Dos and Don'ts of Client Authentication on the Web

Total Page:16

File Type:pdf, Size:1020Kb

Dos and Don'ts of Client Authentication on the Web Dos and Don'ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster fubob, sit, kendras, feamster ¡ @mit.edu MIT Laboratory for Computer Science http://cookies.lcs.mit.edu/ Abstract Of the twenty-seven sites we investigated, we weakened the client authentication of two systems, gained unautho- Client authentication has been a continuous source of rized access on eight, and extracted the secret key used problems on the Web. Although many well-studied tech- to mint authenticators from one. niques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in This is perhaps surprising given the existing client non-enterprise environments such as store fronts. These authentication mechanisms within HTTP [16] and weaknesses often result from careless use of authentica- SSL/TLS [11], two well-studied mechanisms for provid- tors within Web cookies. Of the twenty-seven sites we ing authentication secure against a range of adversaries. investigated, we weakened the client authentication on However, there are many reasons that these mechanisms two systems, gained unauthorized access on eight, and are not suitable for use on the Web at large. Lack of extracted the secret key used to mint authenticators from a central infrastructure such as a public-key infrastruc- one. ture or a uniform Kerberos [40] contributes to the pro- liferation of weak schemes. We also found that many We provide a description of the limitations, require- Web sites would design their own authentication mecha- ments, and security models specific to Web client authen- nism to provide a better user experience. Unfortunately, tication. This includes the introduction of the interrog- designers and implementers often do not have a back- ative adversary, a surprisingly powerful adversary that ground in security and, as a result, do not have a good can adaptively query a Web site. understanding of the tools at their disposal. Because of this lack of control over user interfaces and unavailability We propose a set of hints for designing a secure client of a client authentication infrastructure, Web sites con- authentication scheme. Using these hints, we present the tinue to reinvent weak home-brew client authentication design and analysis of a simple authentication scheme schemes. secure against forgeries by the interrogative adversary. In conjunction with SSL, our scheme is secure against Our goal is to provide designers and implementers forgeries by the active adversary. with a clear framework within which to think about and build secure Web client authentication systems. A key contribution of this paper is to realize that the Web is par- 1 Introduction ticularly vulnerable to adaptive chosen message attacks. We call an adversary capable of performing these attacks Client authentication is a common requirement for an interrogative adversary. It turns out that for most sys- modern Web sites as more and more personalized and tems, every user is potentially an interrogative adversary. access-controlled services move online. Unfortunately, Despite having no special access to the network (in com- many sites use authentication schemes that are extremely parison to the eavesdropping and active adversary), an in- weak and vulnerable to attack. These problems are most terrogative adversary is able to significantly compromise often due to careless use of authenticators stored on the systems by adaptively querying a Web server. We believe client. We observed this in an informal survey of authen- that, at a minimum, Web client authentication systems tication mechanisms used by various popular Web sites. should defend against this adversary. However, with this minimum security, sites may continue to be vulnerable to MIT Technical Report 818. This research was supported by a USENIX scholars fellowship. A shorter version of this document was originally attacks such as eavesdropping, server impersonation, and published in the Proceedings of the 10th USENIX Security Sympo- stream tampering. Currently, the best defense against sium, Washington, D.C., August, 2001. such attacks is to use SSL with some form of client au- thentication; see Rescorla [36] for more information on 1 the security and proper uses of SSL. The client generally speaks to the server using the Hy- pertext Transfer Protocol (HTTP [14]). This may be spo- In Section 2, we describe the limitations, require- ken over any transport mechanism but is typically either ments, and security models to consider in designing Web TCP or SSL. Since HTTP is a stateless, sessionless pro- client authentication. Using these descriptions, we cod- tocol, the client must provide an authentication token or ify the principles underlying the strengths and weak- authenticator with each request. nesses of existing systems as a set of hints in Section 3. As an example, we design a simple and flexible authenti- Computation allows the browser to transform inputs cation scheme in Section 4. We implemented this scheme before sending them to the server. This computation may and analyzed its security and performance; we present be in a strictly defined manner, such as in HTTP Digest these findings in Sections 5 and 6. Section 7 compares authentication [16] and SSL, or it may be much more the work in this paper to prior and related work. We con- flexible. Flexible computation is available via Javascript, clude with a summary of our results in Section 8. The Java, Tcl, ActiveX, Flash, and Shockwave. Depending appendix describes several existing client