[OpenID] Benefits (and security model) of an interconnected network

SitG Admin sysadmin at shadowsinthegarden.com
Sun Aug 3 09:53:20 UTC 2008


At 3:38 PM +0900 7/30/08, Nat Sakimura wrote:
>>    - communication from RP into the social network of the user
>    => I am still vague on what it will be like.
>       Could someone post a concrete example usecase, please?

Here are a couple:

1) Friend-list migration ;)
The user has a myopenid.com Identity, which they use to log into a 
photo site, a blog site, E-mail, and so on. While logged into the 
blog site, they add another user to their Friends list, and this blog 
site (as a Relying Party) contacts the photo site and the E-mail 
provider, and so on, to say "Hey, this other user is now on this 
user's Friends list." - whereupon the other RP's in that user's 
social network can move the second user (by their OpenID) onto the 
Friends list for their own services (such as private photos).

This is where I saw problems with the security model - what if a 
Relying Party provides such notification on its own behalf, or a 
hostile user breaks security at that RP and becomes marked as a 
Friend without going through proper channels? Also, this sort of 
cooperation between various Relying Parties providing a framework for 
the user's social network would remove granularity from the existing 
security model; as it is, users can grant permissions independently 
for each site they are using services on.

2) Sharing of information (Interests . . . )
I think this is worse than #1, actually; what if one RP says the user 
loves Duran Duran and another RP says the user *hates* Duran Duran?

Which one gets precedence? What if the user doesn't care one way or 
another and hasn't even heard of Duran Duran, much less been asked by 
*either* RP what their opinion is?

These are just a couple of concrete examples, and I think they 
illustrate the need for making this whole "benefit" idea less vague. 
We need to know what we're looking forward to here so we can 
anticipate the *serious* problems.

If these Relying Parties *are* exchanging information about the user, 
I'd hope to see explicitly identified sources, at the very least. If 
there were 3 sites and Site A knew not to trust information from site 
C, but was okay with accepting whatever site B said, but then Site B 
accepted information from site C and republished it as original data, 
site A would indirectly have accepted that information from site C.

-Shade



More information about the general mailing list