[OpenID] Reconsidering http://openid different from https://openid

Johannes Ernst jernst+openid.net at netmesh.us
Wed Sep 19 21:49:24 UTC 2007


On Sep 19, 2007, at 12:42, Josh Hoyt wrote:
> On 9/19/07, Johannes Ernst <jernst+openid.net at netmesh.us> wrote:
>> I would also guess that a (human-level) impersonation attack by
>> http://foo against https://foo will almost always been successful -
>> e.g. because so many RPs don't print the protocol prefix.
>
> How would such an impersonation attack take place? Wouldn't it involve
> the attacker controlling one or the other of the identifiers?

Yes. Let's say I'm your new specialist, and you are trying to give me  
access to your on-line medical records (i.e. you edit the ACL), but  
instead you are giving access to somebody else whose OpenID was just  
the same minus the 's'.

It appears to me that any solution to this must effectively guarantee  
that http://foo can never refer to somebody else than https://foo  
does, which is another way of phrasing the (almost same) requirement.




Johannes Ernst
NetMesh Inc.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: openid-relying-party-authenticated.gif
Type: image/gif
Size: 903 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20070919/521f8ea6/attachment-0004.gif>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: lid.gif
Type: image/gif
Size: 973 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20070919/521f8ea6/attachment-0005.gif>
-------------- next part --------------
  http://netmesh.info/jernst



More information about the general mailing list