Tutorial on KMIP and FCEAP/GPSK

Slides:



Advertisements
Similar presentations
Information Security of Embedded Systems : Design of Secure Systems Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Advertisements

ISA 662 SSL Prof. Ravi Sandhu. 2 © Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later.
Summary Overview of Vireo Student Submission of ETDs
OGSA Security Profile 2.0 (a.k.a. Express Authentication Profile) DUANE MERRILL October 18, 2007.
Presentation at IEEE AWSITC, June 4, Energy-Efficient Communications via Network Coding Jos Weber Delft University of Technology The Netherlands.
January 12, 2010 Updated February 4, Starting in TEA will collect Teacher Class Assignments and Student Course Completion data at the.
January 12, 2010 Updated April 9, Starting in TEA will collect Teacher Class Assignments and Student Course Completion data at the classroom.
® Microsoft Office 2010 Excel Tutorial 3: Working with Formulas and Functions.
1 Whats Up: P2P news recommender Anne-Marie Kermarrec Joint work with Antoine Boutet, Davide Frey (INRIA) and Rachid Guerraoui (EPFL) Gossple workshop.
August 4, The following PEIMS reporting changes have been made to the PEIMS Collection in order to collect the Classroom Link information.
Hash Tables and Constant Access Time CS-2303, C-Term Hash Tables and Constant Access Time CS-2303 System Programming Concepts (Slides include materials.
Tutorial 5: Working with Excel Tables, PivotTables, and PivotCharts
Tutorial 1 Creating a Database
ACOT Intro/Copyright Succeeding in Business with Microsoft Excel 2010: Chapter1.
Common Identifiers Providing Globally Unique Identifiers for UUID and Application IDs of keys and other objects.
Anonymizing User Location and Profile Information for Privacy-aware Mobile Services Masanori Mano, Yoshiharu Ishikawa Nagoya University 11/2/
Tutorial 3: Communicating Project Information
® Microsoft Office 2010 Excel Tutorial 1: Getting Started with Excel.
Collaboration Works! 10/20/20101 Planning Research Institutional Effectiveness.
Quick Training Guide New SpringerLink, August 2010.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
Cryptography and Network Security Chapter 16
Tutorial 8 Sharing, Integrating, and Analyzing Data
Web security: SSL and TLS
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Secure Socket Layer.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security (SSL)
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
1 NIST Key State Models SP Part 1SP (Draft)
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
©2009 HP Confidential1 Proposal to OASIS KMIP TC Stan Feather and Indra Fitzgerald Hewlett-Packard Co. 26 October, 2010 Encoding Options for Key Wrap of.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
Meta-Data-Only (MDO) Keys KMIP 1.2 Proposal Oct Denis Pochuev, SafeNet John Leiseboer, QuintessenceLabs.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
Executive Director and Endowed Chair
Secure Sockets Layer (SSL)
CSCE 715: Network Systems Security
Cryptography and Network Security
SSL (Secure Socket Layer)
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Tutorial on KMIP and FCEAP/GPSK Bob Nixon (Emulex) bob.nixon@emulex.com 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 Where is this bus going? What’s the motivation for involving KMIP? What is KMIP? What does FC-EAP/GPSK need from KMIP? 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