authentications on the application, these technologies could perhaps as- schemes in detail. sist in the authentication process. However, most of these technologies have high startup overhead and mediocre 2 Security models and definitions performance. As a result, users may choose to disable these technologies. Also, these extensions may not be Clients want to ensure that only authorized people can available on all operating systems and architectures. Any access and modify personal information that they share standard authentication scheme should be as portable and with Web sites. Similarly, Web sites want to ensure that lightweight as possible, and therefore require few or no only authorized users have access to the services and browser extensions. Thus for today’s use, any authenti- content it provides. Client authentication addresses the cation scheme should avoid using client computation for needs of both parties. deployability reasons. If absolutely necessary, Javascript and Java are commonly supported. Client authentication involves proving the identity of a client (or user) to a server on the Web. We will use Client state allows the client’s browser to store and the term “authentication” to refer to this problem. Server reuse authenticators. However, storage space may be authentication, the task of authenticating the server to the very limited. In the most limited case, the browser client, is also important but is not the focus this paper. can only store passwords associated with realms (as in HTTP Basic authentication [16]). A more flexible form In this section, we present an overview of the security of storage which is commonly available in browsers is models and definitions relevant in client authentication. the cookie [24, 31]. Cookies allow a server store a value We begin by describing the practical limitations of a Web on a client. In subsequent HTTP requests, the client authentication system. This is followed by a discussion automatically includes the cookie value. A number of of common requirements. We then characterize types of attributes can control how long cookies are kept and to breaks and adversaries. which servers they are sent. In particular, the server may request that the client discard the cookie immediately 2.1 Practical limitations or keep it until a specified time. The server may also Web authentication is primarily a practical problem of request that the client only return the cookie to certain deployability, user acceptability, and performance. hosts, domains, ports, URLs, or only over secure trans- ports. Cookies are the most widely deployed mechanism Deployability for maintaining client state. Web authentication protocols differ from traditional User acceptability authentication protocols in part because of the limited in- terface offered by the Web. The goal is to develop an au- Web sites must also consider user acceptability. Be- thentication system by using the protocols and technolo- cause sites want to attract many users, the client authenti- gies commonly available in today’s Web browsers and cation must be as non-confrontational as possible. Users servers. Authentication schemes for the Internet at large will be discouraged by schemes requiring work such as cannot rely on technology not widely deployed. For ex- installing a plug-in or clicking away dialog boxes. ample, Internet kiosks today do not have smart card read- Performance ers. Similarly, home consumers currently have little in- centive to purchase smart card readers or other hardware Stronger security protocols generally cost more in per- token systems. formance. Service providers naturally want to respond 2 to as many requests as possible. Cryptographic solutions authentication is further blurred by the practice of current will usually degrade server performance. Authentication browsers of displaying a single padlock whose meaning should not needlessly consume valuable server resources is ambiguous. such as memory and clock cycles. With current
Recommended publications
  • Glossary for Language in the City
    Glossary for Language in the City accent 1) Strictly speaking this refers to the pronunciation of a dialect, i.e. it is a reference to the collection of phonetic features which allow a speaker to be identified regionally or socially. It is frequently used to indicate that a given speaker does not speak the standard form of a language. The term is used in German to refer to grammatical features as well. 2) The stress placed on a syllable of a word or the type of stress used by a language (pressure or pitch). (German: Akzent, Aussprache) accommodation A phenomenon in the use of language whereby speakers tend to adopt features of their interlocutors, perhaps in an effort to make them feel at ease or to be socially accepted by them. If this happens on a broad front in a speech community then it can lead to language change. (German: Akkommodation) address system The set of rules which specify what forms are appropriate when speaking to others in a certain social context; usually the rules are for pronominal usage. In most European languages (except English and Irish) there is a twofold system with one set of pronouns used for familiar address (du, dich, dein, etc.) and one for formal address (Sie, Ihr, etc.). The range of each set differs among groups in any given society and among different countries but in general the former correlates with first names and the second with surnames though cross combinations are possible. See T-form and V-form. (German: Anredesystem) argot Linguistic features, mostly vocabulary, used by a certain group in society, usually secretive.
