[security] passing password on identification request?
John Bradley
ve7jtb at ve7jtb.com
Mon Oct 19 18:02:12 UTC 2009
I think Fen is thinking XDI rather than XRI.
XRI is a identifier format and discovery protocol.
XRD is a RDF like data query language that makes use of XRI abstract
identifiers.
Think an advanced SPARQL with write ability.
XDI has a fine-grained identity based permissioning but still relies
on oAuth or other PKI based authentication.
John B.
On 2009-10-19, at 2:53 PM, Fen Labalme wrote:
> You might want to look at XRI which is not tied to browsers. I
> haven't been working closely with it for a while, but about a year
> ago we spec'd a way to have shared data repositories with
> permissioning. I think the DataPortability folk have been working
> on this, but since OpenID stole the spotlight from XRI I'm not sure
> there's much traction in this area yet (but there might be if more
> people ask these sorts of questions).
>
> One thing I'll say is that the example URL you presented with
> `&user=USER&pass=PASS` is very insecure for at least two reasons: 1)
> you never want to have name and password in the same message, as if
> anyone ever manages to sniff that one line, the user is fully
> compromised; and 2) requiring the user to share their password with
> the 3rd party web-service - or even the primary one - is considered
> dangerous (as John said: "Users giving there passwords to RPs is
> what openID is trying to prevent.").
>
> If you do want to take a look at XRI, note that what you really want
> is XDI (XRI Data Interchange) - see http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xdi
>
> And to answer you final question, it may be just a matter of time,
> as pieces of XRI/XDI have been finding their way into OpenID to help
> solve problems as they come up, and (of course) new solutions are
> being developed, too.
>
> hth,
> =fen
>
>
> Anthony Brassac wrote:
>>
>> I see, what's unfortunate is that openId was perfect for the needs
>> of our web application. Unfortunately it won't meet the
>> requirements of our web service, so we may actually choose to write
>> our own system now (seeing as how even oAuth needs manual logging
>> in at some point too). Though I'm surprised that we seem to be the
>> only ones with this problem, is that a technical challenge to make
>> openId more web service friendly or is that just a matter of time?
>>
>>
>> On Mon, Oct 19, 2009 at 11:40 AM, John Bradley <ve7jtb at ve7jtb.com>
>> wrote:
>> The user needs to approve the oAuth access somehow. It only needs
>> to be a web browser if you want to use openID for that.
>>
>> Sorry for the bad news, but openID requires a browser at this point.
>>
>> If you are the authenticator for the account and not a third party
>> then there are lots of ways to solve your problem, but you will
>> have to stretch to claim they have any connection to openID.
>>
>> John B.
>>
>> On 2009-10-19, at 12:28 PM, Anthony Brassac wrote:
>>
>>> But no matter what, even with oAuth I will need to log in using a
>>> web browser at some point in order to get that key/secret
>>> combination, won't i? Unless there are providers that offer
>>> programmatic log in?
>>>
>>> I have a feeling we are going to end up having to write something
>>> ourselves :S
>>>
>>>
>>> On Thu, Oct 15, 2009 at 11:54 AM, John Bradley <ve7jtb at ve7jtb.com>
>>> wrote:
>>> You can have the user authenticate to the oAuth provider via
>>> openID if it is a condition of the grant:)
>>>
>>> That may be the best way to do it anyway depending on how the app
>>> is configured.
>>>
>>> John B.
>>>
>>> On 2009-10-15, at 12:00 PM, Anthony Brassac wrote:
>>>
>>>> Thanks all for your replies, oAuth looks like it could do it for
>>>> us, however it seems management had agreed upon using OpenID
>>>> (research grant related I think), so I'll have to see what gives.
>>>> Anyway, I appreciate your support.
>>>>
>>>> On Wed, Oct 14, 2009 at 1:47 AM, SitG Admin <sysadmin at shadowsinthegarden.com
>>>> > wrote:
>>>> Users giving there passwords to RPs is what openID is trying to
>>>> prevent.
>>>> That is why passwords are not supported in the redirect.
>>>>
>>>> Hmm . . . minor clarification here, though: users giving
>>>> passwords *their passwords for the OP* (or otherwise transmitting
>>>> "in the clear") is not compatible with OpenID.
>>>>
>>>> If the RP wants to ask for another password (one local to that
>>>> system), e.g. for rarely invoked high levels of access, it
>>>> *might* be compatible with OpenID (depends on the exact use, but
>>>> isn't automatically NOT compatible).
>>>>
>>>> The description Anthony gave sounds vaguely like Kerberos (from
>>>> the MIT dialogue), but my mind is stuffed full of other things
>>>> right now and I get a bit of a headache just getting some meaning
>>>> out of roughly half of it (the rest seems beyond me tonight).
>>>>
>>>> -Shade
>>>>
>>>> _______________________________________________
>>>> security mailing list
>>>> security at lists.openid.net
>>>> http://lists.openid.net/mailman/listinfo/openid-security
>>>>
>>>
>>>
>>
>>
>>
>> _______________________________________________
>> security mailing list
>> security at lists.openid.net
>> http://lists.openid.net/mailman/listinfo/openid-security
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20091019/2d55d069/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2468 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20091019/2d55d069/attachment-0001.bin>
More information about the security
mailing list