[15755] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Can crypto help against Phishing, Spoofing and Spamming...

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Wed Jul 14 15:50:56 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 14 Jul 2004 15:57:33 +0200
From: Amir Herzberg <herzbea@macs.biu.ac.il>
To: John Levine <johnl@iecc.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <20040713192058.22520.qmail@xuxa.iecc.com>

This is a multi-part message in MIME format.
--------------020000060005070107010509
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

John Levine wrote:

>>Reminder: following lots of discussion on this list, I wrote proposals
>>on how crypto can help solve phishing, spoofing and spamming problems.
>>...
>># Protecting (even) Naive Web Users, or: Preventing Spoofing and
>>Establishing Credentials of Web Sites, at
>>http://eprint.iacr.org/2004/155/ (or off http://AmirHerzberg.com)
> This is a pretty good paper.  It outlines the problem and proposes
> that browsers add a "trusted credential area" that displays a site
> logo that has to be signed by a CA using SSL, in a way that is hard to
> spoof or forge.
Thanks! But, our prototype (for Mozilla) allows you also to select the 
Logo (or icon) for the site manually, although having it already signed 
by a trusted authority could be nice. Also: the trusted area can also 
display other credentials of the site, and in particular - logo and/or 
name of the CA.
> 
> I've been discussing a similar idea with a lot of people that has one
> important difference: the seal belongs to the CA and is distributed as
> part of the verification certificate.  Per-site logos have the
> disadvantages that there are a lot of sites, not all with famous
> logos, and there are a lot of CAs, most of whose primary verification
> technique is to be sure your check didn't bounce.
I completely agree that existing CA solution in browser is lousy; did 
you notice that the main requirement to become a CA is to be a CPA 
(certified public accountant) and pay 1400$ to WebTrust? (more in paper)
That's why manual logo approval by the users is an important first step 
(works great - I don't know how I ever used e-banking without it). 
Second step may be for users to share these user-certified logos, and 
finally - for some trustworthy organizations to provide logo certificates.
> 
> In most industries there is a regulator or trade association who
> already knows who the legitimate players are.  That's who should be
> running the CA for that industry, with an industry wide logo that they
> could advertise, something like a golden dollar sign that tells you
> that a site is really a bank.  I spoke briefly to a guy from the FDIC
> at last year's antiphishing meeting who said they'd been thinking of
> something like that.
Agree! We call this a credential, see in paper or just this screen shot 
http://www.cs.biu.ac.il/~herzbea/Papers/ecommerce/spoofing_files/image006.gif
-- 
Best regards,

Amir Herzberg
Associate Professor, Computer Science Dept., Bar Ilan University
http://amirherzberg.com (information and lectures in cryptography & 
security)

--------------020000060005070107010509
Content-Type: text/x-vcard; charset=utf-8;
 name="herzbea.vcf"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
 filename="herzbea.vcf"

begin:vcard
fn:Amir  Herzberg
n:Herzberg;Amir 
org:Bar Ilan University;Computer Science
adr:;;;Ramat Gan ;;52900;Israel
email;internet:herzbea@cs.biu.ac.il
title:Associate Professor
tel;work:+972-3-531-8863
tel;fax:+972-3-531-8863
x-mozilla-html:FALSE
url:http://AmirHerzberg.com
version:2.1
end:vcard


--------------020000060005070107010509--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post