OAUCH: Exploring Security Compliance in the OAuth 2.0 Ecosystem

被引:3
|
作者
Philippaerts, Pieter [1 ]
Preuveneers, Davy [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Leuven, Belgium
关键词
ATTACKS;
D O I
10.1145/3545948.3545955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue to appear in popular OAuth implementations. This paper sets out to improve the security of the OAuth landscape by measuring how well individual identity providers (IdPs) implement the security specifications defined in the OAuth standard, and by providing detailed and targeted feedback to the operators to improve the compliance of their service. We present a tool, called OAuch, that tests and analyzes IdPs according to the guidelines of the OAuth standards and security best practices. We evaluate 100 publicly deployed OAuth IdPs using OAuch and aggregate the results to create a unique overview of the current state of practice in the OAuth ecosystem. We determine that, on average, an OAuth IdP does not implement 34% of the security specifications present in the OAuth standards, including 20% of the required specifications. We then validate the IdPs against the OAuth threat model. The analysis shows that 97 IdPs leave one or more threats completely unmitigated (with an average of 4 unmitigated threats per IdP). No IdPs fully mitigate all threats. We further validate the results by picking four attack vectors and using the tool's output to determine which IdPs to attack. The results were highly accurate, with a false positive rate of 1.45% and a false negative rate of 1.48% for the four attack vectors combined.
引用
下载
收藏
页码:460 / 481
页数:22
相关论文
共 50 条
  • [31] Solutions for non-web OAuth 2.0 authorisation at CERN
    Aguado Corman, Asier
    Henschel, Jack
    Short, Hannah
    Lopienski, Sebastian
    26TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS, CHEP 2023, 2024, 295
  • [32] OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments
    Siris, Vasilios A.
    Dimopoulos, Dimitrios
    Fotiou, Nikos
    Voulgaris, Spyros
    Polyzos, George C.
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 364 - 367
  • [33] Web OAuth-based SSO Systems Security
    Sadqi, Yassine
    Belfaik, Yousra
    Safi, Said
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,
  • [34] Integration of the OAuth and Web Service family security standards
    Torroglosa-Garcia, Elena
    Perez-Morales, Antonio D.
    Martinez-Julia, Pedro
    Lopez, Diego R.
    COMPUTER NETWORKS, 2013, 57 (10) : 2233 - 2249
  • [35] VaultPoint: A Blockchain-Based SSI Model that Complies with OAuth 2.0
    Hong, Seongho
    Kim, Heeyoul
    ELECTRONICS, 2020, 9 (08) : 1 - 20
  • [37] Methodology for massive configuration of OAuth 2.0 tokens in large IoT scenarios
    Cruz-Piris, Luis
    Rivera, Diego
    Vega-Barbas, Mario
    PROCEEDINGS OF THE 2020 16TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENVIRONMENTS (IE), 2020, : 5 - 12
  • [38] Formal Analysis and Verification of OAuth 2.0 Protocol Improved by Key Cryptosystems
    XIAO Meihua
    CHENG Daolei
    LI Wei
    LI Ya'nan
    LIU Xinqian
    MEI Yingtian
    Chinese Journal of Electronics, 2017, 26 (03) : 477 - 484
  • [39] Towards Enhancing the Security of OAuth Implementations In Smart Phones
    Shehab, Mohammed
    Mohsen, Fadi
    2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, : 39 - 46
  • [40] Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance
    Yoo, Chul Woo
    Sanders, G. Lawrence
    Cerveny, Robert P.
    DECISION SUPPORT SYSTEMS, 2018, 108 : 107 - 118