[security] MyOpenID

Scott Kveton scott at janrain.com
Wed Mar 21 19:25:36 UTC 2007


Just as a quick update, we have the MyOpenID team looking very closely at
this and they are working with Gareth on it to pinpoint the exploit/problem.
Right now it appears to be a Safari-only exploit ... No matter what, we'll
get a fix out as well as publish the details.

Gareth: you've been great on this so far ... Thanks so much for showing
reserve in publishing the exact exploit.

- Scott




On 3/21/07 12:18 PM, "gaz_sec at hushmail.com" <gaz_sec at hushmail.com> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> The site checks the session and also uses a unique session token.
> 
> You have to be logged onto the OpenID server in order for this to
> work.
> 
> On Wed, 21 Mar 2007 19:09:13 +0000 thayes0993 at aol.com wrote:
>>> 2. The second problem is more serious you can create a specially
>>> crafted web page to automatically log on to a web site and also
>> add
>>> that web site to the allow forever trusted site. The only
>>> requirement is that you have to be logged onto the OpenID
>> server.
>> 
>> This case I don't understand well. If the provider prevents replay
>> attacks of trust dialogs with the user (e.g. nonce in form) and
>> requires
>> the request to come from the user agent with a valid session, how
>> could
>> a remote site establish such permanent trust?
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> I would assume this is a bug in the OP, which is probably
>> accepting a POST without any credentials other
>> than a session cookie.
>> 
>> Terry
>> 
>> 
>> 
>> 
>> 
>> -----Original Message-----
>> From: Paul C. Bryan <email at pbryan.net>
>> To: gaz_sec at hushmail.com
>> Cc: security at openid.net
>> Sent: Wed, 21 Mar 2007 10:50 am
>> Subject: Re: [security] MyOpenID
>> 
>> 
>> 
>> On Wed, 2007-03-21 at 13:33 +0000, gaz_sec at hushmail.com wrote:
>> 
>>> 1. First of all if you sign into a OpenID server in this case
>>> (MyOpenID.com) then logon to an OpenID enabled site like
>>> (http://ficlets.com/) then sign out of the OpenID enabled site.
>> It
>>> is possible to log them back onto the site from any remote web
>> site.
>> 
>> Presumably, this is true only:
>> 
>> a) as long as I am still logged into the OpenID provider,
>> b) the remote site knows the OpenID login URL of the client site.
>> 
>> Correct? The risk here is that I would have a session with the
>> client
>> site without explicitly asking for it?
>> 
>>> 2. The second problem is more serious you can create a specially
>>> crafted web page to automatically log on to a web site and also
>> add
>>> that web site to the allow forever trusted site. The only
>>> requirement is that you have to be logged onto the OpenID
>> server.
>> 
>> This case I don't understand well. If the provider prevents replay
>> attacks of trust dialogs with the user (e.g. nonce in form) and
>> requires
>> the request to come from the user agent with a valid session, how
>> could
>> a remote site establish such permanent trust?
>> 
>>> Both cases can be prevented if the OpenID specification requires
>>> authorisation regardless of a cached token.
>> 
>> I think the second case already requires authorization by the
>> user.
>> Properly developed providers should ask for the user to grant
>> trust to
>> the consumer site, and not be susceptible to crafted requests to
>> bypass
>> user dialog.
>> 
>> Paul
>> 
>> _______________________________________________
>> security mailing list
>> security at openid.net http://openid.net/mailman/listinfo/security
>> 
>> 
>> ___________________________________________________________________
>> _____
>> AOL now offers free email to everyone.  Find out more about what's
>> free from AOL at AOL.com.
> -----BEGIN PGP SIGNATURE-----
> Note: This signature can be verified at https://www.hushtools.com/verify
> Version: Hush 2.5
> 
> wpwEAQECAAYFAkYBhO0ACgkQrR8fg3y/m1BGlAQAk9kND4cY7HcJLH+o9/ukFp9hV1v/
> qYuL79n1BNSDDWMYjQpY9qWB3Lvc1KqAAGESUYnvzPeNNGgKKCOIP+oPi4DHBcy+GrwG
> Et74N6G4p4UQ6GEbS4747lzbXXJklNgJQgabgzNiO1dFDBMwIwlMpS2KcgFdTtQ+IMTu
> AU6i9co=
> =J+64
> -----END PGP SIGNATURE-----
> 
> --
> Click to find great rates on life insurance, save big, shop here
> http://tagline.hushmail.com/fc/CAaCXv1QSYQdlVKDzE49AnrgfbvX7BCN/
> 
> 
> _______________________________________________
> security mailing list
> security at openid.net
> http://openid.net/mailman/listinfo/security
> 




More information about the security mailing list