WORK IN PROGRESS SUBJECT TO CHANGE
Endpoint Protection
The method by which secure endpoints are protected.
The planned method of authenticating HTTP requests from the Safe Places web app is to use a JSON Web Token (JWT).
The rationale behind the decision is due to the token’s ability to retain potentially sensitive information (JWT claims) in transit while maintaining its data integrity via key-signing.
Structure
Header
{ "alg": "HS256", "typ": "JWT" }
Payload
{ "sub": "<username>", "role": "<user_role">, "context": "<hashed_cookie_context">, "iat": "<issue_date">, "exp": "<expiration_date"> }
Token Attainment
The method by which the token will be securely obtained by the Safe Places web app.
TO BE DETERMINED
Scope
The Safe Places backend will not be handling the management of the user pool.
I.E. there will be no
/login
endpoint that accepts ausername
andpassword
and performs a local database lookup.
Token attainment will largely depend on the health authority. They may implement their own system for issuing JSON Web Token that we will have to adapt to.
They may also control a separate user pool that the backend has to perform API calls on. This would mean issuing tokens would be within the Safe Places scope.
Potential Vulnerabilities
Token Sidejacking
An attacker may steal the token from the authorized user and use it for nefarious purposes. To mitigate this attack, we will employ token contextualization.
We generate a random string during the authentication phase and send it to the client as a cookie.
The cookie must have the flags
HttpOnly
,Secure
, andSameSite
.
We store a SHA256 hash of the random string in the token as
context
.
During token validation, we hash the context
in the token and compare it with the sent cookie. If they are different, then reject the request.
Access Code Exchange
The method by which access tokens for consent are generated and exchanged.
The planned method for generating an access code to be communicated to the member of the public (MoP) is generating a fixed-length numeric code.
Requirements
The numeric code must be generated with a cryptographically secure random number generator.
The code must be short enough and unambiguous so that it can be communicated verbally over the telephone.
The code must be long enough so that an attacker cannot brute-force the code.
This problem can be remediated by rate-limiting the access code endpoint.
Structure
Numeric digits allow us log2(10) = 3.32 bits of entropy per character. RFC 4086 recommends 29 bits of entropy for a password dependent on online authentication.
To meet that, we would need roughly 8 digits to have a decently-secured access code. Through key-stretching via simple HTTP rate-limiting, while considering accessibility, we can likely reduce the requirement to 6 digits.
An example of an access code would be as follows:
123759
Add Comment