[Telepathy] XMPP: OpenPGP SASL mechanism
Daniele Ricci
daniele.athome at gmail.com
Wed Apr 17 08:28:03 PDT 2013
Wait! I know: a shared secret (Diffie-Hellman) in the challenge :-)
On Wed, Apr 17, 2013 at 5:18 PM, Daniele Ricci <daniele.athome at gmail.com> wrote:
> On Wed, Apr 17, 2013 at 5:08 PM, Simon McVittie
> <simon.mcvittie at collabora.co.uk> wrote:
>> I suggest talking to an appropriate standardization group (we are not
>> one of those; the XMPP mailing lists might be) to make this into a
>> usable and secure specification.
>
> This will be my next step.
>
>> Isn't this rather exploitable? If a malicious server sends
>>
>> <challenge>I, Daniele Ricci, promise to pay Simon McVittie $1
>> million</challenge>
>>
>> then you probably don't want to be signing that with your PGP key :-)
>>
>> (Or if the user is a Debian/Ubuntu developer with upload privileges, it
>> could present a Debian .changes file authorizing the upload of a
>> malicious package, for instance.)
>>
>
> Other than checking the server challenge for a specific syntax, is
> there any other way to make this secure? How do I prove that client
> has the private key it claims to have?
>
> --
> Daniele
--
Daniele
More information about the telepathy
mailing list