BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Steve Gibson's SQRL
- Subject: [Discuss] Steve Gibson's SQRL
- From: richard.pieri at gmail.com (Richard Pieri)
- Date: Wed, 25 Feb 2015 21:42:53 -0500
- In-reply-to: <54EE11EC.80003@gmail.com>
- References: <54ED34F4.4060909@gmail.com> <54EDD214.9000608@gmail.com> <CAAbKA3XqSKRcgnVDZk1TV47a-E4z7NX98K9-BJC1KymtTdQSbQ@mail.gmail.com> <sjmvbiqvsay.fsf@securerf.ihtfp.org> <54EE11EC.80003@gmail.com>
On 2/25/2015 1:18 PM, Tom Metro wrote: > also connect to the wrong end-point (though the attacker could proxy the > connection). Which is trivially easy to do when providing victims with malicious URLs via malicious QR codes. > -the domain in the URL is shown to the user for verification before the > key is sent to the authentication web service. We browsers have had this capability since Day 2, maybe Day 3. It still is not a reliable deterrent to users clicking on malicious links. > -there are optional modes where it may be required that the browser and > the authentication app both connect from the same IP. IP address spoofing is easy. > -the communication channel with the authentication app serves as an "out > of band" channel that can optionally be used to verify high risk > operations, such as when making a transfer between banks. It's not out-of-band. The attacker can route both authentication and live sessions through his proxy. That's in-band. > If the attacker has the ability to alter the DNS responses the user > sees, and forge SSL certs for the site and authentication service, then > they still might be able to pull off a MitM attack. Altering DNS responses is unnecessary when the attacker can route the victim's traffic through his proxy (see previous). Likewise forging SSL certificates when he can run his own CA. I like APOP. It's a robust idea. I do not like QR codes for encoding URLs or authentication information. Fraudulent codes are effectively impossible for human beings to identify. Trusting unverifiable blobs for security does not seem like a good idea to me. -- Rich P.
- References:
- [Discuss] Steve Gibson's SQRL
- From: tmetro+blu at gmail.com (Tom Metro)
- [Discuss] Steve Gibson's SQRL
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Steve Gibson's SQRL
- From: bill.n1vux at gmail.com (Bill Ricker)
- [Discuss] Steve Gibson's SQRL
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] Steve Gibson's SQRL
- From: tmetro+blu at gmail.com (Tom Metro)
- [Discuss] Steve Gibson's SQRL
- Prev by Date: [Discuss] Does anyone here know someone who's been victimized?
- Next by Date: [Discuss] transmitting legal documents
- Previous by thread: [Discuss] Steve Gibson's SQRL
- Next by thread: [Discuss] Unlock an Iphone 5S
- Index(es):