are similar to the principles
>    outlined in "Limits to Anti-Phishing" [ANTIPHISHING].  Most of this
>    work was discovered independently but work from that paper has been
>    integrated where appropriate.  Google's perspective on phishing is
>    very interesting because of their operational experience.
>
> 4.1.  Support for Passwords
>
>    The web authentication solution MUST support passwords and MUST be
>    secure even when passwords are commonly used.

It seems to me you are presupposing the solution to your real
requirement, which is that the user must be able to walk up to any
machine and use it to log in. It is not obvious to me that this means
it must support passwords (at least not to more than one site, say the
one where I've stored all my credentials).

>  In many environments,
>    users need the ability to walk up to a computer they have never used
>    before and log in to a website.  Carrying a smart card or USB token
>    significantly increases the deployment cost of the website and
>    decreases user convenience.  The smart card is costly to deploy
>    because it requires a process for replacing smart cards, requires
>    support staff to be trained in answering questions regarding smart
>    cards and requires a smart card to be issued when an identity is
>    issued.  Smart cards are less convenient because users cannot gain
>    access to protected resources without having their card physically
>    with them.  Many public access computers do not have smart cards
>    available and do not provide access to USB ports; when they do they
>    tend not to support smart cards.  It is important not to
>    underestimate the training costs (either in money or user
>    frustration) of teaching people used to remembering a user name and
>    password about a new security technology.
>
>    IT is desirable that a solution support other forms of authentication
>    such as smart cards and one-time passwords as these are useful in
>    some environments.
>
> 4.2.  Trusted UI
>
>    Users need the ability to trust components of the UI in order to know
>    that the UI is being presented by a trusted component of the browser.
>    The primary concern is to make sure that the user knows the password
>    is being given to trusted software rather than being filled into an
>    HTML form element that will be sent to the server.
>
>    There are three basic approaches to establishing a trusted UI.  The
>    first is to use a dynamic UI based on a secret known by the UI; the
>
>
>
> Hartman                 Expires December 27, 2006               [Page 8]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    Google paper [ANTIPHISHING] recommends this approach.  A second
>    approach is to provide a UI action that highlights trusted or non-
>    trusted components in some way.  This could work similarly to the
>    Expose feature in Apple's OS X where a keystroke visually
>    distinguishes structural elements of the UI.  Of course such a
>    mechanism would only be useful if users actually used it.  Finally,
>    the multi-level security community has extensive research in
>    designing UIs to display classified, compartmentalized information.
>    It is critical that these UIs be able to label information and that
>    these labels not be spoofable.
>
>    See Section 5 for another case where confidential information in a UI
>    can be used to build trust.
>
> 4.3.  No Password Equivelents
>
>    A critical requirement is that when a user authenticates to a
>    website, the website MUST NOT receive a strong password equivalent
>    [IABAUTH].  A strong password equivalent is anything that would allow
>    a phisher to authenticate as a user with a different identity
>    provider.  Weak password equivalents MAY only be sent when a new
>    identity is being enrolled or a password is changed.  A weak password
>    equivalent allows a party to authenticate to a given identity
>    provider as the user.

Again, you are presupposing the necessity of passwords. Surely this
should be "no authentication credential equivalents".

>    There are two implications of this requirement.  First, strong
>    cryptographic authentication protocol needs to be used instead of
>    sending the password encrypted over TLS.  The zero-knowledge class of
>    password protocols such as those discussed in section 8 of the IAB
>    authentication mechanisms document [IABAUTH] seem potentially useful
>    in this case.  Note that mechanisms in this space tend to have
>    significant deployment problems because of intellectual property
>    issues.
>
>    The second implication of this requirement is that if an
>    authentication token is presented to a website, the website MUST NOT
>    be able to modify the token to authenticate as the user to a third
>    party.  The party generating the token must cryptographically bind it
>    to either the website that will receive the token or to a key known
>    only to the user.

Once more you are presupposing the solution. One-time passwords work
find for this purpose but are not (necessarily) cryptographically
bound to anything.

> If tokens are bound to keys, the user MUST prove
>    knowledge of this key as part of the authentication process.  The key
>    MUST not be disclosed to the server unless the token is bound to the
>    server and the key is only used with that token.
>
> 4.4.  Mutual Authentication
>
>    The Google paper [ANTIPHISHING] describes a requirement for mutual
>    authentication.  A common phishing practice is to accept a user name
>
>
>
> Hartman                 Expires December 27, 2006               [Page 9]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    and password as part of an attempt to make the phishing site
>    authentic.  The real target is some other confidential information.
>    The user name and password are captured, but are not verified.  After
>    the user name and password are entered, the phishing site collects
>    other confidential information.
>
>    Authentication of the server at the TLS level and authentication of
>    the client within the TLS session is not sufficient.  AS discussed
>    previously the attacker can direct the user to a site that the
>    attacker controls so the TLS authentication will succeed.  So an
>    authentication solution for phishing MUST detect the situation where
>    the server ignores or does not participate in the authentication.

This doesn't follow - the situation you have described is one where
the server _does_ participate in authentication. The problem is that
they are not the server the user thinks they are,.

>  If
>    authentication is based on a shared secret such as a password, then
>    the authentication protocol MUST prove that the secret or a suitable
>    verifier is known by both parties.  Interestingly the existence of a
>    shared secret will provide better protection that the right server is
>    being contacted than if public key credentials are used.  By their
>    nature, public key credentials allow parties to be contacted without
>    a prior security association.

However if the public keys _are_ associated with the server, then they
do provide an assurance (not, of course, that this is current
practice, generally).

>  In protecting against phishing
>    targeted at obtaining other confidential information, this may prove
>    a liability.  However public key credentials provide strong
>    protection against phishing targeted at obtaining authentication
>    credentials because they are not vulnerable to dictionary attacks.
>    Such dictionary attacks are a significant weakness of shared secrets
>    such as passwords intended to be remembered by humans.  For public
>    key protocols, this requirement would mean that the server typically
>    needs to sign an assertion of what identity it authenticated.
>
> 4.5.  Authentication Tied to Resulting Page
>
>    Users expect that whatever party they authenticate to will be the
>    party that generates the content they see.  One possible phishing
>    attack is to insert the phisher between the user and the real site as
>    a man-in-the-middle.  On today's websites, the phisher typically
>    gains the user's user name and password.  Even if the other
>    requirements of this specification are met, the phisher could gain
>    access to the user's session on the target site.  This attack is of
>    particular concern to the banking industry.  A man-in-the-middle may
>    gain access to the session which may give the phisher confidential
>    information or the ability to execute transactions on the user's
>    behalf.
>
>    The authentication system MUST guarantee to the user and the target
>    server that the response is generated by the target server and will
>    only be seen by parties authorized by either the target server or the
>    user.

The requirement, surely, is that the response is not _useful_ to
eavesdroppers, rather than not seen. There are plenty of protcols that
can be run totally in the clear that leave nothing useful for an
observer (e.g. Diffie-Hellman key agreement).

>  This can be done in several ways:
>
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 10]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    1.  Assuming that only certificates from trusted CAs are accepted and
>        the user has not bypassed certificate validation, it is
>        sufficient to confirm that the identity of the server at the TLS
>        level is the same at the HTTP authentication level.  In the case
>        of TLS client authentication this is trivially true.
>
>    2.  Another alternative is to bind the authentication exchange to the
>        channel created by the TLS session.  The general concept behind
>        channel binding is discussed in section 2.2.2 of [BTNS].  This
>        paragraph needs to be expanded to point to proposals for doing
>        channel binding with TLS. xxx
>
>    3.  Redirect based schemes in which the identity provider is told
>        what site to return the user to meets this requirement provided
>        again that certificate validation is done at the TLS layer.

And, presumably, many, many others.

>
> 4.6.  Restricted Identity Providers
>
>    Some identity providers will allow anyone to accept their identity.
>    However particularly for financial institutions and large service
>    providers it will be common that only authorized business partners
>    will be able to accept the identity.  The confirmation that the the
>    relying party is such a business partner will often be a significant
>    part of the value provided by the identity provider, so it is
>    important that the protocol enable this.  For such identities, the
>    user MUST be assured that the target server is authorized by the
>    identity provider to accept identities from that identity provider.
>    Several mechanisms could be used to accomplish this:
>
>    1.  The target server can provide a certificate issued by the
>        identity provider as part of the authentication.
>
>    2.  The identity provider can explicitly approve the identity.  For
>        example in a redirect-based scheme the identity provider knows
>        the identity of the relying party before providing claims of
>        identity to that party.  A similar situation happens with
>        Kerberos.

A general criticism, but particularly apropos in this section: you
appear to have no concern for the privacy of the user. It should be
possible to authenticate without revealing to the identity provider
who you are authenticating to.

Incidentally, you've suddenly started talking about identity providers
without saying what they are.


>
> 4.7.  Protecting Enrollment
>
>    One area of particular vulnerability to phishing is enrollment of a
>    new identity in an identity provider.  Protecting against phishing
>    targeted at obtaining other confidential information as a new service
>    is established is outside the scope of this document.  If
>    confidential information such as credit card numbers are provided as
>    part of account setup, then this may be a target for phishing.
>
>    However there is one critical aspect in which enrollment impacts the
>
>
>
> Hartman                 Expires December 27, 2006              [Page 11]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    security of authentication.  During enrollment, a password is
>    typically established for an account at an identity provider.  The
>    process of establishing a password MUST NOT provide a strong password
>    equivalent to the identity provider.  That is, the identity provider
>    MUST NOT gain enough information to impersonate the user to a third
>    party while establishing a password.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 12]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 5.  Is it the right Server?
>
>    In Section 4, requirements were presented for web authentication
>    solutions to minimize the risk of phishing targeted at web access
>    information.  This section discusses in a non-normative manner
>    various mechanisms for determining that the right server has been
>    contacted.  Authenticating to the right party is an important part of
>    reducing the risk of phishing targeted at other confidential
>    information.
>
>    Validation of the certificates used in TLS and verification that the
>    name in the URI maps to these certificates can be useful.  As
>    discussed in Section 3, attackers can spoof the name in the URI.
>    However the TLS checks do defeat some attacks.  Also, as discussed in
>    Section 4.5, TLS validation may be important to higher-level checks.
>
>    A variety of initiatives propose to assign trust to servers.  This
>    includes proposals to allow users to indicate certain servers are
>    trusted based on information they enter.  Also, proposals to allow
>    third parties including parties established for this purpose and
>    existing certificate authorities to indicate trust have been made.
>    These proposals will almost certainly make phishing more difficult.
>
>    In the case where there is an existing relationship, these
>    requirements provide a way that information about the relationship
>    can be used to provide assurance that the right party has been
>    contacted.
>
>    In Section 4.2, we discuss how a secret between the user and their
>    local computer can be used to let the user know when a password will
>    be handled securely.  A similar mechanism can be used to help the
>    user once they are authenticated to the website.  The website can
>    present information based on a secret shared between the user and
>    website to convince the user that they have authenticated to the
>    correct site.  This depends critically on the requirements of
>    Section 4.5 to guarantee that the phisher cannot obtain the secret.
>    It is tempting to use this form of trusted UI before authentication.
>    For example, a website could request a user name and then display
>    information based on a secret for that user before accepting a
>    password.  The problem with this approach is that phishers can obtain
>    this information, because it can be obtained without knowing the
>    password.  However if the secret is displayed after authentication
>    then phishers could not obtain the secret.  This is one of the many
>    reasons why it is important to prevent phishing targeted at
>    authentication credentials.
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 13]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 6.  Security Considerations
>
>    This memo discusses the security of web authentication and how to
>    minimize the risk of phishing in web authentication systems.  This
>    section discusses the security of the overall system and discusses
>    how components of the system that are not directly within the scope
>    of this document affect the security of web transactions.  This
>    section also discusses residual risks that remain even when the
>    requirements proposed here are implemented.
>
>    The approach taken here is to separate the problem of phishing into
>    phishing targeted at web authentication credentials and phishing
>    targeted at other information.  Users are given some trusted
>    mechanism to determine whether they are typing their password into a
>    secure browser component that will authenticate them to the web
>    server or whether they are typing their password into a legacy
>    mechanism that will send their password to the server.  If the user
>    types a password into the trusted browser component, they have strong
>    assurances that their password has not been disclosed and that the
>    page returned from the web server was generated by a party that
>    either knows their password or who is authenticated by an identity
>    provider who knows their password.  The web server can then use
>    confidential information known to the user and web server to enhance
>    the user's trust in its identity beyond what is available given the
>    social engineering attacks against TLS server authentication.  If a
>    user enters their password into the wrong server but discovers this
>    before they give that server any other confidential information, then
>    there exposure is very limited.
>
>    This model assumes that the browser and operating system are a
>    trusted component.  As discussed in Section 3, there are numerous
>    attacks against host security.  Appropriate steps should be taken to
>    minimize these risks.  If the host security is compromised, the
>    password can be captured as it is typed by the user.
>
>    This model assumes that users will only enter their passwords into
>    trusted browser components.  There are several potential problems
>    with this assumption.  First, users need to understand the UI
>    distinction and know what it looks like when they are typing into a
>    trusted component and what a legacy HTML form looks like.  Users must
>    care enough about the security of their passwords to only type them
>    into trusted components.  The browser must be designed in such a way
>    that the server cannot create a UI component that appears to be a
>    trusted component but is actually a legacy HTML form; Section 4.2
>    discusses this requirement.
>
>    IN addition, a significant risk that users will type their password
>    into legacy HTML forms comes from the incremental deployment of any
>
>
>
> Hartman                 Expires December 27, 2006              [Page 14]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
>    web authentication technology.  Websites will need a way to work with
>    older web browsers that do not yet support mechanisms that meet these
>    requirements.  Not all websites will immediately adopt these
>    mechanisms.  Users will sometimes browse from computers that have
>    mechanisms meeting these requirements and sometimes from older
>    browsers.  They only gain protection from phishing when they type
>    passwords into trusted components.  If a password is sometimes used
>    with websites that meet these requirements and sometimes with legacy
>    websites, and if the password is captured by a phisher targeting a
>    legacy website, then that captured password can be used even on
>    websites meeting these requirements.  Similarly, if a user is tricked
>    into using HTML forms when they should not, passwords can be exposed.
>    Users can significantly reduce this risk by using different passwords
>    for websites that use trusted browser authentication than for those
>    that still use HTML forms.
>
>    The risk of dictionary attack is always a significant concern for
>    password systems.  Users can (but typically do not) minimize this
>    risk by choosing long, hard to guess phrases for passwords.  The risk
>    can be removed once a password is already established by using a
>    zero-knowledge password protocol.

This just isn't true. An attacker can always assume the role of the
client and try to authenticate using their dictionary of passwords.
This works no matter what the authentication mechanism is. If the
attacker is the server then they can do this very efficiently (since
they do not have to do it over the network).

The only defence against dictionary attacks is to use a strong password.

>  However the risk of dictionary
>    attack is always present when setting up a new password or changing a
>    password.  Minimizing the number of services that use the same
>    password can minimize this risk.  When zero-knowledge password
>    protocols are used, being extra careful to make sure the right server
>    is used when establishing a password can significantly reduce this
>    risk.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 15]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> 7.  References
>
> 7.1.  Normative References
>
>    [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
>               Requirement Levels", BCP 14, RFC 2119, March 1997.
>
> 7.2.  Informative References
>
>    [ANTIPHISHING]
>               Nelson, J. and D. Jeske, "Limits to Anti Phishing",
>               January 2006.
>
>               Proceedings of the W3c Security and Usability Workshop; ht
>               tp://www.w3.org/2005/Security/usability-ws/papers/
>               37-google/'
>
>    [BTNS]     Touch, J., "Problem and Applicability Statement for Better
>               Than Nothing Security",
>               draft-ietf-btns-prob-and-applic-02.txt (work in progress),
>               February 2006.
>
>    [IABAUTH]  Rescorla, E., "A Survey of Authentication Mechanisms",
>               draft-iab-auth-mech-05.txt (work in progress),
>               February 2006.
>
>    [RFC2818]  Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000.
>
>    [RFC4120]  Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
>               Kerberos Network Authentication Service (V5)", RFC 4120,
>               July 2005.
>
>    [RFC4346]  Dierks, T. and E. Rescorla, "The Transport Layer Security
>               (TLS) Protocol Version 1.1", RFC 4346, April 2006.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 16]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> Author's Address
>
>    Sam Hartman
>    Massachusetts Institute of Technology
>
>    Email: hartmans-ietf@mit.edu
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 17]
>
> Internet-Draft          Web Phishing Requirements              June 2006
>
>
> Intellectual Property Statement
>
>    The IETF takes no position regarding the validity or scope of any
>    Intellectual Property Rights or other rights that might be claimed to
>    pertain to the implementation or use of the technology described in
>    this document or the extent to which any license under such rights
>    might or might not be available; nor does it represent that it has
>    made any independent effort to identify any such rights.  Information
>    on the procedures with respect to rights in RFC documents can be
>    found in BCP 78 and BCP 79.
>
>    Copies of IPR disclosures made to the IETF Secretariat and any
>    assurances of licenses to be made available, or the result of an
>    attempt made to obtain a general license or permission for the use of
>    such proprietary rights by implementers or users of this
>    specification can be obtained from the IETF on-line IPR repository at
>    http://www.ietf.org/ipr.
>
>    The IETF invites any interested party to bring to its attention any
>    copyrights, patents or patent applications, or other proprietary
>    rights that may cover technology that may be required to implement
>    this standard.  Please address the information to the IETF at
>    ietf-ipr@ietf.org.
>
>
> Disclaimer of Validity
>
>    This document and the information contained herein are provided on an
>    "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
>    OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
>    ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
>    INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
>    INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
>    WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
>
>
> Copyright Statement
>
>    Copyright (C) The Internet Society (2006).  This document is subject
>    to the rights, licenses and restrictions contained in BCP 78, and
>    except as set forth therein, the authors retain all their rights.
>
>
> Acknowledgment
>
>    Funding for the RFC Editor function is currently provided by the
>    Internet Society.
>
>
>
>
> Hartman                 Expires December 27, 2006              [Page 18]
>
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 09:42:04 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxOge-0003Jn-3u; Mon, 03 Jul 2006 09:42:04 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxOgd-0003H7-EN
	for dix@ietf.org; Mon, 03 Jul 2006 09:42:03 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxOgc-0003wm-1u
	for dix@ietf.org; Mon, 03 Jul 2006 09:42:03 -0400
Received: from death.corp.google.com (death.corp.google.com [172.24.0.123])
	by smtp-out.google.com with ESMTP id k63Dfr4o025354
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:41:58 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=vwGsy0OA8I0rzdVWgqzDflhHEdygxgFogprXHStExQBNXMoMNwdXhUnBdOzO3kSOG
	QCOiXl7WoxFg9wH6Qdwmw==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by death.corp.google.com with ESMTP id k63DfoYa021958
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:41:50 -0700
Received: by smtp-out2.google.com with SMTP id 33so431924fpx
	for <dix@ietf.org>; Mon, 03 Jul 2006 06:41:50 -0700 (PDT)
Received: by 10.253.15.18 with SMTP id 18mr456723fpo;
	Mon, 03 Jul 2006 06:41:50 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Mon, 3 Jul 2006 06:41:50 -0700 (PDT)
Message-ID: <1b587cab0607030641n3afa4a3y7c3e87d06f38a2c4@mail.google.com>
Date: Mon, 3 Jul 2006 14:41:50 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] Google Account Authorization - slightly off topic
In-Reply-To: <AA509076-C82C-4FD9-BE23-9E86E70A9C1E@sxip.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<p07000c00c0c5023c5dc0@12.105.228.215>
	<E9A9F044-1A43-4C5E-9B35-B2408B6CD8E0@sxip.com>
	<AA509076-C82C-4FD9-BE23-9E86E70A9C1E@sxip.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 6/29/06, Dick Hardt <dick@sxip.com> wrote:
> Google rolled out some some APIs[1] to make it easier for rich clients
> [2] and websites[3] to act on behalf of a Google user. Of course this
> deepens the identity silo that is building at Google. [3] looks like
> some concepts that ekr has been talking about.
>
> Ben: hate to put you on the spot, but is Google looking to
> participate in WAE?

I will be at the WAE BoF, so, to that extent, yes. Google is certainly
interested in (some of) the problems WAE may work on.

> [1] http://code.google.com/apis/accounts/Authentication.html
> [2] http://code.google.com/apis/accounts/AuthForInstalledApps.html
> [3] http://code.google.com/apis/accounts/AuthForWebApps.html
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 09:47:12 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxOlc-0003mc-Jj; Mon, 03 Jul 2006 09:47:12 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxOlb-0003mV-HJ
	for dix@ietf.org; Mon, 03 Jul 2006 09:47:11 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxOlY-00057X-8F
	for dix@ietf.org; Mon, 03 Jul 2006 09:47:11 -0400
Received: from chris.corp.google.com (chris.corp.google.com [172.24.0.146])
	by smtp-out.google.com with ESMTP id k63Dl3q9005781
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:47:03 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=D1ovQVKZmSqyX6vD3Q8q8tBcqj8Vnqf7YZWhusElf4383xP7lUYpToirJurF7EKM+
	nKFyc1GJHjtcWgzPjRs8Q==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by chris.corp.google.com with ESMTP id k63DjvoL029723
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:46:57 -0700
Received: by smtp-out2.google.com with SMTP id 33so432045fpx
	for <dix@ietf.org>; Mon, 03 Jul 2006 06:46:57 -0700 (PDT)
Received: by 10.253.1.18 with SMTP id 18mr989442fpa;
	Mon, 03 Jul 2006 06:46:57 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Mon, 3 Jul 2006 06:46:57 -0700 (PDT)
Message-ID: <1b587cab0607030646kfcfeeau726596d097a55a5b@mail.google.com>
Date: Mon, 3 Jul 2006 14:46:57 +0100
From: "Ben Laurie" <benl@google.com>
To: "Sam Hartman" <hartmans-ietf@mit.edu>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
In-Reply-To: <tsl3bdoiq9g.fsf@cz.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6d95a152022472c7d6cdf886a0424dc6
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 6/29/06, Sam Hartman <hartmans-ietf@mit.edu> wrote:
> Hi.
>
> First, I'd like to thank you for this excellent starting point for the
> discussion.  I do have a few comments, but this is a great taxonomy.
>
>
>
>                              Requirements
>
>   2. Hijack-Resistant Authentication (HRA)
>   An authentication system in which credentials which are bound to
>   protocol messages in such a way that attacker who observes the
>   credentials can't use them to authenticate messages of their
>   choice. The rationale for this feature is to make cut-and-paste
>   attacks difficult.
>
>
> I think this description and the subsequent discussion in
> transporting/binding credentials has some concepts I'd like to
> distinguish muddled together.
>
> Some schemes will provide integrity: a man in the middle can observe
> the conversation but cannot modify the content of the request or
> response.
>
> Some schemes will provide confidentiality even given the practical
> difficulties with server certificate validation.
>
> I argue in section 4.5 and 5 of version 01 of my phishing requirements
> draft that providing confidentiality of the resulting page is
> important even given these practical server certificate issues.  So,
> I'd like to ask you to add that as a potential requirement I might want so I can ask for it.
> Also, let's be careful to distinguish  this from HRA.
>
>
> You don't seem to have a requirement that corresponds to section 4.6
> of 01 of my phishing requirements draft.  This was one of the issues
> muddled into the confusing mutual authentication section in 00 of my
> draft.  I contend that if there are a small number of RPs that by
> policy should be allowed to accept a given identity,there is a
> security benefit in restricting the identity to only those RPs.  In
> particular, if a user successfully authenticates the user knows that
> because their identity was successfully accepted, they have
> authenticated to one of the valid RPs.  I'd be happy to discuss
> specific customer deployments where this will be useful with you
> off-list.  I understand based on your review of my 00 draft that you
> don't like this requirement.  I still think it reasonable to discuss.
>
>
>
>                       TLS Client AUthentication
>
> Your taxonomy assumes that TLS is a valid approach to client
> authentication.  As I understand HTTP, that is only true assuming
> there are no proxies between the user and the RP.

HTTP proxies support the CONNECT method for this (all they do is copy
the raw connection data in both directions). Note that if proxies
didn't do this, then server authentication would also be impossible.

> We could extend HTTP to allow a proxy to assert authentication
> information it received via TLS to the next hop.  It might be possible
> but would be more challenging to extend HTTP so that a client could
> give a proxy credentials to use for TLS client authentication outbound
> from that proxy.  I think these issues are important to consider when
> comparing how credentials and authentication are transported.
> (Personally, I wish we could just ignore the whole issue of proxies.
> I don't think that will be acceptable to the market though.)
>
>
>
>                  Transporting and Binding Credentials
>
>
>   An additional issue is hijacking: without cryptographic
>   binding, an attacker who observes a request can make future
>   requests in the name of the user via a cut-and-paste attack
>   (remember, the token is bearer). If you take the threat of
>   this type of attack seriously, you need to run the traffic
>   over SSL/TLS. [1]
>
>
>   [1] Note that if you're worried about this class of attack, you need
>   *every* PDU to be cryptographically bound to the credential with
>   all designs. If, for instance, you use cert-based auth but then
>   transition to cookies over HTTP for state management, there's a
>   cut-and-paste attack there.
>
>
> I think the primary paragraph is misleading.  We've started from an
> assumption that there are practical problems that prevent server certificates from being validated.  Given this assumption I don't understand how TLS actually gives us protection against the hijacking.
>
> I also think the footnote ignores an important deployment model.  I
>  may be concerned about whether I have reached the right RP while not
>  concerned about network level hijacking.  So I'm not at all convinced
>  that you always need to protect every exchange if you are concerned
>  about hijacking in some situations.
>
> Thanks again for your excellent work and for your consideration of my
> comments.
>
> --Sam
>
> _______________________________________________
> Ietf-http-auth mailing list
> Ietf-http-auth@osafoundation.org
> http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 09:51:23 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxOpf-00049v-H5; Mon, 03 Jul 2006 09:51:23 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxOpe-00049q-41
	for dix@ietf.org; Mon, 03 Jul 2006 09:51:22 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxOpS-00069c-60
	for dix@ietf.org; Mon, 03 Jul 2006 09:51:22 -0400
Received: from vegeta.corp.google.com (vegeta.corp.google.com [172.24.0.3])
	by smtp-out.google.com with ESMTP id k63DotDY026181
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:50:55 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=W9ePVZIR6z8vEJNMsDcXcMAaOwCaMCwRNM0GY35hEPCIUPlHjlUuQSfWOLSSwCZx0
	XjHLY5isiFlgm55AjGYnw==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by vegeta.corp.google.com with ESMTP id k63DmK0t014366
	for <dix@ietf.org>; Mon, 3 Jul 2006 06:50:46 -0700
Received: by smtp-out2.google.com with SMTP id 33so432101fpx
	for <dix@ietf.org>; Mon, 03 Jul 2006 06:50:46 -0700 (PDT)
Received: by 10.253.14.20 with SMTP id 20mr1268262fpn;
	Mon, 03 Jul 2006 06:50:46 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Mon, 3 Jul 2006 06:50:46 -0700 (PDT)
Message-ID: <1b587cab0607030650r344ddd1w6d3171dbb331fb8e@mail.google.com>
Date: Mon, 3 Jul 2006 14:50:46 +0100
From: "Ben Laurie" <benl@google.com>
To: "thayes0993@aol.com" <thayes0993@aol.com>
Subject: Re: [Ietf-http-auth] Re: [dix] BOF plans (Was: Notes on Web
	authentication enhancements)
In-Reply-To: <8C868351930B201-1384-5@FWM-R33.sysops.aol.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<p07000c00c0c5023c5dc0@12.105.228.215>
	<1b587cab0606270525i7a10e0daic3988d426bf0a09d@mail.google.com>
	<44A16387.5040602@cisco.com>
	<8C868351930B201-1384-5@FWM-R33.sysops.aol.com>
X-Spam-Score: 0.5 (/)
X-Scan-Signature: e8a67952aa972b528dd04570d58ad8fe
Cc: dix@ietf.org, ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 6/27/06, thayes0993@aol.com <thayes0993@aol.com> wrote:
>
>
> I doubt it will be possible to use exactly the same methods for HTTP, XMPP,
> SMTP and IMAP.  The latter three (XMPP, SMTP and IMAP) are session based,
> and might require authentication/authorization only once during a session.
> HTTP is stateless (at least in general), so some thought needs to be given
> to extending the auth across multiple requests.
>
>  A method for HTTP will need to consider potential performance issues,
> replay protection, and possible tie-in with other available session state
> (such as a TLS channel), among other things.  The others can generally get
> away with a on-time verification step per session.
>
>
>  It may be possible to share portions of the mechanism.  In fact, TLS/SSL
> with client authentication supports all 4 protocols.  However it seems to be
> rejected because of other issues: PKI lifecycles, physical portability of
> the key, trust management, etc.

Assuming TLS is all about X.509 is completely missing the point. TLS
supports several other authentication mechanisms, such as pre-shared
secrets or Kerberos. There's nothing to stop us defining some new ones
if we need them.

>
>  Terry Hayes
>  AOL LLC
>
>
>  -----Original Message-----
>  From: lear@cisco.com
>  To: dix@ietf.org
>  Cc: ietf-http-auth@lists.osafoundation.org
>  Sent: Tue, 27 Jun 2006 9:57 AM
>  Subject: [Ietf-http-auth] Re: [dix] BOF plans (Was: Notes on Web
> authentication enhancements)
>
>
>
> Ben Laurie wrote: >> >> - Does the mechanism use or extend currently
> deployed web >> authentication mechanisms (client side and server side)? If
> not, why >> not? > > No - because if you use web authentication, then it
> will not work for > protocols that are not HTTP based - XMPP and IMAP are
> obvious examples > that spring to mind. I'm not sure I'd go so far as No,
> but the mechanism or an analog must be easily ported to other application
> protocols such as XMPP, SMTP, or IMAP. I would think an existence proof of 2
> (one being HTTP; the other being IMAP) would be a very useful thing for any
> WG. Eliot ______________________________
> _________________ Ietf-http-auth mailing list
> Ietf-http-auth@osafoundation.org
> http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth
>  ________________________________
>  Check out AOL.com today. Breaking news, video search, pictures, email and
> IM. All on demand. Always Free.
>
> _______________________________________________
> Ietf-http-auth mailing list
> Ietf-http-auth@osafoundation.org
> http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth
>
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 10:19:43 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxPH5-0003th-LX; Mon, 03 Jul 2006 10:19:43 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxPH4-0003tZ-Ks
	for dix@ietf.org; Mon, 03 Jul 2006 10:19:42 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxPH3-00007u-Vm
	for dix@ietf.org; Mon, 03 Jul 2006 10:19:42 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 3F8C11E8C1C; Mon,  3 Jul 2006 07:19:41 -0700 (PDT)
To: Sam Hartman <hartmans-ietf@mit.edu>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Mon, 03 Jul 2006 07:19:41 -0700
In-Reply-To: <tsl3bdoiq9g.fsf@cz.mit.edu> (Sam Hartman's message of "Wed,
	28 Jun 2006 23:39:55 -0400")
Message-ID: <86mzbqbwjm.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 3971661e40967acfc35f708dd5f33760
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Sam Hartman <hartmans-ietf@mit.edu> writes:

> Hi.
>
> First, I'd like to thank you for this excellent starting point for the
> discussion.  I do have a few comments, but this is a great taxonomy.

Thanks. Sorry about the slow response here but I missed this message.


>                              Requirements
>
>   2. Hijack-Resistant Authentication (HRA)
>   An authentication system in which credentials which are bound to
>   protocol messages in such a way that attacker who observes the
>   credentials can't use them to authenticate messages of their
>   choice. The rationale for this feature is to make cut-and-paste
>   attacks difficult.
>
>
> I think this description and the subsequent discussion in
> transporting/binding credentials has some concepts I'd like to
> distinguish muddled together.
>
> Some schemes will provide integrity: a man in the middle can observe
> the conversation but cannot modify the content of the request or
> response.
>
> Some schemes will provide confidentiality even given the practical
> difficulties with server certificate validation.

Yes, I agree that these are separate services. I agree that
confidentiality of information carried in the transaction important,
but it's not in and of itself an *authentication* goal (though it may
be used in the service of one if, for instance, the tokens used
for authentication are bearer, like cookies.)


> I argue in section 4.5 and 5 of version 01 of my phishing
> requirements draft that providing confidentiality of the resulting
> page is important even given these practical server certificate
> issues.  So, I'd like to ask you to add that as a potential
> requirement I might want so I can ask for it.

I'm not sure this is applicable, since I'm not really maintaining
a document here. That was just a note to the list.

> You don't seem to have a requirement that corresponds to section 4.6
> of 01 of my phishing requirements draft.  This was one of the issues
> muddled into the confusing mutual authentication section in 00 of my
> draft.  I contend that if there are a small number of RPs that by
> policy should be allowed to accept a given identity,there is a
> security benefit in restricting the identity to only those RPs.  In
> particular, if a user successfully authenticates the user knows that
> because their identity was successfully accepted, they have
> authenticated to one of the valid RPs.  I'd be happy to discuss
> specific customer deployments where this will be useful with you
> off-list.  I understand based on your review of my 00 draft that you
> don't like this requirement.  I still think it reasonable to discuss.

I just forgot this one. My bad. 

That said, I think there are actually two security issues surrounding this:

1. Having the IdP perform some kind of secondary check on the identity
   of the RP.
2. Allowing the IdP to limit the use of credentials to selected RPs.

These sound like the same thing but they're strictly speaking not.
For example, consider a case where the IdP wants to charge RPs for
access to their credentials. In order to do this, they encrypt the
credentials with a fixed key that they send to subscribing
RPs <insert suitable DRM, rollover, etc. here>. This doesn't provide
any assurance to the user unless the RP demonstrates knowledge
of the credentials. The RP might just choose to pretend it had
authenticated the user, if, for instance, it wants to induce
the user to give up personal information.


>                       TLS Client AUthentication
>
> Your taxonomy assumes that TLS is a valid approach to client
> authentication. 

I'm not making a judgement about whether it's valid or not. I'm
saying it's been proposed. It has.


> As I understand HTTP, that is only true assuming
> there are no proxies between the user and the RP.

no trusted proxies, technically speaking. TLS accelerators aren't
a problem.

I certainly have seen this issue raised, but I'd like to observe
that they also exist for TLS without client auth (it's one reason
why we designed S-HTTP the way we did) but people seem willing
to live with that.

>   An additional issue is hijacking: without cryptographic 
>   binding, an attacker who observes a request can make future
>   requests in the name of the user via a cut-and-paste attack
>   (remember, the token is bearer). If you take the threat of
>   this type of attack seriously, you need to run the traffic
>   over SSL/TLS. [1] 
>
>
>   [1] Note that if you're worried about this class of attack, you need
>   *every* PDU to be cryptographically bound to the credential with
>   all designs. If, for instance, you use cert-based auth but then
>   transition to cookies over HTTP for state management, there's a 
>   cut-and-paste attack there.
>
>
> I think the primary paragraph is misleading.  We've started from an
> assumption that there are practical problems that prevent server
> certificates from being validated.  Given this assumption I don't
> understand how TLS actually gives us protection against the
> hijacking.

Imagine a case where you have credentials that have CRA but not
HRA. A good example is Boneh's PwdHash, which includes the
domain name of the server in the "password". If it's
restricted to use with SSL/TLS then you know that each RP
will have a unique domain name and therefore each
"password" is unique to a single RP, so there's automatic
CRA--if the user is phished the phisher must pose as a 
different RP because he has a different certificate. [0]

Note, however, that if you use TLS in NULL mode so that the
password can be captured by a passive attacker, then he
can issue a new request to the same server, thus mounting
cut-and-paste attacks. This isn't strictly hijacking, nbut
it's effectively the same for our purposes, since HTTP is 
connectionless. (I'm not sure I got the terminology on this
feature exactly right).


>  I also think the footnote ignores an important deployment model.  I
>  may be concerned about whether I have reached the right RP while not
>  concerned about network level hijacking.  So I'm not at all convinced
>  that you always need to protect every exchange if you are concerned
>  about hijacking in some situations.

By hijacking, I mean network level hijacking. If you mean typos
and phishing, then I think this is a different threat.


-Ekr

[0] Remember that phishing's attack on cert validation is at the
interface between the user's intention and the domain name,
not at the interface between the certificate name and the domain
name.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 13:17:47 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxS3M-0002EM-Jf; Mon, 03 Jul 2006 13:17:44 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxS3L-0002EH-7p
	for dix@ietf.org; Mon, 03 Jul 2006 13:17:43 -0400
Received: from laser.networkresonance.com ([198.144.196.2])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxS3J-0003xw-Ug
	for dix@ietf.org; Mon, 03 Jul 2006 13:17:43 -0400
Received: from networkresonance.com (raman.networkresonance.com
	[198.144.196.3])
	by laser.networkresonance.com (Postfix) with ESMTP id A182A222425
	for <dix@ietf.org>; Mon,  3 Jul 2006 10:25:50 -0700 (PDT)
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing 
In-reply-to: Your message of "Mon, 03 Jul 2006 09:27:20 +0200."
	<44A8C6D8.9010901@cisco.com> 
X-Mailer: MH-E 7.4.3; nmh 1.0.4; XEmacs 21.4 (patch 19)
Date: Mon, 03 Jul 2006 10:17:41 -0700
From: Eric Rescorla <ekr@networkresonance.com>
Message-Id: <20060703172550.A182A222425@laser.networkresonance.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eliot Lear <lear@cisco.com> wrote:
> Pete,
> > So, from the conversation so far, these are the architectural/protocol
> > issues I think need discussing at the BOF:
> >
> > - Discussion of the scope and number of the mechanisms. There seem to
> > be desires for (1) the ability for the user to identify to the server
> > (probably authenticating, preventing phishing as much as possible),
> > (2) the ability to transfer user attributes to the server, (3) the
> > ability to store user attributes remotely, and (4) the ability for a
> > 3rd-party to warrant user attribute claims.
> 
> On point (1) in order to fix phishing it is the server that must
> properly authenticate to the user (e.g., other way round).

That's *one* way to attack phishing (at least the current form).
There are others (cf. PwdHash)

-Ekr
 


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 13:52:20 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxSan-0005Vi-UT; Mon, 03 Jul 2006 13:52:17 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxSam-0005Vd-9C
	for dix@ietf.org; Mon, 03 Jul 2006 13:52:16 -0400
Received: from robin.verisign.com ([65.205.251.75])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxSak-00051S-UF
	for dix@ietf.org; Mon, 03 Jul 2006 13:52:16 -0400
Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com
	[65.205.251.34])
	by robin.verisign.com (8.13.6/8.13.4) with ESMTP id k63HqEqL019445
	for <dix@ietf.org>; Mon, 3 Jul 2006 10:52:14 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Mon, 3 Jul 2006 10:52:13 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [dix] Agenda bashing 
Date: Mon, 3 Jul 2006 10:52:12 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD5E7C@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [dix] Agenda bashing 
Thread-Index: AcaexJ1BAxpaNlj3QRKhpvFYkJkAfgAAO7yA
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Digital Identity Exchange" <dix@ietf.org>
X-OriginalArrivalTime: 03 Jul 2006 17:52:13.0883 (UTC)
	FILETIME=[6A7D00B0:01C69EC9]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 9ed51c9d1356100bce94f1ae4ec616a9
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

> From: Eric Rescorla [mailto:ekr@networkresonance.com]=20

> That's *one* way to attack phishing (at least the current form).
> There are others (cf. PwdHash)

There are three basic approaches to defeat phishing.

