[OpenID] OpenID as state-issued ID

SitG Admin sysadmin at shadowsinthegarden.com
Tue Oct 21 23:18:01 UTC 2008


FYI, Nathan - the list distributes posts with a Reply-To of the 
person who sent it, not the list address, so you'll have to Reply To 
All or manually cc the list if you want everyone else to see it. 
(I've copied your replies to me into this post, so everyone else can 
see the full context and you won't have to resend those.)

>What concerns me is the security on the whole bit. Now I can see that What I
>said def. hit a nerve because I've been blown up with emails about it.

Don't mistake criticism for anger. The position you're taking *will* 
be subjected to a lot of attacks, because it's largely inapplicable 
to OpenID, but you shouldn't be seeing any attacks on you 
*personally*.

If you see it that way, I can only recommend taking a less 
confrontational approach to all this; if you think of yourself as 
asking a question rather than telling us what's what, you won't have 
primed yourself to be so sensitive to disagreement. It's also more 
polite - when you charge into a list that you've never posted on 
before (especially one that's been active for over 2 years, with such 
qualified members) and essentially tell them that they haven't 
thought about it and they need to reconsider it, it borders on being 
offensive to their intelligence. Do you really think none of this has 
occurred to us before? Conversely, if it has (but we're still doing 
this), do you really think we'd *care*? ;)

There are also practical reasons for bringing your concerns to our 
awareness without implying that it's hopeless or that the project 
should just be abandoned. I could easily write a critique of motor 
vehicles, complaining that someone might leap out in front and get 
run over before its forward motion ceased to carry it forward, and 
that in the case of a sudden stop for *any* reason physics would 
result in anyone inside flying forward through the windshield. Note 
that BOTH of these "flaws" have been easily addressed through the use 
of precautions that are now present in *every* vehicle: the 
"seatbelt" and "brake" security measures. I assure you that we did 
NOT get to this point in the development of motor vehicles by saying 
that the foreseeable risks were grounds for abandoning the whole idea!

You are not the only one here capable of intelligent thought. We have 
considered these problems before, and, if you simply ask yourself how 
such problems might be avoided, you will have taken the first step on 
the path of actually solving them. If you find yourself stumped, I 
suggest asking those who have spent significant amounts of their 
lifetime working on such problems, since we are unlikely to give up 
on security and privacy merely because we cannot immediately surmount 
an obstacle, and were thus more likely to have persevered long enough 
to solve those problems.

>The thing is if you start giving people a static bit of information that
>links back to that person. (Much like a "State ID" or a "Drivers License"
>does.) You risk that same bit of information giving access to much more
>information.

True, but not necessarily a quality of OpenID. It is possible to 
anonymously acquire a webpage (no registration with DNS), giving you 
an ID, but not linking back to the real-life *you* in any way. It is, 
in the same way, possible to acquire *many* webpages, each of them 
isolated from the others, giving you *many* OpenID's, NONE of which 
are connected to you or to each-other.

>You cannot sit there and tell me that where those login details
>are used there won't be a record of it.

Can it be absolutely guaranteed, so that the user KNOWS it? No. But 
can it be done? Yes. Sites can be set up to log you in without 
recording the visit. My own site's design purposefully protects each 
user's identity from being seen by other visitors to the site.

>I personally will probably never
>use OPEN ID because I don't believe that a person should be labeled and
>stamped with a barcode on the internet. And that is exactly what you guys
>are talking about doing.

This may be our current topic of discussion (was it? I hadn't been 
aware that we were discussing such things - I thought most of the 
recent messages were about user interface/experience), but it is not 
what OpenID is about. If you think you have read that somewhere 
off-list, I suggest that you cite your sources so we can either 
clarify what we were talking about or point you at sources that we've 
actually *written* instead of reports by some confused 3rd party.

>As I said before I like that you are trying to make
>the whole internet login to websites bit much easier on the users. Only
>having to remember one username and password. That's great.

That's only a small part of what we're about, actually. The main 
feature of OpenID is *decentralization*: not having your digital 
Identity expire just because the company that was responsible for 
maintaining it suddenly went out of business or became corrupt. 
Decoupling identity from the sites that deal with it.

You shouldn't have to remember *any* username and password, and this 
has nothing to do with OpenID: you could be using biometrics and 
smart-cards and other technology to authenticate yourself, not 
relying on your E-mail provider to keep *that* account's username and 
password secure so noone can break into it and steal all your *other* 
accounts.

>But the problem
>is, all I'd have to do is snatch that person OPEN ID and bam I have access
>to EVERYTHING.

This has some validity, but it's been anticipated since the earliest 
days. We do have solutions in place, first and foremost being the 
"only use one OpenID per site" technique mentioned earlier.

>And face it there will be absolutely no way for you guys to
>stop this from happening.

Ah, crud. You're right. Let's face reality, there absolutely cannot 
ever be any way in the future that this could be prevented. We'd 
better just admit defeat now, and go home.

