Open…ID rather not!

I know how much you hate having to remember all the usernames, for all the websites and all the online services which you access. It is a pain in the rear end! I know this as a fact because I personally have a ton of services which I use. Somewhere along the line, some genius decided to start using the same usernames and passwords for all services accessed. This is great – simple to remember the ‘one size fits all’ concept and greatly opens you up as a target for a hack or two. Wait, that concerned look on your face tells me that I said something wrong? Obviously if you use simple names and passwords someone can easily tap into your accounts. An even smarter person decided to combat this with an OpenID. This is much like a Windows LiveID used on Microsoft sites; obviously it just isn’t for Microsoft. What is OpenID? Is it secure? Uhm… I think I answered that already…

OpenID is a shared identity service that enables users to eliminate the need for punters to create separate IDs and logins for websites that support the service. A growing number of around 9,000 websites support the decentralised service, which offers a URL-based system for single sign-on.

Security researchers discovered the websites run by three OpenID providers – including Sun Microsystems – used SSL certificates with weak crypto keys. Instead of being generated from billions of possibilities, the keys came from a set of just 32,768 options, due to a flaw in the random number generation routines used by Debian. The bug, which has been dormant on systems for 18 months, was discovered and corrected back in May.

Keys generated by cryptographically flawed systems still needed to be replaced even after the software was upgraded. But recent research by Ben Laurie of Google reveals that 1.5 per cent of certificates he looked at contained weak keys. Three OpenID providers (, and were among the guilty parties.

To exploit the vulnerability, malicious hackers would need to trick surfers into visiting a site impersonating a pukka OpenID provider. But faking digital certificate alone wouldn’t do the trick without first misdirecting surfers to these bogus sites. Dan Kaminsky’s recent discovery of a DNS cache poisoning flaw made it far more plausible to construct an attack that sent surfers the wrong away around the net’s address lookup system, potentially to a bogus Open site posing as the real deal.

The security flaw meant that even cautious users who check SSL certificates were at risk of handing over their OpenID credentials as part of a phishing attack. Such an attack would take a lot of effort to pull off and would only yield OpenID login credentials, which aren’t especially useful for hackers and are difficult to monetise.

Going after online banking credentials via a site that makes no attempt to offer up fake SSL certificates is a far more reliable money-spinner, a factor that leads noted security researcher Richard Clayton to describe the attack as the “modern equivalent of a small earthquake in Chile”.

Sun has responded to the issue by generating a new secure key, which reduces the scope for mischief but still leaves potential problems from the old key.


3 Responses to “Open…ID rather not!”

  1. Alethea Gonce Says:

    Amazing stuff thanx 🙂

  2. Vina Carioscia Says:

    My God, i thought you were going to chip in with some decisive insight at the end there, not leave it with we leave it to you to decide.

    • Kenny Blewett Says:

      Vina, I do appreciate your opinion on the post. However, had you read the title you will see my ‘insight’ on the matter. ‘Open…ID rather not!’ – I would rather not – broken down down for you in descriptive terms. I do not feel it is a viable option. If there is one breech of security, then ALL your accounts are open. There’s a chip for you. Thank you once again for your input, but please consider reading the entire post before making comments such as the one above. Adding to that, please do not use profanities. This is an open site and viewable by anyone, young or old. Regardless of religious background, one should respect other cultures and religions and not use wording that may be offensive to anyone.

      Regards, Kenny

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: