[WEB SECURITY] New two-stage login procedure
kisero at gmail.com
Wed Dec 13 17:20:52 EST 2006
Sorry, i dont get it. (yeahhh, im newwwww!!)
"In cryptography <http://en.wikipedia.org/wiki/Cryptography>, a
attack* (*MITM*) is an attack in which an attacker is able to read, insert
and modify at will, messages between two parties without either party
knowing that the link between them has been compromised"
could you explain further more? i cant see the relationship.
User has a password for the site, a code (like 4 digit atm code).
He calls, input that 4 digit code , he gets a token.
He logs on the site, user + password.
On 12/13/06, Nick Owen <nowen at wikidsystems.com> wrote:
> And it would still be susceptible to a MITM attack, like all 2FA schemes
> focused solely on session auth.
> Here is my question: Is it possible to do strong mutual authentication
> without using cryptography? Are the FIs fooling themselves to think
> Brian Eaton wrote:
> > On 12/13/06, Esteban Ribičić <kisero at gmail.com> wrote:
> >> a smarter would be:
> >> 1) user calls from a defined number (mobile) to a pbx
> >> 2) pbx checks any and ask for a code
> >> 3) pbx replies with a token
> >> user logs with this normal credentials (bank account and password) +
> >> token +
> >> "common pool of questions".
> >> its not expensive...asterisk can do it.
> > Caller ID spoofing seems like a problem with this system:
> > http://www.securityfocus.com/news/9822
> > Regards,
> > Brian
> Nick Owen
> WiKID Systems, Inc.
> Commercial/Open Source Two-Factor Authentication
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the websecurity