Re: Status of SRP

2006-06-02 Thread Jeffrey Altman
James A. Donald wrote: The obvious solution to the phishing crisis is the widespread deployment of SRP, but this does not seem to happening. SASL-SRP was recently dropped. What is the problem? Unfortunately, SRP is not the solution to the phishing problem. The phishing problem is made up of

Re: Status of opportunistic encryption

2006-06-02 Thread kent crispin
On Thu, Jun 01, 2006 at 01:47:06PM +1200, Peter Gutmann wrote: Grab OpenVPN (which is what OpenSWAN should be), install, point it at the target system, and you have opportunistic encryption. Forgive my doltishness, but could you expand on that just a bit, please (or point at the right place in

Re: Status of SRP

2006-06-02 Thread Lance James
Here's where SRP fails: 1) SSL is built into the browser - doesn't stop phishers 2) Chrome or no chrome good luck getting it in there and having every user understand it. 3) Traditional phishing works, but if you force them to change, the malware propagation will only be higher than it is now,

Trusted path (was: status of SRP)

2006-06-02 Thread Ka-Ping Yee
On Thu, 1 Jun 2006, James A. Donald wrote: Florian Weimer wrote: There is no way to force an end user to enter a password only over SRP. Phishing relies on the login page looking familiar. If SRP is in the browser chrome, and looks strikingly different from any web page, the login page

Re: Status of SRP

2006-06-02 Thread Ka-Ping Yee
On Thu, 1 Jun 2006, Florian Weimer wrote: That is an all purpose argument that is deployed selectively against some measures and not others. If you've deployed two-factor authentication (like German banks did in the late 80s/early 90s), the relevant attacks do involve compromised customer

Re: Status of SRP

2006-06-02 Thread James A. Donald
-- Ka-Ping Yee wrote: Passpet's strategy is to customize a button that you click. We are used to recognizing toolbar buttons by their appearance, so it seems plausible that if the button has a custom per-user icon, users are unlikely to click on a spoofed button with the wrong icon.

Re: Status of SRP

2006-06-02 Thread James A. Donald
-- Ka-Ping Yee wrote: Passpet's strategy is to customize a button that you click. We are used to recognizing toolbar buttons by their appearance, so it seems plausible that if the button has a custom per-user icon, users are unlikely to click on a spoofed button with the wrong icon.

Re: Status of SRP

2006-06-02 Thread Anne Lynn Wheeler
Florian Weimer wrote: If you've deployed two-factor authentication (like German banks did in the late 80s/early 90s), the relevant attacks do involve compromised customer PCs. 8-( Just because you can't solve it with your technology doesn't mean you can pretend the attacks don't happen. EU