[security] OpenID Security Best Practices Doc
Allen Tom
atom at yahoo-inc.com
Tue Jun 9 05:04:50 UTC 2009
Hi Andrew,
Are the RP's nonces vulnerable to MITM attacks? For instance, if the
attacker was able to sniff the nonce in the RP's return_to, then
presumably, the attacker would be able to replay it?
I guess tying the nonce to the browser's IP address would be sufficent,
although if there's a MITM, the attacker presumably controls the IP
address as well.
Allen
Andrew Arnott wrote:
> Yes, DotNetOpenAuth RPs attach their own nonces to their return_to's
> when communicating with 1.0 OPs
> <http://blog.nerdbank.net/2009/03/replay-protection-for-openid-1x-relying.html>.
> It would be a simple matter to expand the scenarios it activates this
> behavior for if necessary.
>
> --
> Andrew Arnott
> "I [may] not agree with what you have to say, but I'll defend to the
> death your right to say it." - S. G. Tallentyre
>
>
> On Mon, Jun 8, 2009 at 4:47 PM, John Bradley <jbradley at mac.com
> <mailto:jbradley at mac.com>> wrote:
>
> The other approach that has been used to secure 1.1 RP's is to
> place a signed nonce in the nonce in the return_to URI. The RP
> verifies its own sig.
>
> I believe this is an option in DotNetOpenAuth for openID as well.
>
> This removes the need for the RP to synchronize data across
> servers. This assumes properly configured load balancers though.
>
> That is one other approach.
>
> John B.
> On 8-Jun-09, at 7:35 PM, Allen Tom wrote:
>
>> Hi Johannes,
>>
>> My personal opinion is that if HTTPS is used for the entire
>> protocol flow, including the RP's return_to URL, then the RP
>> should be able to verify that the timetamp in the nonce is
>> current, to within a few minutes, as opposed to having to verify
>> that the entire nonce is truly unique.
>>
>> Allen
>>
>>
>>
>> Johannes Ernst wrote:
>>>
>>> On Jun 8, 2009, at 15:50, Allen Tom wrote:
>>>
>>>>> 6) Pull the replay warning into its own bullet, and mention
>>>>> the use of a timestamp to bound the time nonces must be stored
>>>>> for.
>>>> [atom] Also a good point. On a related note, many large
>>>> globally distributed RPs may have a hard time implementing
>>>> nonces as per the OpenID spec, as it's technically tricky to
>>>> globally replicate data, especially if it needs to be
>>>> replicated very quickly. In practice, RPs may only find it
>>>> practical to verify that the timestamp is "current" as opposed
>>>> to actually verifying that the nonce is can only be used once.
>>>
>>> In this case, do these mythical "globally distributed RPs" have
>>> a better approach for avoiding replay attacks or do they simply
>>> swallow that risk because no better approach is known.
>>>
>>> Just wondering ...
>>>
>>>
>>>
>>>
>>>
>>> Johannes Ernst
>>> NetMesh Inc.
>>>
>>>
>>> ------------------------------------------------------------------------
>>>
>>> <mime-attachment.gif>
>>>
>>>
>>>
>>> ------------------------------------------------------------------------
>>>
>>> <mime-attachment.gif>
>>>
>>> http://netmesh.info/jernst
>>>
>>>
>>>
>>
>> _______________________________________________
>> security mailing list
>> security at openid.net <mailto:security at openid.net>
>> http://openid.net/mailman/listinfo/security
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20090608/41696b74/attachment.htm>
More information about the security
mailing list