Skip to content

Commit

Permalink
Replace pw with at
Browse files Browse the repository at this point in the history
  • Loading branch information
mfoltzgoogle committed Aug 20, 2019
1 parent 9ffc015 commit af6c432
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 13 deletions.
12 changes: 6 additions & 6 deletions index.bs
Expand Up @@ -346,12 +346,12 @@ Issue: Include cross references to the specs for these hash functions.

The advertising agent should add an additional field to the TXT record:

: pw
: at
:: An alphanumeric, unguessable token consisting of characters from the set
`[A-Za-z0-9+/]`.

Note: `pw` prevents off-LAN parties from attempting authentication; see
[[#remote-active-mitigations]]. `pw` should have at least 32 bits of true
Note: `at` prevents off-LAN parties from attempting authentication; see
[[#remote-active-mitigations]]. `at` should have at least 32 bits of true
entropy to make brute force attacks impractical.

Issue: Add examples of sample mDNS records.
Expand Down Expand Up @@ -532,10 +532,10 @@ support the numeric PSK input method.

Any authentication method may require an `auth-initation-token` before showing a
PSK to the user or requesting PSK input from the user. If an [=advertising
agent=] has the `pw` field in its mDNS TXT record, it must be used as the
agent=] has the `at` field in its mDNS TXT record, it must be used as the
`auth-initation-token` in the the first authentication message sent to or from
that agent. Agents should discard any authentication message whose
`auth-initation-token` is set and does not match the `pw` provided by the
`auth-initation-token` is set and does not match the `at` provided by the
advertising agent.

Authentication with SPAKE2 {#authentication-with-spake2}
Expand Down Expand Up @@ -1931,7 +1931,7 @@ Protocol agents, because a misconfigured firewall or NAT could expose a
LAN-connected agent to the broader Internet. Open Screen Protocol agents
should be secure against attack from any Internet host.

Advertising agents should set the `pw` field in their mDNS TXT record to protect
Advertising agents should set the `at` field in their mDNS TXT record to protect
themselves from off-LAN attempts to initiate [[#authentication]], which result
in user annoyance (display or input of PSK) and potential brute force attacks
against the PSK.
Expand Down
14 changes: 7 additions & 7 deletions index.html
Expand Up @@ -1214,7 +1214,7 @@
</style>
<meta content="Bikeshed version 220086d88511a9c99d7a1f9b5447db7e7b99e053" name="generator">
<link href="https://webscreens.github.io/openscreenprotocol/" rel="canonical">
<meta content="cb943811fc0b053b8fd07759438e94585c5d6f6b" name="document-revision">
<meta content="9ffc015d301e85bf25b6c16879c86ff659a4d6ed" name="document-revision">
<style>
.highlight .hll { background-color: #ffffcc }
.highlight .c { color: #999988; font-style: italic } /* Comment */
Expand Down Expand Up @@ -1466,7 +1466,7 @@
<div class="head">
<p data-fill-with="logo"></p>
<h1 class="p-name no-ref" id="title">Open Screen Protocol</h1>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2019-08-19">19 August 2019</time></span></h2>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2019-08-20">20 August 2019</time></span></h2>
<div data-fill-with="spec-metadata">
<dl>
<dt>This version:
Expand Down Expand Up @@ -1831,11 +1831,11 @@ <h2 class="heading settled" data-level="3" id="discovery"><span class="secno">3.
</dl>
<p>The advertising agent should add an additional field to the TXT record:</p>
<dl>
<dt data-md>pw
<dt data-md>at
<dd data-md>
<p>An alphanumeric, unguessable token consisting of characters from the set <code>[A-Za-z0-9+/]</code>.</p>
</dl>
<p class="note" role="note"><span>Note:</span> <code>pw</code> prevents off-LAN parties from attempting authentication; see <a href="#remote-active-mitigations">§ 12.5.3 Remote active network attackers</a>. <code>pw</code> should have at least 32 bits of true
<p class="note" role="note"><span>Note:</span> <code>at</code> prevents off-LAN parties from attempting authentication; see <a href="#remote-active-mitigations">§ 12.5.3 Remote active network attackers</a>. <code>at</code> should have at least 32 bits of true
entropy to make brute force attacks impractical.</p>
<p class="issue" id="issue-49bdd4e6"><a class="self-link" href="#issue-49bdd4e6"></a> Add examples of sample mDNS records.</p>
<p>Future extensions to this QUIC-based protocol can use the same metadata
Expand Down Expand Up @@ -1988,8 +1988,8 @@ <h2 class="heading settled" data-level="6" id="authentication"><span class="secn
support the numeric PSK input method.</p>
<p>Any authentication method may require an <code>auth-initation-token</code> before showing a
PSK to the user or requesting PSK input from the user. If an <a data-link-type="dfn" href="#advertising-agent" id="ref-for-advertising-agent">advertising
agent</a> has the <code>pw</code> field in its mDNS TXT record, it must be used as the <code>auth-initation-token</code> in the the first authentication message sent to or from
that agent. Agents should discard any authentication message whose <code>auth-initation-token</code> is set and does not match the <code>pw</code> provided by the
agent</a> has the <code>at</code> field in its mDNS TXT record, it must be used as the <code>auth-initation-token</code> in the the first authentication message sent to or from
that agent. Agents should discard any authentication message whose <code>auth-initation-token</code> is set and does not match the <code>at</code> provided by the
advertising agent.</p>
<h3 class="heading settled" data-level="6.1" id="authentication-with-spake2"><span class="secno">6.1. </span><span class="content">Authentication with SPAKE2</span><a class="self-link" href="#authentication-with-spake2"></a></h3>
<p>For all messages and objects defined in this section, see Appendix A for
Expand Down Expand Up @@ -3175,7 +3175,7 @@ <h4 class="heading settled" data-level="12.5.3" id="remote-active-mitigations"><
Protocol agents, because a misconfigured firewall or NAT could expose a
LAN-connected agent to the broader Internet. Open Screen Protocol agents
should be secure against attack from any Internet host.</p>
<p>Advertising agents should set the <code>pw</code> field in their mDNS TXT record to protect
<p>Advertising agents should set the <code>at</code> field in their mDNS TXT record to protect
themselves from off-LAN attempts to initiate <a href="#authentication">§ 6 Authentication</a>, which result
in user annoyance (display or input of PSK) and potential brute force attacks
against the PSK.</p>
Expand Down

0 comments on commit af6c432

Please sign in to comment.