[Discuss] Steve Gibson's SQRL

Richard Pieri richard.pieri at gmail.com
Wed Feb 25 21:42:53 EST 2015


On 2/25/2015 1:18 PM, Tom Metro wrote:
> also connect to the wrong end-point (though the attacker could proxy the
> connection).

Which is trivially easy to do when providing victims with malicious URLs 
via malicious QR codes.

> -the domain in the URL is shown to the user for verification before the
> key is sent to the authentication web service.

We browsers have had this capability since Day 2, maybe Day 3. It still 
is not a reliable deterrent to users clicking on malicious links.

> -there are optional modes where it may be required that the browser and
> the authentication app both connect from the same IP.

IP address spoofing is easy.

> -the communication channel with the authentication app serves as an "out
> of band" channel that can optionally be used to verify high risk
> operations, such as when making a transfer between banks.

It's not out-of-band. The attacker can route both authentication and 
live sessions through his proxy. That's in-band.

> If the attacker has the ability to alter the DNS responses the user
> sees, and forge SSL certs for the site and authentication service, then
> they still might be able to pull off a MitM attack.

Altering DNS responses is unnecessary when the attacker can route the 
victim's traffic through his proxy (see previous). Likewise forging SSL 
certificates when he can run his own CA.

I like APOP. It's a robust idea. I do not like QR codes for encoding 
URLs or authentication information. Fraudulent codes are effectively 
impossible for human beings to identify. Trusting unverifiable blobs for 
security does not seem like a good idea to me.

-- 
Rich P.



More information about the Discuss mailing list