That was sarcasm. You may have noticed a lot of fuss lately about 
voting fraud? Sucks, but what can we do about it? Well, 
surprisingly(?), that wasn't a rhetorical question to some folks. 
Back in 2006, the National Science Foundation (whose initials are 
giving me chills - I blame Deus Ex) sponsored an academic competition 
to determine the best open-source voting system.

I bring up this specific example because the preservation of 
anonymity was a value there, too - and not only is it important (in 
voting) to protect voters' identity from third parties (to prevent 
retaliation for votes), but also the *voter* (user) must be unable to 
prove which way they voted (so they cannot demonstrate it to those 
who are "buying votes"), and they've managed to achieve this 
*without* sacrificing transparency or accountability!

Now, if they can do that, is it really beyond imagination that we 
might some day be able to do much less?

>They can't even stop peoples bank accounts from getting hacked.

You really shouldn't generalize this way. How much of this "hacking" 
is strictly due to the authentication method being used?

How much of it is "phishing", where the user is tricked into entering 
their password at an attacker's site? (OpenID *is* addressing this, 
or at least there are discussions on the topic currently; a 
consistent user experience isn't limited to just OpenID, either.)

How much is due to an "inside job", where someone at the bank 
withdraws the money directly from your account instead of logging in? 
(No authentication method will help you with this.)

How much is due to a "backdoor" or someone hacking the bank itself? 
(Backdoors bypass authentication. An attacker exploiting a flaw in 
the bank's web software to execute a withdrawal without permission is 
also not checking for authentication.)

How much is due to a keylogger or packetsniffer on the user's 
computer, recording passwords or whatever biometric data goes out to 
enable replay attacks? (The authentication method can't detect this, 
and no amount of anti-virus software will warn you that someone is 
"shoulder-surfing" by standing just behind you and peeking over at 
the screen or keyboard.)

How much is due to common words/phrases being used as passwords, 
easily guessed by a "dictionary" attack or even a brute-force attack? 
(Good "best-practices" are to prevent the user from generating such 
passwords and to check for successive failures, but - again - OpenID 
doesn't have to use passwords.)

There are A LOT of different ways a bank account might be broken 
into. Most of them have nothing to do with the authentication method. 
In any case, who is this "they" we can't possibly hope to do better 
than?

>Let me put it like this. What is easier to
>do. Go around a city and pick up one piece of trash at a time, Or, just go
>to the dump and pick it all up at once?? Your taking what used to be a lot
>of sensitive information and consolidating it so it makes a hackers job
>easier.

How are we consolidating it? Did the owner of a blog I just logged 
into to leave a comment on, acquire all my personal information? Or 
are we talking about the OP, which handles authentication for me, 
keeping all of this information in one place? Why *does* my OP even 
*have* all of this information, anyway? Why did I find it necessary 
to fill out information that was entirely optional and which I 
foresaw no need to share with any other site?

Let me make this clear: the sites I log into have exactly one piece 
of information, 'http://shadowsinthegarden.com' - that's me, that's 
all they know. If they want to know anything else, they'll have to 
*ask* me, because I'm sure as heck not divulging it automatically 
through my OP!

And, come to that, it's *my* OP. I can code it (and Apache's logs) to 
retain NO information about where I've been, about which sites I've 
authenticated to - or I can have it encrypt that data with a public 
key and E-mail it to one of my addresses or simply post it online 
(secure, in both cases, in the knowledge that only *my* computer has 
the private key to view this information), if I'm worried about 
hackers deleting the encrypted logs so I can't see their contents.

>The only way this stuff will ever work properly, Is if every PC on
>earth is equipped with a biometric DNA reader.

Biometrics are notoriously easy to fool, and DNA can be taken in a 
number of different ways - most of which just invite an attacker to 
steal part of your body so they can fool the system. It's like 
handcuffing a briefcase to your wrist - determined enough thieves 
will simply chop off your hand and run off with the goods anyway, 
while you're screaming and, by the way, no longer have a hand.

>And even then there will be ways around it. What would make me feel better

Bruce Schneier calls this "security theatre" - motions that let users 
*feel* better about their security, without actually *doing* anything 
about the problems.

>is if you referenced back the login to match up with the users IP. Making

It is SO easy to spoof IP addresses that this is next to meaningless.

>only the users home IP allowed to access the login.

This is an additional problem - lots of users still have dialup, and 
thus tend to frequently *change* IP's; what are we going to do, deny 
users access whenever they reconnect to their ISP or (have to) 
restart their cable/DSL modem?

>But something like that would significantly reduce the chances of
>a hacker being able to USE your login details. They still may be able to
>snatch it. But unless they have that users home address and a way onto their
>network the information is useless.

So, what you're imagining is more like two-way SSL authentication, 
where that user's network is the only legitimate source for logins, 
and it's kept track of "by the internet" instead of being on the 
user's computer where that same key can be stolen by hackers? (Never 
mind that the *internet* itself is made up of many different 
computers, albeit extremely specialized, any of which might be 
vulnerable to attack - even *more* vulnerable than the user's 
computer is.)