    [Show full text]
  • SRI—SHIBBOLETH OR CANARD (SOCIALLY RESPONSIBLE INVESTING, THAT IS) Joel C
    SRI—SHIBBOLETH OR CANARD (SOCIALLY RESPONSIBLE INVESTING, THAT IS) Joel C. Dobris* Editors’ Synopsis: This Article takes a look at the new and increasingly popular phenomenon of socially responsible investing. A topic that has garnered a lot of attention recently, the Article focuses on the intersection of socially responsible investing and trust law. The author’s research includes an eclectic array of interesting and socially relevant sources that culminates in a stimulating analysis of how this new philosophy of investing is likely to affect traditional notions of fiduciary duties in trust investing. I. “THE BUSINESS OF BUSINESS IS BUSINESS.” .........756 II. WHY DO PEOPLE DO SRI? .........................757 III. WHY NOW? .......................................757 IV. LOOKING AHEAD ..................................771 V. SOME THINGS NEVER CHANGE .....................780 VI. IF I WERE AN SRI GUY ............................782 VII. CONCLUSION ......................................797 *Professor of Law, School of Law, University of California, Davis. No one is responsible for the thoughts expressed here (especially the people with whom I have been privileged to meet and the entities with which I have been associated), except for me. I got help I didn’t deserve from Jack Ayer, Evelyn Brody, Carolyn Clark, Holly Doremus, Chris Elmendorf, Katherine Florey, Jim Garland, John Hunt, Nancy Jacobs, Paul Jacobs, Tom Joo, David Levine, Al Lin, Rob Sitkoff, and Dick Wydick. I got good research assistance from Nicholas Godlove, James Hazlehurst, and James Yi and financial support from Deans Rex Perschbacher and Kevin Johnson of the University of California, Davis School of Law. Some of these ideas emerged in my preparations for a mini-conference sponsored by the National Center on Philanthropy and the Law, New York University School of Law and The Investment Fund for Foundations.
    [Show full text]
  • ED311449.Pdf
    DOCUMENT RESUME ED 311 449 CS 212 093 AUTHOR Baron, Dennis TITLE Declining Grammar--and Other Essays on the English Vocabulary. INSTITUTION National Council of Teachers of English, Urbana, Ill. REPORT NO ISBN-0-8141-1073-8 PUB DATE 89 NOTE :)31p. AVAILABLE FROM National Council of Teachers of English, 1111 Kenyon Rd., Urbana, IL 61801 (Stock No. 10738-3020; $9.95 member, $12.95 nonmember). PUB TYPE Books (010) -- Viewpoints (120) EDRS PRICE MF01/PC10 Plus Postage. DESCRIPTORS *English; Gr&mmar; Higher Education; *Language Attitudes; *Language Usage; *Lexicology; Linguistics; *Semantics; *Vocabulary IDENTIFIERS Words ABSTRACT This book contains 25 essays about English words, and how they are defined, valued, and discussed. The book is divided into four sections. The first section, "Language Lore," examines some of the myths and misconceptions that affect attitudes toward language--and towards English in particular. The second section, "Language Usage," examines some specific questions of meaning and usage. Section 3, "Language Trends," examines some controversial r trends in English vocabulary, and some developments too new to have received comment before. The fourth section, "Language Politics," treats several aspects of linguistic politics, from special attempts to deal with the ethnic, religious, or sex-specific elements of vocabulary to the broader issues of language both as a reflection of the public consciousness and the U.S. Constitution and as a refuge for the most private forms of expression. (MS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** "PERMISSION TO REPRODUCE THIS MATERIAL HAS BEEN GRANTED BY J. Maxwell TO THE EDUCATIONAL RESOURCES INFORMATION CENTER (ERIC)." U S.
    [Show full text]
  • Perception of Geographically Conditioned Linguistic Variation
    Perception of geographically conditioned linguistic variation Charlotte Gooskens, Renée van Bezooijen & John Nerbonne 1. Introduction In the course of time, linguistic variation in the Netherlands and the Dutch speaking part of Belgium has been investigated from many different perspectives. In our view, the various methodological approaches can be divided into two fundamentally different types. In the first type, data about the linguistic characteristics of dialects are gathered by means of questionnaires collecting information about what people actually say. The linguistic products, recorded in written or auditory form, are subsequently subjected to (simple or more complex) data analysis techniques. The final aim is to draw a linguistically based map showing the distribution and boundaries of dialects and dialect areas. Some of the more well- known examples of these ‘objective’ techniques include the construction and tracing of isoglosses and isogloss bundles (e.g. Weijnen 1941), feature frequency counts and correlations (Hoppenbrouwers and Hoppenbrouwers 2001) and the calculation of Levenshtein distances between matched segment strings (e.g. Heeringa 2004). These traditional- dialectological and computational techniques have been discussed elsewhere (see Heeringa and Nerbonne, this volume) in this book and will not be gone into here. In the second type of research, the basis of the investigation is not formed by linguistic elements (written or spoken dialect words, sentences or texts) but by the higher-ordered, integrated linguistic awareness of dialect speakers. The global perceptions which dialect speakers hold of the degree of similarity or difference between their own dialect and neighboring dialects is used as input to draw dialect maps. Here, the metalinguistic knowledge and views of dialect speakers form the point of departure to classify dialects rather than their linguistic competence.
