Ah, right. My bad. I mistakenly believed that a thread creator had deletion rights. But would lead to havoc.
If the browser knows the domain in the URL bar, can't this spoof be stopped by comparing the domain of the SQRL code and the domain of the URL bar? If the root domain isn't the same, it's clearly a spoof.Oh, yes... and it's CRUCIAL that a client shows the SQRL authentication domain in a way that will be clearly seen. That's the EASIEST of all possible SQRL spoofs and it's been a source of much debate and concern!
That's 100% true, @Gristle , and this is a benefit that a SQRL web browser extension has that external clients do not. I struggled to get that information for my own Windows desktop client, since it SHOULD have been present in the HTTP Referer: header of the incoming CPS jump. But the localhost server is not HTTPS and any login page will be HTTPS (as will nearly all pages now). And the browser rules state that the Referer header MUST be stripped when moving from any secured to non-secured page.If the browser knows the domain in the URL bar, can't this spoof be stopped by comparing the domain of the SQRL code and the domain of the URL bar? If the root domain isn't the same, it's clearly a spoof.
I mentioned one time putting the certificate fingerprint into the QR code so the external device, if it receives a cert from the website with a different fingerprint, will know something's wrong. I can't remember the reason for not doing that now.If the browser knows the domain in the URL bar, can't this spoof be stopped by comparing the domain of the SQRL code and the domain of the URL bar? If the root domain isn't the same, it's clearly a spoof.
I mentioned one time putting the certificate fingerprint into the QR code so the external device, if it receives a cert from the website with a different fingerprint, will know something's wrong. I can't remember the reason for not doing that now.
That might have been it: trying to get it to work unspoofably might be more trouble than it's worth.That's a really cool idea, but I think that would be spoofable unless the fingerprint portion of the code were encrypted or signed. Meaning, amaz0n.com takes the QR code from amazon.com, reads the contents of the code, creates a duplicate code, but replaces the fingerprint portion from amazon.com's cert and inserts the fingerprint from amaz0n.com's cert, and shows that to you. I guess the SQRL QR code would have to have some kind of hashed checksum to prevent tamper.... ugh. That gets complicated I think. I'm not a crypto expert, so I might be totally wrong.
Exactly right. It's entirely server-side.I assume, that for a server's "managed shared access" the client is not involved, because the invitation-based joining
an account is handled solely by the server.
Not I, but if someone else wants to do that, go ahead .why not put this into a google doc spreadsheet?
Just post here and refer the row number, like:
I somehow got the feeling that CPS was never going to work on mobile apps. I don't even know what CPS stands for (I presume not Chicago Public Schools). So maybe iOS and Android could be "no" for those?
CPS should be active wherever you have same-device login. So if you're visiting a SQRL-enabled site on your mobile phone, and you tap the link, the mobile SQRL app on that phone will be able to authenticate with CPS.
By the way, it stands for Client Provided Session, because the SQRL app gets a genuine link from the website and redirects the user away from the site he was on. So if that ended up being a phishing site, the user is protected.