Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Stop Building Identity Houses On Sand

Jericho Forum puts forward its vision of a new identity paradigm at the RSA Conference

Believe it or not, it has been 20 years since the debut of Peter Steiner's seminal cartoon, captioned with the ubiquitous "On the Internet, nobody knows you're a dog" joke.

But even after two decades, the core identity problem that makes that gag so funny still stands true, said Paul Simmonds, a board member of the Jericho Forum. In an RSA Conference talk last week, Simmonds unveiled some visionary work done by the group to push forward a new paradigm for asserting identity and entitling authentication across the Internet personas that a person may identify with, be it corporate, banking, social or citizen information.

"It's really easy to be whoever you want to be on the Internet," Simmonds said, "We've known about it as an industry for 20 years. We've done almost nothing about it. So shame on us."

RSA Conference 2013
Click here for more articles.

Some examples he gave to prove his point were the ease with which anyone can still send spoofed email messages and the card-not-present fraud problem, which pretty quickly cropped up after Europe and much of the world outside of the U.S. instituted chip-and-pin technology in their cards.

Though the industry for years now has been declaring the death of passwords, these authenticators still remain because the alternatives are largely schemes built on flawed assumptions, Simmonds said.

"We all know about building houses on sand. If you build your house or your identity system on a flawed assumption, then the ecosystem doesn't work," he said, "which is why we haven't solved the getting rid of passwords problem."

As examples, Simmonds pointed to the credit card industry, which has tried alternatives, such as cards with one-time password (OTP) technology built in. In the case of OTP, he argues that the system is actually less secure because when the vendor can't see the card itself, how is it going to know that the user hasn't compromised the system by writing the PIN on the card or giving that information to an untrusted party?

"I would argue that this is less secure," he said. "Why? Because you've changed the risk dimension that goes with this. Basically the receiving system that doesn't see this card said this has a higher grade of intelligence behind it and a higher grade of authentication."

In his talk, Simmonds talked about the Global Identity Foundation, a nonprofit bootstrap effort his group hopes will spur industry players into building a stronger foundation for identity around a core identifier backed by some sort of cryptography and biometrics foundation that can be federated across multiple identity personas online.

"So if you distribute your personas over the Internet, then if the bad guys get one of them, they don't get the rest of your identity and, more, they don't get the root crypto," he said. "So even if they take the identity, they can't assert it because they don't have the crypto components that go with it because you hold those yourself."

Using the persona entitlement system, access to data, systems, or e-commerce applications would be based on the trusted identity and all of the attributes of the entities and components in a transaction chain, Simmonds said.

"When you try to access something or go an e-commerce system, you take the identity sources and the identity attributes from everything in that chain coming in," he said. "You make an authorization decision based on those entitlement rules, and then you get access either to buy something or granular access even to the level of data."

It's a system that creates "some seriously good risk-based decisions," Simmonds said.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel i...
PUBLISHED: 2021-05-06
A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbi...
PUBLISHED: 2021-05-06
aom_image.c in libaom in AOMedia before 2021-04-07 frees memory that is not located on the heap.
PUBLISHED: 2021-05-06
The administrator application on ASUS GT-AC2900 devices before allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_chec...
PUBLISHED: 2021-05-06
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed.