HEPKI-TAG Activities January 2002 CSG Meeting Jim Jokl

Slides:



Advertisements
Similar presentations
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
Advertisements

May 06, 2002 Getting Started with Digital Certificates: Is PKI-Lite Real PKI? Internet2 Spring Meeting 2002 Wash, DC.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
1 HEPKI-TAG Update EDUCAUSE/Dartmouth PKI Summit July 26, 2005 Jim Jokl University of Virginia.
Lecture 23 Internet Authentication Applications
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Some Common Campus PKI Applications January 2004 CSG Meeting Jim Jokl.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Security Jonathan Calazan December 12, 2005.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
1 11 th Fed/Ed PKI Meeting Some quick updates from recent HEPKI-TAG and SURA work Jim Jokl
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Technical Issues that Challenge PKI Deployments Jim Jokl University of Virginia PKI Meeting August 12, 2004.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
1 PKI Update September 2002 CSG Meeting Jim Jokl
PKI 150: PKI Parts Policy & Progress Part 2 Jim Jokl University of Virginia David Wasley University of California.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Troubleshooting Windows Vista Security Chapter 4.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
HEPKI-TAG UPDATE Jim Jokl University of Virginia
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
CAMP PKI UPDATE August 2002 Jim Jokl
Co Chairs C. W. Goldsmith University of Alabama at Birmingham David L. Wasley University of California Office of the President.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
PKI Activities at Virginia September 2000 Jim Jokl
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 7 Planning and Deploying Messaging Compliance.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
PKI Session Overview 1:30 pm edt - Welcome, etiquette, session outline 1:40 pm edt - HEPKI-TAG Update (Jim Jokl, Virginia) 2:00 pm edt - HEPKI-PAG Update.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Some Technical Issues in PKI Deployment David Chadwick
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Fed/ED December 2007 Jim Jokl University of Virginia
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

HEPKI-TAG Activities January 2002 CSG Meeting Jim Jokl

HEPKI-TAG Activities Sponsors: I2, Educause, CREN, Charter – Technical Activities Group (TAG) –Certificate profiles, CA software –Private key protection –Mobility, client issues –Interactions with directories –Testbed projects –Communicate results

Survey of Anticipated Campus PKI Applications Schools participating in the HEPKI work were surveyed on anticipated uses for PKI on campus HEPKI-TAG PKI Applications Survey

Certificate Profile Work A per-field description of certificate contents –Standard and extension fields –Criticality flags –Syntax of values permitted per field Spreadsheet & text formatsSpreadsheettext Higher education profile repository –

Certificate Profiles Validity Period –Wide variation from per-session to one year –Long term: expiration synchronized to semester Some form of assurance level indicator –Explicit extension –Policy OID –In issuer field Key usage –Some certificates employ Key Usage field

PKI Complexity and Applications You often hear of PKI as a solution for: –Authentication for high-assurance processes Funds transfer Medical records Student grades –Digital signatures Contracts Other legal documents But, can’t it also be a good fit as a technology that is better than passwords but less than a high-assurance CA?

PKI-lite Project Premise: many useful PKI applications can be supported using a relatively simple PKI –Simplified policy & practices Do we have large complex policies and practices for we operate our existing systems? –Examples of existing campus assurance levels Passwords on large central systems ID card system

PKI-lite Project Assumptions Overarching goal – simplify –Use PKI technology with existing application policy and practices PKI-lite design objectives –S/MIME –Web authentication Specify as little as possible –But provide suggested answers and templates

PKI-lite Technical Assumptions Certificate revocation capability is up to the institution and is not required Key usage will not be specified No requirement for separate signing and encryption certificates No requirements for key escrow Fully on-line CAs are allowed. PKI-lite does not specify the level of protection for the campus CA Simplified user identity assurance

PKI-lite Certificate Profile Single common profile supporting –Web authentication –S/MIME Relatively stable –in final review since December PKI-lite Certificate Profile

S/MIME Testing Outlook, Outlook Express, Netscape –General interoperability OK at the level –Users can choose to sign, encrypt, or both –Clients use different certificate stores Certificate management issues Eudora with tumbleweed plug-in S/MIME support in other clients lacking

S/MIME Testing Outlook certificate quirk –Requires both signing and encryption certificates –So, watch key usage field Encryption issues –Folder storage Sent mail Inbox Folders –Private key backup and management Escrow Backup

S/MIME Testing Message forwarding to alternate inbox –Some mailers may tamper with the message contents Mailing list software –Conversion of tabs to spaces –Deletion of trailing blanks, tabs –List configuration options Opaque signing –A solution –Interoperability S/MIME & perfect privacy? – The address book problem

PKI-lite Campus Infrastructure Issue certificates –Contract with commercial CA –CA Software –Freely available certificates for testing Authentication for web applications –Many ways: mod_ssl & Apache S/MIME –Clients –Directory –Documentation & certificate management recommendations

HEPKI-Tag Projects and Demonstrations Certificate Profile Maker –Web interface –Generates XML HEPKI-CA –A demonstration CA PKI Authentication Demo –Accepts certificates from various participating schools Institutional root certificate repository –Download institutional/organizational root certificates

CA Private Key Protection Issues –CA Private Key is the root of all trust –Private key storage options Clear text storage on disk Encrypted storage on disk On hardware device –Physical protection of CA Locked doors and racks OS Configuration –Multi-level solutions –Jeff Schiller draft on TAG websitedraft

The Mobility Problem A definition: the ability to use the same cert/key-pair from multiple computers Some scenarios: –Move to a new computer –Users with work and home computers –Students and a public lab environment

The Mobility Problem Do mobility requirements depend on the application? –Web-auth and an on-line CA –S/MIME Mobility needs and assurance levels –Impact on non-repudiation? Solution space: hardware and software mechanisms

Hardware Tokens External hardware devices –Memory-only devices –Key-pair generation Private key import? –PIN protection scheme –Physical security –Provides dual-factor authentication –USB and various other reader interfaces

Hardware Token Examples: Smart Cards Default behaviors –Customized programming can change behavior Dual user/admin PIN systems –Card locks after x user-pin attempts –Fuse opens after y admin pin attempts Single PIN/Reinitialize systems –Card blocks after x user-pin attempts –Card can be reset back to factory state and reused

Software-based Solutions Issues –Overall level of protection –Authenticating the user –Non-repudiation? Floppy disk and import/export IETF SACRED SingleSignon.net

Discussions and projects HEPKI-TAG Website –Recommendations –Information for those starting on PKI References How-to information Certificate profiles Minutes and survey data –

Project Participation Much work remains –Research and recommendations –Pilot projects –Mobility –S/MIME Project –Consider participating in HEPKI-TAG if you are working on a PKI deployment

Where to watch middleware.internet2.edu PKI for Networked Higher – PKI Labs –middleware.internet2.edu/pkilabs