Monday, 2012-04-23

*** Terho (d58473c2@gateway/web/freenode/ip.213.132.115.194) has joined #wikid07:52
TerhoBTW WiKIDCA certificate is valid until Apr 10th 2013.07:54
*** Terho has quit (Quit: Page closed)08:08
*** nowen (~nowen@adsl-74-176-163-56.asm.bellsouth.net) has joined #wikid13:42
*** TomT___ (~Tom___@66.150.156.1) has joined #wikid17:57
TomT___Hey Nick17:57
TomT___are you there?17:57
nowenyes17:57
nowenthx for that doc17:58
TomT___i guess first, did you get my email with the asa config17:58
nowenyes - thanks for that18:00
TomT___cool18:19
TomT___Is there a way I can skip the option to check for a pin on the device?18:19
nowenthe option to check for a pin?18:20
TomT___yes18:20
TomT___i tried setting the value of the pin to 018:20
nowenno18:20
TomT___but the client still wanted me to punch in a pin18:20
nowenthat would not be two-factor auth ;)18:20
TomT___not by itself.18:20
TomT___but the cert is something that user has.18:21
TomT___or in this case the token18:21
TomT___and the lan credentials is something that the user knows.18:21
TomT___and therefore, two factor.18:21
TomT___i guess im looking at this from a very specific use case18:21
TomT___but it would be sort of nice if there was a way to disable18:21
nowenbut we use the PIN to prove possession of the private keys.  not PIN/OTP transaction, no proof of private key18:22
nowenwe cannot do it18:22
TomT___okay then.18:22
TomT___sort of lost by your statement "prove possession of the private keys"18:27
TomT___the client generates its own priv/pub keypair18:27
TomT___so wouldnt the private key be on the client anyhow? and thus, possession?18:27
nowenthe OTP is encrypted bu the tokens public key, meaning that only the private key on the token can decrypt it18:28
nowenonly by validating the OTP do we know that the user has the private key18:28
TomT___i get that, but why have the client punch in the pin?18:29
TomT___so client sends request and pub key to server18:29
TomT___server encrypts the config data and pub key with client pub key18:30
TomT___client is the only one who can decrypt the data18:30
nowenbecause the PIN is encrypted by the server's pub key, and it is only way to know you are talking to the right server18:30
nowenthere is not connection to the process without the OTP. It is not like a certificate in the browser18:32
TomT___i guess the part i just dont get.18:33
TomT___thats the part i just dont get.18:33
TomT___i punch in a pin on the client18:34
TomT___your saying the client encrypts the pin with the server pub key18:34
nowencorrect18:35
TomT___server gets the payload and decrypts with private key18:35
TomT___now server has the pin.18:35
TomT___server checks the pin against the pin stored in some sort of local database18:35
TomT___once pin is validated, server encrypts the passcode using public key of said client and ships the payload back18:35
TomT___is that pretty much it?18:36
nowencorrect.  there are some other crypto detail that probably aren't important18:36
TomT___okay, so with that very high-level explanation18:37
TomT___what im saying is.18:37
TomT___i dont understand what value the pin adds.18:37
TomT___give me a moment to think18:38
TomT___this has to be something obvious18:38
TomT___nope. not getting it18:38
TomT___as far as my feeblemind can think of, i dont see why the client cant just make an encrypted request18:39
TomT___and have the server spit back a passcode encrypted with the pub key of the client.18:39
nowenwhat is in the request?18:39
TomT___that would be a secure transfer.18:39
TomT___"hi i want a passcode"18:39
TomT___and server responds "okay. passcode=[passcode]"18:40
nowenok - so that might work for your situation where you want to use a lan password, but for none of our other customers18:40
nowenthus, we will not do it18:40
TomT___oh yeah.18:40
TomT___oh no. im not saying not rewriting stuff18:40
TomT___just would be nice to have an option of doing that, if the customer is aware of this issue.18:41
TomT___i get why you put in the idea of the PIN18:42
TomT___if they were planning on just using the token as a replacement of an extranet password18:42
TomT___or whatever purpose.18:42
TomT___but im assuming im not the first to bring this up18:42
TomT___and im you sound pretty adamant with your response.18:43
nowenyou are the first :)18:43
TomT___really? wow18:43
TomT___so odd18:43
nowenwhat you're asking reduces security18:43
TomT___i get that.18:43
TomT___for sure.18:43
TomT___but for corporations who already use another system for authenticating users and simply want a bolt on18:44
TomT___in terms of bolting on a second factor18:44
TomT___instead of replacement18:44
TomT___they may not need the requirement of a pin18:45
TomT___you get what im saying?18:45
TomT___i like this platform.18:45
TomT___I like it alot.18:45
TomT___but i can see people having a migrane over a pin. even if i tell them to use their ATM code as suggested18:46
nowenpeople have migraines over passwords, not PINs18:46
TomT___haha.  well i can tell you they have migraines over anything they have to remember with IT18:46
TomT___alright,  its not end all deal breaker, but all im saying is it would be nice to have the flex to disable with the understanding of the inherent issues with security.18:48
TomT___for example, using this as a complete RSA token replacement.18:48
nowenthat is what our customers are doing with it18:50
TomT___i want to be a customer too.... doesnt that count for anything? lol18:53
nowen:)18:53
TomT___like if someone sets the pin requirement to zero, then <H1>Hey -- youre doing something that disables two-factor security on this system and requires special consideration unless you like being compromised. Do not do this unless you know wtf you are doing</H1>18:55
*** TomT___ has quit ()20:02
*** Tom___ has quit (Quit: Page closed)20:30
*** prowlah (~prowlah@unaffiliated/prowlah) has joined #wikid22:59
prowlahhey nowen22:59

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!