What’s the motivation for involving KMIP? 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 Who are the players? RADIUS RADIUS Server (an Authentication Server) RADIUS Client KMIP KMIP Server (a Key Management Server) KMIP Client FC-SP-2 Authentication Initiator Authentication Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using DHCHAP/RADIUS - 1 RADIUS Server DHCHAP Responder DHCHAP Initiator 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using DHCHAP/RADIUS - 2 RADIUS Server DHCHAP Initiator Exchange identities DHCHAP: DHCHAP Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using DHCHAP/RADIUS - 3 Initiator authentication keys Responder authentication keys RADIUS Server Delegate authentication RADIUS: DHCHAP Initiator DHCHAP Responder Initiator authentication keys Responder authentication keys 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using DHCHAP/RADIUS - 4 RADIUS Server DHCHAP Initiator Negotiate Session Key DHCHAP: DHCHAP Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using DHCHAP/RADIUS - 5 Key management is centralized  Cryptographic math is delegated  …but the cryptography of RADIUS and CHAP are falling out of favor  EAP/GPSK chosen for flexibility and security But lacks an obvious management system 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Would EAP/GPSK work with RADIUS? - 1 RADIUS server EAP/GPSK Responder EAP/GPSK Initiator 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Would EAP/GPSK work with RADIUS? - 2 RADIUS Server EAP/GPSK Initiator Exchange identities EAP/GPSK : EAP/GPSK Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Would EAP/GPSK work with RADIUS? - 3 Initiator authentication keys Responder authentication keys RADIUS Server Delegate authentication RADIUS: Only for responder EAP/GPSK Initiator EAP/GPSK Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Would EAP/GPSK work with RADIUS? - 4 RADIUS/Initiator session key RADIUS Server Negotiate Session Keys EAP/GPSK : …but I won’t tell you what it is! EAP/GPSK Initiator EAP/GPSK Responder RADIUS/Initiator session key 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Would EAP/GPSK work with RADIUS? - 5 …only the Authentication Responder can delegate the cryptographic math  …and you can’t extend the trust to an FC-SEC session   Not so useful 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using EAP/GPSK/KMIP - 1 KMIP Server EAP/GPSK Responder EAP/GPSK Initiator 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using EAP/GPSK/KMIP - 2 KMIP Server EAP/GPSK Initiator Exchange identities EAP/GPSK : EAP/GPSK Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using EAP/GPSK/KMIP - 3 Initiator/Responder peer authentication key KMIP Server Get Peer’s authentication key KMIP : Initiator/Responder peer authentication key EAP/GPSK Initiator EAP/GPSK Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using EAP/GPSK/KMIP - 4 KMIP Server Initiator/Responder peer authentication key Initiator/Responder peer authentication key EAP/GPSK Initiator Authenticate identities EAP/GPSK : EAP/GPSK Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using EAP/GPSK/KMIP - 5 KMIP Server EAP/GPSK Initiator Negotiate Session Key EAP/GPSK : EAP/GPSK Responder 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

When using EAP/GPSK/KMIP - 6 More secure than DHCHAP/RADIUS  Key management is centralized  Cryptographic math is not delegated  “EAP-GPSK should be easy to implement” (RFC 5433)  …Doesn’t help for EAP-NEXT, though  Net gain, it appears 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 What is KMIP? 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

KMIP  Key Management Interoperability Protocol It’s a protocol standard, not a server design. Intention is that it be “front-ended” to existing and future proprietary server designs. It covers management, not authorization. Intention is that, although a certain minimum is expected, a design is free to elaborate its authorization capability (or import it, e.g., from a corporate directory). 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

KMIP 1.0 is an OASIS Standard Actually, two OASIS Standards KMIP Specification KMIP Profiles Two supporting OASIS Committee Specifications KMIP Use Cases (consider them as test specs) KMIP Usage Guide (“Informative Annex”) 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 KMIP Specification Oversimplifying: The Protocol is composed of a sequence of Request/Response pairs A Request or Response is a Message A Message is a header followed by one or more Batch Items A Batch Item is an Operation Code and a Payload A Payload is a Sequence of Objects and Attributes An Object is zero or more subordinate Objects and zero or more Attributes An Attribute is one or more primitive data types Everything is encoded as a TTLV structure 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

TTLV Tag, Type, Length, Value Tag (3 bytes), Type (1 byte), Length (4 bytes), Value (see Length) Tag: What is it? (e.g., a Symmetric Key, a Lease Time) Type: How is it encoded? (e.g., a byte string, a substructure) Length: How long is the Value (in bytes)? (e.g., an Integer Length is 4) Value: What is the value? (OK, so that’s circular. This is a KMIP tutorial, it’s not Philosophy 301) 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

