Proposal: An anti-phishing compromise

Recordon, David drecordon at verisign.com
Fri Feb 9 07:38:47 UTC 2007


Rogue RPs can already go and find RPs out there and manually look to see which just use usernames and passwords.  I don't see how providing this information actually makes the issue worse.  I agree that it makes it more apparent, but I'd hope that it would scare users and get them to go use a better OP.  An OP lying only hurts its users.

--David 

-----Original Message-----
From: specs-bounces at openid.net [mailto:specs-bounces at openid.net] On Behalf Of Claus Färber
Sent: Friday, February 02, 2007 5:01 AM
To: specs at openid.net
Subject: Re: Proposal: An anti-phishing compromise

Recordon, David <drecordon at verisign.com> schrieb/wrote:
> Add a single, required, boolean field to the authentication response 
> that specifies whether or not the method the OP used to authenticate 
> the user is phishable. The specification will have to provide 
> guidelines on what properties an authentication mechanism needs to 
> have in order to be "non-phishable." The field is just meant to 
> indicate that the authentication mechanism that was used is not a 
> standard "secret entered into a Web form."

What should the RP do with that flag? If they lock out users who are "phishable", OP will simply start to lie about their "non-fishability".

The main problem, however, is that it actually adds to the phishing problem by providing rouge RPs valueable information about security risks.

Claus


_______________________________________________
specs mailing list
specs at openid.net
http://openid.net/mailman/listinfo/specs



More information about the specs mailing list