IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: "too many auth failures"?



Simon Josefsson <simon%josefsson.org@localhost> writes:

>Isn't this another problem?  Often private keys are protected by a password
>or requires a PIN to unlock a smartcard, and iterating to sign with all keys
>becomes a user interface issue quickly.  This is how libssh2 works, and I
>couldn't think of any way to avoid it.

That's been a major issue for S/MIME deployments in the past, as soon as you 
enable message signing/encryption you get bombarded with requests to insert 
smart cards, enter PINs and passwords, and generally end up being a crypto 
bookkeeper for your mail app.  The usual solution is to use S/MIME gateways, 
where the organisational mail gateway holds your key and signs/decrypts on 
your behalf, more or less defeating the point of personal message security 
since now you're just doing a STARTTLS for SMTP-equivalent in a really awkward 
way.

(The lesson there is that the app should do all it can to minimise the load on
the user, otherwise security gets sacrificed in exchange for functionality).

Peter.



Home | Main Index | Thread Index | Old Index