On Donnerstag, 27. April 2017 19:03:34 CEST Georg Lukas wrote:
> * Daniel Gultsch <dan...@gultsch.de> [2017-04-27 18:58]:
> > As stated in MUC I'm fine with an HMAC.
> 
> +1
> 
> > I think it might be useful for a client to know if they can rely on the
> > server to dealwith the authentication or if they will have to do that
> > themselves.
> 
> I don't think this matters in any practical way. Your client will either
> receive a subscription request with a PARS token which it needs to
> verify, or it will receive a roster push ;)
> 
> > > I see the UX problems, but I'm not sure if this is a good idea
> > > security-wise. I'd like to hear other opinions on this.
> > 
> > I guess in theory 'approving entities' can still do a rate limiting on the
> > tokens? However I would find it very hard to come up with a good N that
> > both works (me showing my QR code at a party to a bunch of people standing
> > around me) and also prevents annoying DOS attacks.
> 
> Yeah, but what do you do if somebody posts your PARS link on twitter,
> to copy-cat a potential attack scenario from xsf@ ;)
> 
> > In any case i don't think N should be configurable by the user.
> 
> I can at least see use cases for N=1 and N=infinity. But yeah, it's
> making the UX harder.
> 
> I'd really love to hear more opinions on this trade-off.

The UX is one thing. I’d first like to clear how N=1 would work implementation 
wise. (UX is easy, I think a checkbox "Create a reusable link" is a good start 
and default to N=1).

N=1 requires that the server strikes the token off some list. Since PEP 
doesn’t normally allow multiple items, using a PEP node with many items won’t 
work. We could use the usual approach of abusing PEP nodes to store multiple 
items to store the single-use tokens (single-use and multi-use tokens can be 
distinguished by their length, we don’t need that many bytes for single-use 
tokens because we save the timestamp and a simple nonce is sufficient). The 
PEP node should then also contain a timeout after which the server (or a 
client writing to the node) may purge the token off the list. Also, a server 
(or client) should not accept an expired token.

thoughts?
Jonas

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Standards mailing list
Info: https://mail.jabber.org/mailman/listinfo/standards
Unsubscribe: standards-unsubscr...@xmpp.org
_______________________________________________

Reply via email to