[OpenID] Using OpenID to store encrypted data
SitG Admin
sysadmin at shadowsinthegarden.com
Thu Dec 4 22:00:15 UTC 2008
>>Also, access logs *may* reveal OpenID request strings (since they
>>pass some OpenID arguments as part of the URL), which would reveal
>>URI's to anyone breaking in.
>
>Of course, this cannot work. The thing that led me to ideas was
>Google's Federated Login: the response from Google include (1) the
>user's email, and (2) the OpenID URL, which is unrelated to the
>email and unique for a given realm. OK, I don't know if the realm
>can be faked (?), but if not, this would allow me to store the
>user's email as their unique identifier, and use the OpenID url as a
>key, as only my host can obtain that, and only after a successful
>user login.
Are you thinking of Directed Identity, perhaps? Something like, the
user enters "me.yahoo.com" and Yahoo delivers back "yahoo.com/user"?
Unique to your RP, of course.
>Yes, if the OP can tell if a user is logged into my system, I can't
>see why he shouldn't also be able to dictate keys used in my app? Or
>perhaps I misunderstand your point?
Are we still speaking of cryptographic keys? That would be like doing
a background check on someone you were considering for a security
clearance, then saying "Eh, the fellow I have doing this background
check has the power to tell me anything he wants and effectively
*guarantee* that I issue the clearance, so I may as well issue the
same clearance to him as I was *thinking* about giving to this other
fellow." - there's a big difference between trusting someone to tell
you who another person is, and trusting that same someone with the
information you encrypted for that other person!
-Shade
More information about the general
mailing list