[OpenID] E-mail verification is MultiAuth
Nate Klingenstein
ndk at internet2.edu
Fri May 1 06:30:19 UTC 2009
Shade,
> Sure it is - but, at the same time, we can't place all the power to
> impersonate users into the hands of any one third party.
That's an extremely strong requirement, beyond the ability of most
current deployments and even the requirements of NIST 800-63 Level
4. I don't think calling for it in general practice is reasonable
today.
> Responsible, yes; trusted, maybe; vulnerable, definitely.
It's the responsibility of any issuer of credentials of any value to
do a reasonable job securing both its systems and its procedures.
While any system may be considered vulnerable, I worry far more here
about applications relying purely on cookies and compromised
clients. They're definitely the weaker link.
> If (for example) Facebook asserts that it can be trusted as OP to
> verify a user's E-mail address (at another domain), we haven't
> solved any security problems; we've only shifted their burden onto
> another host. It's then *worse*, actually, because we double the
> exposure of those credentials (attackers can compromise the E-mail
> provider *or* they can compromise Facebook, either one will work),
> and also because Facebook becomes the centralized repository of
> that authentication measure, actually *removing* veto power from
> 3rd-party hosts that might want to protest "Wait, this user isn't
> who they say they are!". Aggregation is one of the *implications*
> of a user-centric (digital) world: we deal with more spokes in a
> peer-to-peer environment than in a server-terminals environment.
I agree that aggregation will become increasingly important as users
are allowed to make their identities portable. It's one of the key
challenges federated identity must address for applicability to most
use cases and deployments. I'd also agree that involving more OP's
where their singular compromise also represents compromise of a set
of identities weakens the security of a system.
> Re: misbehavior, I still think the "majority of OP's" requirement
> would restrict the danger posed by lone misbehaving OP's - indeed,
> the possibility of one or more of them "going rogue" was explicitly
> acknowledged and specifically addressed in that proposal!
It's difficult to build aggregation flows where any OP/IdP acting
maliciously can't independently do a few bad things, including
authenticating the user autonomously. Requiring the client to
successfully authenticate at two providers constrains the aggregation
solution set while introducing additional user confusion(didn't I
already login?) and protocol complexity. That's not to say there is
no value in it, but there's a lot of work to do until it can be
considered practical.
Here's a recent demonstration with loose consensus and running code
for attribute aggregation. It doesn't require multiple
authentications, but it does constrain attribute quality by
authentication quality and ensures any given OP/IdP is not aware of
identities at other OP's or IdP's. I consider it our best
approximation at addressing your concerns unless clients are made
more intelligent.
http://www.internet2.edu/presentations/spring08/20080421-shibwg-
chadwick.pdf
Take care,
Nate.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20090501/af223fc7/attachment.htm>
More information about the general
mailing list