Yes!! actually I'll use socket.io.

2014-05-23 2:42 GMT+03:00 Tim Prepscius <[email protected]>:

> Can you describe what you mean by:
>
> the attacker will still not have the private key since all
> cryptography happen in the nodejs of the user.
>
> It seems as though you are saying that there will be a web server
> running client side, from which the web app will make ajax calls to.
> Is this what you mean?
>
> On 5/22/14, Apostolis Xekoukoulotakis <[email protected]> wrote:
> > Thanks Felix. Your advice is sound. I am going to look at your
> references.
> >
> > So my app is indeed packaged but I don't use node-webkit. In my case, if
> > the client is compromised in the browser, the attacker will still not
> have
> > the private key since all cryptography happen in the nodejs of the user.
> >
> > But he would be able to ask the server to sign arbitrary documents which
> is
> > still really bad.
> >  On May 22, 2014 11:33 AM, "Felix Hammerl" <[email protected]>
> wrote:
> >
> >> Hi,
> >>
> >> you have to trust the server in a host-based security setting. If you
> >> want
> >> to mitigate that, have you considered packaged (not hosted!) apps? Check
> >> out Chrome Apps, Firefox Apps, node-webkit, atom-shell, ...
> >> It all boils down to what you threat model is. Also, you probably don't
> >> want to roll your own authentication mechanism. You also might want to
> >> avoid doing funky stuff with removing the script sources and loading
> them
> >> from arbitrary locations...
> >> Recommended read for js security and threat models (be sure to check out
> >> the discussion, too!):
> >> http://tankredhase.com/2014/04/13/heartbleed-and-javascript-crypto/
> >>
> >>
> >> Cheers
> >> Felix
> >>
> >>
> >> On Wed, May 21, 2014 at 7:57 PM, Apostolis Xekoukoulotakis <
> >> [email protected]> wrote:
> >>
> >>> Hello everyone. I am thinking of using openpgp as an authentication
> >>> mechanism form my site and more. Send a random number to the client,
> the
> >>> sessionId, which he then has to sign and send back.
> >>>
> >>> I was also worried that if someone could attack my server, he could
> send
> >>> arbitrary js code to the client and thus all clients would be
> >>> compromised.
> >>> So I decided to create a nodejs app that users would have to install
> >>> locally that would provide them those js scripts.
> >>>
> >>> They would only have to contact the server for content. So now I am
> >>> worried about someone injecting js code into the content.
> >>> If I wrote a parser that removed script tags, I suppose this would be
> >>> secure, right?
> >>>
> >>> The apps goal is to let users issue new currencies, that is why is
> >>> security is very important.
> >>>
> >>> _______________________________________________
> >>>
> >>> http://openpgpjs.org
> >>> Subscribe/unsubscribe: http://list.openpgpjs.org
> >>>
> >>
> >>
> >> _______________________________________________
> >>
> >> http://openpgpjs.org
> >> Subscribe/unsubscribe: http://list.openpgpjs.org
> >>
> >
> _______________________________________________
>
> http://openpgpjs.org
> Subscribe/unsubscribe: http://list.openpgpjs.org
>



-- 


Sincerely yours,

     Apostolis Xekoukoulotakis
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to