[OpenID] Trust + Security @ OpenID
Martin Atkins
mart at degeneration.co.uk
Mon Jul 9 07:20:06 UTC 2007
Simon Willison wrote:
>
> I've been calling this the "outsourcing the security of our users"
> problem. Site owners are uncomfortable about relying on the security
> of the user's chosen OpenID provider - after all, if they pick a bad
> one then the site's own security measures are null and void.
>
> My counter-argument is that if the site has a "I've forgotten my
> password" feature that uses e-mail to verify the user, they're already
> outsourcing the security of their users to that user's chosen e-mail
> provider, and OpenID changes nothing.
>
I caught your TechTalk at Google recently where you raised this point,
and I must admit that I'd never drawn that parallel before, but now that
you mention it I can't disagree. "Forgot Your Password?" is just, as I
think you put it, "Single sign-on with an intentionally bad user
experience."
But on with the point at hand...
> That argument holds up well for many sites, but there are some sites
> (such as banks) that don't provide an e-mail recovery service,
> presumably precisely because they don't want to rely on the security
> of the user's email service. In those cases, whitelisting OpenID
> providers based on their security measures seems like a reasonable
> option. In fact, it's a great use case for OpenID - if someone has
> gone through the effort to do highly secure, phishing resistant
> two-factor authentication suitable for use with online banking, OpenID
> is a great way for that achievement to be re-used by other sites that
> need the same level of security.
>
I think that in the short term a more readily-workable solution for
high-security sites like banks is to combine OpenID with other
locally-enforced security measures. I wouldn't mind just swapping out
step one of my bank's login process -- enter your ridiculously long and
opaque account number -- for OpenID and keeping the "PIN" and "secret
memorable word" steps. (Though some may argue that my bank's service
isn't that secure to start with, I guess.)
Hopefully further down the line we'll have more infrastructure in place
to give incentives for more secure authentication mechanisms without
resorting to whitelists with all of the drawbacks that implies.
The Assersion Quality Extension that David and co have been working on
is targeted at this very problem, allowing providers to declare what
authentication mechanisms they can support so that relying parties can
discriminate based on this rather than on simply saying "I've never
heard of NewbieOP so I'm not going to let them play". Sure, it's
possible for OPs to lie, but presumably reputable OPs wouldn't lie and
users wouldn't use unreputable OPs. (And if they do, I suppose one can
always resort to blacklisting!)
We're not quite there yet, though. I think in the short term OpenID can
be deployed in combination with other mechanisms in situations where the
current protocol base in inadequate.
More information about the general
mailing list