nstic privacy and social login
play

NSTIC, Privacy and Social Login Presentation at the W3C Workshop on - PowerPoint PPT Presentation

NSTIC, Privacy and Social Login Presentation at the W3C Workshop on Identity in the Browser Francisco Corella and Karen P. Lewison Pomcor 1 05/03/2011 Pomcor Getting Rid of Passwords n is one long term goal of NSTIC n But it may


  1. NSTIC, Privacy and Social Login Presentation at the W3C Workshop on Identity in the Browser Francisco Corella and Karen P. Lewison Pomcor 1 05/03/2011 Pomcor

  2. Getting Rid of Passwords … n … is one long term goal of NSTIC n But it may be achieved in the short term by “ social login ” n Login with Facebook … n … or some other social site such as MySpace or LinkedIn or Twitter n … or a general purpose site such as Google or Yahoo n Is this a good thing? 2 05/03/2011 Pomcor

  3. Unfortunately Not! n NSTIC seeks increased privacy and security, OAuth-based social login achieves the opposite: n Social site can track user ’ s Web activity n Credential may be sent in the clear n Facilitates phishing attacks n RPs must register with social site n Social site can revoke registration n Registration requirement reinforces Facebook ’ s social network monopoly 3 05/03/2011 Pomcor

  4. Social Login Needed ASAP in the NSTIC Ecosystem n In the long term, the NSTIC ecosystem should be based on ZKP technology n But today ’ s social login may preempt NSTIC if we wait until ZKP can be broadly deployed by RPs n =>NSTIC needs an interim solution n The interim solution could be used to develop a trust framework and user interfaces ahead of the long term solution 4 05/03/2011 Pomcor

  5. HTTP Extension for Delegated Identity n Browser aware of double redirection n Browser retains callback URL n Browser generates one-time key pair, IdP binds one-time public key to attributes in one-time certificate n Browser receives generic identifier from IdP, sends RP-specific identifier to RP n Generic identifier is high-entropy secret, not included in one-time certificate 5 05/03/2011 Pomcor

  6. Social Login Using the HTTP Extension n IdP = social site n RP generates 2 nd one-time key pair, sends public key to social site via 1 st redirection n Social site binds 2 nd one-time public key to right to access user ’ s account, in 2 nd one-time certificate; sends certificate to RP via 2 nd redirection n RP accesses user ’ s account at social site using 2 nd one-time certificate 6 05/03/2011 Pomcor

  7. For More Info n A newly revised version of the position paper will be posted to the Pomcor site shortly after the workshop: n http://pomcor.com/whitepapers/ NSTICPrivacySocialLogin.pdf n Email addresses of the authors: n fcorella@pomcor.com n kplewison@pomcor.com 7 05/03/2011 Pomcor

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend