FIDO Trust Requirements

Similar documents
Device-Centric Authentication and WebCrypto

Information Security Basic Concepts

Scalable Authentication

How Secure is Authentication?

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Chapter 1: Introduction

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

WE MAKE SECURITY WORK

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

UAF Architectural Overview

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

Attestation and Authentication Protocols Using the TPM

Glossary of Key Terms

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc Mira.LaCous@bio-key.

FIDO: Fast Identity Online Alliance Privacy Principles Whitepaper vfeb2014

TECHNICAL WHITE PAPER NOK NOK LABS MULTIFACTOR AUTHENTICATION. Any device. Any application. Any authenticator.

Strong Authentication for Secure VPN Access

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Copyright FIDO Alliance All Rights Reserved.

Cloud Computing Security Considerations

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

IoT Security Platform

Patterns for Secure Boot and Secure Storage in Computer Systems

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

How Secure is Authentication?

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

Start building a trusted environment now... (before it s too late) IT Decision Makers

CRYPTOGRAPHY AS A SERVICE

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

What s wrong with FIDO?

WHITE PAPER Usher Mobile Identity Platform

Digital Identity Management

ADVANCE AUTHENTICATION TECHNIQUES

IBM WebSphere Application Server

Multi-factor authentication

Secure Data Exchange Solution

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

Digital identity: Toward more convenient, more secure online authentication

Applying Cryptography as a Service to Mobile Applications

EMV-TT. Now available on Android. White Paper by

BYOD Guidance: BlackBerry Secure Work Space

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Ericsson Group Certificate Value Statement

Guidelines for Account Management and Effective Usage

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Software Token Security & Provisioning: Innovation Galore!

A Survey on Untransferable Anonymous Credentials

NIST E-Authentication Guidance SP and Biometrics

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

Entrust IdentityGuard

Information Security

Check Point FDE integration with Digipass Key devices

ipad in Business Security

Dooblo SurveyToGo: Security Overview

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

CS 356 Lecture 28 Internet Authentication. Spring 2013

Salesforce1 Mobile Security Guide

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

Securing your Online Data Transfer with SSL

NOK NOK LABS AUTHENTICATION & OTT SERVICES

SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data

Bootstrapping Secure Channels of Communication Over Public Networks

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Tutorial on Smartphone Security

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Chapter 6: Fundamental Cloud Security

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Mobile Connect & FIDO

Secure Cloud Identity Wallet

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

USING FEDERATED AUTHENTICATION WITH M-FILES

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Hitachi ID Password Manager Telephony Integration

Samsung SDS. Fast IDentity Online

TIB 2.0 Administration Functions Overview

Information Technology Branch Access Control Technical Standard

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Transcription:

FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015

Working assumption: End Users Platforms are compromised or are going to be compromised

Windows10 Alipay Samsung Galaxy Bank of America(for ios and android users) UK Government

Identity and Access Management (IAM) Phases Configuration phase Operation phase Termination phase Registration Identification Claim identity Revoke authorization Provisioning Authentication Prove claimed identity Deactivate credentials Authorization Access control Check that you are authorized De-registration Nordsec 2015 IAM 5

What this paper is not about

How and Why is Authentication challenging?

Finse 2015 IAM 8

Trust? Assurance? Under what conditions? What are its requirements? By whom? To whom?

Current Authentication 1. Online isolated identity management. 2.Online Federated isolated identity management. 3. Offline Local device identity management. 4. Fast Identity Online (FIDO).

Online Isolated Authentication

Online Federated Authentication

Offline Local Device Authentication

FIDO: Putting it Together The problem: Simpler Stronger Online Authentication The Trend: Simpler Stronger Offline Local Authentication Why Not: Use Offline Local Authentication for Online Authentication. This is the core idea behind FIDO standards.

FIDO: Authentication Scenario User (U) User Side Server Side Service Provider (P) Owner Authentic ation Client (C) Hardware Authenticator Server System (S) Audun Jøsang March 2014 15

Authenticator concept

FIDO Authenticator Concept It is expected that users will acquire FIDO Authenticators in various ways: Embedded in the platform Purchased Given by a service provider

Choice of Security Profiles IFIPTM 2015 IdMan 18

FIDO Authenticator Concept Examples: A fingerprint sensor built into a mobile device. A PIN authenticator implemented inside a secure element. A USB token with built-in user presence verification. A voice or face verification technology built into a device.

Online Identity Management Trust Requirements

The concept of Trust Trust management becomes a component of IdM whenever different parties rely on each other for identity provision and authentication.

Isolated Authentication Trust Requirements The trust requirements between users and SPs are well understood The industry has had several decades of experience with this model, and users are familiar with it. Identifier provider, credentials provider and SP are the same: The client and SP only need to trust each other for a small set of purposes

Isolated Authentication Trust Requirements Client Trust in Service Providers: 1. The SP has the expected identity. 2. The SP protects client privacy. 3. The SP has implemented satisfactory user registration procedures and authentication mechanisms (from the clients perspective). Service Provider Trust in Client: 1. The client handles their authentication credentials with adequate care.

