One document matched: draft-oiwa-http-auth-problem-statement-00.ps


%!PS-Adobe-3.0
%%Title: HTTP authentication: problem statement
%%Creator: html2ps version 1.0 beta5
%%CreationDate: Tue Jul  5 00:46:34 2011
%%DocumentNeededResources: font Times-Roman Times-Bold Helvetica
%%DocumentData: Clean7Bit
%%Orientation: Portrait
%%BoundingBox: 0 0 596 842
%%Pages: 9
%%EndComments
%%BeginProlog
/d {bind def} bind def
/D {def} d
/ie {ifelse} d
/E {exch} d
/t true D
/f false D
/FL [/Times-Roman
/Times-Italic
/Times-Bold
/Times-BoldItalic
/Courier
/Courier-Oblique
/Courier-Bold
/Courier-BoldOblique
/Helvetica
/Helvetica-Oblique
/Helvetica-Bold
/Helvetica-BoldOblique] D
/Cd {aload length 2 idiv dup dict begin {D} repeat currentdict end} D
/reencodeISO {
 dup dup findfont dup length dict begin{1 index /FID ne{D}{pop pop}ie}forall
 /Encoding ISOLatin1Encoding D currentdict end definefont} D
/ISOLatin1Encoding [
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/space/exclam/quotedbl/numbersign/dollar/percent/ampersand/quoteright
/parenleft/parenright/asterisk/plus/comma/hyphen/period/slash
/zero/one/two/three/four/five/six/seven/eight/nine/colon/semicolon
/less/equal/greater/question/at/A/B/C/D/E/F/G/H/I/J/K/L/M/N
/O/P/Q/R/S/T/U/V/W/X/Y/Z/bracketleft/backslash/bracketright
/asciicircum/underscore/quoteleft/a/b/c/d/e/f/g/h/i/j/k/l/m
/n/o/p/q/r/s/t/u/v/w/x/y/z/braceleft/bar/braceright/asciitilde
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
/.notdef/space/exclamdown/cent/sterling/currency/yen/brokenbar
/section/dieresis/copyright/ordfeminine/guillemotleft/logicalnot
/hyphen/registered/macron/degree/plusminus/twosuperior/threesuperior
/acute/mu/paragraph/periodcentered/cedilla/onesuperior/ordmasculine
/guillemotright/onequarter/onehalf/threequarters/questiondown
/Agrave/Aacute/Acircumflex/Atilde/Adieresis/Aring/AE/Ccedilla
/Egrave/Eacute/Ecircumflex/Edieresis/Igrave/Iacute/Icircumflex
/Idieresis/Eth/Ntilde/Ograve/Oacute/Ocircumflex/Otilde/Odieresis
/multiply/Oslash/Ugrave/Uacute/Ucircumflex/Udieresis/Yacute
/Thorn/germandbls/agrave/aacute/acircumflex/atilde/adieresis
/aring/ae/ccedilla/egrave/eacute/ecircumflex/edieresis/igrave
/iacute/icircumflex/idieresis/eth/ntilde/ograve/oacute/ocircumflex
/otilde/odieresis/divide/oslash/ugrave/uacute/ucircumflex/udieresis
/yacute/thorn/ydieresis
] D
[128/backslash 129/parenleft 130/parenright 141/circumflex 142/tilde
143/perthousand 144/dagger 145/daggerdbl 146/Ydieresis 147/scaron 148/Scaron
149/oe 150/OE 151/guilsinglleft 152/guilsinglright 153/quotesinglbase
154/quotedblbase 155/quotedblleft 156/quotedblright 157/endash 158/emdash
159/trademark]
aload length 2 idiv 1 1 3 -1 roll{pop ISOLatin1Encoding 3 1 roll put}for
/colorimage where{pop}{
 /colorimage {
  pop pop /Pr E D {/Cv Pr D /Gr Cv length 3 idiv string D 0 1 Gr length 1 sub
   {Gr E dup /i E 3 mul D Cv i get 0.299 mul Cv i 1 add get 0.587 mul add
    Cv i 2 add get 0.114 mul add cvi put}for Gr} image} D
}ie
/pdfmark where{pop}{userdict /pdfmark /cleartomark load put}ie

/MySymbol 10 dict dup begin
 /FontType 3 D /FontMatrix [.001 0 0 .001 0 0 ] D /FontBBox [25 -10 600 600] D
 /Encoding 256 array D 0 1 255{Encoding exch /.notdef put}for
 Encoding (e) 0 get /euro put
 /Metrics 2 dict D Metrics begin
  /.notdef 0 D
  /euro 651 D
 end
 /BBox 2 dict D BBox begin
  /.notdef [0 0 0 0] D
  /euro [25 -10 600 600] D
 end
 /CharacterDefs 2 dict D CharacterDefs begin
  /.notdef {} D
  /euro{newpath 114 600 moveto 631 600 lineto 464 200 lineto 573 200 lineto
   573 0 lineto -94 0 lineto 31 300 lineto -10 300 lineto closepath clip
   50 setlinewidth newpath 656 300 moveto 381 300 275 0 360 arc stroke
   -19 350 moveto 600 0 rlineto -19 250 moveto 600 0 rlineto stroke}d
 end
 /BuildChar{0 begin
  /char E D /fontdict E D /charname fontdict /Encoding get char get D
  fontdict begin
   Metrics charname get 0 BBox charname get aload pop setcachedevice
   CharacterDefs charname get exec
  end
 end}D
 /BuildChar load 0 3 dict put /UniqueID 1 D
end
definefont pop
/Nf {dup 0 ge{FL E get}{-1 eq{/Symbol}{/MySymbol}ie}ie findfont
 E scalefont setfont} D
/IP {currentfile picstr readhexstring pop} D
/WF t D
/F 1 D
/N {showpage} d
/RL {rlineto} d
/S {show} d
/L {lineto} d
/M {moveto} d
/A {awidthshow} d
/RM {rmoveto} d
%%EndProlog
%%BeginSetup
%%PaperSize: A4
WF{FL{reencodeISO D}forall}{4 1 FL length 1 sub{FL E get reencodeISO D}for}ie
/Symbol dup dup findfont dup length dict begin
 {1 index /FID ne{D}{pop pop}ie}forall /Encoding [Encoding aload pop]
 dup 128 /therefore put D currentdict end definefont D
[/Creator (html2ps version 1.0 beta5) /Author () /Keywords (HTTP, authentication) /Subject () /Title (HTTP authentication: problem statement) /DOCINFO pdfmark
[/PageMode /UseOutlines /DOCVIEW pdfmark
[/Count 1 /Dest /60 /Title (HTTP authentication: problem statement draft-oiwa-http-auth-problem-statement-00) /OUT pdfmark
[/Count 14 /Dest /61 /Title () /OUT pdfmark
[/Dest /61 /Title (Abstract) /OUT pdfmark
[/Dest /62 /Title (Status of this Memo) /OUT pdfmark
[/Dest /63 /Title (Copyright Notice) /OUT pdfmark
[/Dest /64 /Title (Table of Contents) /OUT pdfmark
[/Count -1 /Dest /65 /Title (1. Introduction) /OUT pdfmark
[/Dest /66 /Title (1.1. Terminology) /OUT pdfmark
[/Dest /67 /Title (2. Existing authentication mechanisms) /OUT pdfmark
[/Count -3 /Dest /68 /Title (3. Background: existing threats and contributing factors) /OUT pdfmark
[/Dest /69 /Title (3.1. Impersonation of server identity \(Phishing\)) /OUT pdfmark
[/Dest /70 /Title (3.2. Impacts of server-side password database leakage) /OUT pdfmark
[/Dest /71 /Title (3.3. Impacts of complex authentication/authorization technologies) /OUT pdfmark
[/Count -3 /Dest /72 /Title (4. Applicable fields for HTTP authentication) /OUT pdfmark
[/Dest /73 /Title (4.1. Web user authentication) /OUT pdfmark
[/Dest /74 /Title (4.2. Web client application data accesses) /OUT pdfmark
[/Dest /75 /Title (4.3. Non-Web user authentication) /OUT pdfmark
[/Count -4 /Dest /76 /Title (5. Problem statements) /OUT pdfmark
[/Dest /77 /Title (5.1. Lack of mutual authentication) /OUT pdfmark
[/Dest /78 /Title (5.2. Avoiding use of plain-text passwords on authentication) /OUT pdfmark
[/Dest /79 /Title (5.3. Functional weakness of HTTP authentication framework) /OUT pdfmark
[/Dest /80 /Title (5.4. Lack of bindings between multi-layer authentications/authorizations) /OUT pdfmark
[/Dest /81 /Title (6. More topics) /OUT pdfmark
[/Dest /82 /Title (7. IANA Considerations) /OUT pdfmark
[/Dest /83 /Title (8. Security Considerations) /OUT pdfmark
[/Count -2 /Dest /84 /Title (9. References) /OUT pdfmark
[/Dest /85 /Title (9.1. Normative References) /OUT pdfmark
[/Dest /86 /Title (9.2. Informative References) /OUT pdfmark
[/Dest /87 /Title (Authors' Addresses) /OUT pdfmark
%%EndSetup
%%Page: 1 1
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 842 null] /Dest /0 /DEST pdfmark
0 -0 M
save
2.5 -13.5 M
%%IncludeResource: font Times-Roman
11 0 Nf
(Internet Engineering Task ) S
(Force) S
216.1 -13.5 M
(Y. ) S
(Oiwa) S
2.5 -32.2 M
(Internet-Draft) S
216.1 -32.2 M
(RCIS, ) S
(AIST) S
2.5 -51 M
(Intended status: ) S
(Informational) S
216.1 -51 M
(T. ) S
(Hayashi) S
2.5 -69.8 M
(Expires: January 6, ) S
(2012) S
216.1 -69.8 M
(B. ) S
(Kihara) S
2.5 -88.5 M
(\240) S
216.1 -88.5 M
(Lepidum) S
2.5 -107.2 M
(\240) S
216.1 -107.2 M
(July 5, ) S
(2011) S
0 -112.5 M
restore
227 -127.7 M
[/View [/XYZ -4 842 null] /Dest /60 /DEST pdfmark
58.4 -146.7 M
%%IncludeResource: font Times-Bold
19 2 Nf
(HTTP authentication: problem ) S
(statement) S
49.7 -169.5 M
(draft-oiwa-http-auth-problem-statement-00) S
0 -199.5 M
15 2 Nf
(Abstract) S
[/View [/XYZ -4 575.5 null] /Dest /61 /DEST pdfmark
0 -223.7 M
11 0 Nf
1.6484375 0 32 0 0 (This document discusses about existing problems in the current authentication technologies around) A
0 -236.9 M
(HTTP and some analysis of the requirements for future authentication technologies in HTTP area. ) S
0 -266.9 M
15 2 Nf
(Status) S
[/View [/XYZ -4 508.1 null] /Dest /62 /DEST pdfmark
( of this ) S
(Memo) S
0 -291.1 M
11 0 Nf
(This Internet-Draft is submitted in full conformance with the provisions of BCP\24078 and ) S
(BCP\24079.) S
0 -315.3 M
0.34375 0 32 0 0 (Internet-Drafts are working documents of the Internet Engineering Task Force \(IETF\). Note that other) A
0 -328.5 M
0.389423072 0 32 0 0 (groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is) A
0 -341.7 M
(at ) S
(http://datatracker.ietf.org/drafts/current/.) S
0 -365.9 M
0.275781244 0 32 0 0 (Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced,) A
0 -379.1 M
1.51927078 0 32 0 0 (or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference) A
0 -392.3 M
(material or to cite them other than as \233work in ) S
(progress.\234) S
0 -416.5 M
(This Internet-Draft will expire on January 6, ) S
(2012.) S
0 -446.5 M
15 2 Nf
(Copyright) S
