Abstract
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can temporarily delegate the right to use a credential to another person without revealing the secret. Related to this is the issue of sharing a single credential among members of a group such that all of them may use the credential, but no one actually gets to know it. This paper presents and compares several solutions to solve these problems. One is a client-side approach, while the other three are man-in-the-middle architectures. We have implemented one of these, the HTTP proxy variant, as a prototype. Our TLS Authentication Proxy is capable of transparently authenticating with a target web server on behalf of users. It supports the major authentication methods used on the Internet, both for standard HTTP and SSL connections.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
CCITT: Recommendation X.509: The Directory - Authentication Framework. Technical report (1988)
Ginkel, T.-A.: Entwurf und Implementierung eines Authentifikations-Proxys für das World Wide Web. Diploma thesis, Technische Universität Darmstadt (2004), http://thilo.ginkel.com/diplom/
RSA Laboratories: PKCS#12 v1.0: Personal Information Exchange Syntax. Standard (1999), http://www.rsasecurity.com/rsalabs/pkcs/pkcs-12/
Pashalidis, A., Mitchell, C.J.: A Taxonomy of Single Sign-On Systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 249–264. Springer, Heidelberg (2003)
De Clercq, J.: Kerberized Credential Translation: A Solution to Web Access Control. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 40–58. Springer, Heidelberg (2002)
Basney, J., Yurcik, W., Bonilla, R., Slagell, A.: Credential Wallets: A Classification of Credential Repositories Highlighting MyProxy. In: Proc. 31st Research Conference on Communication, Information and Internet Policy (2003), http://www.ncsa.uiuc.edu/~jbasney/credentialwalletTPRC.pdf
Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). RFC 1510 (1993), http://www.ietf.org/rfc/rfc1510.txt
Kornievskaia, O., Honeyman, P., Doster, B., Coffman, K.: Kerberized Credential Translation: A Solution to Web Access Control. In: Proc. 10th USENIX Security Symposium, pp. 235–250 (2001), http://www.usenix.org/events/sec01/full_papers/kornievskaia/
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Simple public key certificate. IETF Internet Draft (1999)
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (1999)
Goffee, N.C., Kim, S.H., Smith, S., Taylor, P., Zhao, M., Marchesini, J.: Greenpass: Decentralized, PKI-based Authorization for Wireless LANs. In: Proceedings 3rd Annual PKI R&D Workshop, pp. 16–30 (2004)
Butler, R., Welch, V., Engert, D., Foster, I., Tuecke, S., Volmer, J., Kesselman, C.: A National-Scale Authentication Infrastructure. IEEE Computer 33, 60–66 (2000)
Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure (PKI) – Proxy Certificate Profile. RFC 3820 (2004), http://www.ietf.org/rfc/rfc3820.txt
Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. RFC 3281 (2002), http://www.ietf.org/rfc/rfc3281.txt
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol – HTTP/1.1. RFC 2616 (1999), http://www.ietf.org/rfc/rfc2616.txt
Luotonen, A.: Tunneling TCP Based Protocols Through Web Proxy Servers (1998), http://www.web-cache.com/Writings/Internet-Drafts/draft-luotonen-web-proxy-tunneling-01.txt
Khare, R., Lawrence, S.: Upgrading to TLS Within HTTP/1.1. RFC 2817 (2000), http://www.ietf.org/rfc/rfc2817.txt
Gauthier, P., Cohen, J., Dunsmuir, M., Perkins, C.: Web Proxy Auto-Discovery Protocol. Internet draft (1999), http://www.web-cache.com/Writings/Internet-Drafts/draft-ietf-wrec-wpad-01.txt
Netscape Communications Corporation: Navigator Proxy Auto-Config File Format (1996), http://wp.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html
Rhee, M.Y.: Internet Security. John Wiley & Sons, Chichester (2003) ISBN 0-470-85285-2
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP Authentication: Basic and Digest Access Authentication. RFC 2617 (1999), http://www.ietf.org/rfc/rfc2617.txt
Glass, E.: The NTLM Authentication Protocol (2003), http://davenport.sourceforge.net/ntlm.html
Microsoft Corporation: Microsoft NTLM. Microsoft Developer Network Library (2004), http://msdn.microsoft.com/library/en-us/secauthn/security/microsoft_ntlm.asp
Raggett, D., Hors, A.L., Jacobs, I.: HTML 4.01 Specification W3C Recommendation (1997), http://www.w3.org/TR/html4/
Kristol, D., Montulli, L.: HTTP State Management Mechanism. RFC 2965 (2000), http://www.ietf.org/rfc/rfc2965.txt
Hickman, K.: SSL 2.0 Protocol Specification. Technical report, Netscape Communications Corp. (1994), http://wp.netscape.com/eng/security/SSL_2.html
Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol – Version 3.0. Internet draft, Netscape Communications Corp. (1996), http://wp.netscape.com/eng/ssl3/draft302.txt
Dierks, T., Allen, C.: The TLS Protocol – Version 1.0. RFC 2246 (1999), http://www.ietf.org/rfc/rfc2246.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Straub, T., Ginkel, TA., Buchmann, J. (2005). A Multipurpose Delegation Proxy for WWW Credentials. In: Chadwick, D., Zhao, G. (eds) Public Key Infrastructure. EuroPKI 2005. Lecture Notes in Computer Science, vol 3545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533733_1
Download citation
DOI: https://doi.org/10.1007/11533733_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28062-0
Online ISBN: 978-3-540-31585-8
eBook Packages: Computer ScienceComputer Science (R0)