Difference between revisions of "Viewer Authentication Critique"
Jump to navigation
Jump to search
Matthew Dowd (talk | contribs) (→Cons) |
Dale Glass (talk | contribs) (Added account restrictions to alternatives list) |
||
Line 16: | Line 16: | ||
=== Alternatives === | === Alternatives === | ||
* One time passwords | * One time passwords | ||
* Account restrictions | |||
== Flexibility == | == Flexibility == |
Revision as of 10:47, 29 September 2007
Security
Pros
- Viewer does not have to process (and "see") username and password
Cons
- Viewer still involves running trusted code on the computer and could initiate other attacks e.g.
- Silently buy L$ and pass onto another account
- Pass token onto bot, and drop the users connection
- Install key logger
- Potential for phishing websites to entice users to enter username and password and then pass control to SL website and viewer.
- Possibility some third party clients will retain the existing UI in order to make it easier for people with alts and multiple clients, and do appropriate GETs and POSTs on the SL to initiate a logon and get the token (thus defeating the original purpose)
- Too reliant on browser/OS implementations
- Relies on browser security, and uses a mechanism often disabled due to security concerns
Alternatives
- One time passwords
- Account restrictions
Flexibility
Pros
- Enables username/password authentication to work on third party sites without them having to "see" username and password
Cons
Alternatives
- Use this mechanism for websites (including third party) only but not for viewers
- OpenID
- CardSpace
- Identity Metasystem
Persistence
Pros
Cons
- Inconvenient for those with alts
- Cumbersome to change alts and logon with multiple alts
- Those with alts, often have a primary account which is used for forums and logged on permanently to forums even when the alt is online in SL
- Inconvenient for those with multiple clients
- Danger on public or multi-user machines that the user will log out of the client, but not log out of the website properly allowing the next user to access their account.
Alternatives
- Is this really needed?
--Matthew Dowd 11:27, 29 September 2007 (PDT)