Showing posts with label idtrust2009. Show all posts
Showing posts with label idtrust2009. Show all posts

Thursday, April 16, 2009

.

IDtrust panel on applications

Tuesday’s panel session titled “What Is Special About My Application?” at the IDtrust2009 symposium was interesting, and went well. Its goal was to explore key security/privacy/identity issues in some online applications, looking at the significant challenges and what might be needed in research and standardization. Five panelists gave brief introductory presentations, which we followed with some Q&A/panel discussion.

The applications were these:

  1. Health care (Walter G. Suarez, Institute for HIPAA/HIT Education and Research)
  2. Electronic voting (Andrew Regenscheid, NIST)
  3. Social networks (Barry Leiba, Internet Messaging Technology)
  4. Putting government online (Bob Sunday, Government of Canada)
  5. Cloud computing (Stephen Whitlock, Boeing)

There were some good questions about ownership of data and services in computing clouds, about privacy in social networks, and about health-care and voting issues. Not surprisingly, there are security and privacy concerns that are unique to each application, in addition to those common to all.

One interesting observation came from the session’s moderator, Tim Polk of NIST: that legal issues come up in most of these, leaving us with questions of how the law will work with the technology to protect users’ interests.
 

On Wednesday we had a good session about browser security. Anil Saldhana of Red Hat talked about recent changes in browser security features, as well as about an upcoming W3C security recommendation for browsers. David Chadwick of the University of Kent previewed a paper that will be in a conference next month, showing how well browsers conform to the X.509 specification as to how they handle validation of certificates.

The bottom line of Professor Chadwick’s tables is that most browsers warn and query the user when they encounter server certificates that look suspicious to them. Asking the user what to do is bad: most users are unqualified to answer the question, and, because what the user wants to do is visit the web site, the only answer most users will give is "accept the suspicious certificate."

The session spurred an interesting discussion, going from authentication mechanisms to social engineering by “bad guy” web sites (spoofing the padlock symbol, for instance). I said that browsers should never ask users to approve security exceptions, and that we have to set up recommendations that move us toward refusal to allow web sites to use faulty certificates. Someone noted that “extended validation certificates” (EV Certs), which now result in a green area next to the address bar, are really what all certificates should have been from the beginning, and that existing (non-EV) certs are largely useless.
 

Slides from all the panelists and from the other sessions are available on the symposium program page

Tuesday, April 14, 2009

.

Security and Social Networking

I’ll be presenting these slides at the 8th Symposium on Identity and Trust on the Internet this afternoon, as part of a panel discussion. PDF version here.