Requirements for Web Authentication Resistant to Phishing
draft-hartman-webauth-phishing-09

 
Document
Type Expired Internet-Draft (individual in app area)
Last updated 2008-05-21 (latest revision 2008-08-18)
Stream IETF
Intended RFC status Informational
Formats
Expired & archived
plain text pdf html
Stream
WG state (None)
Document shepherd No shepherd assigned
IESG
IESG state Expired (IESG: Dead)
Telechat date
Responsible AD Lisa Dusseault
Send notices to hartmans-ietf@mit.edu, alexey.melnikov@isode.com

Email authors IPR References Referenced by Nits Search lists

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
//www.ietf.org/archive/id/draft-hartman-webauth-phishing-09.txt

Abstract

This memo proposes requirements for protocols between web browsers and relying parties at websites; these requirements also impact third parties involved in the authentication process. These requirements minimize the likelihood that criminals will be able to gain the credentials necessary to impersonate a user or be able to fraudulently convince users to disclose personal information. To meet these requirements browsers must change. Websites must never receive information such as passwords that can be used to impersonate the user to third parties. Browsers should authenticate the website to the browser as part of authenticating the user to the website. Browsers MUST flag situations when this authentication fails and flag situations when the target website is not authorized to accept the identity being offered as this is a strong indication of fraud. These requirements may serve as a basis for requirements for preventing fraud in environments other than the web.

Authors

Sam Hartman (hartmans-ietf@mit.edu)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)