Phishing is an ATTACK where SOCIAL ENGINEERING designed to STEAL =
CREDENTIALS


1) Defeat the infrastructure of a specific attack
	Here we have takedown services such as the VeriSign Anti-Phishing =
solution, filtering of the phishing spam, blocking known phishing =
capture sites, Fraud detection services &ct.

2) Defeat the social engineering attack using strong outbound =
authentication
	This is the principle purpose of Secure Internet Letterhead: Use the =
PKIX logotype extension in an EV X.509 certificate to provide a =
trustworthy proof of legitimate use of the subject brand. Letterhead may =
be used in conjunction with DKIM or S/MIME to provide trustworthy proof =
of origin in the email channel or with SSL to provide trustworthy proof =
of origin in the Web.

3) Defeat the theft of the credentials by making the credentials theft =
resistant.
	The OATH consortium is working to provide an open, unencumbered =
standard for strong authentication whether OTP or PKI based. The =
algorithms for the OTP version have already been issued as informational =
RFCs. Other necessary infrastructure is being built out.


WAE does not fit into 1 or 2 and it does not directly address 3.=20

Where WAE fits in is that it facilitates the infrastructure changes =
necessary to make widespread deployment of #3 solutions possible.=20

With WAE I can in theory go down to Frys, buy a token and then use it to =
secure access to my bank account without the bank needing to support my =
specific token technology. All they need to know is that I am using =
something better than username and password and that the authentication =
service provider will provide an acceptable SLA.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 13:54:12 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxSce-0005dz-BS; Mon, 03 Jul 2006 13:54:12 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxScd-0005du-9O
	for dix@ietf.org; Mon, 03 Jul 2006 13:54:11 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxScc-00056N-0i
	for dix@ietf.org; Mon, 03 Jul 2006 13:54:11 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 368B61E8C1F; Mon,  3 Jul 2006 10:54:09 -0700 (PDT)
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
References: <198A730C2044DE4A96749D13E167AD37BD5E7C@MOU1WNEXMB04.vcorp.ad.vrsn.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Mon, 03 Jul 2006 10:54:09 -0700
In-Reply-To: <198A730C2044DE4A96749D13E167AD37BD5E7C@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	(Phillip Hallam-Baker's message of "Mon,
	3 Jul 2006 10:52:12 -0700")
Message-ID: <86y7vabmm6.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

"Hallam-Baker, Phillip" <pbaker@verisign.com> writes:
> WAE does not fit into 1 or 2 and it does not directly address 3. 

I with I understood what WAE was well enough to say this confidently :(

-Ekr

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 15:45:41 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxUMU-0004mp-3H; Mon, 03 Jul 2006 15:45:38 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxUMT-0004mk-CY
	for dix@ietf.org; Mon, 03 Jul 2006 15:45:37 -0400
Received: from sj-iport-6.cisco.com ([171.71.176.117])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxUMS-0001g4-2a
	for dix@ietf.org; Mon, 03 Jul 2006 15:45:37 -0400
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-6.cisco.com with ESMTP; 03 Jul 2006 12:45:35 -0700
Received: from sj-core-1.cisco.com (sj-core-1.cisco.com [171.71.177.237])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id k63JjZdh025780
	for <dix@ietf.org>; Mon, 3 Jul 2006 12:45:35 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id k63JjZ9s028913
	for <dix@ietf.org>; Mon, 3 Jul 2006 12:45:35 -0700 (PDT)
Received: from [212.254.247.4] (ams3-vpn-dhcp4316.cisco.com [10.61.80.219])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k63JeA3r016563
	for <dix@ietf.org>; Mon, 3 Jul 2006 12:40:11 -0700
Message-ID: <44A973DC.9040801@cisco.com>
Date: Mon, 03 Jul 2006 21:45:32 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
In-Reply-To: <20060703172550.A182A222425@laser.networkresonance.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-2.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=1199; t=1151955935; x=1152819935;
	c=relaxed/simple; s=sjdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=qDQJgJGd6ALb0U2KZO1YENTPTHL88f9EZl4ZBxrUvi1ENHzRSaqyKo9cpj+yJZrDXc1ecHLg
	mSDZuDUyKDsbcCFcvYl1LrZRzcm9HRMbIrekMxpvCZl6vs/EO8uylSNI;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eric Rescorla wrote:
> Eliot Lear <lear@cisco.com> wrote:
>   
>> Pete,
>>     
>>> So, from the conversation so far, these are the architectural/protocol
>>> issues I think need discussing at the BOF:
>>>
>>> - Discussion of the scope and number of the mechanisms. There seem to
>>> be desires for (1) the ability for the user to identify to the server
>>> (probably authenticating, preventing phishing as much as possible),
>>> (2) the ability to transfer user attributes to the server, (3) the
>>> ability to store user attributes remotely, and (4) the ability for a
>>> 3rd-party to warrant user attribute claims.
>>>       
>> On point (1) in order to fix phishing it is the server that must
>> properly authenticate to the user (e.g., other way round).
>>     
>
> That's *one* way to attack phishing (at least the current form).
> There are others (cf. PwdHash)
>   

I'm sorry, but PwdHash is not enough of a reference for me to
understand, but I claim that the most *effective* way to prevent
phishing is to demand that the server prove its identity enough to know
the right question to ask of the client.  If PwdHash covers this ground,
then we agree.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 16:23:00 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxUwe-0003mo-7M; Mon, 03 Jul 2006 16:23:00 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxUwc-0003mj-S2
	for dix@ietf.org; Mon, 03 Jul 2006 16:22:58 -0400
Received: from 216-43-25-66.ip.mcleodusa.net ([216.43.25.66]
	helo=episteme-software.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1FxUwa-00055a-K3; Mon, 03 Jul 2006 16:22:58 -0400
Received: from [12.105.228.215] (127.0.0.1) by episteme-software.com with
	ESMTP (EIMS X 3.3d22); Mon, 3 Jul 2006 15:22:51 -0500
Mime-Version: 1.0
X-Sender: resnick@resnick1.qualcomm.com
Message-Id: <p07000c19c0cee5568f3a@[12.105.228.215]>
In-Reply-To: <44A8C6D8.9010901@cisco.com>
References: <p07000c11c0cb0029cc83@[12.105.228.215]>
	<44A8C6D8.9010901@cisco.com>
X-Mailer: Eudora [Macintosh version 7.0a12]
Date: Mon, 3 Jul 2006 11:18:27 -0400
To: Digital Identity Exchange <dix@ietf.org>
From: Pete Resnick <presnick@qualcomm.com>
Subject: Re: [dix] Agenda bashing
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.1 (/)
X-Scan-Signature: de4f315c9369b71d7dd5909b42224370
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/3/06 at 9:27 AM +0200, Eliot Lear wrote:

>On point (1) in order to fix phishing it is the server that must 
>properly authenticate to the user (e.g., other way round).

Good point. That should be called out separately as a desirable item.

>I will not be present in Montreal, but I am very interested in the 
>problem space, and may propose solutions in the coming months.

We will hopefully have audio stream and jabber available, so if you 
(or anyone else) is computer-near, please do join us.

pr
-- 
Pete Resnick <http://www.qualcomm.com/~presnick/>
QUALCOMM Incorporated - Direct phone: (858)651-4478, Fax: (858)651-1102

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Jul 03 16:41:34 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FxVEb-0007Zo-Nu; Mon, 03 Jul 2006 16:41:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FxVEa-0007Zj-KK
	for dix@ietf.org; Mon, 03 Jul 2006 16:41:32 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxVEY-0006Y2-Ac
	for dix@ietf.org; Mon, 03 Jul 2006 16:41:32 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 6DC8A1E8C1F; Mon,  3 Jul 2006 13:41:29 -0700 (PDT)
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Mon, 03 Jul 2006 13:41:29 -0700
In-Reply-To: <44A973DC.9040801@cisco.com> (Eliot Lear's message of "Mon,
	03 Jul 2006 21:45:32 +0200")
Message-ID: <86zmfqa0au.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eliot Lear <lear@cisco.com> writes:

> Eric Rescorla wrote:
>> That's *one* way to attack phishing (at least the current form).
>> There are others (cf. PwdHash)
>>   
>
> I'm sorry, but PwdHash is not enough of a reference for me to
> understand,

http://crypto.stanford.edu/PwdHash/

It's the first hit in Google, FWIW.


> but I claim that the most *effective* way to prevent
> phishing is to demand that the server prove its identity enough to know
> the right question to ask of the client.  If PwdHash covers this ground,
> then we agree.

It doesn't. It uses an entirely different technique.

I don't think it's profitable to argue about what "most effective"
is, but I don't agree that the mechanism you describe is the only
one.

-Ekr



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 04 06:10:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fxhr5-00066q-AK; Tue, 04 Jul 2006 06:10:07 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fxhr4-00064M-4O
	for dix@ietf.org; Tue, 04 Jul 2006 06:10:06 -0400
Received: from lucius.provo.novell.com ([137.65.81.172])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Fxhr1-0001Y7-P5
	for dix@ietf.org; Tue, 04 Jul 2006 06:10:06 -0400
Received: from INET-PRV1-MTA by lucius.provo.novell.com
	with Novell_GroupWise; Tue, 04 Jul 2006 04:09:57 -0600
Message-Id: <44AA8C35.A648.00B6.0@novell.com>
X-Mailer: Novell GroupWise Internet Agent 7.0.1 
Date: Tue, 04 Jul 2006 04:11:40 -0600
From: "Haripriya S" <sharipriya@novell.com>
To: "Digital Identity Exchange" <dix@ietf.org>,
	"EKR" <ekr@networkresonance.com>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com><44A973DC.9040801@cisco.com> (Eliot Lear's
	message of "Mon, 03 Jul 2006 21:45:32 +0200")
	<86zmfqa0au.fsf@raman.networkresonance.com>
In-Reply-To: <86zmfqa0au.fsf@raman.networkresonance.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b431ad66d60be2d47c7bfeb879db82c
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

pwdHash can address two problems: 
 a. theft of the passwords from one website and using the same at other
websites
 b. theft of passwords for the target website by phishing
But techniques like pwdHash cannot prevent phishing attacks where the
phishing sites do not even validate the password from the user, but goes
on to prompt and capture long-term credentials from the user like credit
cards etc. As Eliot pointed out, in such cases it is the server which
needs to be authenticated in a phish-proof way.

Thanks and Regards,
Haripriya
 
>>> Eric Rescorla <ekr@networkresonance.com> 07/04/06 2:11 AM >>> 
Eliot Lear <lear@cisco.com> writes:

> Eric Rescorla wrote:
>> That's *one* way to attack phishing (at least the current form).
>> There are others (cf. PwdHash)
>>   
>
> I'm sorry, but PwdHash is not enough of a reference for me to
> understand,

http://crypto.stanford.edu/PwdHash/

It's the first hit in Google, FWIW.


> but I claim that the most *effective* way to prevent
> phishing is to demand that the server prove its identity enough to
know
> the right question to ask of the client.  If PwdHash covers this
ground,
> then we agree.

It doesn't. It uses an entirely different technique.

I don't think it's profitable to argue about what "most effective"
is, but I don't agree that the mechanism you describe is the only
one.

- Ekr



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 04 11:20:59 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fxmhs-0001P1-Ox; Tue, 04 Jul 2006 11:20:56 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fxmhs-0001Ow-4d
	for dix@ietf.org; Tue, 04 Jul 2006 11:20:56 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FxlXS-0006ld-6C
	for dix@ietf.org; Tue, 04 Jul 2006 10:06:06 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1FxlRG-0006n0-TI
	for dix@ietf.org; Tue, 04 Jul 2006 09:59:44 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id B138B1E8C1F; Tue,  4 Jul 2006 06:59:39 -0700 (PDT)
To: "Haripriya S" <sharipriya@novell.com>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com> <44A973DC.9040801@cisco.com>
	<86zmfqa0au.fsf@raman.networkresonance.com>
	<44AA8C35.A648.00B6.0@novell.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Tue, 04 Jul 2006 06:59:39 -0700
In-Reply-To: <44AA8C35.A648.00B6.0@novell.com> (Haripriya S.'s message of "Tue,
	04 Jul 2006 04:11:40 -0600")
Message-ID: <864pxxa2t0.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: -2.4 (--)
X-Scan-Signature: 856eb5f76e7a34990d1d457d8e8e5b7f
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

"Haripriya S" <sharipriya@novell.com> writes:

> pwdHash can address two problems: 
>  a. theft of the passwords from one website and using the same at other
> websites
>  b. theft of passwords for the target website by phishing
> But techniques like pwdHash cannot prevent phishing attacks where the
> phishing sites do not even validate the password from the user, but goes
> on to prompt and capture long-term credentials from the user like credit
> cards etc. As Eliot pointed out, in such cases it is the server which
> needs to be authenticated in a phish-proof way.

That's one way to look at it. Another is that this is just another
password and should be solved with the same approach.

-Ekr



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 05 19:02:39 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyGOC-000547-AB; Wed, 05 Jul 2006 19:02:36 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyGOA-000542-Sk
	for dix@ietf.org; Wed, 05 Jul 2006 19:02:34 -0400
Received: from imo-m24.mx.aol.com ([64.12.137.5])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyGO9-00017l-Ea
	for dix@ietf.org; Wed, 05 Jul 2006 19:02:34 -0400
Received: from THayes0993@aol.com
	by imo-m24.mx.aol.com (mail_out_v38_r7.5.) id 9.426.58b9506 (60464);
	Wed, 5 Jul 2006 19:02:26 -0400 (EDT)
Received: from FWM-D05 (fwm-d05.webmail.aol.com [205.188.160.197]) by
	ciaaol-m01.mx.aol.com (v109.13) with ESMTP id
	MAILCIAAOLM011-ec3044ac45022a9; Wed, 05 Jul 2006 19:02:26 -0400
Content-Transfer-Encoding: 7bit
Date: Wed, 05 Jul 2006 19:02:26 -0400
Message-Id: <8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
From: thayes0993@aol.com
References: <20060703172550.A182A222425@laser.networkresonance.com>	<44A973DC.9040801@cisco.com>
	<86zmfqa0au.fsf@raman.networkresonance.com>
Received: from 216.100.248.241 by FWM-D05.sysops.aol.com (205.188.160.197)
	with HTTP (WebMailUI); Wed, 05 Jul 2006 19:02:26 -0400
X-MB-Message-Source: WebUI
X-MB-Message-Type: User
In-Reply-To: <86zmfqa0au.fsf@raman.networkresonance.com>
X-Mailer: AOL WebMail 18681
Subject: Re: [dix] Agenda bashing
Content-Type: text/plain; charset="us-ascii"; format=flowed
MIME-Version: 1.0
To: ekr@networkresonance.com, dix@ietf.org
X-AOL-IP: 205.188.160.197
X-Spam-Flag: NO
X-Spam-Score: 0.7 (/)
X-Scan-Signature: 4adaf050708fb13be3316a9eee889caa
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

I believe that PwdHash does rely on a certain level of proof of the 
server's identity.  The browser needs to decide that
the domain name that the server is presenting actually belongs to it.  
This is usually done by relying on SSL/TLS.
If the false server can convince the browser that it is in fact the 
targeted domain, then the browser will happily
transmit the full credential (H(password, domain)) to the server.

PwdHash does NOT require that the proved domain match anything the user 
has in mind.  That is, the identity
does not need to be presented to the user, or compared against anything 
the user is doing. This seems to be the
primary problem in phishing attacks (the last foot).  That's where the 
real advantage of techniques like PwdHash are.

Terry

-----Original Message-----
From: Eric Rescorla <ekr@networkresonance.com>
To: Digital Identity Exchange <dix@ietf.org>
Sent: Mon, 3 Jul 2006 13:41:29 -0700
Subject: Re: [dix] Agenda bashing

  Eliot Lear <lear@cisco.com> writes:

> but I claim that the most *effective* way to prevent
> phishing is to demand that the server prove its identity enough to 
know
> the right question to ask of the client.  If PwdHash covers this 
ground,
> then we agree.

It doesn't. It uses an entirely different technique.



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix


________________________________________________________________________
Check out AOL.com today. Breaking news, video search, pictures, email 
and IM. All on demand. Always Free.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 05 19:07:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyGSZ-0005Pd-Hc; Wed, 05 Jul 2006 19:07:07 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyGSZ-0005PY-1h
	for dix@ietf.org; Wed, 05 Jul 2006 19:07:07 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyGSW-0001Yj-Lq
	for dix@ietf.org; Wed, 05 Jul 2006 19:07:07 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id BE3F31E8C1F; Wed,  5 Jul 2006 16:07:03 -0700 (PDT)
To: thayes0993@aol.com
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com>
	<86zmfqa0au.fsf@raman.networkresonance.com>
	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Wed, 05 Jul 2006 16:07:03 -0700
In-Reply-To: <8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com> (thayes's
	message of "Wed, 05 Jul 2006 19:02:26 -0400")
Message-ID: <86u05virc8.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0ddefe323dd869ab027dbfff7eff0465
Cc: dix@ietf.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

thayes0993@aol.com writes:

> I believe that PwdHash does rely on a certain level of proof of the
> server's identity.  The browser needs to decide that
> the domain name that the server is presenting actually belongs to it.
> This is usually done by relying on SSL/TLS.
> If the false server can convince the browser that it is in fact the
> targeted domain, then the browser will happily
> transmit the full credential (H(password, domain)) to the server.
>
> PwdHash does NOT require that the proved domain match anything the
> user has in mind.  That is, the identity
> does not need to be presented to the user, or compared against
> anything the user is doing. This seems to be the
> primary problem in phishing attacks (the last foot).  That's where the
> real advantage of techniques like PwdHash are.

I think this is a fair summary.

-Ekr


> -----Original Message-----
> From: Eric Rescorla <ekr@networkresonance.com>
> To: Digital Identity Exchange <dix@ietf.org>
> Sent: Mon, 3 Jul 2006 13:41:29 -0700
> Subject: Re: [dix] Agenda bashing
>
>   Eliot Lear <lear@cisco.com> writes:
>
>> but I claim that the most *effective* way to prevent
>> phishing is to demand that the server prove its identity enough to
> know
>> the right question to ask of the client.  If PwdHash covers this
> ground,
>> then we agree.
>
> It doesn't. It uses an entirely different technique.
>
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>
> ________________________________________________________________________
> Check out AOL.com today. Breaking news, video search, pictures, email
> and IM. All on demand. Always Free.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 02:12:41 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyN6O-0004mN-1K; Thu, 06 Jul 2006 02:12:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyN6M-0004mC-E3
	for dix@ietf.org; Thu, 06 Jul 2006 02:12:38 -0400
Received: from sj-iport-2-in.cisco.com ([171.71.176.71]
	helo=sj-iport-2.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1FyN6L-0008Hd-5G for dix@ietf.org; Thu, 06 Jul 2006 02:12:38 -0400
Received: from sj-dkim-3.cisco.com ([171.71.179.195])
	by sj-iport-2.cisco.com with ESMTP; 05 Jul 2006 23:12:37 -0700
X-IronPort-AV: i="4.06,211,1149490800"; 
	d="scan'208"; a="327441121:sNHT31001098"
Received: from sj-core-1.cisco.com (sj-core-1.cisco.com [171.71.177.237])
	by sj-dkim-3.cisco.com (8.12.11/8.12.11) with ESMTP id k666Caif000390; 
	Wed, 5 Jul 2006 23:12:36 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id k666Ca9s026411;
	Wed, 5 Jul 2006 23:12:36 -0700 (PDT)
Received: from [212.254.247.3] (ams3-vpn-dhcp4298.cisco.com [10.61.80.201])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k66672Pn028964;
	Wed, 5 Jul 2006 23:07:02 -0700
Message-ID: <44ACA9CF.7090605@cisco.com>
Date: Thu, 06 Jul 2006 08:12:31 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>	<44A973DC.9040801@cisco.com>	<86zmfqa0au.fsf@raman.networkresonance.com>
	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
In-Reply-To: <8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-3.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=1433; t=1152166356; x=1153030356;
	c=relaxed/simple; s=sjdkim3001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=divw/Esyn8UknmeQ7qXy9tcDTnRKOApOhKrukzcKkEm3OKpMLP8EN/oGAsDgDNfh72G3j0HA
	1MOnUmpKi7dp50p2CRJa5ByuLa1ZGGmoudIpSAECZdCJObEI3Us2mDu6;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

thayes0993@aol.com wrote:
> I believe that PwdHash does rely on a certain level of proof of the
> server's identity.  The browser needs to decide that
> the domain name that the server is presenting actually belongs to it. 
> This is usually done by relying on SSL/TLS.
> If the false server can convince the browser that it is in fact the
> targeted domain, then the browser will happily
> transmit the full credential (H(password, domain)) to the server.
>
> PwdHash does NOT require that the proved domain match anything the
> user has in mind.  That is, the identity
> does not need to be presented to the user, or compared against
> anything the user is doing. This seems to be the
> primary problem in phishing attacks (the last foot).  That's where the
> real advantage of techniques like PwdHash are.

Pretty neat.  There are two problems that still really need to be
addressed.  The first is that you need to manage a transition.  It must
be clearly visible to the user when PwdHash is used and when it is not. 
Otherwise someone just phishes the original password and that's the ball
game.

Second, PwdHash still relies on the underlying security of the user's
computer.  I don't know about you but that is a goal I would like to
address.  I want a means to have a secure opaque channel of
communication between the server and the smart card.  That's what I'm
looking for from the IETF.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 08:11:34 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyShh-0005zw-RT; Thu, 06 Jul 2006 08:11:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyShf-0005qj-Kt
	for dix@ietf.org; Thu, 06 Jul 2006 08:11:31 -0400
Received: from smtp-out.google.com ([216.239.33.17])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyShe-0001Nm-6q
	for dix@ietf.org; Thu, 06 Jul 2006 08:11:31 -0400
Received: from brian.corp.google.com (brian.corp.google.com [172.24.0.122])
	by smtp-out.google.com with ESMTP id k66CBMAt028074
	for <dix@ietf.org>; Thu, 6 Jul 2006 13:11:23 +0100
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=OB6N61vY7paFjdXmlIuwygDb5uJCg97wM2jkNMiguaiVZHvfa8o+QOs1j9V4biELj
	VpJ0jdCS+l17muxAkIIUA==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by brian.corp.google.com with ESMTP id k66C8EsH018177
	for <dix@ietf.org>; Thu, 6 Jul 2006 05:11:21 -0700
Received: by smtp-out2.google.com with SMTP id 33so576195fpx
	for <dix@ietf.org>; Thu, 06 Jul 2006 05:11:21 -0700 (PDT)
Received: by 10.253.1.18 with SMTP id 18mr1496651fpa;
	Thu, 06 Jul 2006 05:11:21 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Thu, 6 Jul 2006 05:11:21 -0700 (PDT)
Message-ID: <1b587cab0607060511l2a96a136vaebc5c116c6e02cb@mail.google.com>
Date: Thu, 6 Jul 2006 13:11:21 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
In-Reply-To: <44ACA9CF.7090605@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com>
	<86zmfqa0au.fsf@raman.networkresonance.com>
	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
	<44ACA9CF.7090605@cisco.com>
X-Spam-Score: -4.3 (----)
X-Scan-Signature: e1e48a527f609d1be2bc8d8a70eb76cb
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/6/06, Eliot Lear <lear@cisco.com> wrote:
> thayes0993@aol.com wrote:
> > I believe that PwdHash does rely on a certain level of proof of the
> > server's identity.  The browser needs to decide that
> > the domain name that the server is presenting actually belongs to it.
> > This is usually done by relying on SSL/TLS.
> > If the false server can convince the browser that it is in fact the
> > targeted domain, then the browser will happily
> > transmit the full credential (H(password, domain)) to the server.
> >
> > PwdHash does NOT require that the proved domain match anything the
> > user has in mind.  That is, the identity
> > does not need to be presented to the user, or compared against
> > anything the user is doing. This seems to be the
> > primary problem in phishing attacks (the last foot).  That's where the
> > real advantage of techniques like PwdHash are.
>
> Pretty neat.  There are two problems that still really need to be
> addressed.  The first is that you need to manage a transition.  It must
> be clearly visible to the user when PwdHash is used and when it is not.
> Otherwise someone just phishes the original password and that's the ball
> game.
>
> Second, PwdHash still relies on the underlying security of the user's
> computer.  I don't know about you but that is a goal I would like to
> address.  I want a means to have a secure opaque channel of
> communication between the server and the smart card.  That's what I'm
> looking for from the IETF.

This seems like a worthy goal, but one that is perhaps orthogonal to
other means of authenticating users. Certainly I'd be violently
opposed to requiring users to have smartcards.

>
> Eliot
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 08:15:31 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FySlW-0001Bk-Uz; Thu, 06 Jul 2006 08:15:30 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FySlW-0001Bf-6b
	for dix@ietf.org; Thu, 06 Jul 2006 08:15:30 -0400
Received: from sj-iport-1-in.cisco.com ([171.71.176.70]
	helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.43)
	id 1FySlU-0002A9-Uh for dix@ietf.org; Thu, 06 Jul 2006 08:15:30 -0400
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-1.cisco.com with ESMTP; 06 Jul 2006 05:15:29 -0700
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id k66CFSeY025111
	for <dix@ietf.org>; Thu, 6 Jul 2006 05:15:28 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id k66CFSke029270
	for <dix@ietf.org>; Thu, 6 Jul 2006 05:15:28 -0700 (PDT)
Received: from [212.254.247.3] (ams3-vpn-dhcp473.cisco.com [10.61.65.217])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k66C9qM0004781
	for <dix@ietf.org>; Thu, 6 Jul 2006 05:09:53 -0700
Message-ID: <44ACFEDD.50507@cisco.com>
Date: Thu, 06 Jul 2006 14:15:25 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>	<44A973DC.9040801@cisco.com>	<86zmfqa0au.fsf@raman.networkresonance.com>	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>	<44ACA9CF.7090605@cisco.com>
	<1b587cab0607060511l2a96a136vaebc5c116c6e02cb@mail.google.com>
In-Reply-To: <1b587cab0607060511l2a96a136vaebc5c116c6e02cb@mail.google.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-2.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=333; t=1152188128; x=1153052128;
	c=relaxed/simple; s=sjdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=jHr7b+RKRKlkVYH/pKoWs+/thehhgFralghNtskmeYzOL0BBt8423FlLX+Q+SA65xNi2jXrO
	HxVsvA9USGMtvj4MAJn7rwZAMQtduE2G+TxGkct41iW9Wzlvpnah9ErW;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 30ac594df0e66ffa5a93eb4c48bcb014
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Ben Laurie wrote:
> This seems like a worthy goal, but one that is perhaps orthogonal to
> other means of authenticating users. Certainly I'd be violently
> opposed to requiring users to have smartcards.

Reiterating: the protocol MUST solve the problem for smart cards, but it
MUST NOT require their implementation.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 08:57:03 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyTPj-0006kU-F1; Thu, 06 Jul 2006 08:57:03 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyTPh-0006kO-MJ
	for dix@ietf.org; Thu, 06 Jul 2006 08:57:01 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyTPg-0000cw-BX
	for dix@ietf.org; Thu, 06 Jul 2006 08:57:01 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 6F5BF1E8C1F; Thu,  6 Jul 2006 05:56:59 -0700 (PDT)
To: Eliot Lear <lear@cisco.com>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com>
	<86zmfqa0au.fsf@raman.networkresonance.com>
	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
	<44ACA9CF.7090605@cisco.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Thu, 06 Jul 2006 05:56:59 -0700
In-Reply-To: <44ACA9CF.7090605@cisco.com> (Eliot Lear's message of "Thu,
	06 Jul 2006 08:12:31 +0200")
Message-ID: <86fyhej3hg.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eliot Lear <lear@cisco.com> writes:

> thayes0993@aol.com wrote:
>> I believe that PwdHash does rely on a certain level of proof of the
>> server's identity.  The browser needs to decide that
>> the domain name that the server is presenting actually belongs to it. 
>> This is usually done by relying on SSL/TLS.
>> If the false server can convince the browser that it is in fact the
>> targeted domain, then the browser will happily
>> transmit the full credential (H(password, domain)) to the server.
>>
>> PwdHash does NOT require that the proved domain match anything the
>> user has in mind.  That is, the identity
>> does not need to be presented to the user, or compared against
>> anything the user is doing. This seems to be the
>> primary problem in phishing attacks (the last foot).  That's where the
>> real advantage of techniques like PwdHash are.
>
> Pretty neat.  There are two problems that still really need to be
> addressed.  The first is that you need to manage a transition.  It must
> be clearly visible to the user when PwdHash is used and when it is not. 
> Otherwise someone just phishes the original password and that's the ball
> game.

Of course. Hence all my ranting about how this is a UI problem.


> Second, PwdHash still relies on the underlying security of the user's
> computer.  I don't know about you but that is a goal I would like to
> address.  I want a means to have a secure opaque channel of
> communication between the server and the smart card.  That's what I'm
> looking for from the IETF.

Well, you could clearly use PwdHash this way. In fact, that's how
your industry standard challenge-response token works. But it doesn't
really help because you don't have HRA against an attacker who
controls the victim's computer. So, they don't capture your
authentication string but they capture the immediately following
session.

-Ekr


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 09:19:00 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyTkv-0004mX-DT; Thu, 06 Jul 2006 09:18:57 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyTku-0004ks-Bj
	for dix@ietf.org; Thu, 06 Jul 2006 09:18:56 -0400
Received: from colibri.verisign.com ([65.205.251.74])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyTkt-0004Ip-04
	for dix@ietf.org; Thu, 06 Jul 2006 09:18:56 -0400
Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com
	[65.205.251.33])
	by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id k66DIshd023372
	for <dix@ietf.org>; Thu, 6 Jul 2006 06:18:54 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Thu, 6 Jul 2006 06:18:53 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [dix] Agenda bashing
Date: Thu, 6 Jul 2006 06:18:46 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD5F42@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [dix] Agenda bashing
Thread-Index: Acag9Vglt2Pj+TTxTfm5hPCr/LUF+QAB9P9A
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Digital Identity Exchange" <dix@ietf.org>
X-OriginalArrivalTime: 06 Jul 2006 13:18:53.0707 (UTC)
	FILETIME=[BA75FDB0:01C6A0FE]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


> From: Ben Laurie [mailto:benl@google.com]=20

> This seems like a worthy goal, but one that is perhaps=20
> orthogonal to other means of authenticating users. Certainly=20
> I'd be violently opposed to requiring users to have smartcards.

Violently?

The authentication infrastructure should enable use of any form of =
authentication mechanism. SAML already supports this. It is clearly an =
achievable goal that does not place an undue burden on the design.

What we do not need to do is to support selection of selection =
mechanisms so the user gets a choice of GSSAPI, SAML, WS-*, SASL which =
in turn give a choice between every imaginable protocol.

We need one way to authenticate via the common authentication =
mechanisms: Passwords, Two Factor (OTP) Passwords, PKI signature, PKI =
encryption, Passthrough of biometric data capture.

All of these can be supported in a simple client - relying party - =
authentication service scheme where the client never talks to the auth =
server directly.=20

I do not think that we need to provide direct support multiple round =
trip protocols such as some of the more complex zero knowledge schemes. =
In those cases the simplest scheme is for the client to talk to the =
authentication service directly.=20

It is in any case desirable to have direct contact between the user and =
the auth-N service in the case of password schemes to prevent certain =
forms of MIM attack.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 09:28:45 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyTuP-0004z4-7P; Thu, 06 Jul 2006 09:28:45 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyTuO-0004vz-2D
	for dix@ietf.org; Thu, 06 Jul 2006 09:28:44 -0400
Received: from colibri.verisign.com ([65.205.251.74])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyTuL-0004az-Nl
	for dix@ietf.org; Thu, 06 Jul 2006 09:28:44 -0400
Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com
	[65.205.251.35])
	by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id k66DSfSH024330
	for <dix@ietf.org>; Thu, 6 Jul 2006 06:28:41 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Thu, 6 Jul 2006 06:28:40 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 6 Jul 2006 06:28:34 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD5F43@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Some phishing perspective
Thread-Index: Acag+7FRRdZVWYpIQy2hvUQknUgL3QAAyvsw
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Digital Identity Exchange" <dix@ietf.org>
X-OriginalArrivalTime: 06 Jul 2006 13:28:40.0795 (UTC)
	FILETIME=[186482B0:01C6A100]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: ffa9dfbbe7cc58b3fa6b8ae3e57b0aa3
Subject: [dix] Some phishing perspective
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

There has been some oblique discussion about phishing and MIM attacks.

MIM attacks are a concern, in particular MIM attacks where the end user =
machine is compromized through a trojan are a very big concern. There is =
also concern about users typing passwords into entry forms presented by =
a MIM (classic phishing).

The use of dynamic credentials (One Time Passwords) does not protect =
against a MIM entry form attack but it does have a major impact on the =
criminals.


Dynamic credentials can only be used once. That means that there is an =
upper bound on the fraud loss when phishing takes place since the number =
of transactions is limited.=20

It also means that it is much harder to resell the credentials on a =
dumps market. A carder who buys 10,000 credit card numbers can test them =
out in a low value transaction such as buying a domain name before they =
go on to attempt a riskier high value transaction. Dynamic credentials =
can only be used once, the perp is put at much greater risk.

The other advantage of dymanic credentials is that they are self =
healing. It is not necessary to reissue the token unless the customer =
actually lost it.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 10:23:25 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyUlH-0000W6-Km; Thu, 06 Jul 2006 10:23:23 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyUlG-0000W1-V3
	for dix@ietf.org; Thu, 06 Jul 2006 10:23:22 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyUlE-0007BZ-Jz
	for dix@ietf.org; Thu, 06 Jul 2006 10:23:22 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id D8B911E8C1F; Thu,  6 Jul 2006 07:23:19 -0700 (PDT)
To: Eliot Lear <lear@cisco.com>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>
	<44A973DC.9040801@cisco.com>
	<86zmfqa0au.fsf@raman.networkresonance.com>
	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>
	<44ACA9CF.7090605@cisco.com>
	<86fyhej3hg.fsf@raman.networkresonance.com>
	<44AD1A86.1050300@cisco.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Thu, 06 Jul 2006 07:23:19 -0700
In-Reply-To: <44AD1A86.1050300@cisco.com> (Eliot Lear's message of "Thu,
	06 Jul 2006 16:13:26 +0200")
Message-ID: <864pxuhkx4.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 21c69d3cfc2dd19218717dbe1d974352
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eliot Lear <lear@cisco.com> writes:

> Eric Rescorla wrote:
>> Well, you could clearly use PwdHash this way. In fact, that's how
>> your industry standard challenge-response token works. But it doesn't
>> really help because you don't have HRA against an attacker who
>> controls the victim's computer. So, they don't capture your
>> authentication string but they capture the immediately following
>> session.
>>   
>
> PwdHash as an algorithm doesn't protect you from a host computer
> compromise.  For that you need architectural separation, which is why
> smart cards etc exist. 

Yes, Eliot, I'm really quite familiar with the principle of 
two-factor authentication. My point was that the algorithm
that PwdHash employs is basically the same one that your 
average challenge response token uses. It's purely a matter
of location.


> It remains up to the end server as to what
> transactions might require additional authentication.  So for instance,
> a bank may choose to authenticate on new payees for online billing or
> for particularly large transactions.  Or not.

The problem is that this only sort-of protects you against host
computer compromise because the token that the user authenticates with
generally isn't cryptographically bound to the request the user
is making. This allows the crimeware to claim it's requesting
you to use your token for innocuous purpose X (e.g, routine
security check) but to actually be using it for malicious purpose
Y. So, it's a liveness check, but not a misuse check. See also
[BF99].

-Ekr

[BF99] "Hand-Held Computers Can Be Better Smart Cards." Dirk Balfanz
and Edward Felten. Proceedings of USENIX Security '99. Washington,
DC. August 1999.
 



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 13:09:33 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyXM4-0002L5-UN; Thu, 06 Jul 2006 13:09:32 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyXM3-0002Kq-CX
	for dix@ietf.org; Thu, 06 Jul 2006 13:09:31 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyUkh-00079v-Hb
	for dix@ietf.org; Thu, 06 Jul 2006 10:22:47 -0400
Received: from sj-iport-1-in.cisco.com ([171.71.176.70]
	helo=sj-iport-1.cisco.com)
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1FyUbh-0006GS-8J
	for dix@ietf.org; Thu, 06 Jul 2006 10:13:31 -0400
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-1.cisco.com with ESMTP; 06 Jul 2006 07:13:29 -0700
Received: from sj-core-1.cisco.com (sj-core-1.cisco.com [171.71.177.237])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id k66EDSnr025175; 
	Thu, 6 Jul 2006 07:13:28 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id k66EDS9s004031;
	Thu, 6 Jul 2006 07:13:28 -0700 (PDT)
Received: from [212.254.247.3] (ams3-vpn-dhcp473.cisco.com [10.61.65.217])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k66E7rmN007322;
	Thu, 6 Jul 2006 07:07:53 -0700
Message-ID: <44AD1A86.1050300@cisco.com>
Date: Thu, 06 Jul 2006 16:13:26 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: EKR <ekr@networkresonance.com>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>	<44A973DC.9040801@cisco.com>	<86zmfqa0au.fsf@raman.networkresonance.com>	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>	<44ACA9CF.7090605@cisco.com>
	<86fyhej3hg.fsf@raman.networkresonance.com>
In-Reply-To: <86fyhej3hg.fsf@raman.networkresonance.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-2.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=786; t=1152195208; x=1153059208;
	c=relaxed/simple; s=sjdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=JbE3FC67dZhgkg3x3g4Tj5TP2LDlcq7o+WSkxs/pd2c6B/Xv0B2It08Y0iQ+1GA300Xprx5A
	xejYPdv9ti69eOlJUZB+Cfp8DNCPl9HnLUwOPP54OzDeFRtQow+rvl50;
X-Spam-Score: -2.3 (--)
X-Scan-Signature: de4f315c9369b71d7dd5909b42224370
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eric Rescorla wrote:
> Well, you could clearly use PwdHash this way. In fact, that's how
> your industry standard challenge-response token works. But it doesn't
> really help because you don't have HRA against an attacker who
> controls the victim's computer. So, they don't capture your
> authentication string but they capture the immediately following
> session.
>   

PwdHash as an algorithm doesn't protect you from a host computer
compromise.  For that you need architectural separation, which is why
smart cards etc exist.  It remains up to the end server as to what
transactions might require additional authentication.  So for instance,
a bank may choose to authenticate on new payees for online billing or
for particularly large transactions.  Or not.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 14:55:35 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyZ0g-0001S8-8I; Thu, 06 Jul 2006 14:55:34 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyZ0f-0001Rx-4g
	for dix@ietf.org; Thu, 06 Jul 2006 14:55:33 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyZ0d-0004W5-TQ
	for dix@ietf.org; Thu, 06 Jul 2006 14:55:33 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id 2B6E0E0079; Thu,  6 Jul 2006 14:55:56 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<1b587cab0607030646kfcfeeau726596d097a55a5b@mail.google.com>
Date: Thu, 06 Jul 2006 14:55:56 -0400
In-Reply-To: <1b587cab0607030646kfcfeeau726596d097a55a5b@mail.google.com> (Ben
	Laurie's message of "Mon, 3 Jul 2006 14:46:57 +0100")
Message-ID: <tslodw2a7gj.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: de4f315c9369b71d7dd5909b42224370
Cc: ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Ben" == Ben Laurie <benl@google.com> writes:

    >> TLS Client AUthentication
    >> 
    >> Your taxonomy assumes that TLS is a valid approach to client
    >> authentication.  As I understand HTTP, that is only true
    >> assuming there are no proxies between the user and the RP.

