Dane?. Enough said? No? The Longer Version… https://www.flickr.com/photos/hyper7/7287993694.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
PKI To The Masses IPCCC 2004 Dan Massey USC/ISI. 1 March PKI Is Necessary l My PKI related actions since arriving at IPCCC n Used an.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
The Inconvenient Truth about Web Certificates Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jean-Pierre Hubaux June 2011, WEIS’11.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Measuring DANE TLSA Deployment Liang Zhu 1, Duane Wessels 2, Allison Mankin 2, John Heidemann 1 1. USC ISI 2. Verisign Labs 1.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
1 DNSSEC at ESnet ESCC/Internet2 Joint Techs Workshop July 19, 2006 R. Kevin Oberman Network Engineer Lawrence Berkeley National Laboratory.
Introduction to Information Security SSL & TLS Story of a protocol Itamar Gilad (infosec15 at modprobe dot net)
TELE 301 Lecture 11: DNS 1 Overview Last Lecture –Scheduled tasks and log management This Lecture –DNS Next Lecture –Address assignment (DHCP)
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Olaf M. Kolkman. Domain Pulse, February 2005, Vienna. DNSSEC Basics, Risks and Benefits Olaf M. Kolkman
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Security Through Publicity Eric Osterweil Dan Massey Batsukh Tsendjav Beichuan Zhang Lixia Zhang.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
How to use DNS during the evolution of ICN? Zhiwei Yan.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Infrastructure (PKI) Chien-Chung Shen
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Web SecurityIdentity Verification Services Signing Services Enterprise Security © 2007 GeoTrust, Inc. All rights reserved. How SSL is Changing to Increase.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Creating and Managing Digital Certificates Chapter Eleven.
Using Public Key Cryptography Key management and public key infrastructures.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
EMU and DANE Jim Schaad August Cellars. EMU TLS Issues Trust Anchor Matching PKIX cert to EMU Server Name Certificate Revocation Checking – CRLs – OCSP.
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Grades update. Homework #1 Count35 Minimum Value47.00 Maximum Value Average
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Let’s Encrypt and DANE ENOG 11 | Moscow | 8 Jun 2016.
Why Dane? Geoff Huston Chief Scientist, APNIC. Security on the Internet How do you know that you are going to where you thought you were going to?
Geoff Huston Chief Scientist, APNIC
Key management issues in PGP
Setting and Upload Products
SSL Certificates for Secure Websites
Cryptography and Network Security
Using SSL – Secure Socket Layer
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

Dane?

Enough said?

No?

The Longer Version…

A Certificate Authority

A Bankrupt Certificate Authority

International Herald Tribune Sep 13, 2011 Front Page Front-Page News

What went wrong? Operation%20Black%20Tulip%20v1.0a.pdf

Online Certification Authority Server Compromise Multiple hacker tools on the servers Specialized PKI scripts Incomplete audit trails Fake certificate issued for *.google.com Fake certificate private key published Iran users of gmail are compromised by a mitm attack

Fake certificate issued for *.google.com Fake certificate private key published Any attacker-in-the-middle can intercept a connection request for mail.google.com, and initiate a “secure” connection using the fake certificate, and your browser could be fooled into believing that this was the genuine server! + =

Fake certificate issued for *.google.com Fake certificate private key published Any attacker-in-the-middle can intercept a connection request for mail.google.com, and initiate a “secure” connection using the fake certificate, and your browser could be fooled into believing that this was the genuine server! + = Was this a one- off? Or are there implications for the larger issue of our security framework on the Internet?

So much of the Internet relies on trust in security offered by domain name certs

But this is just not good enough

Two problems: 1. I may not have landed up where I wanted to be: DNS cache poisoning DNS resolver compromise Local host compromise Routing compromise 2. The domain name certificate may be fake The combination of the two implies that I, and the browser I use, may not even notice that we have been mislead. This is bad.

The 2011 mitm attack was evidently performed by a state-based organisation in Iran, with direct access to national infrastructure, exploiting a fake cert issued by a compromised CA You don’t need to be the NSA or its equivalent to play this game – this form of attack would work at any scale. Either the attacker is already on path to the intended site, or the attacker can use access to routing to inject routes that direct the data flows to the attack point How could it happen?

Why could it happen? The TLS session cannot say WHICH CA is to be used to validate the server certificate Your browser will allow ANY CA to be used to validate a digital signature Compromised CAs imperil the entire framework of security!

This is broken! Domain Name certification should use trust and integrity of operation as a differentiator If you pay more money you would expect to use a service that operates with greater levels of care and data protection of your data and users of your service would be “more secure” – right? But a compromised CA can issue a domain name certificate for ANY domain name If you trust this compromised CA then you are going to trust its products The entire Domain Name CA operation is only as good as the worst CA! It does not matter what CA service you use, because any compromised CA can compromise users of your service

Lets take a step back and talk about PKI

The role of a CA: 3rd party trust broker SubjectRequestsSubjectRequests RA performs checks RA tells CA to sign Browser trusts CA signed certificates

Browser trusts ~60 CAs And therefore ~1500 Subordinate CAs (~651 organizations) And therefore ~1500 Subordinate CAs (~651 organizations) See the EFF SSL observatory SSLiverse.pdf

SustainableSustainable TrustedTrusted OpenOpen ResilientResilient PrivacyPrivacy what succeeds in the market? Cheap!Cheap! SecureSecure In a commercial world...

