Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - aberrant

Pages: [1]
1
Thanks for the quick reply.  Is there a whitepaper that discusses this in more detail for those of us who need a bit more assurance that the security issues have been thoroughly hashed out (pun intended)?

For example, it sounds as if you're adding extra source to the hash for the "private" exchange.  Is this source static?  Upon what is it based?  Who knows how it's derived?

2
Sorry, still not getting it.  If there's no cryptographic nonce that's exchanged between the source and the icam app, and the authentication is being brokered by your servers based on a static hash of the username and password, then what's to prevent you (or someone who's compromised your server) from just replaying the hash that is sent?

Pages: [1]