Proposal: ClaimOP -- what does it buy?

Boris Erdmann boris.erdmann at googlemail.com
Tue May 15 15:43:26 UTC 2007


This post continues "Proposal: ClaimOP -- an in-band OP identity
system" and "Proposition: possible anti-phishing solution".

So what does ClaimOP provide?

It provides browsers with

a) a sure way to detect an OPs looping-in login (LIL) page
b) sure access to the credential data of a LIL page
c) enough information to validate an OP's compliance to ClaimOP.


What do we get from that?

By means of discovery/YADIS the openid identifier (and as such the
credential data) carry in-band information about where the credentials
are allowed to go to. Browsers can easily check the realms of

* the LIL page
* the form action attribute
* the discovered openid.server / openid.provider
(* a yet to be discussed "openid.cred_destination" as part of
discovery -- if we like that)

to match certain criteria. In consequence a user could never post a
password to a destination that is not authorized for a specific
OpenID.


Are there issues?

As can easily be seen, ClaimOP shifts a phisher's task from faking
(RP, OP) to faking identifiers: A malicious OP could fully comply to
ClaimOP -- but to trick a user into delivering a certain identifier's
password it has to provide an openid.identifier that

a) is under the realm of the malicious OP
b) looks similar enough to the users original openid

So a browser has to provide methods to make such fakes visible to
users. But I think that this is solvable task, since it shifts a users
focus to a well known and often verified string of characters. Two
things come to mind:

a) Browsers could always display some kind of "visual hash" next to an
identifier -- easy to remember and identify. Users would easily
recognize a change of that. (That needs to be specified)
b) Browsers could remember OpenIDs. Each first time a new openid has
to be verified by letting a user retype their id. Faked ids would be
instantly detected.

-- Boris



More information about the specs mailing list