[360] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Experimental implementation of SimpleMD5

daemon@ATHENA.MIT.EDU (Mary Ellen Zurko)
Mon Jan 30 17:36:34 1995

From: zurko@osf.org (Mary Ellen Zurko)
To: www-security@ns2.rutgers.edu
Date: Mon, 30 Jan 95 12:04:01 EST
Cc: zurko@osf.org (Me)
In-Reply-To: <95Jan26.050014gmt+9(?illegal end of message identification?) :00.; from "Phillip M. Hallam-Baker" at Jan 26, 95 4:49 am
Reply-To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

> On the nonce question :-
> ------------------------
> 
> The CERN server is forking. Under the UNIX madness there is no threads 
> systems we can expect to work for reference code - extreeme :-(. This 
> means that connections *have* to be idempotent. So the use of nonces becomes
> a problem, how do we work out which nonces we have sent out??

Another vector, if you're still considering nonces; if they're not
meant to be confidential (and I couldn't tell if they were meant to be
or not), clients could always use "last nonce + n" for the return
trip, with "n" in the clear. So, if the client increments a little
more than the server, it doesn't matter.

> This being the case I would prefer to dispense with the nonce value idea and
> use a timestamp :-)

So this is a timestamp as a nonce, so that the clock skew between
server and client doesn't matter? Or does the clock skew matter, so
what is it? Glancing back at your on-line proposal, I find only that
the timestamp is not currently checked, not how it will be.
	Mez



home help back first fref pref prev next nref lref last post