Fwd: OSIS PAPE call results
David Recordon
drecordon at sixapart.com
Mon Nov 5 13:37:22 UTC 2007
Hey all,
It turned out that from the OSIS interoperability event in Barcelona a
call was scheduled to discuss PAPE issues from the interop. I heard
about the call a few minutes before, but Mike, Johnny, and I had a
really productive call. If no one disagrees, we should get these
edits into the spec and release draft 3.
Thanks,
--David
Begin forwarded message:
> From: Mike Jones <Michael.Jones at microsoft.com>
> Date: November 1, 2007 10:04:02 PM GMT+01:00
> To: "david at sixapart.com" <david at sixapart.com>, Johnny Bufu <johnny at sxip.com
> >, "osis-general at netmesh.org" <osis-general at netmesh.org>
> Subject: OSIS PAPE call results
>
> Today we held the call discussing OSIS feedback on the PAPE spec.
> Topics covered and recommendations made on the call were:
>
> - Authorization decisions should be made solely by the relying
> party. The identity provider should accurately report the status of
> all policies requested by the relying party that the authentication
> complies with and may also choose to report the status of any
> policies that apply that were not explicitly requested. The
> policies are not mutually exclusive and no relationship between the
> different policies should be implied. A clarification to this
> effect should be added to the draft.
>
> - There was a request for a definition of Active Authentication as
> used in the auth_time element description. Intuitively, this
> involves at least having the user being at the machine as a
> participant in the authentication interaction in some manner. We
> agreed that we should look for an existing definition of active
> authentication that appears to apply.
>
> - The table in Appendix A.1.1 of http://openid.net/specs/openid-provider-authentication-policy-extension-1_0-02.html
> needs to be updated to be consistent with the definition in Section
> 4. Specifically:
> PIN and soft OTP token should not be marked as phishing-
> resistant.
> PIN and hard OTP token should not be marked as phishing-
> resistant.
> Information Cards should be added and listed as phishing-
> resistant.
> Active password managers that only release the password
> to the correct site should be listed as phishing-resistant.
>
> - If relying parties and OPs want to communicate actual
> authentication methods used, that should happen via a different spec
> than PAPE. Then the market can decide whether to use PAPE, this
> spec, both, or neither. (However some in the group have both
> privacy concerns about this and concerns about enabling attackers by
> giving them additional information to use in their attacks.)
>
> Finally, while we failed to discuss this on the call, I also believe
> that:
> PIN and digital certificate via HTTPS is phishable if
> the same certificate value is released to every site.
> PIN and digital certificate via HTTPS is not phishable
> if a different certificate value is released to every site.
> and that the table should be updated accordingly in this case as
> well. Someone who's an expert in this method should pipe in and
> provide guidance.
>
> Thanks all!
> -- Mike
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs/attachments/20071105/32522841/attachment-0001.htm>
More information about the specs
mailing list