[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [higgins-dev] Attack on CardSpace possible with CloudSelector?


I should have been clearer.

In the Web selector case like for openID, and SAML POST binding you would want to compromise the Browsers DNS so that you can masquerade as the IdP/Webselector that way you can insert a SAME origin script from the IdP URL and compromise all of the tokens the user sends to any RP.

So the attack would be compromising the IdP DNS in the browser by one of the known methods.

I don't think this is a easy attack.   Most Phishers are going to concentrate on easier targets.

However as the value of the information protected by federated identity increases someone will try it.

I think a cloud selector is a much better target for an attack because it compromises multiple RP all at once.

I actually like the idea of cloud selectors, however a redirect based protocol is always going to be weaker, unless you are doing Holder of Key and at that point you have some active client anyway unless you are using mutual TLS everywhere with a single cert.

Adding Holder of Key to the existing selector is the best option for a number of reasons in my opinion.

John B.
On 2010-03-28, at 7:18 PM, Jonathan Tellier wrote:

> Hello,
> I think that what you say makes sense, but there's a part that I don't
> understand:
>> I think the Higgins cloud selector would be compromised by performing a DNS attack on the selector service as the easiest route.
> Maybe I'm missing something, but I thought that the token does not go
> directly to the RP. It is sent to the browser that then sends it to
> the RP. Maybe I'm not getting the process right though... If the cloud
> selector does not communicate directly to the RP, how would
> compromising its DNS server help an attacker?
> Thanks,
> Jonathan

Attachment: smime.p7s
Description: S/MIME cryptographic signature