SlideShare a Scribd company logo
1 of 29
By: Rahul Roshan
IIT-KGP(M.Tech)
1
 What is Cloud Computing ?
 Service Models
 Single Sign-On
 ACS Spoofing
 Countermeasures
 References
2
 Cloud Computing is the practice of using a network of remote
servers hosted on the Internet to store, manage, and process
data, rather than a local server or a personal computer.
 Advantages of Cloud Computing:
 Pay as you go
 Cost effective
 Location independent
3
4
INTERNET
USER
ORGANIZATION
PROGRAMMER
CLOUD COPUTING
CLOUD SERVIECE PROVIDER
 Software as a Service (SaaS)
 Access services via browser
 Examples: Google Docs, DropBox, Gmail
5
6
 Platform as a Service (PaaS)
 Provides development environment
 Examples: Microsoft Azure, Google AppEngine
 Infrastructure as a Service (IaaS)
 Provides virtual machines, storages
 Examples: AmazonWeb Services
7
DDoSAttack
60%
DNS Cache
Poisioning
6%
MITM Attack
12%
Password
Based Attacks
22%
Network Security Attacks
8
999
Website: www.xyz.com
Web Server
DatabaseUser
1010
Adversary’sWebsite:
www.attacker.com
Web Server
DatabaseUser
Website: www.xyz.com
11
Phishing Attack Report
Reference: Kaspersky Lab
 Single sign-on (SSO) property allows a user logs in once and gains access
to all systems without being prompted to log in again at each of them.
 SSO works among three parties:
 User (represented as browser)
 Identity Provider (IdP) e.g. Facebook, Gmail
 Relying Party or Service Provider
 No trust relationship between IdP and relying party or service provider.
 Famous Single Sign-On Systems:
 Facebook Connect
 OpenIDConnect
 OAuth
12
13
www.codechef.com
www.topcoder.com
www.slideshare.com
 Benefits
 Reducing time spent re-entering passwords for the same identity
 Reducing overhead to maintain different passwords for different
services
14
 Identity Provider (IdP) is used to provide identifiers for users
looking to interact with a system.
 Security Assertion Markup Language(SAML) is used to exchange
authentication and authorization data between Identity Provider
and Service Provider.
15
 SAML statements are contained in security tokens called assertions.
 SAML consist of three building blocks:
 Protocols: defines how assertions are exchanged between actors.
 Bindings: specify how to embed assertions into transport protocols (e.g., HTTP or
SOAP)
 Profiles: define the interplay of assertions, protocols, and bindings that are necessary
for the needs of a specific use case to be met.
16
 Authentication Request
17
<AuthnRequest IDVersion IssueInstant AssertionConsumerServiceURL?>
<Issuer>?
<Subject>?
<NameIDPolicy>?
<Extensions>?
<Signature>?
<Conditions>?
<RequestedAuthnContext>?
<Scoping>?
</AuthnRequest>
 The optional AssertionConsumerServiceURL (ACSURL) attribute
specifies the endpoint URL to which the IdP must deliver the issued
assertion.
 The authentication request may be protected by a digital signature
(<Signature>)
 The <Issuer> element specifies the SAML authority (the IdP) that
certifies the claim(s).
18
19
FacebookUserwww.codechef.com (RP)
 Adversary is a client in an SSO and attempts to convince the RP
that his browser represents Legitimate user, assuming that he
knows legitimate user’s username through a prior communication.
2020
Legitimate User
Adversary (Malicious User)
IdP (e.g. Gmail) Relying Party
 Adversary leaves malicious web content in user’s browser during
her visiting of his website, which can perform SSO operations
through sending requests to the IdP and the RP.
21
Legitimate User
Adversary (Malicious User)
IdP (e.g. Gmail) Relying Party
 When Legitimate user visits adversary's website, adversary acts as
an RP to the IdP, in an attempt to get user’s credential for the
target RP.
2222
Legitimate User
Adversary (Malicious User)
