Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Jeffrey I. Schiller
I think you are close, but are probably doing way too much work. First let's define a function HMAC_MD. HMAC is defined in RFC2104 and represents the current best current practice for using a hash to "sign" a data value. It takes: result = hmac_md(key, value) You can use hmac with MD5, SHA1, S

Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Peter Gutmann
Rene Veerman writes: >Recently, on both the jQuery(.com) and PHP mailinglists, a question has >arisen on how to properly secure a login form for a non-ssl web-application. >But the replies have been "get ssl".. :( > >I disagree, and think that with a proper layout of authentication >architecture,

Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Joseph Ashwood
- Original Message - From: "Rene Veerman" Sent: Sunday, February 15, 2009 4:30 AM Subject: how to properly secure non-ssl logins (php + ajax) I'm going to edit this, since I assume most of the code is completely irrelevant proposal: database stores Hash(password | salt) on server ch

Re: Crypto Craft Knowledge

2009-02-20 Thread David Molnar
Stephan Neuhaus wrote: >> Yes, there's a need for a "crypto practices FAQ" to which one can refer. > > I disagree because you cannot force developers to read (and understand) > these FAQs. Instead, there is a need for APIs that are difficult to use > in an insecure way. For example, Peter Gutma

Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Alexander Klimov
On Sun, 15 Feb 2009, Rene Veerman wrote: > Recently, on both the jQuery(.com) and PHP mailinglists, a question has > arisen on how to properly secure a login form for a non-ssl web-application. > But the replies have been "get ssl".. :( Unfortunately, they are right: get SSL. > If you have a comp

Re: Crypto Craft Knowledge

2009-02-20 Thread Ben Laurie
Stephan Neuhaus wrote: > Many mistakes in crypto coding come from the fact that API developers > have so far very successfully shifted the burden of secure usage to the > application developer, the API user. But I believe this hasn't worked > and needs to be changed. I totally agree, and this is

Re: Crypto Craft Knowledge

2009-02-20 Thread James Hughes
On Feb 14, 2009, at 12:54 PM, David Molnar wrote: Ben Laurie wrote: [snip discussion of bad crypto implementation practices] Because he is steeped in the craft knowledge around crypto. But most developers aren't. Most developers don't even have the right mindset for secure coding, let alone

Contradictory opinion on KMIP

2009-02-20 Thread Arshad Noor
Recently, there was a posting on this forum on the Key Management Interoperability Protocol (KMIP) Technical Committee charter, proposed by a group of storage vendors (RSA, IBM, HP, et al) at OASIS. (Unfortunately, I deleted the posting, so I cannot refer to it directly, but here's a link to the

Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Lea Kissner
[Moderator's note: top posting is not considered good form. --Perry] Hi Rene, I suspect from reading this quickly that you may not be a cryptographer. I'd highly suggest that you borrow one for a bit before you go ahead with this. I'm having a bit of trouble reading exactly what you want to do, b

Shamir secret sharing and information theoretic security

2009-02-20 Thread R.A. Hettinga
Begin forwarded message: From: Sarad AV Date: February 17, 2009 9:51:09 AM EST To: cypherpu...@al-qaeda.net Subject: Shamir secret sharing and information theoretic security hi, I was going through the wikipedia example of shamir secret sharing which says it is information theoretically s

Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Erwan Legrand
Hi, > Recently, on both the jQuery(.com) and PHP mailinglists, a question has > arisen on how to properly secure a login form for a non-ssl web-application. > But the replies have been "get ssl".. :( What makes you think these are ill-advised? > I disagree, and think that with a proper layout of

Re: how to properly secure non-ssl logins (php + ajax)

2009-02-20 Thread Ivan Krstić
On Feb 15, 2009, at 7:30 AM, Rene Veerman wrote: Recently, on both the jQuery(.com) and PHP mailinglists, a question has arisen on how to properly secure a login form for a non-ssl web- application. What's the threat model? users[user_id].user_login_hash = onewayHash(user_login_name + pref

fyi: Researchers Hack Biometric Faces

2009-02-20 Thread ' =JeffH '
apropos to the biometrics essay in the Jan 2009 crypto-gram: Researchers Hack Biometric Faces slashdot.org/palm/18/09/02/17/216216_1.shtml from the face-off dept. posted by kdawson on 2009-02-18 01:35:00 yahoi sends in news from a week or so back: "Vietnamese researchers have cracked the facia

The password-reset paradox

2009-02-20 Thread Peter Gutmann
There are a variety of password cost-estimation surveys floating around that put the cost of password resets at $100-200 per user per year, depending on which survey you use (Gartner says so, it must be true). You can get OTP tokens as little as $5. Barely anyone uses them. Can anyone explain wh

stripping https from pages

2009-02-20 Thread Steven M. Bellovin
http://www.theregister.co.uk/2009/02/19/ssl_busting_demo/ -- we've talked about this attack for quite a while; someone has now implemented it. --Steve Bellovin, http://www.cs.columbia.edu/~smb - The Cryptography

Re: Shamir secret sharing and information theoretic security

2009-02-20 Thread Jonathan Katz
On Tue, 17 Feb 2009, R.A. Hettinga wrote: hi, I was going through the wikipedia example of shamir secret sharing which says it is information theoretically secure. http://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing ... The scheme is defined over a finite field *not* over the integers.

Re: The password-reset paradox

2009-02-20 Thread Jerry Leichter
On Feb 19, 2009, at 8:36 AM, Peter Gutmann wrote: There are a variety of password cost-estimation surveys floating around that put the cost of password resets at $100-200 per user per year, depending on which survey you use (Gartner says so, it must be true). You can get OTP tokens as litt

Re: The password-reset paradox

2009-02-20 Thread Steven M. Bellovin
On Fri, 20 Feb 2009 02:36:17 +1300 pgut...@cs.auckland.ac.nz (Peter Gutmann) wrote: > There are a variety of password cost-estimation surveys floating > around that put the cost of password resets at $100-200 per user per > year, depending on which survey you use (Gartner says so, it must be > tru

Re: The password-reset paradox

2009-02-20 Thread James Chacon
On Feb 19, 2009, at 7:36 AM, Peter Gutmann wrote: There are a variety of password cost-estimation surveys floating around that put the cost of password resets at $100-200 per user per year, depending on which survey you use (Gartner says so, it must be true). You can get OTP tokens as litt