[OpenID] Using OpenID outside of the browser

Chris Messina chris.messina at gmail.com
Sat May 5 22:14:56 UTC 2007


I hope to get something out about this today or tomorrow because we
came up with a way to deal with this, if I recall correctly.

Chris


On 5/5/07, David Fuelling <sappenin at gmail.com> wrote:
> Hmmm....yes, the race condition you outlined is a possibility in this
> arrangement.
>
> To alleviate this, perhaps the nonce and OpenId URL should not be part of
> the RP endpoint URL at all, but instead should be part of an html form
> submission.  That way, when the desktop client "logs into" an RP, the
> desktop client will provide the nonce, as well as the openid that was
> originally associated with the nonce.
>
> In this setup:
>
> 1.) The nonce should be large, and hard to guess.
> 2.) If an attacker did happen to guess a proper nonce, then he would have no
> idea what openId URL to associate it with (assuming the previous step of the
> protocol were done via SSL)
>
> Seems to me that guessing an RP endpoint, a nonce, and a corresponding
> openid would be about as easy as guessing somebody's username and password.
>
>
> This is a concern, though, so I'd like to hear more thoughts on it.
>
> david
>
> On 5/5/07, Brendan Taylor <whateley at gmail.com> wrote:
> >
> > On Sat, May 05, 2007 at 11:22:26AM -0600, David Fuelling wrote:
> > >   9. Desktop client polls the URL *
> > >   http://servercomponent.com/client-complete/<nonce>
> > >    every 15 seconds until that page contains certain information (maybe
> > >   hidden html fields?  Maybe an atom feed?) to let the desktop client
> > know
> > >   that the auth was succesful or not.  *Of course, the server component
> > >   (on servercomponent.com) knows about the sucess or failure since it is
> > >   a normal RP and has done normal OpenID auth in step 5. The desktop
> > client,
> > >   in response to a succesful poll can also try to close the browser
> > window,
> > >   or
> > >   give the user a friendly status message.
> >
> > I like this idea*, it's much more firewall- and user-friendly then the
> > others proposed so far. I see a problem, though:
> >
> > If an eavesdropper gets the original nonce URL, he can poll the
> > client-complete URL more often than the actual client, find out the
> > authorization was successful before it and make his own request.
> >
> > Now that I think of it, all the methods that have been proposed have
> > this race condition.
> >
> > * although I still don't like using a redirect in the server's initial
> > response. The information passed in the redirect belongs in a
> > WWW-Authenticate header.
> > --
> > <http://necronomicorp.com/bct>
> >
> > _______________________________________________
> > general mailing list
> > general at openid.net
> > http://openid.net/mailman/listinfo/general
> >
> >
> >
>


-- 
Chris Messina
Citizen Provocateur &
  Open Source Ambassador-at-Large
Work: http://citizenagency.com
Blog: http://factoryjoe.com/blog
Cell: 412 225-1051
Skype: factoryjoe
This email is:   [ ] bloggable    [X] ask first   [ ] private



More information about the general mailing list