Confirmed users
471
edits
m (→local scrypt) |
|||
| Line 252: | Line 252: | ||
attack code regardless of origin, so the MitM attacker would be limited to | attack code regardless of origin, so the MitM attacker would be limited to | ||
the usual MitM attacks, which SRP protects against nicely. | the usual MitM attacks, which SRP protects against nicely. | ||
The Helper communications must also be protected carefully. Clients must send | |||
their "A" value to a safe Helper, and both A and B must remain confidential | |||
in transit. Revealing these values would allow the eavesdropper to make the | |||
same cheap brute-force attack as the Helper. The same techniques described | |||
above (to establish the Verifier) must be applied here: checking an SSL | |||
certificate, or encrypting to/from a pre-established public key. | |||