OpenID Security
Peter Watkins
peterw at tux.org
Sat Feb 7 01:29:11 UTC 2009
On Fri, Feb 06, 2009 at 03:43:30PM -0500, McGovern, James F (HTSC, IT) wrote:
> 2. Which is worse, having to sort through false positives or to not
> perform static analysis at all and have OpenID fail once some bad guy
> busts the implementation so badly that everyone runs away from OpenID?
What do you mean, "the" implementation? There is no "the" implementation.
Are you arguing that for the OpenID *protocol* to succeed, every
*implementation* has to be "secure"? That sounds like a marketing problem
to me, and it's one you solve by having math/crypto experts ensure the
*protocol* is good. Period. When someone finds a bug in Postfix, we don't
say SMTP is broken and run away from email; we say Postfix version
such-and-such is broken, Wietse fixes it, and we go on.
I suppose you could argue for protocol compliance tools as part of
protecting the OpenID image -- at least that might allow OpenID proponents
to disown any insecure library that happened to fail the protocol tests.
But I wouldn't expect too much from that, either. Automated testing is
good for finding obvious problems, but it's no replacement for good, smart
programming, and not a cure for bad code. I'd feel more comfortable with
software that passed some long-running fuzzing tests, but you really don't
want to be vouching for the "security" of specific implementations. That's
just asking for trouble.
-Peter
More information about the specs
mailing list