Document update - what has happened since GGF11

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

A Framework for Distributed OCSP without Responders Certificate
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Deploying and Managing Active Directory Certificate Services
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 eID validations services Houcine Bel Mamoune Unit manager eID Technical Drill down Session 7 April 2005.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Chapter 9 Deploying IIS and Active Directory Certificate Services
Slide 1 Many slides from Vitaly Shmatikov, UT Austin Public-Key Infrastructure CNS F2006.
National Center for Supercomputing Applications MyProxy and GSISSH Update Von Welch National Center for Supercomputing Applications University of Illinois.
A Modest Proposal for an Assertion Validation Service Bob Cowles (SLAC/OSG) 28-Mar-2007 thanks to discussions with Frank Siebenlist, Rachana Ananthakrishnan.
Hypertext Transfer Protocol Kyle Roth Mark Hoover.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Josh Benaloh Brian LaMacchia Winter Side-Channel Attacks Breaking a cryptosystem is a frontal attack, but there may be easier access though a side.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Assuring e-Trust always 1 Status of the Validation and Authentication service for TACAR and Grids.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
Certificate revocation list
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Online Certificate Status Protocol ‘OCSP’ Dave Hirose July Outline: What is OCSP? Digital Signatures Certificate Revocation List Technical aspects.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Cryptography and Network Security Chapter 14
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004 Stefan Kotes, Engineering Manager.
Revocation in WebPKI Phill Hallam-Baker Comodo. Standards intersection PKIX OTHER.
Delay Tolerant Network (DTN) Security Key Management Design Alternatives IETF94 DTN Working Group November 3, 2015 Fred L. Templin
AAVS Middleware Security Group Bob Cowles CERN – September 14, 2005.
BGPSEC Protocol (From -01 to -02 and on to -03) Matt Lepinski.
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Authentication Applications
Voucher and Voucher Revocation Profiles for Bootstrapping Protocols draft-kwatsen-netconf-voucher-00 NETCONF WG IETF 97 (Seoul)
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Security in ebXML Messaging
APNIC Trial of Certification of IP Addresses and ASes
Information Security message M one-way hash fingerprint f = H(M)
Resource Certificate Profile
Digital Certificates and X.509
AuthN Middleware Requests
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Certificate Revocation
OCSP Requirements GGF13.
Presentation transcript:

Document update - what has happened since GGF11 OCSP Requirements Document update - what has happened since GGF11

Refreshener OCSP = Online Certificate Status Protocol (RFC2560) “Removes” burden of wide-area CRL distribution and update Clients still have to do path validation! Clients still have to know about all CAs! Reasonably lightweight request/response protocol carried over HTTP(S)

Trust model alternatives supported by the RFC CA signs responses Authorized Responder Dedicated OCSP signing key certified by issuing CA Trusted Responder Explicit, configured trust We propose to use a combination of #2 and #3, for a variety of reasons

Our OCSP service architecture site/organization boundary CA CRL cache CA OCSP client CA Trusted Responder OCSP client Trusted Responder Authorized Responder Authorized Responder

Revocation status of OCSP responder? Don’t OCSP-no-check extension Shortlived certificates Can be applied to any frequently validated certificate!

CA requirements SHOULD include service locator of authorized responder(s) in all issued certificates SHOULD certify authorized responders with ocsp-nocheck and OCSPSigning extensions SHOULD make sure authorized responders are updated immediately after e.g. CRL update.

Client Requirements Network connectivity Response caching Nonce Duh... but a strong motivation for trusted responder at site/org perimeter Response caching SHOULD If used, MUST be possible to limit Nonce SHOULD NOT

Trusted Responder architecture (NON-normative) Other Responder CRL cache (Re-)sign external responses? OCSP cache OCSP Responder OCSP client Responder interface request

Server requirements Signature key protection RECOMMEND use of HW SHOULD support for handling multiple signature certificates One per CA (Authorized responder) Transponder mode Do not resign responses, just forward them Preserves Authorized responder signature

Handling errors and “Unknown” responses Not covered by RFC Our suggestion: Interpret Unknown or error as “try next revocation source” If no next, treat it as Revoked with permission onHold ... unless otherwise configured (avoid DoS)

Responder(s) location discovery Via Service Locator (AIA extension) MUST Via Local configuration SHOULD be able to handle per-issuer granularity and provide a default Local configuration has precedence

Revocation sources MUST be able to handle both locally cached CRLs and querying OCSP responders Configurable which one to prefer over the other Different deployment scenarios

Next steps Open issues

Hierarchies CA Sub CA Result: Good Signature: ... CertChain: R1: CA Responder Sub CA R2: SCA Responder Result: Good Signature: ... CertChain: Subject=R2 Issuer=SCA ocsp-nocheck Subject=SCA Issuer=CA AIA={R1} OCSP client Trusted Responder Subject=John Issuer=SCA AIA={R2} Issuer=SCA Serial#=1234 AIA={R2}

When should a trusted responder resign an OCSP response? Always Only if response is from non-authorized responder Never

HTTP or HTTPS? Responses are signed Error messages are not Suggestion: HTTP