PKI: A High Level View from the Trenches Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado.

Slides:



Advertisements
Similar presentations
April 19-22, 2005SecureIT-2005 How to Start a PKI A Practical Guide Dr. Javier Torner Information Security Officer Professor of Physics.
Advertisements

Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
May 06, 2002 Getting Started with Digital Certificates: Is PKI-Lite Real PKI? Internet2 Spring Meeting 2002 Wash, DC.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
David L. Wasley Office of the President University of California A PKI Certificate Policy for Higher Education A Work in Progress Draft David L.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Lecture 23 Internet Authentication Applications
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
PKI Update. Topics Background: Why/Why Not, The Four Planes of PKI, Activities in Other Communities Technical activities update S/MIME Pilot prospects.
David L. Wasley Office of the President University of California Higher Ed PKI – Draft Certificate Policy David L. Wasley University of California Common.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
Directories and PKI Keith Hazelton Senior IT Architect, UW-Madison PKI Summit, Snowmass, 9-Aug-01.
1 PKI Update September 2002 CSG Meeting Jim Jokl
PKI 150: PKI Parts Policy & Progress Part 2 Jim Jokl University of Virginia David Wasley University of California.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
PKI 150: PKI Parts Policy & Progress Jim Jokl. University of Virginia David Wasley University of California.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
HEPKI-TAG UPDATE Jim Jokl University of Virginia
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
X.509/PKI There is progress.... Topics Why PKI? Why not PKI? The Four Stages of X.509/PKI Other sectors Federal Activities - fBCA, NIH Pilot, ACES, other.
CAMP PKI UPDATE August 2002 Jim Jokl
PKI 101 Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder David Wasley Technology.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
PKI Activities at Virginia September 2000 Jim Jokl
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
PKI Session Overview 1:30 pm edt - Welcome, etiquette, session outline 1:40 pm edt - HEPKI-TAG Update (Jim Jokl, Virginia) 2:00 pm edt - HEPKI-PAG Update.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Some Technical Issues in PKI Deployment David Chadwick
Day 3 Roadmap and PKI Update. When do we get to go home? Report from the BoFs CAMP assessment, next steps PKI technical update Break Research Issues in.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
Cryptography and Network Security
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Security in ebXML Messaging
زير ساخت كليد عمومي و گواهي هويت
Fed/ED December 2007 Jim Jokl University of Virginia
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

PKI: A High Level View from the Trenches Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder

Agenda  Fundamentals - Components and Contexts  The missing pieces - in the technology and in the community  Current Activities - feds, chime, anx, overseas, pkiforum, etc.  Higher Ed Activities (CREN, HEPKI-TAG, HEPKI-PAG, PKIlabs)

PKI : A few observations  Think of it as wall jack connectivity, except it’s connectivity for individuals, not for machines, and there’s no wall or jack…But it is that ubiquitous and important  Does it need to be a single infrastructure? What are the costs of multiple solutions? Subnets and ITP’s...  Options breed complexity; managing complexity is essential

A few more...  IP connectivity was a field of dreams. We built it and then the applications came.. Unfortunately, here the applications have arrived before the infrastructure, making its development much harder.  Noone seems to be working on the solutions for the agora.

Uses for PKI and Certificates  authentication and pseudo-authentication  signing docs  encrypting docs and mail  non-repudiation  secure channels across a network  authorization and attributes  and more...

A framework  PKI Components - hardware, software, processes, policies  Contexts for usage - community of interests  Implementation options (in-source, out-source, roll- your-own,etc.)  Note changes over time...

PKI Components  X.509 v3 certs - profiles and uses  Validation - Certificate Revocation Lists, OCSP, path construction  Cert management - generating certs, using keys, archiving and escrow, mobility, etc.  Directories - to store certs, and public keys and maybe private keys  Trust models and I/A  Cert-enabled apps

PKI Contexts for Usage  Intracampus  Within the Higher Ed community of interest  In the Broader World

PKI Implementation Options  In-source - with public domain or campus unique  In-source - with commercial product  Bring-in-source - with commercial services  Out-source - a spectrum of services and issues  what you do depends on when you do it...

Cert-enabled applications  Browsers  Authentication  S/MIME  IPsec and VPN  Globus  Secure multicast

X.509 certs  purpose - bind a public key to a subject  standard fields  extended fields  profiles  client and server cert distinctions

Standard fields in certs  cert serial number  the subject, as x.500 DN or …  the subject’s public key  the validity field  the issuer, as id and common name  signing algorithm  signature info for the cert, in the issuer’s private key

Extension fields  Examples - auth/subject subcodes, key usage, LDAP URL, CRL distribution points, etc  Key usage is very important - for digsig, non-rep, key or data encipherment, etc.  Certain extensions can be marked critical - if an app can’t understand it, then don’t use the cert  Requires profiles to document, and great care...

Cert Management  Certificate Management Protocol - for the creation and management of certs  Revocation Options - CRL, OCSP  Storage - where (device, directory, private cache, etc.) and how - format  escrow and archive - when, how, and what else needs to be kept  Cert Authority Software or outsource options  Authority and policies

Certificate Management Systems  Homebrews  OpenSSL and OpenCA  Baltimore, Entrust, etc.  W2K, Netscape, etc.

Directories  to store certs  to store CRL  to store private keys, for the time being  to store attributes  implement with border directories, or acls within the enterprise directory, or proprietary directories

Inter-organizational trust model components  Certificate Policy- uses of particular certs, assurance levels for I/A, audit and archival requirements  Certificate Practices Statement- the nitty gritty operational issues  Hierarchies vs Bridges a philosopy and an implementation issue the concerns are transitivity and delegation hierarchies assert a common trust model bridges pairwise agree on trust models and policy mappings

Certificate Policies Address (CP)  Legal responsibilities and liabilities (indemnification issues)  Operations of Certificate Management systems  Best practices for core middleware  Assurance levels - varies according to I/A processes and other operational factors

Certificate Practice Statements (CPS)  Site specific details of operational compliance with a Cert Policy  A single practice statement can support several policies (Chime)  A Policy Management Authority (PMA) determines if a CPS is adequate for a given CP.

Trust chains  Path construction to determine a path from the issuing CA to a trusted CA heuristics to handle branching that occurs at bridges  Path validation uses the path to determine if trust is appropriate should address revocation, key usage, basic constraints, policy mappings

Trust chains  When and where to validate off-line on a server at the discretion of the application depth of chain  some revocations better than others - major (disaffiliation, key compromise, etc.) and minor (name change, attribute change)  sometimes the CRL can’t be found or hasn’t been updated

Mobility Options  smart cards  usb dongles  passwords to download from a store or directory  proprietary roaming schemes abound - Netscape, Verisign, etc  SACRED within IETF recently formed for standards  integration of certificates from multiple stores

More current activities  HEPKI  the Grid

Current Activities  PKIX ( charter.html)  Federal PKI work (  State Govs (  Medical community (Tunitas, CHIME, HIPAA)  Automobile community (ANX)  Overseas Euro government - qualifying certs EuroPKI for Higher Ed (

All the stuff we don’t know…  Revocation approaches  Policy languages  Standard profiles  Mobility  Path math  User interface

PKI and Higher Ed  ah, the public sector life…  Key issues  Current activities

ah, the public sector…  almost universal community of interests  cross-agency relationships  complex privacy and security issues  limited budgets and implementation options  sometimes ahead of the crowd and the obligation to build a marketplace

Key issues  trust relationships among autonomous organizations  interoperability of profiles and policies  interactions with J.Q. Public  international governance issues