DSS and the use of separate (secure) signature creation devices.

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

Enabling Secure Internet Access with ISA Server
Digital Certificate Installation & User Guide For Class-2 Certificates.
Certification Test Tool Jon Wheeler Test Lead Microsoft Corporation.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Digital Certificate Installation & User Guide For Class-2 Certificates.
SOAP.
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Introduction to push technology © 2009 Research In Motion Limited.
Windows Communication Foundation and Web Services.
Hypertext Transfer Protocol Kyle Roth Mark Hoover.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Advanced Java Class Web Applications – Part 0 (Introduction)
Form Handling, Validation and Functions. Form Handling Forms are a graphical user interfaces (GUIs) that enables the interaction between users and servers.
CSCI 6962: Server-side Design and Programming
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Web server and web browser It’s a take and give policy in between client and server through HTTP(Hyper Text Transport Protocol) Server takes a request.
Course 201 – Administration, Content Inspection and SSL VPN
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Visual Signature Profile OASIS - DSS-X. Agenda General Requirements – Digital Signature operation Visual Signature content Verification Operation.
OASIS OASIS Digital Signature Services Juan Carlos Cruellas Juan Carlos Cruellas Andreas Kuehne Stefan Drees Ernst Jan van Nigtevecht.
Smart Card Single Sign On with Access Gateway Enterprise Edition
Web Service Standards, Security & Management Chris Peiris
A Scalable Application Architecture for composing News Portals on the Internet Serpil TOK, Zeki BAYRAM. Eastern MediterraneanUniversity Famagusta Famagusta.
Ken Dorsey KA8OAD. What is EchoLink? The simple answer is EchoLink software uses VoIP technology to link ham radio stations together around the world.
Comp2513 Forms and CGI Server Applications Daniel L. Silver, Ph.D.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
CSCI 6962: Server-side Design and Programming Introduction to AJAX.
Creating Signatures at User Agents Comparing Transport Bindings.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Enabling Embedded Systems to access Internet Resources.
Small Devices on DBGlobe System George Samaras Chara Skouteli.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Murach’s ASP.NET 4.0/VB, C1© 2006, Mike Murach & Associates, Inc.Slide 1.
1 Welcome to CSC 301 Web Programming Charles Frank.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
An XML based Security Assertion Markup Language
Web Services. Abstract  Web Services is a technology applicable for computationally distributed problems, including access to large databases What other.
Chapter 10 Intro to SOAP and WSDL. Objectives By study in the chapter, you will be able to: Describe what is SOAP Exam the rules for creating a SOAP document.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
Web Services Presented By : Noam Ben Haim. Agenda Introduction What is a web service Basic Architecture Extended Architecture WS Stacks.
ESafe Open Modules Overview Open modules implementing the eSafe document exchange protocol.
Creating Signatures at User Agents Comparing Transport Bindings.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Appendix E: Overview of HTTP ©SoftMoore ConsultingSlide 1.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Representational State Transfer (REST). What is REST? Network Architectural style Overview: –Resources are defined and addressed –Transmits domain-specific.
Web Technologies Lecture 8 Server side web. Client Side vs. Server Side Web Client-side code executes on the end-user's computer, usually within a web.
JS (Java Servlets). Internet evolution [1] The internet Internet started of as a static content dispersal and delivery mechanism, where files residing.
Web Server.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
Web Services An Introduction Copyright © Curt Hill.
Overview of Servlets and JSP
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
1 G52IWS: Web Services Description Language (WSDL) Chris Greenhalgh
Creating Signatures at User Agents Comparing Transport Bindings Version May 29, 2011.
Secure Mobile Development with NetIQ Access Manager
# # 0089CB # 00283C HEXRGB # COLOUR PALETTE TEXT COLOUR HEXRGB # FFFFFF 255 # # BFBFBF.
1 Seminar: Pervasive Computing 2004 Automatic mobile device configuration: Status & open challenges Stefan Hoferer Supervisor: Andreas Fasbender.
Open Solutions for a Changing World™ Eddy Kleinjan Copyright 2005, Data Access WordwideNew Techniques for Building Web Applications June 6-9, 2005 Key.
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
WEB API.
WEB SERVICES From Chapter 19, Distributed Systems
Presentation transcript:

DSS and the use of separate (secure) signature creation devices. Version June 9, 2011

Goal Enable DSS for use cases where the (secure) signature creation device is not part of the DSS service itself. Allow the client to specify the hash algorithm to be used.

