Ben Smyth <resea...@bensmyth.com> writes:

>should we consider PSK-mode authentication weaker than certificate-based
>authentication?

No, it's much stronger.  With cert-based server auth, a client will connect to
anything that has a certificate from any CA anywhere, in other words pretty
much anything at all, and declare the connection secure.  It's slightly better
than anon-DH, but it offers almost no protection against phishing, the most
common attack on the web today.

The best form of this mixes in cert-based client auth as well, so the client
connects to a phishing site that authenticates itself with a CA-issued cert,
the client then authenticates with a CA-issued cert, and the result as far as
the client is aware is a fully CA-certified cryptographically secured
connection to a site that's actually run by the MageCart Syndicate.

With PSK a client can only connect to a server that proves knowledge of the
shared secret, which immediately kills phishing because the attacker would
need to prove knowledge of the credentials they're trying to phish before they
can phish them.

(Note that this is for web use, for non-web use like SCADA the software
typically hardcodes in certificates and keys and will only trust those, which
in a sense makes it more PSK than cert-based auth).

Peter.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to