[OpenID] The HTTPS in the OpenID (Re: Bug in OpenID RP implementations)
Martin Paljak
martin at paljak.pri.ee
Fri Jan 2 21:34:28 UTC 2009
On 02.01.2009, at 19:10, Peter Watkins wrote:
> On Fri, Jan 02, 2009 at 11:08:39AM +0200, Martin Paljak wrote:
>
>> In real life most end user software do not check for the status of a
>> certificate (CRL/OCSP)
>
> I suspect that claim is not true. IE7 on Vista and Firefox 3 default
> to using OCSP -- for instance, by the time I followed the recipe for
> the www.mozilla.com demo of the cert that never should've been issued,
> Firefox 3's OCSP check rejected it.
Probably correct. I use Safari and I visit way more secured sites than
I notice outgoing ocspd request. But browsers are well developed and
have a lot of developer attention. Features which CAs monetize from
(EV for example) need to be visible to be able to earn from them (and
to enable the EV patchwork in the first place). My main concern here
is OpenID and related RP server software, which is not so old and
settled as browsers. If I want to break OpenID I want to break the RP-
OP interaction, not the end-user who is attacked a lot already by
trojans and worms. This means faking the OP for the RP somehow. Do you
know of any OpenID RP-s that do OCSP/CRL?
>> I second here the questions often raised about CA-s by Peter
>> Williams,
>> but the community has managed to subtly ignore the topic. "If there
>> is
>> a problem (which we don't believe there is) then this is for the PKI/
>> TLS/HTTPS guys to fix", "Just pay to a big company for your certs",
>> "Apparently we use whatever CA certificates Debian uses" are all
>> signs
>> of delegating the problem somewhere else.
>
> And why not delegate? TLS is a bedrock security technology for current
> Web business -- from a simple Yahoo storefront to millionaires
> accessing
> their online brokerage accounts. A lot of business have a lot riding
> on
> TLS and https, and a lot of incentive to fix any problems. And we've
> seen
> them do just that. It's not perfect (I'm still peeved that Microsoft
> has
> effectively blocked attempts to give TLS RSA decent forward
> secrecy), but
> TLS is widely understood to be critically important, and people more
> influential than us, and smarter than me, are working on this stuff
> -- the
> improved OCSP support in Firefox and IE7 being a good illustration.
I love HTTPS actually. But you can have way different implementations
with different user interactions.
But OpenID is by nature much more pgp-is (web of trust) than it is
x509-ish (hierarchical).
There are two sides for the PKI coin. One is CA-s who want to earn
money by issuing certificates. They have to cater to the ones who give
them the money - companies who buy certificates. The way the
certification business has transformed into awkward "trust business"
is what disturbs me. There are risks (damages eavesdropping for
example) which RP-s mitigate with certificates. The relation between
RP-s and CA-s who certify them is right and justified - it's business.
Then there are end-users like me and you, who CA-s don't really care
about. They only care that their root certificate would be one of
those that do not trigger the 'invalid certificate' popup or something
comparable for the user and are happy if the user happens to have some
software which can show green somewhere. Most important is not to nag
the user. A user does not bring direct revenue. This is what disturbs
me. This has lead to the fact that current PKI implementations only
cater one need - CA business.
>> In addition to "lets just do what everybody else is doing" OpenID
>> could provide additional mechanisms. I once suggested having a
>> separate configuration file and format for RP libraries to be able to
>> configure white/blacklists and OP certificates/CA-s checksums and
>> trust settings.
>
> Nothing is stopping any RP from doing that. Shoot, that's what
> Microsoft's
> HealthVault site has been doing for OpenID all along.
This is the "OpenID is an open system - you can do whatever you want
with it" delegation. Why on earth would anyone want to have NIST
level 4 authentication in an OpenID system if the strength is useless
for most RP-s? If I anyway need to make peer to peer, out of band
arrangements to make use of the authentication strength, I would
probably go for SAML peering anyway. Does OpenID want to be as one-
sided as the rest of the binary "trust business" of CA-s ("in the
default list" or "not in the default list" of some software)?
I'd like to bring the problem to the attention of developers, OpenID
RP admins but also end-users. I believe it is hard to change web
browser implementations in near future but it is possible to change
OpenID implementations. Just as it is obvious these days that the
padlock sign in the browser is not enough (thus EV) I want to make the
point that "We know what is best for you" approach is not enough for a
flexible future.
So, to focus on OpenID and what OpenID can do in this matter:
- I have nothing against EV certificates - EV is a good core upgrade
for the core business of CA-s - certification.
- I have a lot against the not-done-by-me pre-made all-or-nothing
trust decision in the form of "System trusted CA list"
- For uniform user experience different error handling scenarios
should be defined for OpenID, instead of "left to the platform/tool
configuration" (cases like CA list missing, self-signed OP certificate
or something similar)
- Bring those tunables to OpenID spec/guide level, so that
administrators and integrators would have a single point to tune these
behaviors (possibly a common format and configuration file which could
be usable in any OpenID RP implementation)
- Allow to explicitly trust/distrust a set of certificates and CA-s
(by fingerprints).
- Support basic authorization like white/blacklisting of URL regexps
in the same configuration file.
- Advocate for EV-aware RP software, RP software that raises alarms if
OP certificates change suddenly
- ...
I know that OpenID generates much more buzz in the 'transport my XXX
social network profile to ZZZ' but it could in its basic profile be as
universally secure as possible. Even for those who don't care.
--
Martin Paljak
http://martin.paljak.pri.ee
+372.515.6495
More information about the general
mailing list