-
Notifications
You must be signed in to change notification settings - Fork 15
On phishing with a WebID #161
Description
I was thinking about an existing problem with email, namely that people register similar looking emails and use this in phishing attacks on users
The RFC 5321 states that the mailbox in mailbox@hostname of an email format is case-sensitive. ALICE@example.com and alice@example.com are therefore different email addresses (the domain is case-insensitive). Many providers ignore this and make similar email usernames point to the same email to help protect against spoofing
I think that since the WebID is a URI, and URI paths are case-sensitive, it follows that http://server/user/Alice/, http://server/USER/Alice/ and http://server/user/alice/ are all distinct webIDs and all distinct users ?
Evidently this could make it pretty easy to fool a human that I'm Alice
Also
Since many applications treat the emails alice@example.com and ALICE@example.com as distinct - in spite of the email provider - it leads to vulnerabilities. The reverse scenario, having more complex controls in what makes an email distinct on the application (but not the provider) opens it up to email conflicts
Since all of the code I've seen working with RDF relies heavily on just using resources/properties as URIs, I'd bet that the vast majority of applications would be treating http://server/user/Alice/ and http://server/user/alice/ as distinct resources whatever the IdP provider does. I don't think that this part is an issue with Solid - because I think that the Solid POD should hold all of the user data in an application (except links), which might make it safe to make it the IdP's decision ? Either way I think it deserves a "SHOULD" condition in the spec?