copyright statement copyright robert j. brentrup and sean w. smith 2002. this work is the...

32
Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Upload: whitney-simpson

Post on 18-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Copyright Statement

• Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 2: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Developing and Deploying a PKI for Academia

Robert Brentrup

Sean Smith

Educause Conference October 2002

Page 3: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Dartmouth PKI Lab• R&D to make PKI a practical component of a

campus network• Multi-campus collaboration sponsored by the

Mellon Foundation• Dual objectives:

– Deploy existing PKI technology to improve network applications

– Improve the current state of the art• identify security issues in current products

• develop solutions to the problems.

Page 4: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

• Many other institutions are working on PKI.

• Internet2 has been very active in promoting this work establishing PKI Labs at Dartmouth and the University of Wisconsin. – I2 HEPKI-TAG, -PAG, -S/MIME

• Educause Net@EDU and CREN

• 1st Annual PKI Research Workshop– Sean Smith: program chair, proceedings editor

Community

Page 5: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

What is PKI?• PKI is Public Key Infrastructure

• A pair of keys is used, one to encrypt, the other to decrypt

Page 6: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Public and Private Keys

• You publish the "public" key, You keep the "private" key a secret

• You don't need to exchange a secret "key" by some other channel

• Invented in 1976 by Whit Diffie and Martin Hellman

• Commercialized by RSA Security

Page 7: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Basic applications of PKI

• Authentication and Authorization of Web users and servers– It is the basis for the SSL protocol used to secure

web connections

• Secure e-mail (signed and encrypted)

• Electronic document signatures

• Network link data protection (VPN, wireless)

• Signing Program Code

Page 8: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Why would I use PKI?

• Effective security has become crucial to extend electronic communication and business processes beyond the current state of the art.

• Legislative mandates are requiring it.

Page 9: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

What is X.509?

• A standard for the format of a public key certificate and related standards for how certificates are used.

• Current PKI product offerings inter-operate through this standard

• There are many other possible formulations, eg SDSI/SPKI

• Is X.509 THE solution?

Page 10: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

What is a certificate?

• Signed data structure that binds some information to a public key

• The information is usually a personal identity or a server name

• Think of it as an electronic ID card

Page 11: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Basic Public Key Operations• Encryption

– encrypt with public key of recipient

– only the recipient can decrypt with their private key

Page 12: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

• Signature – Compute message digest, encrypt with your private key

– Reader decrypts with your public key

– Re-compute the digest and compare the results, Match?

Basic Public Key Operations

Page 13: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

What is a certificate authority?

• An organization that creates and publishes certificates

• Verifies the information in the certificate

• Protects general security of the system and it's records

• Allows you to check certificates and decide to use them in business transactions

Page 14: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

What is a CA certificate?• A certificate authority generates a key pair

used to sign the certificates it issues

• For multiple institutions to collaborate:– Hierachical structure is setup among their CAs– Bridge Certification Authorities

• "peer to peer" approach

Page 15: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Hierarchy

CREN

Dartmouth Princeton MIT UAB

DST

UC

VeriSign

UWis NIH

???

Page 16: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

or Bridge?

CREN

Dartmouth Princeton MIT UAB

DST

HEBCA

UC

VeriSign

UWis

FBCA

NIH

Page 17: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Deployment Results• PKI applications in production use

• develop more and scale up campus wide

• Electronically signed Payroll Applications

• Replace Web authentication• Banner SIS, other Oracle apps, same mechanism

• Library resource access control, local and JSTOR

• Electronic document signatures• NIH pilot, replace paper forms

Page 18: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Deployment issues?• Learning curve for planning a PKI is steep• PKI is as much about Policy as Technology• Commercial products have shortcomings:

– Many are expensive– Some are hard to install and operate– Many compatibility issues and user constraints

• Many applications only interesting if available to the entire "community"

• Many products have serious security issues

Page 19: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

External Results• Extensive compatibility testing results published

on websites• Implemented multiple PKI system products,

notes available• Publishing example code derived from new

applications• Notes on PKI libraries and tool kits• Tools and additions to existing applications

– eg. browser mods and S/MIME plugins

Page 20: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Next Steps• Applications

– Workflow, signatures– Secure mail for Student health Services -HIPAA– PKI enhanced List-servers– Wireless network data protection– Databases and E-commerce

• Improvements in Infrastructure– Key storage hardening

• Tokens, smartcards, coprocessors

– Enrollment improvements– Trusted Third Party Services

Page 21: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Research Agenda

• Expression of Trust– PKI system that can be managed and issued by different authorities, but

from which many parties can draw judgments.

• Trust Attributes for Machines– machines throughout network to actually have the right certs...

• Using Trust at Clients– client tools that can reliably recognize and react to these properties…

• Using Trust in Applications– applications to obtain, react, and respond to this information

• Foundations of Trust– techniques to establish a basis for trust in computation in hostile places.

Page 22: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

End User Studies• Understanding Incentives and Concerns

• User Concerns, Understanding, Behavior

• Vulnerability Analysis• How easily can users be conned into revealing passphrases?

• Usability of trusted server techniques

• PKI Interface• Dynamics, Usefulness, Reliability

• Perception of Privacy

• Institutional Evolution for Security/Trust

Page 23: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Research Results• User interface of most web applications is insecure• Web browser display can be replaced

• SSL lock icon and the server certificate window!

• Prevent subverted window content• Mozilla mods, synchronized reference window

• SSL is an "Armored pipe to a cardboard box"• Secure Apache web server (WebAlps)

• Documents with active content are not secure• Signed e-mails that display subverted content• Methods for stealing private key

Page 24: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

• Trusted Paths for Browsers• USENIX Security 2002

• Prototyping an Armored Data Vault: Rights Management on Big Brother's Computer.

• Privacy-Enhancing Technology 2002

• Digital Signature and Electronic Documents: A Cautionary Tale

• Sixth IFIP Conference on Communications and Multimedia Security

Papers

Page 25: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

• Virtual Hierarchies: An Architecture for Building and Maintaining Efficient and Resilient Trust Chains

• NORDSEC 2002

• Web Spoofing Revisited: SSL and Beyond• Outbound Authentication for Programmable

Secure Coprocessors• 7th European Symposium on Research in Computer

Science

Papers

Page 26: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Demo -Digital Signatures

• People frequently take actions on paper documents for personal or official purposes : e.g., signing forms, expense sheets and contracts.

• PKI allows approval and verification of bits.• Can PKI produce and verify electronic documents

so that they work like virtual paper docs?

Page 27: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Virtual Paper?

• Paper documents and electronic documents are different.

• Do the same bits always generate the same virtual piece of paper?

If not then PKI on electronic docs does not work!

Page 28: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

When viewed on 09/16/02

Page 29: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

When viewed after 09/16/02

Page 30: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Same bits different content

Page 31: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Demos

• JSTOR Access

– Current: http://www.jstor.org/">http://www.jstor.org/

– PKI: https://logon.jstor.org/logon/remote/">https://logon.jstor.org/logon/remote/

• Web Browser Spoofing (IE or Netscape on Win and Linux)

– http://www.cs.dartmouth.edu/~pkilab/demos/spoofing/• Misleading URLs

• E-mail site illusion

• Counter Measures

– http://www.cs.dartmouth.edu/~pkilab/demos/countermeasures/

Page 32: Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for

Contacts

• http://www.dartmouth.edu/~pkilab/

• Mail: [email protected]

[email protected]