[LINK] ArsT: ' ... US rolls out Internet identity plan'

Roger Clarke Roger.Clarke at xamax.com.au
Sat Apr 16 11:20:42 AEST 2011


[The US has given up on a national eGovernment id for citizens, but 
hopes that NIST can broker a federated id scheme run by the private 
sector.

[Australia is persisting with its attempt to deliver single-login to 
government services, at
https://login.australia.gov.au/LoginServices/source/Login.jsp?finalURL=http%3A%2F%2Flogin.australia.gwy%2FLoginServices%2FAuthenticate.do 
https://login.australia.gov.au/TacService/enrolTaci.htm?_flowId=enrolment-flow&_flowExecutionKey=e1s1

[There's no FAQ, but there's a brief explanation here:
http://australia.gov.au/about/whats-new

[Comments interspersed and at the end.]


With passwords "broken," US rolls out Internet identity plan
By Nate Anderson
Last updated about 8 hours ago - dopes - 15 April 2011
ArsTechnica
http://arstechnica.com/tech-policy/news/2011/04/with-passwords-broken-us-rolls-out-internet-identity-plan.ars

At a US Chamber of Commerce event today, the federal government 
rolled out its vision for robust online credentials that it hopes 
will replace the current mess of multiple accounts and insecure 
passwords. The choice of the Chamber of Commerce wasn't an accident, 
either; the government wants to squelch any talk of a "national 
Internet ID card" and emphasize that the plan will be both voluntary 
and led by the private sector.

The National Strategy for Trusted Identities in Cyberspace (NSTIC) 
hasn't changed much since the draft plan unveiled in January, though 
the final version (PDF) contains an even stronger emphasis on NSTIC 
being a private-sector, voluntary undertaking. This point was 
stressed so many times in a background briefing call for reporters 
this morning that it's clear the government fears a potential 
backlash against its efforts.

The final version of NSTIC tries to address two problems: the fact 
that passwords are "broken" and the fact that it's almost impossible 
to prove your identity on the Internet. The future belongs to smart 
cards, cell phones, USB security sticks, and similar solutions-when 
the Department of Defense moved away from passwords to a smartcard 
security solution, it saw network intrusions drop by 46 percent.

["Passwords are 'broken'", and gave rise to n intrusions per 100,000 accounts.

[Hackers have had less time to devise assaults on the new approaches, 
but already the intrusion rate is n/2 per 100,000 accounts.]

[Ergo the new approach is *also* badly 'broken'.]

The goal of the system is simple: create the baseline tools needed 
for online commerce to thrive. Indeed, the first sentence of the 
NSTIC final report reads: "A secure cyberspace is critical to our 
prosperity." The government hopes to enable whole new classes of 
online activity, such as dealing with health records or signing 
mortgages, that today few people would trust to the Internet. It also 
hopes to slow rampant ID theft, which it claims costs more than $600 
per incident to fix.

['ID theft' in US parlance actually means 'ID fraud' (or 'ID crime'). 
Advocates get criticised for hyperbole, but government and business 
seem to be allowed to sustain this misleading use of language.]

The government hopes to facilitate this new ecosystem, one that will 
be interoperable and run largely by private parties. Under the plan, 
Internet users could go to any private credential provider of their 
choice and verify their identity, then use that credential to log in 
to any site which supports the identity ecosystem. Have one 
credential from Google and another from Verisign, but want to log in 
to Facebook? Either credential should work.

Users can choose how many credentials they acquire, what information 
is contained in each, and how much information is revealed at login.

For example, student Jane Smith could get a digital credential from 
her cell phone provider and another one from her university and use 
either of them to log-in to her bank, her e-mail, her social 
networking site, and so on, all without having to remember dozens of 
passwords. If she uses one of these credentials to log into her Web 
email, she could use only her pseudonym, "Jane573." If however she 
chose to use the credential to log-in to her bank she could prove 
that she is truly Jane Smith. People and institutions could have more 
trust online because all participating service providers will have 
agreed to consistent standards for identification, authentication, 
security, and privacy.

The program will be coordinated by the National Institute of 
Standards and Technology (NIST), the part of the Commerce Department 
that has set national standards since 1901. NIST will coordinate the 
new strategy but insists it will be led by the private sector, that 
privacy is paramount, and that consumer advocates and privacy groups 
will be part of the process.

NIST hopes to arrive at privacy standards that will give Internet 
users confidence in using such credentials, to clarify the liability 
that credentials providers will face should someone still manage to 
steal your identity, and to issue a "trustmark" that accredits 
participating credential providers and websites.

Public meetings on NSTIC begin in June, and NIST hopes to be funding 
pilot projects by 2012. Still, ordinary Internet users won't be able 
to use the system for three to five years.


[Federated ID has been around for donkey's years.  My analysis from 7 
years ago was here:

Clarke R. (2004)  'Identity Management:  The Technologies, Their 
Business Value, Their Problems, Their Prospects'  Xamax Consultancy 
Pty Ltd, March 2004, 70 pp., from 
http://www.xamax.com.au/EC/IdMngt.html (esp. pp. 13-17)

After selling a modest number of copies, it's about time I released 
an open version, now available (1.3MB of PDF) at
http://www.xamax.com.au/EC/IdMngt-Public.pdf
http://www.rogerclarke.com/EC/IdMngt-Public.pdf

Its conclusions remain valid, and I doubt if NIST has got the message yet:

"The current crop of products and proposals are shown to be seriously 
inadequate.
One problem is a deficiency in the appreciation by designers of what the
assertions are that organisations need to authenticate in order to manage their
business risks.  Most schemes also fail to distinguish between 
identities and the
entities that underlie them, and overlook the existence, and likely continued
existence, of anonymity and pseudonymity.
...
"The schemes that are attracting the most press are conceptually 
inadequate, and
have not achieved a balance among their many objectives.  The report identifies
ways in which identity management schemes could reconcile the conflicting
interests.  It draws attention to research projects that may enable 
the next round
of schemes to be more likely to succeed than the current proposals."


-- 
Roger Clarke                                 http://www.rogerclarke.com/
			            
Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA
                    Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au                http://www.xamax.com.au/

Visiting Professor in the Cyberspace Law & Policy Centre      Uni of NSW
Visiting Professor in Computer Science    Australian National University



More information about the Link mailing list