[/View [/XYZ -4 328.499908 null] /Dest /63 /DEST pdfmark
( ) S
(Notice) S
0 -470.7 M
11 0 Nf
(Copyright \(c\) 2011 IETF Trust and the persons identified as the document authors. All rights ) S
(reserved.) S
0 -494.9 M
3.1208334 0 32 0 0 (This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF) A
0 -508.1 M
1.34730113 0 32 0 0 (Documents \(http://trustee.ietf.org/license-info\) in effect on the date of publication of this document.) A
0 -521.3 M
0.819475472 0 32 0 0 (Please review these documents carefully, as they describe your rights and restrictions with respect to) A
0 -534.5 M
0.287109375 0 32 0 0 (this document. Code Components extracted from this document must include Simplified BSD License) A
0 -547.7 M
1.24951172 0 32 0 0 (text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as) A
0 -560.9 M
(described in the Simplified BSD ) S
(License.) S
0 -571.9 M
[/View [/XYZ -4 185.099854 null] /Dest /1 /DEST pdfmark
0 -590.9 M
15 2 Nf
(Table) S
[/View [/XYZ -4 184.099854 null] /Dest /64 /DEST pdfmark
( of ) S
(Contents) S
0 -615.1 M
gsave
newpath
0 -616.2 M
8.25 0 RL
stroke
grestore
11 0 Nf
(1.) S
[/Rect [-1.0 -617.850159 9.25 -605.750183] /Subtype /Link /Border [0 0 0] /Dest /2 /ANN pdfmark
(\240 ) S
(Introduction) S
0 -628.3 M
(\240\240\240\240) S
gsave
newpath
11 -629.4 M
16.5 0 RL
stroke
grestore
(1.1.) S
[/Rect [10.0 -631.050171 28.5 -618.950195] /Subtype /Link /Border [0 0 0] /Dest /4 /ANN pdfmark
(\240 ) S
(Terminology) S
0 -641.5 M
gsave
newpath
0 -642.6 M
8.25 0 RL
stroke
grestore
(2.) S
[/Rect [-1.0 -644.250183 9.25 -632.150208] /Subtype /Link /Border [0 0 0] /Dest /6 /ANN pdfmark
(\240 Existing authentication ) S
(mechanisms) S
0 -654.7 M
gsave
newpath
0 -655.8 M
8.25 0 RL
stroke
grestore
(3.) S
[/Rect [-1.0 -657.450195 9.25 -645.35022] /Subtype /Link /Border [0 0 0] /Dest /8 /ANN pdfmark
(\240 Background: existing threats and contributing ) S
(factors) S
0 -667.9 M
(\240\240\240\240) S
gsave
newpath
11 -669 M
16.5 0 RL
stroke
grestore
(3.1.) S
[/Rect [10.0 -670.650208 28.5 -658.550232] /Subtype /Link /Border [0 0 0] /Dest /10 /ANN pdfmark
(\240 Impersonation of server identity ) S
(\(Phishing\)) S
0 -667.9 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 1 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 2 2
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
(\240\240\240\240) S
gsave
newpath
11 -14.3 M
16.5 0 RL
stroke
grestore
(3.2.) S
[/Rect [10.0 -15.9500008 28.5 -3.85000038] /Subtype /Link /Border [0 0 0] /Dest /12 /ANN pdfmark
(\240 Impacts of server-side password database ) S
(leakage) S
0 -26.4 M
11 0 Nf
(\240\240\240\240) S
gsave
newpath
11 -27.5 M
16.5 0 RL
stroke
grestore
(3.3.) S
[/Rect [10.0 -29.1500015 28.5 -17.0500011] /Subtype /Link /Border [0 0 0] /Dest /14 /ANN pdfmark
(\240 Impacts of complex authentication/authorization ) S
(technologies) S
0 -39.6 M
gsave
newpath
0 -40.7 M
8.25 0 RL
stroke
grestore
(4.) S
[/Rect [-1.0 -42.3500023 9.25 -30.2500019] /Subtype /Link /Border [0 0 0] /Dest /16 /ANN pdfmark
(\240 Applicable fields for HTTP ) S
(authentication) S
0 -52.8 M
(\240\240\240\240) S
gsave
newpath
11 -53.9 M
16.5 0 RL
stroke
grestore
(4.1.) S
[/Rect [10.0 -55.5500031 28.5 -43.4500046] /Subtype /Link /Border [0 0 0] /Dest /18 /ANN pdfmark
(\240 Web user ) S
(authentication) S
0 -66 M
(\240\240\240\240) S
gsave
newpath
11 -67.1 M
16.5 0 RL
stroke
grestore
(4.2.) S
[/Rect [10.0 -68.75 28.5 -56.65] /Subtype /Link /Border [0 0 0] /Dest /20 /ANN pdfmark
(\240 Web client application data ) S
(accesses) S
0 -79.2 M
(\240\240\240\240) S
gsave
newpath
11 -80.3 M
16.5 0 RL
stroke
grestore
(4.3.) S
[/Rect [10.0 -81.95 28.5 -69.85] /Subtype /Link /Border [0 0 0] /Dest /22 /ANN pdfmark
(\240 Non-Web user ) S
(authentication) S
0 -92.4 M
gsave
newpath
0 -93.5 M
8.25 0 RL
stroke
grestore
(5.) S
[/Rect [-1.0 -95.1499939 9.25 -83.0499954] /Subtype /Link /Border [0 0 0] /Dest /24 /ANN pdfmark
(\240 Problem ) S
(statements) S
0 -105.6 M
(\240\240\240\240) S
gsave
newpath
11 -106.7 M
16.5 0 RL
stroke
grestore
(5.1.) S
[/Rect [10.0 -108.349991 28.5 -96.2499924] /Subtype /Link /Border [0 0 0] /Dest /26 /ANN pdfmark
(\240 Lack of mutual ) S
(authentication) S
0 -118.8 M
(\240\240\240\240) S
gsave
newpath
11 -119.9 M
16.5 0 RL
stroke
grestore
(5.2.) S
[/Rect [10.0 -121.549988 28.5 -109.449989] /Subtype /Link /Border [0 0 0] /Dest /28 /ANN pdfmark
(\240 Avoiding use of plain-text passwords on ) S
(authentication) S
0 -132 M
(\240\240\240\240) S
gsave
newpath
11 -133.1 M
16.5 0 RL
stroke
grestore
(5.3.) S
[/Rect [10.0 -134.749985 28.5 -122.649986] /Subtype /Link /Border [0 0 0] /Dest /30 /ANN pdfmark
(\240 Functional weakness of HTTP authentication ) S
(framework) S
0 -145.2 M
(\240\240\240\240) S
gsave
newpath
11 -146.3 M
16.5 0 RL
stroke
grestore
(5.4.) S
[/Rect [10.0 -147.949982 28.5 -135.849976] /Subtype /Link /Border [0 0 0] /Dest /32 /ANN pdfmark
(\240 Lack of bindings between multi-layer ) S
(authentications/authorizations) S
0 -158.4 M
gsave
newpath
0 -159.5 M
8.25 0 RL
stroke
grestore
(6.) S
[/Rect [-1.0 -161.149979 9.25 -149.049973] /Subtype /Link /Border [0 0 0] /Dest /34 /ANN pdfmark
(\240 More ) S
(topics) S
0 -171.6 M
gsave
newpath
0 -172.7 M
8.25 0 RL
stroke
grestore
(7.) S
[/Rect [-1.0 -174.349976 9.25 -162.249969] /Subtype /Link /Border [0 0 0] /Dest /36 /ANN pdfmark
(\240 IANA ) S
(Considerations) S
0 -184.8 M
gsave
newpath
0 -185.9 M
8.25 0 RL
stroke
grestore
(8.) S
[/Rect [-1.0 -187.549973 9.25 -175.449966] /Subtype /Link /Border [0 0 0] /Dest /38 /ANN pdfmark
(\240 Security ) S
(Considerations) S
0 -198 M
gsave
newpath
0 -199.1 M
8.25 0 RL
stroke
grestore
(9.) S
[/Rect [-1.0 -200.749969 9.25 -188.649963] /Subtype /Link /Border [0 0 0] /Dest /42 /ANN pdfmark
(\240 ) S
(References) S
0 -211.2 M
(\240\240\240\240) S
gsave
newpath
11 -212.3 M
16.5 0 RL
stroke
grestore
(9.1.) S
[/Rect [10.0 -213.949966 28.5 -201.84996] /Subtype /Link /Border [0 0 0] /Dest /42 /ANN pdfmark
(\240 Normative ) S
(References) S
0 -224.4 M
(\240\240\240\240) S
gsave
newpath
11 -225.5 M
16.5 0 RL
stroke
grestore
(9.2.) S
[/Rect [10.0 -227.149963 28.5 -215.049957] /Subtype /Link /Border [0 0 0] /Dest /44 /ANN pdfmark
(\240 Informative ) S
(References) S
0 -237.6 M
gsave
newpath
0 -238.7 M
5.5 0 RL
stroke
grestore
(\247) S
[/Rect [-1.0 -240.34996 6.5 -228.249954] /Subtype /Link /Border [0 0 0] /Dest /59 /ANN pdfmark
(\240 Authors' ) S
(Addresses) S
0 -248.6 M
[/View [/XYZ -4 508.400024 null] /Dest /2 /DEST pdfmark
0 -248.6 M
[/View [/XYZ -4 508.400024 null] /Dest /3 /DEST pdfmark
0 -267.6 M
%%IncludeResource: font Times-Bold
15 2 Nf
(1.) S
[/View [/XYZ -4 507.400024 null] /Dest /65 /DEST pdfmark
( ) S
(Introduction) S
0 -291.8 M
11 0 Nf
3.04166675 0 32 0 0 (User authentication is, needless to say, one of the most important building block for the Web) A
0 -305 M
0.012920673 0 32 0 0 (applications and other Internet-based systems. As social activities and commerce systems are more and) A
0 -318.2 M
4.7991538 0 32 0 0 (more widely spreading, the importance for the security of the authentication also increase.) A
0 -331.4 M
3.14388013 0 32 0 0 (Furthermore, the recent movement of providing government services on the Web requires user) A
0 -344.6 M
0.0778459832 0 32 0 0 (authentication as a key feature. Impersonation of client users in such systems may cause unrecoverable) A
0 -357.8 M
(damages such as loss of credits, trusts, or social statuses. ) S
0 -382 M
2.22363281 0 32 0 0 (At the same time, the authentication is currently one of the weakest blocks in terms of security.) A
0 -395.2 M
0.143310547 0 32 0 0 (Intrinsically, the Web system as a whole is a multi-party system where the malicious servers cannot be) A
0 -408.4 M
0.00755208312 0 32 0 0 (rejected from the world. Unlike other systems such as email ) A
0.00755208312 0 32 0 0 (\() A
gsave
newpath
270.3 -409.5 M
20.1679688 0 RL
stroke
grestore
0.00755208312 0 32 0 0 (POP) A
[/Rect [269.324219 -411.150085 291.492188 -399.050079] /Subtype /Link /Border [0 0 0] /Dest /48 /ANN pdfmark
0.00755208312 0 32 0 0 ( [RFC1939] or ) A
gsave
newpath
358 -409.5 M
27.4921875 0 RL
stroke
grestore
0.00755208312 0 32 0 0 (IMAP) A
[/Rect [357.019531 -411.150085 386.511719 -399.050079] /Subtype /Link /Border [0 0 0] /Dest /52 /ANN pdfmark
0.00755208312 0 32 0 0 ( [RFC3501]\) or) A
0 -421.6 M
4.86967325 0 32 0 0 (VPN ) A
4.86967325 0 32 0 0 (\() A
gsave
newpath
33.3 -422.7 M
23.8164062 0 RL
stroke
grestore
4.86967325 0 32 0 0 (IPsec) A
[/Rect [32.2734375 -424.350098 58.0898438 -412.250092] /Subtype /Link /Border [0 0 0] /Dest /54 /ANN pdfmark
4.86967325 0 32 0 0 ( [RFC4301], ) A
gsave
newpath
125.2 -422.7 M
25.0507812 0 RL
stroke
grestore
4.86967325 0 32 0 0 (L2TP) A
[/Rect [124.179688 -424.350098 151.230469 -412.250092] /Subtype /Link /Border [0 0 0] /Dest /50 /ANN pdfmark
4.86967325 0 32 0 0 ( [RFC2661] etc.\) where the communication peer is typically) A