IdP (e.g. Gmail) Relying Party
 ACS (Assertion Consumer Service) Spoofing allows the adversary
to redirect the security token issued by the IdP to himself, and thus
to impersonate the victim to every federated SP.
 The only prerequisite for this attack is that the victim has to visit a
webpage controlled by the adversary.
 ACS Scanner
 An automated penetration test tool developed to scan ACS vulnerability
 Platform Independent
23
24
IdP
http://IdP.com
U --->UA A
http://ssoattack.org
SP
http://sp.com
1. HTTPGET URL
2. HTTPGET URLsp
3. HTTP 302 IdP,
(<AuthRequest(ID,SP,ACSurl)>, URLsp)
No security context.
User not identifiable
4. HTTP 302 IdP,
<AuthRequest(ID,SP,Badurl)>
,URLsp)
5. HTTP GET IdP,
(<AuthRequest(ID,SP,Badurl)>
,URLsp)
6. User authentication
7. HTTP 200
Form(<Response(AA)>,URLsp,
Badurl)
8. HTTP POST
Badurl,(<Response(AA)>,URLsp)
9. HTTP POST
ACSurl,(<Response(AA)>,URLsp)
Verify and evaluate
assertion
10. HTTP 302 URLsp
Generate
Assertion:
AA=(ID,IdP,SP,U)
SSO System Website Affected SPs ACS Spoofing Common
Vulnerability
Exposure (CVE)
One Login www.onelogin.com 3600+ Yes CVE-2012-
4962
WSO2 Stratos www.wso2.org 3000+ Yes CVE-2012-
4961
SSOCircle www.ssocircle.com 2600+ Yes CVE-2013-0115
Bitium www.bitium.com 1750+ Yes Direct comm.
25
 Whitelisting. One way to mitigate ACS Spoofing is to use a
whitelist of allowed ACSURL values for each and every SP, stored
at IdP.This may induce a significant management overhead for
large IdPs.
 Signing Authentication Request: In theory, signing authentication
requests would make the injection of a malicious ACSURL
impossible.
26
 Preferred mitigation is cookie binding combining the ease of SSO with a
cryptographically strengthened client authentication.
 Solution provided by Andreas Mayer hardens both the SSO protocol and
the session cookies by establishing mutually authenticated channels
between the browser and the other participating entities (i.e. IdP and
SP).
 This builds a holistic authentication layer that prevents a wide range of
attacks, including MITM,ACS Spoofing, and XSS/UI redressing
vulnerabilities.
27
 Rui Wang, Shuo Chen, and XiaoFeng Wang. 2012. Signing Me ontoYour Accounts through
Facebook and Google: ATraffic-Guided Security Study of Commercially Deployed Single-
Sign-On Web Services. In Proceedings of the 2012 IEEE Symposium on Security and
Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 365-379.
DOI=10.1109/SP.2012.30 http://dx.doi.org/10.1109/SP.2012.30
 Andreas Mayer, Marcus Niemietz,Vladislav Mladenov, and Jörg Schwenk. 2014. Guardians
of the Clouds: When Identity Providers Fail. In Proceedings of the 6th edition of the ACM
Workshop on Cloud Computing Security (CCSW '14). ACM, NewYork, NY, USA, 105-116.
DOI=10.1145/2664168.2664171 http://doi.acm.org/10.1145/2664168.2664171
 A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, and A. Sorniotti. From
Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? In SEC,
volume 354 of IFIP Advances in Information and Communication Technology, pages 68{79.
Springer, 2011.
28
 Yuen-Yan Chan. 2006. Weakest link attack on single sign-on and its case in SAML v2.0 web
SSO. In Proceedings of the 2006 international conference on Computational Science and Its
Applications -Volume Part III (ICCSA'06), Marina Gavrilova, Osvaldo Gervasi, Vipin Kumar, C.
Kenneth Tan, and David Taniar (Eds.), Vol. Part III. Springer-Verlag, Berlin, Heidelberg, 507-
516. DOI=10.1007/11751595_54 http://dx.doi.org/10.1007/11751595_54
 Hsin-Yi Tsai; Siebenhaar, M.; Miede, A.;Yu-Lun Huang; Steinmetz, R., "Threat as a Service?:
Virtualization's Impact on Cloud Security," IT Professional , vol.14, no.1, pp.32,37, Jan.-Feb.
2012
doi: 10.1109/MITP.2011.117
29

More Related Content

What's hot

Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Sean Jackson
 
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...aOS Community
 
Spring Framework - Spring Security
Spring Framework - Spring SecuritySpring Framework - Spring Security
Spring Framework - Spring SecurityDzmitry Naskou
 
Single-Page-Application & REST security
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST securityIgor Bossenko
 
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry BuzdinModern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry BuzdinJava User Group Latvia
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
JavaOne 2014 - Securing RESTful Resources with OAuth2
JavaOne 2014 - Securing RESTful Resources with OAuth2JavaOne 2014 - Securing RESTful Resources with OAuth2
JavaOne 2014 - Securing RESTful Resources with OAuth2Rodrigo Cândido da Silva
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersChema Alonso
 
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...CA API Management
 
SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
SOA Architecture & SOAP Protocol Architecture Detail & Attack VectorSOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
SOA Architecture & SOAP Protocol Architecture Detail & Attack Vectorn|u - The Open Security Community
 
J2EE Security with Apache SHIRO
J2EE Security with Apache SHIROJ2EE Security with Apache SHIRO
J2EE Security with Apache SHIROCygnet Infotech
 
[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSSOWASP
 
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...Hermann Burgmeier
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2Rodrigo Cândido da Silva
 
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsIJNSA Journal
 

What's hot (20)

Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Owasp top 10_openwest_2019
Owasp top 10_openwest_2019
 
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
 
Spring Framework - Spring Security
Spring Framework - Spring SecuritySpring Framework - Spring Security
Spring Framework - Spring Security
 
Single-Page-Application & REST security
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST security
 
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry BuzdinModern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
JavaOne 2014 - Securing RESTful Resources with OAuth2
JavaOne 2014 - Securing RESTful Resources with OAuth2JavaOne 2014 - Securing RESTful Resources with OAuth2
JavaOne 2014 - Securing RESTful Resources with OAuth2
 
Xss frame work
Xss frame workXss frame work
Xss frame work
 
How "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scannersHow "·$% developers defeat the web vulnerability scanners
How "·$% developers defeat the web vulnerability scanners
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
 
SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
SOA Architecture & SOAP Protocol Architecture Detail & Attack VectorSOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
 
J2EE Security with Apache SHIRO
J2EE Security with Apache SHIROJ2EE Security with Apache SHIRO
J2EE Security with Apache SHIRO
 
[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS
 
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2
 
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
 
A cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applicationsA cryptographic mutual authentication scheme for web applications
A cryptographic mutual authentication scheme for web applications
 

Viewers also liked

Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3STM Journals
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Govinda Aryal
 
Scalable cloud governance, risk management and compliance
Scalable cloud governance, risk management and complianceScalable cloud governance, risk management and compliance
Scalable cloud governance, risk management and compliancePeter HJ van Eijk
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computingMartin Bioh
 
Steven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer cloudingSteven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer clouding'Self-Employed'
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Accountability for Data Governance in the Cloud
Accountability for Data Governance in the CloudAccountability for Data Governance in the Cloud
Accountability for Data Governance in the CloudMassimo Felici
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
Application Security Trends and Issues
Application Security Trends and IssuesApplication Security Trends and Issues
Application Security Trends and IssuesDedi Dwianto
 
Trend and Future of Cloud Computing
Trend and Future of Cloud ComputingTrend and Future of Cloud Computing
Trend and Future of Cloud Computinghybrid cloud
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Securing hacked website // Malware infected website filled with backdoors
Securing hacked website // Malware infected website filled with backdoorsSecuring hacked website // Malware infected website filled with backdoors
Securing hacked website // Malware infected website filled with backdoorsMayur Pipaliya
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (20)

Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3Journal of Network Security vol 4 issue 3
Journal of Network Security vol 4 issue 3
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
 
Scalable cloud governance, risk management and compliance
Scalable cloud governance, risk management and complianceScalable cloud governance, risk management and compliance
Scalable cloud governance, risk management and compliance
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computing
 
Steven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer cloudingSteven Porter Seville | Ideas about Computer clouding
Steven Porter Seville | Ideas about Computer clouding
 
security issue
security issuesecurity issue
security issue
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Accountability for Data Governance in the Cloud
Accountability for Data Governance in the CloudAccountability for Data Governance in the Cloud
Accountability for Data Governance in the Cloud
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Application Security Trends and Issues
Application Security Trends and IssuesApplication Security Trends and Issues
Application Security Trends and Issues
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Trend and Future of Cloud Computing
Trend and Future of Cloud ComputingTrend and Future of Cloud Computing
Trend and Future of Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Securing hacked website // Malware infected website filled with backdoors
Securing hacked website // Malware infected website filled with backdoorsSecuring hacked website // Malware infected website filled with backdoors
Securing hacked website // Malware infected website filled with backdoors
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to Single Sign-On security issue in Cloud Computing

Web 20 Security - Vordel
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordelguest2a1135
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
Security Testing For Web Applications
Security Testing For Web ApplicationsSecurity Testing For Web Applications
Security Testing For Web ApplicationsVladimir Soghoyan
 
DevSecOps - automating security
DevSecOps - automating securityDevSecOps - automating security
DevSecOps - automating securityJohn Staveley
 
