Hardware Based OpenID Service Available 119
An anonymous reader writes "TrustBearer Labs has announced a new service that lets you use various hardware based security tokens like smartcards and biometric devices with OpenID. A hardware based connection to OpenID allows higher levels of security and makes it easier for the end-user to control their credentials. OpenID is a decentralized cross-site authentication system that has been gaining momentum for quite a while now with major supporters like AOL, Google and Microsoft already announced."
Anything like verasigns pip? (Score:2, Informative)
Re: (Score:3, Interesting)
Re: (Score:1)
Re: (Score:1)
It used to be completely free for folks with business accounts like I have. They apparently stopped that promotion but I managed to get mine for free when they were still doing it.
Still $5 was awesome compared to verisign's price of around $30. On top of that, I had almost $5 sitting in my paypal balance and no use for it so in my very human mind ;) it was basically 75 cents.
Now if someone would just start using OpenID. Almost nothing useful consumes OpenID yet! I have one site that I use for work that does, and one "to do" site, toodledo.com, that I used to use for my iPhone todo lists but even that site is rarely visited. That plus about 1000 blog sites seems to be all that co
Re: (Score:1)
Re:Anything like verasigns pip? (Score:5, Informative)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2, Informative)
I'm not sure if you're referring to the TrustBearer Security Token for sale on the site (which is /not/ the only supported device...for example, all US-govt PIV and CAC cards will work), or the PayPal device...but as this seems to be a common misconception, I'd like to clear this up.
The TrustBearer Security Key is a cryptographic device (with drivers on Windows update) that goes in a USB port. It uses asymmetric cryptography to decrypt a nonce sent by the provider to prove that the user owns the public k
Re: (Score:2)
Re: (Score:2)
I believe SecurID tokens are getting fairly cheap though.. wonder if it'll work with them.
Tell me sales man (Score:1, Flamebait)
Re:Tell me sales man (Score:4, Funny)
In Soviet Russia, biometrics validate YOU
Sorry, I can' think of a Natalie Portman joke. I guess I fail it.
Re: (Score:1)
Mac ID? (Score:2)
Re: (Score:2, Informative)
Re: (Score:2)
http://wirelessdefence.org/Contents/MAC%20Address%20Changer.htm [wirelessdefence.org] that's one example, or:
http://amac.paqtool.com/mac-address-spoofing.htm [paqtool.com]
Re: (Score:1)
In the sense that the client receives a blob of data from the server and returns the result of cryptographically signing that blob, no, it is nothing like a MAC address.
Re: (Score:2)
I say this because of things like hardware virtualization that will be required to be emulate this hardware...wouldn't that open the
Re: (Score:1)
There's no need to do any hardware virtualization for emulation. You just need to use the public RSA algorithms to perform operations.
Cracking RSA is a huge undertaking requiring massive brute force.
The entire trick to this thing is that there is a piece of private data on the device that cannot be pulled off without extensive resources.
Now... if one were to lose your card, even in the remote chan
Re: (Score:1)
What is being talked about here is this stuff:
http://en.wikipedia.org/wiki/Security_token [wikipedia.org]
where the hardwa
Re: (Score:2)
Re: (Score:1)
Emulation? (Score:2, Insightful)
Once the key has been reverse-engineered, a software emulation thereof can be constructed, and a bit of clever hacking could substitute the software for the hardware.
Consider MAC address spoofing for what I see as a corollary.
Re: (Score:1)
Re: (Score:3, Informative)
Now most sites that would be d
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Widely available? No, not really. But no security is impossible to crack; I'd like to know exactly how difficult it is to do so before I'd consider forking over for one.
Re: (Score:1)
RSA is completely public and single keys have been under attack for years and years.... The largest key they've cracked so far is RSA-640.
RSA 1024 is a 'minimum' of sorts now and 2048 is to be commonplace soon.
Elliptic Curve is also on its way....
Rule of thumb w/ this security stuff... the growth-ratio of stronger crypto vs cracked crypto is speeding up... so by the time your thing is cracked, a new system is available.
Re: (Score:2)
I guess I'm too old for slashdot
In the movie (don't remember which one, I saw it when I was a kid), Bond's car is parked outside a bad guy's property while he rescues the damsel in distress. As they go back to his car, one of the bad guy's henchmen try to break in. The car explodes in a giant fireball, obviously killing the henchman.
Re: (Score:2)
I'd love to try to get that past the insurance company!
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
A lot of these dongles are write-only, however. You can write a key to the device, and you can delete the key, b
Re: (Score:1)
... A lot of these dongles are write-only, however. You can write a key to the device, and you can delete the key, but you can't ever read it back. This prevents attacks where a malicious user steals the fob to extract the key, or where malicious software tries to do the same. They're really quite secure.
