Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm half asleep and not feeling very well today, so please bear that in mind with the following question...

I'm half asleep and not feeling very well today, so please bear that in mind with the following question...

Scheduled Pinned Locked Moved Uncategorized
6 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • davep@infosec.exchangeD This user is from outside of this forum
    davep@infosec.exchangeD This user is from outside of this forum
    davep@infosec.exchange
    wrote last edited by
    #1

    I'm half asleep and not feeling very well today, so please bear that in mind with the following question...

    In the context of a third party Digital Identity provider using PKI, can a phishing site act as a socks proxy (or a plain MitM) for the site that wants authentication, with the third party digital identity provider obviously going direct to the victim because it's a different site (or app), and then just steal the session token once the authentication process is finished?

    The point being (possibly) that the PKI gubbins could happen purely with the ID provider. Is there potentially some sort of handshake via the client between the ID provider and the authentication server which stops this? Should I just go and have a nap?

    cc: @tychotithonus @atoponce

    davep@infosec.exchangeD peacefulz@infosec.exchangeP 2 Replies Last reply
    0
    • davep@infosec.exchangeD davep@infosec.exchange

      I'm half asleep and not feeling very well today, so please bear that in mind with the following question...

      In the context of a third party Digital Identity provider using PKI, can a phishing site act as a socks proxy (or a plain MitM) for the site that wants authentication, with the third party digital identity provider obviously going direct to the victim because it's a different site (or app), and then just steal the session token once the authentication process is finished?

      The point being (possibly) that the PKI gubbins could happen purely with the ID provider. Is there potentially some sort of handshake via the client between the ID provider and the authentication server which stops this? Should I just go and have a nap?

      cc: @tychotithonus @atoponce

      davep@infosec.exchangeD This user is from outside of this forum
      davep@infosec.exchangeD This user is from outside of this forum
      davep@infosec.exchange
      wrote last edited by
      #2

      Just going through OpenID Connect stuff for the first time in ages but I'm too tired today. Ho hum.

      https://hackmag.com/security/openid-connect

      @tychotithonus @atoponce

      woe2you@beige.partyW tychotithonus@infosec.exchangeT 2 Replies Last reply
      0
      • davep@infosec.exchangeD davep@infosec.exchange

        Just going through OpenID Connect stuff for the first time in ages but I'm too tired today. Ho hum.

        https://hackmag.com/security/openid-connect

        @tychotithonus @atoponce

        woe2you@beige.partyW This user is from outside of this forum
        woe2you@beige.partyW This user is from outside of this forum
        woe2you@beige.party
        wrote last edited by
        #3

        @davep It'll take you a fraction of the time when you're not tired and ill.

        1 Reply Last reply
        0
        • davep@infosec.exchangeD davep@infosec.exchange

          I'm half asleep and not feeling very well today, so please bear that in mind with the following question...

          In the context of a third party Digital Identity provider using PKI, can a phishing site act as a socks proxy (or a plain MitM) for the site that wants authentication, with the third party digital identity provider obviously going direct to the victim because it's a different site (or app), and then just steal the session token once the authentication process is finished?

          The point being (possibly) that the PKI gubbins could happen purely with the ID provider. Is there potentially some sort of handshake via the client between the ID provider and the authentication server which stops this? Should I just go and have a nap?

          cc: @tychotithonus @atoponce

          peacefulz@infosec.exchangeP This user is from outside of this forum
          peacefulz@infosec.exchangeP This user is from outside of this forum
          peacefulz@infosec.exchange
          wrote last edited by
          #4

          @davep

          PKCE: link

          DPoP: link

          This should send you in the right direction. You're correct. PKI alone is vulnerable.

          davep@infosec.exchangeD 1 Reply Last reply
          0
          • peacefulz@infosec.exchangeP peacefulz@infosec.exchange

            @davep

            PKCE: link

            DPoP: link

            This should send you in the right direction. You're correct. PKI alone is vulnerable.

            davep@infosec.exchangeD This user is from outside of this forum
            davep@infosec.exchangeD This user is from outside of this forum
            davep@infosec.exchange
            wrote last edited by
            #5

            @Peacefulz Cheers πŸ™

            I'll go through that when I'm less befuddled.

            1 Reply Last reply
            0
            • davep@infosec.exchangeD davep@infosec.exchange

              Just going through OpenID Connect stuff for the first time in ages but I'm too tired today. Ho hum.

              https://hackmag.com/security/openid-connect

              @tychotithonus @atoponce

              tychotithonus@infosec.exchangeT This user is from outside of this forum
              tychotithonus@infosec.exchangeT This user is from outside of this forum
              tychotithonus@infosec.exchange
              wrote last edited by
              #6

              @davep

              Yeah, my understanding is that if something is in the middle, then unless there's something like WebAuthn (or some other equivalent steps) that enforces binding -- cryptographic validation -- of the actual origin at the far end ... spoofing is possible.

              @atoponce

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups