[security] Open Redirector issue with checkid_immediate

John Bradley jbradley at mac.com
Mon Jun 8 21:39:04 UTC 2009


Allen,

I will bite.

A checkid_setup will do the same thing at most OP's if the user has  
elected to remember the RP.

A feature/flaw of openID is that requests are not signed in any way.

If an OP is to ever trust any request as coming from the RP indicated  
by the realm/return_to then this will need to be addressed.

Given that checkid_immediate is generally no worse than  
checkid_setup,  is forcing a user dialog for checkid_setup and  
eliminating checkid_immediate too big a loss of functionality compared  
to the risk presented to users.

Perhaps a intermediate measure would be for the OP to error if RP  
discovery fails for a checkid_imediate.

That at least limits the possible redirect targets to OP's return_to  
URI.

I suspect that RP discovery is the short term answer and the long term  
is signed requests of some sort in openID 2.1.

John  B.
On 8-Jun-09, at 5:11 PM, Allen Tom wrote:

> Hi All,
>
> I believe that everything in the Security Best Practices document  
> has already been discussed publicly, except for the  
> checkid_immediate "open redirector" issue listed in the OP Best  
> Practices section.
>
> In a nutshell, checkid_immediate can be used as an open redirector,  
> forcing the OP to redirect the browser with the response to the  
> return_to URL. This interface can potentially be misused to make  
> checkid_immediate behave similarly TinyURLs, in which an attacker  
> could obfuscate a link by hiding it behind an OP's checkid_immediate  
> interface.
>
> If anyone would like to discuss using checkid_immdiate as an Open  
> Redirector, this we should do it here.
>
> Thanks
> Allen
>
>
>
> _______________________________________________
> security mailing list
> security at openid.net
> http://openid.net/mailman/listinfo/security

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20090608/63e731e6/attachment.htm>


More information about the security mailing list