ietf
[Top] [All Lists]

Re: draft-hartman-webauth-phishing-03.txt

2007-05-25 13:13:28
"Eliot" == Eliot Lear <lear(_at_)ofcourseimright(_dot_)com> writes:

    Eliot> Sam, I've reviewed draft-hartman-webauth-phishing-03.txt.
    Eliot> In general I agree with the tone of it in terms of how to
    Eliot> address these sorts of threats.  However, I have a problem
    Eliot> with its scope.  The problem you discuss extends well
    Eliot> beyond just HTTP already.  

I don't understand what you mean here.  If you mean that other
protocols besides http are vulnerable to phishing, I agree.  However I
do not believe it is desirable to generalize this document to the
point where it talks about other protocols.  Doing so would make this
document harder to understand for those thinking about the web and
would make an already incredibly complicated problem harder.


    Eliot> Furthermore, your assumption
    Eliot> that the computer is secure is a bad one.  

I think that some version of this assumption is necessary.  Ultimately
without some trusted computing base, you cannot trust your security.
I don't think it is appropriate for the IETF to bite off the problem
of browser design or host security.  I do agree with you (and the
document does say) host security needs to be considered as part of
security analysis .

Now, your trusted computing base can be a lot better designed than
today's browsers.  You may have secure OS components, possibly even
assisted by hardware, thta are part of the security solution.  But
somewhere, whether it is on a smart card, in some trusted hardware, or
in software that is somehow validated, you do actually need software
that you can trust.

Even one-time passwords have problems absent trusted software.  In
particular, you cannot tell whether you are giving the one time
password to the right entity.

Perhaps the requirement is unclear.  I certainly don't mean that
browser designs and their security architecture needs to stay the
same.  But ultimately your trust needs to be based in some software
somewhere.


    Eliot> I'm not saying
    Eliot> that we should require smart cards, 

Note that requiring smart cards doesn't speak to this assumption one
way or another.  First, traditional smart cards are not enough that if
the smart card is trusted and the rest of the system is not, you can
get security against phishing.  Once you've given your pin to the
system, you have no idea what all it goes and uses your smart card to
do.

And to the extent that smart card would help, they are secure.  If you
allow the attacker to run software on your smart card, it destroys
your security just as thoroughly as in a non-smart-card system where
you let the attacker write browser extensions.



    Eliot> as a matter of threat analysis, you should allow for the
    Eliot> idea that the computer may not be secure, and hence allow
    Eliot> for approaches that address that problem.  

Perhaps it would help the discussion if you would describe such a
solution.  I think it might make it more clear what your real concern
with this requirement is.

    Eliot> However, you need to consider your other requirements in
    Eliot> the context of such approaches.

Again, I think examples would be useful here.

    Eliot> I also think Section 4.1 is unnecessary.  Attempting to
    Eliot> simply repair passwords is one legitimate approach, but it
    Eliot> shouldn't be the only one.  In fact, I would argue that you
    Eliot> are setting up users for very serious problems by
    Eliot> perpetuating an approach that requires them to either write
    Eliot> down their passwords or use the same one for multiple
    Eliot> sites.  This section, IMHO represents a requirement for
    Eliot> poor modularity.

I completely agree that approaches other than passwords should be
supported.  Section 4.1 says this today.  However I do believe that
support for things that have the same usability profile as passwords
is an absolute requirement.  In particular, I believe people need to
go to a computer they have never used before and authenticate only
with the information stored in their head.

I'd rather follow this work up outside
the IETF than lose this requirement.

    Eliot> Also, you have a number of editorial oddities.  A "Google
    Eliot> paper" should be treated as any other reference, for
    Eliot> instance.  

Help with these is appreciated.

    Eliot> Finally, quite a number of your requirements are
    Eliot> unclear.  

Help adding clarity is always appreciated.

    Eliot> See for instance your first sentence in 4.1.  The
    Eliot> second phrase is mystifying.

I'll admit that it seems clear to me so your help in understanding the lack of 
clarity is greatly appreciated.

    Eliot> I would appreciate the opportunity to work with you on the
    Eliot> above issues, as well as improve your introduction, which I
    Eliot> believe warrants some additional effort (I am tempted to
    Eliot> ask that you include a glossary), 

I'm happy to work in the spirit of our rough consensus process with
anyone who wants to contribute.

--Sam

_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf

<Prev in Thread] Current Thread [Next in Thread>