18
The FIDO Approach to Privacy Hannes Tschofenig, ARM Limited 1

The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

The FIDO Approach to Privacy

Hannes Tschofenig, ARM Limited1

Page 2: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

Privacy by Design History

2

• AnnCavoukian,theformerInformationandPrivacyCommissionerofOntario/Canada,coinedtheterm“PrivacybyDesign”backinthelate90’s.

• Ideawastotakeprivacyintoaccountalreadyearlyinthedesignprocess.

• Cavoukianwentastepfurtheranddeveloped7principles.

• Ittookyearstoinvestigatetheideafurtherandtobecomefamiliarwithprivacyasanengineeringconcept.

Page 3: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

Privacy Principles

3https://fidoalliance.org/wp-content/uploads/2014/12/FIDO_Alliance_Whitepaper_Privacy_Principles.pdf

Page 4: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

4

No 3rd Party in the Protocol

No Secrets generated on the Server side

Biometric Data (if used) Never Leaves Device

No Link-ability Between Services and Accounts

De-register at any time

No release of information without consent

Page 5: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

FIDO & Privacy

AUTHENTICATOR

5

USER VERIFICATION FIDO AUTHENTICATION

Page 6: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

Prepare0

STEP 1

FIDO Authenticator

FIDO Server

App WebApp

6

FIDO REGISTRATION

Page 7: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

FIDO REGISTRATION

Prepare0

STEP 2

FIDO Authenticator

FIDO Server

App WebApp

7

TLS Channel Establishment

1

No 3rd Party in the Protocol

Page 8: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

FIDO REGISTRATION

Prepare0

STEP 2FIDO Authenticator

FIDO Server

App WebApp

8

Verify User & Generate New Key Pair(Specific to Online Service Providers)

Legacy Auth.+ Initiate Reg.

Reg. Request+ Policy

1

2

3

No release of information without consent

Page 9: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

FIDO REGISTRATION

Prepare0

STEP 3

FIDO Authenticator

FIDO Server

App WebApp

9

3

Legacy Auth.+ Initiate Reg.

Reg. Request[Policy]

1

2

Reg. Response4

Verify User & Generate New Key Pair(Specific to Online Service Providers)

No Secrets generated on the Server side

Page 10: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

10No Link-ability Between Accounts and Services

Website A

Website B

FIDO REGISTRATION(On Multiple Sites)

Page 11: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

FIDO REGISTRATION

Prepare0

STEP 4FIDO

AuthenticatorFIDO

ServerApp Web

App

11

3

Verify User & Generate New Key Pair(Specific to Online Service Providers)

Success 5

Legacy Auth.+ Initiate Reg.

Reg. Request+ Policy

1

2

Reg. Response4

Biometric Data (if used) Never Leaves Device

Page 12: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

PERSONAL DATA

12

Application-specific Data

Depending on the service(e.g., shipping address, credit card details)

User Verification Data

Biometric data (e.g., fingerprint or voice template,

heart-rate variation data)

FIDO-related Data

Identifiers used by the FIDO and protocols

(e.g., public key, key handle)

Data Minimization,

Purpose Limitation

and protection

against unauthorized

access

Outside the scope of

FIDO

Page 13: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

THE BUILDING BLOCKS

BROWSER/APP

FIDO USER DEVICE RELYING PARTY

WEB SERVER

FIDO AUTHENTICATOR

FIDO SERVERFIDO CLIENT

ASM

TLS Server Key

CryptographicAuthentication

Public Keys DB

AuthenticationPrivate Keys

Attestation Private Keys

Authenticator Metadata

& Attestation Trust Store

FIDO UPDATE

13

Page 14: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

ATTESTATION

14

… …SE

Howisthekeyprotected(TPM,SE,TEE,…)?Whatusergestureis

used?

14

CanIbetrackedusingtheattestationmethod?

AUTHENTICATOR

USER VERIFICATION FIDO AUTHENTICATION

Page 15: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

ATTESTATION & METADATA

FIDO ServerFIDO Authenticator

Metadata

Signed Attestation

Object

Obtain meta-data from

Metadata Service or Other Sources

Understand Authenticator Characteristic

15

Page 16: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

ATTESTATION & METADATA

16

• BasicAttestationAsetofauthenticators(ofthesamemodel)shareoneattestationcertificate.Injectedatmanufacturingtime

• PrivacyCAEachauthenticatorhasaunique“endorsement”key.AuthenticatorgeneratesanattestationkeyandrequestsanattestationcertificatefromaPrivacyCA(usingtheendorsementkey)atrun-time.

• DirectAnonymousAttestation(DAA)EachauthenticatorreceivesonesetofDAAattestationcredentials.Privatekeyisuniquetoauthenticatorbutunlinkable.

Page 17: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

Mapping to Regulatory Requirements

17

• FIDOprivacyprinciplesguidedtheworkinsidetheFIDOAllianceontechnicalspecifications.

• Interoperabilitytestsandcertificationprogramsverifyimplementations.

• Regulationimpactsthosewhodeployservices.• Intentionally,theFIDOprinciplesaremoredetailed

versionsofalreadyexistingregulatoryrequirements.• Upcomingwhitepaperexplainstheregulatoryrequirements

toFIDO-offeredfunctionality.• OffersmappingbasedontheEuropeanDataProtection

Directive(95/46/EC)andtheIdentityEcosystemSteeringGroup(IDESG)privacyprinciples.

Page 18: The FIDO Approach to Privacy · 2019-11-16 · Mapping to Regulatory Requirements 17 • FIDO privacy principles guided the work inside the FIDO Alliance on technical specifications

Summary

18

• WiththeworkinFIDOwehavebeentryingtoexercisetheprivacybydesign philosophy.

• Whitepaperexplainstheprivacyprinciples.Thoseprincipleshavebeentakenintoaccountduringtheworkonthetechnicalspecifications.

• Uniqueprivacycharacteristics:• UserverificationhappenslocallyattheAuthenticator• Nocentrallycreatedormanagedcredentials.• Reducedtrackingcapability.