기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...
기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...
기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...Amazon Web Services Korea
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008abhijitapatil
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Cloud Security 2014 AASNET
Cloud Security 2014 AASNETCloud Security 2014 AASNET
Cloud Security 2014 AASNETFarrukh Shahzad
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud appsCenzic
 
Azure Incident Response Cheat Sheet.pdf
Azure Incident Response Cheat Sheet.pdfAzure Incident Response Cheat Sheet.pdf
Azure Incident Response Cheat Sheet.pdfChristopher Doman
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Moataz Kamel
 

Similar to Single Sign-On security issue in Cloud Computing (20)

F017353539
F017353539F017353539
F017353539
 
Web 20 Security - Vordel
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordel
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Security Testing For Web Applications
Security Testing For Web ApplicationsSecurity Testing For Web Applications
Security Testing For Web Applications
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
DevSecOps - automating security
DevSecOps - automating securityDevSecOps - automating security
DevSecOps - automating security
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...
기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...
기업 환경 변화에 신속하게 대응하는 안전한 솔루션 : AWS End User Computing – 김종선 :: AWS Builders On...
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Cloud Security 2014 AASNET
Cloud Security 2014 AASNETCloud Security 2014 AASNET
Cloud Security 2014 AASNET
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
Azure Incident Response Cheat Sheet.pdf
Azure Incident Response Cheat Sheet.pdfAzure Incident Response Cheat Sheet.pdf
Azure Incident Response Cheat Sheet.pdf
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
Microservice architecture-api-gateway-considerations
Microservice architecture-api-gateway-considerationsMicroservice architecture-api-gateway-considerations
Microservice architecture-api-gateway-considerations
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 

Recently uploaded

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (11)

Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Single Sign-On security issue in Cloud Computing

