The power of recognition: secure single sign-on using TLS channel bindings

  • Authors:
  • Jörg Schwenk;Florian Kohlar;Marcus Amon

  • Affiliations:
  • Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Bochum, Germany;Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Bochum, Germany;Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Bochum, Germany

  • Venue:
  • Proceedings of the 7th ACM workshop on Digital identity management
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today, entity authentication in the TLS protocol involves at least three complex and partly insecure systems: the Domain Name System (DNS), Public Key Infrastructures (PKI), and human users, bound together by the Same Origin Policy (SOP). To solve the security threats resulting from this construction, a new concept was introduced at CCS '07: the strong locked same origin policy (SLSOP). The basic idea behind the SLSOP is to strengthen the identification of web servers through domain names, certificates and browser security warnings by a recognition of public keys to authenticate servers. Many weaknesses of current protocols emerging from an insecure PKI or DNS can thus be handled, even without involving the user. This concept has also been adapted by the IETF in RFC 5929. The contribution of this paper is as follows: First we present a new SLSOP-based login protocol and use it to design a secure Single Sign-On (SSO) protocol. Second we provide a first full proof-of-concept of such a protocol and also the first implementation of the channel binding described in RFC 5929, implementing a cross-domain SLSOP both for a new type of authentication cookies, as well as for the HTML-based POST and Redirect bindings. Finally we evaluate the security of this protocol and describe, how our protocol copes with modern attack vectors.