- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Wed, 25 Apr 2007 12:46:08 -0400
- To: Web Security Context WG <public-wsc-wg@w3.org>
- Cc: public-wsc-wg@w3.org
- Message-ID: <OFA6115189.B2A98895-ON852572C8.005B2F90-852572C8.005C1C40@LocalDomain>
I'm not sure I agree with the very last step of logic in the last
sentence. And I can't tell if that's because I don't agree with what I
said on the phone (that 90% of what we're doing is fighting impersonation
attacks), or that I don't agree with just that last step. Fighting
impersonation attacks is, imo, the reason that there was enough interest
in the WG for the membership of the W3C to support it. So it is a major
thrust of what we are doing. There are two aspects of our charter and
direction that work against that as the only goal however. One is the
deliverable to render the presentation of security context information
robust against spoofing attacks. That opens up the scope to consideration
of any attack that can either remove security context information, or add
it. The other item in the charter is that we are enabling users to make
better trust decisions on the web. Even if I'm accurately certain of the
identity of a web site, will I make a better trust decision if it's asking
me to register my new password (or send an old one) in the network in the
clear?
Anyone else have thoughts on this tension (between "just" identity and
richer security context information if/as driven by the charter)?
Mez
Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect
Web Security Context Issue Tracker <dean+cgi@w3.org>
Sent by: public-wsc-wg-request@w3.org
04/25/2007 10:37 AM
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>
To
public-wsc-wg@w3.org
cc
Subject
ISSUE-68: Note summary, goals, and scope should more clearly focus on
problem to be solved---impersonation
ISSUE-68: Note summary, goals, and scope should more clearly focus on
problem to be solved---impersonation
http://www.w3.org/2006/WSC/Group/track/issues/68
Raised by: Stuart Schechter
On product: Note: use cases etc.
In talking with MeZ, she thinks 90% of what we're doing is fighting
impersonation attacks. Fighting impersonation means making it easier to
for
users to know what site they are communicating with, and reducing the
number
of cases in which impersonation can cause harm (the number of
security-critical decisions that require users to verify the identity of
the
site.) If this were reflected in the note, the goals and scope would be
oodles more clear. For example, "security information" could be
transformed
into the much more descriptive "information used to authenticate the
site".
Received on Wednesday, 25 April 2007 16:46:09 UTC