[OpenID] OpenID 2.0, PAPE, and handling monetary transactions

Allen Tom openid at allentom.com
Wed Nov 28 04:06:38 UTC 2007


Hi Ben,

As you've already mentioned, the security requirements to authorize 
financial transactions are much higher than the requirements to login to 
most consumer oriented websites.  Many potential OPs may want to issue 
OpenID assertions that are appropriate for the overwhelming majority of 
consumer websites, but are not sufficient to access bank or credit 
accounts, or to authorize other high value transactions. I'm mostly 
concerned about protecting OPs from potential liability issues if an RP 
decides to use an OpenID to authorize transactions that exceed an OP's 
security policies.

For instance, authorizing financial transactions generally requires that 
the credentials be relatively short lived (like an hour) and be tied to 
a specific IP address. In contrast, consumer oriented websites generally 
tend to issue long lived credentials that are not bound to an IP address 
(as consumers tend to roam and get re-IPed fairly often).  A 
consumer-focused OpenID Provider may issue long lived credentials that 
persist across browser sessions and IP address changes so that their 
users don't need to type their password very often. The OP may also want 
to explicitly tell its RPs that its assertions are not sufficient for 
certain high value transactions, especially anything having to do with 
transferring money.

PAPE allows for an RP to request certain levels of authentication, but 
it does not provide a way for OPs to tell RPs that their assertions are 
not sufficient to authorize certain transactions. Perhaps it would be 
best to define a new "not suitable for financial or other high value 
transactions" PAPE policy. Responsible high-value RPs could restrict 
access to a whitelist of trusted OPs that support high value transactions.

Again, I'm mostly concerned about protecting potential OPs from 
liability issues in the event that something goes wrong when an OpenID 
is used to authorize high value transactions. Certainly, it would be 
great when OpenID is widely used for everything, including high value 
transactions, but not all OPs would want to accept liability for RPs 
that use OpenIDs for high value transactions.

Allen

Ben Bangert wrote:
> On Nov 27, 2007, at 11:24 AM, openid at allentom.com wrote:
>
>> Using OpenID to authorize financial transactions would certainly raise
>> legal and liability issues with potential OpenID Providers.
>
> Why? Why wouldn't it be the same as when an RP asks for a 
> user/password? The RP is the one trusting the assertion and performing 
> the transaction, they're the ones who get the credit card charge-back.
>
>> To reduce the legal exposure resulting from the unintended use of OpenID
>> to authorize financial transactions, OpenID Providers would probably 
>> want
>> a way to publish a "Relying Party Acceptable Use" policy which states
>> acceptable and appropriate uses that an RP can use with an assertion 
>> from
>> the OP, as well as explicitly listing inappropriate uses.
>
> As I mentioned, the RP's are the one on the hook for unauthorized 
> transactions, they get the charge-backs.
>
>> For instance, most OPs would want to explicitly forbid the use of their
>> assertions to authorize financial and ecommerce transactions.
>
> I have no idea why an OP would know about financial transactions. I'm 
> referring merely to using the max-age ability of PAPE to force a user 
> to re-login so that I know they're still there, and being able to 
> trust the OP with PAPE so far as they did actually ask the user to log 
> back in (thus proving the user is still at the helm). This is 
> generally used with financial transactions to up the barrier to 
> exploitation so that it takes a bit more than merely hijacking a 
> session or sitting down at someone's computer (at work, library, etc.).
>
>> The PAPE extension seems to be the right place to publish this type of
>> information. In order to satisfy the legal requirements for potential 
>> OPs,
>> there needs to be a way for an OP to specify the url to a document that
>> explains the RP Acceptable Use policies for the OP, as well as a 
>> mechanism
>> for an OP to explicitly tell RPs that the assertion is not suitable for
>> high-value transactions. Maybe the community can define a set of
>> acceptable use profiles similar to the NIST levels used in the PAPE
>> extension.
>
> The fact that a user can tell the OP to let them do anything they 
> want, still leaves open the main issue here.... how does the RP trust 
> the OP's assertions? We already know that the RP is on the line 
> financially in most cases for unauthorized transactions, and relying 
> on the user for security is not a good idea. If an OP a user is 
> running lets them declare it as fine for financial transactions, most 
> users will prolly turn it on, just cause its convenient. And Users 
> have been shown to do insecure things merely because its convenient.
>
> Cheers,
> Ben





More information about the general mailing list