[OpenID] The complexity of OpenID, and imperfect RPs

SitG Admin sysadmin at shadowsinthegarden.com
Fri Aug 1 09:50:31 UTC 2008


At 9:46 AM -0700 7/30/08, Andrew Arnott wrote:
>how to assure users that the right things are happening behind the 
>scenes at the RP so that he/she can trust the site.

Short of having some trusted third party audit the hardware, you're 
probably stuck with asking them for greater transparency in their 
implementation. I wrote a proposal for this back in April:
http://openid.net/pipermail/general/2008-April/004533.html

At 7:52 AM +1000 7/31/08, Shane B Weeden wrote:
>I would really like to see and contribute to a bunch of published 
>test cases which describe and expose common vulnerabilities and 
>implementation issues.

Some of these are already out there, just scattered instead of all 
gathered (or even linked to) in one place.

>What I am talking about is test cases or at least a guide/FAQ which 
>describes scenarios that expose common problems.

Snorri may have started to do some work on that, after making a 
similar suggestion in late May:
http://openid.net/pipermail/general/2008-May/004891.html
Following that thread through the next couple of messages, it seems 
that there was a reason this wasn't done back then. Johannes, how 
went the ongoing discussions?

At 11:00 AM +0100 7/31/08, James Tindall wrote:
>I suspect there will always be some developers who want to roll their
>own and so perhaps what's also needed is better documentation to help
>these developers write cleaner and more secure implimentations.

I could see a "proof-of-concept" implementation being done, not 
intended for real-life use cases but made to document its own 
processes at every step of the way; an *ideal* implementation, one 
that didn't make compromises for practical necessity or the desires 
of its developers. This would give a good baseline for variations 
from.

>A check list of common security
>vulnerabilities to test for would also be very usefull.

I'd like to have a testing OP and testing RP, actually, each with 
more than one site and more than one IP available from which to work; 
upon request, they would actually try out known attacks, acting as a 
hostile party with the permission (and active participation) of the 
developer.

-Shade



More information about the general mailing list