Alternative Governance Models for PKI

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Auditing of a Certification Authority Patrick Cain, CISA, CISM The Cooper-Cain Group, Inc.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
National Smartcard Project Work Package 8 – Security Issues Report.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
 Planning an audit of cost statements, records and other related documents is considered necessary to ensure achievement of audit objectives with available.
Certifying Authorities Liability under PKI: A Global Perspective Seema Sharma Senior Partner Vakul Corporate Advisory © All rights reserved, 2010.
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
Public Key Infrastructure (PKI)
Trust Anchor Management Problem Statement
Authority Recognition GGF9
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Guidelines for auditing Grid CAs
TAG Presentation 18th May 2004 Paul Butler
Service Organization Control (SOC)
KMIP Client Registration Ideas for Discussion
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Project Charter I want to design a project
Security in ebXML Messaging
Secure Electronic Transaction (SET) University of Windsor
جايگاه گواهی ديجيتالی در ايران
Information Security message M one-way hash fingerprint f = H(M)
Resource Certificate Profile
Digital Certificates and X.509
CS 465 Certificates Last Updated: Oct 14, 2017.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Fed/ED December 2007 Jim Jokl University of Virginia
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Appropriate Access InCommon Identity Assurance Profiles
WEQ-012 PKI Overview March 19, 2019
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Alternative Governance Models for PKI GGF8 BOF June 26/03

Agenda Overview and proposed scope (5min) Governance Models (25 min) QIK as a possible mechanism (15 min) Discussion of proposed charter and milestones.(30 min)

BOF Goals Agree on RG Charter Identify parties interested in working within a RG Identity overlap/interest with other groups Identity preliminary work items Rough out schedule

Overview X.509 does not dictate a particular governance model The conventional governance model of CP/CPS is best suited to the TTP business model There is room for a variety of governance models to address different business models The requirements of the GRID community may best be served by a different governance model

Definitions PKI governance model • PKI governance instruments Identifies the types of participants in a PKI and the relationships between them • PKI governance instruments Contractual and supporting documents that define the warranties offered by, and the obligations imposed on, the participants in the PKI Mechanisms for maintaining the trustworthiness of statements made by authorities Gentlemen’s agreements Governance model: A representation of the entities and the mechanisms for maintaining the trustworthiness of statements made by authorities

Objectives of Governance models To achieve a proper understanding and equitable allocation of risk among the actors Make the risks commensurate with the benefits for all participants Expose risk Apportion liability Identify obligations

Trust/Expectations To trust someone is to have a reasonable belief that they will behave as expected. Issuer Notification of revocation Conduct quality processes Notification of issuance Notification of revocation Publish the certificate and CRLs Query for revocation Rely within limits Protect private key Use appropriately Trust this is from me Relying Party Subscriber Use within limits Notification of revocation

Governance Models Taxonomy Governance models can be characterized by The nature of the information shared On which party the risk assessment burden falls Trusted Third Party ‘Equivalent Safeguards’ ‘Equivalent Conditions’

Trusted Third Party CA describes practices in CPS Subscriber & Relying party perform risk assessment to determine if practices are suitable for purposes Auditor’s report provides independent assessment of TTP’s adherence to published practices

Equivalent Safeguards CP lists statement of requirements for PKI safeguards CA describes its practices in CPS Subscriber & Relying party perform risk assessment to determine if practices are suitable for purposes Auditors report details CA adherence to published practices (at a very high level)

Equivalent Conditions CP lists conditions for certificates Approved uses Obligations Warranties CPS (if it exists) is internal document Risk assessment performed by Operating authority Auditors report offers opinion wrt suitability of practices to intended use

Comparison Model CP CPS TTP Equivalent Safeguards Conditions NA CA practices Limited liability Public Equivalent Safeguards CA practice requirements Conditions Approved uses Commitments Obligations Private

Policy Authority Issuer Policy Authority Issuer Policy Authority Subscriber Relying Party Subscriber Relying Party Issuer Subscriber Relying Party Policy Authority

Applications Y/N Y/N Application Details Certificate Relying Policy (generic) Relying Party Policy Authority Y/N Application Details Certificate Policy (app) Relying Party Policy Authority Y/N

Possible mechanism - QIK Qualified Installation of Keys Key-owners publish their public verification key – appended with appropriate uses & associated commitments and obligations in a QIK statement Relying parties parse QIK statement to determine if contained public key should be ‘trusted’ If ‘yes’, key is ‘installed’, ‘qualified’ by appropriate conditions (e.g. uses and restrictions)

QIK statement A binding between a public key and the terms and conditions of its use, as specified by the key owner or issuer. Keys can be discovered based on these terms & conditions Keys characterized by The Commitments the key-owner/issuer makes with respect to their use The Obligations attendant on those entities that use the key

Basic model The owner of a digital-signature key-pair creates a QIK instance, containing the public verification key and the conditions of use for that key. It publishes the QIK instance, either on the Web or by some other means, e.g. in WSDL or UDDI. It creates a validation string by digesting the QIK instance and makes the digest available by an authentic channel, The relying party retrieves and validates the QIK instance, using the digest, confirms the suitability of its conditions of use to the intended application and, if these checks pass, installs the key. The key owner sends signed transactions to the relying party The relying party validates the transactions using the key from the QIK instance

Variations Key Owner Relying Party Bilateral trust Subscriber End-entity Root import CA Cross-cert

Cross-certification

Top-level Schema

Key Application Schema A key is listed along with the applications for which its use are appropriate Each KeyApplication has associated Commitments and Obligations

Charter Output Purpose The Alternative Governance Model Research Group will explore the potential for a simpler, less-expensive, semi-automated alternative to the CP/CPS model for PKI policy governance. It is hoped that such an alternative will simplify and enable the establishment of trust between Grid participants, both end-entities and Certificate Authorities. Output The output of this research group will be an informational or community practices GGF document and suggestions for future development work in GGF working groups.

Summary The requirements of the GRID community may best be served by a PKI governance model different than the conventional Work warrants the creation of a Research (Working?) Group to explore the pros/cons of different models and relevance to Grid scenarios