0 -434.8 M
0.342848569 0 32 0 0 (pre-configured in the client software, Web clients \(Web browsers\) communicate with any party which) A
0 -448 M
0.620312512 0 32 0 0 (the user insists to. This property leaves malicious servers to forge users to communicate with himself) A
0 -461.2 M
1.6796875 0 32 0 0 (and performs a fiddle with the victim. Once such an attack succeeds, its result is severe: not only) A
0 -474.4 M
0.105957031 0 32 0 0 (user's passwords to be stolen, users are often fooled to provide more critical information such as credit) A
0 -487.6 M
(card numbers to the attackers. ) S
0 -511.8 M
0.741406262 0 32 0 0 (On contrary to the current design, the authentication on the Web systems should be bidirectional and) A
0 -525 M
0.474724263 0 32 0 0 (mutual: not only the authenticity of the users, but the authenticity and integrity of the servers is really) A
0 -538.2 M
0.377604157 0 32 0 0 (important for protecting user resource stored on the server side. Most users assume that the successful) A
0 -551.4 M
0.556082606 0 32 0 0 (user authentication also implies that they are talking with the genuine server entity: unfortunately, for) A
0 -564.6 M
1.29659593 0 32 0 0 (almost all currently-deployed technologies on Web authentication this is not true, even for the ) A
gsave
newpath
434.4 -565.7 M
19.5507812 0 RL
stroke
grestore
1.29659593 0 32 0 0 (TLS) A
[/Rect [433.398438 -567.35022 454.949219 -555.250244] /Subtype /Link /Border [0 0 0] /Dest /56 /ANN pdfmark
0 -577.8 M
([RFC5246] client certificate authentication. ) S
0 -602 M
0.354687512 0 32 0 0 (The motivation of this document is to promote ideas of replacing current systems and mechanisms for) A
0 -615.2 M
3.11653638 0 32 0 0 (authentications on the HTTP/Web systems by more secure building blocks which are carefully) A
0 -628.4 M
1.53870738 0 32 0 0 (designed for both security and usability/deployability. In the following sections, currently available) A
0 -641.6 M
0.6640625 0 32 0 0 (methods of authentication on the Web systems are reviewed, and existing problems are discussed. At) A
0 -654.8 M
(last, we conclude with possible action plan proposals for the community. ) S
0 -654.8 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 2 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 3 3
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /4 /DEST pdfmark
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /5 /DEST pdfmark
0 -15.6 M
%%IncludeResource: font Times-Bold
13 2 Nf
(1.1.) S
[/View [/XYZ -4 757.0 null] /Dest /66 /DEST pdfmark
( ) S
(Terminology) S
0 -39.8 M
%%IncludeResource: font Times-Roman
11 0 Nf
2.37011719 0 32 0 0 (The key words "MUST", "MUST\240NOT", "REQUIRED", "SHALL", "SHALL\240NOT", "SHOULD",) A
0 -53 M
1.49739587 0 32 0 0 ("SHOULD\240NOT", "RECOMMENDED", "NOT\240RECOMMENDED", "MAY", and "OPTIONAL" in) A
0 -66.2 M
(this document are to be interpreted as described in ) S
gsave
newpath
223.9 -67.3 M
50.1054688 0 RL
stroke
grestore
([RFC2119]) S
[/Rect [222.863281 -68.9500046 274.96875 -56.8500061] /Subtype /Link /Border [0 0 0] /Dest /43 /ANN pdfmark
(.) S
0 -77.2 M
[/View [/XYZ -4 679.8 null] /Dest /6 /DEST pdfmark
0 -77.2 M
[/View [/XYZ -4 679.8 null] /Dest /7 /DEST pdfmark
0 -96.2 M
15 2 Nf
(2.) S
[/View [/XYZ -4 678.8 null] /Dest /67 /DEST pdfmark
( Existing authentication ) S
(mechanisms) S
0 -120.4 M
11 0 Nf
(\(To be described\) ) S
0 -131.4 M
[/View [/XYZ -4 625.6 null] /Dest /8 /DEST pdfmark
0 -131.4 M
[/View [/XYZ -4 625.6 null] /Dest /9 /DEST pdfmark
0 -150.4 M
15 2 Nf
(3.) S
[/View [/XYZ -4 624.6 null] /Dest /68 /DEST pdfmark
( Background: existing threats and contributing ) S
(factors) S
0 -157.9 M
[/View [/XYZ -4 599.1 null] /Dest /10 /DEST pdfmark
0 -157.9 M
[/View [/XYZ -4 599.1 null] /Dest /11 /DEST pdfmark
0 -176.4 M
13 2 Nf
(3.1.) S
[/View [/XYZ -4 596.2 null] /Dest /69 /DEST pdfmark
( Impersonation of server identity ) S
(\(Phishing\)) S
0 -200.6 M
11 0 Nf
1.65349269 0 32 0 0 (The term "Phishing" here is used as a generic term of attacks involving some kind of spoofing or) A
0 -213.8 M
2.45222354 0 32 0 0 (impersonation used to socially/technically fool the victim users. From the beginning of the Web) A
0 -227 M
2.28307295 0 32 0 0 (system, such "false web sites" are considered as a problem. TLS and its predecessor, SSL, have) A
0 -240.2 M
0.375355124 0 32 0 0 (introduced a ) A
gsave
newpath
58.2 -241.3 M
116.258881 0 RL
stroke
grestore
0.375355124 0 32 0 0 (PKI-based server identity ) A
gsave
newpath
174.4 -241.3 M
39.703125 0 RL
stroke
grestore
0.375355124 0 32 0 0 (checking) A
[/Rect [57.1679688 -242.95 215.128906 -230.849991] /Subtype /Link /Border [0 0 0] /Dest /53 /ANN pdfmark
0.375355124 0 32 0 0 ( [RFC3647] using trusted certificate authorities \(CAs\)) A
0 -253.4 M
2.52403855 0 32 0 0 (to address this issue. However, more and more sensitive and valuable information Web systems) A
0 -266.6 M
0.720703125 0 32 0 0 (become to handle, more and more the Phishing attacks become "useful" attack vector. Such Phishing) A
0 -279.8 M
1.36401367 0 32 0 0 (sites typically steal user identity and plain-text passwords from the victim user, and use it to either) A
0 -293 M
1.21533203 0 32 0 0 (access sensitive data \(such as Web mail services for critical officers\), to fool users to provide more) A
0 -306.2 M
0.499479175 0 32 0 0 (sensitive informations to the attackers \(such as credit card numbers\), or to impersonate victims with a) A
0 -319.4 M
(malicious social activities \(such as selling stolen items in a net auction\). ) S
0 -330.4 M
[/View [/XYZ -4 426.599945 null] /Dest /12 /DEST pdfmark
0 -330.4 M
[/View [/XYZ -4 426.599945 null] /Dest /13 /DEST pdfmark
0 -346 M
13 2 Nf
(3.2.) S
[/View [/XYZ -4 426.599945 null] /Dest /70 /DEST pdfmark
( Impacts of server-side password database ) S
(leakage) S
0 -370.2 M
11 0 Nf
3.96033645 0 32 0 0 (Technically speaking, security of the server-side data is an out-of-scope issue for the HTTP) A
0 -383.4 M
0.829752624 0 32 0 0 (authentication. However, we should be aware that many real-world security bleaches actually caused) A
0 -396.6 M
3.19889331 0 32 0 0 (\(partially\) by the leakage of server-side stored information. Impact of such server-side leakage) A
0 -409.8 M
1.981179 0 32 0 0 (depends on how the authentication mechanism are designed. For ) A
gsave
newpath
304.9 -410.9 M
29.164772 0 RL
stroke
grestore
1.981179 0 32 0 0 (Basic ) A
gsave
newpath
334.1 -410.9 M
62.3046875 0 RL
stroke
grestore
1.981179 0 32 0 0 (authentication) A
[/Rect [303.9375 -412.55011 397.40625 -400.450104] /Subtype /Link /Border [0 0 0] /Dest /49 /ANN pdfmark
1.981179 0 32 0 0 ( [RFC2617],) A
0 -423 M
1.37590146 0 32 0 0 (server-side credential used for password verification is usually one-way hashed with a random salt,) A
0 -436.2 M
1.99869788 0 32 0 0 (which mitigates risk of server-side leakage a bit. Public key cryptography-based authentication, if) A
0 -449.4 M
4.1617837 0 32 0 0 (correctly managed and deployed, can also avoid storing of sensitive client-credentials to the) A
0 -462.6 M
0.820667624 0 32 0 0 (server-side. On the contrary, Digest authentication and other hash-based authentication schemes \(e.g.) A
0 -475.8 M
0.335658491 0 32 0 0 (CRAM-MD5 in ) A
gsave
newpath
74 -476.9 M
26.8867188 0 RL
stroke
grestore
0.335658491 0 32 0 0 (SASL) A
[/Rect [72.9882812 -478.550171 101.875 -466.450165] /Subtype /Link /Border [0 0 0] /Dest /55 /ANN pdfmark
0.335658491 0 32 0 0 ( [RFC4422], APOP, etc.\) requires raw client-side credentials to be stored in the) A
0 -489 M
1.44692099 0 32 0 0 (server side by its nature. Of course, if all other properties are similar, the algorithms which do not) A
0 -502.2 M
(require raw client credentials in server side is preferable as far as possible. ) S
0 -513.2 M
[/View [/XYZ -4 243.799805 null] /Dest /14 /DEST pdfmark
0 -513.2 M
[/View [/XYZ -4 243.799805 null] /Dest /15 /DEST pdfmark
0 -528.8 M
13 2 Nf
(3.3.) S
[/View [/XYZ -4 243.799805 null] /Dest /71 /DEST pdfmark
( Impacts of complex authentication/authorization ) S
(technologies) S
0 -553 M
11 0 Nf
2.403409 0 32 0 0 (Recently, many complex framework for authentication and authorizations are deployed to realize) A
0 -566.2 M
0.797743082 0 32 0 0 (multi-party authentication. For example, OpenID and ) A
gsave
newpath
242.4 -567.3 M
30.5507812 0 RL
stroke
grestore
0.797743082 0 32 0 0 (SAML) A
[/Rect [241.402344 -568.950195 273.953125 -556.85022] /Subtype /Link /Border [0 0 0] /Dest /47 /ANN pdfmark
0.797743082 0 32 0 0 ( [OASIS.saml-core-2.0-os] gives servers) A
0 -579.4 M
2.32389331 0 32 0 0 (an opportunity to authenticate users using identities provided by third parties. ) A
gsave
newpath
368.8 -580.5 M
29.9375 0 RL
stroke
grestore
2.32389331 0 32 0 0 (OAuth) A
[/Rect [367.84375 -582.150208 399.78125 -570.050232] /Subtype /Link /Border [0 0 0] /Dest /57 /ANN pdfmark
2.32389331 0 32 0 0 ( [RFC5849]) A
