SitG Admin wrote:
You have to assume that the session *will* be compromised, then, and prepare accordingly.
Arguably, the user's session at their OP would be more resistant to being stolen than the RP's session, so perhaps the RP should frequently call checkid_immedidate to verify that the user is still signed into their OP. This would require the attacker to steal the OP's session.

I believe that Facebook Connect takes the very extreme approach with requring Connect RPs to do the equivalent of checkid_immediate on every page view. This also has the nice benefit of enforcing single sign out across all RPs when the user signs out of Facebook. Not sure if this is the solution that OpenID should go with, however, it's certainly interesting.

Allen

_______________________________________________
security mailing list
[email protected]
http://openid.net/mailman/listinfo/security

Reply via email to