Assumptions The OASIS DSS Core is used. A (Secure) Signature Creation Device is connected to a User-Agent or a (separate) User-Device. A User-Agent or User-Device may be equipped with a gradual set of signature-creation related functionality. For example ranging between: APDU (ISO 7816); IFD-Client (ISO/IEC 24727 / CEN 15480); Full OASIS DSS(-X) profiles; A User-Agent or User-Device may have limited software & performance capabilities and hence may be supported by a Digital Signature Service to handle the complexities of the signature creation if it cannot manipulate the document itself.

Assumptions A User-Agent or User-Device will always initiate the transaction and acts as an HTTP-client. A document may remain on the client or server side or transferred from one side to the other. The default Use Case of DSS will not be shown (DSS req/resp with document as a parameter). Variants of the default Use Case are explored instead.

Some Terminology Terminology userID: a way to identify a user; docRef: a reference to a document (url) for retrieval; Currently, DSS only supports a reference to the document inside the request structure. Therefore, a docRef only makes sense if the document is located elsewhere (not on the requesting client or DSS server). docID: a way to identify a document by a user, in a user friendly manner; digest: the hash of the document used for the signature creation (the calculation of the hash value depends on the type of document, for instance XML, PDF or ‘binary’); digestSignature: the ‘raw’ signature of the digest; hashAlg: the hash algorithm to be used (or that has been used);

Use Case 1 Actor System Basic Restriction(s) Goal An End-User. A User-Agent (the ‘client’) with a (secure) signature creation device, (S)SCD, connected to a Service (the ‘server’). Basic Restriction(s) Communication between the client (the User-Agent) and the server (the Service) is always initiated by the client. Goal By using a Digital Signature Service an end-user signs a document (located at the client or at the server) with the (S)SCD at the User-Agent.

Use Case 1 Basic Flow Example The End-User calls a Service by means of the User-Agent. The End-User selects a document by means of the Service. The End-User requests a signing operation for the document by means of the Service. The User-Agent asks the user for a PIN or Password. The End-User enters the PIN or Password. The User-Agent creates the signature using the (Secure) Signature Creation Device. The User-Agent shows the signed document. Example A user signs a document, opened in a web browser (running at a PC) by means of a web application, using a smartcard/usb-token connected to the PC. A user signs a document with an app on the iPhone using a certificate installed on the SIM-card at the same iPhone.

Variants Use Case 1 Use Case 1a – Smart User-Agent The User-Agent implements a Digital Signature Service. The document is at the server. Use Case 1b – Simple User-Agent The User-Agent is NOT capable of implementing a Digital Signature Service. Instead, the User Agent implements an IFD or an APDU interface. A server that is used by the User-Agent (the client) for ‘business’ functionality and for Digital Signature Service functionality. The document is at the client (User-Agent) and is transferred to server. Use Case 1c – Simple User-Agent Like Use Case 1b, but the document stays at the client.

Authentication: actually a part of the middelware. Sequence Diagram Use Case 1a – Smart User-Agent (S)SCD User Agent Server Select document(userID, docRef) Sign document(userID, docRef, docID) Authentication: actually a part of the middelware. Expecting DSS request DSS-signRequest(userID, doc, docID, hashAlg) Calculate digest based on hashAlg (as well as document type) Show docID DSS Implementation User PIN Entry Sign-APDU Sign digest PKCS#1-Signature DSS-signResponse Signed Document

Sequence Diagram Use Case 1b – Simple User-Agent (document transfer) (S)SCD User Agent Server Sign document(userID, docRef, docID) DSS-signRequest(userID, doc, docID, hashAlg) Calculate digest getSignature(userID, docID, digest) Show docID User PIN Entry DSS Implementation Sign-APDU Sign digest PKCS#1-Signature getSignature response DSS-signResponse Signed Document

Sequence Diagram Use Case 1c – Simple User-Agent (no document transfer) (S)SCD User Agent Server Sign document(userID, docRef, docID) Calculate digest DSS-signRequest(userID, docID, hashAlg, digest) getSignature(userID, docID, digest) Show docID User PIN Entry DSS Implementation Sign-APDU Sign digest PKCS#1-Signature getSignature response DSS-signResponse Signed Document

