[OpenID] Building on the OpenID PAPE specification

Paul Madsen paulmadsen at rogers.com
Wed Oct 8 20:46:18 UTC 2008


Hi Drummond, I believe that that is the exact motivation. LoA are meant 
to make it easier for

a) RPs to examine their resources and identify what risk categories they 
fall into
b) OPs  to examine their processes and make a claim about what level 
they can meet
c) certification bodies to verify the OPs claims and confirm so to the RP

As it's currently a somewhat turbulent time for consolidation of 
assurance frameworks (e.g. NIST, tScheme, LAP, InCommon, ITU x.eaa etc), 
I can understand why some RPs might want to hedge their bets and defer 
jumping on the bandwagon.

paul

Drummond Reed wrote:
> Brian, just a general question (I'm no expert on NIST levels), but isn't one
> of the purposes of a assurance level programs to abstract these details for
> each level? For example, wouldn't it make sense for a Level 2 authentication
> to say, "Reusable password at X strength, or OTP at Y length, or digital
> certificate meeting Z requirements"?
>
> As I understand it, this is in large part so an RP can simply make the
> decision, "for this action the user needs to be authenticated at level X",
> knowing that the mapping of what has been used to achieve that level has
> already been done.
>
> I'm not saying that assurance level programs work for everyone, just asking
> for clarification that this is one of their goals.
>
> =Drummond 
>
>   
>> -----Original Message-----
>> From: general-bounces at openid.net [mailto:general-bounces at openid.net] On
>> Behalf Of Brian Kelly
>> Sent: Wednesday, October 08, 2008 9:30 AM
>> To: Dick Hardt
>> Cc: general at openid.net
>> Subject: Re: [OpenID] Building on the OpenID PAPE specification
>>
>> Dick,
>>
>> A few examples of why an RP might want to know more about what kind of
>> authentication an OP used:
>>
>> 1. RP wants to make sure OP is using reasonable practices for password
>> strength enforcement (e.g. change PW every 6 months, at least 8
>> characters with at least 4 of those characters being unique)
>>
>> If an RP is going to be providing access to confidential information,
>> the RP may want to ensure that their users' OPs are enforcing
>> reasonable password policies.
>>
>> 2. Same issue as in #1, but applied to OTP length / type.
>>
>> 3. RP wants to be assured of OP user's identity by verifying that the
>> user authenticated using a digital certificate that was provided by
>> specific root CAs that the RP trusts.
>>
>> By providing more granular information about how the user was
>> authenticated, the RP can be assured that the OP's authentication
>> methods are at least as good as the authentication methods the RP
>> would have used without OpenID.
>>
>> The higher-level goal of PAPE-AM, which is aligned with a goal of
>> PAPE, is to increase OpenID adoption among RPs that must ensure that
>> access to services and individual's information is properly protected
>> by the OP.
>>
>> Brian
>>
>> On Oct 7, 2008, at 3:03 PM, Dick Hardt wrote:
>>
>>     
>>> Brian
>>>
>>> I can understand why the WG would reject something that was not
>>> within the charter. The time for you to have gotten involved would
>>> have been at the creation of the charter. Water under the bridge now.
>>>
>>> I read over your blog post, but I'm unclear on why an RP *needs* to
>>> understand the kind of authentication that was used?  There is a
>>> tendency for entities to *want* as much control as possible -- but I
>>> don't follow the logic for why  they *need* it. Would you elaborate?
>>>
>>> -- Dick
>>>
>>> On 7-Oct-08, at 6:39 AM, Brian Kelly wrote:
>>>
>>>       
>>>> Dick,
>>>>
>>>> When we completed the first draft of PAPE-AM, we sent it to the
>>>> PAPE specs working group list for input. It was promptly dismissed
>>>> since it went against the PAPE WG charter, which states that only
>>>> high-level policies should be included in the spec.
>>>>
>>>> At that point the PAPE-AM team decided that it would be a good idea
>>>> to open the discussion up to the broader OpenID community to seek
>>>> guidance on next-steps. I encourage the PAPE WG folks to comment on
>>>> this as well.
>>>>
>>>> To your second point about how the RP should not care about how the
>>>> user was authenticated, I agree that the trust needs to start at
>>>> the OP. The main issue we were trying to address in PAPE-AM is that
>>>> there is too much ambiguity in the high level policies as stated in
>>>> PAPE today. This ambiguity makes it difficult for both OPs and RPs
>>>> to understand what kind of authentication was actually used.
>>>>
>>>> Brian
>>>>
>>>> On Oct 6, 2008, at 7:12 PM, Dick Hardt wrote:
>>>>
>>>>         
>>>>> Brian: did you participate in the PAPE spec? That would have been
>>>>> the place to have brought up this issue.
>>>>>
>>>>> Although I did not participate in the PAPE specification (only so
>>>>> much time) -- I was supportive of the high level policies vs
>>>>> specific technologies. The RP really does not (well, *should*
>>>>> not)  care about how the user was authenticated, just about how
>>>>> much certainty the OP has that it is the user. It is the OP making
>>>>> the assertion after all. Keep in mind I can have an OP that says
>>>>> that all the factors were used, even if they were not.
>>>>>
>>>>> -- Dick
>>>>>
>>>>>
>>>>> On 6-Oct-08, at 2:28 PM, Brian Kelly wrote:
>>>>>
>>>>>           
>>>>>> A few months ago, some members from the OATH community and I got
>>>>>> together to take a fresh look at the PAPE spec, what it was
>>>>>> trying to
>>>>>> accomplish, and how well it could be implemented. We started
>>>>>> holding
>>>>>> semi-weekly conference calls and over the period of a couple
>>>>>> months we
>>>>>> drafted up a slightly new take on PAPE.
>>>>>>
>>>>>> The main difference is that we defined a specific set of
>>>>>> authentication methods, rather than only using high-level policies.
>>>>>> After long discussions we found that there was too much ambiguity
>>>>>> in
>>>>>> the high-level policies as defined today in PAPE. We created a
>>>>>> draft
>>>>>> of our modified specification, termed PAPE-Authentication
>>>>>> Mechanisms
>>>>>> (PAPE-AM), and we are beginning to socialize the concepts in that
>>>>>> draft.
>>>>>>
>>>>>> I published a blog post summarizing our motivations, and wanted to
>>>>>> share it with the greater OpenID mailing list.
>>>>>>
>>>>>> http://openidtrustbearer.wordpress.com/2008/10/06/building-on-the-
>>>>>>             
>> openid-pape-specification/
>>     
>>>>>> I would appreciate hearing the thoughts of the readers on this
>>>>>> mailing
>>>>>> list. Please respond publicly, or feel free to contact me directly.
>>>>>>
>>>>>> Thank you,
>>>>>> Brian
>>>>>>
>>>>>> --
>>>>>> Brian Kelly
>>>>>> TrustBearer Labs
>>>>>> http://trustbearer.com
>>>>>>
>>>>>> _______________________________________________
>>>>>> general mailing list
>>>>>> general at openid.net
>>>>>> http://openid.net/mailman/listinfo/general
>>>>>>             
>> _______________________________________________
>> general mailing list
>> general at openid.net
>> http://openid.net/mailman/listinfo/general
>>     
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>
>
>   

-- 
Paul Madsen            e:paulmadsen @ ntt-at.com
NTT                    p:613-482-0432
                       m:613-302-1428
                       aim:PaulMdsn5
                       web:connectid.blogspot.com 




More information about the general mailing list