Re: Proposal: An anti-phishing compromise

2007-02-09 Thread Martin Atkins
Recordon, David wrote:
 I agree that things like age should be in an extension, though I think
 this single piece of data is useful in the core protocol.  I'm sure the
 exact definition of phishing resistant will come back to bite us in
 sometime in the future, but lets deal with it then instead of not adding
 anything now.  I really like the idea that there be one thing in the
 core spec which reaches out to each extension.
 

I propose:

openid.make_it_work=1


___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


Re: Proposal: An anti-phishing compromise

2007-02-09 Thread Dick Hardt
I chatted with Avery about this today.

URIs for specific auth methods as well as ones for general seems to  
be the flexible approach.

Per Kim's laws, the method of auth may not be needed, so is extra  
disclosure


On 8-Feb-07, at 11:38 PM, Recordon, David wrote:

 Maybe laws are meant to be broken.  I don't see why a RP knowing  
 that I
 used a token as a second factor is a bad thing.  If nothing else, the
 technology should support the OP providing that information and the  
 OP's
 implementation can let me as the user decide if I want to.  Just like
 the trust request, it isn't mandated by the spec but every  
 worthwhile OP
 does it.

 My $0.02.

 --David

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
 Behalf Of Dick Hardt
 Sent: Sunday, February 04, 2007 11:42 PM
 To: Granqvist, Hans
 Cc: OpenID specs list
 Subject: Re: Proposal: An anti-phishing compromise


 On 1-Feb-07, at 2:36 PM, Granqvist, Hans wrote:
 Add a single, required, boolean field to the authentication response
 that specifies whether or not the method the OP used to authenticate
 the user is phishable. The specification will have to provide
 guidelines on what properties an authentication mechanism needs to
 have in order to be non-phishable. The field is just meant to
 indicate that the authentication mechanism that was used is not a
 standard secret entered into a Web form.

 The receiver should decide what is 'non-phishable', not the  
 sender, so

 it would be better if the OP just states what mechanism was used,
 perhaps.

 Per Kim's laws, how I authenticate to my OP is none of the RP's
 business.
 That I authenticated in a phishing resistant manner is.

 ie. we want the OP to make the statement that it followed certain
 anti-phishing guidelines.

 There is no certainty that the OP followed them, but the RP and user
 have recourse against an OP if the OP stated that it did follow the
 anti-phishing guidelines.

 -- Dick
 ___
 specs mailing list
 specs@openid.net
 http://openid.net/mailman/listinfo/specs



___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


attribute exchange draft 4 review

2007-02-09 Thread Johnny Bufu
Hello list!

While reviewing our AX implementation, I came across a case where the  
spec is not clear enough:

openid.ax.required
The value of this parameter is an attribute alias, or a list
of aliases corresponding to the URIs defined by
openid.ax.type.alias parameters. The OpenID Provider
MUST provide the identity information specified in this
parameter or return an error condition.

The error condition that the OP is supposed to return is not fully  
specified. We mention in the overview section that standard OpenID  
error messages should be used, but those would indicate a core /  
authentication failure.

My question is how would you, as an implementer on the RP side,  
prefer to be notified that the user / OP were not willing / able to  
supply a required attribute?


Thanks,
Johnny
___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


Re: [OpenID] FW: PROPOSAL: An Extension to transform an EMail Address to an OpenId URL

2007-02-09 Thread Robert Yates
On 2/9/07, David Fuelling [EMAIL PROTECTED] wrote:

  I appreciate any and all feedback!

For what it's worth I think that this is excellent. A couple of suggestions:

1) You probably should take a look at the URI Template spec [1].
These guys have done a lot of the work for you. The spec is still in
active development and has been blogged about by the author [2], I
think that they are about to release a new version with some updates.

2) Why map the e-mail address to an openid url, which then has to be
further resolved to a Yadis document?  Why not, instead, map straight
to a yadis doc and make e-mails full fledged openids.  An openid is
nothing more than a URI that can be resolved to a Yadis doc.
mailto:[EMAIL PROTECTED] is a perfectly valid URI and you have
demonstrated a pretty simple way to map it to a yadis doc.

Rob

[1]http://www.ietf.org/internet-drafts/draft-gregorio-uritemplate-00.txt
[2]http://bitworking.org/news/URI_Templates
___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs