[OpenID] Convert claimed_id to pseudonym at RP, not OP

John Bradley ve7jtb at ve7jtb.com
Sat Sep 12 16:54:18 UTC 2009


I managed to keep unsolicited positive assertions from being  
prohibited by the profile.

We have never done much with them other than some demos of OP bookmarks.

I think they are going to be more useful to people who are developing  
things like IDIB plugins.

In principal you may be able to chain IdP.

The thing that will catch you up is the TFAP not the technical profile.

The provider needs to prove via audit that there is a less than 1 in  
1024 chance of the account being brute forced during the lifetime of  
the primary authenticator token (password).

A IdP won't be able to say that if they don't know the password  
entropy policy of the upstream IdP.

If the upstream IdP are themselves certified I could see that argument  
perhaps working.

I would try and get it approved at least (Remember I have no authority  
over anything)

I don't know why this is better than binding multiple IdP to the same  
RP.  You still run the risk of the proxy going out of biz.

Remember we are talking about LoA 1 here.

The gov is not worried about people loosing access to these RP accounts.

According to OMB 04-04 a LoA 1 authentication can not be used to  
protect personal information.

We are taking about account customization bookmarking and other sorts  
of uses.

The other way of expressing LoA 1 is that you expect approx 1 in 1K  
accounts to be compromised.
The expectation is that they are not secure.  That is why identity  
proofing is considered almost counter productive at LoA 1.

There is no protection from Phishing, eavesdropping or any number of  
other things that are covered in higher LoA.

That isn't to say that openID can't be secure, only that LoA 1 doesn't  
require it to be very secure.

The basic principal is that RP's shouldn't store information that harm  
will come from it being disclosed or lost in LoA 1 applications.

That is why additional account recovery requirements were not part of  
the profile.

The profile mostly attempts to close the obvious security holes and  
provide for user privacy protection.
It constrains IdP on what they can do with the information they get  
about what Gov sites users visit etc.

It is only a first step.  A good one but only the first for openID.

John B.
On 2009-09-12, at 1:12 AM, Peter Williams wrote:

> One option to retain portability, especially since idp initiation is
> permitted, is to do idp chaining. To retain portability, users can
> assert to a non .gov rp, that links several of the user's ppids to one
> account, and which turns around and asserts a new ppid to the .gov  as
> a whitelisted/audited idp.
>
> The commercial op cannot object, as the profile considers end user
> info to be self asserted (not idp asserted). The .gov whitelisting
> rules might be set to deny this (even tho it does not prejudice the
> privacy policy of . Gov). It will be quite telling if they do....
>
> One cannot really judge the profile in the absence of the audit
> criteria.
>
>
>
> On Sep 9, 2009, at 10:48 PM, "Manger, James H" <James.H.Manger at team.telstra.com
>> wrote:
>
>>
> _______________________________________________
> general mailing list
> general at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-general



More information about the general mailing list