  • 2.  What is Cloud Computing ?  Service Models  Single Sign-On  ACS Spoofing  Countermeasures  References 2
  • 3.  Cloud Computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.  Advantages of Cloud Computing:  Pay as you go  Cost effective  Location independent 3
  • 5.  Software as a Service (SaaS)  Access services via browser  Examples: Google Docs, DropBox, Gmail 5
  • 6. 6
  • 7.  Platform as a Service (PaaS)  Provides development environment  Examples: Microsoft Azure, Google AppEngine  Infrastructure as a Service (IaaS)  Provides virtual machines, storages  Examples: AmazonWeb Services 7
  • 12.  Single sign-on (SSO) property allows a user logs in once and gains access to all systems without being prompted to log in again at each of them.  SSO works among three parties:  User (represented as browser)  Identity Provider (IdP) e.g. Facebook, Gmail  Relying Party or Service Provider  No trust relationship between IdP and relying party or service provider.  Famous Single Sign-On Systems:  Facebook Connect  OpenIDConnect  OAuth 12
  • 14.  Benefits  Reducing time spent re-entering passwords for the same identity  Reducing overhead to maintain different passwords for different services 14
  • 15.  Identity Provider (IdP) is used to provide identifiers for users looking to interact with a system.  Security Assertion Markup Language(SAML) is used to exchange authentication and authorization data between Identity Provider and Service Provider. 15
  • 16.  SAML statements are contained in security tokens called assertions.  SAML consist of three building blocks:  Protocols: defines how assertions are exchanged between actors.  Bindings: specify how to embed assertions into transport protocols (e.g., HTTP or SOAP)  Profiles: define the interplay of assertions, protocols, and bindings that are necessary for the needs of a specific use case to be met. 16
  • 17.  Authentication Request 17 <AuthnRequest IDVersion IssueInstant AssertionConsumerServiceURL?> <Issuer>? <Subject>? <NameIDPolicy>? <Extensions>? <Signature>? <Conditions>? <RequestedAuthnContext>? <Scoping>? </AuthnRequest>
  • 18.  The optional AssertionConsumerServiceURL (ACSURL) attribute specifies the endpoint URL to which the IdP must deliver the issued assertion.  The authentication request may be protected by a digital signature (<Signature>)  The <Issuer> element specifies the SAML authority (the IdP) that certifies the claim(s). 18
  • 20.  Adversary is a client in an SSO and attempts to convince the RP that his browser represents Legitimate user, assuming that he knows legitimate user’s username through a prior communication. 2020 Legitimate User Adversary (Malicious User) IdP (e.g. Gmail) Relying Party
  • 21.  Adversary leaves malicious web content in user’s browser during her visiting of his website, which can perform SSO operations through sending requests to the IdP and the RP. 21 Legitimate User Adversary (Malicious User) IdP (e.g. Gmail) Relying Party
  • 22.  When Legitimate user visits adversary's website, adversary acts as an RP to the IdP, in an attempt to get user’s credential for the target RP. 2222 Legitimate User Adversary (Malicious User) IdP (e.g. Gmail) Relying Party
  • 23.  ACS (Assertion Consumer Service) Spoofing allows the adversary to redirect the security token issued by the IdP to himself, and thus to impersonate the victim to every federated SP.  The only prerequisite for this attack is that the victim has to visit a webpage controlled by the adversary.  ACS Scanner  An automated penetration test tool developed to scan ACS vulnerability  Platform Independent 23
  • 24. 24 IdP http://IdP.com U --->UA A http://ssoattack.org SP http://sp.com 1. HTTPGET URL 2. HTTPGET URLsp 3. HTTP 302 IdP, (<AuthRequest(ID,SP,ACSurl)>, URLsp) No security context. User not identifiable 4. HTTP 302 IdP, <AuthRequest(ID,SP,Badurl)> ,URLsp) 5. HTTP GET IdP, (<AuthRequest(ID,SP,Badurl)> ,URLsp) 6. User authentication 7. HTTP 200 Form(<Response(AA)>,URLsp, Badurl) 8. HTTP POST Badurl,(<Response(AA)>,URLsp) 9. HTTP POST ACSurl,(<Response(AA)>,URLsp) Verify and evaluate assertion 10. HTTP 302 URLsp Generate Assertion: AA=(ID,IdP,SP,U)
  • 25. SSO System Website Affected SPs ACS Spoofing Common Vulnerability Exposure (CVE) One Login www.onelogin.com 3600+ Yes CVE-2012- 4962 WSO2 Stratos www.wso2.org 3000+ Yes CVE-2012- 4961 SSOCircle www.ssocircle.com 2600+ Yes CVE-2013-0115 Bitium www.bitium.com 1750+ Yes Direct comm. 25
  • 26.  Whitelisting. One way to mitigate ACS Spoofing is to use a whitelist of allowed ACSURL values for each and every SP, stored at IdP.This may induce a significant management overhead for large IdPs.  Signing Authentication Request: In theory, signing authentication requests would make the injection of a malicious ACSURL impossible. 26
  • 27.  Preferred mitigation is cookie binding combining the ease of SSO with a cryptographically strengthened client authentication.  Solution provided by Andreas Mayer hardens both the SSO protocol and the session cookies by establishing mutually authenticated channels between the browser and the other participating entities (i.e. IdP and SP).  This builds a holistic authentication layer that prevents a wide range of attacks, including MITM,ACS Spoofing, and XSS/UI redressing vulnerabilities. 27
  • 28.  Rui Wang, Shuo Chen, and XiaoFeng Wang. 2012. Signing Me ontoYour Accounts through Facebook and Google: ATraffic-Guided Security Study of Commercially Deployed Single- Sign-On Web Services. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 365-379. DOI=10.1109/SP.2012.30 http://dx.doi.org/10.1109/SP.2012.30  Andreas Mayer, Marcus Niemietz,Vladislav Mladenov, and Jörg Schwenk. 2014. Guardians of the Clouds: When Identity Providers Fail. In Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security (CCSW '14). ACM, NewYork, NY, USA, 105-116. DOI=10.1145/2664168.2664171 http://doi.acm.org/10.1145/2664168.2664171  A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, and A. Sorniotti. From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? In SEC, volume 354 of IFIP Advances in Information and Communication Technology, pages 68{79. Springer, 2011. 28
  • 29.  Yuen-Yan Chan. 2006. Weakest link attack on single sign-on and its case in SAML v2.0 web SSO. In Proceedings of the 2006 international conference on Computational Science and Its Applications -Volume Part III (ICCSA'06), Marina Gavrilova, Osvaldo Gervasi, Vipin Kumar, C. Kenneth Tan, and David Taniar (Eds.), Vol. Part III. Springer-Verlag, Berlin, Heidelberg, 507- 516. DOI=10.1007/11751595_54 http://dx.doi.org/10.1007/11751595_54  Hsin-Yi Tsai; Siebenhaar, M.; Miede, A.;Yu-Lun Huang; Steinmetz, R., "Threat as a Service?: Virtualization's Impact on Cloud Security," IT Professional , vol.14, no.1, pp.32,37, Jan.-Feb. 2012 doi: 10.1109/MITP.2011.117 29