- From: Thomas Roessler <tlr@w3.org>
- Date: Mon, 11 Jun 2007 00:41:36 +0200
- To: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Cc: rachna.public@gmail.com, public-wsc-wg@w3.org
(This thread is kind of relevant to ACTION-257 -- mostly adding this link since tracker was actually where I started searching for this thread. ;) So, reviewing the proposal, I think the key aspects that I see are: - Log in to some set of web sites for which credentials are known through a simple gesture, thereby forcing phishing sites to cause a disruption in the user's browsing process. This sounds like it might be a pretty effective defense against impersonation types of attacks. - Control this functionality through some shared-secret based widget that can be recognized. - A neat association process to make people say what they want to do. In some places, you seem to mention "this login protocol." I gather that this might be any protocol which does not transmit passwords over the wire, but that's not clear to me. Mind clarifying? Part of the value proposition of the proposal seems to be that the "trusted browser component" would enable users to enforce use of a zero-knowledge password proof [e.g., defend against the "please enter your password here" attack that's of course possible]. I wonder how effective that actually is -- i.e., will people simply enter their passwords when a normal form occurs --, and more generally, what the interaction would be with traditional login mechanisms (RFC 2617, forms+cookies). My worst-case hypothesis would be that, whenever people touch passwords, they can be persuaded into entering them. It's not obvious to me what the right conclusion would be from that: Invoking the association process? Or invoking some "legacy association process"? *Hiding* from the user whether the secure or the insecure protocol are used, and making decisions about that under the hood? Just falling back to current behavior somehow seems like the wrong fallback here. Cheers, -- Thomas Roessler, W3C <tlr@w3.org> On 2007-06-08 12:24:48 -0400, Mary Ellen Zurko wrote: > "The user shares a secret with the Trusted Browser Component. The shared > secret may be an image selected by the user, or can be another type of > secret (e.g., text or audio) to meet accessibility requirements. The > shared secret creates a "trusted path" between the user and the Trusted > Browser Component. Examples of user customized website and browser > interfaces include [4], [5] and [6]. " > > This part definately seems in scope, and as I mentioned in PIIEditorBar, > Perhaps you can put it into conformance language. > > "The first time the user visits a trusted website or wishes to create an > account at such a website, he must create an association between the > browser and "trusted website"(e.g., the browser may automatically > recognize that this is a website that supports this login mechanism, the > user may be required to perform an action to make an association, the user > may be required to supply an out of band activation code). This step > represents a one-time trust decision by the user (usability testing is > required to determine if users can accomplish this task). This trust > decision can be supported with information supplied by the browser (EV > status, user's history with the website, others' history with the > website). " > > Asking users for one time trust decisions is definately in scope (that's > what SSL does today with self signed certs). I'd very much like to see > recommendations abstract enough to support a variety of implementations of > those trust decisions, and some usability testing on the topic, in our WG. > So I'd like to see you carry this part forward as well. > > The Login part also seems phrased to keep it all in scope, and I can see > working with basic password management tools in that context as > alternative examples. > > Mez > > Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) > Lotus/WPLC Security Strategy and Patent Innovation Architect > > > > > "Rachna Dhamija" <rachna.public@gmail.com> > Sent by: public-wsc-wg-request@w3.org > 05/24/2007 01:13 PM > > To > public-wsc-wg@w3.org > cc > > Subject > Action 213: write a lightning proposal on wiki > > > > > > > I added a proposal to the wiki. This opens up a question for the group: > are interfaces to out of scope protocols within our scope? > > Trusted Browser Component to Capture User Intention > http://www.w3.org/2006/WSC/wiki/TrustedBrowserComponent > >
Received on Sunday, 10 June 2007 22:41:47 UTC