Trust Requirements of Federated Online Identity Management 1. Trust between Federated Service: (a) Service access by assertions between SPs on behalf of users will only take place when legitimately requested by the client. 2. Trust in the Identity Mapping: (a) The mapping of identities between service providers is correct. 3. Client Trust in Service Providers: (a) The service provider adheres to the accepted policy for correlating personal data about the same client from other service providers.

FIDO Trust Requirements Trust in : 1. FIDO consortium. 2. Trust in service providers. 3. Trust in hardware manufacturer. 4. Trust local device computing platform. 5. Trust in end users. 6. Trust in FIDO protocols.

Trust in Local Device Computing Platform The currently deployed online IdM solutions focus on defining more secure communication protocols between their end points (client, SP server, identity provider server). The question of whether the client computing platform (e.g.: computer, mobile phone) end users use to connect to SPs is compromised or not has been left out from their solutions.

Trust in Local Device Computing Platform T10: Trust that the user computing platform is not compromised by malicious software.

Trust in Local Device Computing Platform 31.63 percent of the worlds PCs are infected with some sort of malware (Q2 2012) of 78.92 percent are Trojans. Even with the most carefully designed communication protocol between end points, and the most safely guarded server platform, the password of end users can still be compromised if they are authenticating to their SPs from a compromised device FIDO supports authenticators that are implemented as part of the computing platform.

Trust in End users T11: Trust the user will not expose his or her device to compromise in infected platforms.

Trust in Service Providers SPs have the right to enforce policies about the type of authenticators they want their users to use while consuming their services: SP authentication policy: a JSON data structure that allows a SP to communicate to a FIDO Client the capabilities or specific authenticators that are allowed or disallowed for use in a given operation. The client then responds with an attestation certificate It is then the responsibility of the SP to ensure how genuine this claim is, by using information in his metadata store.

Trust in Service Providers T5: Trust that the SP is able to correctly assess the risk level associated with the usage of his service by all his users. T6: Trust that the SP establishes the appropriate network connection while updating the metadata store.

Trust in Hardware Manufacturers Providing cryptographic evidence to the SP attesting to the type and provenance of the authenticator. The UAF specifications require implementers to ship UAF authenticators with the same attestation certificate and private key in batches of 100,000 or more in order to provide unlinkability [2].

Trust in Hardware Manufacturers T7: Trust that hardware providers will not unintentionally break the unlinkibality property. T8:Trust that hardware providers will not intentionally break the unlinkibality property. T9: Trust that hardware manufacturers will not keep a backdoor in the authenticator,

Trust in FIDO Consortium The FIDO consortium is responsible for certifying FIDO authenticators, and managing the certificate PKI. Certification refers to the FIDO program that allows members and non-members to measure compliance and ensure interoperability among products and services that support FIDO specifications. In the case of a FIDO authenticator that iscertified, it will be characterized by a set of metadata information. This metadata is associated with an AAID (Authenticator Attestation ID) and available from the FIDO Alliance

Trust in FIDO Consortium T1: Trust that the FIDO consortium has identified the right set of metadata characteristics that are sufficient to identifying authenticators in ways that are meaningful to SPs to accept or reject them. T2:Trust that the certification is still meaningful throughout the time it is valid. T3:Trust that the FIDO consortium is able to detect and report authenticators breaching the metadata characteristics declared in their certification process, and update the metadata store accordingly.

Analysis New Trust Requirements: FIDO has introduced trust issues that were not present in the previous online IdM solutions: Authenticator hardware manufacturers The FIDO consortium. Inherited Trust Requirements: Trusting the computing platform. remember: the end user secret key is not stored on the server side, but rather on his own authenticator, which has to be connected to his possibly compromised computing platform.

Analysis FIDO Claim: make authentication both more usable and stronger. instead of solving the trust requirements of the previous online IdM solutions, FIDO has just shifted them to other components in its architecture

Analysis FIDO has created a more complex ecosystem, with new components (authenticator hardware manufacturers and the FIDO consortium), to which previous trust requirements (mainly service provider ones) has been delegated. We believe this new FIDO trust requirements map, puts too much power and responsibility in the hands of entities that cannot be trusted, especially in a world where online digital attacks are increasingly becoming state affairs.

Conclusion Trust requirements are associated with cost. If anything in computer security can go wrong, it will eventually go wrong. Are FIDO Trust Requirements worth it? To Whom?(Less liability for SPs)

References Ijlal Loutfi and Audun Jøsang. 1,2, pause: Lets start by meaningfully navigating the current online authentication solutions space. In Trust Management IX, volume 454 of IFIP Advances in Information and Communication Technology, pages 165 176. 2015. PandaLabs. PandaLabs Quarterly Report, Q2, June 2012. D. Prabhu andm. Adimoolam. Article: A novel dna based encrypted text compression. IJCA Special Issue on Network Security and Cryptography, NSC(2):36 41, December 2011. USDoD. Trusted Computer System Evaluation Criteria. US Department of Defence, 1985. Verizon. Control computer crime news. www.verizonenterprise.com/resources, 2013. www.rsaconference.com/writable/.../arch-r07-scalable-authentication.pdf

Thank you for your attention