diff options
author | https://brian.may.myopenid.com/ <https://brian.may.myopenid.com/@web> | 2008-08-21 02:39:31 -0400 |
---|---|---|
committer | Joey Hess <joey@kitenet.net> | 2008-08-21 02:39:31 -0400 |
commit | 2ad40b82f4b5eb32aaf9bb4801fb3a57e22e0774 (patch) | |
tree | b957fa99de92a416aa6e4826802755a69bda2841 | |
parent | eb4bfa0df545f9b9e70d8915daaea599b5dadb5f (diff) |
add more details
-rw-r--r-- | doc/bugs/ssl_certificates_not_checked_with_openid.mdwn | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/doc/bugs/ssl_certificates_not_checked_with_openid.mdwn b/doc/bugs/ssl_certificates_not_checked_with_openid.mdwn index e3bd56cfd..e976ed5bd 100644 --- a/doc/bugs/ssl_certificates_not_checked_with_openid.mdwn +++ b/doc/bugs/ssl_certificates_not_checked_with_openid.mdwn @@ -50,3 +50,19 @@ For now, I want to try and resolve the issues with net\_ssl\_test, and run more >>> that the SSL cert is issued by a trusted party and matches the domain name >>> of the site being connected to. I also don't personally think that SSL >>> certs are the right fix for DNS poisoning issues. --[[Joey]] + +I was a bit vague myself on the details on openid. So I looked up the standard. +I was surprised to note that they have already considered these issues, in +section 15.1.2, <http://openid.net/specs/openid-authentication-2_0.html#anchor41>. + +It says: + +"Using SSL with certificates signed by a trusted authority prevents these kinds of +attacks by verifying the results of the DNS look-up against the certificate. Once +the validity of the certificate has been established, tampering is not possible. +Impersonating an SSL server requires forging or stealing a certificate, which is +significantly harder than the network based attacks." + +With regards to implementation, I am surprised that the libraries don't seem to +do this checking, already, and by default. Unfortunately, I am not sure how to test +this adequately, see <http://bugs.debian.org/466055>. -- Brian May |