TTLV Example (from KMIP Specification) A Text String with the value "Hello World": 42 00 20 | 07 | 00 00 00 0B | 48 65 6C 6C 6F 20 57 6F 72 6C 64 00 00 00 1733 00 00 Simple , right? 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Another TTLV Example (from KMIP Use Cases) Create (symmetric key) In: objectType=‟00000002‟ (Symmetric Key), attributes={ CryptographicAlgorithm=‟00000003‟ (AES), CryptographicLength=‟128‟, CryptographicUsageMask=“0000000C‟ } Tag: Request Message (0x420078), Type: Structure (0x01), Data: Tag: Request Header (0x420077), Type: Structure (0x01), Data: Tag: Protocol Version (0x420069), Type: Structure (0x01), Data: Tag: Protocol Version Major (0x42006A), Type: Integer (0x02), Data: 0x00000001 (1) Tag: Protocol Version Minor (0x42006B), Type: Integer (0x02), Data: 0x00000000 (0) Tag: Batch Count (0x42000D), Type: Integer (0x02), Data: 0x00000001 (1) Tag: Batch Item (0x42000F), Type: Structure (0x01), Data: Tag: Operation (0x42005C), Type: Enumeration (0x05), Data: 0x00000001 (Create) Tag: Request Payload (0x420079), Type: Structure (0x01), Data: Tag: Object Type (0x420057), Type: Enumeration (0x05), Data: 0x00000002 (Symmetric Key) Tag: Template-Attribute (0x420091), Type: Structure (0x01), Data: Tag: Attribute (0x420008), Type: Structure (0x01), Data: Tag: Attribute Name (0x42000A), Type: Text String (0x07), Data: Cryptographic Algorithm Tag: Attribute Value (0x42000B), Type: Enumeration (0x05), Data: 0x00000003 (AES) Tag: Attribute Name (0x42000A), Type: Text String (0x07), Data: Cryptographic Length Tag: Attribute Value (0x42000B), Type: Integer (0x02), Data: 0x00000080 (128) Tag: Attribute Name (0x42000A), Type: Text String (0x07), Data: Cryptographic Usage Mask Tag: Attribute Value (0x42000B), Type: Integer (0x02), Data: 0x0000000C (Encrypt, Decrypt) 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 KMIP Profiles Oversimplifying: A profile specifies a subset of the optional features in the KMIP Specification that someone believes would be useful and sufficient for some class of applications Note that what is required by the KMIP Specification is generic to the point that it is practically useless except when extended by a profile. Note that the KMIP Specification requires compliance to at least one profile. A profile is a pairing of an Authentication Suite and a Conformance Clause. A profile is specified for servers. Clients’ requirements may be inferred. 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 Authentication Suite An Authentication Suite Requires a channel security method providing confidentiality and integrity May require certain options for the channel security method May require a means of client authentication If the channel is TCP, TLS 1.0 support is required by the KMIP Specification. An Authentication Suite may add to that. 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Example Authentication Suite KMIP Basic Authentication Suite includes Requirement for TLSv1.0 protocol, exclusions of SSL Requirement for the TLS_RSA_WITH_AES_128_CBC_SHA cipher suite Requirement for TLS mutual authentication Requirement for consideration of per request credentials if provided by the client Etc. 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 Conformance Clause A Conformance Clause Requires support for the KMIP Server conformance clause Requires support for specific KMIP options May forbid certain KMIP options Typically explicitly permit any KMIP options and extensions outside the standard that are not explicitly listed and not contradictory of any requirements 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Example Conformance Clause The KMIP Secret Data Server Conformance Clause includes Requirement to support for the KMIP Server conformance clause Requirement to support the optional Secret Data object, of type Password (the Server conformance clause requires support for a generic key, but no specific kind of key) Requirement to support the optional Register operation (the Server conformance clause does not specify how any object gets into a server) etc. Permission to support anything that doesn’t conflict. 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

What does FC-EAP/GPSK need from KMIP? My guesses… Expert advice enthusiastically solicited! 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 Authentication Presuming our channel to be TCP/IP, TLSv1.0 support is required. Any expert advice why we would not use it? TLSv1.2 fixes a published security issue. Is 1.2 generally implemented? Is IPSEC an alternative? Require the server to support object authorization rules Modify only administratively Read only by an administratively specified group of two or more entities 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Necessary information Symmetric key objects Does TLSv1.0 provide sufficient confidentiality that we don’t need key wrapping? Do we need Start/Stop usage dates? Uninterpreted Text String Names for keys (the only alternative is URI) 128-bit and 256-bit key lengths AES and HMAC-SHA256 algorithms 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0

Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0 Questions? Suggestions… please? 13 October 2010 Tutorial on KMIP and FCEAP/GPSK - T11/10-428v0