[OpenID] CheckIDRequest with Big AX

Pat Cappelaere pat at cappelaere.com
Wed Dec 31 13:41:30 UTC 2008


Peter,

On Dec 30, 2008, at 11:35 PM, Peter Williams wrote:

> Ok
>
> Im pretty sure you are proposing that for the openids attached to  
> services, the OP for services is acting as a _public_ (AX) directory  
> of service openids (and their various AX attributes including the  
> entities public key). The SP is not required to complete its "user"  
> auth, to access _service_ openid AX recordsets (over https).
>
> I think you will find that the public key has to itself be stored in  
> a form that is signed by a third party, as a certificate. Otherwise,  
> you are going to hit entity spoofing problems. There are rules you  
> have to follow when making RSA signed assertions, to avoid entity  
> spoofing.
>
it would likely be self-signed following similar directions per http://code.google.com/apis/accounts/docs/RegistrationForWebAppsAuto.html

> Once the SP has from the OP a trustworthy public key for AC,  
> however, then yes it can verify an RSA signature on the original  
> OAUTH request that AC used to propose the consumer-key=service- 
> openid (and the user openid) claims.
>
> Yes, given that signature, the SP can trust AC to be asserting (in  
> that signed request) that user openid and service openids are  
> related (as acl-subject and intended-recipient).
>
> Yes, if the SP now talks to the user's OP, AND the user  
> authenticates (via SMS), then the SP can bind its subject role to  
> user openid. It can also learn ACLs stored by user at OP from an AX  
> REQ, authorizing subject=user to access objects at SP (*) providing  
> they are only released to intended-recipient AC.
>
> But this is all VERY contingent on the human user recognize the  
> phone number of the SMS page, as coming from the user's  OP. (There  
> is no browser initiating context, display and feedback, remember, in  
> contrast to how myopenid/phonefactor do phone callbacks, today).
Yes.  User ought to recognize the phone number.  He will receive SMS  
message with a short url.  Short url would point to a page describing  
the request like:
Consumer: http://consumer.example.com is requesting access to  
resources (#scope) on provider: http://provider.example.com
Enter: code to authorize
(we can also do it by voice too)
>
> I suspect its not viable yet, as is. Just getting OAUTH to sign its  
> messages, and register its certified public keys in an AX repository  
> would be a small miracle in its own right, I suspect. But it's a  
> start, in public. Let's wait - and see what the private Yahoo  
> technical counter-proposal is, once they are ready to announce it.  
> Then we can all figure what all the various issues really are, and  
> reflect.
>
Can't really wait for Yahoo or Google as this is a federated identity  
system.  Every organization will eventually have its own OP, maintain  
user identities and roles... Google is actually doing something fairly  
close.  That's where I got some of the ideas from.

> So which bits did you actually build?
>
All of it.  Experimental OP will be deployed in a few days with XMPP,  
SMS support (Tatango).
I will customize the EO-1 Sensor Planning Service (as an SP) and a  
Workflow Engine as an AC.  We also hope to have many other workflow  
engines in various other domains to participate.

> -----------
>
>
> (*) It's not clear how one identifies a particular SP, in the ACL.  
> One way would be to use a SSL certid of the https endpoint of the  
> SP, but that has lifecycle issues. SSL Cert lifecycles are unlikely  
> to align well with ACL lifeycles.
Would be nice to use the same way.  SP has an openid and entry in its  
own OP and its own public key...
Pat.
>
>




More information about the general mailing list