No subject
Sun Aug 19 20:53:57 UTC 2007
you verify that a partiular person using a webbrowser is associated with =
a paricular URL. This is very much like sending a email with a secret =
to an email address can be used to verify that someone owns an address. =
If I get control of an OpenID, much the same way that if I get control =
of an email address, as far as most services out there are concerned I =
*am* that person and I have all the rights associated with them. This =
is the inherent weakness in OpenID (and email) verification, but is the =
thing that makes it scalable and, well, open.
</teach>
So we have is the situation where if a domain is taken over then the =
person who now runs the domain can assume all the identities of the =
OpenID URLs under that domain. There's very little we can do about =
that. But what about the situation where a domain isn't taken over? =
What if there's a situation where a OpenID URL itself is taken over but =
the domain remains in the original controller's hands (e.g. when someone =
signs up for an account using a recycled username?)
In this situation we've potentially got someone like AOL or some other =
trusted party still running the domain (and presumably, controlling what =
goes on the pages.) Wouldn't it be nice to provide them with some way =
of indicating that the person who is now associating with this OpenID =
URL is not the same person who originally associated with this URL?=20
This could be as simple as adding another tag into the HTML for the =
OpenID to indicate when they signed up
<link rel=3D"openid.server" =
href=3D"http://www.livejournal.com/openid/server.bml">
<link rel=3D"openid.delegate" =
href=3D"http://2shortplanks.livejournal.com =
<http://2shortplanks.livejournal.com/> /">
<link rel=3D"openid.timestamp" =
href=3D"http://www.openid.net/timestamps/1191140090">
So, this means that when a consumer first associates someone with an =
OpenID URL they can also (optionally) record the timestamp (if present.) =
As long as the OpenID URL contains the same timestamp the consumer =
knows that the account hasn't been recycled and it can continue to trust =
the OpenID URL. But as soon as that timestamp changes, they know that =
the OpenID is no longer under the control of the original user and they =
can stop trusting it.
Of course, this proposal doesn't do anything about the fact that OpenIDs =
are also used as unique identifiers for people (e.g. Jyte.) If someone =
makes an assertion against someone who controls an openid and the person =
controlling that openid changes then the assertion is now being made =
about the wrong person. This sucks, but the only solution I can see to =
this is saying "OpenIDs are never, ever, going to be reused" which while =
a wonderful idea, probably isn't going to happen. At least my =
suggestion doesn't make this any worse.
Comments? Suggestions? Warnocking?
Mark.
More information about the general
mailing list