On Mon Oct  6 15:25:53 2008, Jonathan Schleifer wrote:
This is where your previous assertions appear to be in conflict. How does he know you weren't lying when you said it matched?

When you verify the SAS through the telephone, you hear each other and recognize each others voice.

Right - and that voiceprint identification, as it were, carries through to the esession channel.

If I'd tell him then it matches though it didn't, I would have just allowed a MITM, nothing more.

I don't see why, in practise, you'd do this, but for the sake of argument you've confirmed there is an MITM, and then proceeded anyway, which seems odd.

Additionally, he could ask me to re-negotiate and tell him my SAS and compare it.


Right, this works.

I don't believe it's needed, since if you distrusted each other so much that you had to go this route, why would you trust them with whatever you're saying?


If you still assert that your authentication was only one way, could you now explain how this was achieved, and in particular, what the side-channel used for SAS was, what its security properties were, and what the resultant security properties of the esession were?

They just knew from other things that I was I and trusted their server that there is no MITM and verified - which is why I didn't verify them.

Ah...

So basically, they didn't authenticate you as such at all, they just took the (often quite sensible) route of using a "leap of faith". (Oddly, not described at all in Wikipædia).

For those that don't know the term, that's trusting an initial key-exchange as being "probably okay", recording the public key of the peer, and then only worrying about changes. If the first key exchange wasn't compromised, then it's proof against further compromise.

Lots of real-world cases of this exist - like SSH - and it's probably fine for a lot of cases, such as verifying your roster. One might envision a client which internally performs leap-of-faith, and merely records whether a "proper" verification has ever been done.

Dave.
--
Dave Cridland - mailto:[EMAIL PROTECTED] - xmpp:[EMAIL PROTECTED]
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Reply via email to