[OpenID] Secure attribute transmission
Andrew Arnott
andrewarnott at gmail.com
Sun Aug 3 23:59:45 UTC 2008
Very good point, Nate. I hadn't considered #2. Although one might argue
that once spyware is on the computer, all confidentiality bets are off
period anyway.
On Sun, Aug 3, 2008 at 3:10 PM, Nate Klingenstein <ndk at internet2.edu> wrote:
> Andrew,
>
> I agree with you in general, but you might face resistance.
>
> We've faced this issue in Shibboleth for a long time because SAML 1.1 has
> no encryption of the payload. As a result, we faced two choices. We could
> ship nothing particularly valuable in the payload and do a back-channel call
> for attributes, which was generally via mutually authenticated TLS(we have
> to be careful whom we released student information to). The alternative was
> to "push" the attributes through the browser without encryption. There was
> TLS/SSL used on both legs of the journey. Attribute push still encountered
> strong resistance for two reasons.
>
> 1) The user can see all their attributes. I don't consider this a
> significant problem, but a few minor use cases may require confidentiality
> between providers.
> 2) The user's spyware -- and many users have plenty of it -- can see all
> the user's attributes too. Harvesting attributes is trivially automated and
> fun for all ages. This is, of course, a very large problem, and often ends
> discussions immediately.
>
> #2 was sufficient for almost everyone to avoid attribute push, despite also
> having major problems with the setup of mutually authenticated TLS. We now
> default to attribute push in SAML 2.0, but would probably have to revert
> back to the callback method.
>
> Take care,
> Nate.
>
>
>
> On 3 Aug 2008, at 21:45, Andrew Arnott wrote:
>
> The openid.response_nonce won't be helpful here. If your RP can work only
>> with HTTPS OP endpoints, and if your RP has an https:// return_to
>> address, then you're already golden. The authenticating user will have the
>> opportunity to see the information flash by in transit, but no one else
>> will, and presumably this information isn't to be held private against the
>> user himself! :)
>>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080803/a17aa7b5/attachment-0002.htm>
More information about the general
mailing list