>>>>> "Eliot" == Eliot Lear <[EMAIL PROTECTED]> writes:

    Eliot> Sam,
    Eliot> I understand your objection to the solution depending on smart cards,
    Eliot> but I think it still MUST support some form of  external 
authentication
    Eliot> component - not just X.509 based smart cards.  For one, a substantial
    Eliot> threat is the computer itself.  If it is compromised one way to 
prevent
    Eliot> access to services is by requiring such an external authentication. 
    Eliot> These cards also provide a trusted UI and should be listed as a
    Eliot> possibility in your next section.

Many X.509 smart cards have no UI at all.  I agree smart cards need to
be supported.  The goal of 4.1 is to say that we must support
passwords and that solutions that only work with smart cards are not
sufficient.

    Eliot> Furthermore, in section 4.5, (1) simply having X.509 server 
certificates
    Eliot> is not sufficient defense due to iDNS (homoglyphic?) attacks and the
    Eliot> like.  I think there is no perfect way to accomplish 4.5.

Server certs  are not sufficient for humans to verify for the reasons you site.
However  if a name is included in another protocol message then the binding 
between that name and the server cert can be secured.

I think it is quite possible to accomplish 4.5 in the case where you
have an existing relationship with a site based on shared secrets.

    Eliot> Section 4.6 assumes that there is a third party identity provider.  
This
    Eliot> needn't be the case, but if it is, it is sufficient to have a name, a
    Eliot> nonce, and a public/private key pair, is it not?

Please restarte; I don't understand what you are getting at.


_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to