An Investigation of Identity-Account Inconsistency in Single Sign-On

Guannan Liu, Xing Gao, Haining Wang
{"title":"An Investigation of Identity-Account Inconsistency in Single Sign-On","authors":"Guannan Liu, Xing Gao, Haining Wang","doi":"10.1145/3442381.3450085","DOIUrl":null,"url":null,"abstract":"Single Sign-On (SSO) has been widely adopted for online authentication due to its favorable usability and security. However, it also introduces a single point of failure since all service providers fully trust the identity of a user created by the SSO identity provider. In this paper, we investigate the identity-account inconsistency threat, a new SSO vulnerability that can cause the compromise of online accounts. The vulnerability exists because current SSO systems highly rely on a user’s email address to bind an account with a real identity, but ignore the fact that email addresses might be reused by other users. We reveal that under the SSO authentication, such inconsistency allows an adversary controlling a reused email address to take over associated online accounts without knowing any credentials like passwords. Specifically, we first conduct a measurement study on the account management policies for multiple cloud email providers, showing the feasibility of acquiring previously used email accounts. We further perform a systematic study on 100 popular websites using the Google business email service with our own domain address and demonstrate that most online accounts can be compromised by exploiting this inconsistency vulnerability. To shed light on email reuse in the wild, we analyze the commonly used naming conventions that lead to a wide existence of potential email address collisions, and conduct a case study on the account policies of U.S. universities. Finally, we propose several useful practices for end-users, service providers, and identity providers to protect against this identity-account inconsistency threat.","PeriodicalId":106672,"journal":{"name":"Proceedings of the Web Conference 2021","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Web Conference 2021","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3442381.3450085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Single Sign-On (SSO) has been widely adopted for online authentication due to its favorable usability and security. However, it also introduces a single point of failure since all service providers fully trust the identity of a user created by the SSO identity provider. In this paper, we investigate the identity-account inconsistency threat, a new SSO vulnerability that can cause the compromise of online accounts. The vulnerability exists because current SSO systems highly rely on a user’s email address to bind an account with a real identity, but ignore the fact that email addresses might be reused by other users. We reveal that under the SSO authentication, such inconsistency allows an adversary controlling a reused email address to take over associated online accounts without knowing any credentials like passwords. Specifically, we first conduct a measurement study on the account management policies for multiple cloud email providers, showing the feasibility of acquiring previously used email accounts. We further perform a systematic study on 100 popular websites using the Google business email service with our own domain address and demonstrate that most online accounts can be compromised by exploiting this inconsistency vulnerability. To shed light on email reuse in the wild, we analyze the commonly used naming conventions that lead to a wide existence of potential email address collisions, and conduct a case study on the account policies of U.S. universities. Finally, we propose several useful practices for end-users, service providers, and identity providers to protect against this identity-account inconsistency threat.
单点登录中身份-账户不一致问题的研究
单点登录(Single Sign-On, SSO)以其良好的可用性和安全性被广泛应用于在线身份验证。但是,它也引入了单点故障,因为所有服务提供者都完全信任SSO身份提供者创建的用户的身份。本文研究了身份-帐户不一致威胁,这是一种新的单点登录漏洞,可以导致在线帐户的泄露。该漏洞的存在是因为当前的SSO系统高度依赖用户的电子邮件地址将帐户与真实身份绑定,但忽略了电子邮件地址可能被其他用户重用的事实。我们发现,在SSO身份验证下,这种不一致允许攻击者控制重用的电子邮件地址,在不知道任何凭据(如密码)的情况下接管相关的在线帐户。具体而言,我们首先对多个云电子邮件提供商的帐户管理策略进行了测量研究,显示了获取以前使用过的电子邮件帐户的可行性。我们进一步对使用我们自己的域名地址的谷歌商业电子邮件服务的100个流行网站进行了系统研究,并证明大多数在线帐户可以通过利用这种不一致漏洞而受到损害。为了阐明电子邮件的重用,我们分析了导致潜在电子邮件地址冲突的普遍使用的命名约定,并对美国大学的帐户政策进行了案例研究。最后,我们为最终用户、服务提供者和身份提供者提出了几个有用的实践,以防止这种身份-帐户不一致威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信