Project Status: Computer Security June 26, 2006. Agenda Background, Technical Going Forward.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
MyProxy: A Multi-Purpose Grid Authentication Service
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Grid Computing Basics From the perspective of security or An Introduction to Certificates.
Deploying and Managing Active Directory Certificate Services
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Password? CLASP Project Update C5 Meeting, 16 June 2000 Denise Heagerty, IT/IS.
Lecture 23 Internet Authentication Applications
Chapter 9 Deploying IIS and Active Directory Certificate Services
Password?. Project CLASP: Common Login and Access rights across Services Plan
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Password?. Project CLASP: Common Login and Access rights across Services Plan
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Certificates, Browsers & You: What is all this certificate crud? Frank J. Nagy God of Kerberos And Associates...
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Certificates, Browsers & You: What is all this certificate crud? Frank J. Nagy God of Kerberos And Associates...
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
KX509: Leveraging Kerberos to Obtain Digital Certificates for Web Client Authentication University of Michigan Kevin Coffman Bill Doster.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Password? CLASP Project FOCUS Meeting, 12 October 2000 Denise Heagerty, IT/IS.
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Fermilab CA Infrastructure EDG CA Managers Mtg June 13, 2003.
Digital Signatures and Digital Certificates Monil Adhikari.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Company LOGO January 24 th, 2007 PC Manager Meeting.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Key management issues in PGP
Setting and Upload Products
Cryptography and Network Security
Authentication Applications
National Trust Platform
Presentation transcript:

Project Status: Computer Security June 26, 2006

Agenda Background, Technical Going Forward

Project Definition Lay groundwork (technical, philisophical, support, training) for adoption of PKI by developers and users. End result is a policy statement to enumerate a range of mechanisms for applications to authorize user activities, one of which is PKI

Project Scope Collaborative effort between CST and CSS to ensure technical support for policy Requires support for applications written by developers across the lab and at other institutions

Background Kerberos has provided good central supported service for telnet, ftp, etc Unfortunately many applications are unlikely to be Kerberized Without Kerberos these applications have resulted in a multiplicity of passwords, still need some single-signon mechanism for applications We need to choose a mechanism to establish identity for these other apps

Definitions Public Key Encryption Asymmetric encryption: public key and private key PKI Public Key Infrastructure A system of public key encryption using digital certificates from Certificate Authorities that verify and authenticate the validity of each party involved in an electronic transaction. Digital Certificate Includes your name, serial number, expiration dates, your public key, digital signature of the CA

Definitions CA: Certificate Authority verify the identity of entities and issue digital certificates attesting to that identity. Registry A lookup service to find other users public keys X.509 is the international standard for Digital Certificates (not all conform)

Definitions KCA: Kerberos Certificate Authority Leverages Kerberos authentication infrastructure Short-lived (current ticket lifetime up to 7 days) Requires Fermi Kerberos principal kx509 is a client program that talks to the KCA to obtain a short-lived X.509 certificate

Definitions DOE Grid Certificate Issued from DOE Grids (doegrids.org) Long lived (1 year) Initial credentialing and revocation is responsibility of VO CRL Certificate Revocation List Allows permanent or temporary disabling of a certificate’s serial number

Motivation to use Certificates Single sign on for applications Eliminate application passwords in clear Attacks are moving more toward applications rather than OS Central revocation of authorization Allows centralized auditing of user accounts Next slide indicates scope of problem with clear passwords

Inbound passwords in clear text

Requirements Must provide support for two broad categories: FNAL ID Effort, Time, Labor reporting Restricted Documents Self service employee web pages FNAL plus unregistered collaborators Database for experiment Web pages for experiment Documents for experiment

Requirements Access should match the level of protection required by the data: No authorization necessary for some read only applications Cert required for protected reads and all writes when used by collaborators KCA provides increased confidence in identity (directly tied to kerberos principal)

Requirements Must support systems with OS baseline CA is a restricted central service

Authorization Mechanisms Group account Individual accounts over SSL DOE Grid Certs KCA Certs

Least Desirable Group account Weak identity verification Read only, can’t publish information Data that would otherwise be public to prevent spidering and indexing. Because all required termination of accounts must be managed by CNAS: Users who lose their affiliation must be assumed to continue reading Password will be vulnerable: sniffing, from application server or phishing It can be shared by people. Individual accounts over SSL Weak identity verification Read or publish information Because all required termination of accounts must be managed by CNAS: Users who lose their affiliation must be assumed to continue reading or publishing data Password will be vulnerable: from application server, phishing Sensitivity of information requires greater protection than group password.

