[OpenID] How can an RP trust your OP?

Martin Paljak martin at paljak.pri.ee
Fri Jul 6 10:01:49 UTC 2007


On 06.07.2007, at 12:14, Andrew Tomlinson wrote:

> While people are all using OpenID for things that are low value (no  
> getting
> a bank loan based on simply OpenID authentication) ad-hoc trust
> relationships for OP/RP aren't an issue. People want to do better  
> so we come
> up with suggestions like:

What is the ratio of low value sites vs high value sites on the  
internet? Do you want, right now, for your bank to let you into their  
online system with your OpenID? If you consider your trust as a  
constant, how do you divide it currently between the low and high  
value sites you use ?


> Isn't there a way we can avoid going the same way? The last thing  
> we need is
> identifiers only being usable on the OP and their RP sister sites  
> because of
> a complicated mix of reputation rules and lists. I know it isn't  
> really the
> job of the protocol, but it is all part of the package.

I don't see any trends in that matter, other than 'get your openid'  
links at login pages that direct users to affiliate OpenID providers.  
I hope nobody wants to question the security of those providers. But  
your concern is valid.


> It seems obvious that a user must think that their OP is  
> trustworthy enough
> for what they want to use it for - it is their choice to make. The  
> problem I
> see is whether the RP can reasonably trust the OP to act as an
> authentication agent for a specific type of transaction -  
> especially where
> money is concerned. Also without SSL and mutually agreed  
> certification roots

I believe that one should forget the technology for a second and  
think about the problem with the user in the center: the RP should  
trust the user not the OP. It doesn't matter if the RP trusts the OP  
or not - say it does but if the user is rogue then everything above  
"authentication" is bogus and possibly false (registration info, and  
possibly credit card numbers etc) - the trust that RP puts into OP is  
worthless if the RP actually doesn't trust the user at all (and for a  
reason). I believe all other transactions (above login, that move  
money around) should be secured by other means. OpenID just gives the  
answer 'who you are?' but money transactions are usually  
authenticated and guarded by other means (credit card at your trusted  
bank, digital signatures etc).

  I see OpenID as a easy, portable, lightweight way of moving your  
'me' around the network and adding some auto-discovery and  
interoperability into the game. Me personally - I don't want my bank  
to use OpenID for *authentication* even though it could make use of  
my OpenID URL for some possible automation or data exchange purposes.

> then how does the RP know that the OP even is the OP that the user  
> trusts?
> If trusted SSL isn't required then why would a spoofer use it?
It is a problem. True. But maybe OpenID does not want to enter the  
super-trust market?


> How about adding "acceptable use" metadata into the XRDS about what  
> to use a
> specific OP for? E.g. "For this OP recheck trust before purchases and
> require SSL always" or "only trust an OP with this public key"? Of  
> course
> you would need to keep the XRDS on a trusted secure server... ;)

This is difficult to implement. It tries to 'help' or 'direct' RP-s  
in their trust evaluation but for it to work on infrastructure scale  
you need another infrastructure to manage the trust in this  
suggestion system. Endless trust loop.

I even believe that the same way one can't sell "complete security in  
a box" for €99 it is almost impossible to sell a uniform "trust in a  
box" solution. Trust is very personal and this applies to RP-s (the  
persons building the RP have their own trust metrics and policies and  
there's nothing you can do to change that).


-- 
Martin Paljak
http://martin.paljak.pri.ee





More information about the general mailing list