Allen,

Sending the artifact unencrypted in the indirect request and response allows an eavesdropper to intercept it in both directions.

If the artifact is not encrypted in the indirect channel then the OP must validate the direct request somehow.

The options for that are:
1.  Mutual TLS
2. Direct request signed by the private key of the RP, the cert needs to be sent so the return_to can be validated. This would also use normal TLS. 3. Encrypt the entire response in the direct channel with the public key from RP discovery 4. The RP must sign the request with the shared association secret. The same association handle needs to be used for direct and indirect communications.

I need to think about 4 a bit but it may work.

John B.
On 20-Aug-09, at 1:18 PM, [email protected] wrote:

Date: Thu, 20 Aug 2009 11:16:23 -0700
From: Allen Tom <[email protected]>
Subject: Re: Artifact Binding Re: specs Digest, Vol 36, Issue 1
To: "[email protected]" <[email protected]>
Message-ID: <[email protected]>
Content-Type: text/plain; charset="windows-1252"; Format="flowed"

In the interest of improving security, would it make sense to require
the RP to sign the request when exchanging the Artifact for the
response? If the request was signed, then even if the artifact was
easedropped, possession of the artifact by itself does not allow the
attacker to get the data.

Given that many RPs don't use HTTPS, it's very likely that Artifacts
will be passed around in the clear. Although requiring the RP to sign
the request when exchanging the artifact for the assertion would
increase the complexity, it might be worth it.

Allen



_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to