IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Some SRP issues
Tom Wu <tom%arcot.com@localhost> writes:
> Worst case, if the attacker feeds the client a "booby-trapped" safe
> prime that he can do fast DL in, then he can extract the client's secret
> "a". He then sends some random string in place of B, gets the client's
> response hash, and then can run through a list of passwords, guessing
> possible passwords and checking them against the client's response. The
> defense is to accept only known, safe parameters (like the Oakley/IPSec
> moduli) or at least allow only parameters that pass verification *and*
> are sufficiently long.
Thanks.
I don't feel terribly good about requiring the client to check that
some prime provided by the server is safe. So I'd prefer a hard coded
list (which can be expanded as time goes by).
/Niels
Home |
Main Index |
Thread Index |
Old Index