OAUCH: Exploring Security Compliance in the OAuth 2.0 Ecosystem

被引:6
|
作者
Philippaerts, Pieter [1 ]
Preuveneers, Davy [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Leuven, Belgium
关键词
ATTACKS;
D O I
10.1145/3545948.3545955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue to appear in popular OAuth implementations. This paper sets out to improve the security of the OAuth landscape by measuring how well individual identity providers (IdPs) implement the security specifications defined in the OAuth standard, and by providing detailed and targeted feedback to the operators to improve the compliance of their service. We present a tool, called OAuch, that tests and analyzes IdPs according to the guidelines of the OAuth standards and security best practices. We evaluate 100 publicly deployed OAuth IdPs using OAuch and aggregate the results to create a unique overview of the current state of practice in the OAuth ecosystem. We determine that, on average, an OAuth IdP does not implement 34% of the security specifications present in the OAuth standards, including 20% of the required specifications. We then validate the IdPs against the OAuth threat model. The analysis shows that 97 IdPs leave one or more threats completely unmitigated (with an average of 4 unmitigated threats per IdP). No IdPs fully mitigate all threats. We further validate the results by picking four attack vectors and using the tool's output to determine which IdPs to attack. The results were highly accurate, with a false positive rate of 1.45% and a false negative rate of 1.48% for the four attack vectors combined.
引用
收藏
页码:460 / 481
页数:22
相关论文
共 50 条
  • [21] Unified singular protocol flow for OAuth ecosystem
    Singh, Jaimandeep
    Chaudhary, Naveen Kumar
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 25 (1-2) : 53 - 77
  • [22] Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0
    Mortagua, Duarte
    Zuquete, Andre
    Salvador, Paulo
    COMPUTER NETWORKS, 2024, 244
  • [23] OAuth2.0协议的优化方法
    魏成坤
    刘向东
    石兆军
    计算机工程与设计, 2016, 37 (11) : 2949 - 2955
  • [24] Evaluation of an OAuth 2.0 Protocol Implementation for Web Server Applications
    Darwish, Marwan
    Ouda, Abdelkader
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [25] 基于OAuth2.0的认证授权技术
    时子庆
    刘金兰
    谭晓华
    计算机系统应用, 2012, 21 (03) : 260 - 264
  • [26] OAuth2.0协议及其应用模式研究
    席剑霄
    软件导刊, 2015, 14 (07) : 23 - 26
  • [27] Implementation Vulnerability Associated with OAuth 2.0 A Case Study on Dropbox
    Wu, Bruce
    Tung Nguyen
    Husain, Mohammad
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 135 - 138
  • [28] Success in the Web 2.0 Ecosystem: Exploring the State and Determinants in Indian Businesses
    Wahi, Ashok Kumar
    Misra, Rajnish Kumar
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2016, 12 (01) : 19 - 42
  • [29] OAuth 2.0 Redirect URI Validation Falls Short, Literally
    Innocenti, Tommaso
    Golinelli, Matteo
    Onarlioglu, Kaan
    Mirheidari, Ali
    Crispo, Bruno
    Kirda, Engin
    39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 256 - 267
  • [30] 基于OAuth2.0的单点登录系统
    孟青春
    吴颖川
    刘志勤
    杨雷
    付智慧
    软件导刊, 2014, 13 (03) : 106 - 108