[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1E6BBDDDC1A2F93EBB229276@Macintosh.local>
Date: Sun, 23 Mar 2008 17:37:08 -0500
From: Paul Schmehl <pauls@...allas.edu>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: OpenID. The future of authentication on the
web?
--On March 23, 2008 2:52:53 PM +0000 "Petko D. Petkov"
<pdp.gnucitizen@...glemail.com> wrote:
>
> First of all, OpenID is a very simple but rather useful technology.
> With OpenID you have only one account, your ID, which you can use
> everywhere where the OpenID technology is supported. It is not clear
> whether this setup is more secure from what we have at the moment
> (every site forces you to register unique username/password pair) but
> it is definitely more convenient.
Yes, and convenience is often the enemy of security.
> The first argument "for" OpenID is
> that the more you share your secrets, credits card information,
> usernames, password, the higher the chances this information to be
> leaked or stolen. On the other hand, OpenID is prone to phishing
> attacks so user education is required.
>
However, with OpenID, all I have to do is figure out how to capture your
credentials (which does not require that I compromise OpenID), and I can
own everything that you own. At least with the disparate systems we have
now you only get those things where I've been foolish enough to use the
same credentials. Even then you have to figure out what those systems
are. With OpenID I simply try every site that uses OpenID, trivial to do
programmatically.
> Think about OpenID as the equivalent of PayPal for authentication. In
> theory, it is more secure to pay through paypal as you are not sharing
> your credit card information with everyone else but a single provider.
>
There's a reason I don't use Paypal......
> I am all "for" OpenID as you can spend good time on securing a single
> system. If the OpenID provider is not vulnerable to common Web attacks
> and it provides good privacy mechanisms such as SSL and the top of
> which are build good authentication features such as one-time tokens,
> etc.... then OpenID is the preferable choice.
The problem is, I have to trust the OpenID provide to both secure his/her
systems and hire trustworthy help. I have to do the same locally, but I
have a great deal more control and ability to monitor.
> Keep in mind though,
> that if your OpenID account is hacked, the attacker will be able to
> login as you anywhere they want. This is the main concern and
> disadvantage.
>
And that is a *huge* disadvantage.
Now, there is no doubt that we need better user education. User *must*
learn not to trust everything they get in email. They must also learn to
use good passwords and not reuse them on every site they visit. There's
also no doubt that some sites will do a lousy job of security and end up
exposing a person's credentials (which is why you should use different
credentials on every site.)
We also need some sites to do a better job of requiring strong passwords.
(Some still require only alpha-numeric characters and two few maximum
characters.)
But the idea that SSO makes sense outside the context of a single entity
that controls its userbase is misbegotten, in my opinion. The individual
*user* should control their credentials, not some "foreign" entity, no
matter how trustworthy they may claim to be.
Paul Schmehl (pauls@...allas.edu)
Senior Information Security Analyst
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists