[OpenID] Abusing Authentication Failure messages
SitG Admin
sysadmin at shadowsinthegarden.com
Sun Aug 22 17:36:40 UTC 2010
>>It sounds like you have multiple topics in your email now.
>
>I was clearly introducing the issue.
Not clearly enough, apparently.
Maybe we're just too stupid to have readily understood you.
>session management at the RP's side would definitely be helped by
>this as well; being able to cache request discovery information for
>matching against a response in a set hashed by ID.
Caching of OP discovery only speeds user access: the RP can perform
discovery while the user's browser waits the RP to respond. No
security is added, and [user] sessions would not help users who
arrived at the site *from* the OP (initiating login from there).
>However, consider the fact that association is optional, signing
>(even without association) is optional,
For assertions of success, the RP (by spec) MUST verify that the
signature is valid (see sections 11 and 11.4 of v2.0 for more
details). It is only for assertions of failure that the spec does not
mandate checking signatures (although the Protocol Overview does give
that impression).
>responses are allowed to be sent over clear-text transports
>(revealing identity information to intermediate parties)
I have noted this problem before. However, the freedom OpenID affords
users also carries a burden of responsibility: if YOU are going to
select your own provider, then YOU are going to need to decide which
features YOU want, and YOU will have to evaluate OP's to find out
whether they meet YOUR standards . . . then, if you can't find one,
YOU get to create your own that does. Isn't self-agency fun?
The catch is that your own standards can't be imposed upon others.
This is also a feature (it's what keeps OP's from falling back to
plaintext if a RP insists on not accepting encryption), but it keeps
ethics out of the law - or specs, in this case. OpenID establishes a
minimum to have the technical side work, and then leaves the rest
optional - if you want your OP to decide between authenticating you
or not authenticating you by having one thousand monkeys flip a coin,
and then checking the parity bit, you can do that. No one else can
stop you. RP's can decide to reject responses from your OP, but they
can't force RP's who are fine with it to stop anyway. Users can send
their personal information over plaintext channels, if they like it
that way, and OpenID won't tell them "Around here we don't let you do
this: find a different protocol."
>As an end-user, I would trust a site that claimed OpenID support to
>guard my safety and privacy more if I knew the specification
>required it to be stringent in the above matters.
The spec offers one way to do so; insisting that all redirects be
targeted to SSL is another. Making it COMPULSORY in the spec would
harm interop.
What you have here is a legal issue: does your contract with the site
*require* it to guard your safety and privacy? If it doesn't clearly
tell you what steps it is taking to do so, perhaps you should
investigate. If they are unable or unwilling to answer your
questions, perhaps your trust would have been misplaced anyway.
-Shade
More information about the general
mailing list