80 likes | 208 Views
OpenID and the Enterprise A Model-based Analysis of Single Sign-On Authentication.
E N D
OpenID and the EnterpriseA Model-based Analysis of Single Sign-On Authentication Bellamy-McIntyre, J., Luterroth, C., Weber, G. OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication. Enterprise Distributed Object Computing Conference (EDOC). 2011 15th IEEE International. pp.129-138, Aug. 29 2011-Sept. 2 2011 Presented by: Veo Chen
Summary Problem: OpenID protocol not well understood and properly implemented, resulting in security flaws. Solution: Modelling of OpenID process from the perspective of both the user and the system.
Critique Applying similar modelling approach to WS-Federation, Shibboleth, OAuth • "...seems to be applicable" • "…similar" • "…lend themselves to our modelling approach. " Lack of empirical data: 32 sites • RP discovery: using Yahoo OpenID • TLS: " wesimply had to examine HTML codeof each site"
Appreciation Accurate modelling of OpenID process: • Crucial for the understanding, implementation and security analysis of any technology SHOULD vs MUST in specification: • "SHOULD" - can be ignored
SHOULD or MUST? • This paper: • "SHOULD" 48 times in OpenID specification • Many should be changed to "MUST" • "SHOULD" represents a point that can be ignored in implementation
SHOULD or MUST? Bradner, B., “Key words for use in RFCs to Indicate Requirement Levels,” RFC 2119 • SHOULDThis word, or the adjective "RECOMMENDED", mean that theremay exist valid reasons in particularcircumstances to ignore aparticular item, but the full implications must be understood and carefully weighed before choosing a different course. OpenID Authentication 2.0 • OpenID providers SHOULD verify that the return_to URL specified in the request is an OpenID relying party endpoint. • Relying Parties SHOULD accept and verify assertions about Identifiers for which they have not requested authentication. • It SHOULD implement a method for preventing replay attacks. • Relying Parties SHOULD use the Yadis protocol to publish their valid return_to URLs.
Question How important are technical documents to security? How can we better communicate requirements to people?