    Ben> HTTP proxies support the CONNECT method for this (all they do
    Ben> is copy the raw connection data in both directions). Note
    Ben> that if proxies didn't do this, then server authentication
    Ben> would also be impossible.


I'm sorry, I mean no non-connect based proxies.
I.E. proxies that are HTTP hops.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 15:07:35 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyZCJ-0000gJ-Hf; Thu, 06 Jul 2006 15:07:35 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyZCI-0000eb-CY
	for dix@ietf.org; Thu, 06 Jul 2006 15:07:34 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyZCG-00059n-W9
	for dix@ietf.org; Thu, 06 Jul 2006 15:07:34 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id 23EEBE0079; Thu,  6 Jul 2006 15:07:57 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: EKR <ekr@networkresonance.com>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<86mzbqbwjm.fsf@raman.networkresonance.com>
Date: Thu, 06 Jul 2006 15:07:57 -0400
In-Reply-To: <86mzbqbwjm.fsf@raman.networkresonance.com> (Eric Rescorla's
	message of "Mon, 03 Jul 2006 07:19:41 -0700")
Message-ID: <tslk66qa6wi.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 7aafa0432175920a4b3e118e16c5cb64
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Eric" == Eric Rescorla <ekr@networkresonance.com> writes:
    >> An additional issue is hijacking: without cryptographic
    >> binding, an attacker who observes a request can make future
    >> requests in the name of the user via a cut-and-paste attack
    >> (remember, the token is bearer). If you take the threat of this
    >> type of attack seriously, you need to run the traffic over
    >> SSL/TLS. [1]
    >> 
    >> 
    >> [1] Note that if you're worried about this class of attack, you
    >> need *every* PDU to be cryptographically bound to the
    >> credential with all designs. If, for instance, you use
    >> cert-based auth but then transition to cookies over HTTP for
    >> state management, there's a cut-and-paste attack there.
    >> 
    >> 
    >> I think the primary paragraph is misleading.  We've started
    >> from an assumption that there are practical problems that
    >> prevent server certificates from being validated.  Given this
    >> assumption I don't understand how TLS actually gives us
    >> protection against the hijacking.

    Eric> Imagine a case where you have credentials that have CRA but
    Eric> not HRA. A good example is Boneh's PwdHash, which includes
    Eric> the domain name of the server in the "password". If it's
    Eric> restricted to use with SSL/TLS then you know that each RP
    Eric> will have a unique domain name and therefore each "password"
    Eric> is unique to a single RP, so there's automatic CRA--if the
    Eric> user is phished the phisher must pose as a different RP
    Eric> because he has a different certificate. [0]

This is not true of all credentials that have cra but not ha--or at
least I don't see why it is.  TLS only provides security because you
bind the two authentication layers together by using the same naming
for both the TLS authentication and the higher layer authentication.
(It also assumes that your CA is trusted; that assumption seems
consistent with our threat model.)

I was explicitly trying to get at the fact that you needed to do
something in addition to TLS.  Here you've made the naming be the
same.

    >> I also think the footnote ignores an important deployment
    >> model.  I may be concerned about whether I have reached the
    >> right RP while not concerned about network level hijacking.  So
    >> I'm not at all convinced that you always need to protect every
    >> exchange if you are concerned about hijacking in some
    >> situations.

    Eric> By hijacking, I mean network level hijacking. If you mean
    Eric> typos and phishing, then I think this is a different threat.

Can we have a name for that threat, because I thought you were lumping the two together.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 15:29:35 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyZXa-0000Ve-Mz; Thu, 06 Jul 2006 15:29:34 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyZXZ-0000VU-W7
	for dix@ietf.org; Thu, 06 Jul 2006 15:29:33 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyZXY-0000AE-Fo
	for dix@ietf.org; Thu, 06 Jul 2006 15:29:33 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 064B21E8C1C; Thu,  6 Jul 2006 12:29:32 -0700 (PDT)
To: Sam Hartman <hartmans-ietf@mit.edu>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<86mzbqbwjm.fsf@raman.networkresonance.com>
	<tslk66qa6wi.fsf@cz.mit.edu>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Thu, 06 Jul 2006 12:29:31 -0700
In-Reply-To: <tslk66qa6wi.fsf@cz.mit.edu> (Sam Hartman's message of "Thu,
	06 Jul 2006 15:07:57 -0400")
Message-ID: <86k66qwmzo.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b4a0a5f5992e2a4954405484e7717d8c
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Sam Hartman <hartmans-ietf@mit.edu> writes:

>>>>>> "Eric" == Eric Rescorla <ekr@networkresonance.com> writes:
>     >> An additional issue is hijacking: without cryptographic
>     >> binding, an attacker who observes a request can make future
>     >> requests in the name of the user via a cut-and-paste attack
>     >> (remember, the token is bearer). If you take the threat of this
>     >> type of attack seriously, you need to run the traffic over
>     >> SSL/TLS. [1]
>     >> 
>     >> 
>     >> [1] Note that if you're worried about this class of attack, you
>     >> need *every* PDU to be cryptographically bound to the
>     >> credential with all designs. If, for instance, you use
>     >> cert-based auth but then transition to cookies over HTTP for
>     >> state management, there's a cut-and-paste attack there.
>     >> 
>     >> 
>     >> I think the primary paragraph is misleading.  We've started
>     >> from an assumption that there are practical problems that
>     >> prevent server certificates from being validated.  Given this
>     >> assumption I don't understand how TLS actually gives us
>     >> protection against the hijacking.
>
>     Eric> Imagine a case where you have credentials that have CRA but
>     Eric> not HRA. A good example is Boneh's PwdHash, which includes
>     Eric> the domain name of the server in the "password". If it's
>     Eric> restricted to use with SSL/TLS then you know that each RP
>     Eric> will have a unique domain name and therefore each "password"
>     Eric> is unique to a single RP, so there's automatic CRA--if the
>     Eric> user is phished the phisher must pose as a different RP
>     Eric> because he has a different certificate. [0]
>
> This is not true of all credentials that have cra but not ha--or at
> least I don't see why it is.  TLS only provides security because you
> bind the two authentication layers together by using the same naming
> for both the TLS authentication and the higher layer authentication.
> (It also assumes that your CA is trusted; that assumption seems
> consistent with our threat model.)
>
> I was explicitly trying to get at the fact that you needed to do
> something in addition to TLS.  Here you've made the naming be the
> same.

Sorry, I don't see what you're getting at. PwdHash is specified to use
the domain name of the server as the hash salt. RFC 2818 requires
that that domain name match the server's certificate. There's nothing
additional required.


>     >> I also think the footnote ignores an important deployment
>     >> model.  I may be concerned about whether I have reached the
>     >> right RP while not concerned about network level hijacking.  So
>     >> I'm not at all convinced that you always need to protect every
>     >> exchange if you are concerned about hijacking in some
>     >> situations.
>
>     Eric> By hijacking, I mean network level hijacking. If you mean
>     Eric> typos and phishing, then I think this is a different threat.
>
> Can we have a name for that threat, because I thought you were
> lumping the two together.

Uh, I call the other one "phishing" or "credential capture"

-Ekr

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 15:55:54 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyZx4-00019H-82; Thu, 06 Jul 2006 15:55:54 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyZx2-000198-Rf
	for dix@ietf.org; Thu, 06 Jul 2006 15:55:52 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyZx1-0006Vc-In
	for dix@ietf.org; Thu, 06 Jul 2006 15:55:52 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id F2477E007A; Thu,  6 Jul 2006 15:56:11 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Re: [Ietf-http-auth] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<2EFA8C54-9BF9-41CA-ABD0-D6286601A5B1@sxip.com>
	<868xnnfarh.fsf@raman.networkresonance.com>
	<528CC6D5-3549-438F-88AE-61D610B9D92F@sxip.com>
	<1b587cab0606240923sd7f435ds7fbf1aeecf2b304f@mail.google.com>
	<E2067EC0-B18E-433B-940C-BE30463396AA@sxip.com>
Date: Thu, 06 Jul 2006 15:56:11 -0400
In-Reply-To: <E2067EC0-B18E-433B-940C-BE30463396AA@sxip.com> (Dick Hardt's
	message of "Sat, 24 Jun 2006 09:27:52 -0700")
Message-ID: <tslac7ma4o4.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464
Cc: ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Dick" == Dick Hardt <dick@sxip.com> writes:

    Dick> Agreed. My point is that it is much easier to solve it in
    Dick> one place then on all sites. The IdP can become a
    Dick> combination of client side and server side code to deal much
    Dick> more effectively with the phishing issue. It is unreasonable
    Dick> for every site to do that.



I'm missing something here.  Long term, it seems like all the clients
are going to need to change so that they can interact with the new
IDPs.  Long term, the servers are definitely going to need to change
so they can accept information from the IDPs.  I don't see why it is
unreasonable to solve this on all sites long-term.  In fact, I believe
we're going to have to in order to deal with my requirement 4.4
(mutual authentication).  And yes, I think that requirement is really
important because without it, you don't have assurance that you aren't
giving personal information to the wrong party--you don't have
assurance that you aren't being phished.


I think the question we should be asking in this space is whether
there is something we can do in short-to-medium term that has
acceptable intermediate security.  A quetion you're presumably
interested in is whether DIX or something close to it would be such a
something.


I don't know what my answer to that question is.  I hope to have
decided by the end of the BOF.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 16:40:26 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fyae8-0003Dz-F2; Thu, 06 Jul 2006 16:40:24 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fyae7-0003Du-J5
	for dix@ietf.org; Thu, 06 Jul 2006 16:40:23 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Fyae6-0008Sm-95
	for dix@ietf.org; Thu, 06 Jul 2006 16:40:23 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id 6817DE0079; Thu,  6 Jul 2006 16:40:46 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: EKR <ekr@networkresonance.com>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<86mzbqbwjm.fsf@raman.networkresonance.com>
	<tslk66qa6wi.fsf@cz.mit.edu>
	<86k66qwmzo.fsf@raman.networkresonance.com>
Date: Thu, 06 Jul 2006 16:40:46 -0400
In-Reply-To: <86k66qwmzo.fsf@raman.networkresonance.com> (Eric Rescorla's
	message of "Thu, 06 Jul 2006 12:29:31 -0700")
Message-ID: <tslveqa8o1d.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: e5ba305d0e64821bf3d8bc5d3bb07228
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Eric" == Eric Rescorla <ekr@networkresonance.com> writes:

    Eric> Sorry, I don't see what you're getting at. PwdHash is
    Eric> specified to use the domain name of the server as the hash
    Eric> salt. RFC 2818 requires that that domain name match the
    Eric> server's certificate. There's nothing additional required.

The additional thing is that the specification of pwdhash uses the
        same naming for servers that tls does and that as pwdhash is
        used, it derives the name of the server it is contacting from
        the same place as TLS (the URI).

Say I replace pwdhash with an authentication scheme where the client
needs to learn from the user an identity for the server to be used at
the TLS layer (the domain name from the URI) and an identity to be
used for my upper layer authentication scheme (derived somewhere
else).

For example, SASL digest effectively names the server based on a
realm.  There's no good mapping between the server's domain name and
the realm.  So, I'm fairly certain that a server could trick you into
giving it a challenge to replay with another server.

I think HTTP digest works approximately the same way.
In this situation, TLS would not be enough to prevent MITM.

Although perhaps the difference here is that I was using a broader
definitiong of hi jacking than you were and my definition included
MITM.



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 17:11:43 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fyb8P-0004wU-TT; Thu, 06 Jul 2006 17:11:42 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fyb8O-0004lf-GS
	for dix@ietf.org; Thu, 06 Jul 2006 17:11:40 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyaOF-0007We-4b
	for dix@ietf.org; Thu, 06 Jul 2006 16:23:59 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1FyaNr-0003lG-JL
	for dix@ietf.org; Thu, 06 Jul 2006 16:23:39 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id B0A8CE007A; Thu,  6 Jul 2006 16:23:55 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Updated phishing requirements draft
References: <tslac7x6x98.fsf@cz.mit.edu>
	<1b587cab0607030622s1c9dbad5v5a0ede75454f09e@mail.google.com>
Date: Thu, 06 Jul 2006 16:23:55 -0400
In-Reply-To: <1b587cab0607030622s1c9dbad5v5a0ede75454f09e@mail.google.com>
	(Ben Laurie's message of "Mon, 3 Jul 2006 14:22:07 +0100")
Message-ID: <tsl64iaa3dw.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: -2.5 (--)
X-Scan-Signature: b7b1e91f6d312d4248b994050b22d659
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Ben" == Ben Laurie <benl@google.com> writes:

Thanks for your comments.  I hope that we can work together to address
them.


    >> 
    >> Hi.  I submitted a 01 version of my phishing requirements draft
    >> Sunday evening, but it has not yet popped out the other side so
    >> I'm including it below.
    >> 
    >> I've tried to improve it based on review comments.  I did not
    >> get a chance to address everything; I was focusing on some
    >> obvious issues of clarity and on refining my thoughts so that
    >> the draft reflects my current understanding of the area.  I do
    >> thank all those who sent comments both on the list and
    >> privately.  I also thank those who were willing to walk through
    >> the requirements with me and help me confirm that the
    >> requirements are sufficient for what I'm trying to achieve.
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> Network Working Group S. Hartman Internet-Draft MIT Expires:
    >> December 27, 2006 June 25, 2006
    >> 
    >> 
    >> Requirements for Web Authentication Resistant to Phishing
    >> draft-hartman-webauth-phishing-01.txt
    >> 
    >> Status of this Memo
    >> 
    >> By submitting this Internet-Draft, each author represents that
    >> any applicable patent or other IPR claims of which he or she is
    >> aware have been or will be disclosed, and any of which he or
    >> she becomes aware will be disclosed, in accordance with Section
    >> 6 of BCP 79.
    >> 
    >> Internet-Drafts are working documents of the Internet
    >> Engineering Task Force (IETF), its areas, and its working
    >> groups.  Note that other groups may also distribute working
    >> documents as Internet- Drafts.
    >> 
    >> Internet-Drafts are draft documents valid for a maximum of six
    >> months and may be updated, replaced, or obsoleted by other
    >> documents at any time.  It is inappropriate to use
    >> Internet-Drafts as reference material or to cite them other
    >> than as "work in progress."
    >> 
    >> The list of current Internet-Drafts can be accessed at
    >> http://www.ietf.org/ietf/1id-abstracts.txt.
    >> 
    >> The list of Internet-Draft Shadow Directories can be accessed
    >> at http://www.ietf.org/shadow.html.
    >> 
    >> This Internet-Draft will expire on December 27, 2006.
    >> 
    >> Copyright Notice
    >> 
    >> Copyright (C) The Internet Society (2006).
    >> 
    >> Abstract
    >> 
    >> This memo proposes requirements for protocols between web
    >> identity providers and users and for requirements for protocols
    >> between identity providers and relying parties.  These
    >> requirements minimize the likelihood that criminals will be
    >> able to gain the credentials necessary to impersonate a user or
    >> be able to fraudulently convince users to disclose personal
    >> information.  To meet these requirements browsers must change.
    >> Websites must never receive information such as passwords that
    >> can be used to impersonate the user to third parties.  Browsers
    >> should perform mutual authentication and flag
    >> 
    >> 
    >> 
    >> Hartman Expires December 27, 2006 [Page 1]
    >> 
    >> Internet-Draft Web Phishing Requirements June 2006
    >> 
    >> 
    >> situations when the target website is not authorized to accept
    >> the identity being offered as this is a strong indication of
    >> fraud.
    >> 
    >> 
    >> Table of Contents
    >> 
    >> 1.  Introduction
    >> . . . . . . . . . . . . . . . . . . . . . . . . .  3 2.
    >> Requirements notation . . . . . . . . . . . . . . . . . . . .
    >> 5 3.  Threat Model
    >> . . . . . . . . . . . . . . . . . . . . . . . . .  6 3.1.
    >> Capabilities of Attackers . . . . . . . . . . . . . . . .  6
    >> 3.2.  Attacks of Interest . . . . . . . . . . . . . . . . . . .
    >> 7 4.  Requirements for Preventing Phishing
    >> . . . . . . . . . . . . .  8 4.1.  Support for Passwords
    >> . . . . . . . . . . . . . . . . . .  8 4.2.  Trusted UI
    >> . . . . . . . . . . . . . . . . . . . . . . . .  8 4.3.  No
    >> Password Equivelents . . . . . . . . . . . . . . . . .  9 4.4.
    >> Mutual Authentication . . . . . . . . . . . . . . . . . .  9
    >> 4.5.  Authentication Tied to Resulting Page
    >> . . . . . . . . . . 10 4.6.  Restricted Identity Providers
    >> . . . . . . . . . . . . . . 11 4.7.  Protecting Enrollment
    >> . . . . . . . . . . . . . . . . . . 11 5.  Is it the right
    >> Server?  . . . . . . . . . . . . . . . . . . . 13 6.  Security
    >> Considerations . . . . . . . . . . . . . . . . . . . 14 7.
    >> References
    >> . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7.1.
    >> Normative References . . . . . . . . . . . . . . . . . . . 16
    >> 7.2.  Informative References
    >> . . . . . . . . . . . . . . . . . . 16 Author's Address
    >> . . . . . . . . . . . . . . . . . . . . . . . . . 17
    >> Intellectual Property and Copyright Statements
    >> . . . . . . . . . . 18
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> Hartman Expires December 27, 2006 [Page 2]
    >> 
    >> Internet-Draft Web Phishing Requirements June 2006
    >> 
    >> 
    >> 1.  Introduction
    >> 
    >> Typically, web sites ask users to send a user name and password
    >> in order to log in and authenticate their identity to the
    >> website.  The user name and plaintext password is often sent
    >> over a TLS [RFC4346] encrypted connection.  As a result of
    >> this, the server learns the password and can pretend to be the
    >> user to any other system where the user has used the same
    >> password.  The security of passwords over TLS depends on making
    >> sure that the password is sent to the right, trusted server.
    >> TLS implementations typically confirm that the name entered by
    >> the user in the URL corresponds to the certificate as described
    >> in [RFC2818].
    >> 
    >> One serious security threat on the web today is phishing.
    >> Phishing is a form of fraud where an attacker convinces a user
    >> to provide confidential information to the attacker believing
    >> they are providing the information to a party they trust with
    >> that information.  For example, an email claiming to be from a
    >> user's bank may direct the user to go to a website and verify
    >> account information.  The attacker captures the user name and
    >> password and potentially other sensitive information.  Domain
    >> names that look like target websites, links in email, and many
    >> other factors contribute to phishers' ability to convince users
    >> to trust them.
    >> 
    >> It is useful to distinguish two targets of phishing.  Sometimes
    >> phishing is targeting web authentication credentials such as
    >> user name and password.  Sometimes phishing is targeting other
    >> confidential information.  This memo presents requirements that
    >> significantly reduce the effectiveness of the first category of
    >> phishing: these requirements guarantee that even if the user
    >> authenticates to the wrong server, that server cannot
    >> impersonate the user to a third party.  However to combat
    >> phishing targeted at other confidential information the best we
    >> can do is try to help the user detect fraud before they release
    >> confidential information.
    >> 
    >> So, the approach taken by these requirements is to handle these
    >> two types of phishing differently.  Users are given some
    >> trusted mechanism to determine whether they are typing their
    >> password into a secure browser component that will authenticate
    >> them to the web server or whether they are typing their
    >> password into a legacy mechanism that will send their password
    >> to the server.  If the user types a password into the trusted
    >> browser component, they have strong assurances that their
    >> password has not been disclosed and that the page returned from
    >> the web server was generated by a party that either knows their
    >> password or who is authenticated by an identity provider who
    >> knows their password.  The web server can then use confidential
    >> information known to the user and web server to enhance the
    >> user's trust in its identity beyond what is available given the
    >> 
    >> 
    >> 
    >> Hartman Expires December 27, 2006 [Page 3]
    >> 
    >> Internet-Draft Web Phishing Requirements June 2006
    >> 
    >> 
    >> social engineering attacks against TLS server authentication.
    >> If a user enters their password into the wrong server but
    >> discovers this before they give that server any other
    >> confidential information, then there exposure is very limited.
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> Hartman Expires December 27, 2006 [Page 4]
    >> 
    >> Internet-Draft Web Phishing Requirements June 2006
    >> 
    >> 
    >> 2.  Requirements notation
    >> 
    >> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
    >> NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
    >> "OPTIONAL" in this document are to be interpreted as described
    >> in [RFC2119].
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> 
    >> Hartman Expires December 27, 2006 [Page 5]
    >> 
    >> Internet-Draft Web Phishing Requirements June 2006
    >> 
    >> 
    >> 3.  Threat Model
    >> 
    >> This section describes the assumed capabilities of phishers,
    >> describes assumptions about web security and describes what
    >> vulnerabilities exist.
    >> 
    >> We assume that the browser and operating system are secure and
    >> can be trusted by the end user.  There are many attacks against
    >> browsers and operating systems.  However without this
    >> assumption we cannot make progress in securing web
    >> authentication.  So we will assume that browsers and operating
    >> systems are secure and note that other work to improve the
    >> security of browsers and operating systems is critical to the
    >> security of the entire web authentication system.
    >> 
    >> We assume that users have limited motivation to combat
    >> phishing.  Users cannot be expected to read the source of web
    >> pages, understand how DNS works well enough to look out for
    >> spoofed domains, or understand URI encoding.  Users do not
    >> typically understand certificates and cannot make informed
    >> decisions about whether the subject name in a certificate
    >> corresponds to the entity they are attempting to communicate
    >> with.
    >> 
    >> 3.1.  Capabilities of Attackers
    >> 
    >> Attackers can convince the user to go to a website of their
    >> choosing.  Since the attacker controls the web site and since
    >> the user chose to go to the website the TLS certificate will
    >> verify and the website will appear to be secure.  The
    >> certificate will typically not be issued to the entity the user
    >> thinks they are communicating with, but as discussed above, the
    >> user will not notice this.
    >> 
    >> The attacker can convincingly replicate any part of the UI of
    >> the website being spoofed.  The attacker can also spoof trust
    >> markers such as the security lock, URL bar and other parts of
    >> the browser UI.  There is one limitation to the attacker's
    >> ability to replicate UI.  The attacker cannot replicate a UI
    >> that depends on information the attacker does not know.  For
    >> example, an attacker could generally replicate the UI of a
    >> banking site's login page.  However the attacker probably could
    >> not replicate the account summary page until the attacker
    >> learned the user name and password.
    >> 
    >> The attacker can convince the user to do anything with the
    >> phishing site that they would do with the real target site.  As
    >> a consequence, if we want to avoid the user giving the attacker
    >> their password, we must transition to a solution where the user
    >> would not give the real target site their password.  Instead
    >> they will need to cryptographically prove that they know their
    >> password without revealing it.
    >> 
    >> 
    >> 
    >> Hartman Expires December 27, 2006 [Page 6]
    >> 
    >> Internet-Draft Web Phishing Requirements June 2006
    >> 
    >> 
    >> 3.2.  Attacks of Interest
    >> 
    >> The primary attack of interest is an attack in which the user
    >> sends confidential information to an unintended recipient.

    Ben> This contradicts the introduction, which says you are only
    Ben> interested in authentication credentials.

First, that's not true if the information in question is an
authentication credential.
However I don't see the claim you are referring to in the introduction.

    >> 4.1.  Support for Passwords
    >> 
    >> The web authentication solution MUST support passwords and MUST
    >> be secure even when passwords are commonly used.

    Ben> It seems to me you are presupposing the solution to your real
    Ben> requirement, which is that the user must be able to walk up
    Ben> to any machine and use it to log in. It is not obvious to me
    Ben> that this means it must support passwords (at least not to
    Ben> more than one site, say the one where I've stored all my
    Ben> credentials).

I think that supporting passwords between you and your IDP and
supporting other credentials between your IDP and websites meets this
requirement.  I believe the real requirement here is that the protocol
must support me walking up to a machine, choose an identity and type
in apassword for that identity.

I completely disbelieve that users will store their
identities/credentials on one machine.  There's no way MIT would let
me store long-term work credentials on a machine I control in a form
that could be accessed over the net.  There's no way I'd store my
long-term personal credentials on a machine MIT controls.  Neither of
us are interested in third parties.  Thus, I suspect there's no one
machine besides the client I'm in front of now that can get access to
my credentials.

However I think we're talking about something similar.  I'd definitely
consider text to better describe the requirement provided that it did
not make it less readable to non-security folk.
    >> 4.3.  No Password Equivelents
    >> 
    >> A critical requirement is that when a user authenticates to a
    >> website, the website MUST NOT receive a strong password
    >> equivalent [IABAUTH].  A strong password equivalent is anything
    >> that would allow a phisher to authenticate as a user with a
    >> different identity provider.  Weak password equivalents MAY
    >> only be sent when a new identity is being enrolled or a
    >> password is changed.  A weak password equivalent allows a party
    >> to authenticate to a given identity provider as the user.

    Ben> Again, you are presupposing the necessity of
    Ben> passwords. Surely this should be "no authentication
    Ben> credential equivalents".

I'm quite certain that passwords will be the common case.  You're
correct that the requirement is that credentials are not sent.  I
think the text of the requirement makes that clear; if not I'd
appreciate revisions.  I believe the title is more readable to
non-security audiences than your proposed title.


    >> The second implication of this requirement is that if an
    >> authentication token is presented to a website, the website
    >> MUST NOT be able to modify the token to authenticate as the
    >> user to a third party.  The party generating the token must
    >> cryptographically bind it to either the website that will
    >> receive the token or to a key known only to the user.

    Ben> Once more you are presupposing the solution. One-time
    Ben> passwords work find for this purpose but are not
    Ben> (necessarily) cryptographically bound to anything.


I don't see how one-time passwords that are not bound to a particular
recipient meet the requirement.  If I have a one time password and am
trying to authenticate to Bob, but accidentally give the password to
BOb, I don't want BOb to be able to take the (as-yet unused) one-time
password and give it to Bob.

I'm also sort of confused about how you have a one time password that
is not cryptographically bound to a specific relying party.  Typically
that relying party is some backend authentication server but that
still meets this requirement.

    >> and password as part of an attempt to make the phishing site
    >> authentic.  The real target is some other confidential
    >> information.  The user name and password are captured, but are
    >> not verified.  After the user name and password are entered,
    >> the phishing site collects other confidential information.
    >> 
    >> Authentication of the server at the TLS level and
    >> authentication of the client within the TLS session is not
    >> sufficient.  AS discussed previously the attacker can direct
    >> the user to a site that the attacker controls so the TLS
    >> authentication will succeed.  So an authentication solution for
    >> phishing MUST detect the situation where the server ignores or
    >> does not participate in the authentication.

    Ben> This doesn't follow - the situation you have described is one
    Ben> where the server _does_ participate in authentication. The
    Ben> problem is that they are not the server the user thinks they
    Ben> are,.

The server participates in the TLS authentication but does not
participate in other authentication layers.  For example on todays
web, the server accepts but does not verify a password filled into an
HTML form.  Again, rewording is appreciated.

    >> 
    >> The authentication system MUST guarantee to the user and the
    >> target server that the response is generated by the target
    >> server and will only be seen by parties authorized by either
    >> the target server or the user.

    Ben> The requirement, surely, is that the response is not _useful_
    Ben> to eavesdroppers, rather than not seen. There are plenty of
    Ben> protcols that can be run totally in the clear that leave
    Ben> nothing useful for an observer (e.g. Diffie-Hellman key
    Ben> agreement).

Would it help to clarify that I mean the decrypted contents of the
HTTP response?


    >> 1.  The target server can provide a certificate issued by the
    >> identity provider as part of the authentication.
    >> 
    >> 2.  The identity provider can explicitly approve the identity.
    >> For example in a redirect-based scheme the identity provider
    >> knows the identity of the relying party before providing claims
    >> of identity to that party.  A similar situation happens with
    >> Kerberos.

    Ben> A general criticism, but particularly apropos in this
    Ben> section: you appear to have no concern for the privacy of the
    Ben> user. It should be possible to authenticate without revealing
    Ben> to the identity provider who you are authenticating to.

You're correct that I personally care very little about that form of
privacy.  However you'll note that I explicitly mention an option
allowing you to meet this requirement while maintaining privacy.
See 1 above.

    Ben> Incidentally, you've suddenly started talking about identity
    Ben> providers without saying what they are.

Yes.  I'm not entirely sure how to fix that without making the draft
less general.  Suggestions welcome.



    >> The risk of dictionary attack is always a significant concern
    >> for password systems.  Users can (but typically do not)
    >> minimize this risk by choosing long, hard to guess phrases for
    >> passwords.  The risk can be removed once a password is already
    >> established by using a zero-knowledge password protocol.

    Ben> This just isn't true. An attacker can always assume the role
    Ben> of the client and try to authenticate using their dictionary
    Ben> of passwords.  This works no matter what the authentication
    Ben> mechanism is. If the attacker is the server then they can do
    Ben> this very efficiently (since they do not have to do it over
    Ben> the network).

You are of course correct.  What I meant to say is that the risk of
offline dictionary attack can be removed for attackers other than the
server if ZKPPs are used.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 18:03:20 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FybwN-0001aV-QK; Thu, 06 Jul 2006 18:03:19 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FybwM-0001aO-U7
	for dix@ietf.org; Thu, 06 Jul 2006 18:03:18 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FybwK-0001eQ-I2
	for dix@ietf.org; Thu, 06 Jul 2006 18:03:18 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id ED7EA1E8C1C; Thu,  6 Jul 2006 15:03:15 -0700 (PDT)
To: Sam Hartman <hartmans-ietf@mit.edu>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<86mzbqbwjm.fsf@raman.networkresonance.com>
	<tslk66qa6wi.fsf@cz.mit.edu>
	<86k66qwmzo.fsf@raman.networkresonance.com>
	<tslveqa8o1d.fsf@cz.mit.edu>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Thu, 06 Jul 2006 15:03:15 -0700
In-Reply-To: <tslveqa8o1d.fsf@cz.mit.edu> (Sam Hartman's message of "Thu,
	06 Jul 2006 16:40:46 -0400")
Message-ID: <86sllev1b0.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Sam Hartman <hartmans-ietf@mit.edu> writes:

>>>>>> "Eric" == Eric Rescorla <ekr@networkresonance.com> writes:
>
>     Eric> Sorry, I don't see what you're getting at. PwdHash is
>     Eric> specified to use the domain name of the server as the hash
>     Eric> salt. RFC 2818 requires that that domain name match the
>     Eric> server's certificate. There's nothing additional required.
>
> The additional thing is that the specification of pwdhash uses the
>         same naming for servers that tls does and that as pwdhash is
>         used, it derives the name of the server it is contacting from
>         the same place as TLS (the URI).

Yes, I agree that this is necessary. I don't agree that it's
"additional". It's a basic part of any design that aims
to preserve referential integrity, which is why TLS and
PwdHash both do it.

> Say I replace pwdhash with an authentication scheme where the client
> needs to learn from the user an identity for the server to be used at
> the TLS layer (the domain name from the URI) and an identity to be
> used for my upper layer authentication scheme (derived somewhere
> else).
>
> For example, SASL digest effectively names the server based on a
> realm.  There's no good mapping between the server's domain name and
> the realm.  So, I'm fairly certain that a server could trick you into
> giving it a challenge to replay with another server.
>
> I think HTTP digest works approximately the same way.
> In this situation, TLS would not be enough to prevent MITM.
>
> Although perhaps the difference here is that I was using a broader
> definitiong of hi jacking than you were and my definition included
> MITM.

Uh, no. The difference is that HTTP Digest and SASL Digest don't
provide CRA, because they don't include the user's intended
URI in the C-R response.

-Ekr

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 18:31:03 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FycNA-0005rS-KR; Thu, 06 Jul 2006 18:31:00 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FycN9-0005lj-Nv
	for dix@ietf.org; Thu, 06 Jul 2006 18:30:59 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FycN7-0004Ae-Ew
	for dix@ietf.org; Thu, 06 Jul 2006 18:30:59 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id 955CCE0079; Thu,  6 Jul 2006 18:31:21 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: EKR <ekr@networkresonance.com>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<86mzbqbwjm.fsf@raman.networkresonance.com>
	<tslk66qa6wi.fsf@cz.mit.edu>
	<86k66qwmzo.fsf@raman.networkresonance.com>
	<tslveqa8o1d.fsf@cz.mit.edu>
	<86sllev1b0.fsf@raman.networkresonance.com>
Date: Thu, 06 Jul 2006 18:31:21 -0400
In-Reply-To: <86sllev1b0.fsf@raman.networkresonance.com> (Eric Rescorla's
	message of "Thu, 06 Jul 2006 15:03:15 -0700")
Message-ID: <tslirma74cm.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Eric" == Eric Rescorla <ekr@networkresonance.com> writes:

    Eric> Sam Hartman <hartmans-ietf@mit.edu> writes:
    >>>>>>> "Eric" == Eric Rescorla <ekr@networkresonance.com> writes:
    >>
    Eric> Sorry, I don't see what you're getting at. PwdHash is
    Eric> specified to use the domain name of the server as the hash
    Eric> salt. RFC 2818 requires that that domain name match the
    Eric> server's certificate. There's nothing additional required.
    >>  The additional thing is that the specification of pwdhash uses
    >> the same naming for servers that tls does and that as pwdhash
    >> is used, it derives the name of the server it is contacting
    >> from the same place as TLS (the URI).

    Eric> Yes, I agree that this is necessary. I don't agree that it's
    Eric> "additional". It's a basic part of any design that aims to
    Eric> preserve referential integrity, which is why TLS and PwdHash
    Eric> both do it.

OK.  It was not obvious in your definition of CRA that you meant this.



I thin my major conclusion from WEA so far is that reasonably
intelligent people who have been thinking about these problems for
years still find it difficult to agree on common vocabulary.
Requirements and solutions are harder.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 19:50:59 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FydcU-0003jF-So; Thu, 06 Jul 2006 19:50:54 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FydcT-0003jA-7k
	for dix@ietf.org; Thu, 06 Jul 2006 19:50:53 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FydcR-0004p4-SY
	for dix@ietf.org; Thu, 06 Jul 2006 19:50:53 -0400
Received: from [192.168.1.137] (adsl-64-175-32-202.dsl.pltn13.pacbell.net
	[64.175.32.202]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k66NolkJ098059
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Thu, 6 Jul 2006 16:50:48 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Transfer-Encoding: 7bit
Message-Id: <C07B25C7-4E1A-47D7-989C-F28609247560@sxip.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
To: Digital Identity Exchange <dix@ietf.org>
From: John Merrells <merrells@sxip.com>
Date: Thu, 6 Jul 2006 16:50:45 -0700
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=0.3 required=5.0 tests=AWL,BAYES_00,
	RCVD_IN_NJABL_DUL,RCVD_IN_SORBS_DUL autolearn=no version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 856eb5f76e7a34990d1d457d8e8e5b7f
Subject: [dix] John not attending IETF 66
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


Hello,

I'm sorry to say that I won't be attending the WAE BOF.

I'm in the midst of filing some papers with the INS (last bastion of  
the roman empire) and my lawyers say that I can't leave the country  
(USA) without a receipt. All very Brazil (http://www.imdb.com/title/ 
tt0088846/).

Anyway, I'll contribute as best I can from afar, and I hope to see  
some of you at the next identity conference: 'Identity Open Space'.  
(Assuming I have a receipt, for their receipt, of my receipt, etc.)

John

Identity Open Space, July 20-21, Vancouver
http://ios.windley.com/wiki/IOSVan

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 21:22:07 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fyf2j-0003mm-JB; Thu, 06 Jul 2006 21:22:05 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fyf2i-0003mT-0n
	for dix@ietf.org; Thu, 06 Jul 2006 21:22:04 -0400
Received: from its-mu-mail3.its.rmit.edu.au ([131.170.1.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Fyf2g-0005KZ-Aa
	for dix@ietf.org; Thu, 06 Jul 2006 21:22:03 -0400
Received: from its-gw-inet57.its.rmit.edu.au (its-gw-inet57.its.rmit.edu.au
	[131.170.10.77])
	by its-mu-mail3.its.rmit.edu.au (8.13.7/8.13.7/mail3) with ESMTP id
	k671LtNf002662
	for <dix@ietf.org>; Fri, 7 Jul 2006 11:21:57 +1000 (EST)
Received: from INET57-MTA by its-gw-inet57.its.rmit.edu.au
	with Novell_GroupWise; Fri, 07 Jul 2006 11:21:55 +1000
Message-Id: <44AE43C6.29CB.0017.3@ems.rmit.edu.au>
X-Mailer: Novell GroupWise Internet Agent 7.0 
Date: Fri, 07 Jul 2006 11:21:41 +1000
From: "Gavin Baumanis" <gavin.baumanis@rmit.edu.au>
To: <dix@ietf.org>
Subject: Re: [Ietf-http-auth] Re: [dix] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<tsl3bdoiq9g.fsf@cz.mit.edu>
	<86mzbqbwjm.fsf@raman.networkresonance.com>
	<tslk66qa6wi.fsf@cz.mit.edu>
	<86k66qwmzo.fsf@raman.networkresonance.com>
	<tslveqa8o1d.fsf@cz.mit.edu>
	<86sllev1b0.fsf@raman.networkresonance.com><86sllev1b0.fsf@raman.networkresonance.com>
	(Eric Rescorla's message of "Thu,
	06 Jul 2006 15:03:15 -0700") <tslirma74cm.fsf@cz.mit.edu>
In-Reply-To: <tslirma74cm.fsf@cz.mit.edu>
Mime-Version: 1.0
X-Scanned-By: MIMEDefang 2.44
X-Spam-Score: 0.1 (/)
X-Scan-Signature: e1e48a527f609d1be2bc8d8a70eb76cb
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1071636886=="
Errors-To: dix-bounces@ietf.org

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--===============1071636886==
Content-Type: multipart/alternative; boundary="=__Part0326E735.0__="

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=__Part0326E735.0__=
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Sam, (And everyone else too)
 
Couldn't agree more.
And having no previous experiencing in work at such a low level - it
all seems harder again...
though I am becoming very enlightened!
 

>>> 
I thin my major conclusion from WEA so far is that reasonably
intelligent people who have been thinking about these problems for
years still find it difficult to agree on common vocabulary.
Requirements and solutions are harder.