Even better than that, you can make the dongles generate a key so that nothing has ever seen the private key but the dongle from which it holds onto.
TPM (Score:2)
Re: (Score:2)
Re: (Score:1)
First, the TrustBearer OpenID site doesn't currently support one-time password (OTP) devices like the one you're referring to...at the moment it supports public key authentication, the kind that web servers use for SSL.
As far as OTP being broken, it would be possible for a phishing site to ask you to enter your credentials, then submit it to the real site before the
Verisign Has Similar Offering Via Paypal (Score:2)
Paypal has been offering [paypal.com] tokens for a while now (for $5). And they work with Verisign's Personal Identity Provider [verisignlabs.com] service.
So for $5 you can get a little "football" of a token that will work as an OpenID login for any site that supports open ID.
Re: (Score:1)
Re: (Score:2)
Its a very sensible move on Paypal's part.
Re: (Score:2)
Re: (Score:2)
At least I know the real reason now. Lying toads.
You can get SecurID tokens for about £50ish from some places but I think they need special (expensive!) Windows based software to work.
Privacy Problem (Score:2, Interesting)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
This may be an issue with many OpenID sites, but this one in particular dodges your worries.
Since the certificate you pass to the provider is never released to the relying party (and which regardless doesn't need to have anything tying your identity to it), you are even more anonymous than with traditional username/password authentication -- the only one who knows who you are is you...the provider just knows you by your public key, and the relying party only knows that the provider consistently says that
Re: (Score:1)
Re: (Score:1)
Age would be one of the pieces of optional metadata that can be provided to the relying party if it is ever collected...if, for example, a web site wanted to authenticate someone's age but the provider did not provide that about a user, it would reject the authentication on those grounds. The TrustBearer site only asks for your nickname and email address, so that's all it could conceivably release to the relying party, and I don't think the email address is even released...and so far, it seems like that's
Re: (Score:1)
OpenID has one purpose, provide a secured unique identity while optionally passing on user-provided information.
VeriSign already does this. (Score:1)
And Microsoft is in it because... (Score:2)
2. Get involved using overwhelming marketshare
3. Introduce proprietary fucked-up implementation
4. Profit
same old story...
Re: (Score:1)
Re: (Score:1)
2. Get involved using overwhelming marketshare
3. Introduce proprietary fucked-up implementation
4. Profit
Decoupled authentication (Score:5, Informative)
The is something I was trying to explain the last time OpenID came up on Slashdot. Because authentication isn't done by the websites and web applications themselves, it means users can shop around for an authentication system that suits them, and none of the websites or web applications that you log into need worry about it. If/when OpenID starts to become mainstream, I'd expect to see a lot of interesting work done on authentication. A hardware scheme like this isn't feasible if you have to persuade each individual website and web application provider to implement it.
So, when can we log into Slashdot with our OpenIDs? Has there been any word on the subject at all from Taco et al?
Re: (Score:2)
Re: (Score:2)
It would be more like, I go to my profile page 'ballwall' and there's a field for my openID username[s]. After I populate that I can log in with that or my regular slashdot id. I'd imagine that once you've successfully logged in via openID that you would be able to disable normal password auth altogether.
I'd really love to see this get widespread use. I really really want to use two factor authentication everywhere. I very much dislike having to manage a ton of passwords.
In
Re: (Score:2)
But there was a challenge that was offering a couple thousand to whoever could get openID support into popular tools. Donno if slashcode's included.
Re: (Score:2)
Right, and what's stopping you from sharing accounts now, without OpenID? This isn't a problem that OpenID introduces, it's a problem that's always been there.
Re: (Score:2)
Anyone can create a random SSL certificate as well... the can't be used for anything.
Now slashdot allowing those anonymous openids... that would enable drive-by trolling. Login using anonymous temporary openid, say something rude about Linux, log out, wash, rinse, repeat.
Re: (Score:1)
Last time I looked, Slashdot already allowed anonymous comments. Yes I would expect the anonymous bonus modifers for those that use them to also apply to default OpenID comments, otherwise that would be a bug. The implementations I've seen such as on LiveJournal do treat OpenID as anonymous as far as things like comment settings are concerned, so I don't know why you persist with this strawman argument.
REMOTE_USER (Score:4, Interesting)
But overall it gives great flexibility to the implementor because he/she can layout a scheme were existing authentication/authorization infrastructures (like an institution's LDAP for example) can be used in a cross platform way to offer web based identity.
Distrust 'trust' (Score:2)
Re: (Score:1)
I worry whenever I see the word 'trust' juxtaposed with OpenID. I worry that organizations will misuse OpenID, and ignore its purpose: only provide an identification for a person, nothing else. It doesn't certify the person's character, background, politics, or financial base. If I say that I am user@server, then OpenID is just a bit of evidence supporting that. That's all.