Recommendation DOE Grid Certs Strong identity verification Read or publish information User privileges can be revoked No password vulnerability Can support non FNAL useage Organization based authorization Long lifetime KCA Certs Strong identity verification Read or publish information User privileges can be revoked No password vulnerability Restricts useage to FNAL only Requires frequent renewal (but application doesn’t need to check CRL)

Strategy Move to single sign on by adopting certificates for all applications in CD Establish policy: adopt lab wide use of certificates based on CD experience

Is FNAL Certifiable? Project underway to improve tools in windows environment to get certificates into browsers PKI training course Developed in conjunction with lab’s professional development and training group Specifications and contract written Outside contractor hired to develop and teach course Outline finished Prototype course Aug 3 “Tickler” August 22 at Computer Security Awareness Day First production course October 2

Issues Users find current utilities/tools klunky CSI hired contractor to improve tools Browsers react differently to certificate usage Training class addresses specific issues Offsite access: Home Use/Kiosk/Universities Which Certificate? Commercial vs. DOE Grid vs. Local

Utilities/Tools Worklist Apache/IIS Server Redirection site to instruct/help users with non- existing or invalid certificates in browser cache Fixes to SSL code to allow redirection of connections with expired certificate Service to allow any posted data to be saved so users don’t lose work

Utilities/Tools Worklist Client- Windows Configure desktops/laptops to trust DOEGrid etc. signed server certificates Domain Users: KX509 certificate transparently created during user logon Screensaver refresh of certificate Non-Domain Users: (fnal/offsite) Windows ‘friendly’ Get-cert utility

Utilities/Tools Worklist Client- SLF Configure desktops/laptops to trust DOEGrid etc. signed server certificates Kerberos Users: PAM to get kx509 certificate into browser caches Screensaver refresh of certificate Non-Kerberos Users: (offsite) Linux ‘friendly’ get-cert utility/get-cert RPM

Utilities/Tools Worklist Client- Macintosh Configure desktops/laptops to trust DOEGrid etc. signed server certificates Kerberos Users: PAM to get kx509 certificate into browser caches Screensaver refresh of certificate Non-Kerberos Users: (offsite) Macintosh ‘friendly’ get-cert utility/get-cert rpm

Utilities/Tools Worklist Client- Kiosk Client depends on expected level of access SSL protected applications already available Must assume network and keyboard are sniffed May be able to combine existing technology Java Kerberos applet Cryptocard/smartcard

Documentation Worklist Design Note Based on today’s feedback Implementation Guides Detailed How-Tos for Server and Client; Admin and User Troubleshooting Guides/FAQs Redirection/help website Support list with key people subscribed

Training Worklist Training classes: Server/Application. How to write web applications to use certificates User Education. Using Certificates, understanding what happens when it doesn’t work!

Effort Web Server Tools/Utilities 1 FTE 6 months Client Tools/Utilities 1 FTE 3 months per OS client 1 FTE 12 months for kiosk work Documentation 1 FTE 3 months Training 1 FTE.5 day per class (basic user – already working with consultant) 1 FTE 3 day class (securing web applications)

Work Recommendations Design Note Define strategy and implementation in detail! Review with stakeholders Use consultant(s) with related experience for client work (OS) Signed server certificate work can be done in- house Develop/Teach securing application class based on CD experiences using contractor.

Long Range Goals Move to single sign-on Elimination of username/password combinations Deployment of X.509 certificate support

Questions?