--=__Part0326E735.0__=
Content-Type: text/html; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Content-Description: HTML

<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
<META content="MSHTML 6.00.2900.2912" name=GENERATOR></HEAD>
<BODY style="MARGIN: 4px 4px 1px; FONT: 10pt Comic Sans MS">
<DIV>Sam, (And everyone else too)</DIV>
<DIV>&nbsp;</DIV>
<DIV>Couldn't agree more.</DIV>
<DIV>And having no previous experiencing in work at such a low level - it all seems harder again...</DIV>
<DIV>though I am becoming very enlightened!</DIV>
<DIV>&nbsp;</DIV>
<DIV><BR>&gt;&gt;&gt; </DIV>
<DIV style="PADDING-LEFT: 7px; MARGIN: 0px 0px 0px 15px; BORDER-LEFT: #050505 1px solid; BACKGROUND-COLOR: #f3f3f3">I thin my major conclusion from WEA so far is that reasonably<BR>intelligent people who have been thinking about these problems for<BR>years still find it difficult to agree on common vocabulary.<BR>Requirements and solutions are harder.<BR><BR></DIV></BODY></HTML>
--=__Part0326E735.0__=--


--===============1071636886==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============1071636886==--




From dix-bounces@ietf.org Thu Jul 06 22:36:50 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FygD0-0005Ov-2Y; Thu, 06 Jul 2006 22:36:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FygCz-0005Oq-8t
	for dix@ietf.org; Thu, 06 Jul 2006 22:36:45 -0400
Received: from sj-iport-6.cisco.com ([171.71.176.117])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FygCv-0002NB-UW
	for dix@ietf.org; Thu, 06 Jul 2006 22:36:45 -0400
Received: from sj-dkim-2.cisco.com ([171.71.179.186])
	by sj-iport-6.cisco.com with ESMTP; 06 Jul 2006 19:36:41 -0700
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254])
	by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id k672af1h004670; 
	Thu, 6 Jul 2006 19:36:41 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id k672afke012437;
	Thu, 6 Jul 2006 19:36:41 -0700 (PDT)
Received: from [212.254.247.3] (ams3-vpn-dhcp92.cisco.com [10.61.64.92])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k672V3fZ023900;
	Thu, 6 Jul 2006 19:31:04 -0700
Message-ID: <44ADC8B7.2060605@cisco.com>
Date: Fri, 07 Jul 2006 04:36:39 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: EKR <ekr@networkresonance.com>
Subject: Re: [dix] Agenda bashing
References: <20060703172550.A182A222425@laser.networkresonance.com>	<44A973DC.9040801@cisco.com>	<86zmfqa0au.fsf@raman.networkresonance.com>	<8C86E9E37E4BD3C-1288-2A5B@FWM-D05.sysops.aol.com>	<44ACA9CF.7090605@cisco.com>	<86fyhej3hg.fsf@raman.networkresonance.com>	<44AD1A86.1050300@cisco.com>
	<864pxuhkx4.fsf@raman.networkresonance.com>
In-Reply-To: <864pxuhkx4.fsf@raman.networkresonance.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-2.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=2530; t=1152239801; x=1153103801;
	c=relaxed/simple; s=sjdkim2001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=rnztWWstA5sRaElHbkswSEHy16h7S4S1mMM5pejZinMRjEmPxWn2rWVfkti4OBKcASpSsNF/
	7FdkAyZFB6Wfd/sLX3BPOjx+i9456xcTQPKracJMe67tZAiskhpdWp4q;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f4c2cf0bccc868e4cc88dace71fb3f44
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eric Rescorla wrote:
> Eliot Lear <lear@cisco.com> writes:
>
>   
>> Eric Rescorla wrote:
>>     
>>> Well, you could clearly use PwdHash this way. In fact, that's how
>>> your industry standard challenge-response token works. But it doesn't
>>> really help because you don't have HRA against an attacker who
>>> controls the victim's computer. So, they don't capture your
>>> authentication string but they capture the immediately following
>>> session.
>>>   
>>>       
>> PwdHash as an algorithm doesn't protect you from a host computer
>> compromise.  For that you need architectural separation, which is why
>> smart cards etc exist. 
>>     
>
> Yes, Eliot, I'm really quite familiar with the principle of 
> two-factor authentication. My point was that the algorithm
> that PwdHash employs is basically the same one that your 
> average challenge response token uses. It's purely a matter
> of location.
>   

That the password is at all related to the hash result at all is an
(IMHO) unnecessary risk that would in our scenarios impact more than a
single service.  There exists methods where this is NOT the case.

>
>   
>> It remains up to the end server as to what
>> transactions might require additional authentication.  So for instance,
>> a bank may choose to authenticate on new payees for online billing or
>> for particularly large transactions.  Or not.
>>     
>
> The problem is that this only sort-of protects you against host
> computer compromise because the token that the user authenticates with
> generally isn't cryptographically bound to the request the user
> is making. This allows the crimeware to claim it's requesting
> you to use your token for innocuous purpose X (e.g, routine
> security check) but to actually be using it for malicious purpose
> Y. So, it's a liveness check, but not a misuse check. See also
> [BF99].
>   
Indeed if you don't trust your browser to function properly you are left
with tradeoffs.  As we've seen even in the mobile world, a browser can
get hacked.  But there are approaches to further reduce the risk, like
describing the transaction on a display of the card.  And Eric, keep in
mind one obvious application for all of this: if I want to put an end to
bots at my company, I may want to periodically demand strong
authentication from the PCs for various functions.  Let's see the
malware that is both a useful bot and attempts to fool me into thinking
I'm not sending that email I mean to send.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 06 23:05:09 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FygeS-0004xX-VY; Thu, 06 Jul 2006 23:05:08 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FygeR-0004xS-AU
	for dix@ietf.org; Thu, 06 Jul 2006 23:05:07 -0400
Received: from homer.w3.org ([128.30.52.30])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FygeQ-0003wU-4Z
	for dix@ietf.org; Thu, 06 Jul 2006 23:05:07 -0400
Received: from dirk.w3.org (homer.w3.org [128.30.52.30])
	by homer.w3.org (Postfix) with ESMTP id C60494F48E;
	Thu,  6 Jul 2006 23:05:05 -0400 (EDT)
Subject: Re: [dix] John not attending IETF 66
From: Dan Connolly <connolly@w3.org>
To: Digital Identity Exchange <dix@ietf.org>
In-Reply-To: <C07B25C7-4E1A-47D7-989C-F28609247560@sxip.com>
References: <C07B25C7-4E1A-47D7-989C-F28609247560@sxip.com>
Content-Type: text/plain
Organization: World Wide Web Consortium (http://www.w3.org/)
Date: Thu, 06 Jul 2006 22:05:05 -0500
Message-Id: <1152241505.1191.204.camel@dirk.w3.org>
Mime-Version: 1.0
X-Mailer: Evolution 2.6.1 
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7655788c23eb79e336f5f8ba8bce7906
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On Thu, 2006-07-06 at 16:50 -0700, John Merrells wrote:
> Hello,
> 
> I'm sorry to say that I won't be attending the WAE BOF.
> 
> I'm in the midst of filing some papers with the INS (last bastion of  
> the roman empire) and my lawyers say that I can't leave the country  
> (USA) without a receipt. All very Brazil (http://www.imdb.com/title/ 
> tt0088846/).

Oh my.

:-/

I wasn't planning to be there, but I was getting the impression
things were going to come together, and I appreciate your
perspective on things.


-- 
Dan Connolly, W3C http://www.w3.org/People/Connolly/
D3C2 887B 0F92 6005 C541  0875 0F91 96DE 6E52 C29E


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 07 00:33:00 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fyi1T-0005bM-Fu; Fri, 07 Jul 2006 00:32:59 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fyi1R-0005bH-Vq
	for dix@ietf.org; Fri, 07 Jul 2006 00:32:57 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Fyi1Q-0000mi-Jf
	for dix@ietf.org; Fri, 07 Jul 2006 00:32:57 -0400
Received: from [192.168.1.105] (d154-5-111-179.bchsia.telus.net
	[154.5.111.179]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k674WsQp008187
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT);
	Thu, 6 Jul 2006 21:32:54 -0700 (PDT) (envelope-from dick@sxip.com)
In-Reply-To: <tslac7ma4o4.fsf@cz.mit.edu>
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<2EFA8C54-9BF9-41CA-ABD0-D6286601A5B1@sxip.com>
	<868xnnfarh.fsf@raman.networkresonance.com>
	<528CC6D5-3549-438F-88AE-61D610B9D92F@sxip.com>
	<1b587cab0606240923sd7f435ds7fbf1aeecf2b304f@mail.google.com>
	<E2067EC0-B18E-433B-940C-BE30463396AA@sxip.com>
	<tslac7ma4o4.fsf@cz.mit.edu>
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <4C91C488-0D77-4204-A0F0-0005D0691F19@sxip.com>
Content-Transfer-Encoding: 7bit
From: Dick Hardt <dick@sxip.com>
Subject: Re: [dix] Re: [Ietf-http-auth] Notes on Web authentication
	enhancements
Date: Thu, 6 Jul 2006 21:32:53 -0700
To: Sam Hartman <hartmans-ietf@mit.edu>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=0.6 required=5.0 tests=AWL,BAYES_00,
	RCVD_IN_NJABL_DUL,RCVD_IN_SORBS_DUL autolearn=no version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f4c2cf0bccc868e4cc88dace71fb3f44
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 6-Jul-06, at 12:56 PM, Sam Hartman wrote:

>>>>>> "Dick" == Dick Hardt <dick@sxip.com> writes:
>
>     Dick> Agreed. My point is that it is much easier to solve it in
>     Dick> one place then on all sites. The IdP can become a
>     Dick> combination of client side and server side code to deal much
>     Dick> more effectively with the phishing issue. It is unreasonable
>     Dick> for every site to do that.
>
> I'm missing something here.  Long term, it seems like all the clients
> are going to need to change so that they can interact with the new
> IDPs.  Long term, the servers are definitely going to need to change
> so they can accept information from the IDPs.  I don't see why it is
> unreasonable to solve this on all sites long-term.  In fact, I believe
> we're going to have to in order to deal with my requirement 4.4
> (mutual authentication).  And yes, I think that requirement is really
> important because without it, you don't have assurance that you aren't
> giving personal information to the wrong party--you don't have
> assurance that you aren't being phished.

I'll see if I can clarify:

1) Most sites are not targeted by phishers today, and unlikely to be  
targeted in the future, so they should not be forced to put in  
technology for resolving phishing.

2) Currently the user has NO trusted site or client and is easily  
phished. Once the user has one trusted software system, then that  
system can more easily determine the identity of other sites. In  
other words, the user will not have to build up the full assurance  
stack with each site, the user can leverage something they already  
trust to assist in making the trust decision.

>
>
> I think the question we should be asking in this space is whether
> there is something we can do in short-to-medium term that has
> acceptable intermediate security.  A quetion you're presumably
> interested in is whether DIX or something close to it would be such a
> something.

Agree that we need to work on a a short-to-medium term improvement.
Phishing, like most complex problems, likely requires a combination  
of things to minimize.
Per my comments above, once the user has a trusted identity agent,  
DIX could be used by the user to interact in a more trusted manner  
with other sites, with a lower burden on those sites.

>
> I don't know what my answer to that question is.  I hope to have
> decided by the end of the BOF.

I think the BOF is going to be interesting -- uncertain on what will  
be answered. :)

-- Dick

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 07 03:19:47 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fykcl-0007SY-Dp; Fri, 07 Jul 2006 03:19:39 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fykck-0007SS-MA
	for dix@ietf.org; Fri, 07 Jul 2006 03:19:38 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyjIr-0002Lb-J6
	for dix@ietf.org; Fri, 07 Jul 2006 01:55:01 -0400
Received: from laser.networkresonance.com ([198.144.196.2])
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1FyiuC-0003BC-Oa
	for dix@ietf.org; Fri, 07 Jul 2006 01:29:33 -0400
Received: from networkresonance.com (raman.networkresonance.com
	[198.144.196.3])
	by laser.networkresonance.com (Postfix) with ESMTP id 57E01222426;
	Thu,  6 Jul 2006 22:37:32 -0700 (PDT)
To: Eliot Lear <lear@cisco.com>
Subject: Re: [dix] Agenda bashing 
In-reply-to: Your message of "Fri, 07 Jul 2006 04:36:39 +0200."
	<44ADC8B7.2060605@cisco.com> 
X-Mailer: MH-E 7.4.3; nmh 1.0.4; XEmacs 21.4 (patch 19)
Date: Thu, 06 Jul 2006 22:29:23 -0700
From: Eric Rescorla <ekr@networkresonance.com>
Message-Id: <20060707053732.57E01222426@laser.networkresonance.com>
X-Spam-Score: -2.4 (--)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eliot Lear <lear@cisco.com> wrote:
> Eric Rescorla wrote:
> That the password is at all related to the hash result at all is an
> (IMHO) unnecessary risk that would in our scenarios impact more than a
> single service.  There exists methods where this is NOT the case.

Yes, there do. But they all involve lugging some object around,
in which case the problem becomes vastly easier. We need 
a system which doesn't require a token.


> >> It remains up to the end server as to what
> >> transactions might require additional authentication.  So for instance,
> >> a bank may choose to authenticate on new payees for online billing or
> >> for particularly large transactions.  Or not.
> >>     
> >
> > The problem is that this only sort-of protects you against host
> > computer compromise because the token that the user authenticates with
> > generally isn't cryptographically bound to the request the user
> > is making. This allows the crimeware to claim it's requesting
> > you to use your token for innocuous purpose X (e.g, routine
> > security check) but to actually be using it for malicious purpose
> > Y. So, it's a liveness check, but not a misuse check. See also
> > [BF99].
> >   
> Indeed if you don't trust your browser to function properly you are left
> with tradeoffs.  As we've seen even in the mobile world, a browser can
> get hacked.  But there are approaches to further reduce the risk, like
> describing the transaction on a display of the card.

Yes. The reference I provided was to one such system.

-Ekr

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 07 04:00:12 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FylG0-000337-3K; Fri, 07 Jul 2006 04:00:12 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FylFy-00032c-Cn
	for dix@ietf.org; Fri, 07 Jul 2006 04:00:10 -0400
Received: from sj-iport-4.cisco.com ([171.68.10.86])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FylFw-0005et-3V
	for dix@ietf.org; Fri, 07 Jul 2006 04:00:10 -0400
Received: from sj-dkim-7.cisco.com ([171.68.10.88])
	by sj-iport-4.cisco.com with ESMTP; 07 Jul 2006 01:00:07 -0700
X-IronPort-AV: i="4.06,215,1149490800"; 
	d="scan'208"; a="1835956677:sNHT29488324"
Received: from sj-core-4.cisco.com (sj-core-4.cisco.com [171.68.223.138])
	by sj-dkim-7.cisco.com (8.12.11/8.12.11) with ESMTP id k67807gi017704; 
	Fri, 7 Jul 2006 01:00:07 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-4.cisco.com (8.12.10/8.12.6) with ESMTP id k67807fr028699;
	Fri, 7 Jul 2006 01:00:07 -0700 (PDT)
Received: from [212.254.247.3] (ams3-vpn-dhcp4756.cisco.com [10.61.82.147])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k677sTpR031032;
	Fri, 7 Jul 2006 00:54:29 -0700
Message-ID: <44AE1485.3020908@cisco.com>
Date: Fri, 07 Jul 2006 10:00:05 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: Eric Rescorla <ekr@networkresonance.com>
Subject: Re: [dix] Agenda bashing
References: <20060707053732.57E01222426@laser.networkresonance.com>
In-Reply-To: <20060707053732.57E01222426@laser.networkresonance.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-7.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=688; t=1152259207; x=1153123207;
	c=relaxed/simple; s=sjdkim7001;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20Agenda=20bashing;
	X=v=3Dcisco.com=3B=20h=3D6inNqoEUmFyA1l2ZAW91r5N7nQI=3D;
	b=eCLjMReyfvOB7j12RGskDawfUz/WlSMmaiB43KrYty46kK6f3SXetErTvawfxUbj5Me4bLj0
	88OEXsf0LLpXxM1hr/H0f70EjnuBX0qVehWNlHuLBw4g1oTCno54vOGP;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d6b246023072368de71562c0ab503126
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Eric Rescorla wrote:
> Eliot Lear <lear@cisco.com> wrote:
>   
>> Eric Rescorla wrote:
>> That the password is at all related to the hash result at all is an
>> (IMHO) unnecessary risk that would in our scenarios impact more than a
>> single service.  There exists methods where this is NOT the case.
>>     
>
> Yes, there do. But they all involve lugging some object around,
> in which case the problem becomes vastly easier. We need 
> a system which doesn't require a token.
>   

That's not true, Eric.  Anything you can lug around can be "lugged"
around in software.  It doesn't solve the malware/bot problem, but the
two issues are separate and distinct.

Eliot

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 07 10:19:06 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FyrAb-0004dw-PF; Fri, 07 Jul 2006 10:19:01 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FyrAb-0004dr-9S
	for dix@ietf.org; Fri, 07 Jul 2006 10:19:01 -0400
Received: from carter-zimmerman.suchdamage.org ([69.25.196.178]
	helo=carter-zimmerman.mit.edu)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FyrAa-0006A4-16
	for dix@ietf.org; Fri, 07 Jul 2006 10:19:01 -0400
Received: by carter-zimmerman.mit.edu (Postfix, from userid 8042)
	id E5DC5E0079; Fri,  7 Jul 2006 10:19:23 -0400 (EDT)
From: Sam Hartman <hartmans-ietf@mit.edu>
To: Dick Hardt <dick@sxip.com>
Subject: Re: [dix] Re: [Ietf-http-auth] Notes on Web authentication
	enhancements
References: <20060619220742.40B85222427@laser.networkresonance.com>
	<2EFA8C54-9BF9-41CA-ABD0-D6286601A5B1@sxip.com>
	<868xnnfarh.fsf@raman.networkresonance.com>
	<528CC6D5-3549-438F-88AE-61D610B9D92F@sxip.com>
	<1b587cab0606240923sd7f435ds7fbf1aeecf2b304f@mail.google.com>
	<E2067EC0-B18E-433B-940C-BE30463396AA@sxip.com>
	<tslac7ma4o4.fsf@cz.mit.edu>
	<4C91C488-0D77-4204-A0F0-0005D0691F19@sxip.com>
Date: Fri, 07 Jul 2006 10:19:23 -0400
In-Reply-To: <4C91C488-0D77-4204-A0F0-0005D0691F19@sxip.com> (Dick Hardt's
	message of "Thu, 6 Jul 2006 21:32:53 -0700")
Message-ID: <tslirm95wgk.fsf@cz.mit.edu>
User-Agent: Gnus/5.110004 (No Gnus v0.4) Emacs/21.4 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 0bc60ec82efc80c84b8d02f4b0e4de22
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

>>>>> "Dick" == Dick Hardt <dick@sxip.com> writes:


    Dick> 1) Most sites are not targeted by phishers today, 
and
Agreed.

    Dick> unlikely to be targeted in the future, so they should not be
    Dick> forced to put in technology for resolving phishing.

Disagree.  As you start to see reuse of identity, you will see people
moving from targeting primary targets to targeting other sites where
credentials may be harvested.

I think anyone who accepts identity information will ultimately be a
target.

    Dick> 2) Currently the user has NO trusted site or client and is
    Dick> easily phished. Once the user has one trusted software
    Dick> system, then that system can more easily determine the
    Dick> identity of other sites. In other words, the user will not
    Dick> have to build up the full assurance stack with each site,
    Dick> the user can leverage something they already trust to assist
    Dick> in making the trust decision.

I more or less completely disagree with the above, especially with the
idea that the user will ever have one trusted software system.


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 07 16:06:39 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1Fywb1-00024w-9g; Fri, 07 Jul 2006 16:06:39 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1Fywb0-000237-It
	for dix@ietf.org; Fri, 07 Jul 2006 16:06:38 -0400
Received: from colibri.verisign.com ([65.205.251.74])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Fywaz-0000Qx-6f
	for dix@ietf.org; Fri, 07 Jul 2006 16:06:38 -0400
Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com
	[65.205.251.35])
	by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id k67K6aKL019696;
	Fri, 7 Jul 2006 13:06:36 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Fri, 7 Jul 2006 13:06:35 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [dix] Re: [Ietf-http-auth] Notes on Web authenticationenhancements
Date: Fri, 7 Jul 2006 13:06:34 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD603F@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [dix] Re: [Ietf-http-auth] Notes on Web
	authenticationenhancements
Thread-Index: AcahfnBHzvi44DHDTsSkPlK3d1ALwgAgIdzQ
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Dick Hardt" <dick@sxip.com>, "Sam Hartman" <hartmans-ietf@mit.edu>
X-OriginalArrivalTime: 07 Jul 2006 20:06:35.0568 (UTC)
	FILETIME=[D9478300:01C6A200]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


> [mailto:ietf-http-auth-bounces@osafoundation.org] On Behalf=20

> 1) Most sites are not targeted by phishers today, and=20
> unlikely to be targeted in the future, so they should not be=20
> forced to put in technology for resolving phishing.

This is completely wrong.

Every type of site is targetted by criminal schemes, blogs are currently =
targets for spam and for dropping trojans onto user machine via spyware.

If I can get hold of a blogger's username and password I can install a =
trojan dropper onto their site. Blogger has been infested with hundreds =
of thousands of sites with music backgrounds provided by spyware =
companies.=20

There are already extensive attacks against search engines. If you can =
see the searches someone has done recently you can quickly build up a =
picture to use in an identity theft.



> 2) Currently the user has NO trusted site or client and is=20
> easily phished. Once the user has one trusted software=20
> system, then that system can more easily determine the=20
> identity of other sites. In other words, the user will not=20
> have to build up the full assurance stack with each site, the=20
> user can leverage something they already trust to assist in=20
> making the trust decision.

The problem is not a lack of trusted sites, it is a lack of sites that =
are trustWORTHY.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Sun Jul 09 12:46:59 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FzcQp-00078U-Us; Sun, 09 Jul 2006 12:46:55 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FzcQo-00073P-Hk
	for dix@ietf.org; Sun, 09 Jul 2006 12:46:54 -0400
Received: from 216-43-25-66.ip.mcleodusa.net ([216.43.25.66]
	helo=episteme-software.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FzcQm-0003Rt-Ae
	for dix@ietf.org; Sun, 09 Jul 2006 12:46:54 -0400
Received: from [12.105.228.215] (127.0.0.1) by episteme-software.com with
	ESMTP (EIMS X 3.3d22) for <dix@ietf.org>; Sun, 9 Jul 2006 11:46:47 -0500
Mime-Version: 1.0
X-Sender: resnick@resnick1.qualcomm.com
Message-Id: <p07000c31c0d6e2f2e60b@[12.105.228.215]>
X-Mailer: Eudora [Macintosh version 7.0a12]
Importance: High
Date: Sun, 9 Jul 2006 12:46:47 -0400
To: dix@ietf.org
From: Pete Resnick <presnick@qualcomm.com>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 7aefe408d50e9c7c47615841cb314bed
Subject: [dix] Volunteers for note takers
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

I'd like a minutes taker and a jabber scribe for the BOF. If 
volunteers are not acquired now, I will be ruthless on Friday.

pr
-- 
Pete Resnick <http://www.qualcomm.com/~presnick/>
QUALCOMM Incorporated - Direct phone: (858)651-4478, Fax: (858)651-1102

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 11 17:53:58 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G0QB2-00030H-WB; Tue, 11 Jul 2006 17:53:57 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G0QB1-0002yp-Kr
	for dix@ietf.org; Tue, 11 Jul 2006 17:53:55 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G0QB0-0001Jh-9o
	for dix@ietf.org; Tue, 11 Jul 2006 17:53:55 -0400
Received: from [132.219.26.110] (h1a6e-net84db.lab.risq.net [132.219.26.110]
	(may be forged)) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6BLrMYe080570
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT);
	Tue, 11 Jul 2006 14:53:52 -0700 (PDT) (envelope-from dick@sxip.com)
In-Reply-To: <198A730C2044DE4A96749D13E167AD37BD603F@MOU1WNEXMB04.vcorp.ad.vrsn.com>
References: <198A730C2044DE4A96749D13E167AD37BD603F@MOU1WNEXMB04.vcorp.ad.vrsn.com>
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <AE33D314-BCD0-4618-908C-BDBB6E7D4AC7@sxip.com>
Content-Transfer-Encoding: 7bit
From: Dick Hardt <dick@sxip.com>
Subject: Re: [dix] Re: [Ietf-http-auth] Notes on Web authenticationenhancements
Date: Tue, 11 Jul 2006 10:53:46 -0700
To: "Hallam-Baker, Phillip" <pbaker@verisign.com>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00, DATE_IN_PAST_03_06 
	autolearn=ham version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org, Sam Hartman <hartmans-ietf@mit.edu>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 7-Jul-06, at 1:06 PM, Hallam-Baker, Phillip wrote:

>
>> [mailto:ietf-http-auth-bounces@osafoundation.org] On Behalf
>
>> 1) Most sites are not targeted by phishers today, and
>> unlikely to be targeted in the future, so they should not be
>> forced to put in technology for resolving phishing.
>
> This is completely wrong.
>
> Every type of site is targetted by criminal schemes, blogs are  
> currently targets for spam and for dropping trojans onto user  
> machine via spyware.
>
> If I can get hold of a blogger's username and password I can  
> install a trojan dropper onto their site. Blogger has been infested  
> with hundreds of thousands of sites with music backgrounds provided  
> by spyware companies.
>
> There are already extensive attacks against search engines. If you  
> can see the searches someone has done recently you can quickly  
> build up a picture to use in an identity theft.

Just to clarify, phishers are spoofing Google and Blogger to steal  
credentials? If so, I stand corrected.

>
>> 2) Currently the user has NO trusted site or client and is
>> easily phished. Once the user has one trusted software
>> system, then that system can more easily determine the
>> identity of other sites. In other words, the user will not
>> have to build up the full assurance stack with each site, the
>> user can leverage something they already trust to assist in
>> making the trust decision.
>
> The problem is not a lack of trusted sites, it is a lack of sites  
> that are trustWORTHY.

Agreed. Semantics is not one of my stronger skills. :-)


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 11 18:20:45 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G0Qay-0005FU-9q; Tue, 11 Jul 2006 18:20:45 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G0QTk-0003kU-1W
	for dix@ietf.org; Tue, 11 Jul 2006 18:13:16 -0400
Received: from colibri.verisign.com ([65.205.251.74])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G0QRg-0005uz-Ma
	for dix@ietf.org; Tue, 11 Jul 2006 18:11:09 -0400
Received: from MOU1WNEXCN02.vcorp.ad.vrsn.com (mailer2.verisign.com
	[65.205.251.35])
	by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id k6BMB6n9014491;
	Tue, 11 Jul 2006 15:11:07 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	MOU1WNEXCN02.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Tue, 11 Jul 2006 15:11:06 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [dix] Re: [Ietf-http-auth] Notes on Web authenticationenhancements
Date: Tue, 11 Jul 2006 15:11:12 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD61BD@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [dix] Re: [Ietf-http-auth] Notes on Web
	authenticationenhancements
Thread-Index: AcalNIcKLSVo4LotT1SetO1+IFWl4QAAb/XQ
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Dick Hardt" <dick@sxip.com>
X-OriginalArrivalTime: 11 Jul 2006 22:11:06.0974 (UTC)
	FILETIME=[E83C97E0:01C6A536]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 08170828343bcf1325e4a0fb4584481c
Cc: Digital Identity Exchange <dix@ietf.org>,
	ietf-http-auth@lists.osafoundation.org, Sam Hartman <hartmans-ietf@mit.edu>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


> From: Dick Hardt [mailto:dick@sxip.com]=20

> Just to clarify, phishers are spoofing Google and Blogger to=20
> steal credentials? If so, I stand corrected.

Not in production yet.

However there are malware companies that use blogger for distributing =
trojans. It is a small step from that to phish credentials of blogger =
sites and drop hardcore crimeware onto machines that visit.





_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 13:05:01 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G14cS-0005v3-3Y; Thu, 13 Jul 2006 13:04:56 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G13EV-0002nv-Me
	for dix@ietf.org; Thu, 13 Jul 2006 11:36:07 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G138q-0001rl-W7
	for dix@ietf.org; Thu, 13 Jul 2006 11:30:18 -0400
Received: from chris.corp.google.com (chris.corp.google.com [172.24.0.146])
	by smtp-out.google.com with ESMTP id k6DFUAf3015193
	for <dix@ietf.org>; Thu, 13 Jul 2006 08:30:10 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=OBDcGPUojzUvY9gHg1ll9xpFhDwOe47VDLA9vRYxQgfuWWMFUFqFU5277IgRkrpRI
	CCP02gLAVlT1JFFM4Gwag==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by chris.corp.google.com with ESMTP id k6DFESNO002605
	for <dix@ietf.org>; Thu, 13 Jul 2006 08:30:05 -0700
Received: by smtp-out2.google.com with SMTP id 16so130736fpe
	for <dix@ietf.org>; Thu, 13 Jul 2006 08:30:05 -0700 (PDT)
Received: by 10.253.14.20 with SMTP id 20mr784456fpn;
	Thu, 13 Jul 2006 08:30:05 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Thu, 13 Jul 2006 08:30:05 -0700 (PDT)
Message-ID: <1b587cab0607130830w522b7c9nad76518c67bfacd7@mail.google.com>
Date: Thu, 13 Jul 2006 11:30:05 -0400
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] Updated phishing requirements draft
In-Reply-To: <tsl64iaa3dw.fsf@cz.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <tslac7x6x98.fsf@cz.mit.edu>
	<1b587cab0607030622s1c9dbad5v5a0ede75454f09e@mail.google.com>
	<tsl64iaa3dw.fsf@cz.mit.edu>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0c3d807a9e67fb2ae2b97f891ffd2e4e
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/6/06, Sam Hartman <hartmans-ietf@mit.edu> wrote:
> >>>>> "Ben" == Ben Laurie <benl@google.com> writes:
>
> Thanks for your comments.  I hope that we can work together to address
> them.
>
>
>     >>
>     >> Hi.  I submitted a 01 version of my phishing requirements draft
>     >> Sunday evening, but it has not yet popped out the other side so
>     >> I'm including it below.
>     >>
>     >> I've tried to improve it based on review comments.  I did not
>     >> get a chance to address everything; I was focusing on some
>     >> obvious issues of clarity and on refining my thoughts so that
>     >> the draft reflects my current understanding of the area.  I do
>     >> thank all those who sent comments both on the list and
>     >> privately.  I also thank those who were willing to walk through
>     >> the requirements with me and help me confirm that the
>     >> requirements are sufficient for what I'm trying to achieve.
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >> Network Working Group S. Hartman Internet-Draft MIT Expires:
>     >> December 27, 2006 June 25, 2006
>     >>
>     >>
>     >> Requirements for Web Authentication Resistant to Phishing
>     >> draft-hartman-webauth-phishing-01.txt
>     >>
>     >> Status of this Memo
>     >>
>     >> By submitting this Internet-Draft, each author represents that
>     >> any applicable patent or other IPR claims of which he or she is
>     >> aware have been or will be disclosed, and any of which he or
>     >> she becomes aware will be disclosed, in accordance with Section
>     >> 6 of BCP 79.
>     >>
>     >> Internet-Drafts are working documents of the Internet
>     >> Engineering Task Force (IETF), its areas, and its working
>     >> groups.  Note that other groups may also distribute working
>     >> documents as Internet- Drafts.
>     >>
>     >> Internet-Drafts are draft documents valid for a maximum of six
>     >> months and may be updated, replaced, or obsoleted by other
>     >> documents at any time.  It is inappropriate to use
>     >> Internet-Drafts as reference material or to cite them other
>     >> than as "work in progress."
>     >>
>     >> The list of current Internet-Drafts can be accessed at
>     >> http://www.ietf.org/ietf/1id-abstracts.txt.
>     >>
>     >> The list of Internet-Draft Shadow Directories can be accessed
>     >> at http://www.ietf.org/shadow.html.
>     >>
>     >> This Internet-Draft will expire on December 27, 2006.
>     >>
>     >> Copyright Notice
>     >>
>     >> Copyright (C) The Internet Society (2006).
>     >>
>     >> Abstract
>     >>
>     >> This memo proposes requirements for protocols between web
>     >> identity providers and users and for requirements for protocols
>     >> between identity providers and relying parties.  These
>     >> requirements minimize the likelihood that criminals will be
>     >> able to gain the credentials necessary to impersonate a user or
>     >> be able to fraudulently convince users to disclose personal
>     >> information.  To meet these requirements browsers must change.
>     >> Websites must never receive information such as passwords that
>     >> can be used to impersonate the user to third parties.  Browsers
>     >> should perform mutual authentication and flag
>     >>
>     >>
>     >>
>     >> Hartman Expires December 27, 2006 [Page 1]
>     >>
>     >> Internet-Draft Web Phishing Requirements June 2006
>     >>
>     >>
>     >> situations when the target website is not authorized to accept
>     >> the identity being offered as this is a strong indication of
>     >> fraud.
>     >>
>     >>
>     >> Table of Contents
>     >>
>     >> 1.  Introduction
>     >> . . . . . . . . . . . . . . . . . . . . . . . . .  3 2.
>     >> Requirements notation . . . . . . . . . . . . . . . . . . . .
>     >> 5 3.  Threat Model
>     >> . . . . . . . . . . . . . . . . . . . . . . . . .  6 3.1.
>     >> Capabilities of Attackers . . . . . . . . . . . . . . . .  6
>     >> 3.2.  Attacks of Interest . . . . . . . . . . . . . . . . . . .
>     >> 7 4.  Requirements for Preventing Phishing
>     >> . . . . . . . . . . . . .  8 4.1.  Support for Passwords
>     >> . . . . . . . . . . . . . . . . . .  8 4.2.  Trusted UI
>     >> . . . . . . . . . . . . . . . . . . . . . . . .  8 4.3.  No
>     >> Password Equivelents . . . . . . . . . . . . . . . . .  9 4.4.
>     >> Mutual Authentication . . . . . . . . . . . . . . . . . .  9
>     >> 4.5.  Authentication Tied to Resulting Page
>     >> . . . . . . . . . . 10 4.6.  Restricted Identity Providers
>     >> . . . . . . . . . . . . . . 11 4.7.  Protecting Enrollment
>     >> . . . . . . . . . . . . . . . . . . 11 5.  Is it the right
>     >> Server?  . . . . . . . . . . . . . . . . . . . 13 6.  Security
>     >> Considerations . . . . . . . . . . . . . . . . . . . 14 7.
>     >> References
>     >> . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7.1.
>     >> Normative References . . . . . . . . . . . . . . . . . . . 16
>     >> 7.2.  Informative References
>     >> . . . . . . . . . . . . . . . . . . 16 Author's Address
>     >> . . . . . . . . . . . . . . . . . . . . . . . . . 17
>     >> Intellectual Property and Copyright Statements
>     >> . . . . . . . . . . 18
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >> Hartman Expires December 27, 2006 [Page 2]
>     >>
>     >> Internet-Draft Web Phishing Requirements June 2006
>     >>
>     >>
>     >> 1.  Introduction
>     >>
>     >> Typically, web sites ask users to send a user name and password
>     >> in order to log in and authenticate their identity to the
>     >> website.  The user name and plaintext password is often sent
>     >> over a TLS [RFC4346] encrypted connection.  As a result of
>     >> this, the server learns the password and can pretend to be the
>     >> user to any other system where the user has used the same
>     >> password.  The security of passwords over TLS depends on making
>     >> sure that the password is sent to the right, trusted server.
>     >> TLS implementations typically confirm that the name entered by
>     >> the user in the URL corresponds to the certificate as described
>     >> in [RFC2818].
>     >>
>     >> One serious security threat on the web today is phishing.
>     >> Phishing is a form of fraud where an attacker convinces a user
>     >> to provide confidential information to the attacker believing
>     >> they are providing the information to a party they trust with
>     >> that information.  For example, an email claiming to be from a
>     >> user's bank may direct the user to go to a website and verify
>     >> account information.  The attacker captures the user name and
>     >> password and potentially other sensitive information.  Domain
>     >> names that look like target websites, links in email, and many
>     >> other factors contribute to phishers' ability to convince users
>     >> to trust them.
>     >>
>     >> It is useful to distinguish two targets of phishing.  Sometimes
>     >> phishing is targeting web authentication credentials such as
>     >> user name and password.  Sometimes phishing is targeting other
>     >> confidential information.  This memo presents requirements that
>     >> significantly reduce the effectiveness of the first category of
>     >> phishing: these requirements guarantee that even if the user
>     >> authenticates to the wrong server, that server cannot
>     >> impersonate the user to a third party.  However to combat
>     >> phishing targeted at other confidential information the best we
>     >> can do is try to help the user detect fraud before they release
>     >> confidential information.
>     >>
>     >> So, the approach taken by these requirements is to handle these
>     >> two types of phishing differently.  Users are given some
>     >> trusted mechanism to determine whether they are typing their
>     >> password into a secure browser component that will authenticate
>     >> them to the web server or whether they are typing their
>     >> password into a legacy mechanism that will send their password
>     >> to the server.  If the user types a password into the trusted
>     >> browser component, they have strong assurances that their
>     >> password has not been disclosed and that the page returned from
>     >> the web server was generated by a party that either knows their
>     >> password or who is authenticated by an identity provider who
>     >> knows their password.  The web server can then use confidential
>     >> information known to the user and web server to enhance the
>     >> user's trust in its identity beyond what is available given the
>     >>
>     >>
>     >>
>     >> Hartman Expires December 27, 2006 [Page 3]
>     >>
>     >> Internet-Draft Web Phishing Requirements June 2006
>     >>
>     >>
>     >> social engineering attacks against TLS server authentication.
>     >> If a user enters their password into the wrong server but
>     >> discovers this before they give that server any other
>     >> confidential information, then there exposure is very limited.
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >> Hartman Expires December 27, 2006 [Page 4]
>     >>
>     >> Internet-Draft Web Phishing Requirements June 2006
>     >>
>     >>
>     >> 2.  Requirements notation
>     >>
>     >> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
>     >> NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
>     >> "OPTIONAL" in this document are to be interpreted as described
>     >> in [RFC2119].
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >> Hartman Expires December 27, 2006 [Page 5]
>     >>
>     >> Internet-Draft Web Phishing Requirements June 2006
>     >>
>     >>
>     >> 3.  Threat Model
>     >>
>     >> This section describes the assumed capabilities of phishers,
>     >> describes assumptions about web security and describes what
>     >> vulnerabilities exist.
>     >>
>     >> We assume that the browser and operating system are secure and
>     >> can be trusted by the end user.  There are many attacks against
>     >> browsers and operating systems.  However without this
>     >> assumption we cannot make progress in securing web
>     >> authentication.  So we will assume that browsers and operating
>     >> systems are secure and note that other work to improve the
>     >> security of browsers and operating systems is critical to the
>     >> security of the entire web authentication system.
>     >>
>     >> We assume that users have limited motivation to combat
>     >> phishing.  Users cannot be expected to read the source of web
>     >> pages, understand how DNS works well enough to look out for
>     >> spoofed domains, or understand URI encoding.  Users do not
>     >> typically understand certificates and cannot make informed
>     >> decisions about whether the subject name in a certificate
>     >> corresponds to the entity they are attempting to communicate
>     >> with.
>     >>
>     >> 3.1.  Capabilities of Attackers
>     >>
>     >> Attackers can convince the user to go to a website of their
>     >> choosing.  Since the attacker controls the web site and since
>     >> the user chose to go to the website the TLS certificate will
>     >> verify and the website will appear to be secure.  The
>     >> certificate will typically not be issued to the entity the user
>     >> thinks they are communicating with, but as discussed above, the
>     >> user will not notice this.
>     >>
>     >> The attacker can convincingly replicate any part of the UI of
>     >> the website being spoofed.  The attacker can also spoof trust
>     >> markers such as the security lock, URL bar and other parts of
>     >> the browser UI.  There is one limitation to the attacker's
>     >> ability to replicate UI.  The attacker cannot replicate a UI
>     >> that depends on information the attacker does not know.  For
>     >> example, an attacker could generally replicate the UI of a
>     >> banking site's login page.  However the attacker probably could
>     >> not replicate the account summary page until the attacker
>     >> learned the user name and password.
>     >>
>     >> The attacker can convince the user to do anything with the
>     >> phishing site that they would do with the real target site.  As
>     >> a consequence, if we want to avoid the user giving the attacker
>     >> their password, we must transition to a solution where the user
>     >> would not give the real target site their password.  Instead
>     >> they will need to cryptographically prove that they know their
>     >> password without revealing it.
>     >>
>     >>
>     >>
>     >> Hartman Expires December 27, 2006 [Page 6]
>     >>
>     >> Internet-Draft Web Phishing Requirements June 2006
>     >>
>     >>
>     >> 3.2.  Attacks of Interest
>     >>
>     >> The primary attack of interest is an attack in which the user
>     >> sends confidential information to an unintended recipient.
>
>     Ben> This contradicts the introduction, which says you are only
>     Ben> interested in authentication credentials.
>
> First, that's not true if the information in question is an
> authentication credential.

