TNC 2004 – Rhodes (Greece) On a Taxonomy of Authentication and Authorization Solutions (Exploring open problems) José A. Montenegro Javier López Rolf Oppliger.

Slides:



Advertisements
Similar presentations
CS 5511 Introduction to WS Authorization Brian P. Barrett.
Advertisements

Network Security Essentials Chapter 4
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Grid Security. Typical Grid Scenario Users Resources.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
The EC PERMIS Project David Chadwick
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Web Service Security CSCI5931 Web Security Instructor: Dr. T. Andrew Yang Student: Jue Wang.
Web services security I
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Chapter 10: Authentication Guide to Computer Network Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Service Standards, Security & Management Chris Peiris
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
High-quality Internet for higher education and research do you like to puzzle, build an AAI ! xxx AA systems 2nd EuroCAMP - Porto November 8, 2005
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Kerberos and Identity Federations Daniel Kouřil, Luděk Matyska, Michal Procházka, Tomáš Kubina AFS & Kerberos Best Practices Worshop 2008.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Grid Authorization Landscape and Futures Von Welch NCSA
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Web Services Security Patterns Alex Mackman CM Group Ltd
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Adding Distributed Trust Management to Shibboleth
NAAS 2.0 Features and Enhancements
Security & .NET 12/1/2018.
O. Otenko PERMIS Project Salford University © 2002
AAA: A Survey and a Policy- Based Architecture and Framework
Presentation transcript:

TNC 2004 – Rhodes (Greece) On a Taxonomy of Authentication and Authorization Solutions (Exploring open problems) José A. Montenegro Javier López Rolf Oppliger Guenther Pernul Authors:

TNC 2004 – Rhodes (Greece) 2 Outline Traditional Problem – Authentication (Is it resolved?) Actual Problem – Authorization (How to resolve it?) Why a Taxonomy now? Taxonomy  Common Elements  Topics  Division General Scope Solutions Web Scope Solutions Framework Solutions Auth Languages and protocols How to deal with Privilege delegation Privilege Delegation (PMI Implementation) AAI – BAAI as an alternative

TNC 2004 – Rhodes (Greece) 3 Traditional Problem – Authentication (Is it resolved?) Cartoon The new Yorker Book Authentication From Passwords to Public Keys

TNC 2004 – Rhodes (Greece) 4 Actual Problem – Authorization (How to resolve it?) Assumption: Everybody knows you are a dog, but What is a What is a dog allowed to do?

TNC 2004 – Rhodes (Greece) 5 Why a Taxonomy now? different scenarios Actual solutions continuously use the traditional ideas in different scenarios. Kerberos: Born in 1988; Microsoft “adopted” it in 2000, 12 years later !!!!!!! PAC used in SESAME (1996) similar to X509 Attribute Certificate (2004), 8 years later !!!! Are we reinventing the wheel? Are we reinventing the wheel? Maybe, we should analyze previous solutions before developing a new one (reuse of a previous one is a possibility)

TNC 2004 – Rhodes (Greece) 6 Taxonomy – Common Elements Solutions that have been analyzed provide common technologies such as:  Mechanism to establish Sign-on,  Mechanism to disable Sign-on or Sign-out,  Trust Relations,  Structures to store and transport credentials  Protocols to carry credentials  Asymmetric Cryptographic Actors that are present in the solutions analyzed:  Client,  Resources,  Resource Provider (Stakeholder),  Authentication System,  Authorization System.

TNC 2004 – Rhodes (Greece) 7 Taxonomy – Topics The taxonomy pretends to obtain the key issues of each proposal:  Goal of the proposal  Role of actors involved  Elements used to store/carry the Auth information  Scheme operation  Advantages, drawbacks or well-known flaws  Other features like: difficulty of use, source code, running environment, etc

TNC 2004 – Rhodes (Greece) 8 Taxonomy - Division Initially, we establish four categories:  General Scope  Web Scope  Framework-based  Auth Languages and Protocols

TNC 2004 – Rhodes (Greece) 9 Taxonomy - General Scope Solutions General Scope Solutions: This category includes the solutions that can be used in whatever auth network scenario.  Kerberos: Standard de facto. Symmetric cryptography  Permis: Based on ITU-T proposal included in this category because it implements a specific model of the ITU-T proposal, that is, the role model  Akenti: Use-condition, Identity and Attribute certificates (see comparative with PERMIS).  Sesame: Use PACs, similar to actual X509 ACs. It deals with delegation, and make use of Role Base Authorization !!!!!!

