DataPower Security Details: Crypto Objects and AAA

Slides:



Advertisements
Similar presentations
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Advertisements

Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CP3397 ECommerce.
MyProxy: A Multi-Purpose Grid Authentication Service
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
Troubleshooting Federation, AD FS 2.0, and More…
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
X.509 Certificate management in.Net By, Vishnu Kamisetty
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
(Exchange Programme to advance e-Infrastructure Know-How) The EPIKH Project Hailong Yang
Principles Architecture Functionality Configuration Future plans
Key management issues in PGP
Cryptography and Network Security Chapter 14
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Public Key Infrastructure (PKI)
Security is one of the most widely used and regarded network services
CollegeSource Security Application &
Authentication, Authorisation and Security
Tutorial on Creating Certificates SSH Kerberos
Cryptography and Network Security
KERBEROS.
Authentication Applications
Grid Security Jinny Chien Academia Sinica Grid Computing.
Introduction to PKI Novell BrainShare 2002 Tammy Green
IBM Certified WAS 8.5 Administrator
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Message Digest Cryptographic checksum One-way function Relevance
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
A Programmer’s Guide to Secure Connections
Transport Layer Security (TLS)
Cryptography and Network Security Chapter 14
Kai Bu 05 Secure Connection The topic to be covered this week is secure connection. Apparently, the.
Grid Security Infrastructure
Kerberos and X.509 Fourth Edition by William Stallings
Advanced Computer Networks
National Trust Platform
Presentation transcript:

DataPower Security Details: Crypto Objects and AAA DataPower Appliances Business Unit, AIM/SWG DataPower Security Details: Crypto Objects and AAA Jonathan Wenocur Confidential | June 20, 2006

Crypto Objects The main objects: Less used objects: Crypto Key (“key”) Crypto Certificate (“cert”) Crypto Identification Credentials (“identcred”, “idcred”) Crypto Validation Credentials (“valcred”) Crypto Profile SSL Proxy Profile Less used objects: Crypto Shared Secret Key (“sskey”) Crypto Firewall Credentials (“fwcred”)

Crypto Objects: Crypto Key A private key Configured from file on the flash PEM : password possible DER PKCS#8 : for private keys; password possible PKCS#12 : key and cert; contains PKCS#7 and PKCS#8; password possible Located in cert:, sharedcert: Protected directories: writable, not readable HSM key: located on HSM Virtual location “hsm:” Password-map : CLI only keygen

Crypto Objects: Crypto Certificate A public key Configured from file PEM DER PKCS#7 PKCS#12 : password possible (contains keys and certs) Located in cert:, sharedcert: Protected directories: writable, not readable File may contain private keys too so that’s why protected pubcert: Publicly available CA certificates Ignore Expiration dates Useful with large valcreds so valcred object stays “up”

Crypto Objects: Crypto Identification Credentials Matching keypair: key + cert == private key + public key Verified at configuration time SSL “identity” sent to peer CA list Starting to use for other crypto operations (sign, encrypt)

Crypto Objects: Crypto Validation Credentials Set of certificates for validating another certificate Validation modes: “Match exact or immediate issuer” “Full certificate chain checking (PKIX)” : SSL only Use Certificate Revocation List (CRL) or not Used anywhere a certificate is received and trust must be checked SSL Digitial signature verification AAA

Crypto Objects: Crypto Profile Describes SSL configuration for one side of the connection (server or client) Identity to use (idcred) valcred for validating peer’s identity Ciphersuite Send peer client CA list Other options, such as SSL version Send Client CA list: for mutual authentication Reusable (though no one seems to do this)

Crypto Objects: SSL Proxy Profile “Top-level” crypto object Describes overall SSL connection Reverse  server Forward  client Two-way  client and server SSL session caching controls Server is a pool Client only needs to be on/off since 1:1 with destinations

Crypto Objects: Basic Object Hierarchy

Crypto Objects: Crypto Shared Secret Key Symmetric crypto key Configured from file on the flash String: 0xABCD1234… Justabunchoftext… Located in cert:, sharedcert: Protected directories: writable, not readable Not used much

Crypto Objects: Crypto Firewall Credentials Limits which keys, certs, and sskeys an xmlfirewall uses List of keys List of certs List of sskeys Less important now that there are configuration domains

Crypto Objects: Where Objects are Used SSL, obviously Sign Key : used for signature generation Cert : part of message so receiver can verify the signature Verify Cert : if a cert isn’t specified in the message Valcred : validate the signer’s certificate Encrypt Cert : used for encryption of ephemeral key, and placed in message Decrypt Key : used for decrypting ephemeral key, looked up by matching cert in message to cert in idcred and using corresponding key, or specifying directly AAA : validating signers’ certs, signing SAML Assertions, etc

AAA: The 7 Stages AU Cache Extract Identity (EI) Authenticate (AU) Map Credentials (MC) Authorize (AZ) Audit/Post- Processing (PP) Extract Resource (ER) Map Resource (MR) AZ Cache

AAA: Data Passed Between Stages Input and output XML nodesets XML API for each stage Allows custom processing stylesheets Custom-AAA-Processing.pdf Viewable in Probe Example EI from Probe: <identity> <entry type="http-basic-auth"> <username>fred</username> <password sanitize="true">fred</password> <configured-realm>login</configured-realm> </entry> </identity>

AAA: Writing Custom Stylesheets Use “API” of input and output nodesets Example custom EI stylesheet: <?xml version="1.0"?> <xsl:stylesheet version="1.0“ xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output method="text"/> <xsl:template match='/'> <xsl:if test="count(//fred/flintstone) > 0"> <username>fred</username> <password>flintstone</password> </xsl:if> </xsl:template> </xsl:stylesheet>

AAA: Extension Functions Some DataPower XSLT extensions which may be useful when writing custom stylesheets: dp:auth-info() dp:get-cert-details() dp:get-cert-issuer() dp:get-cert-serial() dp:get-cert-subject() dp:ldap-authen() And many more!

AAA: AU and AZ caching By default AU and AZ results are cached Cache key based on entire aaapolicy plus relevant data Sometimes tricky to avoid false hits Same underlying caching mechanism as document cache

AAA: Benchmarking Currently have no benchmarks Answer the question: “What is the pure overhead of running AAA?” Compare 2 scenarios: 1) unprocessed tiny message in loopback using persistent connections should get 20,000 transactions/sec 2) preprocessed tiny message with minimal AAA Other interesting scenarios: On-box (local AAAInfo file) vs off-box (LDAP, TAM, etc) AU and AZ Caching on/off

AAA: Examples Token translation: BasicAuth  UsernameToken EI: BasicAuth AU: AAAInfo file MC: none ER: URL MR: none AZ: anyauthenticated PP: generate UsernameToken