The hacker doesn't need your home address, though - physical topology 
is irrelevant, in this case, to network topology. They just need to 
put a virus on your machine to log in as you (from your network) for 
them, and that's what you seem to be addressing.

-Shade

At 4:32 PM -0400 10/21/08, Nathan wrote:
>And what misapprehensions would that be?
>
>-----Original Message-----
>From: SitG Admin [mailto:sysadmin at shadowsinthegarden.com]
>Sent: Tuesday, October 21, 2008 4:04 PM
>To: Nathan
>Cc: general at openid.net
>Subject: Re: [OpenID] FW: general Digest, Vol 26, Issue 57
>
>>I just want to add that I like where you guys are Trying to go with all
>>of this.
>
>Considering the number of misapprehensions in your message, I really have to
>question just exactly where you think we ARE going with all this ;)
>
>-Shade

At 5:02 PM -0400 10/21/08, Nathan wrote:
>Ok so maybe I wasn't clearly expressing my concerns.
>
>What concerns me is the security on the whole bit. Now I can see that What I
>said def. hit a nerve because I've been blown up with emails about it.
>
>The thing is if you start giving people a static bit of information that
>links back to that person. (Much like a "State ID" or a "Drivers License"
>does.) You risk that same bit of information giving access to much more
>information. You cannot sit there and tell me that where those login details
>are used there won't be a record of it. And then so what responsibility is
>given to those in charge of these records.  I personally will probably never
>use OPEN ID because I don't believe that a person should be labeled and
>stamped with a barcode on the internet. And that is exactly what you guys
>are talking about doing. As I said before I like that you are trying to make
>the whole internet login to websites bit much easier on the users. Only
>having to remember one username and password. That's great. But the problem
>is, all I'd have to do is snatch that person OPEN ID and bam I have access
>to EVERYTHING. And face it there will be absolutely no way for you guys to
>stop this from happening.
>They can't even stop peoples bank accounts from getting hacked. What makes
>you think the same won't happen. Let me put it like this. What is easier to
>do. Go around a city and pick up one piece of trash at a time, Or, just go
>to the dump and pick it all up at once?? Your taking what used to be a lot
>of sensitive information and consolidating it so it makes a hackers job
>easier. The only way this stuff will ever work properly, Is if every PC on
>earth is equipped with a biometric DNA reader.
>And even then there will be ways around it. What would make me feel better
>is if you referenced back the login to match up with the users IP. Making
>only the users home IP allowed to access the login.
>Granted this stinks for mobile users or users trying to do things from other
>locations. But something like that would significantly reduce the chances of
>a hacker being able to USE your login details. They still may be able to
>snatch it. But unless they have that users home address and a way onto their
>network the information is useless. I'm just concerned about the whole
>thing. The consolidation of all those pieces just seems like way to much of
>a security risk.
>
>-----Original Message-----
>From: SitG Admin [mailto:sysadmin at shadowsinthegarden.com]
>Sent: Tuesday, October 21, 2008 4:32 PM
>To: Nathan
>Cc: general at openid.net
>Subject: [OpenID] Re: OpenID as state-issued ID
>
>>this. But Do we really want to put an ID system on the internet?? To me
>>this screams "Drivers License" or "State ID" only your trying to do this
>online.
>
>It's interesting that you should use those as analogies, considering they
>don't support ANY of the concerns you've expressed:
>
>>That is an extremely scary thought. I don't want to login to my
>>favorite porn site or whatever kind of site and have website owner
>>immediately have all of my personal information.
>
>How does a driver's license or state ID give someone access to ALL your
>personal information? Are states in the habit now of printing E-mail
>addresses, home addresses, phone numbers, and your medical details on the ID
>card? For the record, mine has a P.O. box - about the most you can learn
>from it (that wouldn't be obvious just from
>*looking* at me) is the DoB.
>
>>Or for that matter how do you plan on
>>keeping users of the open ID from tracking peoples website visiting habits?
>
>I didn't realize we lived in a police state already - I regularly go to
>various locations, and NOONE demands (or even asks) that I show them my ID
>(for this reason, I don't even *carry* any ID with me, usually), so it's
>quite impossible for people at those locations to figure out where else I've
>been.
>
>(Well, technically not *impossible*, but at that point it's a spurious
>argument - the ID card can't possibly be how they're tracking me, so it's
>fallacious to imply a connection.)
>
>And even if they *did* demand my ID, so what? Are they going to mark it with
>some special non-removable tag that shows *other* stores (possibly their
>competitors!) where I've been? How do they force me to return there so they
>can read the tags which their competitors'
>stores, presumably, have been adding?
>
>In other words, how do they force the ID to be associated with other
>locations and how do they find out this information after it's been updated?
>
>-Shade



More information about the general mailing list