    [Show full text]
  • Language and Society
    Language and society 1.1 Methods in sociolinguistics 1.2 The development of sociolinguistics 1.2.1 Sociolinguistic data 1.2.2 The linguistic variable 1.2.3 The question of co-variation 1.2.4 Indicators and markers 1.2.5 Register and hypercorrection 1.3 Sociolinguistics and language change 1.3.1 Social networks 1.3.2 The Belfast investigations 1.4 Types of speech communities 1.4.1 Where do standards come from? 1.4.2 Artificial languages 1.5 Language and gender 1.5.1 Growing into a gender role 1.5.2 Gender roles in adulthood 1.5.3 Gender and power 1.5.4 Language used by women 1.5.5 Gender and standard 1.5.6 Gender-neutral language 1.5.7 Desexification of language 1.5.8 Gender and language change 1.6 Language and culture 1.6.1 The ethnography of communication 1.6.2 Colour terms 1.6.3 Kinship terms 1.6.4 Counting systems 1 Language and society Language is both a system of communication between individuals and a social phenomenon. The area of language and society – sociolinguistics – is intended to show how our use of language is governed by such factors as class, gender, race, etc. A subsection of this area is anthropological linguistics which is concerned with form and use of language in different cultures and to what extent the development of language has been influenced by cultural environment. Raymond Hickey Language and Society Page 2 of 37 The study of language and society – sociolinguistics – can be dated to about the middle of the twentieth century.
    [Show full text]
  • Shibboleth* What Can You Do As a Teacher to Address Your Student’S Various Varieties of Language?
    Shibboleth* What can you do as a teacher to address your student’s various varieties of language? “Languages are bundles of dialects.” – John McWhorter “Judging from the past we may safely infer that not one living species will transmit its unaltered likeness to a distant futurity.” – Charles Darwin The idea is not to negate or make students feel that their variety of speaking is sub-standard or on un-equal footing with Standard American English. Rather, teachers should encourage students to love (and be proud of) the language they speak at home and with their friends, but also recognize the importances of being “language ambidextrous.” This way, the students are empowered with two languages. Just as ambidextrous students can write with either the left of right hand, bilingual students can speak in two different languages depending on the situation. They can adapt their language to any social situation they find themselves in. Although there is no such thing as a “Standard” language – this is the label that we give to the language spoken by the media and in most business correspondence. It is important to recognize that we agree on one common language in order to communicate effectively via government and commerce. However, this does not mean that other varieties of speaking are sub-standard, they are just different. Some students may be sensitive to the word “dialect” as it can carry a negative connotation. In fact, from a scientific, linguistic point of view, there is no such thing as “dialect.” When discussing AAVE, you may want to substitute “dialect” with “variety.” When teachers try to constantly correct student’s variety of speaking by telling them their way of speaking is “wrong”, this disempowers the child and injures the student’s self-confidence.
    [Show full text]
  • Netherlandic and Frisian
    NETHERLANDIC AND FRISIAN WILLIAM Z. SHETTER When the editors of the present volume of Current Trends undertook the task of distributing the languages of Western Europe into appropriate chapters, they followed customary usage in the English-speaking world in calling one of them 'Dutch, Flemish, and Frisian'. My request on accepting this assignment that Dutch and Flemish be subsumed under the less well-known label 'Netherlandic' perhaps calls for clarification of necessary terminology. The separation into two distinct if closely related languages implied by 'Dutch and Flemish' is supported neither by linguistic reality nor by accepted usage in The Netherlands and Belgium. The native term Nederlands refers to the ideally identical standard language of The Netherlands and the northern half of Belgium. Although a distinction is commonly made between Nederlands and Vlaams when referring to geographical, folkloristic, or literary distinctions between North and South, for most speakers it makes no better sense to talk about two languages than it does for English speakers to say — tired jokes notwithstanding — that 'English' is spoken over there but 'American' over here. Nederlands is in fact a broader term than 'English' in referring to all areas, e.g. art, in which the two countries have a common cultural heritage. The fact that the official native name of the language happens to be the term also used for what pertains specifically to the North is due to a series of historical circumstances, but it does give rise to some sociological complications which will be taken up again below. The difficulty in matching Nederlands with 'Dutch' is simply that the English word does not normally refer to Belgium at all.