0 -592.6 M
3.12473965 0 32 0 0 (allows a user to delegate some access rights to servers or other systems without giving client) A
0 -605.8 M
(authentication credential itself. ) S
0 -630 M
1.18984377 0 32 0 0 (Introduction of such services can have both positive and negative impacts on the Web security. For) A
0 -643.2 M
2.85049725 0 32 0 0 (example, federated multi-party authentication can reduce number of client credentials which are) A
0 -656.4 M
1.54129469 0 32 0 0 (required to access many services, which can reduce risk of server-side information leakage. At the) A
0 -669.6 M
0.775111616 0 32 0 0 (same time, it requires user to authenticate himself in dynamically-generated web pages in the middle) A
0 -669.6 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 3 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 4 4
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
0.825520813 0 32 0 0 (of complex page redirection flows, which makes users difficult to discriminate whether the page is a) A
0 -26.4 M
11 0 Nf
0.23385416 0 32 0 0 (correct one to input her user name and password, increasing risk of Phishing attacks. Detailed analysis) A
0 -39.6 M
(of its security, including user experiences in its consideration, might be needed. ) S
0 -63.8 M
5.02441406 0 32 0 0 (Also, in such systems single security bleach among multiple parties involved to federated) A
0 -77 M
2.2093749 0 32 0 0 (authentication may or may not impact security of other systems and their users. There are many) A
0 -90.2 M
0.0784254819 0 32 0 0 (pitfalls in implementation of such multi-party protocols, such as session fixation, session hijacking and) A
0 -103.4 M
1.15983069 0 32 0 0 (cross-site request forgeries. Especially because most of those technologies are implemented often in) A
0 -116.6 M
0.059495192 0 32 0 0 (application layer, careful observation and analysis of such bleaches caused by mis-implementation of a) A
0 -129.8 M
(single party should be performed. ) S
0 -140.8 M
[/View [/XYZ -4 616.2 null] /Dest /16 /DEST pdfmark
0 -140.8 M
[/View [/XYZ -4 616.2 null] /Dest /17 /DEST pdfmark
0 -159.8 M
%%IncludeResource: font Times-Bold
15 2 Nf
(4.) S
[/View [/XYZ -4 615.2 null] /Dest /72 /DEST pdfmark
( Applicable fields for HTTP ) S
(authentication) S
0 -184 M
11 0 Nf
1.49023438 0 32 0 0 (Nowadays HTTP is used as a common foundation for various systems including Web systems and) A
0 -197.2 M
2.3359375 0 32 0 0 (other non-Web applications. Depending on the nature of each systems using HTTP, the required) A
0 -210.4 M
4.63020849 0 32 0 0 (properties for the underlying authentication/authorization mechanism may vary. Although the) A
0 -223.6 M
1.95490062 0 32 0 0 (comprehensive analysis of all existing applications are impossible, this document hereby proposes) A
0 -236.8 M
1.21264648 0 32 0 0 (categorizing use cases to three typical groups as a starting point, for further analysis in the sections) A
0 -250 M
(below. ) S
0 -261 M
[/View [/XYZ -4 496.000031 null] /Dest /18 /DEST pdfmark
0 -261 M
[/View [/XYZ -4 496.000031 null] /Dest /19 /DEST pdfmark
0 -276.6 M
13 2 Nf
(4.1.) S
[/View [/XYZ -4 496.000031 null] /Dest /73 /DEST pdfmark
( Web user ) S
(authentication) S
0 -300.8 M
11 0 Nf
0.294010431 0 32 0 0 (The first group is to authenticate users of common Web applications, typically using Web browsers as) A
0 -314 M
1.24747241 0 32 0 0 (clients. This group is very common use cases which exists from very early stage of HTTP, and the) A
0 -327.2 M
(ones for which currently existing HTTP authentication mechanisms are designed. ) S
0 -351.4 M
1.06850958 0 32 0 0 (One of the most important security consideration in these scenarios is complex interactions between) A
0 -364.6 M
2.650213 0 32 0 0 (human users, browser clients and Websites including those of uncontrollable third-party entities.) A
0 -377.8 M
0.659114599 0 32 0 0 (Phishing is a very common attack vector for this scenario, and without having some weapons against) A
0 -391 M
1.81705725 0 32 0 0 (protecting authentication credentials and integrity, it is impossible to stop malicious phishers from) A
0 -404.2 M
(deploying such attacks. ) S
0 -428.4 M
2.265625 0 32 0 0 (Authentication credentials used for these scenarios varies for required authentication strength and) A
0 -441.6 M
3.322088 0 32 0 0 (several social factors, for example passwords, cryptographic secret keys, smart cards, one-time) A
0 -454.8 M
1.0888021 0 32 0 0 (passwords, etc., but in most cases such credentials are belonging to human entities. There is several) A
0 -468 M
(proposals for unified and federated authentications, but this principle does not change. ) S
0 -479 M
[/View [/XYZ -4 277.999878 null] /Dest /20 /DEST pdfmark
0 -479 M
[/View [/XYZ -4 277.999878 null] /Dest /21 /DEST pdfmark
0 -494.6 M
13 2 Nf
(4.2.) S
[/View [/XYZ -4 277.999878 null] /Dest /74 /DEST pdfmark
( Web client application data ) S
(accesses) S
0 -518.8 M
11 0 Nf
0.404575884 0 32 0 0 (Recently, capability of client-side data processing in Web browser clients are greatly improved, and it) A
0 -532 M
1.09872162 0 32 0 0 (introduced a new pattern of client-server relationship in Web applications: Web-application initiated) A
0 -545.2 M
(data accesses. ) S
0 -569.4 M
0.762019217 0 32 0 0 (In ancient Web systems, clients are only communicating with the corresponding server providing the) A
0 -582.6 M
0.987060547 0 32 0 0 (current Web page, and if some external data accesses are needed, the server will perform it, process) A
0 -595.8 M
1.72309029 0 32 0 0 (the received data and serve the result to client as a static data embedded in Web contents. In this) A
0 -609 M
3.21907544 0 32 0 0 (scheme, the user authentication mentioned above is only necessary, and all other authorization) A
0 -622.2 M
(managements are performed in the server-side. ) S
0 -633.2 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 4 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 5 5
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
2.81184888 0 32 0 0 (However, evolution of client-side data processing changed the whole story. Now the client-side) A
0 -26.4 M
1.69084823 0 32 0 0 (application can request authentication of itself as an agent of the human user, obtain authorization) A
0 -39.6 M
0.378385425 0 32 0 0 (rights and access several data resources in various servers. Such authorization rights are not needed to) A
0 -52.8 M
0.201171875 0 32 0 0 (be directly corresponding to the active human user's rights: it can be of another user's rights delegated) A
0 -66 M
0.854090095 0 32 0 0 (to a user \(like what the ) A
gsave
newpath
108.3 -67.1 M
33.5415916 0 RL
stroke
grestore
0.854090095 0 32 0 0 (OAuth ) A
gsave
newpath
141.9 -67.1 M
36.6523438 0 RL
stroke
grestore
0.854090095 0 32 0 0 (protocol) A
[/Rect [107.335938 -68.75 179.527344 -56.65] /Subtype /Link /Border [0 0 0] /Dest /45 /ANN pdfmark
0.854090095 0 32 0 0 ( [I-D.ietf-oauth-v2] provides\), or it can be subset of what the) A
0 -79.2 M
1.19001114 0 32 0 0 (user has access to. In this story, the authentication/authorization of client application are related but) A
0 -92.4 M
(not directly connected to the human user's authentication. ) S
0 -116.6 M
0.314302891 0 32 0 0 (Some important points in this group might be flexibility: application-level authentication can be either) A
0 -129.8 M
2.65625 0 32 0 0 (related or unrelated to human entity, and same application may need to provide more than one) A
0 -143 M
(methods of authentications in the same framework, possibly with different levels of authorizations. ) S
0 -167.2 M
0.552517354 0 32 0 0 (In this use cases, phishing is not always a key factor for threat analysis. If Web applications are itself) A
0 -180.4 M
0.416666657 0 32 0 0 (faked and thus provided from phishing sites, the user cannot trust provided data regardless of whether) A
0 -193.6 M
0.685416639 0 32 0 0 (the data resource servers accessed are trustful or not. On the contrary, provided Web applications are) A
0 -206.8 M
0.37109375 0 32 0 0 (trustful, these programs typically \(but not always\) "know" what server is the correct server to interact.) A
0 -220 M
0.23473011 0 32 0 0 (Some mutual and eavesdropping-safe authentication technologies are still useful, as many applications) A
0 -233.2 M
3.57486987 0 32 0 0 (nowadays still need some communication in an unencrypted channels because of overhead of) A
0 -246.4 M
(secure-channel provisions. ) S
0 -257.4 M
[/View [/XYZ -4 499.600037 null] /Dest /22 /DEST pdfmark
0 -257.4 M
[/View [/XYZ -4 499.600037 null] /Dest /23 /DEST pdfmark
0 -273 M
%%IncludeResource: font Times-Bold
13 2 Nf
(4.3.) S
[/View [/XYZ -4 499.600037 null] /Dest /75 /DEST pdfmark
( Non-Web user ) S
(authentication) S
0 -297.2 M
11 0 Nf
2.17277646 0 32 0 0 (The final group is use-cases for non-browser client applications. Nowadays HTTP is becoming a) A
