On Wed Feb 11 15:06:44 2009, Eric Rescorla wrote:
It's worth observing that if you're really going to standardize on one
news  password
based mechanism, it would be more efficient to simply use TLS-PSK or
TLS-SRP. The
rationale for channel bindings is to retain some existing application level auth
infrastructure.

I suspect that disagreeing with Ekr isn't going to be good for my health, but...

I'm not sure SRP or PSK makes as much sense to us, from a deployment/marketing perspective mostly, although with some weak technical arguments too.

The idea is that the channel binding is actually used one-time to verify self-signed certificates, which are subsequently used as-is for authentication. Essentially, we're slightly repurposing the techology - it's about getting the same outcome as when a SASL mechanism does it on a TLS-protected C2S link, still, but in a different sense.

So you'd use the channel binding process typically once per pair of endpoints, whereas the self-signed certificates would be used many times - indeed, I'm thinking that the XMPP basis for secure identity becomes those X.509 certificates.

So it's not so much to retain the existing application level infrastructure, but to provide a common authentication infrastructure between many cases, proven by channel binding.

It was my impression that although we could achieve something similar using SRP or PSK:

a) The perceived risk of IPR is such that SRP in particular appears to have reduced deployment, and I have concerns that it'd impact availability.

b) It's done inline in the data flow, meaning that traditional data flows need to cease during it.

c) We hope to use SCRAM as a C2S authentication mechanism in SASL anyway, so we're expecting support to become commonplace.

d) I'm frankly not sure I've grasped how the SRP/PSK-to-X.509 dance works, and at the risk of sounding really arrogant, I'm worried that might mean few people within the XMPP community grasp it either.

Is there anything I'm missing that rules out using a channel binding method for proving the endpoints own a particular certificate?

Dave.
--
Dave Cridland - mailto:[email protected] - xmpp:[email protected]
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Reply via email to