security

Dick Hardt dick at sxip.com
Mon Oct 23 01:18:01 UTC 2006


I don't think we are ignoring security in OpenID, or to expect to be  
adding it in later.

A transaction is only as secure as it's weakest link, and there are  
always tradeoffs.

We did not want a one-size-fits-all approach.

Perhaps we can discuss this from another point of view. Why should I  
need SSL on a blog I am writing a comment on when all the data I  
provide the blog will be published and public anyway? An attacker is  
not going to see anything more on the HTTP connection then they would  
on the blog?

On 22-Oct-06, at 6:09 PM, Alaric Dailey wrote:

> I think I have to agree with James and Eddy.
>
> If it is secured from the beginning, you don't have to retrofit it  
> later.  I
> believe that it was Bruce Schneier that said something to the  
> effect of
> 'security is next to implement properly after the fact'.  As a  
> programmer I
> have found this to be VERY true.
>
> Security is almost never boolean, you can only make it as secure as
> possible. From my standpoint, in this day and age, every thing  
> should be as
> secure as possible.  Just to demonstrate this point, the very first  
> thing I
> do when installing a new copy of Windows is install the NSA  
> security policy.
>
> Secure it as best as possible, and you have less to fix later, it's  
> easier
> to close small holes than big ones. Finally it's much easier to make a
> change to a pending standard than it is to an existing standard.
>
>
> Basically, if you need security at all, you need it everywhere.   
> Which bit
> of information should an attacker pay more attention to, the 1  
> encrypted
> message amongst hundreds or thousands of unencrypted messages, or  
> try to
> pick 1 of message of thousands of encrypted messages to attack.
>
>
>
>
> -----Original Message-----
> From: Recordon, David [mailto:drecordon at verisign.com]
> Sent: Sunday, October 22, 2006 5:24 PM
> To: Alaric Dailey; Dick Hardt; general at openid.net
> Subject: RE: security
>
> Alaric,
> I think both you and Dick are right.  Don't get me wrong, security  
> is very
> important to see anything like OpenID be adopted.  I think the  
> point Dick is
> trying to make is that security needs to scale depending on  
> context, or at
> least that is the point I'd try to make.
>
> Starting with 2.0, or 1.2 whatever we end up calling it, I  
> personally would
> not use an Identity Provider which does not both host my identifier  
> and it's
> server endpoint via a valid SSL certificate.  There are however use  
> cases
> where SSL is not required, running OpenID solely on an intranet for  
> example,
> but for the majority of cases SSL is highly recommended which I  
> think the
> spec makes clear.  If it doesn't, please let us know!
>
> So I don't think security is binary, IMHO what is important is that  
> the spec
> makes it clear where the weaknesses are, how to protect them, and  
> recommends
> the use of things like valid SSL certificates for the entire  
> protocol flow.
>
> --David
>
> <snip/>
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>
>




More information about the general mailing list