On 10/09/10 4:06 AM, [email protected] wrote:

I understand your point, but I think it's fair to ask "can we do
better?"

Your implication is, "don't try, don't even discuss trying".

I think that's a cop out, intellectually lazy, and boring; but sure,
it avoids the risks associated with any change.


I tend to be one of those who agree with that.

http://iang.org/ssl/h6_its_your_job_do_it.html

However it is complicated. Security work is very tricky, and a lot of stuff that is done is plain wrong, but is supported to-the-death by its advocates. So you need to be in for the long run to learn this stuff, which often means seeing the same discussion about NIST RNGs or certificates or key lengths over and over again.

And, the people who do feel they know it all get tired and cranky with newcomers :) Not without cause, because nobody pays them to be here, and nobody appreciates good expertise delivered quietly. So being cranky and arrogant is actually good for business. Security business is very sad, really.

Understandable, testable, safe.

When 25% of your users never log in again, I would add "...for small
values of safe".


Possibly speaking out of turn here, but I designed a similar system once which had the user-password encrypting the data store for that user. Nice and elegant, but it hits real world issues like that. The real world issue I had was "I lost my password, reset it please!" which tends to be the #1 support problem for password-based systems.

The solution I came up with [1] is to encrypt the data to two keys. One is the user's password and the other is support's key. The latter can be offline, like an OpenPGP public key, and therefore subject to internal governance controls.

iang


[1] which was never implemented, so who knows...
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to