security

Hans Granqvist hgranqvist at verisign.com
Mon Oct 23 18:25:42 UTC 2006


James A. Donald wrote:
> Dick Hardt wrote:
>  > Hans has written a security profile proposal so that
>  > an RP would be able to decide if an IdP supported a
>  > level of security appropriate for a transaction.
> 
> Too damn many options for the end user to track - so the
> end user will not track them.  End users are hopelessly
> overloaded with security issues, and so cannot pay
> attention.

I agree on options generally being a bad thing . . .
. . . but why does the end-user need to track these options?

Surely, an end-user need not track what key exchange, data
transfer cipher, and message digest algorithms are negotiated
for an SSL session?

I see OpenID authentication quite similar in that respect.

The profile doc I drafted contains two levels of security,
'A' and 'B'.  The RP and the IDP can discover and adhere to
a level, if they so desire.  The level is not visible
to the end-user, who only sees current browser security
artifacts, for example the lock icon:  no need to learn
anything new.

> 
> Make it one mode and that mode secure.  Let us not have
> another repeat of the phishing crisis.
> 

OpenID covers the low to medium-high range of the security
spectrum.  If you want the high-end range, you should look
elsewhere, as OpenID's dependencies prevent it from reaching
that level!

Hans






More information about the general mailing list