[OpenID] OpenID + Government

John Bradley john.bradley at wingaa.com
Fri Aug 14 16:32:58 UTC 2009


Peter,

Perhaps it is better to say that peoples perception of SP800-63 is  
broken.

Profiles for the GSA based on SP800-63 and OMB 04-04 are not silver  
bullets.

They do nothing for email verification in themselves.

If people want profiles that deal with those issues they need to  
create them.

This issue is not unique to openID.   INCommon has been certified with  
NIH for a while now.

They still have a hard time getting people to understand that LoA 2  
doesn't specify attribute proofing,  only identity proofing.   People  
are still debating what attributes constitute an identity.

To be useful in the commercial world there needs to be profiles and  
certification practices that address real issues.

The GSA profile is this community putting one toe into that water.

There is nothing to stop there being a openID profile for verified  
attributes based on the LoA 1 profile.

Someone needs to do the profile and set up a certification program for  
OP's and RP's.

There are big questions around who should do it and who should pay.

Trust issues are hard and have been out of scope for openID to this  
point.  That may well be part of it's success.

Is GSA LoA 2 certification for openID a good thing?  Yes.
Will it solve any of our pressing problems on its own?  Probably not.

John B.
On 14-Aug-09, at 8:44 AM, Peter Williams wrote:

> Its not necessarily broken. These things are designed to be  
> composed. If any one agency goes for pre-eminence, it will restart  
> the inter-agency wars that made all the previous rounds of this same  
> underlying initiative largely ineffective.
>
>
>
> 1. from the smartcard hardware/firmware assurances you get http://www.commoncriteriaportal.org/files/epfiles/cible2005_05.pdf
>
>
>
> 2. from the crypomodule assurance you get the entries on the like of http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2009.htm 
> . For example the functional groups of http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp575.pdf
>
> 3 from the cipher validation (e.g. HMAC) you get http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html
>
> 4 from the cps, you get identity proofing http://mattche.iiie.disa.mil/cpmwg/doclibrary/dod_ref_med_assurance_lra_cps_v311_11may07.doc
>
> 5. from the cert profile, you get algorithm and trustpoint   
> management: http://www.nsa.gov/ia/_files/industry/Suite_B_Certificate_and_CRL_Profile_20080528.pdf
>
> 6. from GSA you get websso specific assurance superstructure, that  
> is now protocol independent: see John
>
> It just goes on and on.  Billions and billions of dollars worth.
>
> 7 If you go to the NIST site http://csrc.nist.gov/, you can trawl  
> through 20+ years of developing guidelines and generic risk  
> management methods... that underlie all the processes.
>
> My question is: does ANY of this fit openid mission or culture? If  
> so, which bits?
>
> Part of what draws me to openid is that its a bit counter-culture -  
> and offers an antidote to the above.
>
>
> ________________________________
> From: John Bradley [john.bradley at wingaa.com]
> Sent: Thursday, August 13, 2009 6:27 PM
> To: Nat Sakimura
> Cc: david at sixapart.com; Peter Williams; OpenID Specs Mailing List; openid-general at lists.openid.net
> Subject: Re: [OpenID] OpenID + Government
>
> Nat,
>
> The LoA 2 profile doesn't say anything about the validity or vetting  
> of the attributes.
>
> It only applies to identity.   It is strange and perhaps broken.
>
> There are some GSA sponsored workshops  in DC Sep 28-29 to discuss  
> some of those issues.
>
> Many people assume that Identity proofing has something to do with  
> attributes.
>
> Other profiles can deal with it some other way,  but the GSA profile  
> places no requirement on the IdP to verify an email.
>
> Your argument is about verified email may relate to some other  
> profile not GSA LoA 2.
>
> Many people including government ones make the mistake of reading  
> more into the LoA than is defined in SP800-63.
>
> John B.
>
> On 13-Aug-09, at 3:17 PM, Nat Sakimura wrote:
>
> I think we need to clarify what makes it easier for RP adoption.
>
> For that, we need to categorize the RPs and find out their pain  
> points.
> Assurance or "Trust" is often one of the pain point in addition to UI.
> For example, what we have been hearing in Japan is that if the RP  
> solely relies on OpenID, they fear that they loose the way to get in  
> touch of the users when they need to, such as recalling their  
> product. So, they tend to put their own flow for address validation  
> etc., which clutters UI, which is a recipe for failure. Higher  
> assurance for the contact address in this case will streamline the  
> UI and improve the success rate, thereby assisting the RP adoption.
>
> Also, I would like to point out that spec being a little more  
> complex does not mean that it is going to be hard for deployers to  
> deploy. Most of the complexity will be taken care of by the  
> libraries, and often, more functionality on the spec and library  
> side would make the life easier for the deployers.
>
> =nat
>
> On Fri, Aug 14, 2009 at 5:55 AM, David Recordon <david at sixapart.com<mailto:david at sixapart.com 
> >> wrote:
> Hey Peter,
> I don't think that we should ignore the potential very interesting  
> Government RPs if we made OpenID support LoA 2, but wouldn't there  
> be a tradeoff with RPs Government or non-Government that are LoA 1  
> or below?
>
> We've heard for a year that OpenID is still hard to adopt as a RP,  
> hard to get the UX correct and that the business value isn't being  
> communicated as clearly as an individual company does with a system  
> like Facebook Connect.  If we were to increase the complexity we  
> might get more Government RPs, but I worry that we might also be  
> making it harder for "web" RPs which far out number Government RPs  
> that require LoA2.
>
> The Government approached us earlier this year asking the Foundation  
> to help them OpenID enable a set of RPs with an initial focus on LoA  
> 1.  Some are in the social web space and others are not.  I think  
> that we should take advantage of this request to make it even easier  
> to adopt OpenID successfully as an RP – Government or non-Government  
> – within LoA 1 or below situations.
>
> --David
>



More information about the specs mailing list