2015
DOI: 10.1007/978-3-319-24174-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web

Abstract: BrowserID is a complex, real-world Single Sign-On (SSO) System for web applications recently developed by Mozilla. It employs new HTML5 features (such as web messaging and web storage) and cryptographic assertions to provide decentralized login, with the intent to respect users' privacy. It can operate in a primary and a secondary identity provider mode. While in the primary mode BrowserID runs with arbitrary identity providers, in the secondary mode there is one identity provider only, namely Mozilla's defaul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 18 publications
(55 citation statements)
references
References 16 publications
(61 reference statements)
0
55
0
Order By: Relevance
“…This shows that state cannot be known to any party except for b, i, and r. 19 Note that we have only web attackers. 20 We note that, as discussed earlier, without the Referrer Policy, state could leak to a malicious IdP or other parties.…”
Section: E Proof Of Session Integritymentioning
confidence: 85%
See 3 more Smart Citations
“…This shows that state cannot be known to any party except for b, i, and r. 19 Note that we have only web attackers. 20 We note that, as discussed earlier, without the Referrer Policy, state could leak to a malicious IdP or other parties.…”
Section: E Proof Of Session Integritymentioning
confidence: 85%
“…The mitigation presented in Section III-A would have prevented the attack in Step 16 ff. Figure 5) 20 POST /start email 21 Response Redirect to HIdP authEP with client_id, redirect_uri, state 22 POST /token access_token , code, state 23 POST tokenEP code, client_id, redirect_uri, client_secret 24 Response access_token , id_token 25 Response session_cookie 26 POST tokenEP code, client_id, redirect_uri 27 Response access_token , id_token 28 Response access_token , id_token 29 GET /protectedResource access_token 30 GET /protectedResource access_token 31 Response secret user data dec a (enc a (x, pub(y)), y) = x…”
Section: Acknowledgementsmentioning
confidence: 99%
See 2 more Smart Citations
“…Then, as soon as the user starts a new OAuth flow with the same RP and an honest IdP, the malicious IdP can use the known state value to mount a CSRF attack, breaking the session integrity property. 14 We also model CSRF protection for some URIs as follows: For RPs, we model origin header checking 15 (1) at the URI where the OAuth flow is started (for the implicit and authorization code mode), (2) at the password login for the resource owner password credentials mode, and (3) at the URI to which the JavaScript posts the access token in the implicit mode. For IdPs, we do the same at the URI to which the username and password pairs are posted.…”
Section: Attack Mitigationsmentioning
confidence: 99%