Changes

Jump to: navigation, search

Identity/AttachedServices/KeyServerProtocol

117 bytes added, 07:45, 10 July 2013
m
SRP Client Calculation
[[File:PICL-IdPAuth-SRP-Client2.png|client-side SRP 2]]
To safely tell if the "S" values match, both client and server combine srpA, srpB, and their (independently) generated "S" strings to form a string named "M1". The client sends M1 (along with srpA) in the getToken2() message. The server compares the client's copy of M1 against its own. If they match, the client knew the password and the server can safely respond with the encrypted account data. If they do not match, the client (or a man-in-the-middle attacker) did not know the password, and the client should increment a counter that can trigger defenses against online guessing attacks. The server must then return an error to the client, and '''not''' use or reveal srpK (or the correct M1) in any way.
Both client and server also hash "S" into "srpK". This is the shared session key, from which specific message encryption and MAC keys are derived (as described below).
Confirm
471
edits

Navigation menu