Some suggestions about Open Id AX profile
SitG Admin
sysadmin at shadowsinthegarden.com
Tue Jun 2 20:34:53 UTC 2009
>In Openid attributes are alegated, so you don't have to trust the OP
>because there's nothing to trust on. Dealing with certified
>attributes create a problem : how could I, as a relying party, know
>that this OP works fine and if it says "level 4" all criteria to
>consider were done the right way.
You can't. But you have the right idea:
>Our proposal, in the same way as PAPE, the Relying Party does not
>need to trust the OP. The User is the one that needs to trust the
>OP. If problems arises with certain OP, then relying parties could
>choose to use some OP and exclude others with mechanisms like
>white/black lists.
The user needs to trust the OP that the *other* user (the one they
have a contract with) is using; so, share that information, and
displace the responsibility for distrusting various claims onto the
user. This isn't very *friendly*, mind you, but I don't see any way
of preventing a user from setting up an absolutely new OP just for
that one contract; with a valuable enough contract at stake, it would
even be cost-effective to rig one's own "independent auditors".
You might be able to score OP's locally, by "how many other contracts
have trusted this OP", but then (to prevent gaming the system) there
should be other statistics such as how long the OP has been in use,
how often a contract has required "use another OP" during
renegotiation, how often negotiations have *failed* entirely because
one party refused to use another OP, the demographic spread of these
uses over time, and maybe even the values of those contracts (for
low-value contracts, there might not have been as much scrutiny over
the trustworthiness of OP's), most or all of which raises user
privacy issues. The last item raises verifiability issues; how do you
*know* the value of the contracts are as reported?
-Shade
More information about the specs
mailing list