A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
CP3397 ECommerce.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Cryptography and Network Security Chapter 17
Online Security Tuesday April 8, 2003 Maxence Crossley.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Chapter 8 Web Security.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Cryptography 101 Frank Hecker
CSCI 6962: Server-side Design and Programming
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure Electronic Transaction (SET)
Masud Hasan Secue VS Hushmail Project 2.
Secure Socket Layer (SSL)
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Authentication 3: On The Internet. 2 Readings URL attacks
CSE 543 Computer Security: Risks of PKI - Josh Schiffman & Archana Viswanath Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Signatures and Digital Certificates Monil Adhikari.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
SSL Certificates for Secure Websites
Cryptography and Network Security
Cryptography and Network Security
Using SSL – Secure Socket Layer
Cryptography and Network Security
Cryptography and Network Security
X-Road as a Platform to Exchange MyData
Cryptography and Network Security
Presentation transcript:

A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki

The Problem Vendor reputation –this vendor meets high standards Site authenticity – this is the vendor’s web cite Page integrity –this is the vendor’s web page Non-repudiation

PKI The originator has a private key The receiver has the originator’s public key and uses it to verify data sent from the originator The receiver verifies the originator’s public key with the stored public key of a well known certification authority

PKI Verification The user can verify that: The public key was issued by the certificate authority (or an agent thereof) The public key was bound to the name (and URL domain) of the originator The public key was bound to a period of validity (that includes today)

Current Practice Vendor purchases a certificate The CA (i.e. Verisign) checks vendor bone fides –Purchaser has valid business license –Purchaser owns domain name –Issues vendor a Digital ID Vendor attaches Digital ID to pages –ID includes rooted chain of signed keys

Current Weaknesses Business could display Verisign-like seal but not use their certificates* Business could register with misleading name or URL (visual inspection only!) –amazon.tv or a common mistyping User could be tricked into accepting untrusted certification authority key No assurance for unknown businesses

Other Threats Hacked pages on vendor site Domain name spoofing by poisoning DNS caches with bad IP address (DNS and DHCP don’t use authentication) A CA gives CA authority to a non- trustworthy individual Non-trustworthy employee of a CA

Naïve Users? Even for obvious spoofs: Navigate menus for certificate info –under file->properties in IE –under view->page_info in Netscape) Displayed info has limited value –Go to the myFAU login page and try to find something that positively identifies them.

The Threat If a web page asks you for a password or account information, how do you know you can trust it? How do you know who they are? Even if you know who they are, how do you know you can trust them? How does your mother know?

Our Proposal Use a trusted third party to perform all verifications and provide assurances Overcomes most weaknesses in the current practice Does not require modification to web, browsers, or CA standards

3 rd Party Vendor Registration 1.Vendor registers with 3 rd party (e.g., BBB) 2.3 rd party tracks vendor reputation 3.Vendor gets PKI ID key pair and 2nd key for private exchange with 3 rd Party 4.Vendor makes modifications to web site to support verification

3 rd Party User Registration 1.User contacts third party (e.g. BBB) (i.e., long before contacting vendors) 2.User establishes validity of 3 rd party in the usual way 3.User gives Trusted 3 rd Party (T3P) a secret string (e.g., “my dog has fleas”) User’s T3P secret cannot be found by trial and error attack – only user verifies it

Web Site Verification 1.User visits web page of a vendor 2.Vendor page displays seal of T3P Seal has hyperlink with encrypted page URL 3.User clicks seal, goes to T3P over SSL 4.T3P verifies vendor & URL 5.User sees 2 nd page with info & secret 6.User clicks (or redirected) to verified URL, in case seal copied to other URL

Site Assurance 3 rd PartyUserVendor fetch page fetch assurance refetch page page assurance + URL

Site & Content Verification 1.User visits web page of a vendor 2.Vendor page displays seal of T3P Seal has hyperlink, encrypted URL+session* 3.User clicks seal, goes to T3P over SSL 4.T3P verifies vendor & URL 5.T3P fetches page & verifies signature 6.User sees 2 nd page with T3P secret 7.User clicks (or redirected) to verified URL

(Session Info) Page could be dynamically generated with session and/or user cookie info Session and user specific info not available from T3P must be included (encrypted) as parameters to T3P URL Vendor must support two modes of page generation to allow request from vendor to match that from user

Content Assurance 3 rd PartyUserVendor fetch page fetch assurance fetch page page assurance + URL refetch page page

Proxy Auto Verification 1.User visits web page of a vendor 2.Vendor page displays seal of T3P Seal has hyperlink, encrypted URL/session info 3.User clicks seal, goes to T3P over SSL 4.T3P verifies vendor & URL 5.T3P fetches & verifies page signature 6.User sees frame with T3P secret 7.User gets verified page from T3P

Non-repudiation 1.User visits web page of a vendor 2.Vendor page displays seal of T3P Seal has hyperlink, encrypted URL/session info 3.User clicks seal, goes to T3P over SSL 4.T3P verifies vendor & URL 5.T3P fetches & verifies page signature 6.User sees frame with T3P secret 7.User gets verified page signed by T3P

Proxy & Non-repudiation 3 rd PartyUserVendor fetch page fetch assurance fetch page page assurance + page

T3P Session Proxy Extension to proxy or non-repudiated Send all subsequent user requests from page directly through T3P All hyperlinks on page have T3P’s URL –Links can be recrafted by T3P –or by vendor (but checked by T3P) Both parties can get T3P signed pages

(Cookies) During the proxied session, the vendor’s cookie on the user’s client does not come into play. At the end of the session, a final step must transfer the session info back to the vendor directly from the user to update the cookie

Session Proxy 3 rd PartyUserVendor fetch page start session fetch page page assurance + page next request fetch page page assurance + page finish cookie

(Included Images) If vendor includes content from other sites Vendor must provide signed versions of all content Providers of included content must have their own vendor relationship with T3P T3P marks parts of page, displayed to user, that are not verifiable