On Thu Nov 18 00:51:26 2010, Kim Alvefur wrote:
Imagine a server with a self signed certificate. When your server
connects to it, it of course would't trust the cert enough to do SASL EXTERNAL, so it falls back to dialback. If dialback is successfully done a few times, while the server presents the same cert, automatically pin
it and allow SASL EXTERNAL the next time.

Actually, just doing leap-of-faith the first time is sufficient.

You're allowing full dialback as authentication anyway, so in practise, this isn't losing you any security, whereas by having to build trust in a server, you're providing a larger window for an attacker to disrupt.

It's also, of course, not gaining any security - it is gaining optimization, but at the risk that an attacker can disrupt, and takeover, a server if he times it *just* so. (Or, if your LoF certificate store isn't persistent and he figures out how to crash your server).

Dave.
--
Dave Cridland - mailto:[email protected] - xmpp:[email protected]
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Reply via email to