[security] Open Redirector issue with checkid_immediate

David Recordon david at sixapart.com
Mon Jun 8 23:31:59 UTC 2009


Yes, I think RP discovery definitely allows OPs a way to help limit  
these redirects to actual RPs if they are concerned about this case.   
I certainly wouldn't put signed requests into the 2.1 bucket, but I do  
think that there are definite tradeoffs around OpenID's design and  
flexibility compared to concerns such as this one.  I do however  
believe this to be fairly well known already by OpenID Providers  
already, at least the large ones.

--David

On Jun 8, 2009, at 2:39 PM, John Bradley wrote:

> Allen,
>
> I will bite.
>
> A checkid_setup will do the same thing at most OP's if the user has  
> elected to remember the RP.
>
> A feature/flaw of openID is that requests are not signed in any way.
>
> If an OP is to ever trust any request as coming from the RP  
> indicated by the realm/return_to then this will need to be addressed.
>
> Given that checkid_immediate is generally no worse than  
> checkid_setup,  is forcing a user dialog for checkid_setup and  
> eliminating checkid_immediate too big a loss of functionality  
> compared to the risk presented to users.
>
> Perhaps a intermediate measure would be for the OP to error if RP  
> discovery fails for a checkid_imediate.
>
> That at least limits the possible redirect targets to OP's return_to  
> URI.
>
> I suspect that RP discovery is the short term answer and the long  
> term is signed requests of some sort in openID 2.1.
>
> John  B.
> On 8-Jun-09, at 5:11 PM, Allen Tom wrote:
>
>> Hi All,
>>
>> I believe that everything in the Security Best Practices document  
>> has already been discussed publicly, except for the  
>> checkid_immediate "open redirector" issue listed in the OP Best  
>> Practices section.
>>
>> In a nutshell, checkid_immediate can be used as an open redirector,  
>> forcing the OP to redirect the browser with the response to the  
>> return_to URL. This interface can potentially be misused to make  
>> checkid_immediate behave similarly TinyURLs, in which an attacker  
>> could obfuscate a link by hiding it behind an OP's  
>> checkid_immediate interface.
>>
>> If anyone would like to discuss using checkid_immdiate as an Open  
>> Redirector, this we should do it here.
>>
>> Thanks
>> Allen
>>
>>
>>
>> _______________________________________________
>> security mailing list
>> security at openid.net
>> http://openid.net/mailman/listinfo/security
>
> _______________________________________________
> security mailing list
> security at openid.net
> http://openid.net/mailman/listinfo/security

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20090608/10179dbf/attachment.htm>


More information about the security mailing list