[OpenID] Reconsidering http://openiddifferent from https://openid

Peter Williams pwilliams at rapattoni.com
Fri Sep 21 21:48:03 UTC 2007


The problem statement is
 
The web is cheap, cost effective and sufficiently safe for 80% of users and usages. It is less safe for those the business to business usages that demand quality and security in the 80-85% user/usage safety band. The goal of OpenID is to deliver cost-effective WebSSO to this 80-85% band of users and usage quality, bringing down the cost of WebSSO deployment and operation to that equivalent to the cost of deploying and operating a general purpose web server, whilst suffering a marginal and tangible increase in residual risk. A second goal of OpenID is to garner widespread adoption in the 80-85% category of users and usage cases, so that the increase in marginal risk is spread across a very large group amenable to risk underwriting by warranties backed by major insurers or Lloyds syndicates.
 
This is peter speak. But you get the idea.

________________________________

From: general-bounces at openid.net on behalf of Pat Patterson
Sent: Fri 9/21/2007 10:04 AM
To: Paul C. Bryan
Cc: OpenID List
Subject: Re: [OpenID] Reconsidering http://openiddifferent from https://openid


Doesn't this loop back to http://identityblog.burtongroup.com/bgidps/2007/09/what-is-openid-.html ?

The lack of a formal problem statement/requirements means that, to a certain extent, we are all just stumbling about in the dark, bumping into each other, rather than converging on a specific goal.

Cheers,

Pat

Paul C. Bryan wrote: 

	Well put. +1!
	
	If there were general consensus by the OpenID development and deployment
	communities that OpenID should be strictly limited to being a
	replacement to email verification, I certainly wouldn't quarrel so much
	with such attempts at making it more intuitive at the expense of
	security.
	
	Paul
	
	On Fri, 2007-09-21 at 08:11 -0500, Christopher St John wrote:
	  

		On 9/20/07, Paul C. Bryan <email at pbryan.net> <mailto:email at pbryan.net>  wrote:
		    

			I believe the question should be framed around what solution can be
			(primarily) secure and (secondarily) intuitive.
			
			      

		I think the disconnect is the assumption that OpenID should be secure
		against every conceivable form of attack and appropriate for the most
		sensitive financial transactions.
		
		It's not.
		
		It's a widely applicable but very simple and limited replacement for
		those stupid email verification thingies. As such, it's more important
		that it be intuitive than ultimately secure.
		
		If you need the former, then Oasis has some technology for you. It's
		pointless to try and reinvent it here.
		
		Limiting the scope makes it possible to ignore lots of hard
		problems.
		
		For example, I suspect that the DNS attack is a red herring. If you
		had control of someone's access to DNS you could do much
		evil-er things than mess with their OpenID. And the fact that their
		OpenID is a relatively low-value target (compared to bank logins)
		makes it less likely to be attacked.
		
		
		-cks
		
		    

	_______________________________________________
	general mailing list
	general at openid.net
	http://openid.net/mailman/listinfo/general
	  


-- 
Pat Patterson - pat.patterson at sun.com
Federation Architect,
Sun Microsystems, Inc.
http://blogs.sun.com/superpat



More information about the general mailing list