RECENT ADVANCES in E-ACTIVITIES, INFORMATION SECURITY and PRIVACY. Hierarchy OpenID

Similar documents
By Prabath Siriwardena, WSO2

The implications of. Simon Willison Google Tech Talk, 25th June 2007

Implementing OpenID for Your Social Networking Web Site

Computation of a possible route of travel using Interclass booking in the railways

Relying Party User Interface Recommendations

CA SITEMINDER OVERVIEW

How to Integrate CA SiteMinder with the Barracuda Web Application Firewall

OpenID. Mark Heiges Center for Tropical and Emerging Global Diseases

Trivelio User Guide. Purpose

Overseas Travel Registration System Operation Manual

ultimate traffic Live User Guide

Special edition paper Development of a Crew Schedule Data Transfer System

The Improvement of Airline Tickets Selling Process

MEMBER PORTAL QUICK GUIDE

Unit Activity Answer Sheet

LS-Data. Manual. Altenrhein Luftfahrt GmbH Office Park 3 Top 312 / Postfach 90 A-1300 Wien Flughafen

Airport Monopoly and Regulation: Practice and Reform in China Jianwei Huang1, a

Performance and Efficiency Evaluation of Airports. The Balance Between DEA and MCDA Tools. J.Braz, E.Baltazar, J.Jardim, J.Silva, M.

Concur Travel-Frequently Asked Questions

Click the Profile link to review and update your profile. You must save your profile before you first attempt to book a trip. TOP

PRIVACY POLICY KEY DEFINITIONS. Aquapark Wrocław Wrocławski Park Wodny S.A. with the registered office in Wrocław, ul. Borowska 99, Wrocław.

BusStop Telco 2.0 application supporting public transport in agglomerations

Configuring a Secure Access etrust SiteMinder Server Instance (NSM Procedure)

Privacy. Newcrest means Newcrest Mining Limited (ACN ) and each of its subsidiaries; and

User Reference Manual

Installation Guide. Unisphere Central. Installation. Release number REV 07. October, 2015

OTP SERVER NETEGRITY SITEMINDER 6. Rev 1.0 INTEGRATION MODULE. Copyright, NordicEdge, 2005 O T P S E R V E R I N T E G R A T I O N M O D U L E

Kernel Principal Component Analysis and its Applications in Face Recognition and Active Shape Models

Product information & MORE. Product Solutions

Transfer Scheduling and Control to Reduce Passenger Waiting Time

EXPERIMENTAL ANALYSIS OF THE INTEGRATION OF MIXED SURVEILLANCE FREQUENCY INTO OCEANIC ATC OPERATIONS

FAASafety.gov Help Manual for WINGS - Pilot Proficiency Program Federal Aviation Administration May 1, 2007

ANDROID BUS TICKETING SYSTEM

Digital twin for life predictions in civil aerospace

SIMULATION MODELING AND ANALYSIS OF A NEW INTERNATIONAL TERMINAL

An Analysis of Dynamic Actions on the Big Long River

EMC Unisphere 360 for VMAX

Fox World Travel/Concur Documentation Concur FAQ

ONLINE DELAY MANAGEMENT IN RAILWAYS - SIMULATION OF A TRAIN TIMETABLE

Time-Space Analysis Airport Runway Capacity. Dr. Antonio A. Trani. Fall 2017

Time Benefits of Free-Flight for a Commercial Aircraft

International Journal Of Electrical, Electronics And Data Communication, ISSN: ANDROID BUS TICKETING SYSTEM

Estimating the Risk of a New Launch Vehicle Using Historical Design Element Data

30/April/2018 Whitepaper V1.1. Made by Mile Corporation.

Measuring Productivity for Car Booking Solutions

PRAJWAL KHADGI Department of Industrial and Systems Engineering Northern Illinois University DeKalb, Illinois, USA

American Airlines Next Top Model

G. Glukhov The State Scientific Research Institute of Civil Aviation, Mikhalkovskaya Street, 67, building 1, Moscow, Russia

Regulatory Changes relating to Air Operations Providing Services to the Flying Public

Depeaking Optimization of Air Traffic Systems

Security Queue Management Plan

BHP Billiton Group Management Award Plan Conditional Awards FY15 Terms and Conditions

Water fetching aid for rural women

MyFBO Help. Contents TRAINING ONLY

Concur Travel FAQs. 5. How do I log in to Concur Travel? Visit or the link is available on the Travel page of the Compass.

