Risks of the CardSpace Protocol

  • Authors:
  • Sebastian Gajek;Jörg Schwenk;Michael Steiner;Chen Xuan

  • Affiliations:
  • Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany;Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany;IBM T.J. Watson Research Center, USA;Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

  • Venue:
  • ISC '09 Proceedings of the 12th International Conference on Information Security
  • Year:
  • 2009
  • Protected login

    FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security

Quantified Score

Hi-index 0.00

Visualization

Abstract

Microsoft has designed a user-centric identity metasystem encompassing a suite of various protocols for identity management. CardSpace is based on open standards, so that various applications can make use of the identity metasystem, including, for example, Microsoft Internet Explorer or Firefox (with some add-on). We therefore expect Microsoft's identity metasystem to become widely deployed on the Internet and a popular target to attack. We examine the security of CardSpace against today's Internet threats and identify risks and attacks. The browser-based CardSpace protocol does not prevent against replay of security tokens. Users can be impersonated and are potential victims of identity theft. We demonstrate the practicability of the flaw by presenting a proof of concept attack. Finally, we suggest several areas of improvement.