security
Dan Lyke
danlyke at flutterby.com
Wed Oct 25 13:35:46 UTC 2006
On Tue, 24 Oct 2006 19:52:54 -0700, Eddy Nigg (StartCom Ltd.) wrote:
> No it's absolutely not! Because any RP is going to rely on that login
> facility!
Right. But limiting how the Identity Provider offers that login
facility to me to HTTPS stands in the way of potential further
enhancements. You didn't, for instance, address my method of
communicating with my server once my server becomes more than just my
LID Identity Provider.
> Too bad, now anybody can point an http sniffer to your IDP server and
> wait patiently for the user/pass pair...However I suspect, that you
> mix up the IDP and RP here....The above looks more like an IDP ;-)
Yes. That's a Claimed Identifier (per section 8.3.1) from which the
Relying Party can derive the IDP Endpoint URL.
That's the only information that the User needs to give the Relying
Party in order for the Relying Party to authenticate that User with
the Identity Provider. If that information is spoofable, then the user
can be given an other IDP Endpoint URL to complete the transaction,
and since it's pretty easy to get a certificate from a payphone with a
stolen credit card, then we're into simple phishing.
> The fears are the same fears that any bank, credit card company,
> online shop or about anybody else running secured servers, has...
That's not what I asked. I asked about specific vulnerabilities within
the protocol where DNS spoofing or sniffing could enable exploits, and
I wanted to know what those exploits were.
"Be afraid, be very very afraid" is not a fear specific enough to be
written into a spec.
I've got a good idea of some of those exploits, but I haven't read
anything from you that indicates that you're coming from an
understanding of the OpenID 2.0 spec rather than an "HTTPS will solve
everything" perspective.
> Wrong...An IDP will install a wild card certificate for the user
> area,
> i.e. CN=*.pip.verisignlabs.com
And for users who, for instance, use LiveJournal with their own domain
names? (There are lots of those)
For regular LiveJournal URLs, LJ could presumably redirect any
accesses which weren't queries for OpenID information (I'm not sure
how it'd tell this, but...) to the HTTP versions to save on compute
costs. And the OpenID spec could mandate that all Claimed Identifiers
be transformed into HTTPS URLs.
We're down to the point where to continue this discussion we need to
be talking in very concrete specifics. You've convinced me that with
the exploits you see the Claimed Identifier would need to be HTTPS,
and that it's actually less important that the IDP Endpoint URL be
HTTPS than the Claimed Identifier.
Now it's time to look at the feasibility of implementing HTTPS Claimed
Identifiers. That means wildcard subdomains or individual IP addresses
for vanity domains, right?
Personally, I'm thinking that some sort of private key and a cache so
that an RP can verify that it's retrieving information from the same
IdP it did before is much more likely to actually get deployed.
Dan
More information about the general
mailing list