[OpenID] Graphical UIs

Nate Klingenstein ndk at internet2.edu
Fri May 15 14:49:24 UTC 2009


Andrew,

> Thanks for trying to explain it Nate.  Actually what I was wondering  
> is why OAuth must be part of the request at all.

I was interested in leveraging existing whitelists, because it seems  
like maintaining multiple sets of bilateral agreements is redundant  
and cumbersome*2.

> There's been talk on this thread of bringing OAuth into it so that a  
> signed message from the RP can be sent to the OP.  First of all,  
> using OAuth just for its signing seems like a misuse.  The OpenID 
> +OAuth extension that you described doesn't sign the request at  
> all.  And finally, it escapes me why the request needs to be signed  
> at all.  If an attacker were to form a request to look like it came  
> from a legitimate company, then the assertion would go to that  
> legitimate company (assuming RP discovery and return_to matching was  
> successful) and the attacker would have gained nothing.

I agree with all this.  Signing authentication requests is (mostly,  
with the exception of a few very fringe use cases) worthless in  
general, and a potential DoS risk to boot.

Humanized pre-registration would prevent an attacker from receiving  
any authentication information at all, even if it successfully created  
a request pointing at itself with an arbitrary logo displayed to the  
user.  If it's able to register itself with no interaction, or the OP  
is in promiscuous mode, then even that benefit is gone.

> So why must OAuth be part of login just so that logos from the RP  
> can show up at the OP?


There really is no way to get out of this without some form of trust  
fabric.  Since apparently the hybrid doesn't offer one either in spec  
nor in practice, I see no protection as currently formulated.

Take care,
Nate.



More information about the general mailing list