PKI Interoperability

32
Raúl Guerra Jiménez FIST Conference September/Madrid 2005 PKI Interoperability

description

 

Transcript of PKI Interoperability

Page 1: PKI Interoperability

Raúl Guerra Jiménez

FIST Conference September/Madrid 2005

PKI Interoperability

Page 2: PKI Interoperability

2

About the Author

Raúl Guerra JiménezCISSP, CISATechnical consultant

Grupo SIA1989www.siainternational.com

Page 3: PKI Interoperability

3

Index

CryptographyPublic Key Infrastructure (PKI)ApplicationsIntegratione-DNI

Page 4: PKI Interoperability

4

Security Requirements

Confidentiality.Ensure confidentiality of data.

Integrity.The original data has not been changed.

Authentication.Proof of identity.

Non Repudiation.Prevent denial of transaction. The originator cannot deny it.

Page 5: PKI Interoperability

5

ENCRYPTIONENCRYPTION

CONFIDENTIALITY NON-REPUDIATIONAUTHENTICATIONINTEGRITY

DIGITAL SIGNATUREDIGITAL SIGNATURE

PUBLIC KEY ENCRIPTIONPUBLIC KEY ENCRIPTION

DIGITAL CERTIFICATEDIGITAL CERTIFICATE

PUBLIC KEY INFRASTRUCTURE (PKI)PUBLIC KEY INFRASTRUCTURE (PKI)

CERTIFICATION AUTHORITYCERTIFICATION AUTHORITY

HASHHASH

Paradigm Solution

Page 6: PKI Interoperability

PKIs are not CAs…

• Issue certificates• Revoke certificate

CA:

• Issue certificates• Revoke certificates• Key management

– Creation– store– Update– backup/recovery

• Cross-certification• Certificate Repository (Directory)• Application software• RA (Registration Authority)• Client• etc

PKI:

Page 7: PKI Interoperability

7

Third-party trust

CertificationCertification AuthorityAuthorityTrustTrustTrustTrust

RaRaúúll RaquelRaquel““thirdthird--party party trusttrust””

Page 8: PKI Interoperability

8

Cross-Certification

CrossCross--CertificationCertification

AC AC ““AA”” AC AC ““BB””

CertificactionCertificaction AuthorityAuthority

AliciaAlicia JuanJuan

CertificationCertification AuthorityAuthority

ElenaElena PedroPedrothirdthird--party party trusttrust

Page 9: PKI Interoperability

ClassicalClassical trusttrust--modelmodel has no has no endend rootroot

CA1 (CA1 (““RootRoot””))

CA2CA2 CA3CA3

CA5CA5CA4CA4 CA6CA6 CA7CA7

U1U1 U2U2 U3U3 U4U4 U5U5 U6U6 U7U7 U8U8 U9U9

Subordinate CA

Page 10: PKI Interoperability

10

The certificate

Version: 3Serial Number: 8391037Signature: RSAIssuer: o=SIA, c=ESValidity: 1/5/97 1:02 - 7/5/98 1:02Subject: cn=Raúl Guerra, o=SIA, c=ESSubject Public Key Info:----------------------------------------------------SubjectAltName: [email protected] DP:cn=CRL2, o=SIA, c=ES

TheThe CA CA signssigns thethe certificatecertificate

Extensions

Page 11: PKI Interoperability

11

Certificate Revocation List

DN: cn=CRL2, o=SIA, c=ESStart: 1/5/97 1:02End: 1/6/97 1:02Revoked:191231 4/24/96 10:20 Cessation of Operation123832 4/25/ 16:20 Key Compromise923756 4/25 16:30 Affiliation ChangeCA DN: o=SIA, c=ES

CA’s digital signature on the CRL

Unique name of CRL

Period of validity

Serial numberofRevokedcertificatesand reason

Page 12: PKI Interoperability

12

Keys in the client

Key generation

Issue certificates

Key usage

o

Certificate validation

Expired

Key update

Page 13: PKI Interoperability

13

PKI

Application

GSS-API, CAPI, ...

Application

GSS-API, CAPI, ...

PKI-enabledApplication

PKI-enabledApplication

E-mail

PKI clientPKI client

Applicationwithout PKI-

Enabled module

Applicationwithout PKI-

Enabled module

Web

ERP’s, SSO, ...ERP’s, SSO, ...

PKI-Enablemodule

PKI-Enablemodule

Legacyapp.

Legacyapp.