0 -310.4 M
2.14950275 0 32 0 0 (common vehicle for various applications including non-browser clients. Because of its simplicity,) A
0 -323.6 M
2.10216355 0 32 0 0 (many existing services are providing both Web-client and non-Web API accesses using the same) A
0 -336.8 M
1.06614578 0 32 0 0 (HTTP platform. We should not ignore such use cases when considering solutions for the above two) A
0 -350 M
(groups. ) S
0 -374.2 M
0.0638786778 0 32 0 0 (In some aspects, required features for this group of applications are subsets of the above two use cases.) A
0 -387.4 M
0.518136144 0 32 0 0 (Simple user authentication may be mapped to an HTTP authentication scheme provided for the "Web) A
0 -400.6 M
3.19140625 0 32 0 0 (user authentication", and some detailed authorization cases may be mapped to an access grant) A
0 -413.8 M
0.945963562 0 32 0 0 (management used for "Web application authentication" stories. However, because we cannot rely on) A
0 -427 M
2.43286133 0 32 0 0 (any aid from Web pages and scripts, some technologies for these groups may be not useful for) A
0 -440.2 M
0.423828125 0 32 0 0 (non-Web applications, or careful design consideration may be needed for applying those to this group) A
0 -453.4 M
0.1202567 0 32 0 0 (of use cases. For an instance, OAuth usually relies on Web-based authentication and page redirections,) A
0 -466.6 M
2.36607146 0 32 0 0 (but to support non-Web application use cases it required some additional features as well. Also,) A
0 -479.8 M
0.702059686 0 32 0 0 (integration with existing authentication framework such as ) A
gsave
newpath
266 -480.9 M
26.8867188 0 RL
stroke
grestore
0.702059686 0 32 0 0 (SASL) A
[/Rect [265.03125 -482.55014 293.917969 -470.450134] /Subtype /Link /Border [0 0 0] /Dest /55 /ANN pdfmark
0.702059686 0 32 0 0 ( [RFC4422] or ) A
gsave
newpath
362.5 -480.9 M
37.8828125 0 RL
stroke
grestore
0.702059686 0 32 0 0 (GSSAPI) A
[/Rect [361.53125 -482.55014 401.414062 -470.450134] /Subtype /Link /Border [0 0 0] /Dest /51 /ANN pdfmark
0.702059686 0 32 0 0 ( [RFC2743]) A
0 -493 M
(might be important especially in this use cases. ) S
0 -504 M
[/View [/XYZ -4 252.999847 null] /Dest /24 /DEST pdfmark
0 -504 M
[/View [/XYZ -4 252.999847 null] /Dest /25 /DEST pdfmark
0 -523 M
15 2 Nf
(5.) S
[/View [/XYZ -4 251.999878 null] /Dest /76 /DEST pdfmark
( Problem ) S
(statements) S
0 -530.5 M
[/View [/XYZ -4 226.499878 null] /Dest /26 /DEST pdfmark
0 -530.5 M
[/View [/XYZ -4 226.499878 null] /Dest /27 /DEST pdfmark
0 -549 M
13 2 Nf
(5.1.) S
[/View [/XYZ -4 223.599854 null] /Dest /77 /DEST pdfmark
( Lack of mutual ) S
(authentication) S
0 -573.2 M
11 0 Nf
5.149858 0 32 0 0 (Most authentication technologies which are currently used on Web systems are essentially) A
0 -586.4 M
0.166992188 0 32 0 0 (one-directional. A server always checks authenticity of users using client authentication credential, but) A
0 -599.6 M
0.221289068 0 32 0 0 (a user has little control of the process and a user can not know whether the talking peer is the intended) A
0 -612.8 M
2.1682291 0 32 0 0 (entity, or they can not know whether the server is actually performing an authentication and has) A
0 -626 M
0.851792276 0 32 0 0 (knowledge of the user. This has been a cause of many Phishing attack instances. All of HTTP Basic) A
0 -639.2 M
2.58085942 0 32 0 0 (authentication, Digest authentication, HTML Form authentication and even TLS client certificate) A
0 -652.4 M
0.198918268 0 32 0 0 (authentication fall into this category of technologies. TLS server authentication are thought to mitigate) A
0 -665.6 M
0.50390625 0 32 0 0 (this factor, but it was too weak to prevent many Phishing attacks. The TLS server authentication only) A
0 -665.6 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 5 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 6 6
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
0.484375 0 32 0 0 (certifies that the server has \(in some sense\) a right to legitimately use the domain name that the client) A
0 -26.4 M
11 0 Nf
0.45703125 0 32 0 0 (accessed, and optionally binds the server with some real-world entity. In fact, some phishing sites use) A
0 -39.6 M
1.84531248 0 32 0 0 (their own domains with a valid server certificates, or others use a cracked servers with legitimate) A
0 -52.8 M
0.709263384 0 32 0 0 (certificates to perform an attack. In this situation, the server authentication does not prevent Phishing) A
0 -66 M
(technically, instead it relies on the careful manual investigation of domain names by an end user. ) S
0 -90.2 M
0.336458325 0 32 0 0 (For secure use of Web systems mutual authentication between users and servers has critical needs. By) A
0 -103.4 M
1.38867188 0 32 0 0 (performing mutual authentication, a user can assure that the peer server has certainly performed an) A
0 -116.6 M
3.41266751 0 32 0 0 (authentication, and that the peer has a prior knowledge of the user, eliminating possibility of) A
0 -129.8 M
1.08398438 0 32 0 0 (man-in-the-middle attacks or false authentications. We should investigate possibilities of performing) A
0 -143 M
2.67226553 0 32 0 0 (mutual authentication using various kinds of authentication credentials: passwords \(weak secret\),) A
0 -156.2 M
(strong shared key, multi-factor credentials and even cryptographic public/private key pairs if possible. ) S
0 -180.4 M
1.89002407 0 32 0 0 (This requirement is mainly applicable for both Web and non-Web user authentication. For simple) A
0 -193.6 M
1.80018032 0 32 0 0 (access patterns \(where user authentication coincide with data access authorization\), it may be also) A
0 -206.8 M
(applicable for application data accesses \(both Web and non-Web\). ) S
0 -217.8 M
[/View [/XYZ -4 539.2 null] /Dest /28 /DEST pdfmark
0 -217.8 M
[/View [/XYZ -4 539.2 null] /Dest /29 /DEST pdfmark
0 -233.4 M
%%IncludeResource: font Times-Bold
13 2 Nf
(5.2.) S
[/View [/XYZ -4 539.2 null] /Dest /78 /DEST pdfmark
( Avoiding use of plain-text passwords on ) S
(authentication) S
0 -257.6 M
11 0 Nf
3.7375 0 32 0 0 (Two most widely used authentication technologies, Basic and Form-based authentication, uses) A
0 -270.8 M
4.59179688 0 32 0 0 (plain-text passwords as credentials and send these directly on wire. Obviously, using those) A
0 -284 M
1.14032447 0 32 0 0 (technologies without encryption will reveal any secret credentials to all eavesdroppers. Even if TLS) A
0 -297.2 M
2.07356763 0 32 0 0 (encryption is used, on-wire plaintext passwords are vulnerable for Phishing and \(Web application) A
0 -310.4 M
0.717247605 0 32 0 0 (layer\) man-in-the-middle attacks. This weakness is amplified when users are using a single password) A
0 -323.6 M
1.1125 0 32 0 0 (for several independent systems. Especially, using plaintext passwords in Form-based authentication) A
0 -336.8 M
0.46875 0 32 0 0 (required handling of passwords in a Web application layer, which has caused many password leakage) A
0 -350 M
2.96386719 0 32 0 0 (accidents in many commercial websites. To avoid these problems, we need technologies which) A
0 -363.2 M
(prevents leakage of reusable weak secret. ) S
0 -387.4 M
0.249441966 0 32 0 0 (This item applies to all of the previously-mentioned use cases. Especially when applications needs use) A
0 -400.6 M
0.296875 0 32 0 0 (of unencrypted channels for performance reasons, it is crucial to protect authentication credentials and ) A
0 -413.8 M
(tokens.) S
0 -424.8 M
[/View [/XYZ -4 332.19989 null] /Dest /30 /DEST pdfmark
0 -424.8 M
[/View [/XYZ -4 332.19989 null] /Dest /31 /DEST pdfmark
0 -440.4 M
13 2 Nf
(5.3.) S
[/View [/XYZ -4 332.19989 null] /Dest /79 /DEST pdfmark
( Functional weakness of HTTP authentication ) S
(framework) S
0 -464.6 M
11 0 Nf
0.621419251 0 32 0 0 (Current basic design of ) A
gsave
newpath
107.6 -465.7 M
96.539711 0 RL
stroke
grestore
0.621419251 0 32 0 0 (HTTP authentication ) A
gsave
newpath
204.1 -465.7 M
48.2421875 0 RL
stroke
grestore
0.621419251 0 32 0 0 (framework) A
[/Rect [106.550781 -467.350128 253.332031 -455.250122] /Subtype /Link /Border [0 0 0] /Dest /49 /ANN pdfmark
0.621419251 0 32 0 0 ( [RFC2617] does not sufficiently provide the) A
0 -477.8 M
1.55885422 0 32 0 0 (features which are required by current Web application logics. This is currently one of the biggest) A
0 -491 M
1.234375 0 32 0 0 (reason why many Web developers prefer HTML Form-based authentication more than HTTP Basic) A
0 -504.2 M
0.137890622 0 32 0 0 (authentication. For example, current HTTP authentication framework lacks support for non-mandatory) A
0 -517.4 M
0.0631510392 0 32 0 0 (authentication \(aka guest user support\), and enforcement of login session termination \(log-out control\).) A
0 -530.6 M
0.014423077 0 32 0 0 (It also removes application developers detailed control of user experiences, because most of interactive) A
0 -543.8 M
