Nate, please accept my apologies for mistaking you for Nat (whose is a board member); and similar apologies to Nat.
Nate, It looks like we both agree that whitelisting OPs “breaks” OpenID to some degree. I didn’t want that “break” to be so easily (even if reluctantly) accepted for what appeared to be a “general” consumer Internet web site (not banking, health, corporate…). James Manger<http://peoplesearch.in.telstra.com.au/peoplesearch/UserDetail.aspx?EmployeeNumber=3799878> [email protected]<mailto:[email protected]> Identity and security team — Chief Technology Office — Telstra ________________________________ From: Nate Klingenstein [mailto:[email protected]] Sent: Tuesday, 10 February 2009 12:53 PM To: Manger, James H Cc: [email protected]; Balasubramanian G Subject: Re: [security] how secure is openid? advise pls.. James, NO! Restricting users to only "some trusted OPs" absolutely breaks the core user-centric identity concept on which OpenID is built. Please re-read Balasubramanian's comments. My response was, "yes, it does break one of the rules of thumb," with the addition that many other things are threatening those concepts today as well. That must not be done lightly. It should not be the first suggestion (particularly from an OpenID board member) without knowing the specifics of a particular web site and its users. Such restrictions might be appropriate for some specialist Relying Parties, but they should be the exceptions, not the norm. I'm certainly not a board member, was not nominated, would be flattered but refuse to serve if nominated, and wonder whether you meant someone else. Take care, Nate.
_______________________________________________ security mailing list [email protected] http://openid.net/mailman/listinfo/security
