Solution

Dan Lyke danlyke at flutterby.com
Tue Oct 24 02:58:53 UTC 2006


On Mon, 23 Oct 2006 12:37:44 -0700, Alaric Dailey wrote:
> ok maybe I throw out my idea for solving these problems.
> 1. require SSL for any data transfer from IdP to RP ( assuming data  
> isn't going the other way)

When you say SSL, do you mean that there's a fourth party like a CA  
asserting the identity of the IdP, or just that communication between  
the IdP and the RP is encrypted.

If the former, what attack is this protecting against? One where the  
DNS of *both* the user and the RP have been compromised, or one where  
only one of those has been compromised?

> 2. sign or encrypt the logon token (however or whereever it is  
> stored)

Are we talking about the cookie that the IdP or the RP offers to the  
user, or something else?

> 3. expire the logon after a certain period of time (  )

 From the IdP or the RP? I know I loathe the idea of expiring my login  
tokens from RPs, I end up retyping my LiveJournal password far too  
often as it is. And what happens between the IdP and the user is  
between the IdP and the user, because:

> 4. require ssl for IdPs for logon pages etc...

I'd strongly object to this for one specific reason: It slows the  
adoption of other systems for the user to assert their identity to  
their IdP, key cards, biometrics, whatever, that happen through  
browser enhancements. Yes, that information should be encrypted, but  
requiring SSL as the mode of communication seems like it's locking  
people in to potentially non-optimal solutions.

> 5. Heavily recommend that IdP's use

ie: Run a data center.

I've adminned fully exposed hosts on the net since 1993, I've had  
hosts compromised, had my drives fdisk'd by people trying to cover  
their tracks, I've even been pretty careful about checking SSH  
identities when I log in to a host for the first time, and the one  
time my credit card got stolen was 'cause I left a desktop machine  
logged in and the cleaning staff went rooting through my "back" button.

At some point it comes down to physical security, and if you want a  
secure machine, encase it in concrete and drop it somewhere that  
nobody will find it.

I guess I really don't understand the vulnerability that's been hinted  
at here, and I want to figure out what it is before the protocol gets  
more complex. The vulnerability that's been hinted at involves  
compromisinng the user's hosts file. I don't understand how that'd  
work without it either being a flaw in the IdP's implementation, or  
compromising the RP's hosts file or DNS as well, and if the user's  
machine is compromised anyway, then a keylogger is a hell of a lot  
simpler to install and use.

Would someone who's proposing SSL and CAs go through the spec and give  
me specific section numbers which need to be encrypted or have a  
fourth party (ie: a CA) assert an identity? ie: "Section 3.3: Consumer  
site fetches the Identifier URL by SSL with host authenticated by CA  
in the following list..."?

Until someone gets either that specific with the nature of the  
compromise or that specific with the changes in the spec, we're just  
spinning wheels here, and the only thing all of this banter is doing  
is wasting time.

Dan



More information about the general mailing list