- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Fri, 13 Apr 2007 17:53:08 -0400
- To: <michael.mccormick@wellsfargo.com>
- Cc: public-wsc-wg@w3.org
- Message-ID: <OFA11535D5.B74D3C74-ON852572BC.00655E69-852572BC.00783A6B@LocalDomain>
I disagree, and if it makes sense as a site to user antipattern (and I
sense the jury still out on that), if there is concensus, we can say
something appropriate about what, if anything, should be implied for the
other direction (and the going in position from me would be, nothing
should be implied for the other direction).
What things other than SiteKey use information (secret, public, or shared
public) to (attempt to) authenticate the site to the use? Anyone have more
examples? Thanks Chuck for the Sitekey one. And Chuck, is the last login
time _really_ meant to authenticate the site to the user? I thought it was
to give the user a hint if the account had been unknowingly used by
someone else.
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
<michael.mccormick@wellsfargo.com>
04/12/2007 07:34 PM
To
<Mary_Ellen_Zurko@notesdev.ibm.com>
cc
<public-wsc-wg@w3.org>
Subject
RE: Shared Public Knowledge
Thanks for this clarification. But my concern is if W3C declares SPK
based site-to-user authentication to be an anti pattern, that certainly
implies it should never be used in the other direction either.
From: Mary Ellen Zurko [mailto:Mary_Ellen_Zurko@notesdev.ibm.com]
Sent: Thursday, April 12, 2007 3:17 PM
To: McCormick, Mike
Cc: public-wsc-wg@w3.org
Subject: Re: Shared Public Knowledge
I would like to do a rewind on this thread. Everyone who participated, go
back to the proposed recommendation that we discussed:
http://www.w3.org/2006/WSC/wiki/SharedPublicKnowledge
It's about authenticating the server to the user (since that's one of our
primary goals). Not the user to the server.
So I will assume all discussion of the latter was interesting and
informative (it was for me), but not about the actual proposal being
discussed. Maybe that's because the proposal is about something nobody
does or wants to do. That would make it nice and safe for our
recommendations :-).
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
<michael.mccormick@wellsfargo.com>
Sent by: public-wsc-wg-request@w3.org
04/11/2007 07:47 PM
To
<public-wsc-wg@w3.org>
cc
Subject
Shared Public Knowledge
I had to drop off the line for a few minutes at the top of the hour during
this morning's meeting. Regrettably that moment came during the Lightning
Discussions just as Chuck Wade was responding to MEZ's presentation on
Shared Public Knowledge (SPK). By the time I rejoined to discussion had
moved on to the next topic.
What I would have said given the opportunity is that Chuck is 100% right.
In our industry this battle has been fought many times and I see little
good coming from taking a hard line against all online use of SPK.
Many US companies rely on services provided by the likes of Choicepoint &
Acxiom to perform Knowledge Based Authentication (KBA) or Out of Wallet
Authentication (OOWA) of consumers in certain situations, especially in
cases where no prior business relationship exists between the FI and said
consumer.
These KBA systems typically ask a series of randomly chosen multiple
choice questions designed to score a user's knowledge of semi-private
information about himself or herself. Examples might include "What model
car do you drive"? or "What¡¦s the amount of your monthly mortgage
payment?". A determined criminal could undeniably obtain this information
from public sources, perhaps even use it to impersonate others, but that
doesn't mean there is no legitimate use case for KBA.
A blanket prohibition against KBA is unnecessary and would never be
accepted. Asking the user enough SPK based questions is not an
unreasonable authentication technique as long as the associated risk is
low, or when SPK is only being used to supplement some other credential
for extra assurance.
The much maligned Mother's Maiden Name is an example of weak KBA ¡K but
much stronger ones are possible using the enormous databases of personal
data that are available from brokers today. So I think the SPK
"anti-pattern" would benefit from being softened a bit to acknowledge
there's a place for it under certain conditions.
Thanks, Mike
Michael McCormick, CISSP
Lead Architect, Information Security Technology
Wells Fargo Bank
255 Second Avenue South
MAC N9301-01J
Minneapolis MN 55479
(ƒn 612-667-9227 (desk) 7 612-667-7037 (fax)
( 612-590-1437 (cell) J
michael.mccormick@wellsfargo.com (AIM)
2 612-621-1318 (pager) *
michael.mccormick@wellsfargo.com
¡§THESE OPINIONS ARE STRICTLY MY OWN AND NOT NECESSARILY THOSE OF WELLS
FARGO"
This message may contain confidential and/or privileged information. If
you are not the addressee or authorized to receive this for the addressee,
you must not use, copy, disclose, or take any action based on this message
or any information herein. If you have received this message in error,
please advise the sender immediately by reply e-mail and delete this
message. Thank you for your cooperation.
Received on Friday, 13 April 2007 21:55:46 UTC