[OpenID] Using HTTPS Openid Providers

Chris Drake christopher at pobox.com
Thu Jun 14 17:51:34 UTC 2007


Hi Pat,

Since the subject's in the open, and I'm busy enjoying the scrutiny of
verification for my EV SSL Cert - it's worth mentioning that the
rigorness of the "Extended Verification" together with the IE7 native
support for EV extensions puts a serious dent into MitM problems.

If someone can pervert DNS, they can go get a free 3-month IPSCA (or
paid geotrust) SSL cert, and silently impersonate the victim web site,
including the SSL chain.

While they might be able to buy a $1600 EV SSL Cert, they'd have to
pervert DNS, somehow get authority over domain ownership, and accept a
visit from a registered lawyer at their street address (and convince
him they're whatever company they're trying to pervert), have a year
of more of trading history, a working landline, verifiable evidence of
company registration (to their street address, using their landline),
and convince the EV examiner that they're 100% legitimate before
they'd *get* their signed $1600 cert.  Quite a huge difference...

Kind Regards,
Chris Drake

Friday, June 15, 2007, 3:39:53 AM, you wrote:

PP> Hi Immad,

PP> I would say yes, https does make it significantly harder to
PP> do man inthe middle. In the absence of SSL, OpenID with DH is
PP> vulnerable to DNSattacks. HTTPS assuming, as Peter mentioned,
PP> decent ciphersuites andcareful cert management, and full https
PP> compliance, makes itsignificantly more difficult for an attacker
PP> to impersonate an OP.

PP> Cheers,

PP> Pat

PP> Immad Akhund wrote:
PP> thanks for the quick advice.
  
PP> Given that diffie hellman isconducted with the openid
PP> provider is there actually any additionalsecurity benefit with
PP> using https to communicate with the openidprovider? Does it make
PP> it significantly harder to do man in the middleattacks (if thats
PP> its purpose)? 
  
PP> I hadn't considered that the identity could be under https
PP> butthe server not and vice-versa. Where would you see as the
PP> biggestsecurity benefit to use https?
  
  
PP> Sxipper also uses SSL, both for the OP-endpointand for identifiers.
PP> For the OP-endpoint we've also defined a lower priority HTTP service
PP> endpoint.

    

PP> Doconsumers actually go to the lower priority http service
PP> endpointautomatically if they fail in using the https service? Is
PP> thisspecified in the protocol? 
  
  
PP> Thanks again,
PP>   Immad
  
  
PP> On 13/06/07, Johnny Bufu <johnny at sxip.com> wrote:   

PP> On 13-Jun-07, at 2:03 PM, Josh Hoyt wrote:
  
>>> Are there examples of https openid provider out their? (thismight 
>>> be a
>>> silly question)
>>
>> MyOpenID.com supports SSL, but works both ways. For example, both
>> https://josh.myopenid.com/and http://josh.myopenid.com/ work.
  
PP> Sxipper also uses SSL, both for the OP-endpoint and for identifiers.
PP> For the OP-endpoint we've also defined a lower priority HTTP service
PP> endpoint.
  
PP> Identifiers are HTTPS-only though; providing both HTTP and HTTPS 
PP> identifiers to a user may confuse them, because they will end up
PP> using different identities if they log into an RP by presenting
PP> "user.op.com" vs "https://user.op.com".
  
  
PP> Johnny
  
PP> _______________________________________________
PP> general mailing list
PP>   general at openid.net
PP>   http://openid.net/mailman/listinfo/general
  

  
  
  
  
PP> -- 
PP> Cell: +1 617 449 8654
PP> Skype: i.akhund
PP> Blog: http://immadsnewworld.blogspot.com   




PP> _______________________________________________general
PP> mailing
PP> listgeneral at openid.nethttp://openid.net/mailman/listinfo/general  








More information about the general mailing list