On Friday 16 November 2007 17:07, Michael Rogers wrote:
> Matthew Toseland wrote:
> > Public key fingerprints are very difficult to turn into something that is 
> > secure from all angles, and is short.
> 
> Fingerprint = hash of the public key. Comparable in length (though not
> memorability) to a password, and more secure because it doesn't need to
> be kept secret.

Well it *should* be kept secret, to prevent various harvesting attacks. But 
yeah, the proposal seems sane. So, the remaining mechanisms:

Invites with a temporary keypair (invite = H(pubkey_temp), IP:port; 
obfuscation key = H(pubkey_temp))

Short noderefs (ref = H(real_pubkey), IP:port; obfuscation key = H(pubkey_R + 
H(pubkey_I)) )

And possibly SRP. 
PRO: We can use easy-to-remember/communicate (low entropy) passphrases, rather 
than 32 bytes (64 hex chars, 43 base64).
PRO: And it's still secure, provided that we have a limited number of attempts 
per password (so for SRP-based invites we will need IP:port, invite counter, 
passphrase).
SRP would normally be a one-way invite, but if the inviter is NATed Fred would 
ask for the IP:port of the invitee.
CON: How would we obfuscate it? Dictionary resistance requires that we don't 
just send the password - SRP has a "username" aka invite counter so that it 
can only allow a small number of attempts for a specific username/invite... 
So we can't just superencrypt using the password!

IMHO all four of these mechanisms are useful. OTOH if you can convince me that 
SRP is superfluous I'd be very happy, because it will be a load of work to 
implement it. :)
> 
> Cheers,
> Michael

Attachment: pgpqxiHErOrO1.pgp
Description: PGP signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to