True, of course, but hardly relevant. What if it isn't an
authentication credential?


> However I don't see the claim you are referring to in the introduction.

"It is useful to distinguish two targets of phishing.  Sometimes
  phishing is targeting web authentication credentials such as user
  name and password.  Sometimes phishing is targeting other
  confidential information.  This memo presents requirements that
  significantly reduce the effectiveness of the first category of
  phishing"

>
>     >> 4.1.  Support for Passwords
>     >>
>     >> The web authentication solution MUST support passwords and MUST
>     >> be secure even when passwords are commonly used.
>
>     Ben> It seems to me you are presupposing the solution to your real
>     Ben> requirement, which is that the user must be able to walk up
>     Ben> to any machine and use it to log in. It is not obvious to me
>     Ben> that this means it must support passwords (at least not to
>     Ben> more than one site, say the one where I've stored all my
>     Ben> credentials).
>
> I think that supporting passwords between you and your IDP and
> supporting other credentials between your IDP and websites meets this
> requirement.  I believe the real requirement here is that the protocol
> must support me walking up to a machine, choose an identity and type
> in apassword for that identity.

If you mean that the solution must allow this mode, then sure. If you
are saying it must require it, then I think that excludes a whole
bunch of potentially useful solutions, like tokens, for example.

>
> I completely disbelieve that users will store their
> identities/credentials on one machine.  There's no way MIT would let
> me store long-term work credentials on a machine I control in a form
> that could be accessed over the net.  There's no way I'd store my
> long-term personal credentials on a machine MIT controls.  Neither of
> us are interested in third parties.  Thus, I suspect there's no one
> machine besides the client I'm in front of now that can get access to
> my credentials.

Then you have stored them all on one machine, surely? In your case you
don't want that machine to be 'net accessible, but that's not
everyone's case. What I'm saying is that there are many services where
users are generally happy to access them from anywhere, and you want
to be able to support that without requiring them to do anything other
than carry stuff around in their head.

>
> However I think we're talking about something similar.  I'd definitely
> consider text to better describe the requirement provided that it did
> not make it less readable to non-security folk.

It seems to me that there's a fuzziness around what you mean by
"support passwords" and trying to nail it down in a requirements
document is going to constrain the solution space, as well as making
the requirements hard to read.

Perhaps the requirement should be that if passwords are used to
authenticate the user then they MUST be used in a way that does not
give service A a way to log in to service B, even if the user uses the
same password to access the same server.

>     >> 4.3.  No Password Equivelents
>     >>
>     >> A critical requirement is that when a user authenticates to a
>     >> website, the website MUST NOT receive a strong password
>     >> equivalent [IABAUTH].  A strong password equivalent is anything
>     >> that would allow a phisher to authenticate as a user with a
>     >> different identity provider.  Weak password equivalents MAY
>     >> only be sent when a new identity is being enrolled or a
>     >> password is changed.  A weak password equivalent allows a party
>     >> to authenticate to a given identity provider as the user.
>
>     Ben> Again, you are presupposing the necessity of
>     Ben> passwords. Surely this should be "no authentication
>     Ben> credential equivalents".
>
> I'm quite certain that passwords will be the common case.  You're
> correct that the requirement is that credentials are not sent.  I
> think the text of the requirement makes that clear; if not I'd
> appreciate revisions.  I believe the title is more readable to
> non-security audiences than your proposed title.

I agree that it is likely to be the common case. The language should
not make it the only case. If you use "authentication credential"
instead of "password", then it fixes the problem, surely?

>
>
>     >> The second implication of this requirement is that if an
>     >> authentication token is presented to a website, the website
>     >> MUST NOT be able to modify the token to authenticate as the
>     >> user to a third party.  The party generating the token must
>     >> cryptographically bind it to either the website that will
>     >> receive the token or to a key known only to the user.
>
>     Ben> Once more you are presupposing the solution. One-time
>     Ben> passwords work find for this purpose but are not
>     Ben> (necessarily) cryptographically bound to anything.
>
>
> I don't see how one-time passwords that are not bound to a particular
> recipient meet the requirement.  If I have a one time password and am
> trying to authenticate to Bob, but accidentally give the password to
> BOb, I don't want BOb to be able to take the (as-yet unused) one-time
> password and give it to Bob.
>
> I'm also sort of confused about how you have a one time password that
> is not cryptographically bound to a specific relying party.  Typically
> that relying party is some backend authentication server but that
> still meets this requirement.

I agree - I think I may be wrong about this one. I'm still musing
about whether the word "cryptographically" is necessary in the text,
or whether simply stating that it is bound is the way to go.


>
>     >> and password as part of an attempt to make the phishing site
>     >> authentic.  The real target is some other confidential
>     >> information.  The user name and password are captured, but are
>     >> not verified.  After the user name and password are entered,
>     >> the phishing site collects other confidential information.
>     >>
>     >> Authentication of the server at the TLS level and
>     >> authentication of the client within the TLS session is not
>     >> sufficient.  AS discussed previously the attacker can direct
>     >> the user to a site that the attacker controls so the TLS
>     >> authentication will succeed.  So an authentication solution for
>     >> phishing MUST detect the situation where the server ignores or
>     >> does not participate in the authentication.
>
>     Ben> This doesn't follow - the situation you have described is one
>     Ben> where the server _does_ participate in authentication. The
>     Ben> problem is that they are not the server the user thinks they
>     Ben> are,.
>
> The server participates in the TLS authentication but does not
> participate in other authentication layers.  For example on todays
> web, the server accepts but does not verify a password filled into an
> HTML form.  Again, rewording is appreciated.

OK, I see what you mean, but now I'm puzzled why you say
authentication of the client at the TLS layer is not sufficient? If I
use a client cert to authenticate, surely it doesn't matter whether I
authenticate to the correct server of a phisher - the phisher cannot
reuse my cert to access the real server.


>
>     >>
>     >> The authentication system MUST guarantee to the user and the
>     >> target server that the response is generated by the target
>     >> server and will only be seen by parties authorized by either
>     >> the target server or the user.
>
>     Ben> The requirement, surely, is that the response is not _useful_
>     Ben> to eavesdroppers, rather than not seen. There are plenty of
>     Ben> protcols that can be run totally in the clear that leave
>     Ben> nothing useful for an observer (e.g. Diffie-Hellman key
>     Ben> agreement).
>
> Would it help to clarify that I mean the decrypted contents of the
> HTTP response?

Yes. Though I'd prefer it if we didn't insist that it was the HTTP
response that was decrypted.


>     >> 1.  The target server can provide a certificate issued by the
>     >> identity provider as part of the authentication.
>     >>
>     >> 2.  The identity provider can explicitly approve the identity.
>     >> For example in a redirect-based scheme the identity provider
>     >> knows the identity of the relying party before providing claims
>     >> of identity to that party.  A similar situation happens with
>     >> Kerberos.
>
>     Ben> A general criticism, but particularly apropos in this
>     Ben> section: you appear to have no concern for the privacy of the
>     Ben> user. It should be possible to authenticate without revealing
>     Ben> to the identity provider who you are authenticating to.
>
> You're correct that I personally care very little about that form of
> privacy.  However you'll note that I explicitly mention an option
> allowing you to meet this requirement while maintaining privacy.
> See 1 above.

I don't understand how 1 maintains privacy. In any case, it seems to
me that a requrement should be that solutions can preserve the user's
privacy, should the user wish to have it preserved.

>
>     Ben> Incidentally, you've suddenly started talking about identity
>     Ben> providers without saying what they are.
>
> Yes.  I'm not entirely sure how to fix that without making the draft
> less general.  Suggestions welcome.

You could define an identity provider (or some other term) as a third
party that participates in authentication.

>     >> The risk of dictionary attack is always a significant concern
>     >> for password systems.  Users can (but typically do not)
>     >> minimize this risk by choosing long, hard to guess phrases for
>     >> passwords.  The risk can be removed once a password is already
>     >> established by using a zero-knowledge password protocol.
>
>     Ben> This just isn't true. An attacker can always assume the role
>     Ben> of the client and try to authenticate using their dictionary
>     Ben> of passwords.  This works no matter what the authentication
>     Ben> mechanism is. If the attacker is the server then they can do
>     Ben> this very efficiently (since they do not have to do it over
>     Ben> the network).
>
> You are of course correct.  What I meant to say is that the risk of
> offline dictionary attack can be removed for attackers other than the
> server if ZKPPs are used.

If the attacker is someone other than the server, then all you need is
for the authentication to have been encrypted, surely?

>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 14:21:41 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G15oi-0003wf-3P; Thu, 13 Jul 2006 14:21:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G15oh-0003wI-4u
	for dix@ietf.org; Thu, 13 Jul 2006 14:21:39 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G15of-00048E-RJ
	for dix@ietf.org; Thu, 13 Jul 2006 14:21:39 -0400
Received: from [132.219.26.110] (h1a6e-net84db.lab.risq.net [132.219.26.110]
	(may be forged)) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6DILZIQ062704
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Thu, 13 Jul 2006 11:21:36 -0700 (PDT)
	(envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
In-Reply-To: <p07000c31c0d6e2f2e60b@[12.105.228.215]>
References: <p07000c31c0d6e2f2e60b@[12.105.228.215]>
Content-Type: text/plain; charset=US-ASCII; format=flowed
Message-Id: <D1ACA80B-A4D1-47F9-861C-5AAEF29E5CCD@sxip.com>
Content-Transfer-Encoding: 7bit
From: Dick Hardt <dick@sxip.com>
Date: Thu, 13 Jul 2006 14:21:33 -0400
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.5 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea
Subject: [dix] hook up before WAE?
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Hi Pete

	Would you have time to sync up before the WAE BOF tomorrow?

-- Dick


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 14:25:40 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G15sa-0004ka-Kp; Thu, 13 Jul 2006 14:25:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G15sY-0004kV-R2
	for dix@ietf.org; Thu, 13 Jul 2006 14:25:38 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G15sX-0004e2-GP
	for dix@ietf.org; Thu, 13 Jul 2006 14:25:38 -0400
Received: from [132.219.26.110] (h1a6e-net84db.lab.risq.net [132.219.26.110]
	(may be forged)) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6DIPXUH063327
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Thu, 13 Jul 2006 11:25:34 -0700 (PDT)
	(envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
In-Reply-To: <D1ACA80B-A4D1-47F9-861C-5AAEF29E5CCD@sxip.com>
References: <p07000c31c0d6e2f2e60b@[12.105.228.215]>
	<D1ACA80B-A4D1-47F9-861C-5AAEF29E5CCD@sxip.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <626225A5-C841-46D6-A75F-820794F0F4DB@sxip.com>
Content-Transfer-Encoding: 7bit
From: Dick Hardt <dick@sxip.com>
Subject: Re: [dix] hook up before WAE?
Date: Thu, 13 Jul 2006 14:25:32 -0400
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.5 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9182cfff02fae4f1b6e9349e01d62f32
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Oops, meant to sent that to Pete. But my next note was to the list  
anyway ...

... anyone interested in having dinner tonight?

My cel is 604.808.4842.

-- Dick

On 13-Jul-06, at 2:21 PM, Dick Hardt wrote:

> Hi Pete
>
> 	Would you have time to sync up before the WAE BOF tomorrow?
>
> -- Dick
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 16:56:48 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G18Ep-0000Ht-5N; Thu, 13 Jul 2006 16:56:47 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G18Eo-0000Ho-QT
	for dix@ietf.org; Thu, 13 Jul 2006 16:56:46 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G18En-00080V-Fi
	for dix@ietf.org; Thu, 13 Jul 2006 16:56:46 -0400
Received: from [172.17.152.143] ([66.46.95.226]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6DKt2kG068225
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Thu, 13 Jul 2006 13:56:44 -0700 (PDT)
	(envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Transfer-Encoding: 7bit
Message-Id: <C46D9507-04B2-4B44-A0CB-907C0784D54A@sxip.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
To: Digital Identity Exchange <dix@ietf.org>
From: Dick Hardt <dick@sxip.com>
Date: Thu, 13 Jul 2006 16:56:43 -0400
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2870a44b67ee17965ce5ad0177e150f4
Subject: [dix] WAE dinner meetup tonight
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

A few of us are meeting at the W lobby at 7:30 to head out for dinner  
if anyone else would like to join us.

-- Dick

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 19:10:48 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1AKU-0005S4-HF; Thu, 13 Jul 2006 19:10:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1AKT-0005Rz-6r
	for dix@ietf.org; Thu, 13 Jul 2006 19:10:45 -0400
Received: from colibri.verisign.com ([65.205.251.74])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1AKR-0004NZ-S9
	for dix@ietf.org; Thu, 13 Jul 2006 19:10:45 -0400
Received: from mou1wnexcn01.vcorp.ad.vrsn.com (mailer1.verisign.com
	[65.205.251.34])
	by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id k6DNAhbB011302
	for <dix@ietf.org>; Thu, 13 Jul 2006 16:10:43 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	mou1wnexcn01.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Thu, 13 Jul 2006 16:10:42 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [dix] WAE dinner meetup tonight
Date: Thu, 13 Jul 2006 16:10:36 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD6352@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [dix] WAE dinner meetup tonight
Thread-Index: AcamvuAtfE6D5j5hTfKKk17jcKnXpQAEpfpA
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Digital Identity Exchange" <dix@ietf.org>
X-OriginalArrivalTime: 13 Jul 2006 23:10:42.0802 (UTC)
	FILETIME=[906C2520:01C6A6D1]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 79899194edc4f33a41f49410777972f8
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

The IAB session will run until at least then but is due to finish by =
7:30 any chance you could wait a little longer?=20

> -----Original Message-----
> From: Dick Hardt [mailto:dick@sxip.com]=20
> Sent: Thursday, July 13, 2006 4:57 PM
> To: Digital Identity Exchange
> Subject: [dix] WAE dinner meetup tonight
>=20
> A few of us are meeting at the W lobby at 7:30 to head out=20
> for dinner if anyone else would like to join us.
>=20
> -- Dick
>=20
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>=20
>=20

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 19:17:33 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1AR3-0006qo-7e; Thu, 13 Jul 2006 19:17:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1AR1-0006qj-Rm
	for dix@ietf.org; Thu, 13 Jul 2006 19:17:32 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1AR0-0004vd-Fl
	for dix@ietf.org; Thu, 13 Jul 2006 19:17:31 -0400
Received: from [172.17.152.143] ([66.46.95.226]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6DNFtuM074799
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Thu, 13 Jul 2006 16:17:29 -0700 (PDT)
	(envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
In-Reply-To: <198A730C2044DE4A96749D13E167AD37BD6352@MOU1WNEXMB04.vcorp.ad.vrsn.com>
References: <198A730C2044DE4A96749D13E167AD37BD6352@MOU1WNEXMB04.vcorp.ad.vrsn.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <2D60424D-FABB-46E7-ACFA-821D1C38B93C@sxip.com>
Content-Transfer-Encoding: 7bit
From: Dick Hardt <dick@sxip.com>
Subject: Re: [dix] WAE dinner meetup tonight
Date: Thu, 13 Jul 2006 19:17:28 -0400
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

You can call me on my cel to see where we are going. 604.808.4842

On 13-Jul-06, at 7:10 PM, Hallam-Baker, Phillip wrote:

> The IAB session will run until at least then but is due to finish  
> by 7:30 any chance you could wait a little longer?
>
>> -----Original Message-----
>> From: Dick Hardt [mailto:dick@sxip.com]
>> Sent: Thursday, July 13, 2006 4:57 PM
>> To: Digital Identity Exchange
>> Subject: [dix] WAE dinner meetup tonight
>>
>> A few of us are meeting at the W lobby at 7:30 to head out
>> for dinner if anyone else would like to join us.
>>
>> -- Dick
>>
>> _______________________________________________
>> dix mailing list
>> dix@ietf.org
>> https://www1.ietf.org/mailman/listinfo/dix
>>
>>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 19:31:47 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1Aeo-0001dR-Ug; Thu, 13 Jul 2006 19:31:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Aeo-0001dM-37
	for dix@ietf.org; Thu, 13 Jul 2006 19:31:46 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1Aen-0005ic-1M
	for dix@ietf.org; Thu, 13 Jul 2006 19:31:46 -0400
Received: from [172.17.152.143] ([66.46.95.226]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6DNVffI075446
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT);
	Thu, 13 Jul 2006 16:31:42 -0700 (PDT) (envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Transfer-Encoding: quoted-printable
Message-Id: <FB325DF2-432E-4B98-B9D4-3B096008BEE8@sxip.com>
Content-Type: text/plain; charset=WINDOWS-1252; delsp=yes; format=flowed
To: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
From: Dick Hardt <dick@sxip.com>
Date: Thu, 13 Jul 2006 19:31:40 -0400
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b6435b1bfa5977f2eb96dc7e52434b6d
Cc: 
Subject: [dix] Stab at grouping of problem
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

After a number of hallway conversations I came to the following view=20=20
on the breaking down the problem and the desirable features:
(I reference Ekr's labels where applicable for sake of brevity,=20=20
included below for convenience)

1A) Phishing of Account credentials - bad guy getting account name=20=20
and password
Desirable solution features are:
	Ekr=92s CRC, HRA, PC?, CUC, CI?  (I am not certain on PC and CI)


1B) Phishing of Identity attributes - bad guy getting personal=20=20
identifying information
Desirable solution features are:
	i) Certainty of website identity (a factor in above, but since the=20=20
user may not have authenticated, it is different)
	ii) Secure channel to prevent eavesdropping (solved today with SSL/TLS)

2) Software Assisted Attribute Exchange - this is having software=20=20
assist the user in the acquisition and presentation of identity=20=20
attributes. The messages to do this include: request, response, store.
Desirable solution features are:
	Ekr=92s FPI, CI?, UFN?, AEC, IAC, PA

-- Dick

----------------

	From: 	  ekr@networkresonance.com
	Subject: 	[Ietf-http-auth] Notes on Web authentication enhancements
	Date: 	June 19, 2006 2:59:29 PM PDT (CA)
	To: 	  dix@ietf.org, ietf-http-auth@lists.osafoundation.org

There's obviously a lot of interest in working on various enhancements
to Web and Web Services applications. Unfortunately, after reading
the various drafts and mailing list postings produced by the proponents
of various technologies, I don't come away with the sense that people
have a common view of what is needed. This message is a first cut
at a taxonomy of requirements/features and technical options.

BACKGROUND: THE CURRENT STATE OF HTTP AUTHENTICATION
----------------------------------------------------
HTTP has two native authentication mechanisms, Basic Authentication
(passwords in the clear in an HTTP header) and Digest Authentication
(a challenge-response handshake also in the HTTP header). Both
mechanisms depend on the client proving the possession of a shared
secret string (a password in all real cases) to the server. The
server is unauthenticated.

For a variety of reasons, including bad UI on the clients, nearly
all real-world Web applications use neither mechanism but rather
use an HTML form to prompt the user for his password. This
password is then sent in the clear over the HTTP connection.
The standard security advice for how to secure this data is to
use HTTPS (HTTP over SSL/TLS) to encrypt the entire channel
and use the server's certificate to authenticate the server.
Practical difficulties with checking the certificate have led
to phishing attacks, in which the attacker gathers the user's
password and can then impersonate the user. An additional problem
is that it's hard for Web Services apps (e.g., DAV) to use this
kind of mechanism because HTML may not be involved and so if
it works at all you end up resorting to screen-scraping.

In principle, if you run HTTPS, you can leverage HTTPS's
client authentication mechanisms (client certificates and
"pre-shared keys") to authenticate the client, but in practice
this is not done, probably due to UI reasons and lack of
familiarity with the TLS mechanisms (this applies in particular
to PSK).



DESIRABLE FUNCTIONALITY
-----------------------
As I mentioned above, a lot of different types of functionality
have been discussed. In this section, I try to break these down
into a set of somewhat independent functions, with the intention
that we can end up saying that we want a system that provides
function X and not Y. These all have sort of lame names that I
thought of on the spot.


1. Capture-Resistant Credentials (CRC)
Credentials which are designed so that if you authenticate
to relying party (RP) X, X cannot use them to impersonate you to RP Y
(even if your intention was to go to Y). Phishing is based
on the fact that passwords do not have this property.
The rationale for this feature is to make phishing-type
attacks difficult.

2. Hijack-Resistant Authentication (HRA)
An authentication system in which credentials which are bound to
protocol messages in such a way that attacker who observes the
credentials can't use them to authenticate messages of their
choice. The rationale for this feature is to make cut-and-paste
attacks difficult.

3. Portable Credentials (PC)
The nice thing about passwords is that you can memorize your
password and then use it anywhere. The rationale for this is
to make it easy for people to use credentials on multiple
computers.

4. Fill-in of Personal Information (FPI)
One of the common complaints about Web form registration systems
is the need to repeatedly type in your user information. Think of this
as automatic form fill-in on steroids. The rationale for this
feature is to avoid repeated typing of this kind of information.

5. Common User Credentials (CUC)
One way to limit the damage from credential compromise is to
have each RP use a separate credential and force the user
to make them independent (e.g., a separate password for each
RP.) This is inconvenient, of course. CUC means that at
the number of separate credentials that the user handles is
small (if not 1). The rationale for this feature is to minimize
user attention and storage overhead.

6. Continuity of Identity (CI)
The ability to prove to some RP that you are the same
user as was involved in some other transaction. The rationale
for this feature is to have a cheap form of personal
"account" for systems like blog comments, message boards,
etc.

7. User-Friendly Names (UFN)
The ability to prove possession of some non-random-appearing
name. The reason to separate this out is that one natural
way to provide CI is simply to generate some random asymmetric
key pair and use that (or its digest) as your identity. This
name is not user friendly. Note that this is the first requirement
in this list that appears to require a third party (to assign
the names). The rationale for this feature is that random names
are hard to remember.

8. Assertion of External Claims (AEC)
The ability to demonstrate some real-world fact about the user
(e.g., I am a certain age, this is my address, etc.) to the
RP. The rationale for this feature is that there are contexts
in which the relying party needs to be able to establish this
sort of information.

10. Independent Assertion of Claims (IAC)
The ability to assert claims independently so that the user
could (for instance) demonstrate their age to the RP without
without revealing their address. The rationale for this
feature is to protect the user's privacy.

11. Private Authentication (PA)
Some third-party authentication systems require an interaction
with the 3rd party for each authentication. In some such systems,
the 3rd party knows the relying party for each authentication
and the claims which were asserted. PA means that the 3rd party
does not get that information. The rationale for this feature
is to protect the user's privacy from the 3rd party.


ARCHITECTURAL CHOICES
---------------------
In this section, we survey a number of potential architectural options.
This list isn't exhaustive, but is just intended to give a flavor
of the major available choices beyond the simple two-party
username-password schemes we have now. Note that I use a lot
of PKIX-type terminology below, but the concepts are generic
and can be extended to something more SAML-oid or
something-else-oid.


BARE CRYPTOGRAPHIC IDENTIFIER
After username/password, probably the most familiar sort of
remote identifier is a bare public key. The way this is
used is familiar from SSH: the user generates a public key
and provides the key (or fingerprint) to the relying party
(or parties). He can then sign with the private key to
prove possession.

User                                     RP
----                                     --
[Personal Info], K_pub ->                        \  Registration
                                       <- OK      /  Phase

Sign(K_priv, Something) ->                       \  Use
                                  <- Service      /  Phase

In the Registration phase, the user provides his registration info
to the relying party (site) along with the public key. The
RP stores the data somewhere. In the Use phase the user signs
something with his key to prove his identity.

Properties:
If properly embedded in a protocol (it's easy to get this wrong),
this scheme can provide:

CRC -- the RP only has K_pub
HRA -- you can cryptographically bind the requests to the key
CUC -- you can use the same K_pub, K_priv pair over and over
CI  -- you use the same identity every time even if nobody
        knows who you are.
PA  -- there's no third-party to know anything about the
        exchange

With an automated form fillin scheme like that specified in DIX,
you could also provide FPI.


IDENTITY CERTIFICATES
One of the major inconveniences in dealing with bare cryptographic
identifiers is that that names look basically random: they're
just public keys or hashes of public keys. This is a particular
problem if two RPs want to communicate about a user through
some human-based protocol, i.e., "Don't trust bob@example.com"

The natural way to deal with this problem is to have certificate
authorities which are responsible for sections of the namespace and
can issue certificates with user-friendly names.

These certificates can come in two flavors:

1. Real-world identity certificates.
2. Unique-identity certificates

Real-world identity certificates are familiar from the HTTPS
world: an SSL certificate from VeriSign is an assertion that
the certificate holder is the actual owner/operator of a
given domain. A unique-identity certificate is just a promise
from a CA not to issue any other certificates with the same
username.

Either form of identity certificate allows you to have nice
userfriendly names (or at least more userfriendly than random
numbers). The protocol looks something like this:

User                                     CA
----                                     --
[Personal Info], K_pub ->                        \  Certificate
                                       <- OK      /  Issuance


The user gets a certificate (possibly covering some personal
info) from the CA. They can then use this certificate much
in the same way they used a bare key, by registering with
the RP and then getting service.

User                                     RP
----                                     --
[Personal Info], Cert ->                         \  Registration
                                       <- OK      /  Phase

Sign(K_priv, Something) ->                       \  Use
                                  <- Service      /  Phase

Note that some people also think of the mere possession of a
credential, even if it has no underlying AEC semantics as
worth something. I.e., this person registered *somewhere*
and I know that about them. This makes sense in contexts like
blog comment authentication where you are just trying to erect
a minimal registration barrier.


Properties:
This scheme has most of the same properties as the bare cryptographic
identifiers, but also has at minimum User Friendly Naming (UFN).
In addition, if the certificates are real-world identity certificates,
it provides a very limited form of AEC, namely "this person has
the right to this e-mail address, domain name, etc."


SIGNATURE + KEY SERVER
Both bare cryptographic identifiers and identity certificates suffer
from portability problems. The part of your identifier that you need
available to you at authentication time is a fairly long random number
that most people won't be willing to memorize. [0] The natural
approach is to carry the data around on a token (USB key, PCMCIA
card, etc.) but this seems unattractive to many. Another option is
to use a SACRED-type server to store the key and then let the user
fetch it at whatever computer they are at. SIP is also considering
a similar technique for moving keys between handsets (see
(draft-ietf-sip-certs)

Properties:
Same as underlying authentication scheme + Portable Credentials.


ATTRIBUTE CERTIFICATES
The clear problem with all the schemes mentioned so far is that
they only provide very limited AEC, which a lot of people clearly
want. The standard solution for combining AEC with public-key-based
authentication systems is to use attribute certificates:
certificates that assert a certain fact about the holder of key
K, such as:

"The person who holds key K is an American citizen."

In PKIX these are often (always?) tied to some actual 3rd-party
certificate but from an architectural perspective, they could be tied
to a bare key. Attribute certificates can also be used to provide
IAC: you have a bundle of attribute certs with one for each claim
you wish to assert and you simply provide the relevant certs
to the RP.

The basic protocol looks like this:


User                                     CA
----                                     --
[Personal Info], K_pub ->                        \  Certificate
                            <- AC1 (Over 21)       > Issuance
                         <- AC2 (US Citizen)      /


In the Certificate Issuance phase, the user proves to the
CA the claims that he wants the CA to vouch for and the
CA gives him ACs for those claims.

User                                     RP
----                                     --
Sell me beer ->                               \
                          <- Prove you're 21    \ Use
Sign(K_priv, Something), AC ->                 / Phase
                                  <- Service   /

In the use phase, the RP indicates which claims he wants the
user to demonstrate and the user provides the appropriate
ACs and demonstrates that he has the corresponding key.
Of course, for any attributes for which you have ACs, you
also get some FPI for free as part of the authentication.

Properties:
CRC, HRA, FPI (Some), PC (if used with key server), CUC, CI,
UFN, AEC, IAC, PA


IDENTITY PROVIDERS
A lot of the designs that people seem interested in involve
Identity Providers (IdP). An IdP is a server that offers
interactive identity claims. (One way to think of this is
as a real-time CA). There are a bunch of different
topologies, but the basic idea is as below:

User                           IdP
----                           ---
[Personal Info], Auth Info ->       \  Registration
                              <- OK  /  Phase

The user registers with the IdP and (optionally) proves
the claims that he wishes the IdP to assert later. The
user needs to establish some sort of authentication
credential with the IdP so that he can authenticate
later. This can be a password or a public key pair (as
above).

Later, when he wants to actually use his identity, we
get an exchange like this:


User                      RP                       IdP
----                      --                       ---
Sell me beer ->
           <- Prove you're 21

IdP, help me!                                   ->
           <---------- Auth exchange ------------->
                                          <- Credential

Credential ->
                        <- OK

When the user requests service, the RP prompts them for their
identity (or in the case above, to prove some claims). The
User then contacts the IdP and proves their identity
(authenticates as the person who previously registered)
and gets a credential. He Then provides the credential to the
RP, who provides the service.

There are a lot of ways to implement this general architecture
and they all have different properties.

Properties:
At minimum, IdP based schemes provide:
PC  -- you can contact the IdP from anywhere
CUC -- you only need to authenticate to the IdP and then can
        leverage that to authenticate everywhere
CI  -- you use the same IdP acct over and over
UFN -- the IdP can issue you some easy name

If the IdP makes claims about you, then you can also have FPI, AEC and
IAC. In general, because the IdP knows which claims you're asserting
for a given RP, you do not get PA. There are, however, ways to provide
this feature, but often the contrary is part of the design of the
system.

A lot of the variation in IdP schemes is the implementation of
the authentication, both from the user to the IdP and from the
IdP (and user) to the RP. There's too much variation to discuss
here, but I'll cover a few high points.


Authentication to the IdP:
Part of the point of an IdP scheme is that you authenticate to
the IdP in order to get your credentials. Obviously, this
authentication can be done in a lot of ways. Some of them
allow phishing, credential capture, etc. It's clearly
desirable to couple an IdP scheme with some sort of
auth scheme that provides CRC and probably HRA.

Binding of credentials to requests:
In an IdP scheme, the IdP provides some token to the user that is then
provided to the RP. This token may or may not be cryptographically
bound to the messages that the user is sending to the RP. If this
is not done, then the user<->RP protocol is potentially susceptible
to hijacking.

Note that it's well understood how to design both of these protocols
securely. However, it involves more changes to the current
implementations of Web and WS protocols.


TRANSPORTING/BINDING CREDENTIALS
--------------------------------
The discussion above has focused primarily on dataflow, but
from the perspective of implementation/deployment, how you
transport and bind the credentials to the PDUs they're
authenticating matters. Note that to some extent this is
orthogonal to the type of authentication architecture you're
using. You can, for instance, use public key signatures
with multiple binding/transport mechanisms.

There are three commonly proposed transport/binding methods:

CRYPTOGRAPHIC BINDING INSIDE HTTP
If you're using public key for authentication, the natural approach is
to simply have the credentials bound directly to the HTTP PDUs they
vouch for. So, the PDU would contain a signature line that covered the
request itself. This is what, for example, S-HTTP does.

In systems like this, additional credentials (ACs, SAML assertions,
etc.) are just carried in the message and the whole thing is bound
together with the signature. Something like this:

          POST / HTTP/1.0
          X-Attribute-Cert: <insert A-C here>
          X-Signature: XXX

          Post arguments

The signature is computed over the entire message and headers (except
for the signature itself, of course), or part of it (hopefully enough
to block cut-and-paste attacks).  This kind of technique, if performed
correctly, provides both CRC and HRA for the messages between the user
and the RP.

Similar techniques can be use with symmetric keys and MACs over
the PDUs. In such schemes, if you're using an IdP, then you'll
probably also have to carry around a ticket that gives the
RP the symmetric key needed to verify the message.

Implementing this kind of scheme would generally require a fair
amount of modification to the browser and server at least to
protect the messages.


SSL/TLS CLIENT AUTHENTICATION
Another approach is to do things at a layer below HTTP, typically
using SSL/TLS client authentication. Currently, SSL/TLS supports
client authentication using pre-shared keys and certificates (you can
use self-signed certs as bare keys).  draft-housley-tls-authz-extns
defines how to carry X.509 ACs and SAML assertions inside of TLS, so
these could be used as well. This technique automatically provides CRC
and HRA.

In principle, TLS clients and servers already support at least
cert-based client auth. In practice, the UI on the client
is so bad that you would almost certainly need to clean it up
quite a bit in order to make this kind of system usable.


CARRIED NONCRYPTOGRAPHICALLY INSIDE HTTP
One approach that comes up quite a bit is to just embed
authentication tokens (typically generated by an IdP) in
the HTTP messages that go from the user to the RP (DIX is
an example of such a scheme). In this system, the tokens
themselves are "bearer"--they enable any holder to impersonate
the user. In order to protect against token capture, the tokens
are generally made specific to the RP, so that one RP can't
use them to impersonate the user to another.

An additional issue is hijacking: without cryptographic
binding, an attacker who observes a request can make future
requests in the name of the user via a cut-and-paste attack
(remember, the token is bearer). If you take the threat of
this type of attack seriously, you need to run the traffic
over SSL/TLS. [1]

The primary attraction of this kind of design is that it
may be implementable without changing the client software
at all (again, see DIX). Many people see that as important
for deployment.


-Ekr


[0] You can use asymmetric key pairs generated from passwords,
but even with the application of key stretching techniques, this
makes a lot of people uncomfortable.

[1] Note that if you're worried about this class of attack, you need
*every* PDU to be cryptographically bound to the credential with
all designs. If, for instance, you use cert-based auth but then
transition to cookies over HTTP for state management, there's a
cut-and-paste attack there.



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Jul 13 20:43:27 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1BmA-0005Fd-Iz; Thu, 13 Jul 2006 20:43:26 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Bm9-0005FY-G5
	for dix@ietf.org; Thu, 13 Jul 2006 20:43:25 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1Bm6-0000Af-3o
	for dix@ietf.org; Thu, 13 Jul 2006 20:43:25 -0400
Received: from evilmonkey.corp.google.com (evilmonkey.corp.google.com
	[172.24.0.124]) by smtp-out.google.com with ESMTP id k6E0hJjo009256
	for <dix@ietf.org>; Thu, 13 Jul 2006 17:43:19 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:mime-version:
	content-type:content-transfer-encoding:content-disposition;
	b=LiaOVVCxQburH1Zs1quwnwcHM2LwxaksGOGU2uV8eSZJNAYoabdei9qSicLF67k1/
	X8FIytS+IWe8132ADm9+g==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by evilmonkey.corp.google.com with ESMTP id k6E0G3I7006179
	for <dix@ietf.org>; Thu, 13 Jul 2006 17:43:15 -0700
Received: by smtp-out2.google.com with SMTP id 16so193409fpe
	for <dix@ietf.org>; Thu, 13 Jul 2006 17:43:15 -0700 (PDT)
Received: by 10.253.14.20 with SMTP id 20mr936014fpn;
	Thu, 13 Jul 2006 17:43:15 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Thu, 13 Jul 2006 17:43:14 -0700 (PDT)
Message-ID: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
Date: Thu, 13 Jul 2006 20:43:14 -0400
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>,
	"IETF HTTP Auth" <ietf-http-auth@lists.osafoundation.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e5ba305d0e64821bf3d8bc5d3bb07228
Cc: 
Subject: [dix] More requirements
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On the plane to IETF I realised that there were several more potential
requirements to add to ekr's list:

12. Single Site Unlinkability (SSU)
The user should be able to visit the same site multiple times without
the site being able to tell that it is the same user, even if the user
is, for example, asserting the same external claims each time. This
protects the user's privacy. Obviously if data provided by the user is
unique to that user (for example, age and address combined are often
sufficient to uniquely identify a person) then no amount of cleverness
can provide SSU, but SSU should be available to the extent permitted
by the uniqueness of the data provided.

13. Multiple Site Unlinkability (MSU)
The user should be able to visit multiple sites without the sites
being able to collude to correlate the data provided by the user. This
is a weaker requirement than SSU (that is, MSU does not guarantee
SSU). Again, this protects the user's privacy.

14. Attack Resistant Credentials (ARC)
Credentials should be such that the (computationally limited) verifier
cannot reconstruct the original credential by brute force. Note that
the impossibility of this may rely on the user choosing strong
secrets, which is often unlikely, for example where the sole source of
entropy is a password.

15. Claim Minimality (CM)
The ability to show only exactly what is needed, (for example, the
user is over 21 rather than the user's exact age, or if there are
mutlple claims the ability to show a subset). This improves privacy
and reduces linkability.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 00:07:35 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1Exh-0005Zp-7t; Fri, 14 Jul 2006 00:07:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Exf-0005Td-8U
	for dix@ietf.org; Fri, 14 Jul 2006 00:07:31 -0400
Received: from oak.neustar.com ([209.173.53.70])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1EqT-0002Nz-2Q
	for dix@ietf.org; Fri, 14 Jul 2006 00:00:06 -0400
Received: from [127.0.0.1] (stsc1260-corp-dns.va.neustar.com [209.173.53.65])
	by oak.neustar.com (8.12.8/8.12.8) with ESMTP id k6E3xx1v004409;
	Fri, 14 Jul 2006 04:00:04 GMT
Message-ID: <44B716B6.4080702@neustar.biz>
Date: Thu, 13 Jul 2006 20:59:50 -0700
From: Jeff Hodges <Jeff.Hodges@neustar.biz>
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: WAE topic/problem scope (was: Stab at grouping of problem (was: Re:
	[dix] Agenda bashing))
References: <FB325DF2-432E-4B98-B9D4-3B096008BEE8@sxip.com>
In-Reply-To: <FB325DF2-432E-4B98-B9D4-3B096008BEE8@sxip.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 3e15cc4fdc61d7bce84032741d11c8e5
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Just to attempt to help clarify, in my understanding WAE was begot by the 
conflation of three topic areas..

  1. in-protocol authentication (for HTTP)

     e.g. that which is defined within the HTTP spec set itself and is
     used by an HTTP client to authn directly with an HTTP server. Presently
     the two available mechanisms are Basic and Digest. There are use cases,
     eg CalDAV, that would ostensibly benefit from a wider range of
     in-protocol HTTP authn mechanisms. My understanding is that this was the
     motivation for creating the ietf-http-auth@ list.


  2. application-level authentication/SSO and attribute sharing (for HTTP-based
     web-oriented (eg portal-based) apps)

     This is a well-trod area with a plethora of existing solution approaches
     which are deployed to varying extents: SAML web sso profiles, Liberty
     ID-FF, Shib, OpenID, SXIP(/DIX), LID, WS-Federation, RoboForm, etc. The
     primary reason this topic is on the table in this venue is a perception
     that perhaps "more" can be done in order to facilitate wider and more quick
     adoption amongst websites in the wider Internet, eg "the blogosphere".
     This was the motivation for creation of the dix@ list.


  3. anti-phishing

     The motivation why this is on the list is obvious.
     Effective overall solutions will involve a large component of user
     interface (UI) approaches. Some would argue that the UI aspects are the
     first-order ones (and this is not a typical IETF problem domain). Though
     as well as UI, any solutions will likely rely on capabilities/properties
     obtained from solutions to 1 and/or 2 above, and may require specific
     capabilities/properties that 1 and/or 2 don't otherwise provide.