0.130709141 0 32 0 0 (HTTP clients \(Web browsers\) uses a modal, interruptive dialog user interface for authentication. Some) A
0 -557 M
1.8990885 0 32 0 0 (authentication schemes, notably TLS client certificate authentication are further worse, as a single) A
0 -570.2 M
0.213541672 0 32 0 0 (server must serve a single set of authentication, and users can not use several identities simultaneously) A
0 -583.4 M
(within one server. ) S
0 -607.6 M
0.885253906 0 32 0 0 (However, due to the nature of HTML form and UI designs, it is almost impossible to fundamentally) A
0 -620.8 M
1.96432292 0 32 0 0 (improve security of Form authentication, mainly due to the fact UI of such authentication can be) A
0 -634 M
0.565716922 0 32 0 0 (always faked and imitated. For example, if we had a secure input field for passwords in some HTML) A
0 -647.2 M
1.16350448 0 32 0 0 (extensions, Phishers would simply forge it with usual password field instead to steal any passwords) A
0 -660.4 M
0.816176474 0 32 0 0 (inputs. To avoid this problem, the user agent \(browsers\) and the HTTP protocol must serve a role of) A
0 -660.4 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 6 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 7 7
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 -13.2 M
%%IncludeResource: font Times-Roman
11 0 Nf
0.0895182267 0 32 0 0 (securely handling authentication and user credentials. To make use of such agent-driven authentication) A
0 -26.4 M
11 0 Nf
1.46724761 0 32 0 0 (in real applications, the authentication framework should be flexible enough so that the application) A
0 -39.6 M
(developers can realize any application logics they require for the user and session managements. ) S
0 -63.8 M
1.36230469 0 32 0 0 (This requirement is mainly applicable for browser-based Web user authentication. The provision of) A
0 -77 M
(such features should be compatible with other use cases, however. ) S
0 -88 M
[/View [/XYZ -4 669.0 null] /Dest /32 /DEST pdfmark
0 -88 M
[/View [/XYZ -4 669.0 null] /Dest /33 /DEST pdfmark
0 -103.6 M
%%IncludeResource: font Times-Bold
13 2 Nf
(5.4.) S
[/View [/XYZ -4 669.0 null] /Dest /80 /DEST pdfmark
( Lack of bindings between multi-layer ) S
(authentications/authorizations) S
0 -127.8 M
11 0 Nf
0.9765625 0 32 0 0 (Many recent Web applications are implemented in multi-layer technologies and each layer often has) A
0 -141 M
2.73398447 0 32 0 0 (own control of authentication and authorization. For example, ) A
gsave
newpath
297.3 -142.1 M
29.9375 0 RL
stroke
grestore
2.73398447 0 32 0 0 (OAuth) A
[/Rect [296.34375 -143.75 328.28125 -131.65] /Subtype /Link /Border [0 0 0] /Dest /45 /ANN pdfmark
2.73398447 0 32 0 0 ( [I-D.ietf-oauth-v2] enables) A
0 -154.2 M
10.8632812 0 32 0 0 (application-level delegated access authorization using credentials issued on another) A
0 -167.4 M
6.93967 0 32 0 0 (authentication/authorization framework. W3C proposed WebID uses result of TLS client) A
0 -180.6 M
0.293870181 0 32 0 0 (authentication for control of upper-layer identification and authorization. The channel binding is a key) A
0 -193.8 M
2.04394531 0 32 0 0 (technology to implement such multi-layer applications. Simply speaking, the channel binding is a) A
0 -207 M
9.609375 0 32 0 0 (technique which relates an upper-layer authentication with a result of lower-layer) A
0 -220.2 M
2.42862225 0 32 0 0 (authentications/key-exchanges. By doing that, any result of upper-layer authentication can not be) A
0 -233.4 M
0.866406262 0 32 0 0 (separately used on any other lower-layer channels which are not authenticated by the same way. For) A
0 -246.6 M
0.354631692 0 32 0 0 (example, by using ) A
gsave
newpath
84.1 -247.7 M
59.9631691 0 RL
stroke
grestore
0.354631692 0 32 0 0 (TLS channel ) A
gsave
newpath
144.1 -247.7 M
33.609375 0 RL
stroke
grestore
0.354631692 0 32 0 0 (binding) A
[/Rect [83.1445312 -249.349976 178.710938 -237.249969] /Subtype /Link /Border [0 0 0] /Dest /58 /ANN pdfmark
0.354631692 0 32 0 0 ( [RFC5929] with a signed OAuth request, such request tokens) A
0 -259.8 M
1.65473092 0 32 0 0 (can not be used by any other people to access the protected resources, even if the token has been) A
0 -273 M
2.37393475 0 32 0 0 (leaked in some way. Unfortunately, current HTTP-layer authentication schemes does not provide) A
0 -286.2 M
2.78480124 0 32 0 0 (functionality for such channel bindings. Future schemes should consider providing such binding) A
0 -299.4 M
(functionality as its building blocks. ) S
0 -323.6 M
(\(to be mentioned: ) S
gsave
newpath
80.3 -324.7 M
90.734375 0 RL
stroke
grestore
(OAuth HTTP MAC ) S
gsave
newpath
171.1 -324.7 M
62.3046875 0 RL
stroke
grestore
(authentication) S
[/Rect [79.3320312 -326.350037 234.371094 -314.250031] /Subtype /Link /Border [0 0 0] /Dest /46 /ANN pdfmark
( [I-D.ietf-oauth-v2-http-mac]\) ) S
0 -334.6 M
[/View [/XYZ -4 422.399963 null] /Dest /34 /DEST pdfmark
0 -334.6 M
[/View [/XYZ -4 422.399963 null] /Dest /35 /DEST pdfmark
0 -353.6 M
15 2 Nf
(6.) S
[/View [/XYZ -4 421.399963 null] /Dest /81 /DEST pdfmark
( More ) S
(topics) S
0 -377.8 M
11 0 Nf
(\(TBD\) ) S
0 -388.8 M
[/View [/XYZ -4 368.199951 null] /Dest /36 /DEST pdfmark
0 -388.8 M
[/View [/XYZ -4 368.199951 null] /Dest /37 /DEST pdfmark
0 -407.8 M
15 2 Nf
(7.) S
[/View [/XYZ -4 367.199951 null] /Dest /82 /DEST pdfmark
( IANA ) S
(Considerations) S
0 -432 M
11 0 Nf
(None. ) S
0 -443 M
[/View [/XYZ -4 313.999939 null] /Dest /38 /DEST pdfmark
0 -443 M
[/View [/XYZ -4 313.999939 null] /Dest /39 /DEST pdfmark
0 -462 M
15 2 Nf
(8.) S
[/View [/XYZ -4 312.999939 null] /Dest /83 /DEST pdfmark
( Security ) S
(Considerations) S
0 -486.2 M
11 0 Nf
0.735877395 0 32 0 0 (This document obviously deals with security technologies. However, the purpose of this document is) A
0 -499.4 M
1.99302459 0 32 0 0 (not to provide specific protocols or technologies to be directly implemented, but to discuss about) A
0 -512.6 M
0.412860572 0 32 0 0 (current status of existing technologies and requirements for future technologies. Therefore, there is no) A
0 -525.8 M
3.17897725 0 32 0 0 (specific security precautions to be mentioned here. When designing some specific technologies) A
0 -539 M
0.646033645 0 32 0 0 (mentioned in this document, we MUST have careful consideration of security properties, because the) A
0 -552.2 M
(technology area handled in this document has very complex and legacy characteristics and limitations. ) S
0 -563.2 M
[/View [/XYZ -4 193.799866 null] /Dest /40 /DEST pdfmark
0 -563.2 M
[/View [/XYZ -4 193.799866 null] /Dest /41 /DEST pdfmark
0 -582.2 M
15 2 Nf
(9.) S
[/View [/XYZ -4 192.799866 null] /Dest /84 /DEST pdfmark
( ) S
(References) S
0 -589.7 M
[/View [/XYZ -4 167.299866 null] /Dest /42 /DEST pdfmark
0 -608.2 M
13 2 Nf
(9.1.) S
[/View [/XYZ -4 164.399841 null] /Dest /85 /DEST pdfmark
( Normative ) S
(References) S
8 -624.5 M
0.988782346 0.988782346 scale

-0.0 -11.0 RM
11 0 Nf
([RFC2119]) S
[/View [/XYZ -4 842 null] /Dest /43 /DEST pdfmark
1.01134491 1.01134491 scale

73.5 -635.5 M
gsave
newpath
73.5 -636.6 M
40.921875 0 RL
stroke
grestore
(Bradner, ) S
gsave
newpath
114.5 -636.6 M
8.86328125 0 RL
stroke
grestore
(S.) S
(, ) S
(\233) S
gsave
newpath
133.7 -636.6 M
231.832031 0 RL
stroke
grestore
(Key words for use in RFCs to Indicate Requirement ) S
gsave
newpath
365.5 -636.6 M
29.3164062 0 RL
stroke
grestore
(Levels) S
[/Rect [132.711365 -638.250122 395.859802 -626.150146] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2119)] Cd /ANN pdfmark
(,\234) S
73.5 -648.7 M
(BCP\24014, RFC\2402119, March\2401997 ) S
(\() S
gsave
newpath
224.5 -649.8 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [223.47699 -651.450134 246.855896 -639.350159] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc2119.txt)] Cd /ANN pdfmark
(, ) S
gsave
newpath
251.4 -649.8 M
31.15625 0 RL
stroke
grestore
(HTML) S
[/Rect [250.355896 -651.450134 283.512146 -639.350159] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://xml.resource.org/public/rfc/html/rfc2119.html)] Cd /ANN pdfmark
(, ) S
gsave
newpath
288 -649.8 M
24.4375 0 RL
stroke
grestore
(XML) S
[/Rect [287.012146 -651.450134 313.449646 -639.350159] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://xml.resource.org/public/rfc/xml/rfc2119.xml)] Cd /ANN pdfmark
(\).) S
0 -657.5 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 7 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 8 8
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /44 /DEST pdfmark
0 -15.6 M
%%IncludeResource: font Times-Bold
13 2 Nf
(9.2.) S
[/View [/XYZ -4 757.0 null] /Dest /86 /DEST pdfmark
( Informative ) S
(References) S
8 -42.9 M
%%IncludeResource: font Times-Roman
11 0 Nf
([I-D.ietf-oauth-v2]) S
[/View [/XYZ -4 842 null] /Dest /45 /DEST pdfmark
148.2 -42.9 M
(Hammer-Lahav, E., Recordon, D., and D. Hardt, ) S
(\233) S
gsave
newpath
370.2 -44 M
66.2890625 0 RL
stroke
grestore
(The OAuth 2.0) S