An important motivation for using digital certificates with SSL was to add trust to online transactions by requiring website operators to undergo vetting with a certificate authority (CA) in order to get an SSL certificate. However, commercial pressures have led some CAs to introduce "domain validation only" SSL certificates for which minimal verification is performed of the details in the certificate. Most browsers' user interfaces did not clearly differentiate between low-validation certificates and those that have undergone more rigorous vetting. Since any successful SSL connection causes the padlock icon to appear, users are not likely to be aware of whether the website owner has been validated or not. As a result, fraudsters (including phishing websites) have started to use SSL to add perceived credibility to their websites. By establishing stricter issuing criteria and requiring consistent application of those criteria by all participating CAs, EV SSL certificates are intended to restore confidence among users that a website operator is a legally established business or organization with a verifiable identity. Some CAs don’t apply rigorous identity checks to issued domain name validation certificates

All these CA worker bees and all these manual checks are a tad expensive And the certificate market is undifferentiated Reduce CA costs through automation of the process

DV Domain Validation DV Subject: Please sign certificate for “example.com” “example.com” RA sends a mail to well When mail returned CA will sign

DV Domain Validation DV Subject: Please sign certificate for Example.com Example.com RA sends a mail to well When mail returned CA will sign All these checks are based on information fetched from the DNS Hold that thought!

An important motivation for using digital certificates with SSL was to add trust to online transactions by requiring website operators to undergo vetting with a certificate authority (CA) in order to get an SSL certificate. However, commercial pressures have led some CAs to introduce "domain validation only" SSL certificates for which minimal verification is performed of the details in the certificate. Most browsers' user interfaces did not clearly differentiate between low-validation certificates and those that have undergone more rigorous vetting. Since any successful SSL connection causes the padlock icon to appear, users are not likely to be aware of whether the website owner has been validated or not. As a result, fraudsters (including phishing websites) have started to use SSL to add perceived credibility to their websites. By establishing stricter issuing criteria and requiring consistent application of those criteria by all participating CAs, EV SSL certificates are intended to restore confidence among users that a website operator is a legally established business or organization with a verifiable identity. Not everyone Is honest! Not everyone Is honest!

Rogue Certificate Counter Measures BlacklistingBlacklisting WhitelistingWhitelisting CRLCRL OCSPOCSP Doesn’t scale well Only available when compromise is known to have happened Relies on OCSP use! Doesn’t scale well Only available when compromise is known to have happened Relies on OCSP use! Extended Validity DV-EV distinction cannot be made reliably without external knowledge

HSTSHSTS Leap of Faith Or use an alternative infrastructure What if you know before starting the TLS/SSL session that a certain certificate is to be expected? What if you know before starting the TLS/SSL session that a certain certificate is to be expected? WhitelistingWhitelisting

Domain Name System Independent Hierarchical Registration One root Scalable and Global Namespace maps 1:1 to PKI Use

DANE DNS-Based Authentication of Named Entities How to represent and authenticate “named entities” in the DNS, using DNSSEC Web Sites addresses Jabber IDs RFC 6394 RFC 6698

CA Cert EE Cert Trust Anchor RFC6394: TLSA RR

Valid CERTs and/or CAs are stored in the the DNS If DANE provides the CA’s identity, then DANE offers the protection that you are looking at a valid EV Certificate issued by the CA that performed the EV validation checks in the first place CA compromise then has limited liability to those certificates issued by the compromised CA i.e. your service is compromised only if your chosen CA is compromised!

Valid CERTs and/or CAs are stored in the the DNS If the DNS provides the EE cert, then DANE offers the protection that you are looking at a valid Certificate issued by the entity that holds the domain name in the first place Name Certificate publication is controlled by the zone authority – no CA intermediary is needed Security is “free” Security is “free” Name Certificate publication is controlled by the zone authority – no CA intermediary is needed Security is “free” Security is “free”

How does DNSSEC get into the picture?

DANE assumes a DNS that operates with integrity Is the certificate provided in a TLSA response genuine? To answer that you need to be able to validate the DNS response And to do that you need DNSSEC

DV Domain Validation DV All these checks are based on information fetched from the DNS Did you keep this thought? 0wn the DNS and the DV is yours Obtaining Rogue (DV) Certificates

DANE has the potential to solve important PKI/TLS problems in securing access to named entities And for DANE to work then DNSSEC is necessary

How are we going with DNSSEC?.. High levels of DNSSEC Use seen in Africa, Eastern and Northern Europe 11% of users send their DNS queries to DNSSEC- validating resolvers

Why invest in DNSSEC? Because the DNS represents a major point of vulnerability in today’s networks Cyber attacks are no longer just a teenage hobby or even petty crime Attacks on the DNS are highly effective for all kinds of reasons!

this is just not good enough any more

What needs to happen? The local name management infrastructure should support the use of DNSSEC in all aspects of name management

What needs to happen? The local name management infrastructure should support the use of DNSSEC in all aspects of name management ISPs should add DNSSEC validation to their forwarding resolvers

What needs to happen? The local name management infrastructure should support the use of DNSSEC in all aspects of name management ISPs should add DNSSEC validation to their forwarding resolvers And if you want to push it a bit in the right direction... For secure named services using a domain name certificate, add the Issuer’s public CA cert as a DANE record into your DNSSEC-signed zone

That’s it!