Hi Peter,

I completely agree with the rest of the argument. But I don't know of a 
realistic way to do it with TLS-PSK (people will *always* use short passwords, 
it's not like it's the exception to the rule). TLS-SRP is one possible 
solution. Or, as Yoav suggests, TLS-EAP with several alternatives, including 
EAP-PWD and EAP-EKE. In some interesting cases, EAP-AKA might also be 
appropriate.

Unfortunately the IAB thinks that TLS-EAP is Bad Bad Bad 
(http://tools.ietf.org/html/draft-iab-auth-mech-07#section-10.2.4). So it's 
back to PKI. Sigh.

Thanks,
        Yaron

> -----Original Message-----
> From: pgut001 [mailto:pgut...@wintermute02.cs.auckland.ac.nz] On Behalf
> Of Peter Gutmann
> Sent: Friday, March 05, 2010 2:07
> To: pgut...@cs.auckland.ac.nz; u...@ll.mit.edu; Yaron Sheffer
> Cc: c...@irtf.org; ipsec@ietf.org
> Subject: RE: [IPsec] [Cfrg] Beginning discussion on secure password-
> only authentication for IKEv2
> 
> Yaron Sheffer <yar...@checkpoint.com> writes:
> 
> >Can someone please explain the joke to me? Nelson was asked about TLS-
> PSK
> >(RFC 4279) and he replied that it can easily be abused. TLS-PSK
> (similarly to
> >IKE- PSK) is vulnerable to dictionary attacks if used with a short
> secret
> >(a.k.a. "password"), at least in the presence of an active attacker.
> So I
> >think his response was entirely appropriate. What am I missing?
> 
> Thinking through the rest of the argument, which is:
> 
> - We currently have a (supposedly) multi-billion dollar global industry
> built
>   around the total failure of the existing browser authentication
> model.
> 
> - Mutual authentication, in which the server has to prove knowledge of
> the
>   user's credentials before the user can connect, would cause a serious
>   headache for phishers.
> 
> - The FF developers have chosen not to implement this because, in the
> special-
>   case situation where it's done really badly, it could theoretically
> be
>   abused (note the special-case qualification of "if used with a short
>   secret", for which the answer is "well don't do that, then").
> 
>   This is balanced against the currently-used model which pretty much
> doesn't
>   work at all right out of the box, no matter what you do with it.
> 
> - Phishers the world over breathe a sigh of relief, and business
> continues as
>   usual.
> 
> Peter.
> 
> Scanned by Check Point Total Security Gateway.
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to