[OpenID] RPs accepting https:// identifiers
Gerald Beuchelt
beuchelt at sun.com
Tue Aug 12 13:09:59 UTC 2008
Martin Atkins wrote:
> I apologise for the fact that I misunderstood what you were doing in my
> initial response; I thought you were coming at this from the RP's
> perspective, not the OP's.
>
>
Yes, I do mostly look at this issue from the OP/IdP site.
> Really this is a specific form of the general problem of how to
> automatically migrate from one identifier to another. Manually updating
> all RPs you've used can be an arduous process, and some RPs don't even
> allow the identifier(s) associated with an account to be changed.
>
>
Which is a huge problem, IMHO.
> However, I really don't like the idea of OpenID contradicting the
> established rules for URI normalization. I think if RPs are going to
> have to change anyway, it'd be better to introduce some explicit and
> general mechanism for automatic identifier switching on login. However,
> until most RPs are updated, neither approach is going to be very useful.
>
>
As I said, I would most likely prefer a solution like that; at the
same time it seems easier to me to only allow a simple mapping between
http and https versions. I'd rather have a quick and dirty solution to
problem that can be ultimately extended to a more graceful solution,
than engineer the problem for 6 months and leave the security hole open.
Nevertheless, a generic identifier re-association would probably be the
best solution.
> What we could really do with is a way to work around this where only the
> OP would have to change. One approach could be to have the identifier
> URL *not* redirect to the https: version, but have the OP UI give the
> user the option of whether to use http: or https: for the eventual
> assertion. Under OpenID 2.0, the OP is allowed to send an assertion to
> and RP without an explicit request, so this would be permitted although
> perhaps unexpected on the part of RPs. The OP could remember which sites
> the user selected non-SSL for and make that the default next time. The
> main downsite of this approach, of course, is that the discovery process
> no longer has the protection of SSL, and is therefore vulnerable to
> attacks such as the DNS one.
>
>
Yes. IMHO, for *any* future version of the protocol or its
extensions, secure discovery should be REQUIRED--everything else leave
the door open to more vulnerabilities.
Best,
Gerald
More information about the general
mailing list