[340] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Experimental implementation of SimpleMD5

daemon@ATHENA.MIT.EDU (hallam@axal04.cern.ch)
Tue Jan 24 20:54:10 1995

From: hallam@axal04.cern.ch
Date: Tue, 24 Jan 1995 21:28:13 +0100
X-Vms-To: DXMINT::http-wg-request@cuckoo.hpl.hp.com,DXMINT::www-security@ns2.rutgers.edu
Apparently-To: <www-security@ns2.rutgers.edu>
Apparently-To: <http-wg-request@cuckoo.hpl.hp.com>
Reply-To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu


>SimpleMD5 has been implemented in our client and in 2 servers, and works
>nicely as specified.

Ok I have 1 server and 2 clients... any advances?


>Philip Hallam-Baker does not share our enthusiasm for our proposal, and has
>suggested something totally distinct but similar, the details of which are
>at:

>5) Make the scheme as SIMPLE as possible, leaving the meatier issues to
>S-HTTP discussions.

The only enhancements I have extra in my scheme which require extra code are:

1) The authentication of the body
2) The possiblity to use other digests, not just MD5
3) I think I add in an extra MD5 along the way

(1) is not a big deal to implement.
(2) requires no code at all in the case that one decides only to do an MD5 
implementation :-) 
	[OK it might be good form to check strcmp (p2, "RSA-MD5") == 0 :-]
(3) is easy and defeats a whole slew of attacks.


Its not as if I suggested lots of ASN.1 or anything :-) Comming soon: PKCS-7 
revealed!


BTW we still need to come to some sort of decision on whether we can have an 
HTML form setup that allows the digestified password to be communicated.


I see the digest scheme as an essential adjunct to the public key schemes for
a number of uses, including for connecting to buletin board systems which might 
be run by naughty sysops with a penchant for stealing password files.


We have to get whatever scheme we agree on through the IETF. It will methinks
be easier to get a strong system through than a weak one. So if there are *ANY*
minor tweeks that add security we need to add them pronto. Otherwise we will
end up taking the HTTP/1.1 spec off to an IETF meeting and bringing back a
spec with so many boondogles it can be used as a Christmass tree. 


[And no I don't think we can sneak it through in the HTTP/1.0 existing
practice spec, too many people would notice]

[-: Its just as well I didn't add the encryption of the message content :-]


Sun Tzu said: -
	It is easier to write ten thousand lines of code than get an IETF
	meeting to agree to a standard for security.


		Phill H-B



home help back first fref pref prev next nref lref last post