• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
Re: authenticating peers
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: authenticating peers


  • Subject: Re: authenticating peers
  • From: Michael Ash <email@hidden>
  • Date: Sat, 29 May 2010 07:15:38 -0400

On Fri, May 28, 2010 at 10:34 PM, Jens Alfke <email@hidden> wrote:
>
> On May 28, 2010, at 6:59 PM, Michael Ash wrote:
>
>> An attacker can execute a man-in-the-middle attack...
>> An attacker can simply impersonate your app...
>> Neither of these can be defended against, even theoretically, when communicating peer-to-peer.
>
> Not true; if you use SSL or some equivalent, both peers can use certificates to identify themselves. This works if either (a) the certs are signed by a reputable authority (as in the traditional use of SSL by web servers), or if (b) each peer has previously verified the other’s identity and remembered the cert (as is done by SSH.)
>
> GameKit doesn’t do anything like this, though, although I can’t say for sure because Apple’s never published any information about the protocol used (to my knowledge).

Man-in-the-middle: if I execute the attack the first time you talk to
a given peer, you have no way of detecting me.

Impersonation: I use a legitimate copy to talk to you once. Now we
have two peers which have identified themselves. Afterwards, I take my
copy of the app and modify it to emit malicious code. When we connect
again, I use the credentials we already exchanged to identify my side
again, then hit you with malicious data.

How does your scheme protect against that? It doesn't, and can't. It
is impossible for you to tell the difference between "I am talking to
a legitimate copy of this application" and "I am talking to something
that appears to be a legitimate copy of this application, but will
actually send me evil data."

Mike
_______________________________________________

Cocoa-dev mailing list (email@hidden)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:

This email sent to email@hidden

  • Follow-Ups:
    • Re: authenticating peers
      • From: Jens Alfke <email@hidden>
References: 
 >isKindofClass with NSData and NSKeyUnarchiver (From: Philip Vallone <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Ken Thomases <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Graham Cox <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Philip Vallone <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Uli Kusterer <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Jens Alfke <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Philip Vallone <email@hidden>)
 >Re: isKindofClass with NSData and NSKeyUnarchiver (From: Michael Ash <email@hidden>)
 >Re: authenticating peers (From: Jens Alfke <email@hidden>)

  • Prev by Date: Re: six things I wasn't able to do with Cocoa
  • Next by Date: Re: Help w/ first step of creating Help Book for app
  • Previous by thread: Re: authenticating peers
  • Next by thread: Re: authenticating peers
  • Index(es):
    • Date
    • Thread