UMA telecon 2024-11-21

UMA telecon 2024-11-21

Date and Time

Agenda

  • Plan for vulnerability report + publication

  •  

  •  

Attendees

  • NOTE: As of Sept 15, 2022, quorum is 3 of 5. (Peter, Sal, Alec, Eve, Steve)

  • Voting:

    •  

  • Non-voting participants:

  • Regrets:

    •  

Quorum: No

 

Meeting Minutes

Topics

 

Scenario, there is a UMA-based health data-sharing ecosystem

  1. A provider(RqP) receives a (malicious/phising) email link to access a patients record (e.g. patient summary resource)

  2. The provider opens the link in their EMR client

  3. The link points to a malicious RS, which provides a ticket it has from an interaction with the target RS to access all available patients

  4. The EMR client follows the WWW-authenticate header to the target AS, the Provider(RqP) is able to authenticate and grant access to the target resource

  5. The EMR client negotiates a token and presents it to the malicious RS

  6. The malicious RS can access the target RS with the token

Conditions:

  • the client trusts ANY RS

  • the issued token was a Bearer token

 

Mitigations:

  • informational

    • the client is informed of the RS aud when it receives the token

    • the provider is informed of the scope of access when authenticating (requires claims gathering)

  • technical: the client must authenticate to the RS at Resource access time

 

Plan for vulnerability report + publication

 

template format

  • description of the vulnerability (general)

  • frame up “real” scenarios to show motivation → help us test mitigations

  • how do implementors know if they’re impacted?

  • what are their mitigation option?

 

Next call, confirm template for reports and start outlining section

 

AOB