ADMIN: end of latest SSL discussion

James A. Donald jamesd at echeque.com
Wed Dec 28 02:18:08 EST 2005


    --
In the SSL thread various solutions were proposed, or 
rather existing solutions pointed to:

1.  SSH just works.   So generalizing from the success 
of SSH, the browser should remember who you have 
relationships with, and the keys of the people you have 
relationships with.   To avoid the name overload 
problem, those relationships should be named by Zooko's 
triangle, as the petname tool does, and should be a 
special kind of favorite, as the petname tool makes 
them.   This requires that establishing a relationship, 
and verifying a shared secret, should be part of the 
browser chrome, as it is with SSH, rather than a 
particular application of generic web forms, as it is 
with existing practice.   So when you hit a phisher, 
significantly different chrome comes up.

2. Phishers are after shared secrets, so secure each 
shared secret, and thus each relationship, with 
SRP-TLS-OpenSSL  This also requires that establishing a 
relationship, and verifying a shared secret, should be 
part of the browser chrome, rather than a particular 
application of generic web forms. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     8epIQqxZ+sfUW+5ao0hWd4g/hAhRlqifZr6xWoQn
     47kvMBcL6UqQ54XSgEcxbJd8xqAh2LSxufi/3IBdG



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list