Re: ISSUE-68: Note summary, goals, and scope should more clearly focus on problem to be solved---impersonation

I'm not sure I agree with the very last step of logic in the last 
sentence. And I can't tell if that's because I don't agree with what I 
said on the phone (that 90% of what we're doing is fighting impersonation 
attacks), or that I don't agree with just that last step. Fighting 
impersonation attacks is, imo, the reason that there was enough interest 
in the WG for the membership of the W3C to support it. So it is a major 
thrust of what we are doing. There are two aspects of our charter and 
direction that work against that as the only goal however. One is the 
deliverable to render the presentation of security context information 
robust against spoofing attacks. That opens up the scope to consideration 
of any attack that can either remove security context information, or add 
it. The other item in the charter is that we are enabling users to make 
better trust decisions on the web. Even if I'm accurately certain of the 
identity of a web site, will I make a better trust decision if it's asking 
me to register my new password (or send an old one) in the network in the 
clear? 

Anyone else have thoughts on this tension (between "just" identity and 
richer security context information if/as driven by the charter)? 

          Mez

Mary Ellen Zurko, STSM, IBM Lotus CTO Office       (t/l 333-6389)
Lotus/WPLC Security Strategy and Patent Innovation Architect




Web Security Context Issue Tracker <dean+cgi@w3.org> 
Sent by: public-wsc-wg-request@w3.org
04/25/2007 10:37 AM
Please respond to
Web Security Context WG <public-wsc-wg@w3.org>


To
public-wsc-wg@w3.org
cc

Subject
ISSUE-68: Note summary, goals, and scope should more clearly focus on 
problem to be solved---impersonation








ISSUE-68: Note summary, goals, and scope should more clearly focus on 
problem to be solved---impersonation

http://www.w3.org/2006/WSC/Group/track/issues/68

Raised by: Stuart Schechter
On product: Note: use cases etc.

In talking with MeZ, she  thinks 90% of what we're doing is fighting
impersonation attacks.  Fighting impersonation means making it easier to 
for
users to know what site they are communicating with, and reducing the 
number
of cases in which impersonation can cause harm (the number of
security-critical decisions that require users to verify the identity of 
the
site.)  If this were reflected in the note, the goals and scope would be
oodles more clear.  For example, "security information" could be 
transformed
into the much more descriptive "information used to authenticate the 
site".

Received on Wednesday, 25 April 2007 16:46:09 UTC