TNC 2004 – Rhodes (Greece) 10 Taxonomy – Web Scope Solutions … Web Scope Solutions : Enable single sign-on for access to multiple sites Applications are built on top of present-day Internet technology. Although some security issues remain, the protocols exacerbate well-known Internet flaws, including:  Weak Passwords: Poorly-chosen passwords can be particularly problematic in a single sign-on environment  Internet Deployment: Public site + browser crash + failed sign out = hack session  Weak Cryptography: Parts of protocols are based on the use of SSL/TLS Cryptographic export problems: browsers that have weak 40-bit cryptography enabled

TNC 2004 – Rhodes (Greece) 11 Taxonomy - Web Scope Solutions cont Web Scope Solutions :  PAPI: Well Known in TNC  Shibboleth: Well Known in TNC  Microsoft.NET Passport: The most widely used solution  Liberty: No implementation yet.  Web Services Federation Language, or WS-Federation: direct competitor with Liberty (Microsoft and IBM Consortium)

TNC 2004 – Rhodes (Greece) 12 Taxonomy – Framework solutions Framework-based solutions:  X509 v3 Auth, PMI and PKI: PERMIS, ETSI (report).  SPKI/SDSI: S expressions and new point of view about certificates  AAAARCH (Authentication, Authorization and Accounting Architecture) : Project stopped

TNC 2004 – Rhodes (Greece) 13 Taxonomy – Auth Languages and protocols Auth languages and protocols  XML based Security Assertion Markup Language (SAML) XML Access Control Language (XACL) XML Access Control Language (XACML) XML Key Management System (XKMS) XML Trust Assertion Service Specification (XTASS)  SPOCP: Well Known in TNC  SOAP Too many solutions ???

TNC 2004 – Rhodes (Greece) 14 Taxonomy - Conclusions Different solutions provide either Authentication or Authorization services (or both) Sometimes it is necessary to merge two different solutions to provide an Authentication- and-Authorization Infrastructure (AAI) Best solutions are not the most used (Kerberos), and widely used solutions are not the best (Passport) Complex problems must be resolved, such as delegation ….

TNC 2004 – Rhodes (Greece) 15 Actual Problem, How treat the Privilege delegation Father  User Assistant  Delegated User Toy  Token Child  Authz Engine Authorization decision : NO

TNC 2004 – Rhodes (Greece) 16 Privilege Delegation (PMI Implementation) … There are numerous theoretical solutions, but no one implemented Analysis of solutions provides us the input to develop a new AAI infrastructure:  Previous work: PKI prototype  Work Extension: We have designed and developed a PMI prototype. It focuses on the PMI Delegation Model, though it supports the other Models (Role based model and Access Control model)  The implementation has used open source libraries such as OpenSSL, GTK and OpenLDAP  Main issue: Adding Attribute Certificate to OpenSSL

TNC 2004 – Rhodes (Greece) 17 Privilege Delegation (PMI Implementation) cont.

TNC 2004 – Rhodes (Greece) 18 Alternative AAI - BAAI Basics for development: PKI Kerberos Possibilities for AAIs based on PKI: PKI + PMI PKI + identity certificates extensions PKI + database system (DBMS) Our PMI implementation is the support for another proposal: Biometrics + PMI (BAAI)

TNC 2004 – Rhodes (Greece) 19 BAAI details - How make VAC, X509 v3 Version Number SerialNumber Signature Algorithm Issuer Validity Period Holder Attributes Issuer Unique Identifier AASignature Extensions Version Number SerialNumber Signature Algorithm Issuer Validity Period Holder Attributes Issuer Unique Identifier AASignature Extensions Version Number SerialNumber Signature Algorithm Issuer Validity Period Holder Attributes Issuer Unique Identifier AASignature Holder ::= SEQUENCE { baseCertificateID[0] IssuerSerial OPTIONAL, entityName[1] GeneralNames OPTIONAL, objectDigestInfo[2] ObjectDigestInfoOPTIONAL } Visual Attribute Certificate(VAC) - Basic Item in a BAAI Visual Attribute Certificate (VAC) - Basic Item in a BAAI (1), (2), ObjectDigestInfo ::= SEQUENCE publicKey(0), publicKeyCert otherObjectTypes otherObjectTypeIDOBJECT IDENTIFIER OPTIONAL, digestAlgorithmAlgorithmIdentifier, objectDigestBIT STRING } { digestedObjectType ENUMERATED { }

TNC 2004 – Rhodes (Greece) 20 BAAI details - How make VAC, Creation Process Certificate Holder entity Name cn=user,dn=uma,dn=es objectDigest hash(MSB(image)) Authorization Certificate Identity Identity and AuthorizationVAC Steganography A B Visual Attribute Certificate(VAC) - Basic Item in a BAAI Visual Attribute Certificate (VAC) - Basic Item in a BAAI

TNC 2004 – Rhodes (Greece) 21 BAAI details - How make VAC, Verification Process = ? Biometric Certificate Steganography CCTV 1 23 Visual Attribute Certificate(VAC) - Basic Item in a BAAI Visual Attribute Certificate (VAC) - Basic Item in a BAAI

TNC 2004 – Rhodes (Greece) 22 Questions ? Thanks for you attention José Antonio Montenegro Web: