[security] PAPE Policy for RPs to force authentication without browser cookie

Allen Tom atom at yahoo-inc.com
Wed Jul 1 05:22:00 UTC 2009


Hi Dick,

Welcome back! My comments inline:

Dick Hardt wrote:
>
> On 30-Jun-09, at 9:23 PM, Allen Tom wrote:
>
>>
>> Another case is where the RP specified max_auth_age=999999999999. The 
>> PAPE spec requires the OP to respond back with the the time the user 
>> last authenticated, if the max_auth_age is greater than the duration 
>> of the user's current session with the OP. This effectively gives the 
>> RP a way to find out when the user last signed in, which potentially 
>> violates the user's privacy.
>
> Rather then return the time the user last authenticated, the OP return 
> the max_auth_age value the RP sent. This lets the RP know the OP 
> honored the RP's max)_auth_age request.
Well, if the RP is deliberately violating the user's privacy to find out 
when the user authenticated at the OP, it could send multiple 
checkid_immediate requests, decrementing the max_auth_age value each 
time, until it found the real value.


>
> What are you looking for in this use case where the IP address changes?

Sites that force the password to be re-verified before entering a 
sensitive flow often require that the user's IP address remain fixed 
throughout the flow, or else they'll require the user to re-authenticate.

If the OP authenticates the user and generates the assertion in two 
separate screens (as appears to be the most common case), there is an 
edge case where the user's IP address could have changed after the user 
authenticated. For instance, the user is on wifi, and enters their 
password while on one wifi network, and then and then roams to a new 
wifi network while on the OP's approval screen.  If the RP was not using 
OpenID, and instead authenticated the using a local password, this IP 
address change would invalidate the user's session. It would be nice to 
keep this functionality in OpenID.

Allen







More information about the security mailing list