You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a Data Pusher, I want to validate that the (FHIR) endpoint I push data to is owned by the intended receiving organization, so that I can reassure I don't leak data. When pushing data as-is (e.g. HTTP POST to an arbitrary endpoint), the endpoint isn't authenticated as being owned by the intended receiver (care organization) of the data. This can lead to a data leak in at least the following circumstances:
Data receiver's sysadmin (by accident or malicious intent):
misconfiguring FHIR endpoint (zorgbijjou.eu/fhir) in the DID document
misconfiguring DNS
misconfiguring reverse proxy (etc…)
Data receiver losing control over its domain through a hostile domain takeover by;
forgetting to renew it,
abandoning it after organizational merger/reorganization
attacker changing DNS records
Attacker spoofing DNS at the data sender
Note: this is contrary to data flows using Notified Pull, where the data receiver is authenticated through OAuth2.
There are multiple possible mitigation measures:
well-known DID configuration so you can link the domain to a DID, which you compare with the one(s) you resolved through the organization URA. Doesn't protect against domain take-over, but the Verifiable Presentation of the Domain Linkage Credential can be reasonably short to protect against those (domain retention period is typically 30 days?)
add TLS server certificate to DID document (ugly, non-standard, requires keeping certs in sync).
validating that TLS server certificate subject matches a pre-known attribute (e.g. organization name, URA, UZI, KvK-nummer, etc)
Fiddly, names might not match depending on authorative registries
Requires private PKI systems, so do not scale well
encrypting content with a public key of the receiver, so only the intended receiver can read the data
The text was updated successfully, but these errors were encountered:
This is not limited to just POST. Any server 2 server communication without a standard OAuth2 authorization code flow is subject. A GET is less dangerous since the attacker would need to know the exact return value (eg FHIR/resource) to do harm without raising an error. A POST in any syntax that is fairly human readable could be read.
As a Data Pusher, I want to validate that the (FHIR) endpoint I push data to is owned by the intended receiving organization, so that I can reassure I don't leak data. When pushing data as-is (e.g. HTTP POST to an arbitrary endpoint), the endpoint isn't authenticated as being owned by the intended receiver (care organization) of the data. This can lead to a data leak in at least the following circumstances:
Note: this is contrary to data flows using Notified Pull, where the data receiver is authenticated through OAuth2.
There are multiple possible mitigation measures:
The text was updated successfully, but these errors were encountered: