147 research outputs found

    Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On

    Full text link
    Single Sign-On (SSO) systems simplify login procedures by using an an Identity Provider (IdP) to issue authentication tokens which can be consumed by Service Providers (SPs). Traditionally, IdPs are modeled as trusted third parties. This is reasonable for SSO systems like Kerberos, MS Passport and SAML, where each SP explicitely specifies which IdP he trusts. However, in open systems like OpenID and OpenID Connect, each user may set up his own IdP, and a discovery phase is added to the protocol flow. Thus it is easy for an attacker to set up its own IdP. In this paper we use a novel approach for analyzing SSO authentication schemes by introducing a malicious IdP. With this approach we evaluate one of the most popular and widely deployed SSO protocols - OpenID. We found four novel attack classes on OpenID, which were not covered by previous research, and show their applicability to real-life implementations. As a result, we were able to compromise 11 out of 16 existing OpenID implementations like Sourceforge, Drupal and ownCloud. We automated discovery of these attacks in a open source tool OpenID Attacker, which additionally allows fine-granular testing of all parameters in OpenID implementations. Our research helps to better understand the message flow in the OpenID protocol, trust assumptions in the different components of the system, and implementation issues in OpenID components. It is applicable to other SSO systems like OpenID Connect and SAML. All OpenID implementations have been informed about their vulnerabilities and we supported them in fixing the issues

    Aspektualität und Temporalität – Aspekt und Tempus

    Get PDF
    The present paper deals with grammatical categories and their formalization as morphological units on the example of aspectuality / temporality on the one hand, and aspect / tense on the other hand with special attention paid to Polish, German, English and Romanic languages such as Italian, French and Spanish. It could be shown that the formal realization of aspectuality cannot be considered as being restricted to aspects, but also comprises tense in languages which are deprived of aspects. Furthermore the author proves that the German system of past tenses semantically largely differ from its English binary counterpart which it is often wrongly equated with

    Telisch und atelisch: aspektual oder aktional oder beides? Zeno Vendlers Verbklassifikation und ihr Verhältnis zu den Kategorien Aspekt und Aktionsart

    Get PDF
    Im Laufe der letzten Jahrzehnte haben in die Aspektologie und die ihr gewidmeten wissenschaftlichen Debatten zunehmend Versuche Einzug gehalten, die mit dem Ziel unternommen wurden und darauf ausgerichtet waren, die Lexik der Verben in den Mittelpunkt des Interesses zu rücken und in der Hoffnung darauf zu durchforsten, darin Hinweise aufzuspüren, die es gestatten, entsprechende verlässliche Rückschlüsse auf das von ihnen gezeitigte Aspektverhalten, d.h. die in dem jeweiligen Fall zutage tretende Art der der Imperfektiv-Perfektiv-Opposition zugrunde liegenden Bedeutung zu ziehen. In dem Bemühen, eine aspektuell relevante Verbklassifikation, d.h. eine solche, die sowohl über die Frage der aspektuellen Paarigkeit von Verben als auch über die semantischen Eigenschaften von Perfektivum und Imperfektivum innerhalb eines Aspektpaares Aufschluss erteilt, zu erstellen, musste man sich zunächst auf die Aufgabe zurückbesinnen, die die Sprache dem Aspekt zubedacht hat und die durch den morphologisch geschiedenen Gegensatz von Imperfektiva und Perfektiva wahrgenommen wird: die - von mir eindeutig ausschließlich in diesem Sinne so genannte - Aspektualität

    Nonce-based Kerberos is a Secure Delegated AKE Protocol

    Get PDF
    Kerberos is one of the most important cryptographic protocols, first because it is the basisc authentication protocol in Microsoft\u27s Active Directory and shipped with every major operating system, and second because it served as a model for all Single-Sign-On protocols (e.g. SAML, OpenID, MS Cardspace, OpenID Connect). Its security has been confirmed with several Dolev-Yao style proofs, and attacks on certain versions of the protocol have been described. However despite its importance, despite its longevity, and despite the wealth of Dolev-Yao-style security proofs, no reduction based security proof has been published until now. This has two reasons: (1) All widely accepted formal models either deal with two-party protocols, or group key agreement protocols (where all entities have the same role), but not with 3-party protocols where each party has a different role. (2) Kerberos uses timestamps and nonces, and formal security models for timestamps are not well understood up to now. As a step towards a full security proof of Kerberos, we target problem (1) here: We propose a variant of the Kerberos protocol, where nonces are used instead of timestamps. This requires one additional protocol message, but enables a proof in the standard Bellare-Rogaway (BR) model. The key setup and the roles of the different parties are identical to the original Kerberos protocol. For our proof, we only require that the authenticated encryption and the message authentication code (MAC) schemes are secure. Under these assumptions we show that the probability that a client or server process oracle accepts maliciously, and the advantage of an adversary trying to distinguish a real Kerberos session key from a random value, are both negligible. One main idea in the proof is to model the Kerberos server a a public oracle, so that we do not have to consider the security of the connection client--Kerberos. This idea is only applicable to the communication pattern adapted by Kerberos, and not to other 3-party patterns (e.g. EAP protocols)

    Bedeutungsermittlung durch Kontrast oder: Wie man implizites Wissen explizit macht

    Get PDF
    The paper deals with verbal meaning deficiencies caused by lack of explicit knowledge occurring in Polish and German monolingual dictionaries with respect to the morphological categories of aspect and manner of action. The author shows that contrastive analysis has proved to be the chief means of identifying meaning and rendering implicit knowledge explicit, thus giving birth to the concept of horizontal lexicography and its realizatio

    On the Analysis of Cryptographic Assumptions in the Generic Ring Model

    Get PDF
    The generic ring model considers algorithms that operate on elements of an algebraic ring by performing only the ring operations and without exploiting properties of a given representation of ring elements. It is used to analyze the hardness of computational problems defined over rings. For instance, it is known that breaking RSA is equivalent to factoring in the generic ring model (Aggarwal and Maurer, Eurocrypt 2009). Do hardness results in the generic ring model support the conjecture that solving the considered problem is also hard in the standard model, where elements of Zn\Z_n are represented by integers modulo nn? We prove in the generic ring model that computing the Jacobi symbol of an integer modulo nn is equivalent to factoring. Since there are simple and efficient non-generic algorithms which compute the Jacobi symbol, this provides an example of a natural computational problem which is hard in the generic ring model, but easy to solve if elements of Zn\Z_n are given in their standard representation as integers. Thus, a proof in the generic ring model is unfortunately not a very strong indicator for the hardness of a computational problem in the standard model. Despite this negative result, generic hardness results still provide a lower complexity bound for a large class of algorithms, namely all algorithms solving a computational problem independent of a given representation of ring elements. Thus, from this point of view results in the generic ring model are still interesting. Motivated by this fact, we show also that solving the quadratic residuosity problem generically is equivalent to factoring

    The Generic Hardness of Subset Membership Problems under the Factoring Assumption

    Get PDF
    We analyze a large class of subset membership problems related to integer factorization. We show that there is no algorithm solving these problems efficiently without exploiting properties of the given representation of ring elements, unless factoring integers is easy. Our results imply that problems with high relevance for a large number of cryptographic applications, such as the quadratic residuosity and the subgroup decision problems, are generically equivalent to factoring

    Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses

    Get PDF
    Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport. A main feature of the protocol is its flexibility. Modes of operation and security aims can easily be configured through different cipher suites. During its evolutionary development process several flaws were found. However, the flexible architecture of SSL/TLS allowed efficient fixes in order to counter the issues. This paper presents an overview on theoretical and practical attacks of the last 15 years, in chronological order and four categories: Attacks on the TLS Handshake protocol, on the TLS Record and Application Data Protocols, on the PKI infrastructure of TLS, and on various other attacks. We try to give a short ”Lessons Learned” at the end of each paragraph
    corecore