[security] [OpenID] OpenId Association Timeout Recommendations
David Fuelling
sappenin at gmail.com
Tue Feb 6 14:43:58 UTC 2007
Hey Hans,
Thanks for your input on this!
Can you elaborate on this attack a bit more? What would the MITM gain by
sending a fake "valid" response, when the OP actually sent "invalid" (or
vice versa)?
Also, why is the assoc step harder to MITM? Isn't there a DH computation on
both the direct verification step and the association step?
Thanks!
David
> -----Original Message-----
> From: Granqvist, Hans [mailto:hgranqvist at verisign.com]
> Sent: Monday, February 05, 2007 3:03 PM
> To: thayes0993 at aol.com; sappenin at gmail.com; general at openid.net;
> security at openid.net
> Subject: RE: [OpenID] OpenId Association Timeout Recommendations
>
> A MITM can easily change any is_valid value since those responses are
> unprotected.
>
> There is a MITM attack on the association step, but it is much harder, as
> it
> requires DH computation and state keeping for later authentication steps.
> There are also DH variants that are more resilient to MITM attacks (SRP
> anyone? ;), and such can be added as mechanisms to the protocol.
>
> In reality Direct Verification is useless. Very few RPs use secure
> channels.
> The message floats unprotected through the network of tubes.
>
> Direct verification gives an attacker an incredibly simple way to
> downgrade
> the protocol without either the OP nor the RP being any wiser.
>
> What attacker wouldn't love that?
>
> Hans
>
>
>
>
> ________________________________
>
> From: thayes0993 at aol.com [mailto:thayes0993 at aol.com]
> Sent: Monday, February 05, 2007 11:30 AM
> To: Granqvist, Hans; sappenin at gmail.com; general at openid.net;
> security at openid.net
> Subject: Re: [OpenID] OpenId Association Timeout Recommendations
>
>
> Hans,
>
> Using the direct verification is not a "less secure mode".
> Association handles provide a way to reduce the cost of verification by
> eliminating one set of messages from the flow. However, the association
> is established using the same basic message exchange as the verification
> itself, and so is neither more or less secure.
>
> Terry
>
>
>
> -----Original Message-----
> From: hgranqvist at verisign.com
> To: sappenin at gmail.com; general at openid.net; security at openid.net
> Sent: Mon, 5 Feb 2007 11:13 AM
> Subject: Re: [OpenID] OpenId Association Timeout Recommendations
>
>
> > I'm wondering if anyone has an opinion on a "recommended"
> > association timeout for OpenId OP/RP implementations?
>
> David,
>
> There is a slight problem with shared secrets in the OpenID
> authentication protocol.
>
> Generally you want to make the lifespan of shared secrets as short
> as possible to reduce risk.
>
> However, according to the OpenID protocol, when the RP uses an
> expired
> association handle, the OP should proceed as if no association
> handle
> was provided, which will then lead to the obvious security risks(*)
> related with direct verification:
> <http://openid.net/specs/openid-authentication-2_0-
> 11.html#check_auth>
>
> That's the Catch-22: You will want the shared secret to live for
> a short time, but you don't want to risk reducing the authentication
> flow into a less secure mode.
>
> One way to implement a more secure OP is to refuse some
> security reductions of the protocol:
>
> * require valid associations, and
> * respond with negative assertion (should the assertion be
> invalid)
>
> AFAIK, the language of the spec, with MAYs and SHOULDs, lets you do
> this and still remain compliant.
>
>
> -Hans
>
> (*) meaning the fact that the OP responds whether the signature
> was okay with an unsigned yes/no
>
>
> >
> > I think it takes something like 2^80 operations to brute
> > force SHA1 (the least secure OpenId HMAC Association type).
> > Supposedly, in 2005 SHA1 was "sort of" broken by a Chinese
> > researcher (see here:
> > http://www.schneier.com/blog/archives/2005/02/sha1_broken.html
> ) but according to Bruce Schneier, HMAC is not affected by this >
> development (only digital signatures are).
> >
> > All that to say, it seems like it would still take a long
> > time to brute force an SHA1 association (SHA256 even longer),
> > so I'm wondering what people's thoughts are where OpenId
> > implementation should set this number by default.
> >
> > For example, one of the most popular Java OpenId 2.0
> > implementations currently uses a 30 minute expiration. What
> > about 3 days? 7 days? Longer?
> >
> > I guess I'm trying to figure out where the "balance between
> > security and convenience" decision should be made.
> >
> > Thanks for your input!
> >
> > David
> >
> > _______________________________________________
> > general mailing list
> > general at openid.net <mailto:general%40openid.net>
> > http://openid.net/mailman/listinfo/general
> >
> _______________________________________________
> general mailing list
> general at openid.net <mailto:general%40openid.net>
> http://openid.net/mailman/listinfo/general
>
> ________________________________
>
> Check out the new AOL
> <http://pr.atwola.com/promoclk/1615326657x4311227241x4298082137/aol?redir=
> http%3A%2F%2Fwww%2Eaol%2Ecom%2Fnewaol> . Most comprehensive set of free
> safety and security tools, free access to millions of high-quality videos
> from across the web, free AOL Mail and more.
>
More information about the security
mailing list