Re: HTTPS mutual authentication alpha release - please test

2005-11-07 Thread Nick Owen
James A. Donald wrote: > -- > It seems to me that mutual authentication is pretty much > irrelevant to HTTPS and certificates. You mutually > authenticate by both knowing the password, as in SPEKE. > > Of course, SPEKE is patented, so is this scheme a way of > getting around the patents? We'

Re: HTTPS mutual authentication alpha release - please test

2005-11-07 Thread Nick Owen
Hadmut Danisch wrote: > Mmmh, I'd have two questions about this: > > > - It seems that you are not defending against an attack, but trying to > protect the user against his own ignorance. The user ignores the > warning label, so you want to replace it with a bigger warning > label. But the

Re: HTTPS mutual authentication alpha release - please test

2005-11-07 Thread Hadmut Danisch
On Fri, Nov 04, 2005 at 09:16:16AM +, Nick Owen wrote: > > No, this is not it. It is this attack and similar: > > http://tinyurl.com/a3b89 > > The phishers are not using valid certificates, but users are so immune > to warnings about certificates that they don't pay attention to them. > It

Re: HTTPS mutual authentication alpha release - please test

2005-11-07 Thread James A. Donald
-- It seems to me that mutual authentication is pretty much irrelevant to HTTPS and certificates. You mutually authenticate by both knowing the password, as in SPEKE. Of course, SPEKE is patented, so is this scheme a way of getting around the patents? --digsig James A. Donald

Re: HTTPS mutual authentication alpha release - please test

2005-11-07 Thread cyphrpunk
On 10/31/05, Nick Owen <[EMAIL PROTECTED]> wrote: > The system works this way: Each WiKID domain now can include a > 'registered URL' field and a hash that website's SSL certificate. When > a user wants to log onto a secure web site, they start the WiKID token > and enter their PIN. The PIN is enc

Re: HTTPS mutual authentication alpha release - please test

2005-11-04 Thread cyphrpunk
On 11/3/05, Nick Owen <[EMAIL PROTECTED]> wrote: > cyphrpunk wrote: > > On 10/31/05, Nick Owen <[EMAIL PROTECTED]> wrote: > > > >>The system works this way: Each WiKID domain now can include a > >>'registered URL' field and a hash that website's SSL certificate. When > >>a user wants to log onto a

Re: HTTPS mutual authentication alpha release - please test

2005-11-04 Thread cyphrpunk
On 11/3/05, Nick Owen <[EMAIL PROTECTED]> wrote: > The token client pulls down a hash of the certificate from the > WiKID server. It pulls the certificate from the website and performs a > hash on it. It compares the two hashes and if they match, presents the > user with the OTP and the message: >

Re: HTTPS mutual authentication alpha release - please test

2005-11-04 Thread Nick Owen
cyphrpunk wrote: > On 11/3/05, Nick Owen <[EMAIL PROTECTED]> wrote: > >>The token client pulls down a hash of the certificate from the >>WiKID server. It pulls the certificate from the website and performs a >>hash on it. It compares the two hashes and if they match, presents the >>user with the

Re: HTTPS mutual authentication alpha release - please test

2005-11-03 Thread Nick Owen
>>> >>>What threat is this supposed to defend against? Is it phishing? I >>>don't see how it will help, if the bogus site has a valid certificate. >> >>Yes, phishing. The token client isn't checking to see if the cert is >>valid, it's only checking to see if it's the same as the one that is on >>

Re: HTTPS mutual authentication alpha release - please test

2005-11-03 Thread Nick Owen
cyphrpunk wrote: > On 10/31/05, Nick Owen <[EMAIL PROTECTED]> wrote: > >>The system works this way: Each WiKID domain now can include a >>'registered URL' field and a hash that website's SSL certificate. When >>a user wants to log onto a secure web site, they start the WiKID token >>and enter the

HTTPS mutual authentication alpha release - please test

2005-10-31 Thread Nick Owen
Happy Halloween! In what we hope will be a Halloween tradition, we have new release available for testing. WiKID is pleased to announce the alpha release of a major upgrade under the GPL featuring a cryptographic method of mutual authentication for HTTPS: WiKID-2.1: SOMETHING_WiKID_THIS_WAY_COMES