Ofcourse!!
2014-05-23 2:56 GMT+03:00 Apostolis Xekoukoulotakis <[email protected]>: > So there will be 2 servers, one local per client and one global server > that provides content(json). > > > 2014-05-23 2:44 GMT+03:00 Apostolis Xekoukoulotakis <[email protected]>: > > Yes!! actually I'll use socket.io. >> >> >> 2014-05-23 2:42 GMT+03:00 Tim Prepscius <[email protected]>: >> >> Can you describe what you mean by: >>> >>> the attacker will still not have the private key since all >>> cryptography happen in the nodejs of the user. >>> >>> It seems as though you are saying that there will be a web server >>> running client side, from which the web app will make ajax calls to. >>> Is this what you mean? >>> >>> On 5/22/14, Apostolis Xekoukoulotakis <[email protected]> wrote: >>> > Thanks Felix. Your advice is sound. I am going to look at your >>> references. >>> > >>> > So my app is indeed packaged but I don't use node-webkit. In my case, >>> if >>> > the client is compromised in the browser, the attacker will still not >>> have >>> > the private key since all cryptography happen in the nodejs of the >>> user. >>> > >>> > But he would be able to ask the server to sign arbitrary documents >>> which is >>> > still really bad. >>> > On May 22, 2014 11:33 AM, "Felix Hammerl" <[email protected]> >>> wrote: >>> > >>> >> Hi, >>> >> >>> >> you have to trust the server in a host-based security setting. If you >>> >> want >>> >> to mitigate that, have you considered packaged (not hosted!) apps? >>> Check >>> >> out Chrome Apps, Firefox Apps, node-webkit, atom-shell, ... >>> >> It all boils down to what you threat model is. Also, you probably >>> don't >>> >> want to roll your own authentication mechanism. You also might want to >>> >> avoid doing funky stuff with removing the script sources and loading >>> them >>> >> from arbitrary locations... >>> >> Recommended read for js security and threat models (be sure to check >>> out >>> >> the discussion, too!): >>> >> http://tankredhase.com/2014/04/13/heartbleed-and-javascript-crypto/ >>> >> >>> >> >>> >> Cheers >>> >> Felix >>> >> >>> >> >>> >> On Wed, May 21, 2014 at 7:57 PM, Apostolis Xekoukoulotakis < >>> >> [email protected]> wrote: >>> >> >>> >>> Hello everyone. I am thinking of using openpgp as an authentication >>> >>> mechanism form my site and more. Send a random number to the client, >>> the >>> >>> sessionId, which he then has to sign and send back. >>> >>> >>> >>> I was also worried that if someone could attack my server, he could >>> send >>> >>> arbitrary js code to the client and thus all clients would be >>> >>> compromised. >>> >>> So I decided to create a nodejs app that users would have to install >>> >>> locally that would provide them those js scripts. >>> >>> >>> >>> They would only have to contact the server for content. So now I am >>> >>> worried about someone injecting js code into the content. >>> >>> If I wrote a parser that removed script tags, I suppose this would be >>> >>> secure, right? >>> >>> >>> >>> The apps goal is to let users issue new currencies, that is why is >>> >>> security is very important. >>> >>> >>> >>> _______________________________________________ >>> >>> >>> >>> http://openpgpjs.org >>> >>> Subscribe/unsubscribe: http://list.openpgpjs.org >>> >>> >>> >> >>> >> >>> >> _______________________________________________ >>> >> >>> >> http://openpgpjs.org >>> >> Subscribe/unsubscribe: http://list.openpgpjs.org >>> >> >>> > >>> _______________________________________________ >>> >>> http://openpgpjs.org >>> Subscribe/unsubscribe: http://list.openpgpjs.org >>> >> >> >> >> -- >> >> >> Sincerely yours, >> >> Apostolis Xekoukoulotakis >> >> > > > -- > > > Sincerely yours, > > Apostolis Xekoukoulotakis > > -- Sincerely yours, Apostolis Xekoukoulotakis
_______________________________________________ http://openpgpjs.org Subscribe/unsubscribe: http://list.openpgpjs.org