[/Rect [369.215332 -45.65 437.504395 -33.5500031] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-16.txt)] Cd /ANN pdfmark
148.2 -56.1 M
gsave
newpath
148.2 -57.2 M
63.8359375 0 RL
stroke
grestore
(Authorization ) S
gsave
newpath
212 -57.2 M
37.265625 0 RL
stroke
grestore
(Protocol) S
[/Rect [147.17627 -58.8500023 250.277832 -46.75] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-16.txt)] Cd /ANN pdfmark
(,\234 draft-ietf-oauth-v2-16 \(work in) S
148.2 -69.3 M
(progress\), May\2402011 ) S
(\() S
gsave
newpath
245.9 -70.4 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [244.914551 -72.05 268.293457 -59.9500046] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-16.txt)] Cd /ANN pdfmark
(, ) S
gsave
newpath
272.8 -70.4 M
20.1679688 0 RL
stroke
grestore
(PDF) S
[/Rect [271.793457 -72.05 293.961426 -59.9500046] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-16.pdf)] Cd /ANN pdfmark
(\).) S
8 -80 M
0.989513874 0.989513874 scale

-0.0 -11.0 RM
([I-D.ietf-oauth-v2-http-mac]) S
[/View [/XYZ -4 842 null] /Dest /46 /DEST pdfmark
1.01059723 1.01059723 scale

148.2 -91 M
(Hammer-Lahav, E., Barth, A., and B. Adida, ) S
(\233) S
gsave
newpath
353.1 -92.2 M
27.4921875 0 RL
stroke
grestore
(HTTP) S
[/Rect [352.121582 -93.8 381.61377 -81.7000046] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-http-mac-00.txt)] Cd /ANN pdfmark
148.2 -104.3 M
gsave
newpath
148.2 -105.3 M
132.867188 0 RL
stroke
grestore
(Authentication: MAC Access ) S
gsave
newpath
281 -105.3 M
65.3632812 0 RL
stroke
grestore
(Authentication) S
[/Rect [147.17627 -107.0 347.406738 -94.9] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-http-mac-00.txt)] Cd /ANN pdfmark
(,\234) S
148.2 -117.5 M
(draft-ietf-oauth-v2-http-mac-00 \(work in progress\), May\2402011 ) S
148.2 -130.7 M
(\() S
gsave
newpath
151.8 -131.8 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [150.836426 -133.4 174.215332 -121.299995] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-http-mac-00.txt)] Cd /ANN pdfmark
(, ) S
gsave
newpath
178.7 -131.8 M
20.1679688 0 RL
stroke
grestore
(PDF) S
[/Rect [177.715332 -133.4 199.883301 -121.299995] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-http-mac-00.pdf)] Cd /ANN pdfmark
(\).) S
8 -152.4 M
([OASIS.saml-core-2.0-os]) S
[/View [/XYZ -4 842 null] /Dest /47 /DEST pdfmark
148.2 -152.4 M
gsave
newpath
148.2 -153.5 M
35.4335938 0 RL
stroke
grestore
(Cantor, ) S
gsave
newpath
183.6 -153.5 M
8.86328125 0 RL
stroke
grestore
(S.) S
(, ) S
gsave
newpath
198 -153.5 M
32.3789062 0 RL
stroke
grestore
(Kemp, ) S
gsave
newpath
230.4 -153.5 M
7.02734375 0 RL
stroke
grestore
(J.) S
(, ) S
gsave
newpath
242.9 -153.5 M
40.3320312 0 RL
stroke
grestore
(Philpott, ) S
gsave
newpath
283.2 -153.5 M
10.0859375 0 RL
stroke
grestore
(R.) S
(, and ) S
gsave
newpath
317.4 -153.5 M
12.21875 0 RL
stroke
grestore
(E. ) S
gsave
newpath
329.6 -153.5 M
26.2578125 0 RL
stroke
grestore
(Maler) S
(, ) S
(\233) S
gsave
newpath
366.3 -153.5 M
65.0585938 0 RL
stroke
grestore
(Assertions and) S
[/Rect [365.289551 -155.15 432.348145 -143.049988] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf)] Cd /ANN pdfmark
148.2 -165.6 M
gsave
newpath
148.2 -166.7 M
271.527344 0 RL
stroke
grestore
(Protocol for the OASIS Security Assertion Markup Language) S
[/Rect [147.17627 -168.349991 420.703613 -156.249985] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf)] Cd /ANN pdfmark
148.2 -178.8 M
gsave
newpath
148.2 -179.9 M
40.6210938 0 RL
stroke
grestore
(\(SAML\) ) S
gsave
newpath
188.8 -179.9 M
21.6914062 0 RL
stroke
grestore
(V2.0) S
[/Rect [147.17627 -181.549988 211.48877 -169.449982] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf)] Cd /ANN pdfmark
(,\234 OASIS Standard\240saml-core-2.0-os, ) S
(March\2402005.) S
8 -200.5 M
([RFC1939]) S
[/View [/XYZ -4 842 null] /Dest /48 /DEST pdfmark
148.2 -200.5 M
gsave
newpath
148.2 -201.7 M
33.5976562 0 RL
stroke
grestore
(Myers, ) S
gsave
newpath
181.8 -201.7 M
7.02734375 0 RL
stroke
grestore
(J.) S
( and ) S
gsave
newpath
210.2 -201.7 M
15.2773438 0 RL
stroke
grestore
(M. ) S
gsave
newpath
225.5 -201.7 M
21.9960938 0 RL
stroke
grestore
(Rose) S
(, ) S
(\233) S
gsave
newpath
257.8 -201.7 M
136.519531 0 RL
stroke
grestore
(Post Office Protocol - Version ) S
gsave
newpath
394.4 -201.7 M
5.5 0 RL
stroke
grestore
(3) S
[/Rect [256.840332 -203.299988 400.859863 -191.199982] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc1939)] Cd /ANN pdfmark
(,\234) S
148.2 -213.7 M
(STD\24053, RFC\2401939, May\2401996 ) S
(\() S
gsave
newpath
290.6 -214.8 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [289.555176 -216.499985 312.934082 -204.399979] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc1939.txt)] Cd /ANN pdfmark
(\).) S
8 -235.5 M
([RFC2617]) S
[/View [/XYZ -4 842 null] /Dest /49 /DEST pdfmark
148.2 -235.5 M
gsave
newpath
148.2 -236.6 M
35.4335938 0 RL
stroke
grestore
(Franks, ) S
gsave
newpath
183.6 -236.6 M
7.02734375 0 RL
stroke
grestore
(J.) S
(, ) S
gsave
newpath
196.1 -236.6 M
67.7929688 0 RL
stroke
grestore
(Hallam-Baker, ) S
gsave
newpath
263.9 -236.6 M
8.86328125 0 RL
stroke
grestore
(P.) S
(, ) S
gsave
newpath
278.3 -236.6 M
45.8085938 0 RL
stroke
grestore
(Hostetler, ) S
gsave
newpath
324.1 -236.6 M
7.02734375 0 RL
stroke
grestore
(J.) S
(, ) S
gsave
newpath
336.6 -236.6 M
48.8515625 0 RL
stroke
grestore
(Lawrence, ) S
gsave
newpath
385.5 -236.6 M
8.86328125 0 RL
stroke
grestore
(S.) S
(, ) S
gsave
newpath
399.8 -236.6 M
32.3671875 0 RL
stroke
grestore
(Leach, ) S
148.2 -248.7 M
gsave
newpath
148.2 -249.8 M
8.86328125 0 RL
stroke
grestore
(P.) S
(, Luotonen, A., and ) S
gsave
newpath
245 -249.8 M
12.21875 0 RL
stroke
grestore
(L. ) S
gsave
newpath
257.2 -249.8 M
33.5898438 0 RL
stroke
grestore
(Stewart) S
(, ) S
(\233) S
gsave
newpath
301.2 -249.8 M
125.84375 0 RL
stroke
grestore
(HTTP Authentication: Basic) S
[/Rect [300.211426 -251.449982 428.055176 -239.349976] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2617)] Cd /ANN pdfmark
148.2 -261.9 M
gsave
newpath
148.2 -263 M
83.9882812 0 RL
stroke
grestore
(and Digest Access ) S
gsave
newpath
232.2 -263 M
65.3632812 0 RL
stroke
grestore
(Authentication) S
[/Rect [147.17627 -264.65 298.527832 -252.549988] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2617)] Cd /ANN pdfmark
(,\234 RFC\2402617, June\2401999 ) S
(\() S
gsave
newpath
410.3 -263 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [409.266113 -264.65 432.64502 -252.549988] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc2617.txt)] Cd /ANN pdfmark
(, ) S
148.2 -275.1 M
gsave
newpath
148.2 -276.2 M
31.15625 0 RL
stroke
grestore
(HTML) S
[/Rect [147.17627 -277.85 180.33252 -265.75] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://xml.resource.org/public/rfc/html/rfc2617.html)] Cd /ANN pdfmark
(, ) S
gsave
newpath
184.8 -276.2 M
24.4375 0 RL
stroke
grestore
(XML) S
[/Rect [183.83252 -277.85 210.27002 -265.75] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://xml.resource.org/public/rfc/xml/rfc2617.xml)] Cd /ANN pdfmark
(\).) S
8 -296.9 M
([RFC2661]) S
[/View [/XYZ -4 842 null] /Dest /50 /DEST pdfmark
148.2 -296.9 M
gsave
newpath
148.2 -297.9 M
48.875 0 RL
stroke
grestore
(Townsley, ) S
gsave
newpath
197.1 -297.9 M
13.1328125 0 RL
stroke
grestore
(W.) S
(, ) S
gsave
newpath
215.7 -297.9 M
44.5820312 0 RL
stroke
grestore
(Valencia, ) S
gsave
newpath
260.3 -297.9 M
10.6914062 0 RL
stroke
grestore
(A.) S
(, ) S
gsave
newpath
276.5 -297.9 M
38.4960938 0 RL
stroke
grestore
(Rubens, ) S
gsave
newpath
315 -297.9 M
10.6914062 0 RL
stroke
grestore
(A.) S
(, ) S
gsave
newpath
331.1 -297.9 M
22.6054688 0 RL
stroke
grestore
(Pall, ) S
gsave
newpath
353.8 -297.9 M
10.6914062 0 RL
stroke
grestore
(G.) S
(, ) S
gsave
newpath
369.9 -297.9 M
26.8789062 0 RL
stroke
grestore
(Zorn, ) S
gsave
newpath
396.8 -297.9 M
10.6914062 0 RL
stroke
grestore
(G.) S
(, and ) S
148.2 -310.1 M
gsave
newpath
148.2 -311.2 M
12.8359375 0 RL
stroke
grestore
(B. ) S
gsave
newpath
161 -311.2 M
25.6484375 0 RL
stroke
grestore
(Palter) S
(, ) S
(\233) S
gsave
newpath
197 -311.2 M
139.28125 0 RL
stroke
grestore
(Layer Two Tunneling Protocol ) S
gsave
newpath
336.3 -311.2 M
34.0195312 0 RL
stroke
grestore
("L2TP") S
[/Rect [196.043457 -312.800018 371.344238 -300.7] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2661)] Cd /ANN pdfmark
(,\234 RFC\2402661,) S
148.2 -323.3 M
(August\2401999 ) S
(\() S
gsave
newpath
211.1 -324.4 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [210.109863 -326.000031 233.48877 -313.900024] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc2661.txt)] Cd /ANN pdfmark
(\).) S
8 -345 M
([RFC2743]) S
[/View [/XYZ -4 842 null] /Dest /51 /DEST pdfmark
148.2 -345 M
gsave
newpath
148.2 -346.1 M
26.2734375 0 RL
stroke
grestore
(Linn, ) S
gsave
newpath
174.4 -346.1 M
7.02734375 0 RL
stroke
grestore
(J.) S
(, ) S
(\233) S
gsave
newpath
191.9 -346.1 M
247.042969 0 RL
