> From: Eric Rescorla [mailto:[EMAIL PROTECTED] 

> That's *one* way to attack phishing (at least the current form).
> There are others (cf. PwdHash)

There are three basic approaches to defeat phishing.

Phishing is an ATTACK where SOCIAL ENGINEERING designed to STEAL CREDENTIALS


1) Defeat the infrastructure of a specific attack
        Here we have takedown services such as the VeriSign Anti-Phishing 
solution, filtering of the phishing spam, blocking known phishing capture 
sites, Fraud detection services &ct.

2) Defeat the social engineering attack using strong outbound authentication
        This is the principle purpose of Secure Internet Letterhead: Use the 
PKIX logotype extension in an EV X.509 certificate to provide a trustworthy 
proof of legitimate use of the subject brand. Letterhead may be used in 
conjunction with DKIM or S/MIME to provide trustworthy proof of origin in the 
email channel or with SSL to provide trustworthy proof of origin in the Web.

3) Defeat the theft of the credentials by making the credentials theft 
resistant.
        The OATH consortium is working to provide an open, unencumbered 
standard for strong authentication whether OTP or PKI based. The algorithms for 
the OTP version have already been issued as informational RFCs. Other necessary 
infrastructure is being built out.


WAE does not fit into 1 or 2 and it does not directly address 3. 

Where WAE fits in is that it facilitates the infrastructure changes necessary 
to make widespread deployment of #3 solutions possible. 

With WAE I can in theory go down to Frys, buy a token and then use it to secure 
access to my bank account without the bank needing to support my specific token 
technology. All they need to know is that I am using something better than 
username and password and that the authentication service provider will provide 
an acceptable SLA.

_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to