[security] Gathering requirements for in-browser OpenID support

Joaquin Miller joaquin at netmesh.us
Sun Oct 29 15:34:28 UTC 2006


>Besides - and the most important thing really - there's no such 
>thing that *I've* ever heard of that *can* be put into any protocol 
>to prevent MitM attacks from succeeding.  If user A doesn't check 
>their URL says site B when user A thinks they're on site C - then 
>site B can merely proxy anything site C puts up, stealing whatever 
>they want in the process.

I trust the security experts are enjoying the fine weather this 
weekend.  I know I should wait for one of them to respond to this, 
but... golly gee, whillikers!

Use of a public key known to be authentic prevents man in the middle 
attacks from succeeding.

Cordially, Joaquin



(p.s. Please don't anyone identify use of public/private key pairs 
with whatever they are calling "PKI.")
(p.p.s.  Notice: All I claim above is: Use of a public key known to 
be authentic prevents man in the middle attacks from succeeding.)
(p.p.p.s If I'm wrong on this , let's wait until one of the experts 
corrects me.)
(p.p.p.p.s  Yes, if you want to nail me now, I'm wrong; for example: 
http://www.schneier.com/paper-chosen-protocol.pdf .)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20061029/d8568a34/attachment-0002.htm>


More information about the security mailing list