[OpenID] Windows Live ID OpenID CTP Status Update (August 2009)

John Bradley john.bradley at wingaa.com
Mon Aug 31 19:00:01 UTC 2009


Interesting,

However I suspect that there are more people on this list who think a  
openID RP should be able to be deployed in a virtual hosting  
environment without SSL or any access to that layer.

With the current state of openID SSL integration I have been having a  
challenge trying to get OPs not to negotiate the null cypher for  
associations.

Anything could be done,  however would it still be openID?

John B.
On 31-Aug-09, at 2:44 PM, Peter Williams wrote:

>
>
> From: John Bradley [mailto:john.bradley at wingaa.com]
> Sent: Sunday, August 30, 2009 2:06 PM
> To: Peter Williams
> Cc: Story Henry; John at osuosl.org; openid-general at lists.openid.net
> Subject: Re: [OpenID] Windows Live ID OpenID CTP Status Update  
> (August 2009)
>
> One thing we do lack is a consensus on what openID is other than a  
> redirect based protocol with a symmetric shared secret between the  
> OP and RP per the openID 2.0 spec.
>
>
> So a good first question to tackle is should asymmetric cryptography  
> RSA/ECDSA be a part of the core spec.
>
> If the answer continues to be no then it takes a bunch of options  
> off the table.
>
> I think the answer for extensions like CX and secure discovery may  
> well be different than for the core spec.
>
> I am interested in what people thing openID is or should be going  
> forward.
>
> That which folks could not do to enhance SSL itself  for websso  
> (because of the way IETF works, and who runs/influences the  
> contributors/editors of that forum), I see openid as having done  
> through market forces. Openid is to me an enhanced session manager  
> for ssl sessionids, with the added value of discovery and  
> authorization controls – that allow multiple “SSL connections” to be  
> proxied UNDER policy control (rather than ad-hoc http proxy/connects  
> that just fashioned a MITM space).
>
> Now, the deployed SSL would need to be unhooked from the https-level  
> de-facto policy of tying trust to the DNS – which is currently  
> partially governing end-end connection policie (under ideas from 15  
> years ago (that have not moved forward one iota)).
>
> So, just as facebook have treated openid as a hidden protocol under  
> a UX flow (using only a slice of the protocol furthermore to do  
> machine-machine signalling), so one can continue the trend, working  
> towards openid supporting machine-machine authentication for web  
> services, etc. This obviously leaves behind the restriction of  
> openid as being ONLY a foreground protocol, addressing UCI, privacy,  
> control and all the other in-your face issues.
>
> So, the more the SSl handshake/event-handlers and openid state  
> machines merge, the better. Then, a market will emerge for hardware  
> that can do NAT/load-balancer offloading of https/openid today, just  
> as the same switches now do multi-gigabit/s ssl offloading and  
> proxing.
>
> If the same trends were also to be incorporating the yet more  
> powerful foaf+ssl ideas (which are admittedly 3-4 behind the  
> adoption curve of openid2), those switches would able to set to do  
> what many used to think of secure XML routers doing (the so-called  
> AOS devices, from the likes of HP and Intel). But rather than do it  
> with messages, one would be doing it with sessions – which we know  
> has proven itself a scalable winner for fast hardware. But those  
> sessions would now have inferecing based routing – which takes us  
> above and beyond the dynamic routing regimes of the internet  
> backbones and into true virtual routing.
>
> If one goes with this trend analysis, yes public key is part of  
> openid, but through an ever tighter association with the SSL  
> handshake and event handlers, not because openid does an  
> alternative( relatively crappy) job of repeating what SSL does so  
> well.
>
> There were attempts to add certain NR-features to openid, that  
> unfortunately got caught up in patent issues. But, many folks see a  
> need for SSL to ALSO allow the servers behind the loadbancer  
> offloaders to retain  a measured of crypto-level relationship to the  
> client. Here, again, I suspect openid could be adding that something  
> back to SSL (and be doing something useful without getting into the  
> patented areas).
>
> If one accepts any of the above, then yes CX and secure discovery  
> are simply using this “new https” as a bearer, and openid  
> “extensions” are to such an ssl+openid-bearer what https apps are to  
> the SSL record layer today – consumers of generic session-oriented  
> security services. But, the https layer has moved on a generation.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20090831/13750891/attachment.htm>


More information about the general mailing list