EASA Safety Information Bulletin

Video Media Center - VMC 1000 Getting Started Guide

Preliminary Staff User s Manual. CASSi The Computerized Aircraft Scheduling System Rev. 1.28a. February 10, 2001

DUFFERIN ELEMENTARY PLANNING STUDY SCHOOL DISTRICT 68 (NANAIMO-LADYSMITH)

Abstract. Introduction

Proof of Concept Study for a National Database of Air Passenger Survey Data

I R UNDERGRADUATE REPORT. National Aviation System Congestion Management. by Sahand Karimi Advisor: UG

Concur Travel - Frequently Asked Questions

UC Berkeley Working Papers

Daily Estimation of Passenger Flow in Large and Complicated Urban Railway Network. Shuichi Myojo. Railway Technical Research Institute, Tokyo, Japan

Response to Docket No. FAA , Voluntary Disclosure Reporting Program, published in the Federal Register on 19 March 2009

ICTAP Program. Interoperable Communications Technical Assistance Program. Communication Assets Survey and Mapping (CASM) Tool Short Introduction

Model Tests on Propulsion Systems for Ultra Large Container Vessel

SAMTRANS TITLE VI STANDARDS AND POLICIES

2018 PSO Profile Highlights and Tips. December 18, :00 3:00 PM

Predicting Flight Delays Using Data Mining Techniques

Measures to Vitalize the Commerce of the Central Business District

Controlled Cooking Test (CCT)

Tel.: +1 (514) ext Ref.: SWG 21/1-09/94 16 December 2009

CAMPER CHARACTERISTICS DIFFER AT PUBLIC AND COMMERCIAL CAMPGROUNDS IN NEW ENGLAND

FLICA Training! Horizon Air Flight Attendants!

FLIGHT PATH FOR THE FUTURE OF MOBILITY

Aircraft Arrival Sequencing: Creating order from disorder

The Effects of Porter Airlines Expansion

TIMS & PowerSchool 2/3/2016. TIMS and PowerSchool. Session Overview

PREFACE. Service frequency; Hours of service; Service coverage; Passenger loading; Reliability, and Transit vs. auto travel time.

Paperless Aircraft Operations - IATA s Vision and Actions - Chris MARKOU IATA Operational Costs Management

AIRLINES decisions on route selection are, along with fleet planning and schedule development, the most important

A Statistical Method for Eliminating False Counts Due to Debris, Using Automated Visual Inspection for Probe Marks

CA SiteMinder. Federation.NET SDK Guide 12.51

ADVANTAGES OF SIMULATION

e-airportslots Tutorial

REVIEW OF THE STATE EXECUTIVE AIRCRAFT POOL

Use of DDR data in PREDICT to support the pre-tactical planning (D-6 to D-1) FMP Exchange Workshop, edition th of September 2012

Online Guest Accommodation Booking System

Revenue Management in a Volatile Marketplace. Tom Bacon Revenue Optimization. Lessons from the field. (with a thank you to Himanshu Jain, ICFI)

Kristina Ricks ISYS 520 VBA Project Write-up Around the World

Quantitative Analysis of Automobile Parking at Airports

The following include 3 instructions for access to the Southwest Airlines website:

CONCEPTUALIZATION OF THE HOTEL BUSINESS AND A CONCEPT HOTEL PROJECT DEVELOPMENT IN THE AREA OF THE CAUCASIAN MINERAL WATERS

NEXTT. Anne Carnall Program Manager, Future Airports. 12 December 2018

AIRSPACE INFRINGEMENTS BACKGROUND STATISTICS

KB 2449 CA Wily APM security example: CA SiteMinder for authentication with CA EEM for authorization

FRANCE : HOW TO IMPROVE THE AVALANCHE KNOWLEDGE OF MOUNTAIN GUIDES? THE ANSWER OF THE FRENCH MOUNTAIN GUIDES ASSOCIATION. Alain Duclos 1 TRANSMONTAGNE

CHAPTER 5 SIMULATION MODEL TO DETERMINE FREQUENCY OF A SINGLE BUS ROUTE WITH SINGLE AND MULTIPLE HEADWAYS

Transcription:

