[OpenID] Fwd: [OpenID Foundation] New Poll Opened

John Bradley john.bradley at wingaa.com
Fri Mar 20 17:41:41 UTC 2009


Ben,
<inline>
On 20-Mar-09, at 6:14 AM, Ben Laurie wrote:

> On Fri, Mar 20, 2009 at 1:32 AM, John Bradley  
> <john.bradley at wingaa.com> wrote:
>> I am going to vote in favor of forming the WG.
>> I have my own deep concerns about phishing attacks.
>> However OP's that support Infocard, x509, OTP tokens,  and
>> other multi-factor authentication techniques should not be  
>> precluded from
>> supporting this.
>> I have has discussions on the discovery part of the proposed spec  
>> with the
>> authors, and am OK with the work on that to this point.
>> I will however vote against the final version if the popup is not  
>> at the
>> OPs discretion via Discovery, and OPs are not required to use
>> phishing resistant authentication in the popup.
>
> Like western civilisation, this would be a very good idea (Gandhi).
> What phishing resistant authentication did you have in mind?

Gee I feel a bit like a student when the master presents a pop quiz:)

When we talk about unphishable there are really two qualities that  
tend to get conflated.
1. The ability of the attacker to get a credential.
2. The ability of the attacker to replay the credential against the  
target site.

In general what we are looking for is a technique that will not over  
repeated attempts not give the attacker enough information to  
successfully impersonate the entity at the target site in this case  
the openID OP.

There are a number of social engineering solutions to this problem  
such as site seal.
My mother taught me not to say bad things about people so I will go no  
further with my opinion on the snake oil class of solution.

The best solution is based on public/private key-pairs,  take your  
pick RSA, DSA,  PSEC-1, or my favorite Lamport signature. (yes there  
is a reason I am not a cryptographer)

There are currently a number of OPs that offer a "conventional" x509  
approach to this:
StartSSL, MyopenID, and Verisign will all issue you with a certificate  
that you can or in one case must use to authenticate yourself to your  
OP.   This is a free service of all three OPs, just to cut off the  
cost of certs argument people are formulating:)

I consider this to be unphisable given that the attacker cannot  
acquire the private key without some major compromise to the users  
computer.  These and other services offer USB token storage for the  
private key, at a cost.

Honestly 5 years ago I would have had this as my number 1 solution,  
but the UX and other issues make this impractical on a large scale.   
Sorry if you are an OP planning to make your fortune on this.

Today I think the UX experience for "Personal" Public Key cryptography  
is better served through Information Cards.  Same great security with  
a user interface,  and none of the x509 cert aftertaste.  The user can  
identify the selves to there OP with a personal card at MyopenID,   
Linksafe, and others.  Verisign's PIP uses a managed card but the  
result is the same.

The major issue with infocards is the ubiquity of the client  
selector.  All current MS products ship with one and MS provides one  
for XP.  The openSource Higgins project has them available for OSX,   
Linux, and Windows.   I have a selector on my Iphone (don't tell Apple  
they will take my phone away)

Just for a fun UCI experience people who want to can check out http://OpenIDbyCard.com/

I am considering the possibility of adding similar functionality  
directly to a openID RP as a way of accepting a openID login without  
any OP.  But I digress into a hopeful world of true User centric  
authentication.

Some people would claim OTP tokens to be unphishable.
http://paranoia.dubfire.net/2007/04/deceit-augmented-man-in-middle-attack.html

Without some sort of PK infrastructure OTP tokens are not.  end of  
argument.

Some people claim that software fingerprinting of clients combined  
with out of band second factor are effectively unphishable.  Examples  
include Vidoop and MyopenID's phone-based two factor authentication.

Out of band works but has known issues with scalability and usability.

I commend Vidoop and Jainrain on there efforts to make phishing  
resistant authentication practical for a large audience.

Once we get into this category of phishing resistant technology things  
become less clear cut.
I think this is the area that most debate will center.

I hope I pass the quiz even if my answers are perhaps not the popular  
ones:)

Regards
John Bradley

>
>> If this is not done correctly it will reenforce bad habits in users,
>>  and potentially negatively impact the perception of openID in  
>> general.
>> I think it is a discussion worth having,  but as most people would  
>> expect I
>> am unconvinced that popups can be used for user-name and password  
>> logins by
>> an OP.
>> But hey Ben Laurie cant always chime in so I will play backup grumpy
>> security guy:)
>
> Thanks :-)
>
>> Regards
>> John Bradley
>> On 19-Mar-09, at 6:11 PM, general-request at openid.net wrote:
<Snip>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2486 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20090320/78452334/attachment-0002.bin>


More information about the general mailing list