On 06/03/2009, at 2:33 PM, Eric Rescorla wrote:

On Thu, Mar 5, 2009 at 1:24 PM, Dirk Meyer <[email protected]> wrote:
Eric Rescorla wrote:
On Thu, Mar 5, 2009 at 7:43 AM, Justin Karneges <[email protected]> wrote:
This is exactly why I think we should try to find a solution that doesn't require modification to existing TLS APIs. We've already felt enough pain just from XML APIs being inadequate for XMPP streaming (are people done yet homebrewing their parsers with Java/.NET?). Let's not repeat all of that again with TLS, at least for the common scenarios we are targetting.

This is of course reasonable, but if the solution involves writing a
whole bunch of new crypto code in XMPP that seems undesirable as well,
no?

I guess SRP is the way to go. It is supported by OpenSSL and GnuTLS and
it only lacks support in some bindings. Instead of writing something
outside TLS just for us, writing a patch to the bindings could take the same coding time. Except doing that provides something usefull outside
the XMPP community. The same is true for channel bindings: the libs
support it and you only need to add SCRAM support + get the Finished
messages into the used SASL lib.

I think it's pretty important to recognize that there is a qualitative
difference
between SCRAM and SRP that isn't just a matter of what layer it's at.
SCRAM is susceptible to offline dictionary attacks, whereas SRP is not. Obviously, you could do something SRP-oid at the app layer, but we really
should decide if dictionary attack resistance is an important element.

-Ekr

re: "if dictionary attack resistance is an important element."

It is 'defense in depth.'

David.


--------------------------------------------------------------------------------------------------------
Email Filtering by Cleartext a Carbon Minimised company - www.cleartext.com
--------------------------------------------------------------------------------------------------------

Reply via email to