How would one certify said information? OpenID does offer an 'SReg' and Attribute Exchange to help provide additional information to OpenID consumers... There is no vetting. What you're thinking of is CardSpace where certifications of such information is built into it.
Security risks? (Score:2)
Re: (Score:3, Insightful)
sloth jr
Re: (Score:3, Interesting)
Re: (Score:3, Insightful)
Re: (Score:1)
Do you think Jabber is a bad idea, because then if that's compromised, they can pretend to be you when chatting to anyone, but AIM, Yahoo and MSN are safer because they are separate?
I think you misunderstand what OpenID is. it's not a "central authentication". It's just a way that means you can use your login to identity to other sites. Just like my gmail email ac
OpenID for non web clients? (Score:3, Interesting)
Re: (Score:1)
Re: (Score:1)
Found Video Demos (Score:1)
Higher levels? I'm dubious.... (Score:2)
Security authentication is based on three possible factors: something you know (like a password), something you have (like a smartcard), or something you are (like biometrics). Now, if these things will be used in addition to passwords, that would indeed take the authentication factors from single to double. But, as is usually the case, they just replace passwords with smartcards or dongles. So there would be no increase in security at all.
Re: (Score:1)
To unlock the private key on the device that you have, you need to know the PIN...so that's two-factor.
For the biometric devices, there are two options: either the biometric replaces the PIN, or you need to swipe and type.
Biometric (Score:2)
So ThinkFinger stores 3 copies of what my finger looks like on my local PC. That makes sense for auth on a local machine. How does this work on an enterprise scale? Is the fingerprint details sent to a remote central storage system which then confirms a match?
If that assumption is correct, how would OpenID-enabled websites work with that? Would your account somehow point to your OpenID "provider" which would have your fingerprint to
Re: (Score:1)
The Match on Server solution is what you are describing, but this raises privacy, policy and integration concerns. In the other two situations, the fingerprint "image" is stored in write-only memory on the device. When you swipe your finger, the image goes straight to the device which then tries to mat
Re: (Score:2)
Also, by storing the fingerprint on the PC, the PC's physical security is a big deal - the same that is true of a private/secret key for SSH or GPG. But at least with GPG I can revoke a public key (and have stored revokes ready to go already) and/or time expirations. With
Re: (Score:1)
Actually, MoC (which is preferred over Match on Reader, and equivalent FAPP to match on device) stores the fingerprint on the card itself -- in write-only memory, so it can't ever be read...it can only be used by the card/device itself for matching a live swipe.
It's cool that you mention public keys, because that's really what this is all about. When you match your print on the card/device, it allows your private key to be used for a decryption/signature operation, which is what really used to authentica
only $40 (Score:1)
Re: (Score:1)
Also, where's the Java that you're referring to?
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Any cryptographic device will need to be attached to the computer, and software will need some way to talk to it. Since the VeriSign/PayPal token is a one-time password token, the back-end "shares a secret" with the token, no direct communication between that device and the computer is necessary, except through you via keyboard input.
However, with a smart card or other security device, the private keys
Re: (Score:1)
To prove that you "own" the certificate that you present, you encipher some data with that private key, which the OpenID provided then deciphers with your public key. If it's the same data that it sent you, then you own the key and you are authenticated.
Thanks for the information. How does the browser interface with the security card, though - how do you pass the enciphered data from the card to the OpenID website? Won't that need a browser plug-in in addition to the card drivers?
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Saying the users from one blog work on another blog isn't saying much. When I can log into slashdot and my bank with the same ID then
Re: (Score:1)
Well Slashdot is just another blog (in the sense of "forum that I might want to leave comments on). Yes it would be good that more blog hosts and websites support it, but that's a problem with lack of support, not a problem with OpenID itself. Hopefully support will grow in time. Slashdot isn't the be all and end all of websites.
My bank has its
Re: (Score:2)
Re: (Score:1)
No, you can still make OpenID users type in a captcha if you wish.
So you're forced to grant openID users the same privileges as anonymous posters.
The difference is that the person I'm replying to knows I own that OpenID account, rather than me just being a random anonymous person.
Zero gains here, at best OpenID can prevent a user from filling in a couple of text boxes when registering with a site.
Well that is the po
Re: (Score:3, Interesting)
No, it knows nothing. OpenID has no trust, so they could have just visited http://www.jkg.in/openid/ [www.jkg.in] and generated one for that purpose.
OpenID says zero about who you really are. You are an anonymous user - which is why it would be crazy for a site which previously required registration to allow OpenID users to post simply based on the existence of that token. You're goin
Re: (Score:1)
This is no differen