Hierarchy OpenID DONGHWI SHIN, INKYUN JEON, HYUNCHEOL JEONG Security Technology Team Korea Internet and Security Agency IT Venture Tower, Jungdaero 135, Songpa, Seoul Korea shindh@kisa.or.kr, ikjeun@kisa.or.kr, hcjung@kisa.or.kr Abstract: - The explosive developments of web services provide convenience of anytime, anywhere the service for users. However, the evolution of web service to its users provides the burden of a number of identity and password pair management. To solve such a problem that emerged was openid. The key concept of openid is to manage only one ID for user convenience. Therefore, openid user manages only one identity when the user requests service from the service provider, that supports openid. However, due to openid concept with openid procotol, some security issue is appeared. In this paper, we propose the Hierarchy OpenID concept as a solution to the openid security issue. Key-Words: - Openid, Security, Phishing, Linkability, Traceability, Authentication 1 Introduction With web development, many services have moved to web. Accordingly, users are using a variety of services on the web. However, in order to receive services from the service provider(sp) users authenticate from SP. The commonly used method for authenticating is the ID/Password method. However, with the increase in SP, the user needs to manage the increased number of ID for authentication. Therefore, this causes inconvenience of the number of user identity and password pair management. The openid is appeared to alleviate the inconvenience. The openid main concept is to minimize the number of Identity.(By default, user manages only one openid in openid service.) While providing the convenience of an identity management for users, openid provider and SP, supports openid, has also increased. According to the web 2.0 paradigm, the user's movement affects SP. Major portal site started to support openid. And currently Google, Yahoo, Microsoft has issued both openid. Fig1. OpenID Relying Party Site Statistics However, some security issues are caused by reduction of the number of identity that user manages. Because of openid protocol emergence, some security issues are appeared too. In this paper, we present solutions for openid security issues, which are the openid provider phishing, identity linkability and traceability problem. Also, we present our scheme to resolve the current openid anonymous service problem. The remainder of this paper is structured as follows. Section 2 describes openid service, openid security issue. Section 3 proposes our hierarchy openid scheme. Finally, conclusions are drawn is section 4. 2 The present state of OpenID 2.1 OpenID Service In the introduction, we mentioned that the openid main concept is to minimize a number of identities the user manages. The openid chooses a URL to uniquely identify a web user. This means that the user was aware of the resources. Also, this means the end users involved in the authentication mechanism. The components for openid service are user, service provider(sp), and openid provider(op). (However, the existing service provider performed both the role of SP and the role of OP.) And all authentication information is passed through the user. The following is openid protocol. Send user openid to SP or OP domain, which the user issued from. ISSN: 1790-5117 189 ISBN: 978-960-474-143-4

SP identifies OP from openid or OP domain and SP associates with OP. SP redirects user to OP authentication page The user enters openid password or openid and password pair. OP authenticates openid user. OP transfers the user authentication information to SP. SP provides service for openid user. The some OP provides the anonymous openid for the above linkability and traceability issue. Thus, by using the anonymous openid it is hard to get the user information using openid linkability and traceability property. However, the anonymous openid generated by OP is changed to the random string form, the user can not remember, for the linkability and traceability issue solution. In addition to some anonymous openid is not true anonymous openid. Because the anonymous openid does not be changed, though the anonymous is the complicated string. In addition, the user can not choose the level of anonymous because the OP provides the anonymous property of an anonymous openid. Fig2. OpenID Protocol 2.2 Openid Security Issue 2.2.1 Phishing The openid protocol redirect user to OP that you submit in the user-sp. Because the user believes the SP, the OP, SP redirects, is trusted by the user. However, the user almost will not be able to distinguish between real OP site and phishing OP site. Therefore if the user not be able to distinguish between real OP site and phishing OP site, the openid authentication information of the user is exposed through the phishing OP site. Because a high probability of ID and password equality on other site, are exposed at the phishing OP site, the information can be exploited at security incidents. 2.2.2 Linkability & Traceability The linkability and traceability are the probability that can be analyzed or got the user orientation information or the other information through user identity relation analysis by any attacker. The linkability and traceability issues in Openid will not be openid own problems. Because the concept of openid is that the user manages a single openid to all the openid support SP, the linkability and traceability problem is presented. Eventually the concept of single identity management brings both advantage and disadvantage. 2.2.3 Anonymous OpenID 3 Hierarchy OpenID In this paper, we propose hierarchy openid to resolve openid security issue mentioned earlier in Section 2. The main concept of the hierarchy is the classification of the user's openid. This section mentions the concept of hierarchy openid and issues for applying the hierarchy openid in terms of the user, SP, OP on the opendi authentication mechanism. Finally, this section describes how to resolve the openid security issue through the hierarchy openid scheme. Fig3. Anonymous OpenID 3.1.1 Hierarchy OpenID Scheme The hierarchy openid provides the user with two types openid. 1 Parent OpenID(1 st ID or Closed ID) 2 Child OpenID(2 nd ID or Opened ID) The parent ID(1 st ID) is the openid that is used to sign up for OP at first time. This parent ID is not a public openid as ID for the management of the user child openid(2 nd ID). The 2 nd ID is a public openid as ID to get service from the SP on the authentication mechanism. The 2 nd ID is dependent on the 1 st ID that has unique properties on OP. And the 2 nd ID among the ID belongs to the 1 st ID must be unique. Though the opened or closed properties of the 1 st ID or 2 nd ID can be changed by the user, but is not ISSN: 1790-5117 190 ISBN: 978-960-474-143-4