At this point, it isn't clear to me that the WAE BoF represents just one 
overall "problem" to solve. Each of these are large distinct topic areas in 
their own right, though they do intersect. It will be a challenge to not 
short-shrift one or more of them. It should be an entertaiing discussion.


JeffH













_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 08:04:31 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1MPE-0001om-S5; Fri, 14 Jul 2006 08:04:28 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1MPD-0001oh-Pb
	for dix@ietf.org; Fri, 14 Jul 2006 08:04:27 -0400
Received: from [132.219.27.70] (helo=delta.rtfm.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1MPB-0000cT-IA
	for dix@ietf.org; Fri, 14 Jul 2006 08:04:27 -0400
Received: by delta.rtfm.com (Postfix, from userid 1001)
	id 2D7C41CC29; Fri, 14 Jul 2006 05:03:27 -0700 (PDT)
To: "Ben Laurie" <benl@google.com>
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
From: EKR <ekr@networkresonance.com>
Date: Fri, 14 Jul 2006 05:03:26 -0700
In-Reply-To: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
	(Ben Laurie's message of "Thu, 13 Jul 2006 20:43:14 -0400")
Message-ID: <86wtag5r75.fsf@delta.rtfm.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
Cc: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
Subject: [dix] Re: [Ietf-http-auth] More requirements
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

"Ben Laurie" <benl@google.com> writes:

> On the plane to IETF I realised that there were several more potential
> requirements to add to ekr's list:
>
> 12. Single Site Unlinkability (SSU)
> The user should be able to visit the same site multiple times without
> the site being able to tell that it is the same user, even if the user
> is, for example, asserting the same external claims each time. This
> protects the user's privacy. Obviously if data provided by the user is
> unique to that user (for example, age and address combined are often
> sufficient to uniquely identify a person) then no amount of cleverness
> can provide SSU, but SSU should be available to the extent permitted
> by the uniqueness of the data provided.

This is an interesting requirement and obviously of value, but
it's worth noting that there are contexts in which linkability
(CI) is precisely what's desired--blog comments, for example.

So, you wouldn't want to design a system that always provided
SSU. :)


> 15. Claim Minimality (CM)
> The ability to show only exactly what is needed, (for example, the
> user is over 21 rather than the user's exact age, or if there are
> mutlple claims the ability to show a subset). This improves privacy
> and reduces linkability.

Note that this ties in with IAC.

-Ekr



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 08:38:36 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1MwG-0004R0-8q; Fri, 14 Jul 2006 08:38:36 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1MwE-0004Qv-Vq
	for dix@ietf.org; Fri, 14 Jul 2006 08:38:34 -0400
Received: from mxout3.cac.washington.edu ([140.142.32.166])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1MwD-0003v8-L6
	for dix@ietf.org; Fri, 14 Jul 2006 08:38:34 -0400
Received: from smtp.washington.edu (smtp.washington.edu [140.142.32.139])
	by mxout3.cac.washington.edu (8.13.6+UW06.06/8.13.6+UW06.03) with ESMTP
	id k6ECcWl1007679; Fri, 14 Jul 2006 05:38:32 -0700
X-Auth-Received: from h1065-net84db.lab.risq.net (h1065-net84db.lab.risq.net
	[132.219.16.101] (may be forged))
	(authenticated authid=rlmorgan)
	by smtp.washington.edu (8.13.7+UW06.06/8.13.7+UW06.03) with ESMTP id
	k6ECcUEQ016265
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Fri, 14 Jul 2006 05:38:32 -0700
Date: Fri, 14 Jul 2006 08:38:55 -0400 (EDT)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-X-Sender: rlmorgan@perf.cac.washington.edu
To: EKR <ekr@networkresonance.com>, Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Re: [Ietf-http-auth] More requirements
In-Reply-To: <86wtag5r75.fsf@delta.rtfm.com>
Message-ID: <Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
	<86wtag5r75.fsf@delta.rtfm.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-PMX-Version: 5.2.0.264296, Antispam-Engine: 2.4.0.264935,
	Antispam-Data: 2006.7.14.52432
X-Uwash-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CT_TEXT_PLAIN 0,
	__HAS_MSGID 0, __MIME_TEXT_ONLY 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 93238566e09e6e262849b4f805833007
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


>> 12. Single Site Unlinkability (SSU)
>> The user should be able to visit the same site multiple times without
>> the site being able to tell that it is the same user, even if the user
>> is, for example, asserting the same external claims each time. This
>> protects the user's privacy. Obviously if data provided by the user is
>> unique to that user (for example, age and address combined are often
>> sufficient to uniquely identify a person) then no amount of cleverness
>> can provide SSU, but SSU should be available to the extent permitted
>> by the uniqueness of the data provided.
>
> This is an interesting requirement and obviously of value, but
> it's worth noting that there are contexts in which linkability
> (CI) is precisely what's desired--blog comments, for example.
>
> So, you wouldn't want to design a system that always provided SSU. :)

I think many of the requirements (no, haven't made a list yet) have the 
assumption of "when appropriate", or "when desired", where "desired" is 
some combination of what the user wants and what the application wants or 
will permit.

  - RL "Bob"


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 08:40:06 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1Mxi-0005Ha-AS; Fri, 14 Jul 2006 08:40:06 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Mxg-0005HU-G5
	for dix@ietf.org; Fri, 14 Jul 2006 08:40:04 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1Mxf-0004E2-3Q
	for dix@ietf.org; Fri, 14 Jul 2006 08:40:04 -0400
Received: from evilmonkey.corp.google.com (evilmonkey.corp.google.com
	[172.24.0.124]) by smtp-out.google.com with ESMTP id k6ECdvrs003154
	for <dix@ietf.org>; Fri, 14 Jul 2006 05:39:57 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=sndOTEKkZDr45r9mL478iZQMk0iq87/hWFJDelJZYhPdb2lvmm8mxSeT2pdus/Mne
	MIfpsIhRDzpMmoIcoh3tQ==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by evilmonkey.corp.google.com with ESMTP id k6ECZXNK025972
	for <dix@ietf.org>; Fri, 14 Jul 2006 05:39:54 -0700
Received: by smtp-out2.google.com with SMTP id 16so221472fpe
	for <dix@ietf.org>; Fri, 14 Jul 2006 05:39:54 -0700 (PDT)
Received: by 10.253.14.20 with SMTP id 20mr71618fpn;
	Fri, 14 Jul 2006 05:39:54 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Fri, 14 Jul 2006 05:39:54 -0700 (PDT)
Message-ID: <1b587cab0607140539l29f028f9gb5ff432d3915124e@mail.google.com>
Date: Fri, 14 Jul 2006 08:39:54 -0400
From: "Ben Laurie" <benl@google.com>
To: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
Subject: Re: [dix] Re: [Ietf-http-auth] More requirements
In-Reply-To: <Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
	<86wtag5r75.fsf@delta.rtfm.com>
	<Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e5ba305d0e64821bf3d8bc5d3bb07228
Cc: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/14/06, RL 'Bob' Morgan <rlmorgan@washington.edu> wrote:
>
> >> 12. Single Site Unlinkability (SSU)
> >> The user should be able to visit the same site multiple times without
> >> the site being able to tell that it is the same user, even if the user
> >> is, for example, asserting the same external claims each time. This
> >> protects the user's privacy. Obviously if data provided by the user is
> >> unique to that user (for example, age and address combined are often
> >> sufficient to uniquely identify a person) then no amount of cleverness
> >> can provide SSU, but SSU should be available to the extent permitted
> >> by the uniqueness of the data provided.
> >
> > This is an interesting requirement and obviously of value, but
> > it's worth noting that there are contexts in which linkability
> > (CI) is precisely what's desired--blog comments, for example.
> >
> > So, you wouldn't want to design a system that always provided SSU. :)
>
> I think many of the requirements (no, haven't made a list yet) have the
> assumption of "when appropriate", or "when desired", where "desired" is
> some combination of what the user wants and what the application wants or
> will permit.

Yeah, I see the list as being a list of things you might want, at this
stage. Presumably at some point we have to choose which things we
actually want, and which are optional or not-always-used.

>
>   - RL "Bob"
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 09:38:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1Nrq-00074u-SH; Fri, 14 Jul 2006 09:38:06 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Nrp-0006t5-Ap
	for dix@ietf.org; Fri, 14 Jul 2006 09:38:05 -0400
Received: from willow.neustar.com ([209.173.53.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1Nrn-0005nY-3i
	for dix@ietf.org; Fri, 14 Jul 2006 09:38:05 -0400
Received: from [127.0.0.1] (stsc1260-corp-dns.va.neustar.com [209.173.53.65])
	by willow.neustar.com (8.12.8/8.12.8) with ESMTP id k6EDU7QD015314; 
	Fri, 14 Jul 2006 13:30:10 GMT
Message-ID: <44B79C5B.8070103@neustar.biz>
Date: Fri, 14 Jul 2006 06:30:03 -0700
From: Jeff Hodges <Jeff.Hodges@neustar.biz>
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Re: [Ietf-http-auth] More requirements
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>	<86wtag5r75.fsf@delta.rtfm.com>
	<Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
In-Reply-To: <Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 856eb5f76e7a34990d1d457d8e8e5b7f
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

RL 'Bob' Morgan wrote:
 >
 > I think many of the requirements (no, haven't made a list yet) have the
 > assumption of "when appropriate", or "when desired", where "desired" is
 > some combination of what the user wants and what the application wants
 > or will permit.

Indeed, many of these are distinct "security properties". Note in the intro to 
his note, ekr termed the content of his note as:

   "a taxonomy of requirements/features and technical options"


JeffH





_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 09:54:59 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1O8B-0007cR-7z; Fri, 14 Jul 2006 09:54:59 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1O8A-0007cM-0Z
	for dix@ietf.org; Fri, 14 Jul 2006 09:54:58 -0400
Received: from laweleka.osafoundation.org ([204.152.186.98])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1O88-0000vL-Ie
	for dix@ietf.org; Fri, 14 Jul 2006 09:54:57 -0400
Received: from [132.219.12.252] (unknown [132.219.12.252])
	(using TLSv1 with cipher RC4-SHA (128/128 bits))
	(No client certificate requested)
	by laweleka.osafoundation.org (Postfix) with ESMTP id 804D614229F;
	Fri, 14 Jul 2006 06:54:55 -0700 (PDT)
In-Reply-To: <44B716B6.4080702@neustar.biz>
References: <FB325DF2-432E-4B98-B9D4-3B096008BEE8@sxip.com>
	<44B716B6.4080702@neustar.biz>
Mime-Version: 1.0 (Apple Message framework v750)
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <1B2E5A32-4DFE-43E7-8A33-53D90322939B@osafoundation.org>
Content-Transfer-Encoding: 7bit
From: Lisa Dusseault <lisa@osafoundation.org>
Subject: Re: [Ietf-http-auth] WAE topic/problem scope (was: Stab at grouping
	of problem (was: Re: [dix] Agenda bashing))
Date: Fri, 14 Jul 2006 09:54:44 -0400
To: Jeff Hodges <Jeff.Hodges@neustar.biz>
X-Mailer: Apple Mail (2.750)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 31247fb3be228bb596db9127becad0bc
Cc: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

The outcome of WAE could be 0, 1 or more WGs.  The conflation in the  
BoF does not necessarily mean conflation in WG(s).  The breakdown is  
appreciated.

Lisa

On Jul 13, 2006, at 11:59 PM, Jeff Hodges wrote:

> Just to attempt to help clarify, in my understanding WAE was begot  
> by the conflation of three topic areas..
>
>  1. in-protocol authentication (for HTTP)
>
>     e.g. that which is defined within the HTTP spec set itself and is
>     used by an HTTP client to authn directly with an HTTP server.  
> Presently
>     the two available mechanisms are Basic and Digest. There are  
> use cases,
>     eg CalDAV, that would ostensibly benefit from a wider range of
>     in-protocol HTTP authn mechanisms. My understanding is that  
> this was the
>     motivation for creating the ietf-http-auth@ list.
>
>
>  2. application-level authentication/SSO and attribute sharing (for  
> HTTP-based
>     web-oriented (eg portal-based) apps)
>
>     This is a well-trod area with a plethora of existing solution  
> approaches
>     which are deployed to varying extents: SAML web sso profiles,  
> Liberty
>     ID-FF, Shib, OpenID, SXIP(/DIX), LID, WS-Federation, RoboForm,  
> etc. The
>     primary reason this topic is on the table in this venue is a  
> perception
>     that perhaps "more" can be done in order to facilitate wider  
> and more quick
>     adoption amongst websites in the wider Internet, eg "the  
> blogosphere".
>     This was the motivation for creation of the dix@ list.
>
>
>  3. anti-phishing
>
>     The motivation why this is on the list is obvious.
>     Effective overall solutions will involve a large component of user
>     interface (UI) approaches. Some would argue that the UI aspects  
> are the
>     first-order ones (and this is not a typical IETF problem  
> domain). Though
>     as well as UI, any solutions will likely rely on capabilities/ 
> properties
>     obtained from solutions to 1 and/or 2 above, and may require  
> specific
>     capabilities/properties that 1 and/or 2 don't otherwise provide.
>
>
> At this point, it isn't clear to me that the WAE BoF represents  
> just one overall "problem" to solve. Each of these are large  
> distinct topic areas in their own right, though they do intersect.  
> It will be a challenge to not short-shrift one or more of them. It  
> should be an entertaiing discussion.
>
>
> JeffH
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> Ietf-http-auth mailing list
> Ietf-http-auth@osafoundation.org
> http://lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 10:23:13 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1OZS-0005jI-Mr; Fri, 14 Jul 2006 10:23:10 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1OZS-0005g2-5r
	for dix@ietf.org; Fri, 14 Jul 2006 10:23:10 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1N4M-0005Ws-GY
	for dix@ietf.org; Fri, 14 Jul 2006 08:46:58 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1G1MwG-0004aM-6y
	for dix@ietf.org; Fri, 14 Jul 2006 08:38:36 -0400
Received: from lois.corp.google.com (lois.corp.google.com [172.24.0.50])
	by smtp-out.google.com with ESMTP id k6ECcPxm003973
	for <dix@ietf.org>; Fri, 14 Jul 2006 05:38:26 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=PhbR4wgaTuHwzPikbTxlHwRZ4/UjuRmTJpoNCUFqowOq6IpbwGjjAu4zofB54Okut
	Im8of+WtTo3RX0T6snXaA==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by lois.corp.google.com with ESMTP id k6ECQfgX032765
	for <dix@ietf.org>; Fri, 14 Jul 2006 05:38:20 -0700
Received: by smtp-out2.google.com with SMTP id 16so221284fpe
	for <dix@ietf.org>; Fri, 14 Jul 2006 05:38:18 -0700 (PDT)
Received: by 10.253.29.11 with SMTP id c11mr64190fpc;
	Fri, 14 Jul 2006 05:38:18 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Fri, 14 Jul 2006 05:38:18 -0700 (PDT)
Message-ID: <1b587cab0607140538y3fd02c10i7f20b6270591003f@mail.google.com>
Date: Fri, 14 Jul 2006 08:38:18 -0400
From: "Ben Laurie" <benl@google.com>
To: EKR <ekr@networkresonance.com>
In-Reply-To: <86wtag5r75.fsf@delta.rtfm.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
	<86wtag5r75.fsf@delta.rtfm.com>
X-Spam-Score: -2.5 (--)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Cc: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
Subject: [dix] Re: [Ietf-http-auth] More requirements
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/14/06, EKR <ekr@networkresonance.com> wrote:
> "Ben Laurie" <benl@google.com> writes:
>
> > On the plane to IETF I realised that there were several more potential
> > requirements to add to ekr's list:
> >
> > 12. Single Site Unlinkability (SSU)
> > The user should be able to visit the same site multiple times without
> > the site being able to tell that it is the same user, even if the user
> > is, for example, asserting the same external claims each time. This
> > protects the user's privacy. Obviously if data provided by the user is
> > unique to that user (for example, age and address combined are often
> > sufficient to uniquely identify a person) then no amount of cleverness
> > can provide SSU, but SSU should be available to the extent permitted
> > by the uniqueness of the data provided.
>
> This is an interesting requirement and obviously of value, but
> it's worth noting that there are contexts in which linkability
> (CI) is precisely what's desired--blog comments, for example.
>
> So, you wouldn't want to design a system that always provided
> SSU. :)

Totally agreed.

> > 15. Claim Minimality (CM)
> > The ability to show only exactly what is needed, (for example, the
> > user is over 21 rather than the user's exact age, or if there are
> > mutlple claims the ability to show a subset). This improves privacy
> > and reduces linkability.
>
> Note that this ties in with IAC.

Right - the distinction is that rather than merely separating claims
you want to be able to prove properties of claims instead of revealing
their actual content.

>
> -Ekr
>
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 10:34:17 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1OkD-0007Ec-E2; Fri, 14 Jul 2006 10:34:17 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1OkB-0007EX-T8
	for dix@ietf.org; Fri, 14 Jul 2006 10:34:15 -0400
Received: from oak.neustar.com ([209.173.53.70])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1Ok9-0007E9-KZ
	for dix@ietf.org; Fri, 14 Jul 2006 10:34:15 -0400
Received: from [127.0.0.1] (stsc1260-corp-dns.va.neustar.com [209.173.53.65])
	by oak.neustar.com (8.12.8/8.12.8) with ESMTP id k6EEY71v027636;
	Fri, 14 Jul 2006 14:34:13 GMT
Message-ID: <44B7AB5A.9090909@neustar.biz>
Date: Fri, 14 Jul 2006 07:34:02 -0700
From: Jeff Hodges <Jeff.Hodges@neustar.biz>
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: fb6060cb60c0cea16e3f7219e40a0a81
Cc: 
Subject: [dix] Extant Applicable Security Glossaries
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Here's pointers to hopefully useful glossaries...

HTH,

JeffH
-----


Internet Security Glossary
http://www.ietf.org/rfc/rfc2828.txt


Internet Security Glossary, Version 2
http://www.ietf.org/internet-drafts/draft-shirey-secgloss-v2-04.txt


SAMLv2: Glossary
http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf


Liberty Technical Glossary v2-05
http://www.projectliberty.org/specs/draft-liberty-glossary-v2.0-05.pdf



Note that all of the above have extensive references to the work they are built 
upon. Also note that the SAMLv2 and Liberty glossaries are examples of going 
through the exercise of "profiling"/"reusing" existing terminology for use 
within a particular context, SAMLv2 being particularly relevant to the WAE 
discussion.

Also worthwhile to point out is Lynn Wheeler's overall glossary, which composes 
the widest collection of extant glossaries that I know of, so it is 
particularly useful for figuring out how various constituencies are using any 
particular term (or whether they are using it at all)


http://www.garlic.com/~lynn/secure.htm

Note that the references for Lynn's sec gloss are listed on the page "above" 
the gloss...

http://www.garlic.com/~lynn/


---
end



























_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 10:36:34 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1OmQ-0007wF-16; Fri, 14 Jul 2006 10:36:34 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1OmO-0007w9-Lh
	for dix@ietf.org; Fri, 14 Jul 2006 10:36:32 -0400
Received: from mxout3.cac.washington.edu ([140.142.32.166])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1OmM-0007Lc-8D
	for dix@ietf.org; Fri, 14 Jul 2006 10:36:32 -0400
Received: from smtp.washington.edu (smtp.washington.edu [140.142.33.9])
	by mxout3.cac.washington.edu (8.13.6+UW06.06/8.13.6+UW06.03) with ESMTP
	id k6EEaTSn028224; Fri, 14 Jul 2006 07:36:29 -0700
X-Auth-Received: from h1065-net84db.lab.risq.net (h1065-net84db.lab.risq.net
	[132.219.16.101] (may be forged))
	(authenticated authid=rlmorgan)
	by smtp.washington.edu (8.13.7+UW06.06/8.13.7+UW06.03) with ESMTP id
	k6EEaRCj016735
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Fri, 14 Jul 2006 07:36:29 -0700
Date: Fri, 14 Jul 2006 10:36:55 -0400 (EDT)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-X-Sender: rlmorgan@perf.cac.washington.edu
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Extant Applicable Security Glossaries
In-Reply-To: <44B7AB5A.9090909@neustar.biz>
Message-ID: <Pine.LNX.4.64.0607141035440.32679@perf.cac.washington.edu>
References: <44B7AB5A.9090909@neustar.biz>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-PMX-Version: 5.2.0.264296, Antispam-Engine: 2.4.0.264935,
	Antispam-Data: 2006.7.14.72432
X-Uwash-Spam: Gauge=IIIIIII, Probability=7%, Report='__CP_MEDIA_2_BODY 0,
	__CP_URI_IN_BODY 0, __CT 0, __CT_TEXT_PLAIN 0, __HAS_MSGID 0,
	__MIME_TEXT_ONLY 0, __MIME_VERSION 0, __SANE_MSGID 0,
	__STOCK_CRUFT 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 10d3e4e3c32e363f129e380e644649be
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


Also, the "identity gang" lexicon:

   http://identitygang.org/Lexicon

  - RL "Bob"

On Fri, 14 Jul 2006, Jeff Hodges wrote:

> Here's pointers to hopefully useful glossaries...
>
> HTH,
>
> JeffH
> -----
>
>
> Internet Security Glossary
> http://www.ietf.org/rfc/rfc2828.txt
>
>
> Internet Security Glossary, Version 2
> http://www.ietf.org/internet-drafts/draft-shirey-secgloss-v2-04.txt
>
>
> SAMLv2: Glossary
> http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf
>
>
> Liberty Technical Glossary v2-05
> http://www.projectliberty.org/specs/draft-liberty-glossary-v2.0-05.pdf
>
>
>
> Note that all of the above have extensive references to the work they are 
> built upon. Also note that the SAMLv2 and Liberty glossaries are examples of 
> going through the exercise of "profiling"/"reusing" existing terminology for 
> use within a particular context, SAMLv2 being particularly relevant to the 
> WAE discussion.
>
> Also worthwhile to point out is Lynn Wheeler's overall glossary, which 
> composes the widest collection of extant glossaries that I know of, so it is 
> particularly useful for figuring out how various constituencies are using any 
> particular term (or whether they are using it at all)
>
>
> http://www.garlic.com/~lynn/secure.htm
>
> Note that the references for Lynn's sec gloss are listed on the page "above" 
> the gloss...
>
> http://www.garlic.com/~lynn/
>
>
> ---
> end
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Jul 14 11:42:46 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1PoU-00027B-7Z; Fri, 14 Jul 2006 11:42:46 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1PoT-00026g-Cm
	for dix@ietf.org; Fri, 14 Jul 2006 11:42:45 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1OlP-0007Gs-MS
	for dix@ietf.org; Fri, 14 Jul 2006 10:35:31 -0400
Received: from mxout5.cac.washington.edu ([140.142.32.135])
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1G1O4A-00063B-Ik
	for dix@ietf.org; Fri, 14 Jul 2006 09:50:52 -0400
Received: from smtp.washington.edu (smtp.washington.edu [140.142.32.139])
	by mxout5.cac.washington.edu (8.13.6+UW06.06/8.13.6+UW06.03) with ESMTP
	id k6EDolx3026073; Fri, 14 Jul 2006 06:50:47 -0700
X-Auth-Received: from h1065-net84db.lab.risq.net (h1065-net84db.lab.risq.net
	[132.219.16.101] (may be forged))
	(authenticated authid=rlmorgan)
	by smtp.washington.edu (8.13.7+UW06.06/8.13.7+UW06.03) with ESMTP id
	k6EDohh5019412
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Fri, 14 Jul 2006 06:50:46 -0700
Date: Fri, 14 Jul 2006 09:51:11 -0400 (EDT)
From: "RL 'Bob' Morgan" <rlmorgan@washington.edu>
X-X-Sender: rlmorgan@perf.cac.washington.edu
To: Jeff Hodges <Jeff.Hodges@neustar.biz>
Subject: Re: [dix] Re: [Ietf-http-auth] More requirements
In-Reply-To: <44B79C5B.8070103@neustar.biz>
Message-ID: <Pine.LNX.4.64.0607140948080.32679@perf.cac.washington.edu>
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
	<86wtag5r75.fsf@delta.rtfm.com>
	<Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
	<44B79C5B.8070103@neustar.biz>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Uwash-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CT_TEXT_PLAIN 0,
	__HAS_MSGID 0, __MIME_TEXT_ONLY 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: -2.6 (--)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Cc: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


> Indeed, many of these are distinct "security properties". Note in the intro 
> to his note, ekr termed the content of his note as:
>
>  "a taxonomy of requirements/features and technical options"

Right, a problem we often have with stating requirements is 
differentiating between "X is required to be possible/negotiable" and "X 
is required to always be done"; where the first of these produces 
derivative requirements about the nature of the negotiation of and/or 
policy around the feature.

  - RL "Bob"

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Sat Jul 15 10:05:49 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1kmB-0008CL-Ep; Sat, 15 Jul 2006 10:05:47 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1kmA-00087E-3J
	for dix@ietf.org; Sat, 15 Jul 2006 10:05:46 -0400
Received: from smtp-out.google.com ([216.239.45.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1km8-00068Q-Kd
	for dix@ietf.org; Sat, 15 Jul 2006 10:05:46 -0400
Received: from lois.corp.google.com (lois.corp.google.com [172.24.0.50])
	by smtp-out.google.com with ESMTP id k6FE5fOi016175
	for <dix@ietf.org>; Sat, 15 Jul 2006 07:05:41 -0700
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=VgcRtlJFVtqfXwe2w68oFW9AP2fYzB9MtLrdrt6+ghHjPCCoPgCsvK9WCvYiSZMCk
	LNRUHi75quUwuKTwuVqsw==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by lois.corp.google.com with ESMTP id k6FE5edp019898
	for <dix@ietf.org>; Sat, 15 Jul 2006 07:05:40 -0700
Received: by smtp-out2.google.com with SMTP id 16so295337fpe
	for <dix@ietf.org>; Sat, 15 Jul 2006 07:05:40 -0700 (PDT)
Received: by 10.253.14.20 with SMTP id 20mr101227fpn;
	Sat, 15 Jul 2006 07:05:40 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Sat, 15 Jul 2006 07:05:40 -0700 (PDT)
Message-ID: <1b587cab0607150705o384f32bbo19c133560df7cbb1@mail.google.com>
Date: Sat, 15 Jul 2006 10:05:40 -0400
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] More requirements
In-Reply-To: <9A93CC39-8708-4898-AC1E-1688761BA865@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com>
	<9A93CC39-8708-4898-AC1E-1688761BA865@cisco.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 244a2fd369eaf00ce6820a760a3de2e8
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/15/06, Paul Gleichauf <pgleicha@cisco.com> wrote:
> I have missed significant parts of this thread, but is there
> assurance that these are in fact computationally feasible?
>
> There are cases where such guarantees are often found possible to
> break in unanticipated ways. Recently the focus is on medical records
> and the ability to identify a specific person in a large population
> when an anonymization algorithm had been appropriately applied by
> correlating data from a variety of sources.  Below is one set of
> citations often cross referenced in this area:
>
> http://lab.privacy.cs.cmu.edu/people/sweeney/confidentiality.html

I explicitly stated that these kinds of attacks were out of scope. I'm
talking about the avoidable kind of linkage, for example where you
present the same X.509 client cert everywhere.

>
> Paul
>
> On Jul 13, 2006, at 5:43 PM, Ben Laurie wrote:
>
> > On the plane to IETF I realised that there were several more potential
> > requirements to add to ekr's list:
> >
> > 12. Single Site Unlinkability (SSU)
> > The user should be able to visit the same site multiple times without
> > the site being able to tell that it is the same user, even if the user
> > is, for example, asserting the same external claims each time. This
> > protects the user's privacy. Obviously if data provided by the user is
> > unique to that user (for example, age and address combined are often
> > sufficient to uniquely identify a person) then no amount of cleverness
> > can provide SSU, but SSU should be available to the extent permitted
> > by the uniqueness of the data provided.
> >
> > 13. Multiple Site Unlinkability (MSU)
> > The user should be able to visit multiple sites without the sites
> > being able to collude to correlate the data provided by the user. This
> > is a weaker requirement than SSU (that is, MSU does not guarantee
> > SSU). Again, this protects the user's privacy.
> >
> > 14. Attack Resistant Credentials (ARC)
> > Credentials should be such that the (computationally limited) verifier
> > cannot reconstruct the original credential by brute force. Note that
> > the impossibility of this may rely on the user choosing strong
> > secrets, which is often unlikely, for example where the sole source of
> > entropy is a password.
> >
> > 15. Claim Minimality (CM)
> > The ability to show only exactly what is needed, (for example, the
> > user is over 21 rather than the user's exact age, or if there are
> > mutlple claims the ability to show a subset). This improves privacy
> > and reduces linkability.
> >
> > _______________________________________________
> > dix mailing list
> > dix@ietf.org
> > https://www1.ietf.org/mailman/listinfo/dix
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Sat Jul 15 13:38:13 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1o5j-0001xX-9d; Sat, 15 Jul 2006 13:38:11 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1o5h-0001xQ-SG
	for dix@ietf.org; Sat, 15 Jul 2006 13:38:09 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1o5g-0005zL-D4
	for dix@ietf.org; Sat, 15 Jul 2006 13:38:09 -0400
Received: from [172.17.152.143] ([66.46.95.226]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6FHc5R2043533
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT);
	Sat, 15 Jul 2006 10:38:06 -0700 (PDT) (envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
Content-Transfer-Encoding: 7bit
Message-Id: <630749EE-9B10-4F84-A3DB-2D83C1D5C2DC@sxip.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
To: Digital Identity Exchange <dix@ietf.org>,
	IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
From: Dick Hardt <dick@sxip.com>
Date: Sat, 15 Jul 2006 13:38:04 -0400
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=-2.6 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 3002fc2e661cd7f114cb6bae92fe88f1
Cc: 
Subject: [dix] DRAFT: WAE BOF minutes
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

The meeting started off with the usual agenda review. Agenda was  
accepted as proposed.

The first item was Terminology.
Reading assignment: read RFC 2828
	Internet Security Glossary
	http://www.ietf.org/rfc/rfc2828.txt
Other Glossaries mentioned:
	Internet Security Glossary, Version 2
	http://www.ietf.org/internet-drafts/draft-shirey-secgloss-v2-04.txt

	SAMLv2: Glossary
	http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf

	"identity gang" lexicon
	http://identitygang.org/Lexicon


The next item was Problems we want to solve (see agenda)
A few things were added:
	- whitelisting
	- claim minimality
	- proof of server identity

Sam Hartman made his presentation, there were a few questions.

There was then discussion on Problems we want to solve.
****** edit here -- right title? same as before

Additional problems
	non-browsing HTTP support
	support for existing infrastructure
	Cross Application Credential (XAC)

Grouping of problems was then started.
Dick Hardt's slide was presented.

Ekr proposed grouping the problem up as:

EKR1: fix http auth
	- anti-phishing
	- passwords and other

EKR2: cross-site identity, Eliot's dad, SSO

EKR3: Claim & Attribute Transferral

More detailed discussion on each problem then ensued:

EKR1: Fix HTTP Auth
AD questions to audience concluded with:
	- Liaise w/ W3C on GUI
	- Liaise w/ APWG
	- Layer / Arch TBD
	- can stand alone, but coordinate w/ EKR2 and EKR3
	EKR1 does not require EKR2

EKR2: cross-site identifier
(Eliot's dad problem was broken off to be EKR4)
	- raw assertions of identity are easier to trust than attributes
	- name subordination
	- existing technology, but glue work
	Question: Is there glue work to be done by the IETF?
			- no one thinks there is no glue work, 15 think there is, 15 are  
not sure
	12 ok on work if EKR1 not happening,

EKR3:Claim & Attribute Transferral
	- existing claims and syntaxes may be used
	- binds attribute assertions to underlying communication
	- not limited to HTTP
	Question: Is there glue work to be done here by the IETF?
	12 support, a couple object

EKR4:
	- eliot's dad problem
	part of EKR1 & EKR 2

Discussion if EKR1 and EKR2 required different BOFs at next IETF  
meeting. Clearly different drafts would be required. Best to combine  
group working on them.

Meeting concluded 15 minutes late.



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Sat Jul 15 14:23:53 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G1onx-0005ne-8X; Sat, 15 Jul 2006 14:23:53 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G1onw-0005nY-0d
	for dix@ietf.org; Sat, 15 Jul 2006 14:23:52 -0400
Received: from sj-iport-6.cisco.com ([171.71.176.117])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1ont-0001U8-Br
	for dix@ietf.org; Sat, 15 Jul 2006 14:23:51 -0400
Received: from sj-dkim-1.cisco.com ([171.71.179.21])
	by sj-iport-6.cisco.com with ESMTP; 15 Jul 2006 11:23:48 -0700
Received: from sj-core-5.cisco.com (sj-core-5.cisco.com [171.71.177.238])
	by sj-dkim-1.cisco.com (8.12.11.20060308/8.12.11) with ESMTP id
	k6FINmBu006157 for <dix@ietf.org>; Sat, 15 Jul 2006 11:23:48 -0700
Received: from imail.cisco.com (sjc12-sbr-sw3-3f5.cisco.com [172.19.96.182])
	by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id k6FINmiB017924
	for <dix@ietf.org>; Sat, 15 Jul 2006 11:23:48 -0700 (PDT)
Received: from [212.254.247.5] (ams3-vpn-dhcp40.cisco.com [10.61.64.40])
	by imail.cisco.com (8.12.11/8.12.10) with ESMTP id k6FIHcVs011232
	for <dix@ietf.org>; Sat, 15 Jul 2006 11:17:39 -0700
Message-ID: <44B932B2.6030009@cisco.com>
Date: Sat, 15 Jul 2006 20:23:46 +0200
From: Eliot Lear <lear@cisco.com>
User-Agent: Thunderbird 1.5.0.4 (Macintosh/20060530)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <630749EE-9B10-4F84-A3DB-2D83C1D5C2DC@sxip.com>
In-Reply-To: <630749EE-9B10-4F84-A3DB-2D83C1D5C2DC@sxip.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Authentication-Results: sj-dkim-1.cisco.com; header.From=lear@cisco.com;
	dkim=pass ( sig from cisco.com verified; ); 
DKIM-Signature: a=rsa-sha1; q=dns; l=5841; t=1152987828; x=1153851828;
	c=relaxed/simple; s=sjdkim1002;
	h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
	d=cisco.com; i=lear@cisco.com; z=From:Eliot=20Lear=20<lear@cisco.com>
	|Subject:Re=3A=20[dix]=20DRAFT=3A=20WAE=20BOF=20minutes;
	X=v=3Dcisco.com=3B=20h=3Du6O0XrjMVW5x2+2Mslr7X/U9RYs=3D;
	b=sU4VeTirJ1y9XAteUIptU1jIoiIf55orjcKMWcjxtOWumBxmVtuubNarOrw5Do8wtOjtFYtx
	OJVTsg0ssWDzTNLRaPX0HTgwhSTMEf7Gr+o5WiFTn7pPeMMSKOBLPxoi;
X-Spam-Score: 0.0 (/)
X-Scan-Signature: dbb8771284c7a36189745aa720dc20ab
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Dick,

Here are my notes from yesterday that you may wish to merge.

Eliot

    Summary

There was a general concern that we could end up boiling the ocean. 
There are four problems that we could work on:

   1. Non-insane replacement for HTTP digest / anti-phishing
   2. Cross Site Identity
   3. Claim and Attribute Transferral
   4. Eliot's Dad's Problem (EDP) of unhealthy password reuse / storage
      or failure to remember !@#%. 

There seem to be strong support for working on the first two, weak
support for the third, and a general agreement that 4 should not be
forgotten, although it was unclear whether 4 needed to be solved
separately from 1 and 2.  There was discussion on dependency between 1
and 2.

There also seemed to be general agreement that we should focus our
efforts on fixing HTTP browsing first, non-browsing second, and not
worry about cross application credentials.

Lisa and the IESG now have to determine whether there should be another
BoF, separate BoFs for separate working groups or to do something else. 
We also need to take into account work done by other organizations, such
as W3C, and we need to take note of UI concerns.


    More Details


Pete kicked off the BoF with a discussion around common terminology,
with some attempts to define common terms like authentication,
authorization, and credentials.  Required reading: RFC 2828; recommended
reading:  http://identitygang.org/Lexicon and
draft-shirey-secgloss-v2-04.txt.  One word that was considered out of
bounds was "identity".  This caused some issues later.  Jeffrey
Hutzelman suggested and there seemed to be general agreement that the
better approach would be to talk about concepts and then agree on
terms.  Either way, we staggered through the terminology discussion.

Pete then took us through a menu of problems we *could* solve:

    * Capture-Resistant Credentials (CRC)
    * Hijack-Resistant Authentication (HRA)
    * Portable Credentials (PC)
    * Fill-in of Personal Information (FPI)
    * Common User Credentials (CUC)
    * Continuity of Identity (CI)
    * User-Friendly Names (UFN)
    * Assertion of External Claims (AEC)
    * Independent Assertion of Claims (IAC)
    * Private Authentication (PA)
    * Single Site Unlinkability (SSU)
    * Multiple Site Unlinkability (MSU)
    * Attack Resistant Credentials (ARC)
    * Claim Minimality (CM)


On the jabber there was some discussion as to whether CM is the same or
different from IAC.

Sam next presented.  He first talked about the need for an unspoofable
UI.  It was pointed out that simply having a little lock box icon
doesn't solve the problem.  One possible solution would be for users to
brand computers in a way that would be used for sensitive transactions,
the idea being that no spoofer could know what this branding is.  Within
the jabber there was a fair amount of discussion around SAKs (secure
attention keys), and whether they could help/solve the problem.

Next Sam talked about requirements for web authentication.  MUST solve
the problem for passwords without the need for smart cards.  Eliot
raised a concern about needing to support smart cards but not mandating
them as part of the architecture.  This annoyed Sam  ;-)   Sam's
requirements also included not sending password equivalents, mandating
mutual authentication of the server, and binding authentication to the
returned web page.  He went on to describe what his requirements buys.

One of the requirements that got raised on the jabber chat was one of
"supports existing infrastructure".  According to the chat log, the
infrastructure in question is authentication infrastructure or - passwords.

Next Pete and Lisa organized discussion over what problems we could
solve.  She wrote down three, which eventually became four.  Here are
the four:

    * EKR1 - anti-phishing / fixing HTTP authentication, GUI, Mutual
      Authentication, passwords AND other.  About 20 people in the room
      indicated they were interested in working on this problem.  This
      is the one that also requires liaising with W3C.  Layer/Arch TBD.
    * EKR2 - cross site identitiers.  About 15 people were interested in
      working on this problem; while 10 people suggested that more
      analysis was needed.  This effort may required shared mechanisms
      with EKR1 and definitely requires coordination.  Only six people
      want to work on it as a separate problem.
    * EKR3 - claim and attribute exchange.  Not limited to HTTP.  We
      rushed through this in 10 minutes.  Twelve people indicated
      interest in this problem.
    * EKR4 - Eliot's Dad's Problem (EDP) of unhealthy password reuse /
      storage.  There was a view that done properly 1 and/or 2 would
      capture this.  Not clear how common that view was.

Lisa commented in the chat room and perhaps live that there's the
potential for a lot of commonality between EKR1 & EKR2.  [I surmise the
same is the case for EKR4.]

There was a healthy discussion about UI and IETF involvement in which
EKR best summed it up by saying that there are three possible things we
could say:

   1. Nothing;
   2. "Implementations must clearly indicate to users when a password is
      being typed into a trusted interface"; or
   3. "This is how the dialogs must look..."

