[security] Phishing issues with return_to url and realm

Dick Hardt dick at sxip.com
Fri Feb 9 05:44:39 UTC 2007


On 8-Feb-07, at 5:36 PM, Allen Tom wrote:

> Dick Hardt wrote:
>>
>> On 8-Feb-07, at 5:03 PM, Allen Tom wrote:
>>
>>> Hi Johnny,
>>>
>>> If the OP verifies the return_to by following all redirects until  
>>> reaching the destination, then an evil RP could craft an Auth  
>>> Request with the following parameters:
>>>
>>> realm=*.goodsite.com
>>> return_to=man.in.middle.redirect.com/legit_return_to.goodsite.com
>>
>> In this example, if the realm is not contained in the domain of  
>> the return_to, the OP would report an error to the user.
> There could be several levels of redirection, so depending on how  
> the spec is phrased, the evil RP could instead do:
>
> realm=*.goodsite.com
> return_to=redirector.goodsite.com/evilrp.com/legit.goodsite.com

I don't follow how the OP checking would not be caught. Likely we  
need to be specific on what the OP is  doing.

>
> Anyway, allowing redirects in the return_to makes each intermediate  
> host a man in the middle. At the very least, the top level url in  
> the return_to should be able to verify that it's acutally an Open  
> ID 2.0 entrypoint, and it might even be desirable for the OP to be  
> able to verify the association that it has with it. For example,  
> the OP could ask the RP to tell it its association handle, or  
> perhaps to verify that it knows the secret for the given handle.

Doing some RP verification at association time has benefits, but it  
is not needed by the protocol as currently speced, so it would only  
be optional. Of course requiring verified associations could be part  
of a phishing-resistant profile.

Do you have a specific suggestion Allen?

-- Dick




More information about the security mailing list