[security] HTTP and HTTPS URL issue (was RE: security)

Dan Lyke danlyke at flutterby.com
Fri Oct 27 18:13:32 UTC 2006


On Fri, 27 Oct 2006 10:57:25 -0700, Martin Atkins wrote:
> No, it does not. Compromising the HTTP URL does *not* compromise the
> HTTPS URL in any sense.

But if you have control over the DNS when the HTTP URL is requested  
(which is what HTTPS protects against in this instance), you can  
redirect it to any HTTPS URL you wish, and that resulting URL becomes  
the claimed identifier.

So if you have control over the DNS of both the user and the Relying  
Party, you social engineer the CA into issuing a dummy cert for the  
domain to whatever IP address you've hijacked (which, actually, means  
that HTTPS buys nothing in either case).

However...

If you can gain control over the DNS of *just* the Relying Party, then  
all you need is a host which has a valid certificate (which takes me  
back to my "hijacked PC, stolen credit card and a pay phone" comment),  
and you tell the Relying Party that all addresses are approved, then  
you can log in without having to validate yourself to the Identity  
Provider.

The only place in the protocol that HTTPS actually does substantial  
good is for the initial load of the Claimed Identifier (and things  
outside of OpenID's purview, like the user's conversation with their  
Identity Provider). After that, snooping buys you nothing and DNS  
control is nothing you couldn't do *more* damage with by controlling  
the Claimed Identifier.

Dan



More information about the security mailing list