Sequence Diagram Use Case 1d – Simple User-Agent (document elsewhere) (S)SCD User Agent Server DMS Select document(userID, docRef) DSS-signRequest(userID, docRef, docID, hashAlg) getDocument(userID, docRef) Calculate digest getSignature(userID, docID, digest) Show docID DSS Implementation User PIN Entry Sign-APDU Sign digest PKCS#1-Signature getSignature response DSS-signResponse Signed Document

Use Case 2 Actor System Basic Restriction(s) Goal An End-User. A User-Agent without a signature creation device, connected to a Service (the ‘server’). Another User-Device is used for the (secure) signature creation device. Basic Restriction(s) Communication between the client (the User-Agent) and the server (the Service) is always initiated by the client. Goal By using a Digital Signature Service an end-user signs a document (located at the client or at the server) with the (S)SCD at the User-Device.

Use Case 2 Basic Flow Example The End-User calls a Service by means of the User-Agent. The End-User registers his/her User-Device at the Service (specifying device type and address). The End-User selects a document by means of the Service. The End-User requests a signing operation for the document by means of the Service. (The Service requests a signature creation operation at the User-Device.) The User-Device shows an identification of the request and asks the user for a PIN or Password. The End-User verifies if it is the right identification and enters the PIN or Password at the User-Device. The User-Device creates the signature using the (Secure) Signature Creation Device. The End-User views the signed document. Example A user initiates a signature operation for a document with an app on his/her iPad, using a certificate installed on the SIM-card at his/her iPhone.

Variants Use Case 2 Use Case 2a – Smart User-Device The User-Device implements a Digital Signature Service. The document is at the server and transferred to the User-Device. Use Case 2b: Like Use Case 2a, but the document stays at the server. Use Case 2c – Simple User-Device The User-Device is NOT capable of implementing a Digital Signature Service. Instead, the User-Device implements an IFD or an APDU interface. A server that is used by the User-Agent (the client) for ‘business’ functionality and for Digital Signature Service functionality. The document is at the client (User-Agent) and is transferrer to the server. Use Case 2d: Like Use Case 2b, but the document stays at the client.

Sequence Diagram Use Case 2a – Smart User-Device (document transfer) Agent Server User Device (S)SCD Sign document(userID, docRef, docID) Get document DSS-signRequest(userID, doc, docID, hashAlg) Calculate digest Show docID User PIN Entry DSS Implementation Sign-APDU Sign digest PKCS#1-Signature DSS-signResponse Signed Document

Sequence Diagram Use Case 2b – Smart User-Device (no document transfer) Agent Server User Device (S)SCD Sign document(userID, docRef, docID) Get document Calculate digest DSS-signRequest(userID, docID, hashAlg, digest) Show docID User PIN Entry DSS Implementation Sign-APDU Sign digest PKCS#1-Signature DSS-signResponse Signed Document

Sequence Diagram Use Case 2c – Simple User-Device (document transfer) Agent Server User Device (S)SCD DSS-signRequest(userID, doc, docID, hashAlg) Calculate digest getSignature(userID, docID, digest) Show docID DSS Implementation User PIN Entry Sign-APDU Sign digest PKCS#1-Signature getSignature response DSS-signResponse

Sequence Diagram Use Case 2d – Simple User-Device (no document transfer) Agent Server User Device (S)SCD Calculate digest DSS-signRequest(userID, docID, hashAlg, digest) getSignature(userID, digest, docID) Show docID DSS Implementation User PIN Entry Sign-APDU Sign digest PKCS#1-Signature getSignature response DSS-signResponse

Transport Bindings A transport binding is ‘orthogonal’ to the actual DSS protocol. Point of attention: Handling a request/response from the server to the client. Possible Transport Bindings: PAOS, reverse SOAP. Two separate HTTP Req/Res (from client to server) encapsulate a single Req/Resp from the server to the client. AS4 / ebMS v3, using the PULL-mode. REST Next slides use the Use Case sequence diagrams, addressing the transport binding.

PAOS Basic Flow (Client) Reverse-Request Reverse-Response

ebMS “PULL” Basic Flow Client Server Reverse-Request Reverse-Response MSH MSH PULL() Reverse-Request Request PUSH(Response) Reverse-Response

TO DO TO DO REST Basic Flow Client Server Reverse-Request Reverse-Response

Use of PAOS / ebMSv3 Both PAOS and ebMSv3 enable the use of reverse req/resp between client and server. The next slides indicate the location of these ‘reverse’ request/response (being PAOS or ebMSv3).

