[OpenID] Association poisoning
Allen Tom
atom at yahoo-inc.com
Mon Mar 9 19:55:12 UTC 2009
Andrew - thanks for documenting this potential security issue that RP
library developers must keep in mind when storing associations. As far
as I can tell, the OpenID 2.0 spec does not mention that RPs must key
the association with the OP-endpoint, although fortunately it appears
that libs already do this.
The future OpenID 2.1 spec will contain a pointer to a living security
document which will definitely mention this issue.
Thanks
Allen
Andrew Arnott wrote:
> Ok, how about this:
>
> A relying party MUST key an association using its OP Endpoint and
> association handle together for both storage and lookup.
>
> --
> Andrew Arnott
> "I [may] not agree with what you have to say, but I'll defend to the
> death your right to say it." - Voltaire
>
>
> On Sun, Mar 8, 2009 at 9:55 AM, Peter Williams
> <pwilliams at rapattoni.com <mailto:pwilliams at rapattoni.com>> wrote:
>
> If it is critical that some security enforcing function is done it
> must be stated [in open standards communities (*)].
>
>
>
> Furthermore the means by which one would detect violation of the
> control must be normalized (so different libraries don’t use
> different tests to induce the error state). If there is an error
> state, the standard should normalize what is done, with the usual
> conformance rules (SHOULD, MUST, etc).
>
>
>
> What we don’t want is the that RP website designer has to do any
> of this ; it has to be addressing by the library/protocol engine
> delivering a complete set of security enforcing functions. The
> only thing an app designers has to do is then profile the
> identifier syntax and the trust model (just like in https). We
> don’t want “special security engineering skills” to be required,
> merely to addon websso to a website.
>
>
>
> --
>
>
>
> (*) In some ISO-security/telematic standards produced in the late
> 1980s, many of the contributing global telco companies would
> withhold 10% of the scheme from standardization in favor of
> “implementation knowhow”, so standards acted as a barrier to
> entry. Typically, submarine patents would be being placed -
> addressing the 10% “effectiveness” areas - to control the
> competitive phased of the market. It will be interesting to see
> what the culture is in OpenID too, where one sees such dominance
> of the movement these days by mega-large companies, who are
> assuredly patenting away as we speak – given the way the
> Foundation is setup about patent issues.
>
>
>
>
>
>
>
> *From:* general-bounces at openid.net
> <mailto:general-bounces at openid.net>
> [mailto:general-bounces at openid.net
> <mailto:general-bounces at openid.net>] *On Behalf Of *Andrew Arnott
> *Sent:* Sunday, March 08, 2009 10:39 AM
> *To:* OpenID List
>
> *Subject:* Re: [OpenID] Association poisoning
>
>
>
> Martin,
>
>
>
> Yes, that about sums it up. Since thinking of this potential
> problem I couldn't find anywhere in the OpenID 2.0 spec that calls
> out the caution. If it isn't there, perhaps 2.1 can add it.
>
>
>
> As stated in my blog post, I only checked Janrain's ruby library
> and dotnetopenid. I haven't checked any other RPs. I hope that
> anyone that owns an RP implementation will check for this.
> --
> Andrew Arnott
> "I [may] not agree with what you have to say, but I'll defend to
> the death your right to say it." - Voltaire
>
> On Sun, Mar 8, 2009 at 9:20 AM, Martin Atkins
> <mart at degeneration.co.uk <mailto:mart at degeneration.co.uk>> wrote:
>
> Andrew Arnott wrote:
>
> If you write an OpenID relying party library or custom
> implementation, you
> might want to review a post I just wrote on a potential security
> hole I've
> never heard anyone else talk about:
>
> http://blog.nerdbank.net/2009/03/openid-association-poisoning.html
>
>
>
> So, just to be clear, the flaw here is employing a simple
> assoc_handle to assoc secret mapping without considering which OP
> belongs to the assoc_handle?
>
> That is a pretty serious problem. Have you found any RP
> implementations that *are* vulnerable?
>
> _______________________________________________
> general mailing list
> general at openid.net <mailto:general at openid.net>
> http://openid.net/mailman/listinfo/general
>
>
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20090309/1cc635c3/attachment-0002.htm>
More information about the general
mailing list