Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-19 Thread Jeffrey Walton
On Sat, Jan 19, 2013 at 2:01 PM, Ben Laurie wrote: > On 19 January 2013 07:45, James A. Donald wrote: >> On 2013-01-19 2:14 AM, ianG wrote: >>> >>> Also, the confounded users tend to lose their phones or have them stolen. >>> And then they demand their 'identities' back, as if nothing has happene

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-19 Thread Ben Laurie
On 19 January 2013 07:45, James A. Donald wrote: > On 2013-01-19 2:14 AM, ianG wrote: >> >> Also, the confounded users tend to lose their phones or have them stolen. >> And then they demand their 'identities' back, as if nothing has happened. >> So the keys need to be agile, in some sense. Which

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread James A. Donald
On 2013-01-19 2:14 AM, ianG wrote: Also, the confounded users tend to lose their phones or have them stolen. And then they demand their 'identities' back, as if nothing has happened. So the keys need to be agile, in some sense. Which pushes us away from the phone, to cloud, or a variant, and

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread Warren Kumari
On Jan 18, 2013, at 5:14 PM, d...@geer.org wrote: > > As to secure storage, ya'll might find cleversafe.com interesting. Yup. There is also Tahoe-LAFS ( https://tahoe-lafs.org/trac/tahoe-lafs ), the Least-Authority File System "Tahoe-LAFS is a Free and Open cloud storage system. It distribute

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread dan
As to secure storage, ya'll might find cleversafe.com interesting. --dan ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread Warren Kumari
On Jan 18, 2013, at 2:04 PM, Jeffrey Walton wrote: > On Fri, Jan 18, 2013 at 12:29 PM, Warren Kumari wrote: >> >> On Jan 18, 2013, at 11:14 AM, ianG wrote: >> >>> On 17/01/13 05:21 AM, d...@geer.org wrote: > To clarify: I think everyone and everything should be identified by >

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread Jeffrey Walton
On Fri, Jan 18, 2013 at 12:29 PM, Warren Kumari wrote: > > On Jan 18, 2013, at 11:14 AM, ianG wrote: > >> On 17/01/13 05:21 AM, d...@geer.org wrote: >>> >>> > To clarify: I think everyone and everything should be identified by >>> > their public key,... >>> >>> Would re-analyzing all this in a

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread Warren Kumari
On Jan 18, 2013, at 11:14 AM, ianG wrote: > On 17/01/13 05:21 AM, d...@geer.org wrote: >> >> > To clarify: I think everyone and everything should be identified by >> > their public key,... >> >> Would re-analyzing all this in a key-centric model rather than >> a name-centric model offer any

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-18 Thread ianG
On 17/01/13 05:21 AM, d...@geer.org wrote: > To clarify: I think everyone and everything should be identified by > their public key,... Would re-analyzing all this in a key-centric model rather than a name-centric model offer any insight? (key-centric meaning that the key is the identity

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-17 Thread Thierry Moreau
James A. Donald wrote: On 2013-01-18 1:17 AM, Thierry Moreau wrote: First, replace "client certificate" by client PPKP (public-private key pair) and be ready for a significant training exercise. The more the trainee knows about X.509, the greater challenge for the trainer. It has been decisiv

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-17 Thread James A. Donald
On 2013-01-18 1:17 AM, Thierry Moreau wrote: First, replace "client certificate" by client PPKP (public-private key pair) and be ready for a significant training exercise. The more the trainee knows about X.509, the greater challenge for the trainer. It has been decisively and repeatedly demon

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-17 Thread Thierry Moreau
d...@geer.org wrote: > To clarify: I think everyone and everything should be identified by > their public key,... Would re-analyzing all this in a key-centric model rather than a name-centric model offer any insight? (key-centric meaning that the key is the identity and "Dan" is an attribut

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread James A. Donald
On 2013-01-17 12:21 PM, d...@geer.org wrote: > To clarify: I think everyone and everything should be identified by > their public key,... Would re-analyzing all this in a key-centric model rather than a name-centric model offer any insight? (key-centric meaning that the key is the identity

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread Jeffrey Walton
On Wed, Jan 16, 2013 at 9:21 PM, wrote: > > > To clarify: I think everyone and everything should be identified by > > their public key,... > > Would re-analyzing all this in a key-centric model rather than > a name-centric model offer any insight? (key-centric meaning > that the key is the id

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread Kevin W. Wall
On Wed, Jan 16, 2013 at 9:21 PM, wrote: > > > To clarify: I think everyone and everything should be identified by > > their public key,... > > Would re-analyzing all this in a key-centric model rather than > a name-centric model offer any insight? (key-centric meaning > that the key is the id

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread dan
> To clarify: I think everyone and everything should be identified by > their public key,... Would re-analyzing all this in a key-centric model rather than a name-centric model offer any insight? (key-centric meaning that the key is the identity and "Dan" is an attribute of that key; name-ce

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread James A. Donald
On 2013-01-17 11:38 AM, James A. Donald wrote: The end game is passwords with srp. Even if you are using client side certificates, you have to be able to get your PC client side certificates onto your smartphone, which requires that you sign on to your PC using a password. To clarify: I

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread James A. Donald
On 2013-01-17 9:02 AM, Adam Back wrote: There was a subthread in this huge PKI-is-failing and doesnt solve phishing thread looking at what might solve phishing (modulo engineering and deployment issues). To summarize Ian & Ben mentioned and I add a few: - client side certificates - password ma

Re: [cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread Jeffrey Walton
Hi Adam, A few thoughts On Wed, Jan 16, 2013 at 6:02 PM, Adam Back wrote: > There was a subthread in this huge PKI-is-failing and doesnt solve phishing > thread looking at what might solve phishing (modulo engineering and > deployment issues). > > To summarize Ian & Ben mentioned and I add a

[cryptography] phishing/password end-game (Re: Why anon-DH ...)

2013-01-16 Thread Adam Back
There was a subthread in this huge PKI-is-failing and doesnt solve phishing thread looking at what might solve phishing (modulo engineering and deployment issues). To summarize Ian & Ben mentioned and I add a few: - client side certificates - password managers - browser auth - TPM to make creden