recommended. (When the opened or closed properties are changed, the authentication mechanism is described in the next section.) The reason is that the property of each ID has to do with openid security issue. Basic hierarchy openid scheme is as follows. 1 User joins in OP. OP issue the parent opendi(1 st ID) 2 User logs in with 1 st ID 3 User sets the child openid(2 nd ID) 4 User requires a service from SP and enters OP domain to SP opened login form. 5 SP redirects users to OP 6 User enters 1 st ID and password to OP 7 User selects 2 nd ID, is used to log in SP Fig4. Hierarchy OpenID Scheme 3.1.2 Hierarchy OpenID Authentication Case Using the hierarchy openid, the authentication mechanism can be divided into three categories. This is caused by what is that the openid of two types(1 st ID and 2 nd ID) on hierarchy openid scheme. 1 Domain name method 2 1 st ID method 3 2 nd ID method First, in the domain name method the user input only OP domain name, is based on openid 2.0 specification. 1 SP redirects user to OP 2 Next step is equal to 1 st ID method or 2 nd ID method(refer 1 st ID method description and 2 nd ID method description) In the domain name method, the user redirects to OP. Because the next process is equal to the 1 st ID method or 2 nd ID method, that will be described in the following section. Second, the 1 st ID method is used when the user tries to log in the SP with 1 st ID for the service from SP. 1 SP redirects user to OP with 1 st ID 2 Select ID type(1 st ID or 2 nd ID. In this step, ID type is 1 st ID) 3 Enter user password at OP authentication web page 4 OP shows 2 nd ID list. Users selects 2 nd ID that is used to log in SP However, the scenario will change slightly when the user is using the domain name method. In case of the 1 st ID method, the user enters 1 st ID to SP. But in domain name method the user enter the 1st ID to OP because the user redirect to the OP without input the 1 st ID. After the 1 st ID is entered on the domain name method, and then the next process is the same as the 1 st ID method. However, the 1 st ID method is not recommended. The reason, that the 1 st ID method does not recommend, is that the 1 st ID property is changed to "Opened" for 1 st ID method. This comes into collision with objective that aims to resolve the linkability and traceability issue by setting 1 st ID property to "Closed". 3rd, 2 nd ID method is the case of that user input the 2 nd ID to log in the SP in the service requests from SP. 1 SP redirects user to OP with 2 nd ID 2 Select ID type(1 st ID or 2 nd ID. In this step, ID type is 2 nd ID) 3 Enter the 1 st ID and password When considering convenience and reality, what does not enter the 2 nd ID will be effective. Because the 2 nd ID in addition to other 2 nd ID may already have been submitted to the SP and you don t remember it, if the user has visited in SP. With 2 nd ID list of URL, the SP manages, because OP shows the list the URL. no matter what the 2 nd ID input of the user. We recommend what does not input the 2 nd ID. The 2 nd ID method has also the other issue. The 2 nd ID that the user owns is only a unique in the 1 st ID area, but the 2 nd ID is not unique in the entire ID space. The 2nd ID entered by the user may be one of the 1st ID using by the other user.( Because the basic properties of the 1st ID is closed and the property change is not recommended, the probability is extremely small. But the probability is not zero.) Therefore, OP is able to distinguish the ID(1 st ID or 2 nd ID) is entered by the user. ISSN: 1790-5117 191 ISBN: 978-960-474-143-4

