If you can convince a user to connect to and disclose his credentials to a 
false cloud selector, you can access the real selector as that user.

Regards,
Michael McIntosh
VP Development
Azigo


-----Original Message-----
From: [email protected] [mailto:[email protected]] 
On Behalf Of Jonathan Tellier
Sent: Sunday, March 28, 2010 7:18 PM
To: Higgins (Trust Framework) Project developer discussions; John Bradley
Subject: Re: [higgins-dev] Attack on CardSpace possible with CloudSelector?

Hello,

I think that what you say makes sense, but there's a part that I don't
understand:

> I think the Higgins cloud selector would be compromised by performing a DNS 
> attack on the selector service as the easiest route.

Maybe I'm missing something, but I thought that the token does not go directly 
to the RP. It is sent to the browser that then sends it to the RP. Maybe I'm 
not getting the process right though... If the cloud selector does not 
communicate directly to the RP, how would compromising its DNS server help an 
attacker?

Thanks,
Jonathan
_______________________________________________
higgins-dev mailing list
[email protected]
https://dev.eclipse.org/mailman/listinfo/higgins-dev
_______________________________________________
higgins-dev mailing list
[email protected]
https://dev.eclipse.org/mailman/listinfo/higgins-dev

Reply via email to