Changes

Jump to: navigation, search

Identity/AttachedServices/KeyServerProtocol

1 byte added, 04:31, 3 July 2013
m
SRP Verifier Calculation
=== SRP Verifier Calculation ===
When the client first creates the account, it must combine the account email address, the stretched password (srpPW), and a randomly-generated srpSalt, to compute the srpVerifier. The server will use this verifier later, to check whether or not the client really knows the password.  If the server is compromised and an attacker learns the srpVerifier for a given account, they cannot use this to directly log in (the verifier is not "password-equivalent"), but it does allow them to perform an offline brute-force attack against the user's password. In this respect, it is similar to a traditional hashed password. We make these attacks somewhat more expensive by performing the client-side stretching described above, instead of using the raw user password in the SRP calculation.
[[File:PICL-IdPAuth-SRP-Verifier.png|client-side SRP Verifier calculation]]
Confirm
471
edits

Navigation menu