[security] Nonrepudiation, and Trusting OpenID Providers
SitG Admin
sysadmin at shadowsinthegarden.com
Thu Dec 10 15:45:24 UTC 2009
>> If you use your email account for account recovery your email provider can
>> get access to all of your other accounts. That is one of the largest
>> security problems.
>
>Surely the problem is not that the provider can do it (yes, they can,
>but how often do they?), but that anyone you give your password away
>to can do it.
The larger (class of) problem is that any 3rd party you trust can go bad.
Controlling your own password is something you have power over, and
can probably manage regardless of whether 3rd parties are actively
cooperating. But you don't have ANY power over 3rd parties, and their
susceptibility to corruption is itself a variable that you have no
control over. OpenID tries to strike a balance between unique
passwords (to ensure no RP can pose as the user to any other RP),
which are difficult to memorize, and account individuality (where
users exist apart from their SSO OP) by enabling delegation, but how
many users actually know this feature exists, much less have it
operating that way? Especially with so many sites trying to become
OP's (when, really, all they need is an added field in the interface
for people who can't upload/modify their own HTML documents to set
OpenID headers). You'd think that the risk of employee malpractice
would have more sites encouraging users to look *elsewhere* for their
OP needs, not just be averse to the whole idea.
It might be interesting to compare how many people adopted PGP (an
identity solution without 3rd parties) at various points along its
release timeline, to how many users of OpenID adopted delegation.
-Shade
More information about the security
mailing list