[OpenID] query regarding OP migration

SitG Admin sysadmin at shadowsinthegarden.com
Sat May 31 16:15:52 UTC 2008


>Babu> Could you please elaborate more on the harsh criticisms we 
>face ? Do we have any link where we can see why "centralization" was 
>not preferred ?

There was a link posted to this list recently:
<http://idcorner.org/2007/08/22/the-problems-with-openid/>http://idcorner.org/2007/08/22/the-problems-with-openid/
Only four days ago, in fact :)

Read the "Privacy" section. Then, for good measure:
http://www.techcrunch.com/2007/02/20
	/kevin-rose-at-fowa-digg-adopts-openid/
(I've split the URL onto two lines to prevent it being wrapped.)

Honorable mention goes to "mathew" for comment #34.

>Babu> There is not going to be any cache in RPs.

But according to the specs (since v1.0, even!), there *is*.

Actually, the term used is "MAY", but developers are warned against 
using this "stateless" mode because it may (that word again) be 
vulnerable to replay attacks. There are other reasons, but you can 
read them yourself at the URL's I'll provide in a moment.

First, it's important to note that, if RP's *did* cache the OP 
address from a user's claimed URI, an attacker could compromise the 
OP, tell the RP "this NEVER expires", and log in as that user 
indefinitely. I haven't been able to read the specs well enough to 
figure out exactly where or how this is addressed, but I've been 
reading from lots of other sources too, and I generally gather that a 
user can tell the RP to re-check their claimed Identity, manually. 
The only thing that still bothers me is what happens when the user 
isn't *aware* that anyone else is logging in with their Identity to a 
RP; for comments posted to public (and indexed by search engines) 
sites this can work out, but what about a bank that accepted the 
user's personal details as provided by the OP?

http://wiki.openid.net/Stateless_Mode
http://openid.net/developers/specs/

>Whenever user logs in, an RP should contact the "central digital 
>identity" server to find out the OP serving this digital ID & then 
>only redirect the user to appropriate OP for the authentication.

Sounds like you're inserting an extra layer of centralization. As the 
process currently stands, an RP contacts the user's claimed URI to 
find out the OP serving that user's digital ID, and then redirects 
the user to that OP for the authentication, sending them there with a 
few extra pieces of information to get things started.

>The central database is always going to say who my current OP is.

If you keep the central database updated, that is. How is this update 
going to take place? Will it run a check every so often at your URI 
to see if anything has changed? Why not just look at that URI and 
leave it at that?

If we're going to try adding more security to our personal info, why 
not keep all these details at the user's URI? Just add an extra line 
in the headers containing the URL of an XML file (probably also at 
the user's site) that, in turn, contains *encrypted* information. The 
cipher, unique for each item, is a full bitmask that your OP holds, 
and can send to RP's when you okay this to happen. The unencrypted 
information is with you (possibly on a computer not connected to the 
internet), and you can make up new keys when you switch to a new OP.

Sure, the OP can request this XML file themselves, and use the keys 
you provided them with to gain all this information, but when you 
switch to a new OP and use new keys, the old OP's data is at risk of 
becoming dated (though probably not with eye or hair color). Yes, the 
length of an encrypted stream can provide clues as to its content, 
but you can easily pad it with other characters that decrypt to null 
or to blank spaces. And anyone eavesdropping on the communications 
between these nodes will be able to lift the keys, but only if those 
are transmitted without some encryption of their own. (I'm supportive 
of this whether COPPA applies to the user or not.)

-Shade
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080531/e38a7cbf/attachment-0002.htm>


More information about the general mailing list