CAcert, a Security Community. The Problem Back in 2001: Sydney had WLAN network access everywhere (Sydney Wireless) People were running their own mailservers.

Slides:



Advertisements
Similar presentations
AI3 Contact Server Takeshi Usui
Advertisements

1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
Internet Security Terms and Techniques Chris Avram Faculty of Information Technology Monash University 1U-Cubed ‘99Chris Avram.
Tony BrettOUCS Course Code ZAB 9 February Security – Encryption and Digital Signatures Tony Brett Oxford University Computing Services February.
Security Jonathan Calazan December 12, 2005.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Masud Hasan Secue VS Hushmail Project 2.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Using Personal Certificates Jeff D’Angelo Jeremy Hill Network of People, Jan 6, 2005.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Module 9: Fundamentals of Securing Network Communication.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Deepnet Unified Authentication for Outlook Anywhere.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Automated Certificate Management ACME + Let’s Encrypt Richard
SSL Certificates for Secure Websites Dan Roberts Kent Network Users Group Wednesday, 17 March 2004.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Digital Signatures and Digital Certificates Monil Adhikari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
© CAcert, 2009 Ulrich Schroeter, Assurer Training Events, April 2009 What is the CCA?
Client Certs -- the old-new thing CAcert The Community CA cacert.org.
Key management issues in PGP
Electronic mail security
TIP Remember, your sense of conviction and your involvement with the content of the presentation are critical to its success.
SSL Certificates for Secure Websites
Electronic Commerce Systems
Client Certs -- the old-new thing
Security in OSG Rob Quick
Public Key Infrastructure (PKI)
Misc. Security Items.
MAIL AND SECURITY PERTEMUAN 13
Welcome MyCelium phone number MyCelium phone number.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Security in ebXML Messaging
Digital Signatures and Forms
Message Digest Cryptographic checksum One-way function Relevance
Pooja programmer,cse department
E-cert (Digital Certificate)
INFORMATION TECHNOLOGY NEW USER ORIENTATION
E-cert (Digital Certificate)
Exercise 8: Securing Pretty Good Privacy
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Unit 8 Network Security.
Advanced Computer Networks
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Introduction to Let’s Encrypt
PGP CSC 492 Presentation May 2, 2007 Brandon Skari Ruby Matejcik.
Presentation transcript:

CAcert, a Security Community

The Problem Back in 2001: Sydney had WLAN network access everywhere (Sydney Wireless) People were running their own mailservers at home, using the Webmail on their hom servers from somewhere else in Sydney Webmail was using plain HTTP, so they broadcasted their passwords in clear on air

Strategic goal Privacy through encryption Security through authentication Trust for the Internet Solution to the chicken-and-egg problem: Certificates and applications

Tasks of a CA “Certification Authority” A CA digitally binds the identity of people and organisations (“identity-binding”) Issues digital certificates

Applications Securing a Webserver with HTTPS Signing and encrypting s SSL/TLS Server applications Authentication for websites Authentication for VPN´s

CAcert Inc. CAcert Inc. is a registered non-profit organisation based in Australia, which defines the rules and operates the servers Start Founding CAcert Inc.: 2003

Identity-binding Until now: Verification of the identity for every certificate, costs ~ 200,- USD per certificate per year How does it help, if I can afford a certificate, but the rest of the world can´t? CAcert separates the Assurance (verification of the identity with gov. photo-ID) from the issueing of the certificates

Web of Trust Was “invented” around PGP If your friend trusts Bob, and your friend tells you about it, and you trust your friend, then you could trust Bob People sign other people´s keys (telling the public you “trust”/... them) 1 Million people Problems: No central authority No defined rules Quality Trust vs. Identity

Assurance Assurance is a service, where an Assurer verifies the identity of a person with a government issued photo-ID and affirms for CAcert, and issues points on the life-long account at CAcert free market >4000 Assurer worldwide

Point schema With 50 points you can issue certificates With 100 points you become an Assurer, you can give other people a maximum of 10 points, and you get 2 points for doing it. Upto 150 points, where you can give 35 points

Community Where do you get your points? “Find an assurer” near you through the website Meet assurers at conferences and events Blogtalk, Linuxwochen, CeBIT, CCC Congress, Linuxworld, LinuxTag, FISL,...

Certificates Life-long account at CAcert Issue certificates yourself anytime on the internet certificates are free of charge unlimited number of certificates therefore you only have initial costs, no followup costs

Technology X.509 certificates server certificates client certificates code-signing certificates (Java, Active-X, Cellular phones,...) IDN-Domains OpenPGP OpenPGP Signatures CAcert is a platform and technology neutral CA!

Security CAcert is being audited with a WebTrust compatible Audit, which is a worldwide recognized Audit for CA´s 4-eyes principle open and transparent structure sourcecode is available for audits instant revocation lists + OCSP

Success? Verified Users: > Issued Certificates: > Assurers: 6,691 Assurances: 41,957 Issues points: 1,034,107 in more than 29 countries translated into 26 languages

Thank you very much Any questions?

How do I get my cert now?!? Get the form, fill out the upper part Come with a personal ID / passport / drivers license to me Issue the certificates yourself through the website Think about donating Create your account on Verify your address within 24 hours Password: LARGE+small+numb3r+spe(ial