ToolkitsPKI

ToolkitsPKI

.epf

ID in disk

PKCS#11 (MemoryCardMemoryCardss, , SmartCardsSmartCards, , PC/SC)PC/SC)

BAPI (Biometric

API)

Biometricdevices

Biometricdevices

LDAP PKIX-CMP

Directorio PKI

Page 14: PKI Interoperability

14

Architecture: Example

Directory

Fire

wal

l

Client CA

RA

PKIX-CMP

LDAP

Page 15: PKI Interoperability

15

Application

Internete-CommerceRemote AccessEDIVPN (Virtual Private Network)ERPsSecurity in IntranetSecure Single-Sign On

Page 16: PKI Interoperability

16

SecureSecure ee--mailmail••Novel Novel GroupWiseGroupWise••LotusLotus NotesNotes••NetscapeNetscape MessengerMessenger••Microsoft OutlookMicrosoft Outlook••cc:Mailcc:Mail

SecureSecure Web Web CommunicationsCommunications••NetscapeNetscape/Microsoft /Microsoft BrowsersBrowsers••NetscapeNetscape/Microsoft /Microsoft ServersServers••muchos mas ...muchos mas ...

Internet Application

Page 17: PKI Interoperability

17

FireWallsFireWalls& & RoutersRouters

Remote Access Remote Access AuthenticationAuthenticationFirewallsFirewalls

CheckPointCheckPoint ((FirewallFirewall--1)1)Raptor Raptor SystemsSystems ((EagleEagle))MilkyWayMilkyWay ((BlackholeBlackhole))TIS (TIS (GauntletGauntlet))ANS (ANS (InterlockInterlock))SecureSecure ComputingComputing((SidewinderSidewinder))BorderBorder NetworkNetwork((BorderwareBorderware))IBM (IBM (NetSPNetSP))HarrisHarris SystemsSystems' ' ((CyberGuardCyberGuard))SagusSagus SecuritySecurity (Defensor)(Defensor)

RoutersRouters••CiscoCisco••AscendAscend••Bay Bay NetworksNetworks••BBNBBN

Remote Access Remote Access AuthenticationAuthentication••SecuritySecurity DynamicsDynamics••LeeMahLeeMah DataCommDataComm••CryptoCardCryptoCard••SecureSecure ComputingComputing ((SafeWordSafeWord))••Digital Digital PathwaysPathways ((DefendorDefendor))••ApplicationApplication specificspecificimplementationsimplementations

Remote Remote useruser

Secure Remote Acess

Page 18: PKI Interoperability

18

Virtual Virtual PrivatePrivate NetworksNetworks••FirewallFirewall VendorsVendors (Ej. FW(Ej. FW--1)1)••Link Link EncryptorsEncryptors••SecuritySecurity DynamicsDynamics SecurVPNSecurVPN••EntrustEntrust/Access/Access••KyberPassKyberPass

ExtranetExtranet

EndEnd UsersUsers

IntranetIntranet

VPNs

Page 19: PKI Interoperability

19

NetworkNetwork SecuritySecurity••EncryptEncrypt thethe traffictraffic••SecureSecure accessaccess toto resourcesresources

NetworkNetwork SecuritySecurity••McAfeeMcAfee NetworkNetwork SecuritySecurity SuiteSuite••NetLockNetLock••CygnusCygnus ((KerbNetKerbNet))

ApplicationApplication SpecificSpecific SecuritySecurity••DatabasesDatabases ((OracleOracle……))••HeritageHeritage applicationsapplications ((MainframeMainframe...)...)••GroupWareGroupWare (Notes(Notes……))

ApplicationApplication SpecificSpecificSecuritySecurity••RACF, ACF2, RACF, ACF2, TopSecretTopSecret••ApplicationApplication levellevel passwordspasswords••ProprietaryProprietary data data securitysecurity (Notes)(Notes)••OtherOther ((viavia RSA RSA toolkitstoolkits))

Security in the Intranet

Page 20: PKI Interoperability

••EmailEmail••FilesFiles••ClientClient/Server /Server appsapps••EE--formsforms••BrowsersBrowsersY mY máás...s...

File File SecuritySecurity••NortonNorton YourYour EyesEyes OnlyOnly••PGP PGP forfor Personal Personal PrivacyPrivacy••QuerisoftQuerisoft SecureFILESecureFILE••McAfeeMcAfee VirusScanVirusScan SecuritySecurity SuiteSuite••RSA RSA SecurPCSecurPC••AT&T AT&T SecretAgentSecretAgent

••EntrustEntrust ICEICE••EntrustEntrust EntelligenceEntelligence

Desktop security

Page 21: PKI Interoperability

21

ERPERP••SAP/R3SAP/R3••PeopleSoftPeopleSoft••OracleOracle••......

