[OpenID] security weakness regarding authentication of the relying party
SitG Admin
sysadmin at shadowsinthegarden.com
Thu Jan 20 20:23:05 UTC 2011
At 11:09 AM -0800 1/18/11, Francisco Corella wrote:
>The first problem is what you say, users may be duped by
>similar-looking domain names. This may not be a protocol
>error, but it is an exploitable security weakness, and one
>that can be addressed: there are better ways of identifying
>the relying party to the user than a domain name.
Domain names scarcely have a collision-free namespace as it is! If
there are two strong, thriving communities at ABC.net and ABC.com,
the domain names *are* identical in one respect, but neither is about
to stop calling itself "ABC" or cease being associated with that
acronym. Shifting away from the protocol-based security check (having
users pay attention to domain names), while merely transforming how
the namespace collision problem *looks*, seems to be of limited
utility - better the devil we've already audited.
At 3:45 PM -0500 1/18/11, Paul E. Jones wrote:
>Let's assume we mandated use of HTTPS. What are the other issues?
>I'm still not sure what they are.
It would tie OpenID to a (semi-)centralized(*) system. This could be
mitigated with a plugin for Web of Trust.
(*Any rogue CA can act freely against all the others' votes, because
they don't get any.)
-Shade
More information about the general
mailing list