3.1.3 Hierarchy OpenID Information Table Hierarchy openid provides a different ID type. Therefore the OP manages 1 st ID user table and 2 nd ID table for each user for the hierarchy openid service implementation. First, the 1 st ID table of the user is 1 st ID management table and primary key of the table is the 1 st ID. The elements of 1 st ID table are as follows. - 1 st ID - number of 2 nd ID on 1 st ID space - Password - Fig7. 2 nd ID delete algorithm Finally, the 2 nd ID property element represents an "Opened or Closed" property of the 2 nd ID. The 2 nd ID will expose to the outside world in default setting. (Default value : closed) The Closed property mean is that the user can not use this ID on the authentication method. This Opened or Closed property does not mean a public property. However, if the user does not want to the closed property, the user can change this property and can use the 2 nd ID method(the 2 nd ID method is not recommended.). Fig5. 1 st ID table The number of 2 nd ID element shows the number of 2 nd ID included in the 1 st ID. In addition, this element in the 2nd ID method will be used for verification. When modifying the hierarchy openid scheme, it will be available. Second, the 2nd ID table is a table for 2nd ID, depend on a 1st ID, management and primary key of the table is the 2nd ID. The elements of 2nd ID table are as follows. - 2 nd ID - Password on 2 nd ID(Optional) - Usage count on site - Site list - Usage count on 2 nd ID - 2nd ID property(opened / Closed, Default : Opened) - Fig8. User ID Table 3.1.4 OpenID Security Solution by Hierarchy OpenID In 2.2 openid security issue section, we describes the following three issues. - Phishing - Linkability and Traceability - Anonymous OpenID Fig6. 2 nd ID table In above list, the user uses a password field if the user wants to set. The usage count on site field is a number of sites that the user joins with 2 nd ID. This field is used to do a 2 nd ID delete algorithm. When the user want to delete a 2 nd ID, if the usage count on site field value is equal to zero, the user and delete the 2 nd ID. First, the phishing problem can be solved through a combination 1 st ID with 2 nd ID. By default, the 1st ID does not disclosed to outside. And the 2 nd is disclosed to outside and depend on 1 st ID. Assume that an attacker implement the phishing OP site. When domain name method and the 1st ID method is used to log in to the OP, if the user has the normal OP to the list will show the 2nd ID list. However, the phishing OP can not show a normal 2 nd ID list because the phishing OP does not know the 2 nd ID list of user. And then the user can recognize the OP ste is not normal. When the user enter the 2 nd ID for the 2 nd ID method, the phishing OP can not distinguish ID ISSN: 1790-5117 192 ISBN: 978-960-474-143-4

type(1 st ID or 2 nd ID). Therefore, any authentication method can prevent phishing OP. Secondly, the linkability and traceability issues can be resolved through the property of the 1 st ID 2 nd ID, too. Though 2 nd ID is published on the outer, there is some users using the same ID that is equal to 2 nd ID of the user. Thus, even if any attacker tracks a user based on the 2nd ID, the attacker can not check the user, is interested in tracking, out. As well as the trace with other information collected don't consider. A user can change the 1st ID. By default, because the 1st ID do not disclose outside, anyone can not trace the user through the 1st ID. Therefore, the hierarchy openid does not have a linkability and traceability issue. Finally, the hierarchy openid can solve anonymous openid problem easily. Now OP provide the user with the anonymous openid and make it difficult.(the difficult means that it is difficult to remember the anonymous.) And the anonymous openid does not have a real anonymous property. However, the hierarchy openid can provide the user with an anonymous property using the 2 nd ID. Because the 2nd ID is dependent on the 1st ID and a user does not have the limitations of the 2nd ID space. Also, the usage information of the 2nd ID in the 2nd ID table can be found directly. Finally, the 2nd ID was used appropriately for the anonymous openid and the user can adjust the anonymous level by deleting the 2nd ID. Therefore, through the hierarchy openid anonymous openid issue also is able to resolve http://openid.net/specs/openid-authentication-1_1.htm h, 2008 [4] Yahoo! OpenID(beta), http://openid.yahoo.com [5] Windows Live ID Becomes an OpenID Provider, http://winliveid.spaces.live.com/blog/cns!aee1bb0 D86E23AAC!1745.entry, 2008 [6] Federated Login for Google Account Users, http://code.google.com/apis/account/docs/openid.ht ml [7] OpenID next big thing lots of problems, http://bendrath.blogspot.com/2007/04/opendi-next-bi g-thing-with-lots-of.html, 2007 [8] Beginner s guide to OpenID phishing, http://marcoslot.net/apps/openid/ [9] OpenID A Security Story, http://www.gnucitizen.org/blog/openid-a-security-sto ry/, 2007 4 Conclusion and Future Work So far, with the hierarchy openid scheme we mentioned the resolution for some openid security issues with this scheme. Of course, there is some OP (security) policy issue is including the restriction of number of possible 2 nd ID. In addition, this scheme needs to make up for other details of the service scenario. Also the information should be managed identity and the identity management facility will be on the side of the OP and the SP. But if recently the participation of web users and users as a single service object are considered, the hierarchy openid will be able to be safely and effectively self-management service. References: [1] OpenID, http://openid.co.kr [2] OpenID Authenitcation 2.0, http://openid.net/specs/openid-authenication-2_0.htm l, 2007 [3] OpenID Authentication 1.1, ISSN: 1790-5117 193 ISBN: 978-960-474-143-4