[17027] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: two-factor authentication problems

daemon@ATHENA.MIT.EDU (Matt Crawford)
Sun Mar 6 22:37:57 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sun, 06 Mar 2005 20:37:56 -0600
From: Matt Crawford <crawdad@fnal.gov>
In-reply-to: <4229ED41.2030602@nma.com>
To: Ed Gerck <egerck@nma.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>


On Mar 5, 2005, at 11:32, Ed Gerck wrote:

> The worse part, however, is that the server side can always fake your
> authentication using a third-party because the server side can
> always calculate ahead and generate "your next number" for that
> third-party to enter -- the same number that you would get from your
> token. So, if someone breaks into your file using "your" number --
> who is responsible? The server side can always deny foul play.

Huh?  The server can always say "response was good" when it wasn't 
good.  Unless someone reclaims the server from the corrupt operator and 
analyzes it, the results are the same.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post