[OpenID] Password age and password reset
Andrew Arnott
andrewarnott at gmail.com
Wed May 13 23:51:08 UTC 2009
I understand that discussing methods for compromising accounts may have
security issues itself, but on the other hand it's hard to agree on a spec
for solving a problem that you're unwilling or unable to discuss. :)
--
Andrew Arnott
"I [may] not agree with what you have to say, but I'll defend to the death
your right to say it." - S. G. Tallentyre
On Wed, May 13, 2009 at 11:12 AM, Breno de Medeiros <breno at google.com>wrote:
> Hi Andrew,
>
> Please understand that it may well be impossible or at least
> inadvisable to have a discussion into specific scenarios where asking
> for a password change might be a good idea from a security viewpoint.
>
>
> On Wed, May 13, 2009 at 10:36 AM, Andrew Arnott <andrewarnott at gmail.com>
> wrote:
> > Ok, so I think I see what you're saying, but rather than just a simple
> > password change, it sounds like this scenario warrants the OP challenging
> > the user.
> >
> > Scenario 1:
> > User walks up to a kiosk and notices that a prior user didn't log out of
> > their OP. He maliciously leverages that to log into an RP using the
> victims
> > OP account. The RP detects strange behavior (somehow). The RP wants to
> > signal this to the OP.
> >
> > Scenario 2:
> > Attacker phishes OP credentials out of a victim, or otherwise steals
> login
> > rights at the OP. Attacker logs into an RP as the victim. The RP
> detects
> > strange behavior and wants to signal this to the OP.
> >
> > Either way, having the OP help the user change their password is not a
> > mitigation to this problem, IMO. Now, simply using the existing PAPE
> > extension, the RP could force the user to re-login to their OP, which
> would
> > mitigate scenario 1. But scenario 2 could only be solved by the OP
> sending
> > the user through extra identity checks, such as "where were you born?"
> type
> > questions.
>
> Sarah Palin would have something to say about this, I am sure.
>
> >If the user failed the test, then the OP would need to use
> > another channel to notify the genuine user that it's time to reset their
> > password. If the user passed the test, then the "suspicious activity"
> was
> > legitimate and no password reset is necessary.
> >
> > So in no case does it seem useful for the OP to jump directly to "change
> > password".
> >
> > --
> > Andrew Arnott
> > "I [may] not agree with what you have to say, but I'll defend to the
> death
> > your right to say it." - Voltaire
> >
> >
> > On Wed, May 13, 2009 at 9:41 AM, George Fletcher <gffletch at aol.com>
> wrote:
> >>
> >> The key is that as an RP, you have to be able to shut down "bad
> accounts"
> >> and if that account is an OpenID (or any other federated identity), then
> >> there is no way for the user (good or other wise) to reset things. They
> are
> >> locked out completely. Hence, in order to enable a good experience for
> >> users, the RP would like the OP to do something to prove the user is
> really
> >> "good" before the RP will let them back in. This does of course not
> protect
> >> against the attacker going through the hoops to prove the attacker is
> >> "good", but I'd say that's out of scope for this proposal.
> >>
> >> Thanks,
> >> George
> >>
> >> Andrew Arnott wrote:
> >>>
> >>> Hi Breno,
> >>>
> >>> But if the RP detects malicious activity, why would it ask the OP to
> have
> >>> the user change their password? Isn't it too late by then, and
> wouldn't it
> >>> be asking the malicious user to reset the password, thus locking out
> the
> >>> real user?
> >>>
> >>> Also, some OPs don't even use passwords to authenticate their users, so
> >>> whatever we come up with, the extension should be able to behave
> reasonably
> >>> in that case.
> >>> --
> >>> Andrew Arnott
> >>> "I [may] not agree with what you have to say, but I'll defend to the
> >>> death your right to say it." - Voltaire
> >>>
> >>>
> >>> On Wed, May 13, 2009 at 9:03 AM, Breno de Medeiros <breno at google.com
> >>> <mailto:breno at google.com>> wrote:
> >>>
> >>> Let's give a concrete scenario:
> >>>
> >>> 1. RP detects malicious activity on the user's account at the OP.
> >>>
> >>> 2. In such cases, the RP would have asked the user to reset the
> >>> password. However, this user logs in via OpenID so the RP does not
> >>> have the choice.
> >>>
> >>> 3. The RP puts some messaging that the user should change their
> >>> password at the OP. However, because there is no standard to even
> >>> communicate which URL at the OP the user can change password, the
> >>> experience is broken. A lot of users either don't know (without help
> >>> from the OP) how to change their passwords.
> >>>
> >>> 4. Users give up, or seek personal assistance.
> >>>
> >>>
> >>> On Tue, May 12, 2009 at 8:17 PM, Santosh Rajan
> >>> <santrajan at gmail.com <mailto:santrajan at gmail.com>> wrote:
> >>> > Wouldnt it be better if the OP took complete responsibility of
> >>> the users
> >>> > security instead of bringing the RP into the loop? OP can decide
> >>> based on
> >>> > the users usage pattern how often he must change his password
> >>> and post a
> >>> > recommendation to the user whenever he logs in.
> >>>
> >>>
> >>>
> >>> --
> >>> --Breno
> >>>
> >>> +1 (650) 214-1007 desk
> >>> +1 (408) 212-0135 (Grand Central)
> >>> MTV-41-3 : 383-A
> >>> PST (GMT-8) / PDT(GMT-7)
> >>> _______________________________________________
> >>> general mailing list
> >>> general at openid.net <mailto:general at openid.net>
> >>> http://openid.net/mailman/listinfo/general
> >>>
> >>>
> >>>
> ------------------------------------------------------------------------
> >>>
> >>> _______________________________________________
> >>> general mailing list
> >>> general at openid.net
> >>> http://openid.net/mailman/listinfo/general
> >>>
> >
> >
>
>
>
> --
> --Breno
>
> +1 (650) 214-1007 desk
> +1 (408) 212-0135 (Grand Central)
> MTV-41-3 : 383-A
> PST (GMT-8) / PDT(GMT-7)
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20090513/a46ec726/attachment.htm>
More information about the general
mailing list