OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   Re: [xml-dev] Re: Cookies at XML Europe 2004 -- Call for Participation

[ Lists Home | Date Index | Thread Index ]

Rich Salz scripsit:

> In the Web world, all SSL-speaking browsers come with a list of root
> certificates for CA's that issue SSL-certs.  As long as you trust
> the certs that came with your browser, then even if I am sitting
> as a lonely island completely with everyone one of my IP packets
> under your control, you can't fool me.

Very true, although eventually those certificates will expire, and then
you need a new browser, in which case I've got you.

I reread RFC 2617 last night, and it does seem to me that although it
is very properly self-deprecating about the level of security provided
by digest authentication, it really does provide decent authentication
(though not integrity protection or, of course, confidentiality)
provided one is clever about server and client nonces.  What is more,
the level of authentication security can be smoothly traded off against
convenience and cacheability, because on a GET a replay attack is
pointless:  Eve can only learn what the result of that very GET
was.  (All bets are off if Eve can break the hash function, of
course, and it might be worthwhile for someone to update the RFC to
make specific reference to SHA1 and SHA1-sess algorithms.)

-- 
We call nothing profound                        jcowan@reutershealth.com
that is not wittily expressed.                  John Cowan
        --Northrop Frye (improved)              http://www.reutershealth.com




 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS