[OpenID] Created OpenID twitter group at twibes.com

SitG Admin sysadmin at shadowsinthegarden.com
Sat May 2 15:14:38 UTC 2009


>registrar would have verified you in some way or the other. You can always
>trust the registrant of the domain.

And there we have OpenID's main centralized element; DNS - just for a 
lark, try changing your personal site's IP through your registrar - 
see how much authentication they ask you for to do this. Do you 
receive any notification of the change? Would you ever know, if it 
were changed for a few minutes and then immediately changed back? For 
a big business site, where thousands of users are connecting each 
minute, visitors who know the site's expected layout and will notice 
if it does not appear as expected, you *might* get at least one of 
those to complain - but the attacker could set up something that 
looks like a 404 error page (or "server temporarily experiencing 
problems, please try again in a few minutes" and most users would 
never know the difference. (Connections over SSL, if they are placing 
orders or dealing with sensitive information, should be an 
exception.) For a small personal site, it's unlikely anyone will 
notice.

As for always trusting the registrant of a domain, there, sadly, we 
get back to a fundamental truth of authentication: a person 
submitting credentials over the internet is not necessarily the 
person who "owns" those credentials. (It could be someone who has 
stolen them. Or legally received a copy through key escrow.) OpenID 
lets us incorporate every authentication measure we or anyone else 
can bring to bear, raising the bar until even *we're* happy with it 
(I hope to someday receive different biometric assurances from 
multiple OP's, yet I know that even this would probably be too easily 
fooled), but it's next to meaningless if the OpenID protocol itself 
utilizes DNS (with no SSL, which is why some of us keep insisting 
that SSL *is* necessary for OpenID!) - an attacker will simply go 
after the weakest link in a chain, DNS.

>So if you claim your own domain as your OpenId, and your email address has
>that domain, that should be fine. If you want you can also run your own OP.

Actually, it's *not* fine - at least, not necessarily. OP's run from 
HTTP/HTTPS, but E-mail can be assigned different handling at the 
registrar - meaning that even your big business site might enjoy 
uninterrupted service from customers while an attacker played MITM to 
get their own E-mail address at the server and authenticate with it 
at some site that trusted E-mail addresses.

>The trust issue begins with subdomains as OpenID's where your need to trust
>the domain owner.

And there are solutions for this as well:
http://openid.net/pipermail/general/2008-July/005115.html
The required aggregation is, as Nate pointed out, tricky; but it 
*does* get you the "distributed identity" part of a "distributed 
internet" that OpenID (as merely one component, of many, in the 
internet) can provide us with.

-Shade



More information about the general mailing list