Are there any security risks associated with me using OpenID as the authentication method on my site?

前端 未结 9 957
庸人自扰
庸人自扰 2020-12-14 07:59

Is OpenID a secure method of authentication users on a website?

And, if not, what are the security risks associated with OpenID?

相关标签:
9条回答
  • 2020-12-14 08:47

    I like Verisign's VIP access which sites can make use of, and there is a nice little iPhone application that will let you have your generated token to get in, much like secureID

    0 讨论(0)
  • 2020-12-14 08:48

    OpenID is inherently insecure. It works by your site redirecting the user to their open ID provider site and then accepting an ID back from that site. This provides insecurities in both directions. You have to trust the ID that comes back (as you have no way of authenticating the user yourself) and it is easy to operate a proxy to the user’s open ID provider, that allows you to steal their username and password.

    OpenID is fine for something like Stack Overflow, where it doesn’t really matter if someone impersonates you. Using OpenID for sites with more serious – on a personal level – content is extremely risky. If you use OpenID for your email for example, then anyone stealing your Id can access your email. They could then in turn send password reminder requests to other sites that you use in order to get passwords for those sites. In the worst case, you could use OpenID for a bank account, or have a bank that sends password reminders to your email account...

    There are numerous other security problems with OpenID. You can find more information in "Privacy on the Internet".

    0 讨论(0)
  • 2020-12-14 08:51

    I think the main weakness of most OpenId providers is that they offer password recovery via e-mail. That reduces OpenId security to the security of my e-mail provider. If someone gets access to my e-mail account he can effectively steal my identity (with or without OpenId).

    Using OpenId for authentication makes stealing ym identity just easier. Just get access to my e-mail account and reset my OpenId password. Nothing more to do (instead of 100 password reset requests, one for each of my accounts on the web).

    Even worse, if the attacker changes my e-mail account's password it will be very hard for me to prove that I am the original owner of that OpenId account. The attacker might change the associated e-mail account to his one so I can't reset the password even if I get back my e-mail account later.

    It might be enough to get acces to the password recovery e-mail my OpenId provider sends to steal my identity.

    OpenId providers musst offer disabling e-mail password recovery and provide a more secure way to recover a lost password. Something based on postal address, passport or bank account (things I trust more than an e-mail account).

    As long as an OpenId account can be taken over by just getting access to a single e-mail it's nothing more than an additional single point of failure.

    See also: http://danielmiessler.com/blog/from-password-reset-mechanisms-to-openid-a-brief-discussion-of-online-password-security where "The Weakest Link: Email Password Reset Mechanisms" is adressed, too.

    0 讨论(0)
提交回复
热议问题