[dix] Re: Gathering requirements for in-browser OpenID support

Alaric Dailey alaricdailey at hotmail.com
Thu Oct 26 15:53:10 UTC 2006


Trying to move this thread to security@


The only way a user could EVER be POSITIVELY sure that they are logging into
their IdP is something like WiKIDs mutual auth (
http://www.wikidsystems.com/technology/mutual_authentication/ ) short of
that, they have to trust the DNS and SSL that they see, AND that they typed
in the address they are going to rather than following a link or redirect. 

Bugs like these 2 could be used with cleverly crafted SSL certs to REALLY
pull off an almost perfect phishing attack, using any redirect without the
need to poison the DNS or modify a hosts file like a virus might.

http://secunia.com/advisories/10395/
http://www.theregister.com/2006/10/26/ie7_spoofing_bug/



As far as impossible MITM attacks? MITM attacks are difficult, there is no
doubt of that, BUT, unrealistic? No.  MITM attacks are how this happened...

http://blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2fa
ctor_1.html

Not only did this MITM attack WORK, but it works against 2 factor
authentication.

Weak user passwords is another problem entirely.

-----Original Message-----
From: general-bounces at openid.net [mailto:general-bounces at openid.net] On
Behalf Of Ben Laurie
Sent: Thursday, October 26, 2006 10:26 AM
To: David Nicol
Cc: general at openid.net
Subject: Re: [dix] Re: Gathering requirements for in-browser OpenID support

On 20/10/06, David Nicol <davidnicol at gmail.com> wrote:
> On 10/20/06, Mike Glover <mpg4 at janrain.com> wrote:
>
> > Could you explain that some more?  Specifically, how would you prevent a
rogue RP from faking a redirect to the user's IdP (by proxying the request
instead)?  I can't see a way that the protocol itself can guard against
this.
> >
> > -mike
>
> I am sure there is a clear diagram somewhere within the POLA 
> literature about how to create unproxyable capabilities, and I expect 
> that picture describes a scheme where the capability is tied to the 
> originator in such a way that the MITM would be missing something 
> important.

You mean un-MitM-able capabilities. The holder of a capability can always
proxy it.

>
> of course, a protocol that is supposed to support users on NAT lans 
> has to support a MITM of sorts -- the NATing router -- so there are 
> immediately clear security/convenince tradeoffs.

? All protocols include many MitMs if you are going to call a NAT gateway
one - they're called "routers".

> Designing against theoretical MITM attacks can be impossible, since 
> theoretical men in the middle are so capable and flexible and have 
> unrealistic levels of access to infrastructure.

Its entirely possible. The usual weak link is users' crappy choice of
passwords.

>
>
> --
> The Country Of The Blind, by H.G. Wells 
> http://cronos.advenge.com/pc/Wells/p528.html
>
_______________________________________________
general mailing list
general at openid.net
http://openid.net/mailman/listinfo/general




More information about the general mailing list