PIDK PID based keys

Ideas for ADC may be presented here for others to review and point out flaws or further improve the idea.
Forum rules
If you have an account on the wiki, remember to update the ADC Proposals page for new ideas.

http://dcbase.org/wiki/ADC_Proposals_list
Locked
klondike
Member
Posts: 73
Joined: 14 Nov 2010, 13:06

PIDK PID based keys

Post by klondike » 11 Oct 2012, 21:17

PIDK's propossal text is currently defined in http://www.dcbase.org/wiki/PIDK I'm opening this thread for discussion before I try to get it approved as an official extension.

This extension was intended as a backup mode for the ECID derived keys which will be used later in other extensions (like SUD1) though its usage is not recommended since it can strain the hub when many users are in it (since for each new client it need to compute new keys for all of the clients in the hub). It is also meant as a container to find all the reserved derived keys in a single place.

So, any question/complain?

klondike
Member
Posts: 73
Joined: 14 Nov 2010, 13:06

Re: PIDK PID based keys

Post by klondike » 12 Oct 2012, 13:58

[2012-10-12 15:20] <cologic> klondike: well, I'm unsure what my dcbase forum login is (or if I have one) - so I won't respond in a particularly detailed manner since the forum is better for that...

3) "Keys are derived by the use of the HKDF function defined in rfc 5869 with the session hash, the SALT will be set to "ADC PIDK Extension"" - I'm not sure how much value a hardcoded salt adds here.

4) in http://www.dcbase.org/wiki/PIDK it conflates "secure" with "SSL". Which, given that "SSL" stands for "secure sockets layer", is pretty forgiveable. But, still less precise than preferable.
The hardcoded SALT prevents trivial attacks from being valid on all protocols.

I have fixed secure to be SSL, thanks :D

Locked