security
Dan Lyke
danlyke at flutterby.com
Wed Oct 25 02:33:05 UTC 2006
On Tue, 24 Oct 2006 18:54:06 -0700, Eddy Nigg (StartCom Ltd.) wrote:
> - If an IDP (perhaps you) is not required to run in secured mode,
> than the user specific data might get compromised and the chances
> are too high...I can't allow access to critical area, where a
> user/password pair might have been transfered in plain...
I've already laid out my reasons why I believe that authentication of
the user to the Identity Provider is between the user and the Identity
Provider. I think it's a good idea, but I use an SSH tunnel between me
and a proxy server running on my colo server, so if I want to use HTTP
(albeit over an SSH channel) between me and my colo server (which will
be my identity provider), that's my own business.
> - If a RP isn't required to run in secured mode, than chances are,
> that half of the secret of the user might get compromised (i.e.
> the user URI is half of the secret).
No, it's not. In fact the user URI is published widely and isn't a
secret at all. I use http://danlyke.livejournal.com/ and
http://danlyke.pip.verisignlabs.com/ right now, and I'll be handing
one of those (or something similar) over to anyone *on the net* who
wants an identifier for me. It's no more secret than my name.
> - If a RP might transfer or receive data unsecured (and even
> unencrypted) between the IDP and itself, than again part of the data
> can get compromised.
So to be *very* specific:
Your fear is that a compromise in the DNS services of the Relying
Party could allow an attacker to insert a proxy between the Identity
Provider and the Relying Party which could cause an intervening party
to authenticate a user who shouldn't be authenticated.
That leads to two questions:
1. What exploits do you think this enables? (I can think of a couple)
2. What's the relative difficulty of setting up an exploit like this
versus other exploits, how likely is it for communications between the
Relying Party and the Identity Provider to actually be compromised,
and what other exploits are enabled by such a compromise.
Throwing encryption at a problem *can* be the right solution, but
often, as in the "we'll just encrypt it twice!" fallacy, using
encryption without understanding the basic issues (ie: the user
identifier URI isn't secret) usually just gives a false sense of
security without addressing the underlying insecurities.
#1 means that all communication between the Relying Party and the IdP
Endpoint URL and the Claimed Identifier would need to be HTTPS.
Are any of the LJ or Verisign guys here want to give us a probability
of LiveJournal making Claimed Identifiers (ie: all LiveJournal user
URLs and all VerisignLabs URLs) HTTPS?
My guess is somewhere between "snowball's chance in hell" and "zero",
because that would mean allocating a separate IP address to all
LiveJournal users (http://username.livejournal.com/) or PIP users
(http://username.pip.verisignlabs.com/), not to mention the additional
server and compute costs of making everything HTTPS, a rough guess is
that it'd be substantial.
So I suggest that we find another solution.
Dan
More information about the general
mailing list