[OpenID] XRDS multi-OP listing?
SitG Admin
sysadmin at shadowsinthegarden.com
Thu Jun 5 22:58:34 UTC 2008
>Again, I can get behind the use-case but I'm incredibly hesitant about
>making RPs do additional work. Turning a site into an RP is already a
>tough sell.
If added to the spec, this can be "the RP *may*" instead of "the RP
*should*", putting it in the same class as all those other optional
features. RP's could decide to offer it to their users at any time,
but including it wouldn't be necessary to get the basics operating.
>You got me thinking though about a way for the user (or someone on his
>behalf) host the selector himself.
I found this idea to be very exciting at first, because it would
allow users without dynamic coding ability *or* hosts that support
server-side scripting to outsource the job to sites that *do*. And at
first I was thinking that the privacy-enhancing effect from
decentralization would be even more available, since the ID selector
would be very simple compared to implementing an OpenID server or
similar, enabling just about *anyone* to run a selector - but then I
realized that it'd *also* be introducing yet another point of
*failure*. You're essentially doing the equivalent of giving some
third party root access to your OpenID headers, without exposing the
rest of your site to their access or control, but that third party
can be hostile or become compromised. Is the security at this third
party equal to or superior to what you use to protect your site?
The person hosting your OP selector can keep records for the user of
what OP's have been designated in the past, but that same person
could omit from their records any sign that they were having their
selector redirect requests from certain RP's to an OP they
controlled, so it's a bit more serious than just a compromised OP;
how do you know whether your OP was used or the person hosting your
selector authenticated as you using another OP or the RP for some
reason logged you in without properly verifying your identity?
Some of these concerns should also bounce back to the URI, though; if
a hostile party broke into your account at the site, and changed your
headers just long enough to log in somewhere, then changed them back,
how would you know where your security had been compromised?
Perhaps the "Wait, someone got compromised but who was it?" issue is
misplaced; we can hardly be upset about the missing knowledge if we
wouldn't have known anyway.
-Shade
More information about the general
mailing list