[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: SET




William H. Geiger III writes:
> In <[email protected]>, on 11/12/97
>    at 09:51 AM, Eric Murray <[email protected]> said:
> 
> >[details: according to the spec the cardholder sends to the merchant
> >thumbs (SHA1 hashes) of all the certs in the cardholder's cert cache.
> >Since this will contain certs from merchants the cardholder has made
> >purchases from in the past, a merchant could simply match up those
> >merchant cert thumbs with cert thumbs he obtains from other merchants,
> >allowing him to build a list of merchants the cardholder has attempted to
> >make purchases from].
> 
> 
> Sorry I haven't been keeping track of the SET but why would a merchant
> need this info in the first place??? If anything one would think that this
> would be client driven not server driven (ie the client queries the
> merchant for the hash of his cert to see if the client already has a copy
> or not). I am not quite sure what they are trying to accomplish by this
> unless what you consider a "flaw" is realy a "feature by design"?


Sending them all from the client is bit more efficient-
this way the client sends one message with all its thumbs and
the merchant side sends back any certs that are required.

The other way, the merchant would send the thumbs for all
the required certs, then the client would send a list of thumbs
for certs it doesn't have, then the server would send those certs.

So this way there's one less round trip required.

Both methods are equally open to attack unless the list of thumbs is MAC'd.


-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5