[OpenID] Password age and password reset

Peter Williams pwilliams at rapattoni.com
Thu May 14 13:51:15 UTC 2009


Think about auto idp logout some more, assuming a web style open sso world (vs saml closed idp-rp communities).

Idp publishes slo/idp-logout link, via openid auth extension. Presume that Rp has some (openid auth mediated, non proprietary) means to authenticate itself to op, when invoking use of privilege.

User is logged onto 10 RPs, say. Some are doing periodic ax. rp1 asks for idp logout (invoking with or without user direct consent). All other rps are affected. Other rps are annoyed, that rp1 can influence their ax update relationship with user. User authenticates anew. 10s later, rp3 decides to invoke logout... Cycle repeats. Another (big) one threatens user with lockout then, unless user changes password...

Assume that there is no relationship between RPs. Some n of m RPs will probably have chosen the same op, from the several the user publishes for his/her openid. 3 RPs are facebook extensions, 1 is gmail, 1 is yahoo webim, and other 5 are some tiny website vendors..specific to the (business) users vertical market.


-----Original Message-----
From: George Fletcher <gffletch at aol.com>
Sent: Thursday, May 14, 2009 8:08 AM
To: Allen Tom <atom at yahoo-inc.com>
Cc: Santosh Rajan <santrajan at gmail.com>; general at openid.net <general at openid.net>
Subject: Re: [OpenID] Password age and password reset


I like the idea of publishing "Logout" links... but historically...
OpenID has shied away from dealing with the Logout issue:) The re-direct
to the OP's logout URL would need to be by user choice and they
shouldn't be logged out of their OP, just given the option to without
having to find the link.

Thanks,
George

Allen Tom wrote:
> That's why I don't quite understand this proposal. If the RP detects
> that the account is possibly compromised, telling the user to change
> their password is very likely the same thing as informing the attacker
> that he's been detected. Since the attacker has the password, he might
> as well change the password (and the account recovery data) to lock
> out the original user.
>
> At any rate, having the OP publish its "Account Management" link seems
> to be a useful thing. For RPs that want give the user to also sign out
> of the OP when the user signs out of the RP could also benefit from
> having the OP publish its Logout link as well.
>
> Allen
>
>
> George Fletcher wrote:
>> The key is that as an RP, you have to be able to shut down "bad
>> accounts" and if that account is an OpenID (or any other federated
>> identity), then there is no way for the user (good or other wise) to
>> reset things. They are locked out completely. Hence, in order to
>> enable a good experience for users, the RP would like the OP to do
>> something to prove the user is really "good" before the RP will let
>> them back in. This does of course not protect against the attacker
>> going through the hoops to prove the attacker is "good", but I'd say
>> that's out of scope for this proposal.
>>
>> Thanks,
>> George
>>
>> Andrew Arnott wrote:
>>> Hi Breno,
>>>
>>> But if the RP detects malicious activity, why would it ask the OP to
>>> have the user change their password?  Isn't it too late by then, and
>>> wouldn't it be asking the malicious user to reset the password, thus
>>> locking out the real user?
>>>
>>> Also, some OPs don't even use passwords to authenticate their users,
>>> so whatever we come up with, the extension should be able to behave
>>> reasonably in that case.
>>> --
>>> Andrew Arnott
>>> "I [may] not agree with what you have to say, but I'll defend to the
>>> death your right to say it." - Voltaire
>>>
>>>
>>> On Wed, May 13, 2009 at 9:03 AM, Breno de Medeiros <breno at google.com
>>> <mailto:breno at google.com>> wrote:
>>>
>>>     Let's give a concrete scenario:
>>>
>>>     1. RP detects malicious activity on the user's account at the OP.
>>>
>>>     2. In such cases, the RP would have asked the user to reset the
>>>     password. However, this user logs in via OpenID so the RP does not
>>>     have the choice.
>>>
>>>     3. The RP puts some messaging that the user should change their
>>>     password at the OP. However, because there is no standard to even
>>>     communicate which URL at the OP the user can change password, the
>>>     experience is broken. A lot of users either don't know (without
>>> help
>>>     from the OP) how to change their passwords.
>>>
>>>     4. Users give up, or seek personal assistance.
>>>
>>>
>>>     On Tue, May 12, 2009 at 8:17 PM, Santosh Rajan
>>>     <santrajan at gmail.com <mailto:santrajan at gmail.com>> wrote:
>>>     > Wouldnt it be better if the OP took complete responsibility of
>>>     the users
>>>     > security instead of bringing the RP into the loop? OP can decide
>>>     based on
>>>     > the users usage pattern how often he must change his password
>>>     and post a
>>>     > recommendation to the user whenever he logs in.
>>>
>>>
>>>
>>>     --
>>>     --Breno
>>>
>>>     +1 (650) 214-1007 desk
>>>     +1 (408) 212-0135 (Grand Central)
>>>     MTV-41-3 : 383-A
>>>     PST (GMT-8) / PDT(GMT-7)
>>>     _______________________________________________
>>>     general mailing list
>>>     general at openid.net <mailto:general at openid.net>
>>>     http://openid.net/mailman/listinfo/general
>>>
>>>
>>> ------------------------------------------------------------------------
>>>
>>>
>>> _______________________________________________
>>> general mailing list
>>> general at openid.net
>>> http://openid.net/mailman/listinfo/general
>>>
>> _______________________________________________
>> general mailing list
>> general at openid.net
>> http://openid.net/mailman/listinfo/general
>
>
_______________________________________________
general mailing list
general at openid.net
http://openid.net/mailman/listinfo/general



More information about the general mailing list