OpenID, YADIS and Directed Identity
Granqvist, Hans
hgranqvist at verisign.com
Mon Feb 13 19:26:17 UTC 2006
Hi Fen,
Do you have the cryptographic proof (it's missing
from the paper)?
Also in protocol part 2:
"eXchange -> Advogato: [As(Na), Ss(Ns, 13)]"
Looks like the exchange party has access to one site's
secret key ('Ss')?
Thanks,
Hans
> -----Original Message-----
> From: yadis-bounces at lists.danga.com
> [mailto:yadis-bounces at lists.danga.com] On Behalf Of Fen Laballme
> Sent: Monday, February 13, 2006 12:54 AM
> To: Drummond Reed
> Cc: Graves, Michael; yadis at lists.danga.com
> Subject: Re: OpenID, YADIS and Directed Identity
>
> There are some interesting cryptographic properties that you
> can attach to a set of nyms that can help to minimize data
> correlation (real person triangulation). I describe a few of
> these in an unpublished (and never really completed) paper
> that may offer some useful insights at
> <http://www.openprivacy.org/papers/200104-repcap.html>. I
> reproduce the most relevant section here:
>
> Nym Properties
>
> Privacy is ensured through the use of Nyms that have some
> very special properties. Given
>
> * T = (Trusted) Parent Nym that can create Child Nyms
> * Ci, Cj and Ck are a set of child Nyms created by the
> same parent T
> * Ei is a child Nym from another parent
>
> We can show:
>
> 1. Ci, Cj, and Ck cannot prove that T is their Parent
> 2. Ci, Cj, and Ck cannot prove they are siblings
> 3. T can separately prove parenthood of Ci and/or Cj
> 1. without also leaking information about any other siblings,
> e.g. Ck
> 4. T can anonymously prove Ci and Cj are siblings
> 1. without also leaking information about any other siblings,
> e.g. Ck
> 2. and without leaking information that points to T
> as C's parent
> 5. T cannot prove anything about E
>
> =Fen
>
>
> Drummond Reed wrote:
> > Michael,
> >
> > We in XRI-land got the same feedback about the need for
> unidirectional
> > identifiers for single sign-on last fall. And we came up
> with the same
> > solution -- see my blog post at:
> >
> > http://www.equalsdrummond.name/index.php?p=56
> >
> > I think it applies to XRIs, URLs, or any other identifier
> technology.
> > One caveat I'll point out, though: this technique only
> works if there
> > are a sufficiently large enough set of identifiers issued by the
> > identity service provider (in your example, idsrus.com).
> Otherwise you
> > can be correlated at that level.
> >
> > =Drummond (http://xri.net/=drummond.reed)
> >
> > -----Original Message-----
> > From: yadis-bounces at lists.danga.com
> > [mailto:yadis-bounces at lists.danga.com]
> > On Behalf Of Michael Graves
> > Sent: Sunday, February 12, 2006 12:40 PM
> > To: yadis at lists.danga.com
> > Subject: Re: OpenID, YADIS and Directed Identity
> >
> > Johannes Ernst <jernst+lists.danga.com <at> netmesh.us> writes:
> >
> >>> ... in my
> >>> scenario, you wouldn't enter "mart.whatever.com" at the initial
> >>> login, screen.
> >>> Instead you would only enter "whatever.com". At this point, then,
> >>> the replying part only knows you are somehow attached to
> >>> "whatever.com". You are then redirected (302) to whatever.com's
> >>> login page. Unlike the current scenario, the identity server
> >>> (whatever.com) has at this point no idea who you are, so
> instead of
> >>> asking just for your password and presenting the "user"
> >>> field
> >>> already filled out, you would need to specify your user name at
> >>> whatever.com's login screen as well.
> >> Not necessarily. The identity server can have a cookie,
> shared only
> >> with itself, that identifies who you are. So the sequence would be
> >>
> >> GET relying-party -> HTML form
> >> POST relying party identity=whatever.com -> Redirect to
> whatever.com
> >> GET whatever.com cookie=myid -> Redirect to whatever.com/myid GET
> >> whatever.com/myid -> Redirect to relying party with signed URL (if
> >> active session, otherwise ask for password first)
> >>
> >> P.S. No hunting party as long as everybody understands
> that this is
> >> about something other than YADIS 1.0.
> >>
> >> Johannes Ernst
> >> NetMesh Inc.
> >>
> >>
> >>
> >>
> >> http://netmesh.info/jernst
> >>
> >>
> >
> > Hi Johannes!
> >
> > You're right, of course. My point was to emphasize the fact
> that the
> > identity server has no idea who you are *from* the relying party,
> > which means that subsequent provisioning of a generated ID won't
> > provide a basis for correlation.
> >
> > If you are currently logged in to your identity server,
> your cookies
> > can trigger "auto-fill" for your user name, when you are
> redirected to
> > "whatever.com". That's a good point! So, ergonomically, you haven't
> > given up anything important to the relying party yet, but when you
> > arrive at whatever.com's site, it may know who you are
> through its own
> > devices and thus you haven't really lost any momentum in
> the process.
> >
> > That's cool. I don't know what the real need/demand is for this
> > functionality, but I do know that I've had to defend/address
> > YADIS/OpenID not having it several times in the past few
> weeks. Again
> > this is really an OpenID issue, not a YADIS one, and one we
> can take
> > up later. This is an interesting "upgrade"
> > to
> > consider, though.
> >
> > -Mike
> >
> >
> >
> >
> >
> >
>
>
More information about the yadis
mailing list