    [Show full text]
  • Dutch. a Linguistic History of Holland and Belgium
    Dutch. A linguistic history of Holland and Belgium Bruce Donaldson bron Bruce Donaldson, Dutch. A linguistic history of Holland and Belgium. Uitgeverij Martinus Nijhoff, Leiden 1983 Zie voor verantwoording: http://www.dbnl.org/tekst/dona001dutc02_01/colofon.php © 2013 dbnl / Bruce Donaldson II To my mother Bruce Donaldson, Dutch. A linguistic history of Holland and Belgium VII Preface There has long been a need for a book in English about the Dutch language that presents important, interesting information in a form accessible even to those who know no Dutch and have no immediate intention of learning it. The need for such a book became all the more obvious to me, when, once employed in a position that entailed the dissemination of Dutch language and culture in an Anglo-Saxon society, I was continually amazed by the ignorance that prevails with regard to the Dutch language, even among colleagues involved in the teaching of other European languages. How often does one hear that Dutch is a dialect of German, or that Flemish and Dutch are closely related (but presumably separate) languages? To my knowledge there has never been a book in English that sets out to clarify such matters and to present other relevant issues to the general and studying public.1. Holland's contributions to European and world history, to art, to shipbuilding, hydraulic engineering, bulb growing and cheese manufacture for example, are all aspects of Dutch culture which have attracted the interest of other nations, and consequently there are numerous books in English and other languages on these subjects. But the language of the people that achieved so much in all those fields has been almost completely neglected by other nations, and to a degree even by the Dutch themselves who have long been admired for their polyglot talents but whose lack of interest in their own language seems never to have disturbed them.
    [Show full text]
  • Shibboleths and Genocide in Danticat’S the Farming of Bones, Wiesel’S Night
    “LIFE HUNG ON A WORD”: SHIBBOLETHS AND GENOCIDE IN DANTICAT’S THE FARMING OF BONES, WIESEL’S NIGHT, AND COURTEMANCHE’S A SUNDAY AT THE POOL IN KIGALI by Olivia Harvey December 2019 Director of Thesis: Richard Taylor, Ph.D. Major Department: English This thesis explores how shibboleths, or cultural passwords, function as markers to signify identity and group membership status among coexisting ethnic groups. Specifically, shibboleths are critical for identity detection in genocidal conflicts where a particular ethnic group is targeted for mass extermination by another group. As shibboleths demarcate identity by analyzing performative characteristics that are difficult to imitate, such as linguistic patterns, ethnic backgrounds, or facial features, they are overwhelmingly successful at detecting outsiders by members of an assailant group who naturally exhibit those characteristics. Examples of shibboleths being implemented in pass/fail identity tests are illustrated in the works of Edwidge Danticat’s The Farming of Bones, Elie Wiesel’s Night, and Gil Courtemanche’s A Sunday at the Pool in Kigali. These literary works explore examples of linguistic shibboleths in the Parsley Massacre in the Dominican Republic in 1937, legally classified shibboleths in the Holocaust in Europe from 1941 to 1945, and phenotypical shibboleths in the Rwandan Genocide in 1994, respectively. Considering the role of shibboleths in genocides through a literary lens humanizes the countless number of victims from these conflicts and creates a self-reflexive appreciation for the underlying factors the allow conflict to culminate in genocidal violence. “LIFE HUNG ON A WORD”: SHIBBOLETHS AND GENOCIDE IN DANTICAT’S THE FARMING OF BONES, WIESEL’S NIGHT, AND COURTEMANCHE’S A SUNDAY AT THE POOL IN KIGALI A Thesis Presented To the Faculty of the Department of English East Carolina University In Partial Fulfillment of the Requirements for the Degree Master of Arts in English by Olivia Harvey December 2019 © 2019, Olivia L.C.
