Matthias Wessendorf wrote:
Another idea....
I can see a lot of good ideas here, but we have to start to file jiras.
There will be several several ways to make a system secure.
IMO start simple, make it ultra secure later.
We generate, for EACH variant, an "access-key" with a generated
secret(password).
What do you mean about secret? A shared secret? Now we have another
problem, you must encrypt this shared secret.
This accessKey:secret combination would be, similar to
the previous email, ONLY be able to perform updates for "device
(un)registration".
It would be NOT possible to use this combination for sending messages to
a device, (read: our HTTP send interface would not allow this
accessKey:secret combination).
Not, sure, but this is (I guess) a bit simpler, initially, instead of
using private/public key approach.
I'm still confuse, about what do you want to encrypt and why. Why not
only create APP-KEY as a point of start, then we figure out how to
authorize or not a server.
Then several people, including me suggesting it will say "it's not
safe". Then you reply with "fix it" and we can make it work.
On Sat, May 18, 2013 at 12:48 AM, Matthias Wessendorf <matzew(a)apache.org
<mailto:matzew@apache.org>> wrote:
Hi,
once the app is installed on the phone (or launched in a browser),
we (as discussed in the spec/mailing list) need to upload the
"device token" (or channelID) from the actual device/channel to the
Unified Push Server.
My questions:
Is it safe, if every "Mobile Variant" has a Private/Public Key ???
The UP server keeps the private one.
Once we register a new mobile variant (e.g. HR for Android, HR for
iPad, HR for iPhone, ...) EACH variant has ONE Private/Public key
The Public Key of this combo would be "coded" into the actual mobiel
application...
On EVERY iOS app, it would use the PubKey from the iOS Variant, on
EVERY JS-app, it would use the PubKey from the SimplePush Variant, etc
So, that means EVERY installation (on the devices) would have that
pbulci key...
Would that be (extremely) odd, if "1 Mio Russian hacker" would have
that public key, used on the device, to perform some sort of "auth"
(e.g. via HTTP BASIC (just saying.....)) against the server, in
order to upload the "device token" ??
Note: This Private/Public key would/should be EXCLUSIVE for "device
registration". And really ONLY.. :-)
So that this "Private/Public key" pair can NOT be used (==invalid)
for sending messages to the installations, or creating the
Push-Applications / Mobile Variant Constructs.
Greetings,
Matthias
--
Matthias Wessendorf
blog:
http://matthiaswessendorf.wordpress.com/
sessions:
http://www.slideshare.net/mwessendorf
twitter:
http://twitter.com/mwessendorf
--
Matthias Wessendorf
blog:
http://matthiaswessendorf.wordpress.com/
sessions:
http://www.slideshare.net/mwessendorf
twitter:
http://twitter.com/mwessendorf
_______________________________________________
aerogear-dev mailing list
aerogear-dev(a)lists.jboss.org
https://lists.jboss.org/mailman/listinfo/aerogear-dev