Sequence Diagram Use Case 1a – Smart User-Agent (S)SCD User Agent Server Select document(userID, docRef) Sign document(userID, docRef) Expecting DSS request DSS-signRequest(userID, doc) Reverse-Request Calculate Hash User PIN Entry DSS Implementation Sign-APDU Sign Hash PKCS#1-Signature DSS-signResponse Reverse-Response Signed Document

Sequence Diagram Use Case 1b – Simple User-Agent (S)SCD User Agent Server Select document(userID, docRef) DSS-signRequest(userID, doc) Calculate Hash getSignature(userID, docRef, hash) Reverse-Request User PIN Entry DSS Implementation Sign-APDU Sign Hash PKCS#1-Signature getSignature response Reverse-Response DSS-signResponse Signed Document

Sequence Diagram Use Case 2a – Smart User-Device Agent Server User Device (S)SCD Sign document(userID, docRef) Notification? DSS-signRequest(userID, doc) Reverse-Request Calculate Hash User PIN Entry DSS Implementation Sign-APDU Sign Hash PKCS#1-Signature DSS-signResponse Reverse-Response Signed Document

Sequence Diagram Use Case 2b – Simple User-Device Agent Server User Device (S)SCD Select document(userID, docRef) DSS-signRequest(userID, doc) Calculate Hash Notification? getSignature(userID, docRef, hash) User PIN Entry DSS Implementation Reverse-Request Sign-APDU Sign Hash PKCS#1-Signature getSignature response Reverse-Response DSS-signResponse

Finding 1 In case of a full DSS implementation at the client-side (user agent or user device) a reverse DSS request/response binding is required in case the signature creation is initiated from the server-side. Bindings: PAOS, ebMSv3, REST. Use Cases 1a, 2a, 2b.  Should the reverse binding become part of the DSS profiles? PAOS: Yes/No ebMSv3: Yes/No REST: Yes/No Note: If the whole process is initiated (from the client-side) by means of a blocking http req/resp, the client must be able to handle the reverse req/resp in parallel.

Finding 2 In case of a full DSS implementation at the server-side a reverse request/response binding is required for the signature creation request to the User-Agent or User-Device. The signature creation request is not a DSS request; see the ‘getSignature’ in the use cases. The reverse binding is not part of the DSS req/respbinding; it is used by the DSS implementation. Does DSS know where to get the signature from? Bindings: PAOS, ebMSv3, REST. Use Cases 1b, 1c, 2c, 2d. Therefore, can be left ‘out of scope’ regarding the DSS protocol. But there is a need to specify how to get the signature.  Should the DSS sign request be extended to specify a location for the signature creation device? Yes/No

Finding 3 The Use Cases specify a number of arguments, not yet part of the DSS sign request (such as hashAlg and digest).  Should the following parameters be added to the DSS core as part of the sign request (response)? hashAlg  Yes/No digest  Yes/No signatureValue Request: Yes/No; Response: Yes/No docID Yes/No docRef

Finding 4 The Use Cases show the use of the ‘getSignature’ functionality. This can be any proprietary or already standardized protocol, such as: ISO/IEC 24727 / CEN 15480 (based on DSS!) ISO/IEC 7816  Should the DSS (core) be extended to standardize the ‘getSignature’ functionality? Yes/No Note: If the DSS req/resp is extended especially with the signatureValue in the response, it will standardise the ‘getSignature’ functionality...

Finding 5 The Use Cases show the use of the ‘getSignature’ functionality. This can be any proprietary or already standardized protocol, such as: ISO/IEC 24727 / CEN 15480 (based on DSS!) ISO/IEC 7816  Should the DSS (core) be extended to standardize the ‘getSignature’ functionality? Yes/No Note: If the DSS req/resp is extended especially with the signatureValue in the response, it will standardise the ‘getSignature’ functionality...

An Example Application Belgium eID

Document is at the relying party. Sequence Diagram Use Case 1d – Simple User-Agent (document elsewhere) (S)SCD Client Browser Relying Party eID DSS Select document(userID, docRef) Document is at the relying party. A HTTP POST Redirect Sign document(userID, docRef, docID) DSS-signRequest(userID, doc, docID, hashAlg) Calculate digest getSignature(userID, docID, digest) Reverse-Request Show docID User PIN Entry DSS Implementation Sign-APDU Sign digest PKCS#1-Signature getSignature response Reverse-Response DSS-signResponse Signed Document

Notes The exact HTTP POST/Redirect needs more details... Not sure if this works...