Identity/AttachedServices/KeyServerProtocol: Difference between revisions

Jump to navigation Jump to search
include new SRP salt when resetting the account
(include new SRP salt when resetting the account)
Line 381: Line 381:


= Resetting the Account =
= Resetting the Account =
The current stub just submits (newPassword, wrap(kB), resetToken). This will be replaced soon.


resetAccount() needs request confidentiality, since the arguments include the newly wrapped kB value and the new SRP verifier, both of which enable a brute-force attack against the password. HAWK provides request integrity. The response is a single "ok" or "fail", conveyed by the HTTP headers, so we do not require response confidentiality, and can live without response integrity.
resetAccount() needs request confidentiality, since the arguments include the newly wrapped kB value and the new SRP verifier, both of which enable a brute-force attack against the password. HAWK provides request integrity. The response is a single "ok" or "fail", conveyed by the HTTP headers, so we do not require response confidentiality, and can live without response integrity.
Line 393: Line 391:




The request data will contain kA, wrap(kB), and the SRP verifier, concatenated together. The first two pieces are fixed-length. We generate enough reqXORkey bytes to cover all three values.
The request data will contain kA, wrap(kB), a new (randomly-generated) SRP salt, and the new SRP verifier, all concatenated together. The first three pieces are fixed-length. We generate enough reqXORkey bytes to cover all four values.


[[File:PICL-IdPAuth-resetAccount.png|Deriving the resetAccount Keys]]
[[File:PICL-IdPAuth-resetAccount.png|Deriving the resetAccount Keys]]
Confirmed users
471

edits

Navigation menu