SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle

  • Authors:
  • Rolf Oppliger;Ralf Hauser;David Basin

  • Affiliations:
  • eSECURITY Technologies, Beethovenstrasse 10, CH-3073 Gümligen, Switzerland;PrivaSphere AG, Fichtenstrasse 61, CH-8032 Zürich, Switzerland;Department of Computer Science, ETH Zurich, Haldeneggsteig 4, CH-8092 Zürich, Switzerland

  • Venue:
  • Computer Communications
  • Year:
  • 2006

Quantified Score

Hi-index 0.24

Visualization

Abstract

Man-in-the-middle attacks pose a serious threat to SSL/TLS-based electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed user authentication mechanisms fail to provide protection against this type of attack, even when they run on top of SSL/TLS. As a possible countermeasure, we introduce the notion of SSL/TLS session-aware user authentication, and present different possibilities for implementing it. We start with a basic implementation that employs impersonal authentication tokens. Afterwards, we address extensions and enhancements and discuss possibilities for implementing SSL/TLS session-aware user authentication in software.