[154070] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: LinkedIn password database compromised

daemon@ATHENA.MIT.EDU (Keith Medcalf)
Sat Jun 23 20:53:12 2012

Date: Sat, 23 Jun 2012 18:52:10 -0600
In-Reply-To: <20120620213914.GA20633@ussenterprise.ufp.org>
From: "Keith Medcalf" <kmedcalf@dessus.com>
To: "Leo Bicknell" <bicknell@ufp.org>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Leo,

This will never work.  The "vested profiteers" will all get together and ma=
ke it a condition that in order to use this method the user has to have "pu=
rchased" a "verified" key from them.  Every site will use different profite=
ers (probably whoever gives them the biggest kickback).  You will end up pa=
ying thousands of dollars a year (as a user) to buy multiple keys from the =
profiteers, and provide them all sorts of private information in the proces=
s.  They will then also insist that web sites using this method provide "tr=
acking" information on key usage back to the profiteers.  The profiteers wi=
ll then sell all this information to whomever they want, for whatever purpo=
se, so long as it results in a profit.  Some of this will get kicked back t=
o participating web sites.  Then there will be "affiliate programs" where a=
ny web site can "sign up" with the profiteers to "silently" do key exchange=
s without the users consent so that more tracking information can be collec=
ted, for which the participating affiliate web site will get a kickback.  B=
rowser vendors will "assist" by making the whole process transparent.  Cont=
racts in restraint of trade will be enforced by the profiteers to prevent a=
ny browser from using the "method" unless it is completely invisible to the=
 user.

Then (in the US) the fascist government will step in and require "registrat=
ion" of issued keys along with the verified real-world identity linkage.

If it does not use self-generated unsigned keys, it will never fly.

---
()  ascii ribbon campaign against html e-mail
/\  www.asciiribbon.org


> -----Original Message-----
> From: Leo Bicknell [mailto:bicknell@ufp.org]
> Sent: Wednesday, 20 June, 2012 15:39
> To: nanog@nanog.org
> Subject: Re: LinkedIn password database compromised
> 
> In a message written on Wed, Jun 20, 2012 at 02:19:15PM -0700, Leo Vegoda
> wrote:
> > Key management: doing it right is hard and probably beyond most end use=
rs.
> 
> I could not be in more violent disagreement.
> 
> First time a user goes to sign up on a web page, the browser should
> detect it wants a key uploaded and do a simple wizard.
> 
>   - Would you like to create an online identity for logging into web
>     sites?    Yes, No, Import
> 
> User says yes, it creates a key, asking for an e-mail address to
> identify it.  Import to drag it in from some other program/format,
> No and you can't sign up.
> 
> Browser now says "would you like to sign up for website 'foobar.com'",
> and if the user says "yes" it submits their public key including the
> e-mail they are going to use to log on.  User doesn't even fill out
> a form at all.
> 
> Web site still does the usual e-mail the user, click this link to verify
> you want to sign up thing.
> 
> User goes back to web site later, browser detects "auth needed" and
> "public key foo" accepted, presents the cert, and the user is logged in.
> 
> Notice that these steps _remove_ the user filling out forms to sign up
> for simple web sites, and filling out forms to log in.  Anyone who's
> used cert-based auth at work is already familiar, the web site
> "magically" knows you.  This is MUCH more user friendly.
> 
> So the big magic here is the user has to click on "yes" to create a key
> and type in an e-mail once.  That's it.  There's no web of trust.  No
> identity verification (a-la ssl).  I'm talking a very SSH like system,
> but with more polish.
> 
> Users would find it much more convenient and wonder why we ever used
> passwords, I think...
> 
> --
>        Leo Bicknell - bicknell@ufp.org - CCIE 3440
>         PGP keys at http://www.ufp.org/~bicknell/





home help back first fref pref prev next nref lref last post