Www.digicert.com +1 (801) 877-2100 Research Advisory Improving PKI Revocation An approach to improving the reach and efficiency of revocation checking.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

+1 (801) Everything in PKI but the Kitchen Sink (in 30 minutes or less) Jeremy Rowley.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
Certificate Revocation Serge Egelman. Introduction What is revocation? Why do we need it? What is currently being done?
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
+1 (801) Ultralight OCSP Improving Revocation Checking.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
CMSC 414 Computer (and Network) Security Lecture 17 Jonathan Katz.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Josh Benaloh Brian LaMacchia Winter Side-Channel Attacks Breaking a cryptosystem is a frontal attack, but there may be easier access though a side.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate revocation list
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
Strong Cache Consistency Support for Domain Name System Xin Chen, Haining Wang, Sansi Ren and Xiaodong Zhang College of William and Mary, Williamsburg,
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
Building trust on the internet Extending Attribute Protocols for Status Management and “Other Things” Patrick Richard, Xcert International.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
HEBCA – The Operating Authority July 2005 Dartmouth PKI Summit.
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
Revocation in WebPKI Phill Hallam-Baker Comodo. Standards intersection PKIX OTHER.
+1 (801) Research Advisory SEARCH for Trust SSL/TLS Enhancement or Alternatives for Realizing CA Homogeneity (SEARCH) for Trust.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
Bakeoff Summary Jari Arkko, Ericsson Arne Dybdahl, SSH August 17 th, 2001.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
Document update - what has happened since GGF11
Cryptography and Network Security
CS 465 Certificates Last Updated: Oct 14, 2017.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
OCSP Requirements GGF13.
Presentation transcript:

+1 (801) Research Advisory Improving PKI Revocation An approach to improving the reach and efficiency of revocation checking for SSL/TLS Research by Dartmouth College and New York University Reported by: Scott Rea Sr. PKI Architect, DigiCert Inc.

Research This is a report on research and development activities being undertaken by Dartmouth College and New York University in collaboration with industry and other partners. Collaborators: –NYU: Prof. Massimiliano Pala –NYU: Mallik Arjun –Dartmouth: Alexandra Grant –Dartmouth: Prof. Sean Smith

CAs : High Value Targets Attackers are seeking to get control of credentials issued by trusted CAs via a process known as a Man-in-the- Middle (MitM) attack Targeting CAs = potential for more generous results over single websites If successful: –Allows the attacker to generate as many keys as it wants –Compromise many domains vs single domain

ICAs in the News… Comodo – Mar 2011 –Multiple RA breaches : mis-issuance of at least 9 certificates –Italian & Brazilian RAs were targeted StartCom – Jun 2011 –Breach of Server : no certificates mis-issued –DoS of services to StartCom customers result DigiNotar – Jul 2011 (didn't disclose until Aug 2011) –Major Breach : 500+ certs issued caused by poor security –CA now out of business Globalsign – Sept 2011 –Breach of Server : but no certificates were mis-issued DigiCert Malaysia (no relationship to US company) – Oct 2011 –Issues certificates with weak keys, lacking extensions to revoke them –Bad certs were re-purposed to sign malware –CA certificate was revoked KPN (another Dutch CA) – Nov 2011 –Breach of Server : no certificates mis-issued –DoS of services to KPN customers result

Inconsistent Revocation Experience post CA attacks reveals Revocation is not handled as consistently as it needs to be by web clients –Revocation information is not obtained in a timely manner –CRL validity lengths are often too long (lack of fresh data due to caching) –OCSP is not deployed as consistently as it needs to be, nor consumed by relying parties in a consistent manner –Difficult to manage root TA revocation

CAB Forum Response In light of recent attacks, the ICA industry has also mobilized to address the deficiencies. CAB Forum is focusing on the following areas to bolster ICA consistency, security, and reduce the potential for breakdowns due to the weakest link principle: –Published a minimum set of security standards for operations and identity vetting to which EVERY ICA must attest –Support implementation of available Revocation mechanisms and define more timely, available, and efficient protocols to be implemented in the future –Implement controls that enhance the system’s ability to discover and repel MitM Attacks –Working with industry audit professionals to define stronger audit controls that can be applied to demonstrate compliance with standards and best practices

