You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@couchdb.apache.org by "Klaus Trainer (JIRA)" <ji...@apache.org> on 2014/02/24 16:41:22 UTC
[jira] [Assigned] (COUCHDB-2100) Implement TLS-SRP (RFC 5054)
[ https://issues.apache.org/jira/browse/COUCHDB-2100?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Klaus Trainer reassigned COUCHDB-2100:
--------------------------------------
Assignee: Klaus Trainer
> Implement TLS-SRP (RFC 5054)
> ----------------------------
>
> Key: COUCHDB-2100
> URL: https://issues.apache.org/jira/browse/COUCHDB-2100
> Project: CouchDB
> Issue Type: New Feature
> Security Level: public(Regular issues)
> Components: HTTP Interface
> Reporter: Klaus Trainer
> Assignee: Klaus Trainer
>
> TLS-SRP, which provides a password-based mutual (i.e., for both client
> and server) authentication for TLS, is supported in Erlang/OTP since
> R16B01.
> As implementing support for TLS-SRP in CouchDB would mean to just add
> new functionality, it can likely be implemented without making CouchDB
> incompatible with older Erlang/OTP releases at the same time. With
> regard to the ssl application API, adding TLS-SRP-support would
> concretely mean to add additional options (i.e., `srp_identity` and
> `user_lookup_fun`) when calling `listen` or rather `connect` in the case
> that TLS-SRP is supported in that particular version of the ssl
> application.
> Advantages:
> * Users can use TLS without having to deal with certificate authorities.
> * Password authentication is less prone than certificate authentication
> to certain types of configuration mistakes, such as expired
> certificates or mismatched common name fields.
> * TLS-SRP is forward-secure.
> Disadvantages:
> * While there are several TLS-SRP implementations out there (e.g., in
> GnuTLS, OpenSSL, Apache mod_gnutls, cURL, TLS Lite, and
> SecureBlackbox), it is still not implemented in browsers.
> * If an attacker learns a user's SRP verifier (e.g., by gaining access
> to a user document), the attacker can masquerade as the real server to
> that user (c.f. section 3.3 in RFC 5054).
--
This message was sent by Atlassian JIRA
(v6.1.5#6160)