Eric argued that (2) was most appropriate and I didn't hear or read any
objection.  Bob Morgan put it this way:

    /"where [user makes security decision] and [info available to user
    at that time] are things that can be written into protocol flows"

    /

Eric suggested a loose bottom up hierarchy of EKR1, EKR4(EDP), EKR2, EKR3.


Throughout the entire BoF there was a side conversation of SASL v. GSS.

Eliot


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 08:54:19 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2p5c-0003bO-Du; Tue, 18 Jul 2006 08:54:16 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2p5a-0003Zm-OG
	for dix@ietf.org; Tue, 18 Jul 2006 08:54:14 -0400
Received: from smtp-out.google.com ([216.239.33.17])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2p5Z-0007jQ-3O
	for dix@ietf.org; Tue, 18 Jul 2006 08:54:14 -0400
Received: from chris.corp.google.com (chris.corp.google.com [172.24.0.146])
	by smtp-out.google.com with ESMTP id k6ICs2ee006799
	for <dix@ietf.org>; Tue, 18 Jul 2006 13:54:04 +0100
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=CltbY7MWu2QUMfcUtQAJxArHV+atjSU4jmNQY1B8Cxx9PYHHc5ZuSFgUJeX4slCOz
	c3l371weV3dgT4HfTflQw==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by chris.corp.google.com with ESMTP id k6ICj27U031218
	for <dix@ietf.org>; Tue, 18 Jul 2006 05:54:00 -0700
Received: by smtp-out2.google.com with SMTP id 33so29684fpx
	for <dix@ietf.org>; Tue, 18 Jul 2006 05:53:58 -0700 (PDT)
Received: by 10.253.15.5 with SMTP id 5mr555484fpo;
	Tue, 18 Jul 2006 05:53:57 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Tue, 18 Jul 2006 05:53:57 -0700 (PDT)
Message-ID: <1b587cab0607180553mfd7f636r235f41e9f27a8987@mail.google.com>
Date: Tue, 18 Jul 2006 13:53:57 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
In-Reply-To: <44B932B2.6030009@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <630749EE-9B10-4F84-A3DB-2D83C1D5C2DC@sxip.com>
	<44B932B2.6030009@cisco.com>
X-Spam-Score: -4.3 (----)
X-Scan-Signature: 789c141a303c09204b537a4078e2a63f
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/15/06, Eliot Lear <lear@cisco.com> wrote:
> Dick,
>
> Here are my notes from yesterday that you may wish to merge.
>
> Eliot
>
>     Summary
>
> There was a general concern that we could end up boiling the ocean.
> There are four problems that we could work on:
>
>    1. Non-insane replacement for HTTP digest / anti-phishing
>    2. Cross Site Identity
>    3. Claim and Attribute Transferral
>    4. Eliot's Dad's Problem (EDP) of unhealthy password reuse / storage
>       or failure to remember !@#%.
>
> There seem to be strong support for working on the first two, weak
> support for the third, and a general agreement that 4 should not be
> forgotten, although it was unclear whether 4 needed to be solved
> separately from 1 and 2.  There was discussion on dependency between 1
> and 2.
>
> There also seemed to be general agreement that we should focus our
> efforts on fixing HTTP browsing first, non-browsing second, and not
> worry about cross application credentials.
>
> Lisa and the IESG now have to determine whether there should be another
> BoF, separate BoFs for separate working groups or to do something else.
> We also need to take into account work done by other organizations, such
> as W3C, and we need to take note of UI concerns.
>
>
>     More Details
>
>
> Pete kicked off the BoF with a discussion around common terminology,
> with some attempts to define common terms like authentication,
> authorization, and credentials.  Required reading: RFC 2828; recommended
> reading:  http://identitygang.org/Lexicon and
> draft-shirey-secgloss-v2-04.txt.  One word that was considered out of
> bounds was "identity".  This caused some issues later.  Jeffrey
> Hutzelman suggested and there seemed to be general agreement that the
> better approach would be to talk about concepts and then agree on
> terms.  Either way, we staggered through the terminology discussion.
>
> Pete then took us through a menu of problems we *could* solve:
>
>     * Capture-Resistant Credentials (CRC)
>     * Hijack-Resistant Authentication (HRA)
>     * Portable Credentials (PC)
>     * Fill-in of Personal Information (FPI)
>     * Common User Credentials (CUC)
>     * Continuity of Identity (CI)
>     * User-Friendly Names (UFN)
>     * Assertion of External Claims (AEC)
>     * Independent Assertion of Claims (IAC)
>     * Private Authentication (PA)
>     * Single Site Unlinkability (SSU)
>     * Multiple Site Unlinkability (MSU)
>     * Attack Resistant Credentials (ARC)
>     * Claim Minimality (CM)
>
>
> On the jabber there was some discussion as to whether CM is the same or
> different from IAC.

For the record, I'd note that CM is about providing properties of
claims (e.g. proving you are over 21 given a claim of your date of
birth, without revealing the date) whereas IAC is about separating
claims.

>
> Sam next presented.  He first talked about the need for an unspoofable
> UI.  It was pointed out that simply having a little lock box icon
> doesn't solve the problem.  One possible solution would be for users to
> brand computers in a way that would be used for sensitive transactions,
> the idea being that no spoofer could know what this branding is.  Within
> the jabber there was a fair amount of discussion around SAKs (secure
> attention keys), and whether they could help/solve the problem.
>
> Next Sam talked about requirements for web authentication.  MUST solve
> the problem for passwords without the need for smart cards.  Eliot
> raised a concern about needing to support smart cards but not mandating
> them as part of the architecture.  This annoyed Sam  ;-)   Sam's
> requirements also included not sending password equivalents, mandating
> mutual authentication of the server, and binding authentication to the
> returned web page.  He went on to describe what his requirements buys.
>
> One of the requirements that got raised on the jabber chat was one of
> "supports existing infrastructure".  According to the chat log, the
> infrastructure in question is authentication infrastructure or - passwords.
>
> Next Pete and Lisa organized discussion over what problems we could
> solve.  She wrote down three, which eventually became four.  Here are
> the four:
>
>     * EKR1 - anti-phishing / fixing HTTP authentication, GUI, Mutual
>       Authentication, passwords AND other.  About 20 people in the room
>       indicated they were interested in working on this problem.  This
>       is the one that also requires liaising with W3C.  Layer/Arch TBD.
>     * EKR2 - cross site identitiers.  About 15 people were interested in
>       working on this problem; while 10 people suggested that more
>       analysis was needed.  This effort may required shared mechanisms
>       with EKR1 and definitely requires coordination.  Only six people
>       want to work on it as a separate problem.
>     * EKR3 - claim and attribute exchange.  Not limited to HTTP.  We
>       rushed through this in 10 minutes.  Twelve people indicated
>       interest in this problem.
>     * EKR4 - Eliot's Dad's Problem (EDP) of unhealthy password reuse /
>       storage.  There was a view that done properly 1 and/or 2 would
>       capture this.  Not clear how common that view was.
>
> Lisa commented in the chat room and perhaps live that there's the
> potential for a lot of commonality between EKR1 & EKR2.  [I surmise the
> same is the case for EKR4.]
>
> There was a healthy discussion about UI and IETF involvement in which
> EKR best summed it up by saying that there are three possible things we
> could say:
>
>    1. Nothing;
>    2. "Implementations must clearly indicate to users when a password is
>       being typed into a trusted interface"; or
>    3. "This is how the dialogs must look..."
>
> Eric argued that (2) was most appropriate and I didn't hear or read any
> objection.  Bob Morgan put it this way:
>
>     /"where [user makes security decision] and [info available to user
>     at that time] are things that can be written into protocol flows"
>
>     /
>
> Eric suggested a loose bottom up hierarchy of EKR1, EKR4(EDP), EKR2, EKR3.
>
>
> Throughout the entire BoF there was a side conversation of SASL v. GSS.
>
> Eliot
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 08:58:04 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2p9H-0008P4-Si; Tue, 18 Jul 2006 08:58:03 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2p9G-0008Os-Ov
	for dix@ietf.org; Tue, 18 Jul 2006 08:58:02 -0400
Received: from brmea-mail-2.sun.com ([192.18.98.43])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2p9F-0008DM-GZ
	for dix@ietf.org; Tue, 18 Jul 2006 08:58:02 -0400
Received: from centralmail4brm.central.Sun.COM ([129.147.62.198])
	by brmea-mail-2.sun.com (8.13.6+Sun/8.12.9) with ESMTP id
	k6ICw0R4011211
	for <dix@ietf.org>; Tue, 18 Jul 2006 06:58:00 -0600 (MDT)
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104])
	by centralmail4brm.central.Sun.COM (8.13.6+Sun/8.13.6/ENSMAIL,
	v2.2) with ESMTP id k6ICw0nq021525
	for <dix@ietf.org>; Tue, 18 Jul 2006 06:58:00 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1])
	by binky.Central.Sun.COM (8.13.6+Sun/8.13.6) with ESMTP id
	k6ICw0pr004224
	for <dix@ietf.org>; Tue, 18 Jul 2006 07:58:00 -0500 (CDT)
Received: (from nw141292@localhost)
	by binky.Central.Sun.COM (8.13.6+Sun/8.13.6/Submit) id k6ICw079004223
	for dix@ietf.org; Tue, 18 Jul 2006 07:58:00 -0500 (CDT)
Date: Tue, 18 Jul 2006 07:57:59 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
Message-ID: <20060718125759.GR21538@binky.Central.Sun.COM>
References: <630749EE-9B10-4F84-A3DB-2D83C1D5C2DC@sxip.com>
	<44B932B2.6030009@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <44B932B2.6030009@cisco.com>
User-Agent: Mutt/1.5.11
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2870a44b67ee17965ce5ad0177e150f4
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On Sat, Jul 15, 2006 at 08:23:46PM +0200, Eliot Lear wrote:
> Throughout the entire BoF there was a side conversation of SASL v. GSS.

Mostly in the jabber room though...

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 09:46:15 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2ptu-0004ba-Vl; Tue, 18 Jul 2006 09:46:14 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2ptt-0004bV-HG
	for dix@ietf.org; Tue, 18 Jul 2006 09:46:13 -0400
Received: from colibri.verisign.com ([65.205.251.74])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2pts-0001lX-5p
	for dix@ietf.org; Tue, 18 Jul 2006 09:46:13 -0400
Received: from MOU1WNEXCN03.vcorp.ad.vrsn.com (mailer6.verisign.com
	[65.205.251.33])
	by colibri.verisign.com (8.13.6/8.13.4) with ESMTP id k6IDkBfS016222
	for <dix@ietf.org>; Tue, 18 Jul 2006 06:46:11 -0700
Received: from MOU1WNEXMB04.vcorp.ad.vrsn.com ([10.25.13.157]) by
	MOU1WNEXCN03.vcorp.ad.vrsn.com with Microsoft
	SMTPSVC(6.0.3790.1830); Tue, 18 Jul 2006 06:46:11 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [dix] DRAFT: WAE BOF minutes
Date: Tue, 18 Jul 2006 06:46:06 -0700
Message-ID: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [dix] DRAFT: WAE BOF minutes
Thread-Index: Acaqac/EYNGazAJ5RTu04tEemyz4ngABaltg
From: "Hallam-Baker, Phillip" <pbaker@verisign.com>
To: "Digital Identity Exchange" <dix@ietf.org>
X-OriginalArrivalTime: 18 Jul 2006 13:46:11.0136 (UTC)
	FILETIME=[8766D400:01C6AA70]
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 97adf591118a232206bdb5a27b217034
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Only comment I remember in the BOF itself was EKR pointing out that the =
underlying aim of SASL is essentially broken, I guess that also applies =
to GSSAPI. Options in crypto specs are usually bad.

A distinction needs to be made between the authentication mechanism and =
the authentication protocol. Given an authentication mechanism such as a =
password, a public key, a biometric there should ideally be one protocol =
that supports that mechanism.

Having six different algorithms to support password exchange is broken. =
Six different protocols is worse.

The point of a standards process is not what you put into the spec, its =
what you leave out.


> -----Original Message-----
> From: Nicolas Williams [mailto:Nicolas.Williams@sun.com]=20
> Sent: Tuesday, July 18, 2006 8:58 AM
> To: Digital Identity Exchange
> Subject: Re: [dix] DRAFT: WAE BOF minutes
>=20
> On Sat, Jul 15, 2006 at 08:23:46PM +0200, Eliot Lear wrote:
> > Throughout the entire BoF there was a side conversation of=20
> SASL v. GSS.
>=20
> Mostly in the jabber room though...
>=20
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>=20
>=20

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 14:17:05 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2u7y-0004vZ-Tr; Tue, 18 Jul 2006 14:17:02 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2u7x-0004vU-Aq
	for dix@ietf.org; Tue, 18 Jul 2006 14:17:01 -0400
Received: from smtp108.sbc.mail.mud.yahoo.com ([68.142.198.207])
	by ietf-mx.ietf.org with smtp (Exim 4.43) id 1G2u7v-0003Ak-Rn
	for dix@ietf.org; Tue, 18 Jul 2006 14:17:01 -0400
Received: (qmail 71059 invoked from network); 18 Jul 2006 18:16:55 -0000
Received: from unknown (HELO elijah.acm.org)
	(joaquin.miller@sbcglobal.net@70.137.163.71 with login)
	by smtp108.sbc.mail.mud.yahoo.com with SMTP; 18 Jul 2006 18:16:54 -0000
Message-Id: <7.0.1.0.2.20060718110059.037fdce0@netmesh.us>
X-Mailer: QUALCOMM Windows Eudora Version 7.0.1.0
Date: Tue, 18 Jul 2006 11:07:51 -0700
To: Digital Identity Exchange <dix@ietf.org>
From: Joaquin Miller <joaquin@netmesh.us>
In-Reply-To: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.
	ad.vrsn.com>
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
Mime-Version: 1.0
X-Spam-Score: 0.6 (/)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081
Subject: [dix] the point of a standards process
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0967991535=="
Errors-To: dix-bounces@ietf.org

--===============0967991535==
Content-Type: multipart/alternative;
	boundary="=====================_3799546==.ALT"

--=====================_3799546==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed


>The point of a standards process is not what you put into the spec, 
>its what you leave out.

Well said!

Joaquin





(And certainly true.  It has to be understood, of course.  Example: A 
bolt standard lists many combinations of diameter and thread 
pitch.  Many.  But a vanishingly small percentage of the possible 
combinations, almost all of which are left out of that standard.

(In our business, a very effective way to ensure there is   n o 
t  interoperability is to provide many options.)


--=====================_3799546==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<blockquote type=cite class=cite cite=""><font size=3>The point of a
standards process is not what you put into the spec, its what you leave
out.</font></blockquote><br>
Well said!<br><br>
Joaquin<br><br>
<br><br>
<br><br>
(And certainly true.&nbsp; It has to be understood, of course.&nbsp;
Example: A bolt standard lists many combinations of diameter and thread
pitch.&nbsp; Many.&nbsp; But a vanishingly small percentage of the
possible combinations, almost all of which are left out of that
standard.&nbsp; <br><br>
(In our business, a very effective way to ensure there is&nbsp;&nbsp; n o
t&nbsp; interoperability is to provide many options.)<br><br>
</body>
</html>

--=====================_3799546==.ALT--



--===============0967991535==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============0967991535==--





From dix-bounces@ietf.org Tue Jul 18 15:49:17 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2vZE-0000wR-Pn; Tue, 18 Jul 2006 15:49:16 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2vZE-0000wM-0V
	for dix@ietf.org; Tue, 18 Jul 2006 15:49:16 -0400
Received: from brmea-mail-4.sun.com ([192.18.98.36])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2vZC-0006cD-MC
	for dix@ietf.org; Tue, 18 Jul 2006 15:49:15 -0400
Received: from centralmail4brm.central.Sun.COM ([129.147.62.198])
	by brmea-mail-4.sun.com (8.13.6+Sun/8.12.9) with ESMTP id
	k6IJn92c011967
	for <dix@ietf.org>; Tue, 18 Jul 2006 13:49:14 -0600 (MDT)
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104])
	by centralmail4brm.central.Sun.COM (8.13.6+Sun/8.13.6/ENSMAIL,
	v2.2) with ESMTP id k6IJn8oc015993
	for <dix@ietf.org>; Tue, 18 Jul 2006 13:49:08 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1])
	by binky.Central.Sun.COM (8.13.6+Sun/8.13.6) with ESMTP id
	k6IJn89b004571
	for <dix@ietf.org>; Tue, 18 Jul 2006 14:49:08 -0500 (CDT)
Received: (from nw141292@localhost)
	by binky.Central.Sun.COM (8.13.6+Sun/8.13.6/Submit) id k6IJn8IC004570
	for dix@ietf.org; Tue, 18 Jul 2006 14:49:08 -0500 (CDT)
Date: Tue, 18 Jul 2006 14:49:08 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
Message-ID: <20060718194907.GW21538@binky.Central.Sun.COM>
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
User-Agent: Mutt/1.5.11
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 4b800b1eab964a31702fa68f1ff0e955
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On Tue, Jul 18, 2006 at 06:46:06AM -0700, Hallam-Baker, Phillip wrote:
> Only comment I remember in the BOF itself was EKR pointing out that
> the underlying aim of SASL is essentially broken, I guess that also
> applies to GSSAPI. Options in crypto specs are usually bad.

There's discussion in the jabber room log.  Relevant quotes:

[10:06:20] <ekr> So, this SASL-HTTP thing is a bitch, for a bunch of
                 technical reasons.
...
[10:06:44] <ekr> You sort of end-up with SASL + TLS + Channel Bindings.
...
[10:07:07] <Lisa> pigdog, adding SASL to HTTP is *really* problematic.
		  If somebody explains to me how it can actually work
		  with proxies and statelessness" and everything, I will
		  publicly call them a genius.
[10:07:14] <ekr> nico: maybe I'm out of the loop, but I thought that
                 SASL was considered to be the cool way to do GSS now.
...

There ensued a discussion to answer Lisa's point, which I can summarize
thusly:

The reason that SASL is "*really* problematic" is that it is stream
oriented, and we'd be using it in a protocol (HTTP) that isn't
necessarily a stream, but a sequence of streams (so, really,
message-oriented).

Whereas the GSS-API is message-oriented, which helps a lot.  Using the
GSS-API we can build a pluggable HTTP authentication system that can
work without persistent HTTP 1.1 connections.  We (Leif, Sam, myself,
others), believe we can even do it with statelessness on the server.

So, yes, SASL is fundamentally not useful to us in an HTTP context.

And no, the same is not true of the GSS-API.

To run multi-round-trip GSS-API mechanisms over HTTP without persistent
HTTP 1.1 connections and with server-side statelessness we'd simply
extend the HTTP NEGOTIATE extension to have the server send to clients
an exported GSS-API security context token encrypted in a key that is
known only to the server.  The encrypted exported GSS-API security
context token would carry all the necessary state.

Come to think of it, TLS too could use the same approach to make session
resumption stateless.  That would be nice, very nice, if we can get it.

> A distinction needs to be made between the authentication mechanism
> and the authentication protocol. Given an authentication mechanism
> such as a password, a public key, a biometric there should ideally be
> one protocol that supports that mechanism.

There are many ways to construct security mechanisms that use passwords.
Not all of them are applicable in all circumstances because they have
different cryptographic properties or because of IPR issues.  Thus there
will be more than one password mechanism.

> Having six different algorithms to support password exchange is
> broken. Six different protocols is worse.

But we'll likely have at least two for some time to come:
challenge-response, SRP.

Possibly more: fortified schemes (e.g., challenge-response protected by
TLS and with channel binding to TLS).  And such mechanisms will
typically have to provide upgrade paths for folks who already have
password credentials infrastructure.

Nico
-- 

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 16:35:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2wHa-0004Aq-Og; Tue, 18 Jul 2006 16:35:06 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2wHZ-0004Al-1x
	for dix@ietf.org; Tue, 18 Jul 2006 16:35:05 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2wHX-0003YA-Pc
	for dix@ietf.org; Tue, 18 Jul 2006 16:35:05 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 055611E8C34; Tue, 18 Jul 2006 13:35:03 -0700 (PDT)
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Tue, 18 Jul 2006 13:35:02 -0700
In-Reply-To: <20060718194907.GW21538@binky.Central.Sun.COM> (Nicolas
	Williams's message of "Tue, 18 Jul 2006 14:49:08 -0500")
Message-ID: <86mzb67itl.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 68c8cc8a64a9d0402e43b8eee9fc4199
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Nicolas Williams <Nicolas.Williams@sun.com> writes:
> Come to think of it, TLS too could use the same approach to make session
> resumption stateless.  That would be nice, very nice, if we can get it.

Something like this?

4507 Transport Layer Security (TLS) Session Resumption without
     Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
     2006. 


-Ekr

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 17:45:10 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2xNN-0003s1-7t; Tue, 18 Jul 2006 17:45:09 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2xNL-0003ru-RH
	for dix@ietf.org; Tue, 18 Jul 2006 17:45:07 -0400
Received: from nwkea-mail-5.sun.com ([192.18.42.27])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2xNK-0003yI-9Q
	for dix@ietf.org; Tue, 18 Jul 2006 17:45:07 -0400
Received: from centralmail3brm.Central.Sun.COM ([129.147.62.199])
	by nwkea-mail-5.sun.com (8.13.6+Sun/8.12.9) with ESMTP id
	k6ILj54t022284
	for <dix@ietf.org>; Tue, 18 Jul 2006 14:45:05 -0700 (PDT)
Received: from binky.Central.Sun.COM (binky.Central.Sun.COM [129.153.128.104])
	by centralmail3brm.Central.Sun.COM (8.13.6+Sun/8.13.6/ENSMAIL,
	v2.2) with ESMTP id k6ILg9e4014784
	for <dix@ietf.org>; Tue, 18 Jul 2006 15:42:09 -0600 (MDT)
Received: from binky.Central.Sun.COM (localhost [127.0.0.1])
	by binky.Central.Sun.COM (8.13.6+Sun/8.13.6) with ESMTP id
	k6ILj4e0004671; Tue, 18 Jul 2006 16:45:04 -0500 (CDT)
Received: (from nw141292@localhost)
	by binky.Central.Sun.COM (8.13.6+Sun/8.13.6/Submit) id k6ILj4fq004670; 
	Tue, 18 Jul 2006 16:45:04 -0500 (CDT)
Date: Tue, 18 Jul 2006 16:45:04 -0500
From: Nicolas Williams <Nicolas.Williams@sun.com>
To: EKR <ekr@networkresonance.com>, Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
Message-ID: <20060718214504.GY21538@binky.Central.Sun.COM>
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <86mzb67itl.fsf@raman.networkresonance.com>
User-Agent: Mutt/1.5.11
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On Tue, Jul 18, 2006 at 01:35:02PM -0700, Eric Rescorla wrote:
> Nicolas Williams <Nicolas.Williams@sun.com> writes:
> > Come to think of it, TLS too could use the same approach to make session
> > resumption stateless.  That would be nice, very nice, if we can get it.
> 
> Something like this?
> 
> 4507 Transport Layer Security (TLS) Session Resumption without
>      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
>      2006. 

Yes, exactly like that.  Good to see: a) it's already been done, b)
there's precedent for doing much the same thing with the GSS-API.

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 17:46:04 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2xOG-00043Z-HA; Tue, 18 Jul 2006 17:46:04 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2xOF-00043U-44
	for dix@ietf.org; Tue, 18 Jul 2006 17:46:03 -0400
Received: from cpe-68-175-91-105.nyc.res.rr.com ([68.175.91.105]
	helo=www.secure-endpoints.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2xOC-00042L-RT
	for dix@ietf.org; Tue, 18 Jul 2006 17:46:03 -0400
Received: from [192.168.1.13] by secure-endpoints.com
	(Cipher TLSv1:RC4-MD5:128) (MDaemon PRO v9.0.5)
	with ESMTP id md50000025032.msg
	for <dix@ietf.org>; Tue, 18 Jul 2006 17:47:16 -0400
Message-ID: <44BD56D6.8030502@secure-endpoints.com>
Date: Tue, 18 Jul 2006 17:47:02 -0400
From: Jeffrey Altman <jaltman@secure-endpoints.com>
Organization: Secure Endpoints Inc.
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: EKR <ekr@networkresonance.com>, Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
In-Reply-To: <86mzb67itl.fsf@raman.networkresonance.com>
X-Enigmail-Version: 0.94.0.0
X-Authenticated-Sender: jaltman@secure-endpoints.com
X-Spam-Processed: secure-endpoints.com, Tue, 18 Jul 2006 17:47:16 -0400
	(not processed: message from valid local sender)
X-Return-Path: jaltman@secure-endpoints.com
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: dix@ietf.org
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 8de5f93cb2b4e3bee75302e9eacc33db
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0685449111=="
Errors-To: dix-bounces@ietf.org

This is a cryptographically signed message in MIME format.

--===============0685449111==
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="------------ms050209040704050206040607"

This is a cryptographically signed message in MIME format.

--------------ms050209040704050206040607
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Eric Rescorla wrote:
> Nicolas Williams <Nicolas.Williams@sun.com> writes:
>> Come to think of it, TLS too could use the same approach to make session
>> resumption stateless.  That would be nice, very nice, if we can get it.
> 
> Something like this?
> 
> 4507 Transport Layer Security (TLS) Session Resumption without
>      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
>      2006. 
> 
> 
> -Ekr

Do the the browser vendors know about this RFC?

Do Apache and Microsoft have any intention of implementing it?

Jeffrey Altman

--------------ms050209040704050206040607
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJeTCC
AxcwggKAoAMCAQICEBW00lKwoWJXt8wbmTl1M0kwDQYJKoZIhvcNAQEEBQAwYjELMAkGA1UE
BhMCWkExJTAjBgNVBAoTHFRoYXd0ZSBDb25zdWx0aW5nIChQdHkpIEx0ZC4xLDAqBgNVBAMT
I1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFpbCBJc3N1aW5nIENBMB4XDTA2MDUyNzIyMDMzMloX
DTA3MDUyNzIyMDMzMlowczEPMA0GA1UEBBMGQWx0bWFuMRUwEwYDVQQqEwxKZWZmcmV5IEVy
aWMxHDAaBgNVBAMTE0plZmZyZXkgRXJpYyBBbHRtYW4xKzApBgkqhkiG9w0BCQEWHGphbHRt
YW5Ac2VjdXJlLWVuZHBvaW50cy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQC19SD7DncCP/+wfQlLzAAcxf1nJ/7UQgh4o/nxzvuY55XwHdLQjqWuFUnM5vecfyZKwq0o
fGCucDfcQbSIrkhHD9z4TZ8vDaYWVY9Foz8Rp8G0PNdbRFoFtfJbaeVBX5hG3aQXIc/T1b9U
8uN3kLyqXAFIGWKO8DJVGTKKtOiPVOp1U+9CwujyYmUSKF+suutKABhhK1ZGHsTnFczLZ2g0
ma0H7PiFJ2kLfOf///07E1fbr4IRb+cd87kpWLcjtEZ0rbBr9HlOy9dkeEii/qFoo1ahfKCD
A9bNErMiOXA3dudaNNzXlN/70slq5fboBXbepamJGrsnXYcCsS9+LtCTAgMBAAGjOTA3MCcG
A1UdEQQgMB6BHGphbHRtYW5Ac2VjdXJlLWVuZHBvaW50cy5jb20wDAYDVR0TAQH/BAIwADAN
BgkqhkiG9w0BAQQFAAOBgQDBzWhkrW+ol3iyT1rV8ZBQB0+z/6dFH3djQfNf7jDXNoXx4Vbo
pA7BAR4ihAPibv7j7ZaxmyMxWiDACRGS934uvUS0K6L6q14hTWMostJgFsAEDArrmbrES03v
L3EVETiGFqTB2sLp5MLc6+z+72pLXRuDPL3lO2GOQuBbILswRzCCAxcwggKAoAMCAQICEBW0
0lKwoWJXt8wbmTl1M0kwDQYJKoZIhvcNAQEEBQAwYjELMAkGA1UEBhMCWkExJTAjBgNVBAoT
HFRoYXd0ZSBDb25zdWx0aW5nIChQdHkpIEx0ZC4xLDAqBgNVBAMTI1RoYXd0ZSBQZXJzb25h
bCBGcmVlbWFpbCBJc3N1aW5nIENBMB4XDTA2MDUyNzIyMDMzMloXDTA3MDUyNzIyMDMzMlow
czEPMA0GA1UEBBMGQWx0bWFuMRUwEwYDVQQqEwxKZWZmcmV5IEVyaWMxHDAaBgNVBAMTE0pl
ZmZyZXkgRXJpYyBBbHRtYW4xKzApBgkqhkiG9w0BCQEWHGphbHRtYW5Ac2VjdXJlLWVuZHBv
aW50cy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC19SD7DncCP/+wfQlL
zAAcxf1nJ/7UQgh4o/nxzvuY55XwHdLQjqWuFUnM5vecfyZKwq0ofGCucDfcQbSIrkhHD9z4
TZ8vDaYWVY9Foz8Rp8G0PNdbRFoFtfJbaeVBX5hG3aQXIc/T1b9U8uN3kLyqXAFIGWKO8DJV
GTKKtOiPVOp1U+9CwujyYmUSKF+suutKABhhK1ZGHsTnFczLZ2g0ma0H7PiFJ2kLfOf///07
E1fbr4IRb+cd87kpWLcjtEZ0rbBr9HlOy9dkeEii/qFoo1ahfKCDA9bNErMiOXA3dudaNNzX
lN/70slq5fboBXbepamJGrsnXYcCsS9+LtCTAgMBAAGjOTA3MCcGA1UdEQQgMB6BHGphbHRt
YW5Ac2VjdXJlLWVuZHBvaW50cy5jb20wDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQQFAAOB
gQDBzWhkrW+ol3iyT1rV8ZBQB0+z/6dFH3djQfNf7jDXNoXx4VbopA7BAR4ihAPibv7j7Zax
myMxWiDACRGS934uvUS0K6L6q14hTWMostJgFsAEDArrmbrES03vL3EVETiGFqTB2sLp5MLc
6+z+72pLXRuDPL3lO2GOQuBbILswRzCCAz8wggKooAMCAQICAQ0wDQYJKoZIhvcNAQEFBQAw
gdExCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUg
VG93bjEaMBgGA1UEChMRVGhhd3RlIENvbnN1bHRpbmcxKDAmBgNVBAsTH0NlcnRpZmljYXRp
b24gU2VydmljZXMgRGl2aXNpb24xJDAiBgNVBAMTG1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFp
bCBDQTErMCkGCSqGSIb3DQEJARYccGVyc29uYWwtZnJlZW1haWxAdGhhd3RlLmNvbTAeFw0w
MzA3MTcwMDAwMDBaFw0xMzA3MTYyMzU5NTlaMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxU
aGF3dGUgQ29uc3VsdGluZyAoUHR5KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwg
RnJlZW1haWwgSXNzdWluZyBDQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxKY8VXNV
+065yplaHmjAdQRwnd/p/6Me7L3N9VvyGna9fww6YfK/Uc4B1OVQCjDXAmNaLIkVcI7dyfAr
hVqqP3FWy688Cwfn8R+RNiQqE88r1fOCdz0Dviv+uxg+B79AgAJk16emu59l0cUqVIUPSAR/
p7bRPGEEQB5kGXJgt/sCAwEAAaOBlDCBkTASBgNVHRMBAf8ECDAGAQH/AgEAMEMGA1UdHwQ8
MDowOKA2oDSGMmh0dHA6Ly9jcmwudGhhd3RlLmNvbS9UaGF3dGVQZXJzb25hbEZyZWVtYWls
Q0EuY3JsMAsGA1UdDwQEAwIBBjApBgNVHREEIjAgpB4wHDEaMBgGA1UEAxMRUHJpdmF0ZUxh
YmVsMi0xMzgwDQYJKoZIhvcNAQEFBQADgYEASIzRUIPqCy7MDaNmrGcPf6+svsIXoUOWlJ1/
TCG4+DYfqi2fNi/A9BxQIJNwPP2t4WFiw9k6GX6EsZkbAMUaC4J0niVQlGLH2ydxVyWN3amc
OY6MIE9lX5Xa9/eH1sYITq726jTlEBpbNU1341YheILcIRk13iSx0x1G/11fZU8xggNkMIID
YAIBATB2MGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGluZyAoUHR5
KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwgRnJlZW1haWwgSXNzdWluZyBDQQIQ
FbTSUrChYle3zBuZOXUzSTAJBgUrDgMCGgUAoIIBwzAYBgkqhkiG9w0BCQMxCwYJKoZIhvcN
AQcBMBwGCSqGSIb3DQEJBTEPFw0wNjA3MTgyMTQ3MDJaMCMGCSqGSIb3DQEJBDEWBBSE9D3t
Sa96PJNhe7//C1rKtTZcXjBSBgkqhkiG9w0BCQ8xRTBDMAoGCCqGSIb3DQMHMA4GCCqGSIb3
DQMCAgIAgDANBggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDCBhQYJKwYB
BAGCNxAEMXgwdjBiMQswCQYDVQQGEwJaQTElMCMGA1UEChMcVGhhd3RlIENvbnN1bHRpbmcg
KFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNvbmFsIEZyZWVtYWlsIElzc3Vpbmcg
Q0ECEBW00lKwoWJXt8wbmTl1M0kwgYcGCyqGSIb3DQEJEAILMXigdjBiMQswCQYDVQQGEwJa
QTElMCMGA1UEChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhh
d3RlIFBlcnNvbmFsIEZyZWVtYWlsIElzc3VpbmcgQ0ECEBW00lKwoWJXt8wbmTl1M0kwDQYJ
KoZIhvcNAQEBBQAEggEAgZhgWHRD9bn/ScOlrcMTTpo+2XmPnBBLVey+l4cvLiTgGBSWH8wA
wJ4/G57pmSuwTXwCV+pmlJwlQNwT7qpd+09OX2tOvLsiHKtTC34oNS5Eq2o3i4qSXRxtD0IV
OsM07XDC4YR0MHJuQBiBoCafT9qh7cCxRfhrISWqKzWj77b14SYMgKRitu/QjDJ0yfzZRI9V
uJ83J1CibDdKequRRwa7yeGBJT6RUSf1EYUibgoDF+oyqSKDcbubPF+KX3trqFu7xhcOlUqZ
Qp0d7zkphfbAdXBwo+iPZWFNkawDnnFjg7D9IIG/j/fm5o7zY+1omVENvuyOGbRKlglbUavA
ywAAAAAAAA==
--------------ms050209040704050206040607--



--===============0685449111==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============0685449111==--





From dix-bounces@ietf.org Tue Jul 18 17:49:25 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2xRV-0004hA-5N; Tue, 18 Jul 2006 17:49:25 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2xRT-0004h5-TG
	for dix@ietf.org; Tue, 18 Jul 2006 17:49:23 -0400
Received: from raman.networkresonance.com ([198.144.196.3])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2xRS-0004JP-K7
	for dix@ietf.org; Tue, 18 Jul 2006 17:49:23 -0400
Received: by raman.networkresonance.com (Postfix, from userid 1001)
	id 9D3C51E8C34; Tue, 18 Jul 2006 14:49:21 -0700 (PDT)
To: Jeffrey Altman <jaltman@secure-endpoints.com>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
	<44BD56D6.8030502@secure-endpoints.com>
From: Eric Rescorla <ekr@networkresonance.com>
Date: Tue, 18 Jul 2006 14:49:21 -0700
In-Reply-To: <44BD56D6.8030502@secure-endpoints.com> (Jeffrey Altman's message
	of "Tue, 18 Jul 2006 17:47:02 -0400")
Message-ID: <86fygy7fdq.fsf@raman.networkresonance.com>
User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.19 (berkeley-unix)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7655788c23eb79e336f5f8ba8bce7906
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: EKR <ekr@networkresonance.com>,
	Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Jeffrey Altman <jaltman@secure-endpoints.com> writes:

> Eric Rescorla wrote:
>> Nicolas Williams <Nicolas.Williams@sun.com> writes:
>>> Come to think of it, TLS too could use the same approach to make session
>>> resumption stateless.  That would be nice, very nice, if we can get it.
>> 
>> Something like this?
>> 
>> 4507 Transport Layer Security (TLS) Session Resumption without
>>      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
>>      2006. 
>> 
>> 
>> -Ekr
>
> Do the the browser vendors know about this RFC?
>
> Do Apache and Microsoft have any intention of implementing it?

Sorry, don't know the answer to either question.

-Ekr

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Jul 18 18:08:44 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G2xkC-0000QD-67; Tue, 18 Jul 2006 18:08:44 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G2xkA-0000Pw-4P
	for dix@ietf.org; Tue, 18 Jul 2006 18:08:42 -0400
Received: from cpe-68-175-91-105.nyc.res.rr.com ([68.175.91.105]
	helo=www.secure-endpoints.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G2xk8-0005Qq-Rw
	for dix@ietf.org; Tue, 18 Jul 2006 18:08:42 -0400
Received: from [192.168.1.13] by secure-endpoints.com
	(Cipher TLSv1:RC4-MD5:128) (MDaemon PRO v9.0.5)
	with ESMTP id md50000025036.msg
	for <dix@ietf.org>; Tue, 18 Jul 2006 18:09:56 -0400
Message-ID: <44BD5C25.4080002@secure-endpoints.com>
Date: Tue, 18 Jul 2006 18:09:41 -0400
From: Jeffrey Altman <jaltman@secure-endpoints.com>
Organization: Secure Endpoints Inc.
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: EKR <ekr@networkresonance.com>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>	<20060718194907.GW21538@binky.Central.Sun.COM>	<86mzb67itl.fsf@raman.networkresonance.com>	<44BD56D6.8030502@secure-endpoints.com>
	<86fygy7fdq.fsf@raman.networkresonance.com>
In-Reply-To: <86fygy7fdq.fsf@raman.networkresonance.com>
X-Enigmail-Version: 0.94.0.0
X-Authenticated-Sender: jaltman@secure-endpoints.com
X-Spam-Processed: secure-endpoints.com, Tue, 18 Jul 2006 18:09:56 -0400
	(not processed: message from valid local sender)
X-Return-Path: jaltman@secure-endpoints.com
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: dix@ietf.org
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 057ebe9b96adec30a7efb2aeda4c26a4
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0442875971=="
Errors-To: dix-bounces@ietf.org

This is a cryptographically signed message in MIME format.

--===============0442875971==
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="------------ms080708040201030002000708"

This is a cryptographically signed message in MIME format.

--------------ms080708040201030002000708
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Eric Rescorla wrote:
> Jeffrey Altman <jaltman@secure-endpoints.com> writes:
> 
>> Eric Rescorla wrote:
>>> Nicolas Williams <Nicolas.Williams@sun.com> writes:
>>>> Come to think of it, TLS too could use the same approach to make session
>>>> resumption stateless.  That would be nice, very nice, if we can get it.
>>> Something like this?
>>>
>>> 4507 Transport Layer Security (TLS) Session Resumption without
>>>      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
>>>      2006. 
>>>
>>>
>>> -Ekr
>> Do the the browser vendors know about this RFC?
>>
>> Do Apache and Microsoft have any intention of implementing it?
> 
> Sorry, don't know the answer to either question.
> 
> -Ekr

We need to do a better job of promoting our protocols.