    [Show full text]
  • Lexical Variation and Sheng Speakers' Identity in Nairobi
    Nordic Journal of African Studies 15(4): 443–472 (2006) Bazes and Their Shibboleths: Lexical Variation and Sheng Speakers’ Identity in Nairobi PETER GITHINJI Ohio University, United States ABSTRACT This paper examines Sheng’s shibboleths that mark speakers as members of different social categories. Attention is paid to how these shibboleths are used in the bazes — local hang out joints, where the bulk of members’ interaction takes place in Sheng. The concept ‘baze’ carries the dual sense of members of these social groups, and the social spaces in which different images of ‘we’ vs. ‘them’ are constructed and negotiated. The relevance of lexical semantic differences is regarded as a consequence of deliberate strategies in which members of different bazes manipulate the meaning of words to draw categorical boundaries. Following this scenario, it can be concluded that with different bazes having their own shibboleths, Nairobi is not a melting pot where different languages converge to produce a single language. The traditional ethnic categories are displaced by the emergence of social categories which are as divisive as ethnic groups. Keywords: Sheng, variation, social reality, identity 1. INTRODUCTION The majority of established variationists’ work dealing with identity, e.g., (Fischer 1958) study of [ŋ/n] variation in a New England village, and Labov’s (1972) famous study of glide centralization in Martha’s Vineyard tend to focus on phonological variation. Fisher for instance, showed that the velar [-ŋ] nasal was the preferred variant identified with ‘model’ boys while the coronal [n] nasal was identified with ‘typical’ boys. On his part, Labov showed that the respondents who used the raised onsets of [au] and [ai] were island oriented regardless of their other sociolinguistic identities.
    [Show full text]
  • Treacherous Shibboleths: Language As an Indicator of Origin
    Faculteit der Letteren 1 Treacherous Shibboleths: Language as an indicator of origin Inaugurele rede in verkorte vorm uitgesproken op 7 juni 2011 bij de aanvaarding van het ambt van hoogleraar in het vakgebied van de Engelse taalkunde door Monika S. Schmid Rijksuniversiteit Groningen ~~~~ oratiereeks Faculteit der Letteren ISBN 978-90-367-5036-3 Faculteit der Letteren 3 Mijnheer de rector magnificus, mevrouw de decaan, Zeer geachte aanwezigen, The word shibboleth has been borrowed into English from the Hebrew language. I freely admit that my knowledge of Hebrew, both ancient and modern, is somewhat patchy (in other words, nonexistent) and so I had originally intended to start this lec- ture with the definition I found on Wikipedia. However, I then received the rector’s guidelines for inaugural lectures, and these said that I should confine myself to scien- tific matters. As anyone who teaches students these days knows, one of our most dif- ficult tasks is to get them to understand the fact that Wikipedia is not a source for scientific reference. I therefore consulted the one source that is considered entirely beyond reproach by linguists worldwide: the native speaker. In other words, I took the ‘phone a friend’ option – or rather, the ‘email a friend’ one that is less widely known to television audiences worldwide - namely my colleague Sara Ferman of Tel Aviv University, and asked her “What does shibboleth mean?” Her response is in Figure 1. Fig. 1: Shibboleth 4 Faculteit der Letteren So, the Hebrew word shibboleth designates “the part of a plant that bears grains”, like an ear of corn in English or an Ähre in German (which, by the way, was also what Wikipedia said).
    [Show full text]
  • From Saints to Shibboleths: Image, Structure, and Identity in Maya Religious Syncretism
    From Saints to Shibboleths: Image, Structure, and Identity in Maya Religious Syncretism John M. Watanabe American Ethnologist, Vol. 17, No. 1. (Feb., 1990), pp. 131-150. Stable URL: http://links.jstor.org/sici?sici=0094-0496%28199002%2917%3A1%3C131%3AFSTSIS%3E2.0.CO%3B2-%23 American Ethnologist is currently published by American Anthropological Association. Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at http://www.jstor.org/journals/anthro.html. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. The JSTOR Archive is a trusted digital repository providing for long-term preservation and access to leading academic journals and scholarly literature from around the world. The Archive is supported by libraries, scholarly societies, publishers, and foundations. It is an initiative of JSTOR, a not-for-profit organization with a mission to help the scholarly community take advantage of advances in technology. For more information regarding JSTOR, please contact [email protected]. http://www.jstor.org Fri Oct 26 18:23:12 2007 from saints to shibboleths: image, structure, and identity in Maya religious syncretism JOHN M.
    [Show full text]