Peter,

Perhaps it is better to say that peoples perception of SP800-63 is broken.

Profiles for the GSA based on SP800-63 and OMB 04-04 are not silver bullets.

They do nothing for email verification in themselves.

If people want profiles that deal with those issues they need to create them.

This issue is not unique to openID. INCommon has been certified with NIH for a while now.

They still have a hard time getting people to understand that LoA 2 doesn't specify attribute proofing, only identity proofing. People are still debating what attributes constitute an identity.

To be useful in the commercial world there needs to be profiles and certification practices that address real issues.

The GSA profile is this community putting one toe into that water.

There is nothing to stop there being a openID profile for verified attributes based on the LoA 1 profile.

Someone needs to do the profile and set up a certification program for OP's and RP's.

There are big questions around who should do it and who should pay.

Trust issues are hard and have been out of scope for openID to this point. That may well be part of it's success.

Is GSA LoA 2 certification for openID a good thing?  Yes.
Will it solve any of our pressing problems on its own?  Probably not.

John B.
On 14-Aug-09, at 8:44 AM, Peter Williams wrote:

Its not necessarily broken. These things are designed to be composed. If any one agency goes for pre-eminence, it will restart the inter-agency wars that made all the previous rounds of this same underlying initiative largely ineffective.



1. from the smartcard hardware/firmware assurances you get 
http://www.commoncriteriaportal.org/files/epfiles/cible2005_05.pdf



2. from the crypomodule assurance you get the entries on the like of http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2009.htm . For example the functional groups of http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp575.pdf

3 from the cipher validation (e.g. HMAC) you get 
http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html

4 from the cps, you get identity proofing 
http://mattche.iiie.disa.mil/cpmwg/doclibrary/dod_ref_med_assurance_lra_cps_v311_11may07.doc

5. from the cert profile, you get algorithm and trustpoint management: http://www.nsa.gov/ia/_files/industry/Suite_B_Certificate_and_CRL_Profile_20080528.pdf

6. from GSA you get websso specific assurance superstructure, that is now protocol independent: see John

It just goes on and on.  Billions and billions of dollars worth.

7 If you go to the NIST site http://csrc.nist.gov/, you can trawl through 20+ years of developing guidelines and generic risk management methods... that underlie all the processes.

My question is: does ANY of this fit openid mission or culture? If so, which bits?

Part of what draws me to openid is that its a bit counter-culture - and offers an antidote to the above.


________________________________
From: John Bradley [[email protected]]
Sent: Thursday, August 13, 2009 6:27 PM
To: Nat Sakimura
Cc: [email protected]; Peter Williams; OpenID Specs Mailing List; 
[email protected]
Subject: Re: [OpenID] OpenID + Government

Nat,

The LoA 2 profile doesn't say anything about the validity or vetting of the attributes.

It only applies to identity.   It is strange and perhaps broken.

There are some GSA sponsored workshops in DC Sep 28-29 to discuss some of those issues.

Many people assume that Identity proofing has something to do with attributes.

Other profiles can deal with it some other way, but the GSA profile places no requirement on the IdP to verify an email.

Your argument is about verified email may relate to some other profile not GSA LoA 2.

Many people including government ones make the mistake of reading more into the LoA than is defined in SP800-63.

John B.

On 13-Aug-09, at 3:17 PM, Nat Sakimura wrote:

I think we need to clarify what makes it easier for RP adoption.

For that, we need to categorize the RPs and find out their pain points.
Assurance or "Trust" is often one of the pain point in addition to UI.
For example, what we have been hearing in Japan is that if the RP solely relies on OpenID, they fear that they loose the way to get in touch of the users when they need to, such as recalling their product. So, they tend to put their own flow for address validation etc., which clutters UI, which is a recipe for failure. Higher assurance for the contact address in this case will streamline the UI and improve the success rate, thereby assisting the RP adoption.

Also, I would like to point out that spec being a little more complex does not mean that it is going to be hard for deployers to deploy. Most of the complexity will be taken care of by the libraries, and often, more functionality on the spec and library side would make the life easier for the deployers.

=nat

On Fri, Aug 14, 2009 at 5:55 AM, David Recordon <[email protected]<mailto:[email protected] >> wrote:
Hey Peter,
I don't think that we should ignore the potential very interesting Government RPs if we made OpenID support LoA 2, but wouldn't there be a tradeoff with RPs Government or non-Government that are LoA 1 or below?

We've heard for a year that OpenID is still hard to adopt as a RP, hard to get the UX correct and that the business value isn't being communicated as clearly as an individual company does with a system like Facebook Connect. If we were to increase the complexity we might get more Government RPs, but I worry that we might also be making it harder for "web" RPs which far out number Government RPs that require LoA2.

The Government approached us earlier this year asking the Foundation to help them OpenID enable a set of RPs with an initial focus on LoA 1. Some are in the social web space and others are not. I think that we should take advantage of this request to make it even easier to adopt OpenID successfully as an RP – Government or non-Government – within LoA 1 or below situations.

--David


_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to