Jeffrey Altman


--------------ms080708040201030002000708
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJeTCC
AxcwggKAoAMCAQICEBW00lKwoWJXt8wbmTl1M0kwDQYJKoZIhvcNAQEEBQAwYjELMAkGA1UE
BhMCWkExJTAjBgNVBAoTHFRoYXd0ZSBDb25zdWx0aW5nIChQdHkpIEx0ZC4xLDAqBgNVBAMT
I1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFpbCBJc3N1aW5nIENBMB4XDTA2MDUyNzIyMDMzMloX
DTA3MDUyNzIyMDMzMlowczEPMA0GA1UEBBMGQWx0bWFuMRUwEwYDVQQqEwxKZWZmcmV5IEVy
aWMxHDAaBgNVBAMTE0plZmZyZXkgRXJpYyBBbHRtYW4xKzApBgkqhkiG9w0BCQEWHGphbHRt
YW5Ac2VjdXJlLWVuZHBvaW50cy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQC19SD7DncCP/+wfQlLzAAcxf1nJ/7UQgh4o/nxzvuY55XwHdLQjqWuFUnM5vecfyZKwq0o
fGCucDfcQbSIrkhHD9z4TZ8vDaYWVY9Foz8Rp8G0PNdbRFoFtfJbaeVBX5hG3aQXIc/T1b9U
8uN3kLyqXAFIGWKO8DJVGTKKtOiPVOp1U+9CwujyYmUSKF+suutKABhhK1ZGHsTnFczLZ2g0
ma0H7PiFJ2kLfOf///07E1fbr4IRb+cd87kpWLcjtEZ0rbBr9HlOy9dkeEii/qFoo1ahfKCD
A9bNErMiOXA3dudaNNzXlN/70slq5fboBXbepamJGrsnXYcCsS9+LtCTAgMBAAGjOTA3MCcG
A1UdEQQgMB6BHGphbHRtYW5Ac2VjdXJlLWVuZHBvaW50cy5jb20wDAYDVR0TAQH/BAIwADAN
BgkqhkiG9w0BAQQFAAOBgQDBzWhkrW+ol3iyT1rV8ZBQB0+z/6dFH3djQfNf7jDXNoXx4Vbo
pA7BAR4ihAPibv7j7ZaxmyMxWiDACRGS934uvUS0K6L6q14hTWMostJgFsAEDArrmbrES03v
L3EVETiGFqTB2sLp5MLc6+z+72pLXRuDPL3lO2GOQuBbILswRzCCAxcwggKAoAMCAQICEBW0
0lKwoWJXt8wbmTl1M0kwDQYJKoZIhvcNAQEEBQAwYjELMAkGA1UEBhMCWkExJTAjBgNVBAoT
HFRoYXd0ZSBDb25zdWx0aW5nIChQdHkpIEx0ZC4xLDAqBgNVBAMTI1RoYXd0ZSBQZXJzb25h
bCBGcmVlbWFpbCBJc3N1aW5nIENBMB4XDTA2MDUyNzIyMDMzMloXDTA3MDUyNzIyMDMzMlow
czEPMA0GA1UEBBMGQWx0bWFuMRUwEwYDVQQqEwxKZWZmcmV5IEVyaWMxHDAaBgNVBAMTE0pl
ZmZyZXkgRXJpYyBBbHRtYW4xKzApBgkqhkiG9w0BCQEWHGphbHRtYW5Ac2VjdXJlLWVuZHBv
aW50cy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC19SD7DncCP/+wfQlL
zAAcxf1nJ/7UQgh4o/nxzvuY55XwHdLQjqWuFUnM5vecfyZKwq0ofGCucDfcQbSIrkhHD9z4
TZ8vDaYWVY9Foz8Rp8G0PNdbRFoFtfJbaeVBX5hG3aQXIc/T1b9U8uN3kLyqXAFIGWKO8DJV
GTKKtOiPVOp1U+9CwujyYmUSKF+suutKABhhK1ZGHsTnFczLZ2g0ma0H7PiFJ2kLfOf///07
E1fbr4IRb+cd87kpWLcjtEZ0rbBr9HlOy9dkeEii/qFoo1ahfKCDA9bNErMiOXA3dudaNNzX
lN/70slq5fboBXbepamJGrsnXYcCsS9+LtCTAgMBAAGjOTA3MCcGA1UdEQQgMB6BHGphbHRt
YW5Ac2VjdXJlLWVuZHBvaW50cy5jb20wDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQQFAAOB
gQDBzWhkrW+ol3iyT1rV8ZBQB0+z/6dFH3djQfNf7jDXNoXx4VbopA7BAR4ihAPibv7j7Zax
myMxWiDACRGS934uvUS0K6L6q14hTWMostJgFsAEDArrmbrES03vL3EVETiGFqTB2sLp5MLc
6+z+72pLXRuDPL3lO2GOQuBbILswRzCCAz8wggKooAMCAQICAQ0wDQYJKoZIhvcNAQEFBQAw
gdExCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUg
VG93bjEaMBgGA1UEChMRVGhhd3RlIENvbnN1bHRpbmcxKDAmBgNVBAsTH0NlcnRpZmljYXRp
b24gU2VydmljZXMgRGl2aXNpb24xJDAiBgNVBAMTG1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFp
bCBDQTErMCkGCSqGSIb3DQEJARYccGVyc29uYWwtZnJlZW1haWxAdGhhd3RlLmNvbTAeFw0w
MzA3MTcwMDAwMDBaFw0xMzA3MTYyMzU5NTlaMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxU
aGF3dGUgQ29uc3VsdGluZyAoUHR5KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwg
RnJlZW1haWwgSXNzdWluZyBDQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxKY8VXNV
+065yplaHmjAdQRwnd/p/6Me7L3N9VvyGna9fww6YfK/Uc4B1OVQCjDXAmNaLIkVcI7dyfAr
hVqqP3FWy688Cwfn8R+RNiQqE88r1fOCdz0Dviv+uxg+B79AgAJk16emu59l0cUqVIUPSAR/
p7bRPGEEQB5kGXJgt/sCAwEAAaOBlDCBkTASBgNVHRMBAf8ECDAGAQH/AgEAMEMGA1UdHwQ8
MDowOKA2oDSGMmh0dHA6Ly9jcmwudGhhd3RlLmNvbS9UaGF3dGVQZXJzb25hbEZyZWVtYWls
Q0EuY3JsMAsGA1UdDwQEAwIBBjApBgNVHREEIjAgpB4wHDEaMBgGA1UEAxMRUHJpdmF0ZUxh
YmVsMi0xMzgwDQYJKoZIhvcNAQEFBQADgYEASIzRUIPqCy7MDaNmrGcPf6+svsIXoUOWlJ1/
TCG4+DYfqi2fNi/A9BxQIJNwPP2t4WFiw9k6GX6EsZkbAMUaC4J0niVQlGLH2ydxVyWN3amc
OY6MIE9lX5Xa9/eH1sYITq726jTlEBpbNU1341YheILcIRk13iSx0x1G/11fZU8xggNkMIID
YAIBATB2MGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGluZyAoUHR5
KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwgRnJlZW1haWwgSXNzdWluZyBDQQIQ
FbTSUrChYle3zBuZOXUzSTAJBgUrDgMCGgUAoIIBwzAYBgkqhkiG9w0BCQMxCwYJKoZIhvcN
AQcBMBwGCSqGSIb3DQEJBTEPFw0wNjA3MTgyMjA5NDFaMCMGCSqGSIb3DQEJBDEWBBSQVf6D
kgzJ7F3mMQeyBRMGHOzE5jBSBgkqhkiG9w0BCQ8xRTBDMAoGCCqGSIb3DQMHMA4GCCqGSIb3
DQMCAgIAgDANBggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDCBhQYJKwYB
BAGCNxAEMXgwdjBiMQswCQYDVQQGEwJaQTElMCMGA1UEChMcVGhhd3RlIENvbnN1bHRpbmcg
KFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNvbmFsIEZyZWVtYWlsIElzc3Vpbmcg
Q0ECEBW00lKwoWJXt8wbmTl1M0kwgYcGCyqGSIb3DQEJEAILMXigdjBiMQswCQYDVQQGEwJa
QTElMCMGA1UEChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhh
d3RlIFBlcnNvbmFsIEZyZWVtYWlsIElzc3VpbmcgQ0ECEBW00lKwoWJXt8wbmTl1M0kwDQYJ
KoZIhvcNAQEBBQAEggEAsgyUMvIbiSvChvZNkzVw697gxVlRLlziduC36rzjUFayTqgXrCVJ
7LCpO8o7t4i5yzFuodkHeGiAMss+njOEGeFxwpoJSsW3YHdPn+Dt14uJwUORG6YSP7RKH59g
K+he53GfF5E+tNFhRn0FDbxqZ5m7Zxxv++AeL5gCEE25eUcBnwkv2jkhsvKTZg5iuI0NFpVE
scPM14RL1HB2P8w0B1DrQAiioQPDrzs8C3kOkNRv2Sc0OTcSnHp03QXNdeN54e7hkvN3dJ4X
UFya0BzQM/TSmQYFmHaqCSttuICNOhzFn8LWzuOr54Qv750Cdy8T96OgwbMsCuqtpivU7+Y/
ZwAAAAAAAA==
--------------ms080708040201030002000708--



--===============0442875971==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============0442875971==--





From dix-bounces@ietf.org Wed Jul 19 02:50:48 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G35tM-0007aX-7g; Wed, 19 Jul 2006 02:50:44 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G35tL-0007aJ-3p
	for dix@ietf.org; Wed, 19 Jul 2006 02:50:43 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G35tJ-0003uH-Pk
	for dix@ietf.org; Wed, 19 Jul 2006 02:50:43 -0400
Received: from [192.168.1.103] (d154-5-104-215.bchsia.telus.net
	[154.5.104.215]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k6J6oeVn070497
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Tue, 18 Jul 2006 23:50:40 -0700 (PDT)
	(envelope-from dick@sxip.com)
Mime-Version: 1.0 (Apple Message framework v752.2)
In-Reply-To: <44BD5C25.4080002@secure-endpoints.com>
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>	<20060718194907.GW21538@binky.Central.Sun.COM>	<86mzb67itl.fsf@raman.networkresonance.com>	<44BD56D6.8030502@secure-endpoints.com>
	<86fygy7fdq.fsf@raman.networkresonance.com>
	<44BD5C25.4080002@secure-endpoints.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <AA2AD32A-2157-45A1-BFF5-6074E659C76B@sxip.com>
Content-Transfer-Encoding: 7bit
From: Dick Hardt <dick@sxip.com>
Subject: Re: [dix] DRAFT: WAE BOF minutes
Date: Tue, 18 Jul 2006 23:50:39 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.752.2)
X-Spam-Status: No, score=1.0 required=5.0 tests=AWL,BAYES_00,
	RCVD_IN_NJABL_DUL,RCVD_IN_SORBS_DUL autolearn=no version=3.1.0
X-Spam-Level: *
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d17f825e43c9aed4fd65b7edddddec89
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 18-Jul-06, at 3:09 PM, Jeffrey Altman wrote:
> We need to do a better job of promoting our protocols.

or documenting protocols so it is clear what real world problems?

or perhaps the protocols don't solve the problem in a manner that  
works for the servers and browsers?

(I say this with little knowledge of the protocols or documents  
themselves)

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 19 04:46:38 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G37hR-0001dV-EF; Wed, 19 Jul 2006 04:46:33 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G37hQ-0001dP-HX
	for dix@ietf.org; Wed, 19 Jul 2006 04:46:32 -0400
Received: from mx1.redhat.com ([66.187.233.31])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G37hP-0005A4-9b
	for dix@ietf.org; Wed, 19 Jul 2006 04:46:32 -0400
Received: from int-mx1.corp.redhat.com (int-mx1.corp.redhat.com
	[172.16.52.254])
	by mx1.redhat.com (8.12.11.20060308/8.12.11) with ESMTP id
	k6J8kV7c010142 for <dix@ietf.org>; Wed, 19 Jul 2006 04:46:31 -0400
Received: from turnip.cambridge.redhat.com (turnip.cambridge.redhat.com
	[172.16.18.137])
	by int-mx1.corp.redhat.com (8.12.11.20060308/8.12.11) with ESMTP id
	k6J8kToO010089 for <dix@ietf.org>; Wed, 19 Jul 2006 04:46:30 -0400
Received: from turnip.cambridge.redhat.com (localhost.localdomain [127.0.0.1])
	by turnip.cambridge.redhat.com (8.13.6/8.13.5) with ESMTP id
	k6J8kS5D005963 for <dix@ietf.org>; Wed, 19 Jul 2006 09:46:28 +0100
Received: (from jorton@localhost)
	by turnip.cambridge.redhat.com (8.13.6/8.13.6/Submit) id k6J8kSHd005962
	for dix@ietf.org; Wed, 19 Jul 2006 09:46:28 +0100
X-Authentication-Warning: turnip.cambridge.redhat.com: jorton set sender to
	jorton@redhat.com using -f
Date: Wed, 19 Jul 2006 09:46:28 +0100
From: Joe Orton <jorton@redhat.com>
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
Message-ID: <20060719084628.GA5497@redhat.com>
Mail-Followup-To: Digital Identity Exchange <dix@ietf.org>
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
	<44BD56D6.8030502@secure-endpoints.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <44BD56D6.8030502@secure-endpoints.com>
User-Agent: Mutt/1.4.2.1i
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7655788c23eb79e336f5f8ba8bce7906
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On Tue, Jul 18, 2006 at 05:47:02PM -0400, Jeffrey Altman wrote:
> Eric Rescorla wrote:
> > Nicolas Williams <Nicolas.Williams@sun.com> writes:
> >> Come to think of it, TLS too could use the same approach to make session
> >> resumption stateless.  That would be nice, very nice, if we can get it.
> > 
> > Something like this?
> > 
> > 4507 Transport Layer Security (TLS) Session Resumption without
> >      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
> >      2006. 
> > 
> > 
> > -Ekr
> 
> Do the the browser vendors know about this RFC?
> 
> Do Apache and Microsoft have any intention of implementing it?

Getting the TLS extension supported in the SSL library is the hard part; 
enabling such things Apache-side in mod_ssl is generally simple.

joe

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 19 06:59:30 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G39m3-0007oJ-U5; Wed, 19 Jul 2006 06:59:27 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G39m2-0007nx-Si
	for dix@ietf.org; Wed, 19 Jul 2006 06:59:26 -0400
Received: from smtp-out.google.com ([216.239.33.17])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G39m1-00011u-Aa
	for dix@ietf.org; Wed, 19 Jul 2006 06:59:26 -0400
Received: from stewie.corp.google.com (stewie.corp.google.com [172.24.0.49])
	by smtp-out.google.com with ESMTP id k6JAxKp3025313
	for <dix@ietf.org>; Wed, 19 Jul 2006 11:59:21 +0100
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=vVNYwuhgXuqGl0Q+RKgiDb2wzV948qbla7vf5gwMK1ny3Xqz4reeChQlgItVknvtV
	wwUi7F9g0L6a3hc/Rnzhw==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by stewie.corp.google.com with ESMTP id k6JAvDMx032574
	for <dix@ietf.org>; Wed, 19 Jul 2006 03:59:20 -0700
Received: by smtp-out2.google.com with SMTP id 16so67527fpe
	for <dix@ietf.org>; Wed, 19 Jul 2006 03:59:20 -0700 (PDT)
Received: by 10.253.15.5 with SMTP id 5mr811737fpo;
	Wed, 19 Jul 2006 03:59:20 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Wed, 19 Jul 2006 03:59:20 -0700 (PDT)
Message-ID: <1b587cab0607190359i5bf9508foa4b8afe034ed3aee@mail.google.com>
Date: Wed, 19 Jul 2006 11:59:20 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
In-Reply-To: <44BD56D6.8030502@secure-endpoints.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
	<44BD56D6.8030502@secure-endpoints.com>
X-Spam-Score: -4.3 (----)
X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/18/06, Jeffrey Altman <jaltman@secure-endpoints.com> wrote:
> Eric Rescorla wrote:
> > Nicolas Williams <Nicolas.Williams@sun.com> writes:
> >> Come to think of it, TLS too could use the same approach to make session
> >> resumption stateless.  That would be nice, very nice, if we can get it.
> >
> > Something like this?
> >
> > 4507 Transport Layer Security (TLS) Session Resumption without
> >      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
> >      2006.
> >
> >
> > -Ekr
>
> Do the the browser vendors know about this RFC?
>
> Do Apache and Microsoft have any intention of implementing it?

Apache gets it if OpenSSL gets it. Patches welcome :-)

>
> Jeffrey Altman
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 19 07:01:37 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G39o6-0007tC-CV; Wed, 19 Jul 2006 07:01:34 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G39o5-0007t7-2U
	for dix@ietf.org; Wed, 19 Jul 2006 07:01:33 -0400
Received: from smtp-out.google.com ([216.239.33.17])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G39o3-0001Fi-Kj
	for dix@ietf.org; Wed, 19 Jul 2006 07:01:33 -0400
Received: from vegeta.corp.google.com (vegeta.corp.google.com [172.24.0.3])
	by smtp-out.google.com with ESMTP id k6JB1NNh027439
	for <dix@ietf.org>; Wed, 19 Jul 2006 12:01:23 +0100
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=Y4Bw0bWuFWns5A3vrbHer4B7fh09Yx7Qe3sd/32Fit3WWB1SKUWBgx0ppYwyeZc8+
	UeYDhTKe8XY+lh6/6owYw==
Received: from smtp-out2.google.com (fpx33.prod.google.com [10.253.24.33])
	by vegeta.corp.google.com with ESMTP id k6JAvTcO012345
	for <dix@ietf.org>; Wed, 19 Jul 2006 04:01:19 -0700
Received: by smtp-out2.google.com with SMTP id 33so66151fpx
	for <dix@ietf.org>; Wed, 19 Jul 2006 04:01:19 -0700 (PDT)
Received: by 10.253.29.11 with SMTP id c11mr811483fpc;
	Wed, 19 Jul 2006 04:01:19 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Wed, 19 Jul 2006 04:01:19 -0700 (PDT)
Message-ID: <1b587cab0607190401x421492f2p19e3bb686e75777a@mail.google.com>
Date: Wed, 19 Jul 2006 12:01:19 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
In-Reply-To: <44BD5C25.4080002@secure-endpoints.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
	<44BD56D6.8030502@secure-endpoints.com>
	<86fygy7fdq.fsf@raman.networkresonance.com>
	<44BD5C25.4080002@secure-endpoints.com>
X-Spam-Score: -4.3 (----)
X-Scan-Signature: c1c65599517f9ac32519d043c37c5336
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/18/06, Jeffrey Altman <jaltman@secure-endpoints.com> wrote:
> Eric Rescorla wrote:
> > Jeffrey Altman <jaltman@secure-endpoints.com> writes:
> >
> >> Eric Rescorla wrote:
> >>> Nicolas Williams <Nicolas.Williams@sun.com> writes:
> >>>> Come to think of it, TLS too could use the same approach to make session
> >>>> resumption stateless.  That would be nice, very nice, if we can get it.
> >>> Something like this?
> >>>
> >>> 4507 Transport Layer Security (TLS) Session Resumption without
> >>>      Server-Side State. J. Salowey, H. Zhou, P. Eronen, H. Tschofenig. May
> >>>      2006.
> >>>
> >>>
> >>> -Ekr
> >> Do the the browser vendors know about this RFC?
> >>
> >> Do Apache and Microsoft have any intention of implementing it?
> >
> > Sorry, don't know the answer to either question.
> >
> > -Ekr
>
> We need to do a better job of promoting our protocols.

I'd note that most of the work of supporting these things has to be
done in OpenSSL, and unlike Apache, OpenSSL does not have a large
funded development community.

Expecting volunteers to rush to implement every cute TLS feature is
asking a lot. The way to make this happen is to find money for OpenSSL
development.

>
> Jeffrey Altman
>
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 19 09:38:59 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G3CGO-0005qs-Ib; Wed, 19 Jul 2006 09:38:56 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G3CGM-0005qb-Nz
	for dix@ietf.org; Wed, 19 Jul 2006 09:38:54 -0400
Received: from cpe-68-175-91-105.nyc.res.rr.com ([68.175.91.105]
	helo=www.secure-endpoints.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G3CGK-0002k9-Di
	for dix@ietf.org; Wed, 19 Jul 2006 09:38:54 -0400
Received: from [192.168.1.13] by secure-endpoints.com
	(Cipher TLSv1:RC4-MD5:128) (MDaemon PRO v9.0.5)
	with ESMTP id md50000025079.msg
	for <dix@ietf.org>; Wed, 19 Jul 2006 09:40:08 -0400
Message-ID: <44BE3622.6090504@secure-endpoints.com>
Date: Wed, 19 Jul 2006 09:39:46 -0400
From: Jeffrey Altman <jaltman@secure-endpoints.com>
Organization: Secure Endpoints Inc.
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>	<20060718194907.GW21538@binky.Central.Sun.COM>	<86mzb67itl.fsf@raman.networkresonance.com>	<44BD56D6.8030502@secure-endpoints.com>	<86fygy7fdq.fsf@raman.networkresonance.com>	<44BD5C25.4080002@secure-endpoints.com>
	<1b587cab0607190401x421492f2p19e3bb686e75777a@mail.google.com>
In-Reply-To: <1b587cab0607190401x421492f2p19e3bb686e75777a@mail.google.com>
X-Enigmail-Version: 0.94.0.0
X-Authenticated-Sender: jaltman@secure-endpoints.com
X-Spam-Processed: secure-endpoints.com, Wed, 19 Jul 2006 09:40:08 -0400
	(not processed: message from valid local sender)
X-Return-Path: jaltman@secure-endpoints.com
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: dix@ietf.org
X-Spam-Score: 0.2 (/)
X-Scan-Signature: a7d2e37451f7f22841e3b6f40c67db0f
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0035171713=="
Errors-To: dix-bounces@ietf.org

This is a cryptographically signed message in MIME format.

--===============0035171713==
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="------------ms010406090507000006090906"

This is a cryptographically signed message in MIME format.

--------------ms010406090507000006090906
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

Ben Laurie wrote:
> I'd note that most of the work of supporting these things has to be
> done in OpenSSL, and unlike Apache, OpenSSL does not have a large
> funded development community.
> 
> Expecting volunteers to rush to implement every cute TLS feature is
> asking a lot. The way to make this happen is to find money for OpenSSL
> development.

Ben:

I am very well aware that compared to the applications that use OpenSSL,
those working on OpenSSL find it next to impossible to obtain
contributions to support their efforts.  Individuals and small
businesses are not going to write a check for OpenSSL (or an OpenSSL
contributor) to develop this code.   That's not how people think.

Instead someone will write a check to Apache to implement support
for said feature because they want it in their web server.  The Apache
folks will respond with (a) once OpenSSL gives it to us we will have
it so don't worry about it; and (b) it won't do you any good anyway
because the browsers, webdav clients, etc. don't implement it.

We are therefore left with a serious catch-22.  The only way that we
can get functionality like this implemented is to first obtain agreement
from the client and server vendors.  Only then might it become
reasonable to expect end users to step up with funding.

Jeffrey Altman


--------------ms010406090507000006090906
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms010406090507000006090906--



--===============0035171713==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============0035171713==--





From dix-bounces@ietf.org Wed Jul 19 09:58:32 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G3CZL-0007UL-RV; Wed, 19 Jul 2006 09:58:31 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G3CZK-0007UG-I4
	for dix@ietf.org; Wed, 19 Jul 2006 09:58:30 -0400
Received: from smtp-out.google.com ([216.239.33.17])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G3CZJ-0003rV-40
	for dix@ietf.org; Wed, 19 Jul 2006 09:58:30 -0400
Received: from stewie.corp.google.com (stewie.corp.google.com [172.24.0.49])
	by smtp-out.google.com with ESMTP id k6JDwQPc005068
	for <dix@ietf.org>; Wed, 19 Jul 2006 14:58:26 +0100
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns;
	h=received:message-id:date:from:to:subject:in-reply-to:
	mime-version:content-type:content-transfer-encoding:
	content-disposition:references;
	b=EQvGeeL7p7cgD7SUPP/6DtGlQhoU+50vt62ONOVmMC7AZamw1Ea8aQylL0Ya2556M
	B/knt/wX4tnzcT/1kpcSA==
Received: from smtp-out2.google.com (fpe16.prod.google.com [10.253.5.16])
	by stewie.corp.google.com with ESMTP id k6JCpeVq031668
	for <dix@ietf.org>; Wed, 19 Jul 2006 06:58:21 -0700
Received: by smtp-out2.google.com with SMTP id 16so70405fpe
	for <dix@ietf.org>; Wed, 19 Jul 2006 06:58:21 -0700 (PDT)
Received: by 10.253.1.18 with SMTP id 18mr835563fpa;
	Wed, 19 Jul 2006 06:58:21 -0700 (PDT)
Received: by 10.253.14.2 with HTTP; Wed, 19 Jul 2006 06:58:21 -0700 (PDT)
Message-ID: <1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com>
Date: Wed, 19 Jul 2006 14:58:21 +0100
From: "Ben Laurie" <benl@google.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
In-Reply-To: <44BE3622.6090504@secure-endpoints.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
	<44BD56D6.8030502@secure-endpoints.com>
	<86fygy7fdq.fsf@raman.networkresonance.com>
	<44BD5C25.4080002@secure-endpoints.com>
	<1b587cab0607190401x421492f2p19e3bb686e75777a@mail.google.com>
	<44BE3622.6090504@secure-endpoints.com>
X-Spam-Score: -4.3 (----)
X-Scan-Signature: 538aad3a3c4f01d8b6a6477ca4248793
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

On 7/19/06, Jeffrey Altman <jaltman@secure-endpoints.com> wrote:
> Ben Laurie wrote:
> > I'd note that most of the work of supporting these things has to be
> > done in OpenSSL, and unlike Apache, OpenSSL does not have a large
> > funded development community.
> >
> > Expecting volunteers to rush to implement every cute TLS feature is
> > asking a lot. The way to make this happen is to find money for OpenSSL
> > development.
>
> Ben:
>
> I am very well aware that compared to the applications that use OpenSSL,
> those working on OpenSSL find it next to impossible to obtain
> contributions to support their efforts.  Individuals and small
> businesses are not going to write a check for OpenSSL (or an OpenSSL
> contributor) to develop this code.   That's not how people think.
>
> Instead someone will write a check to Apache to implement support
> for said feature because they want it in their web server.  The Apache
> folks will respond with (a) once OpenSSL gives it to us we will have
> it so don't worry about it; and (b) it won't do you any good anyway
> because the browsers, webdav clients, etc. don't implement it.
>
> We are therefore left with a serious catch-22.  The only way that we
> can get functionality like this implemented is to first obtain agreement
> from the client and server vendors.  Only then might it become
> reasonable to expect end users to step up with funding.

Browsers seem to be implementing these features faster. I'm told SNI
is in most major browsers now, for example.

What would help, actually, is keeping a league table of features and
where they're implemented, and thus making it obvious which ones have
to be done to make a feature useful.

Cheers,

Ben.

>
> Jeffrey Altman
>
>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix
>
>
>
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Jul 19 23:39:45 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G3PO1-000540-RI; Wed, 19 Jul 2006 23:39:41 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G3PO0-00053u-Rc
	for dix@ietf.org; Wed, 19 Jul 2006 23:39:40 -0400
Received: from its-mu-mail3.its.rmit.edu.au ([131.170.1.12])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G3PO0-00013C-10
	for dix@ietf.org; Wed, 19 Jul 2006 23:39:40 -0400
Received: from its-gw-inet57.its.rmit.edu.au (its-gw-inet57.its.rmit.edu.au
	[131.170.10.77])
	by its-mu-mail3.its.rmit.edu.au (8.13.7/8.13.7/mail3) with ESMTP id
	k6K3dOd4028684
	for <dix@ietf.org>; Thu, 20 Jul 2006 13:39:24 +1000 (EST)
Received: from INET57-MTA by its-gw-inet57.its.rmit.edu.au
	with Novell_GroupWise; Thu, 20 Jul 2006 13:39:24 +1000
Message-Id: <44BF8782.29CB.0017.3@ems.rmit.edu.au>
X-Mailer: Novell GroupWise Internet Agent 7.0.1 
Date: Thu, 20 Jul 2006 13:39:11 +1000
From: "Gavin Baumanis" <gavin.baumanis@rmit.edu.au>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<20060718194907.GW21538@binky.Central.Sun.COM>
	<86mzb67itl.fsf@raman.networkresonance.com>
	<44BD56D6.8030502@secure-endpoints.com>
	<86fygy7fdq.fsf@raman.networkresonance.com>
	<44BD5C25.4080002@secure-endpoints.com>
	<1b587cab0607190401x421492f2p19e3bb686e75777a@mail.google.com>
	<44BE3622.6090504@secure-endpoints.com>
	<1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com>
In-Reply-To: <1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com>
Mime-Version: 1.0
X-Scanned-By: MIMEDefang 2.44
X-Spam-Score: 0.1 (/)
X-Scan-Signature: b5d20af10c334b36874c0264b10f59f1
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0450718143=="
Errors-To: dix-bounces@ietf.org

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--===============0450718143==
Content-Type: multipart/alternative; boundary="=__PartA78250CF.0__="

This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=__PartA78250CF.0__=
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

>>> On Wednesday, July 19, 2006 at 23:58, in message
<1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com>, "Ben
Laurie" <benl@google.com> wrote:
On 7/19/06, Jeffrey Altman <jaltman@secure-endpoints.com> wrote:
> Ben Laurie wrote:
> > I'd note that most of the work of supporting these things has to
be
> > done in OpenSSL, and unlike Apache, OpenSSL does not have a large
> > funded development community.
> >
> > Expecting volunteers to rush to implement every cute TLS feature
is
> > asking a lot. The way to make this happen is to find money for
OpenSSL
> > development.
>
> Ben:
>
> I am very well aware that compared to the applications that use
OpenSSL,
> those working on OpenSSL find it next to impossible to obtain
> contributions to support their efforts.  Individuals and small
> businesses are not going to write a check for OpenSSL (or an OpenSSL
> contributor) to develop this code.   That's not how people think.
>
> Instead someone will write a check to Apache to implement support
> for said feature because they want it in their web server.  The
Apache
> folks will respond with (a) once OpenSSL gives it to us we will have
> it so don't worry about it; and (b) it won't do you any good anyway
> because the browsers, webdav clients, etc. don't implement it.
>
> We are therefore left with a serious catch-22.  The only way that we
> can get functionality like this implemented is to first obtain
agreement
> from the client and server vendors.  Only then might it become
> reasonable to expect end users to step up with funding.

Browsers seem to be implementing these features faster. I'm told SNI
is in most major browsers now, for example.

What would help, actually, is keeping a league table of features and
where they're implemented, and thus making it obvious which ones have
to be done to make a feature useful.

Sounds Like a great idea Ben,
However there is then the problem (and it always seems to be the same
problem);
 
Who is going to implement the table?
Who is going to update it?
Can we ensure that when a feature is added into a product that the
table editor is made aware of the new feature set for the product?
 
And that doesn't even cover setting the scope for what information is
needed to be covered in the table.
 
Now, not to be one of "those" that complains about things yet does
nothing about it... I am more than happy to contribute my time to the
creation / upkeep of the table if needed!

--=__PartA78250CF.0__=
Content-Type: text/html; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Content-Description: HTML

<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
<META content="MSHTML 6.00.2900.2912" name=GENERATOR></HEAD>
<BODY style="MARGIN: 4px 4px 1px; FONT: 10pt Comic Sans MS">&gt;&gt;&gt; On Wednesday, July 19, 2006 at 23:58, in message &lt;1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com&gt;, "Ben Laurie" &lt;benl@google.com&gt; wrote:<BR>
<DIV style="PADDING-LEFT: 7px; MARGIN: 0px 0px 0px 15px; BORDER-LEFT: #050505 1px solid; BACKGROUND-COLOR: #f3f3f3">On 7/19/06, Jeffrey Altman &lt;jaltman@secure-endpoints.com&gt; wrote:<BR>&gt; Ben Laurie wrote:<BR>&gt; &gt; I'd note that most of the work of supporting these things has to be<BR>&gt; &gt; done in OpenSSL, and unlike Apache, OpenSSL does not have a large<BR>&gt; &gt; funded development community.<BR>&gt; &gt;<BR>&gt; &gt; Expecting volunteers to rush to implement every cute TLS feature is<BR>&gt; &gt; asking a lot. The way to make this happen is to find money for OpenSSL<BR>&gt; &gt; development.<BR>&gt;<BR>&gt; Ben:<BR>&gt;<BR>&gt; I am very well aware that compared to the applications that use OpenSSL,<BR>&gt; those working on OpenSSL find it next to impossible to obtain<BR>&gt; contributions to support their efforts.&nbsp; Individuals and small<BR>&gt; businesses are not going to write a check for OpenSSL (or an OpenSSL<BR>&gt; contributor) to develop this!
  code.&nbsp;&nbsp; That's not how people think.<BR>&gt;<BR>&gt; Instead someone will write a check to Apache to implement support<BR>&gt; for said feature because they want it in their web server.&nbsp; The Apache<BR>&gt; folks will respond with (a) once OpenSSL gives it to us we will have<BR>&gt; it so don't worry about it; and (b) it won't do you any good anyway<BR>&gt; because the browsers, webdav clients, etc. don't implement it.<BR>&gt;<BR>&gt; We are therefore left with a serious catch-22.&nbsp; The only way that we<BR>&gt; can get functionality like this implemented is to first obtain agreement<BR>&gt; from the client and server vendors.&nbsp; Only then might it become<BR>&gt; reasonable to expect end users to step up with funding.<BR><BR>Browsers seem to be implementing these features faster. I'm told SNI<BR>is in most major browsers now, for example.<BR><BR>What would help, actually, is keeping a league table of features and<BR>where they're implemented, and thus m!
 aking it obvious which ones have<BR>to be done to make a feature usefu
l.<BR></DIV>
<DIV style="BACKGROUND-COLOR: #ffffff"><BR>Sounds Like a great idea Ben,</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">However there is then the problem (and it always seems to be the same problem);</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">&nbsp;</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">Who is going to implement the table?</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">Who is going to update it?</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">Can we ensure that when a feature is added into a product that the table editor is made aware of the new feature set for the product?</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">&nbsp;</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">And that doesn't even cover setting the scope for what information is needed to be covered in the table.</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">&nbsp;</DIV>
<DIV style="BACKGROUND-COLOR: #ffffff">Now, not to be one of "those" that complains about things yet does nothing about it... I am more than happy to contribute my time to the creation / upkeep of the table if needed!</DIV></BODY></HTML>
--=__PartA78250CF.0__=--


--===============0450718143==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============0450718143==--




From dix-bounces@ietf.org Thu Jul 20 10:58:05 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1G3ZyT-0006T7-P9; Thu, 20 Jul 2006 10:58:01 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1G3ZyS-0006Rt-0a
	for dix@ietf.org; Thu, 20 Jul 2006 10:58:00 -0400
Received: from mx1.redhat.com ([66.187.233.31])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G3Zx6-0006jq-Jk
	for dix@ietf.org; Thu, 20 Jul 2006 10:56:38 -0400
Received: from int-mx1.corp.redhat.com (int-mx1.corp.redhat.com
	[172.16.52.254])
	by mx1.redhat.com (8.12.11.20060308/8.12.11) with ESMTP id
	k6KEuavL013998 for <dix@ietf.org>; Thu, 20 Jul 2006 10:56:36 -0400
Received: from potter.sfbay.redhat.com (potter.sfbay.redhat.com [172.16.27.15])
	by int-mx1.corp.redhat.com (8.12.11.20060308/8.12.11) with ESMTP id
	k6KEuZSi010696 for <dix@ietf.org>; Thu, 20 Jul 2006 10:56:35 -0400
Received: from [172.16.26.6] (vpn26-6.sfbay.redhat.com [172.16.26.6])
	by potter.sfbay.redhat.com (8.12.8/8.12.8) with ESMTP id k6KEuXck029479
	for <dix@ietf.org>; Thu, 20 Jul 2006 10:56:34 -0400
Message-ID: <44BF9A0B.7010403@redhat.com>
Date: Thu, 20 Jul 2006 08:58:19 -0600
From: Richard Megginson <rmeggins@redhat.com>
Organization: Directory & Security Products
User-Agent: Thunderbird 2.0a1 (X11/20060719)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] DRAFT: WAE BOF minutes
References: <198A730C2044DE4A96749D13E167AD37BD6557@MOU1WNEXMB04.vcorp.ad.vrsn.com>	<20060718194907.GW21538@binky.Central.Sun.COM>	<86mzb67itl.fsf@raman.networkresonance.com>	<44BD56D6.8030502@secure-endpoints.com>	<86fygy7fdq.fsf@raman.networkresonance.com>	<44BD5C25.4080002@secure-endpoints.com>	<1b587cab0607190401x421492f2p19e3bb686e75777a@mail.google.com>	<44BE3622.6090504@secure-endpoints.com>
	<1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com>
In-Reply-To: <1b587cab0607190658m66dacc79p7a75dcb8285a5270@mail.google.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f49c97ce49302a02285a2d36a99eef8c
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1141216467=="
Errors-To: dix-bounces@ietf.org

This is a cryptographically signed message in MIME format.

--===============1141216467==
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="------------ms080004040103010507050709"

This is a cryptographically signed message in MIME format.

--------------ms080004040103010507050709
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Ben Laurie wrote:
> On 7/19/06, Jeffrey Altman <jaltman@secure-endpoints.com> wrote:
>> Ben Laurie wrote:
>> > I'd note that most of the work of supporting these things has to be
>> > done in OpenSSL, and unlike Apache, OpenSSL does not have a large
>> > funded development community.
>> >
>> > Expecting volunteers to rush to implement every cute TLS feature is
>> > asking a lot. The way to make this happen is to find money for OpenSSL
>> > development.
>>
>> Ben:
>>
>> I am very well aware that compared to the applications that use OpenSSL,
>> those working on OpenSSL find it next to impossible to obtain
>> contributions to support their efforts.  Individuals and small
>> businesses are not going to write a check for OpenSSL (or an OpenSSL
>> contributor) to develop this code.   That's not how people think.
>>
>> Instead someone will write a check to Apache to implement support
>> for said feature because they want it in their web server.  The Apache
>> folks will respond with (a) once OpenSSL gives it to us we will have
>> it so don't worry about it; and (b) it won't do you any good anyway
>> because the browsers, webdav clients, etc. don't implement it.
>>
>> We are therefore left with a serious catch-22.  The only way that we
>> can get functionality like this implemented is to first obtain agreement
>> from the client and server vendors.  Only then might it become
>> reasonable to expect end users to step up with funding.
>
> Browsers seem to be implementing these features faster. I'm told SNI
> is in most major browsers now, for example.
>
> What would help, actually, is keeping a league table of features and
> where they're implemented, and thus making it obvious which ones have
> to be done to make a feature useful.
There is another crypto implementation for Apache - mod_nss - 
http://directory.fedora.redhat.com/wiki/Mod_nss

mod_nss uses Mozilla NSS for crypto - 
http://www.mozilla.org/projects/security/pki/nss/ - which is the same 
crypto found in Firefox/Thunderbird.  NSS is actively maintained and 
developed by Red Hat, Sun, and others in the Mozilla and open source 
community.
>
> Cheers,
>
> Ben.
>
>>
>> Jeffrey Altman
>>
>>
>>
>> _______________________________________________
>> dix mailing list
>> dix@ietf.org
>> https://www1.ietf.org/mailman/listinfo/dix
>>
>>
>>
>>
>
> _______________________________________________
> dix mailing list
> dix@ietf.org
> https://www1.ietf.org/mailman/listinfo/dix

--------------ms080004040103010507050709
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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==
--------------ms080004040103010507050709--


--===============1141216467==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============1141216467==--




