[OpenID] Using HTTPS Openid Providers
Chris Drake
christopher at pobox.com
Thu Jun 14 20:22:45 UTC 2007
Hi Peter,
PW> Is it valid? I've no idea what techniques they use, tojustify
Sounds to me like it involves checking if the page is HTTPS, and
looking for an "input type=password" box - pretty much like it
actually says. Since they've been so anal in saying all that, it's
pretty much a certainty they don't do anything else - otherwise it
*would* have said "yada yada, checked the DNS, yada yada, checked the
certificate, yada yada, checked phishing-site blacklists, yada
yada ..."
Kind Regards,
Chris Drake
Friday, June 15, 2007, 5:59:04 AM, you wrote:
PW> "Fraud monitoring is on
PW>
PW> Phishing Protection has scannedthis Web page and determined
PW> that it does not use an encrypted transmission protocol,does not
PW> contain a password form field, and there is no indication of
PW> fraud."
PW>
PW>
PW>
PW> This comes from my Symantec ToolBar, and it is evenvisualized
PW> as a giant green bar, just under the (https) Address field
PW>
PW> Is it valid? I've no idea what techniques they use, tojustify
PW> the representation that there is no indication of fraud."This may
PW> involve cert management (key distribution) technique and DNS
PW> authorityspoofing countermeasures, for all I know.
PW>
PW>
PW>
PW>
PW> -----Original Message-----
PW> From: general-bounces at openid.net
PW> [mailto:general-bounces at openid.net] On BehalfOf Chris Drake
PW> Sent: Thursday, June 14, 2007 10:52 AM
PW> To: Pat Patterson
PW> Cc: openid-general
PW> Subject: Re: [OpenID] Using HTTPS Openid Providers
PW>
PW> Hi Pat,
PW>
PW> Since the subject's in the open, and I'm busy enjoyingthe scrutiny of
PW> verification for my EV SSL Cert - it's worth mentioningthat the
PW> rigorness of the "Extended Verification" togetherwith the IE7 native
PW> support for EV extensions puts a serious dent into MitMproblems.
PW>
PW> If someone can pervert DNS, they can go get a free3-month IPSCA (or
PW> paid geotrust) SSL cert, and silently impersonate thevictim web site,
PW> including the SSL chain.
PW>
PW> While they might be able to buy a $1600 EV SSL Cert,they'd have to
PW> pervert DNS, somehow get authority over domain ownership,and accept a
PW> visit from a registered lawyer at their street address(and convince
PW> him they're whatever company they're trying to pervert),have a year
PW> of more of trading history, a working landline,verifiable evidence of
PW> company registration (to their street address, usingtheir landline),
PW> and convince the EV examiner that they're 100% legitimatebefore
PW> they'd *get* their signed $1600 cert. Quite a hugedifference...
PW>
PW> Kind Regards,
PW> Chris Drake
PW>
PW> Friday, June 15, 2007, 3:39:53 AM, you wrote:
PW>
PP>> Hi Immad,
PW>
PP>> I would say yes, https does make it significantlyharder to
PP>> do man inthe middle. In the absence of SSL, OpenIDwith DH is
PP>> vulnerable to DNSattacks. HTTPS assuming, as Petermentioned,
PP>> decent ciphersuites andcareful cert management,and full https
PP>> compliance, makes itsignificantly more difficultfor an attacker
PP>> to impersonate an OP.
PW>
PP>> Cheers,
PW>
PP>> Pat
PW>
PP>> Immad Akhund wrote:
PP>> thanks for the quick advice.
PW>
PP>> Given that diffie hellman isconducted with theopenid
PP>> provider is there actually any additionalsecuritybenefit with
PP>> using https to communicate with theopenidprovider? Does it make
PP>> it significantly harder to do man in themiddleattacks (if thats
PP>> its purpose)?
PW>
PP>> I hadn't considered that the identity could beunder https
PP>> butthe server not and vice-versa. Where would yousee as the
PP>> biggestsecurity benefit to use https?
PW>
PW>
PP>> Sxipper also uses SSL, both for the OP-endpointandfor identifiers.
PP>> For the OP-endpoint we've also defined a lowerpriority HTTP service
PP>> endpoint.
PW>
PW>
PW>
PP>> Doconsumers actually go to the lower priority httpservice
PP>> endpointautomatically if they fail in using thehttps service? Is
PP>> thisspecified in the protocol?
PW>
PW>
PP>> Thanks again,
PP>> Immad
PW>
PW>
PP>> On 13/06/07, Johnny Bufu <johnny at sxip.com>wrote:
PW>
PP>> On 13-Jun-07, at 2:03 PM, Josh Hoyt wrote:
PW>
>>>> Are there examples of https openid providerout their? (thismight
>>>> be a
>>>> silly question)
>>>
>>> MyOpenID.com supports SSL, but works both ways.For example, both
>>> https://josh.myopenid.com/andhttp://josh.myopenid.com/ work.
PW>
PP>> Sxipper also uses SSL, both for the OP-endpointand for identifiers.
PP>> For the OP-endpoint we've also defined a lowerpriority HTTP service
PP>> endpoint.
PW>
PP>> Identifiers are HTTPS-only though; providing bothHTTP and HTTPS
PP>> identifiers to a user may confuse them, becausethey will end up
PP>> using different identities if they log into an RPby presenting
PP>> "user.op.com" vs"https://user.op.com".
PW>
PW>
PP>> Johnny
PW>
PP>> _______________________________________________
PP>> general mailing list
PP>> general at openid.net
PP>> http://openid.net/mailman/listinfo/general
PW>
PW>
PW>
PW>
PW>
PW>
PP>> --
PP>> Cell: +1 617 449 8654
PP>> Skype: i.akhund
PP>> Blog:http://immadsnewworld.blogspot.com
PW>
PW>
PW>
PW>
PP>>_______________________________________________general
PP>> mailing
PP>>listgeneral at openid.nethttp://openid.net/mailman/listinfo/general
PW>
PW>
PW>
PW>
PW>
PW> _______________________________________________
PW> general mailing list
PW> general at openid.net
PW> http://openid.net/mailman/listinfo/general
More information about the general
mailing list