And I assume that you are going to run this on 127.0.0.1, and not
bound to the 192 or the wan address.

-tim

On 5/22/14, Apostolis Xekoukoulotakis <[email protected]> wrote:
> Yes!! actually I'll use socket.io.
>
>
> 2014-05-23 2:42 GMT+03:00 Tim Prepscius <[email protected]>:
>
>> Can you describe what you mean by:
>>
>> the attacker will still not have the private key since all
>> cryptography happen in the nodejs of the user.
>>
>> It seems as though you are saying that there will be a web server
>> running client side, from which the web app will make ajax calls to.
>> Is this what you mean?
>>
>> On 5/22/14, Apostolis Xekoukoulotakis <[email protected]> wrote:
>> > Thanks Felix. Your advice is sound. I am going to look at your
>> references.
>> >
>> > So my app is indeed packaged but I don't use node-webkit. In my case,
>> > if
>> > the client is compromised in the browser, the attacker will still not
>> have
>> > the private key since all cryptography happen in the nodejs of the
>> > user.
>> >
>> > But he would be able to ask the server to sign arbitrary documents
>> > which
>> is
>> > still really bad.
>> >  On May 22, 2014 11:33 AM, "Felix Hammerl" <[email protected]>
>> wrote:
>> >
>> >> Hi,
>> >>
>> >> you have to trust the server in a host-based security setting. If you
>> >> want
>> >> to mitigate that, have you considered packaged (not hosted!) apps?
>> >> Check
>> >> out Chrome Apps, Firefox Apps, node-webkit, atom-shell, ...
>> >> It all boils down to what you threat model is. Also, you probably
>> >> don't
>> >> want to roll your own authentication mechanism. You also might want to
>> >> avoid doing funky stuff with removing the script sources and loading
>> them
>> >> from arbitrary locations...
>> >> Recommended read for js security and threat models (be sure to check
>> >> out
>> >> the discussion, too!):
>> >> http://tankredhase.com/2014/04/13/heartbleed-and-javascript-crypto/
>> >>
>> >>
>> >> Cheers
>> >> Felix
>> >>
>> >>
>> >> On Wed, May 21, 2014 at 7:57 PM, Apostolis Xekoukoulotakis <
>> >> [email protected]> wrote:
>> >>
>> >>> Hello everyone. I am thinking of using openpgp as an authentication
>> >>> mechanism form my site and more. Send a random number to the client,
>> the
>> >>> sessionId, which he then has to sign and send back.
>> >>>
>> >>> I was also worried that if someone could attack my server, he could
>> send
>> >>> arbitrary js code to the client and thus all clients would be
>> >>> compromised.
>> >>> So I decided to create a nodejs app that users would have to install
>> >>> locally that would provide them those js scripts.
>> >>>
>> >>> They would only have to contact the server for content. So now I am
>> >>> worried about someone injecting js code into the content.
>> >>> If I wrote a parser that removed script tags, I suppose this would be
>> >>> secure, right?
>> >>>
>> >>> The apps goal is to let users issue new currencies, that is why is
>> >>> security is very important.
>> >>>
>> >>> _______________________________________________
>> >>>
>> >>> http://openpgpjs.org
>> >>> Subscribe/unsubscribe: http://list.openpgpjs.org
>> >>>
>> >>
>> >>
>> >> _______________________________________________
>> >>
>> >> http://openpgpjs.org
>> >> Subscribe/unsubscribe: http://list.openpgpjs.org
>> >>
>> >
>> _______________________________________________
>>
>> http://openpgpjs.org
>> Subscribe/unsubscribe: http://list.openpgpjs.org
>>
>
>
>
> --
>
>
> Sincerely yours,
>
>      Apostolis Xekoukoulotakis
>
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to