[OpenID] OpenId recycling and trust
Peter Williams
pwilliams at rapattoni.com
Sun Oct 21 17:43:20 UTC 2007
1) On account creation, the OP automatically creates a key pair for the
account. There is no need for the key to be signed or certified. The
public key would be published probably along the lines of
http://openid.net/specs/openid-service-key-discovery-1_0-01.html
2) The RP includes a random challenge code in it's request to the OP.
3) The OP returns a signed version in it's response, along with the
public key's fingerprint, or even the entire key, if that's not
considered too long. If the entire key is included, then there is
probably no need to publish the key any other way.
This is equivalent to a simple-style distribution of plaintext public keys, from a web resource repository. Whereas the mac-key of the SSL record layer connection state does provide data origin authentication to that public key resources obtained via https, in the proposed scheme the assurance of data origin authentication comes alternatively from the OpenID Association management process.
I see a contradiction however. In general, best practice in this community seems to be be advising folks to use https to secure the association management data flows - as OpenID Association management processes have not been endorsed or reviewed by security specialists. The OpenID association protocol does not exhibit the same elements used in the SSL handshake design. And, I doubt OpenID association stores have the same kind of OS and applicance protections applied to them as folks have slowly learned to apply to SSL sessionkey caches and stores.
In my view, we should be wary of endorsing reliance on keys assured solely by the OpenID association setup protocol for general-purpose asymmetric key distribuition.
More information about the general
mailing list