Improving OpenIDs use of cryptography 1 - using a MAC

Paul Crowley paul at ciphergoth.org
Thu Jun 2 11:31:27 PDT 2005


Brad Fitzpatrick wrote:
> Somewhat related, Ben Trott brought up using Diffie-Hellman for shared
> secret exchange, rather than trusting that connections can't be sniffed.
> Thoughts on that? I don't know enough about it, like how much p and g can
> be re-used.  I also haven't thought up who would generate p/g and what the
> HTTP requests would look like.

I can't see any point in this.  We already agree that an active attack 
is the most likely sort, and they will have no difficulty breaking this 
measure, so it would introduce enormous complexity in the implementation 
to very little gain.
-- 
   __
\/ o\ Paul Crowley, paul at ciphergoth.org
/\__/ http://www.ciphergoth.org/


More information about the yadis mailing list