[OpenID] Reconsidering http://openid different from https://openid
John Panzer
jpanzeracm at johnpanzer.com
Sat Sep 29 16:13:53 UTC 2007
So those are two different things, an HTTP redirect and OpenID
delegation. At least I'm assuming we're talking about two different
things. Here's the difference:
Redirect:
Client does GET http://someblog.blogspot.com
Client gets back a 301 with Location: https://someblog.blogspot.com
Delegation:
Client does GET http://someblog.blogspot.com
Client gets back a 200 with content containing <link
rel="openid.delegate" href="https://blah.some.server.org">
Clients should follow 301's and should update their internal references
to be the new URL (OpenID identifier). Clients should use delegation to
figure out how to authenticate a user, but the actual identifier
shouldn't be affected.
Pat Patterson wrote:
> There's been something nagging at me through this discussion: the RP
> seems to be following the trail all the way to the user's IdP. I
> thought the user could do some delegation, so there is indirection
> between the provided URL and the actual URL at the IdP, the benefit
> being that I remain in control of (say) http://someblog.blogspot.com/
> and I can move my actual IdP account from someidp.com to abetteridp.com.
>
> What happens to all this if the RP is supposed to follow the rabbit
> trail to the bottom and store someidp.com. When I get a better del from
> abetteridp.com, I'm stuck, am I not?
>
> Cheers,
>
> Pat
>
> On Sep 29, 2007, at 1:38 AM, Lukas Rosenstock wrote:
>
>> Am 29.09.2007, 03:44 Uhr, schrieb John Panzer
>> <jpanzeracm at johnpanzer.com>:
>>
>>> Then I'm confused. If you do a redirect over http, a MITM attacker can
>>> modify the response and show the user what appears to be their OP and
>>> collect their password, right? That is, if the point of redirecting to
>>> https is to prevent MITM attacks, but the initial redirect itself is
>>> vulnerable to MITM, what have you gained?
>>
>>
>> User logs in for the first time, enters http://myid/, gets redirected to
>> https://myid/ (this identity is "SSL-validated" and can not be taken
>> over)
>> and is signed up as https://myid/. All an attacker in control of
>> http://myid/ can do is redirect to https://myid.fakeserver/ which is
>> obviously != https://myid/. So a new account for https://
>> myid.fakeserver/
>> would be created on the RP, the original account is still safe.
>> Have you taken a look at OpenID implementations, afaik there are some
>> who
>> do NOT do the redirect (or actually do it, but still take the entered
>> URL
>> as identifier - those would be vulnerable).
>>
>> --
>> Lukas Rosenstock
>> Identity 2.0 Europe :: http://identity20.eu/
>> _______________________________________________
>> general mailing list
>> general at openid.net
>> http://openid.net/mailman/listinfo/general
>
>
> - - - - -
> Pat Patterson
> Federation Architect, Sun Microsystems, Inc.
> pat.patterson at sun.com - http://blogs.sun.com/superpat
> - - - - -
> Join OpenSSO today! http://opensso.dev.java.net/
> - - - - -
>
>
>
>
>
More information about the general
mailing list