Vancouver

Future Scheduled Meetings
 * Oct 21, 2015 - Speaker Confirmed - Pending announcement
 * Nov 18, 2015 - Speaker Confirmed - Pending announcement
 * Dec 16, 2015 - Holiday Social Event
 * Jan 27, 2016 - Speaker TBD - Why not you?
 * Feb 24, 2016 - Speaker TBD - Why not you?
 * Mar 16, 2016 - OWASP Social Event during BSidesVancouver / CanSecWest
 * Apr 20, 2016 - Speaker TBD - Why not you?
 * May 25, 2016 - Speaker TBD - Why not you?
 * Jun 15, 2016 - Speaker TBD - Why not you?
 * Jul 16, 2016 - Speaker TBD - Why not you?

November 6, 2013 - Brian Campbell, Introduction to emerging JSON-based ID and Security protocols
This talk will look at JOSE and emerging JSON based ID protocols.

Brian Campbell is a Portfolio Architect for Ping Identity. He contributes to various identity and security standards including a two-year stint as co-chair of the OASIS Security Services Technical Committee (SAML) and a current focus on OAuth 2.0, JOSE and OpenID Connect.

May 28, 2013, San-Tsai Sung, OAuth-based single sign-on in Real-world Implementations
Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) websites. This web-based single sign-on (SSO) scheme is enabled by OAuth 2.0, a web resource authorization protocol that has been adopted by major service providers. The OAuth 2.0 protocol has proven secure by several formal methods, but whether it is indeed secure in practice remains an open question. We examine the implementations of three major OAuth identity providers (IdP) (Facebook, Microsoft, and Google) and 96 popular RP websites that support the use of Facebook accounts for login. Our results uncover several critical vulnerabilities that allow an attacker to gain unauthorized access to the victim user's profile and social graph, and impersonate the victim on the RP website. Closer examination reveals that these vulnerabilities are caused by a set of design decisions that trade security for implementation simplicity. To improve the security of OAuth 2.0 SSO systems in real-world settings, we suggest simple and practical improvements to the design and implementation of IdPs and RPs that can be adopted gradually by individual sites.

February 20, 2013, Rui Periera, How to own a BILLION identities ...
Unless you've been living under a rock over the last few years, you can't help but notice that a lot of hacking seems to be going on - and personal information like e-mail addresses, passwords and credit card numbers are going out the door at several large organizations (Sony anyone?). This presentation deals with a web application hacking technique called SQL Injection (SQLi), and how it was used in various recent hacks such as Epsilon, Heartland Payment Systems, Pirate Bay, eHarmony, Sony and HBGary.

We cover the how's of it: How it is done and how you can protect your organization from being the next big (or little) name on an ever-growing list. This presentation was also given at the IT4BC conference earlier this year.

2012 Meetings
You can subscribe to the OWASP Vancouver Calendar here.

May 2012
OAuth-based single sign-on in Real-world Implementations

Speaker: San-Tsai Sung

Date & Time: Monday, May 28th, 2012 @ 5:30pm

Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) websites. This web-based single sign-on (SSO) scheme is enabled by OAuth 2.0, a web resource authorization protocol that has been adopted by major service providers. The OAuth 2.0 protocol has proven secure by several formal methods, but whether it is indeed secure in practice remains an open question. We examine the implementations of three major OAuth identity providers (IdP) (Facebook, Microsoft, and Google) and 96 popular RP websites that support the use of Facebook accounts for login. Our results uncover several critical vulnerabilities that allow an attacker to gain unauthorized access to the victim user's profile and social graph, and impersonate the victim on the RP website. Closer examination reveals that these vulnerabilities are caused by a set of design decisions that trade security for implementation simplicity. To improve the security of OAuth 2.0 SSO systems in real-world settings, we suggest simple and practical improvements to the design and implementation of IdPs and RPs that can be adopted gradually by individual sites.

Registration: Registration is strongly recommended since an invite will be extended to other groups to try to improve participation in OWASP. If space runs out, preference will be given to those who have registered!

Please register at: here. (Registration details are not retained after the meeting, however a sign-up sheet will be available for those claiming CPEs)

Location: Mozilla Vancouver, Suite 209, 163 West Hastings, Vancouver, BC (Buzzer code is in the directory)

January 2012
Outsourcing Identity: Understanding Privacy and Security in Identity Services

Speaker: Yvan Boily, Web Security Engineer, Mozilla Corporation

Date & Time: Monday, January 23rd, 2012 @ 5:30pm

Social Media has taken over the online world; what Microsoft attempted with Passport has been made reality by Facebook, Twitter, Google, and other service providers. In addition to the proprietary identity services these platforms offer, several support protocols such as OpenID, This will be a one hour presentation that will contrast the security and privacy features available in major online identity protocols, and contrast these with Mozilla's BrowserID protocol.

Registration: Registration is strongly recommended since an invite will be extended to other groups to try to improve participation in OWASP. If space runs out, preference will be given to those who have registered!

Please register here. (Registration details are not retained after the meeting, however a sign-up sheet will be available for those claiming CPEs)

Location: Ping Identity, 200 - 788 Beatty St, Vancouver

'''About Ping Identity ''' Ping Identity has generously offered their downtown office space, located on the corner of Beatty and Robson, to host our chapters meetings moving forward. The office is 6000sq/ft of a mostly open floor plan, so we should be able to accommodate a large group.