CABF Revocation WG CAB Forum has instantiated an Industry Working Group to address the deficiencies in Revocation –Participants from ICAs, Browsers, Research & EDU, IETF, major Relying Parties –Monthly conference calls, 1 st Face-to-Face at NYU in April A couple of different problems to solve from different perspectives –Revocation Data Availability Problem –Access time to revocation services –High maintenance costs for high-volume environments –How to manage revocation of Trust Anchor Roots Initial Proposals –Short term → Lightweight OCSP Profile [RFC5019] + CDN friendly –Mid term → push for OCSP over DNS –Long term → CA whitelists

CABF Rev WG: Review ICAs Current Best Practices –Multiple revocation sources e.g. CRL and OCSP –Pre-computed responses where possible for OCSP –Publication every few hours / once a day –Geographically dispersed validation authorities to get revocation data as close as possible to Relying Party requestors –Use different distribution mechanisms → CDNs, Stapling Issues –Only GET (POST can not be cached) → clients still use POST! –Different encoding of the request → CDNs cache miss! –High costs for deploying OCSP servers Opportunities –OCSP as small CRLs No need for OCSP requests Need to provide OCSP responses as efficiently as possible

Short-Term Approaches Promote Best Practices in ICA Community –Particularly: Pre-computed responses Geographically dispersed validation authorities to get revocation data as close as possible to Relying Party requestors Create a number of best practices whitepapers CRL Sets for Intermediates Update for RFC5019 –Determine what if any changes might be required in RFC 5019 Lightweight OCSP –Use different distribution mechanisms → CDNs, Stapling –Multi-stapling support Address Implementation Issues –Encourage/contribute to clients moving to GET mechanism –Encourage/contribute to servers supporting OCSP Stapling by default

Mid-Term Approaches DNS can be used to distribute OCSP responses –No need for request/response protocol –Allows to lower the costs of distributing revInfo to clients Use of the DNS caching system –Possible for SSL/TLS certificates for larger sites Current Challenges –OCSP responses waste bits on the wire if cert is valid –DNS allows for single UDP packet (if resp < 512bytes) –Use of EC keys might be advisable –Definition of DNS-based URLs for OCSP distribution –Allow for fallback URLs for backward compatibility Some clients only query the first URL in AIAs

Mid-Term Approaches Lightweight Internet Revocation Tokens –Similar to Request-less OCSP –Client-known data is not included in the response –Small size ( < 200~300 bytes with EC signatures) –Compatible with different transport protocols HTTP (CDNs), DNS, Peer-to-peer Proposal for a new I-D within IETF for ALIRT –Alternative Lightweight Internet Revocation Tokens (ALIRTs)

Long-Term Approaches CA whitelisting –Need for a mechanism to select different level of trust for CAs –Possibly build a common CA accreditation body (CAB Forum WIP) Short Lived Certificates –Is there benefit and capability to implement a SLCS service for TLS? Solutions are being discussed in CAB Forum –No common vision, yet –Costs and operational barriers –… summarizing, stay tuned to this space..!

Summary Recent attacks on Internet CAs highlighted the need to address deficiencies in Revocation practices CAB Forum has instantiated an Industry Working Group to address this –Participants from ICAs, Browsers, Research & EDU, IETF, major Relying Parties –Mailing List, regular meetings, agreed work items and time table –Initial Proposals Short term → Lightweight OCSP Profile [RFC5019] + CDN friendly, including promoting OCSP Stapling support in Servers and GET methods for Clients, CRL Sets for Intermediates Mid term → push for OCSP over DNS, ALIRTs Long term → CA whitelists, SLCS –Collaboration to produce and promote a number of industry whitepapers This WG represents a Work-In-Progress to attempt to address the issue with inefficient revocation

Questions Questions? –Anyone interested in participating/contributing to the CABFRev WG should send an to me or requesting such, and indicate a relevant reason/commitment for doing

DigiCert Contacts Website: Scott Rea: (801) ,