13.07.2015 Views

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Liberty</strong> <strong>Alliance</strong> Project:<strong>Liberty</strong> <strong>ID</strong>-<strong>FF</strong> <strong>Bindings</strong> <strong>and</strong> <strong>Profiles</strong> <strong>Specification</strong>Version: 1.2-errata-v2.0228322842285228622872288228922902291229222932294229522962297229822992300230123022303an active session before issuing an without first authenticating the Principal. Cookies posted byidentity providers MAY be used to support this validation process, though <strong>Liberty</strong> does not m<strong>and</strong>ate a cookie-basedapproach.4.4.2.2. <strong>Liberty</strong>-Enabled Client <strong>and</strong> Proxy ProfileThreat: Intercepted <strong>and</strong> <strong>and</strong> subsequent Principal impersonation.Description: A spurious system entity can interject itself as a man-in-the-middle (MITM) between the user agent(LECP) <strong>and</strong> a legitimate service provider, where it acts in the service provider role in interactions with theLECP, <strong>and</strong> in the user agent role in interactions with the legitimate service provider. In this way, as a first step,the MITM is able to intercept the service provider’s (step 3 of Section 3.2.4)<strong>and</strong> substitute any URL of its choosing for the value before forwardingthe on to the LECP. Typically, the MITM will insert a URL value thatpoints back to itself. Then, if the LECP subsequently receives a from theidentity provider (step 6 in Section 3.2.4) <strong>and</strong> subsequently sends the contained to the received from the MITM, the MITM will be able to masquerade as thePrincipal at the legitimate service provider.Countermeasure: The identity provider specifies to the LECP the address to which the LECPmust send the . The in the element is for this purpose. This URL value is among the metadata thatidentity <strong>and</strong> service providers must exchange in the process of establishing their operational relationship (seeSection 3.1 <strong>and</strong> Section 3.1.3).23042305230623072308230923102311231223132314231523162317231823192320232123224.4.2.3. FederationThreat: Collusion among service providers can violate privacy of the PrincipalDescription: When a group of service providers collude to share the of aPrincipal, they can track <strong>and</strong> in general compromise the privacy of the principal. More generally, this threat exists forany common data (e.g. phone number) shared by rogue system entities.Countermeasure: The is required to be unique for each identity provider toservice provider relationship. However, this requirement does not eliminate the threat when there are rogue participantsunder the Principal’s identity federation. The only protection is for Principals to be cautious when they choose serviceproviders <strong>and</strong> underst<strong>and</strong> their privacy policies.Threat: Poorly generated name identifiers may compromise privacyDescription: The federation protocol m<strong>and</strong>ates that the elements be unique within aPrincipal’s federated identities. The name identifiers exchanged are pseudonyms <strong>and</strong>, to maintain the privacy ofthe Principal, should be resistant to guessing or derivation attacks.Countermeasure: Name identifiers should be constructed using pseudo-r<strong>and</strong>om values that have no discernablecorrespondence with the Principal’s identifier (or name) used by the entity that generates the name identifier.4.4.3. Name RegistrationNo known threats.4.4.4. Federation Termination: HTTP-Redirect-Based ProfileThreat: Attacker can monitor <strong>and</strong> disrupt termination<strong>Liberty</strong> <strong>Alliance</strong> Project67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!