ClientClient toto serverserver securitysecurity

Web Web servicesservices

ClientClient/Server /Server servicesservices

BusinessBusiness--toto--BusinessBusiness

Enterprise Resource Planning (ERPs)

Page 22: PKI Interoperability

SpecificSpecific systemssystemsespecifica especifica ••DatabasesDatabases ((OracleOracle, ...), ...)••MainframeMainframe••GroupWareGroupWare

NetworkNetwork SecuritySecurity••TrafficTraffic cypheringcyphering••SecureSecure AccessAccess

DesktopDesktop SecuritySecurity••EmailEmail••FilesFiles••ClientClient/Server /Server appsapps••EE--formsforms••BrowsersBrowsersAndAnd more...more...

Internet Internet UsersUsers••SecureSecure WebWeb••SecureSecure MailMail••EE--CommerceCommerce (SET)(SET)

FirewallsFirewalls & & RoutersRoutersRemote Remote AuthenticationAuthenticationVPNVPN’’ss

Web Server Web Server SecuritySecurity••EE--CommerceCommerce••Internet Internet BankingBanking••SecureSecure Web Web SitesSites ss

PKIPKIERPERP••SAP/R3SAP/R3••PeopleSoftPeopleSoft••OracleOracle••......

PKI: Homogeneous solution

Page 23: PKI Interoperability

23

PKIs Success (I)

Integration with the software applications.Practical solutions--> Bye, bye SET.Users recognition.Trust. Do you trust CA?What or who used my private key? Is my PC safe? Security issues in the OS or the browser (crypto Software) Is your private key in a smart card?

Page 24: PKI Interoperability

24

PKIs Success (II)

Are the certification practices secure(CPS)? The CA must guarantee that the signed data (certificate) is correct.There is a risk if you trust the user. Do you verify the certificate from the web server in a SSL connection?To learn more: “Ten risks of PKIs: What you´re not being told about Public key Infrastructure” by Bruce Schneier and Carl Ellison

Page 25: PKI Interoperability

25

e-DNI

Smart CardPolycarbonate card with high securityfrom FNMT

CertificatesIdentity (authentication) and signature (non-repudiation) certificatesNo encryption certificate

PKI Providers: Entrust, SafelayerHierarchy of CAs (root and Subordinate CAs)

Page 26: PKI Interoperability

26

e-DNI. Questions (I)

Are other certificates necessary?

Certificate status validation methods.

Cross-Certification with commercial CAs?

Page 27: PKI Interoperability

27

e-DNI. Questions (II)

Other certificates? YES, becauseNo encryption certificate. So, to support business protection, where there is encrypted data, a decryption is necessary(private) key backed up---> Encryption certificatePhysical identity. What about legal entities?Use of certificate with other information. For example, medical data (medical smartacard)Use in private sector: home-banking, corporate Enterprise smartcard, etc

Page 28: PKI Interoperability

28

e-DNI. Questions (III)

Certificate status validation methods

The system should ensure that the verification certificate is valid (and not on CRL)If an entity would like technical interoperability with e-DNI system, it is necessary to know the certificate status.

Page 29: PKI Interoperability

29

e-DNI. Questions (IV)

Certificate status validation methods

Different validation entitiesPublic: relations of citizens with the Administration ---> free??Private sector: Bank, insurance, etc. Money, money...$$??

Cost of the validation: free, by price (and how much?)

Page 30: PKI Interoperability

30

e-DNI. Questions (V)

Cross-Certification with other CAs? NO, because

The same as the traditional national DNI.(ID Card)Issued by DGP (Ministry of Interior). It is a legal document in SpainIf you just accept it will happen. Do you give state and private organization sectors the same level of trust?

Page 31: PKI Interoperability

31

Attribution. You must give the original author credit.

For any reuse or distribution, you must make the license terms of this workclear to others.

Any of these conditions can be waived if you get permission from the author.

Your fair use and other rights are in no way affected by the above.

This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.

Creative CommonsAttribution-NoDerivs 2.0

You are free:

•to copy, distribute, display, and perform this work

•to make commercial use of this work

Under the following conditions:

No Derivative Works. You may not alter, transform, or build upon this work.

Page 32: PKI Interoperability

Raúl GuerraMadrid, September 2005

FIST Conference

www.fistconference.org

@