stroke
grestore
(Generic Security Service Application Program Interface) S
[/Rect [190.859863 -347.75 439.902832 -335.65] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2743)] Cd /ANN pdfmark
148.2 -358.2 M
gsave
newpath
148.2 -359.3 M
83.078125 0 RL
stroke
grestore
(Version 2, Update ) S
gsave
newpath
231.3 -359.3 M
5.5 0 RL
stroke
grestore
(1) S
[/Rect [147.17627 -360.95 237.754395 -348.85] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc2743)] Cd /ANN pdfmark
(,\234 RFC\2402743, January\2402000 ) S
(\() S
gsave
newpath
363.5 -359.3 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [362.535645 -360.95 385.914551 -348.85] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc2743.txt)] Cd /ANN pdfmark
(\).) S
8 -379.9 M
([RFC3501]) S
[/View [/XYZ -4 842 null] /Dest /52 /DEST pdfmark
148.2 -379.9 M
(Crispin, M., ) S
(\233) S
gsave
newpath
209 -381.1 M
219.34375 0 RL
stroke
grestore
(INTERNET MESSAGE ACCESS PROTOCOL -) S
[/Rect [207.969238 -382.7 429.313 -370.6] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc3501)] Cd /ANN pdfmark
148.2 -393.2 M
gsave
newpath
148.2 -394.3 M
50.4023438 0 RL
stroke
grestore
(VERSION ) S
gsave
newpath
198.6 -394.3 M
25.0429688 0 RL
stroke
grestore
(4rev1) S
[/Rect [147.17627 -395.900024 224.621582 -383.800018] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc3501)] Cd /ANN pdfmark
(,\234 RFC\2403501, March\2402003 ) S
(\() S
gsave
newpath
344.9 -394.3 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [343.902832 -395.900024 367.281738 -383.800018] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc3501.txt)] Cd /ANN pdfmark
(\).) S
8 -414.9 M
([RFC3647]) S
[/View [/XYZ -4 842 null] /Dest /53 /DEST pdfmark
148.2 -414.9 M
(Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S. Wu, ) S
148.2 -428.1 M
(\233) S
gsave
newpath
153.1 -429.2 M
277.296875 0 RL
stroke
grestore
(Internet X.509 Public Key Infrastructure Certificate Policy and) S
[/Rect [152.059082 -430.850037 431.355957 -418.750031] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc3647)] Cd /ANN pdfmark
148.2 -441.3 M
gsave
newpath
148.2 -442.4 M
100.769531 0 RL
stroke
grestore
(Certification Practices ) S
gsave
newpath
248.9 -442.4 M
50.6953125 0 RL
stroke
grestore
(Framework) S
[/Rect [147.17627 -444.050049 300.641113 -431.950043] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc3647)] Cd /ANN pdfmark
(,\234 RFC\2403647, November\2402003 ) S
148.2 -454.5 M
(\() S
gsave
newpath
151.8 -455.6 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [150.836426 -457.250061 174.215332 -445.150055] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc3647.txt)] Cd /ANN pdfmark
(\).) S
8 -476.3 M
([RFC4301]) S
[/View [/XYZ -4 842 null] /Dest /54 /DEST pdfmark
148.2 -476.3 M
(Kent, S. and K. Seo, ) S
(\233) S
gsave
newpath
245.6 -477.4 M
165.808594 0 RL
stroke
grestore
(Security Architecture for the Internet ) S
[/Rect [244.621582 -479.000031 412.430176 -466.900024] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc4301)] Cd /ANN pdfmark
148.2 -489.5 M
gsave
newpath
148.2 -490.6 M
37.265625 0 RL
stroke
grestore
(Protocol) S
[/Rect [147.17627 -492.200043 186.441895 -480.100037] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc4301)] Cd /ANN pdfmark
(,\234 RFC\2404301, December\2402005 ) S
(\() S
gsave
newpath
323.2 -490.6 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [322.20752 -492.200043 345.586426 -480.100037] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc4301.txt)] Cd /ANN pdfmark
(\).) S
8 -511.2 M
([RFC4422]) S
[/View [/XYZ -4 842 null] /Dest /55 /DEST pdfmark
148.2 -511.2 M
(Melnikov, A. and K. Zeilenga, ) S
(\233) S
gsave
newpath
290.8 -512.3 M
117.90625 0 RL
stroke
grestore
(Simple Authentication and) S
[/Rect [289.820801 -513.950073 409.727051 -501.850037] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc4422)] Cd /ANN pdfmark
148.2 -524.4 M
gsave
newpath
148.2 -525.5 M
67.7929688 0 RL
stroke
grestore
(Security Layer ) S
gsave
newpath
216 -525.5 M
34.2070312 0 RL
stroke
grestore
(\(SASL\)) S
[/Rect [147.17627 -527.15 251.17627 -515.050049] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc4422)] Cd /ANN pdfmark
(,\234 RFC\2404422, June\2402006 ) S
(\() S
gsave
newpath
362.9 -525.5 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [361.914551 -527.15 385.293457 -515.050049] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc4422.txt)] Cd /ANN pdfmark
(\).) S
8 -546.2 M
([RFC5246]) S
[/View [/XYZ -4 842 null] /Dest /56 /DEST pdfmark
148.2 -546.2 M
(Dierks, T. and E. Rescorla, ) S
(\233) S
gsave
newpath
274.9 -547.3 M
160.019531 0 RL
stroke
grestore
(The Transport Layer Security \(TLS\)) S
[/Rect [273.922363 -548.900085 435.941895 -536.80011] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc5246)] Cd /ANN pdfmark
148.2 -559.4 M
gsave
newpath
148.2 -560.5 M
77.5820312 0 RL
stroke
grestore
(Protocol Version ) S
gsave
newpath
225.8 -560.5 M
13.75 0 RL
stroke
grestore
(1.2) S
[/Rect [147.17627 -562.100098 240.508301 -550.000122] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc5246)] Cd /ANN pdfmark
(,\234 RFC\2405246, August\2402008 ) S
(\() S
gsave
newpath
363.9 -560.5 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [362.859863 -562.100098 386.23877 -550.000122] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc5246.txt)] Cd /ANN pdfmark
(\).) S
8 -581.1 M
([RFC5849]) S
[/View [/XYZ -4 842 null] /Dest /57 /DEST pdfmark
148.2 -581.1 M
(Hammer-Lahav, E., ) S
(\233) S
gsave
newpath
243.1 -582.2 M
69.0390625 0 RL
stroke
grestore
(The OAuth 1.0 ) S
gsave
newpath
312.2 -582.2 M
37.265625 0 RL
stroke
grestore
(Protocol) S
[/Rect [242.148926 -583.850098 350.453613 -571.750122] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc5849)] Cd /ANN pdfmark
(,\234 RFC\2405849,) S
148.2 -594.3 M
(April\2402010 ) S
(\() S
gsave
newpath
202.5 -595.4 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [201.547363 -597.05011 224.92627 -584.950134] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc5849.txt)] Cd /ANN pdfmark
(\).) S
8 -616.1 M
([RFC5929]) S
[/View [/XYZ -4 842 null] /Dest /58 /DEST pdfmark
148.2 -616.1 M
(Altman, J., Williams, N., and L. Zhu, ) S
(\233) S
gsave
newpath
320.2 -617.2 M
97.4492188 0 RL
stroke
grestore
(Channel Bindings for ) S
[/Rect [319.152832 -618.80011 418.602051 -606.700134] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc5929.txt)] Cd /ANN pdfmark
148.2 -629.3 M
gsave
newpath
148.2 -630.4 M
19.5507812 0 RL
stroke
grestore
(TLS) S
[/Rect [147.17627 -632.000122 168.727051 -619.900146] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://tools.ietf.org/html/rfc5929)] Cd /ANN pdfmark
(,\234 RFC\2405929, July\2402010 ) S
(\() S
gsave
newpath
278.6 -630.4 M
21.3789062 0 RL
stroke
grestore
(TXT) S
[/Rect [277.637207 -632.000122 301.016113 -619.900146] /Subtype /Link /Border [0 0 0] /Action [/Subtype /URI /URI (http://www.rfc-editor.org/rfc/rfc5929.txt)] Cd /ANN pdfmark
(\).) S
0 -638 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 8 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%Page: 9 9
%%PageResources: font Times-Roman Times-Bold Helvetica
%%BeginPageSetup
/pgsave save D
71 757 translate
%%EndPageSetup
0 0 M
0.6 setlinewidth
0 0 M
[/View [/XYZ -4 757.0 null] /Dest /59 /DEST pdfmark
0 -18 M
%%IncludeResource: font Times-Bold
15 2 Nf
(Authors') S
[/View [/XYZ -4 757.0 null] /Dest /87 /DEST pdfmark
( ) S
(Addresses) S
0 -43.3 M
%%IncludeResource: font Times-Roman
11 0 Nf
(\240) S
46.2 -43.3 M
(Yutaka ) S
(Oiwa) S
0 -57 M
(\240) S
46.2 -57 M
(National Institute of Advanced Industrial Science and ) S
(Technology) S
0 -70.8 M
(\240) S
46.2 -70.8 M
(Research Center for Information ) S
(Security) S
0 -84.5 M
(\240) S
46.2 -84.5 M
(AIST Tsukuba Headquarters' ) S
(building) S
0 -98.3 M
(\240) S
46.2 -98.3 M
(Tsukuba Central ) S
(2) S
0 -112 M
(\240) S
46.2 -112 M
(1-1-1 ) S
(Umezono) S
0 -125.8 M
(\240) S
46.2 -125.8 M
(Tsukuba-shi, ) S
(Ibaraki) S
0 -139.6 M
(\240) S
46.2 -139.6 M
(JP) S
12.9 -153.3 M
(Phone:\240) S
46.2 -153.3 M
(+81 ) S
(29-861-5284) S
14.1 -167.1 M
(Email:\240) S
46.2 -167.1 M
gsave
newpath
46.2 -168.2 M
150.320312 0 RL
stroke
grestore
(mutual-auth-contact@m.aist.go.jp) S
0 -180.8 M
(\240) S
46.2 -180.8 M
(\240) S
0 -194.6 M
(\240) S
46.2 -194.6 M
(Tatsuya ) S
(Hayashi) S
0 -208.3 M
(\240) S
46.2 -208.3 M
(Lepidum Co. ) S
(Ltd.) S
0 -222.1 M
(\240) S
46.2 -222.1 M
(#602, Village Sasazuka ) S
(3) S
0 -235.8 M
(\240) S
46.2 -235.8 M
(1-30-3 ) S
(Sasazuka) S
0 -249.6 M
(\240) S
46.2 -249.6 M
(Shibuya-ku, ) S
(Tokyo) S
0 -263.3 M
(\240) S
46.2 -263.3 M
(JP) S
0 -277.1 M
(\240) S
46.2 -277.1 M
(\240) S
0 -290.8 M
(\240) S
46.2 -290.8 M
(Boku ) S
(Kihara) S
0 -304.6 M
(\240) S
46.2 -304.6 M
(Lepidum Co. ) S
(Ltd.) S
0 -318.3 M
gsave
0 setgray
219.9 -712 M
%%IncludeResource: font Helvetica
8 8 Nf
(- 9 -) S
0 setgray
0 -8 M
grestore
pgsave restore N
%%EOF

PAFTECH AB 2003-20262026-04-24 17:49:38