Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Report on Attribute Certificates By Ganesh Godavari.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Lecture 23 Internet Authentication Applications
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
SEVA: Securing Extranets Yves ROUDIER, Refik MOLVA Institut Eurécom
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Introduction To Windows NT ® Server And Internet Information Server.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
K21 and Automation System Architecture Matthew Burnside MIT Laboratory for Computer Science January 8, 2002 Jointly with: Dwaine Clarke,
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Chapter 10: Authentication Guide to Computer Network Security.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
L C SL C S Security Research in Project Oxygen Srini Devadas Ronald L. Rivest Students: Burnside, Clarke, Gassend, Kotwal, Raman Oxygen Visitors: Marten.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
Digital Signatures, Message Digest and Authentication Week-9.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
SDSI -- A Simple Distributed Security Infrastructure by Ronald L. Rivest MIT Lab for Computer Science (joint work with Butler Lampson)
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Integrating Access Control with Intentional Naming Sanjay Raman MIT Laboratory for Computer Science January 8, 2002 With help from: Dwaine.
SDSI -- A Simple Distributed Security Infrastructure by Ronald L. Rivest MIT Lab for Computer Science (joint work with Butler Lampson)
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Integrating Access Control with Intentional Naming Sanjay Raman MIT Laboratory for Computer Science January 8, 2002 With help from: Dwaine.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Radius, LDAP, Radius used in Authenticating Users
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
SPKI/SDSI 2.0 A Simple Distributed Security Infrastructure
Information Security message M one-way hash fingerprint f = H(M)
Security, Devices and Automation Research in Oxygen
Presentation transcript:

Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald Rivest

Problem Description SPKI/SDSI Introduction Name Certificate Authorization Certificate Proxy-to-Proxy protocol Examples Status Questions Overview

Problem: Proxy to Proxy Security K21 Proxy Scripting K21 VCR Proxy SPKI/SDSI Over SSL/TLS SPKI/SDSI Over SSL/TLS RoutingName Resolution All proxies talk to each other with the same protocol

SPKI/SDSI Introduction (Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure) Build secure distributed computing systems Access control over the network Simple, flexible, trust policy model with specific authorizations Fine-grained access control Scalable infrastructure

SPKI/SDSI Introduction (Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure) Designed by Ron Rivest, Butler Lampson and Carl Ellison Each public key is a CA Name certificate: defines a name in issuer’s name space Authorization certificate: grants a specific authorization from issuer to subject

SPKI/SDSI: Name Certificates Local name spaces Groups Traditional: {MIT Dave_Brown, K DB } K MIT SPKI/SDSI: {K c friends, K d } K {K c friends, K e } K {K c friends, K f } K If ‘K c friends’ is on an ACL, K d, K e and K f are allowed to access the object. c c c

SPKI/SDSI: Name Certificate (cert (issuer (name (public-key (rsa-pkcs1-md5 (e #23#) (n |AMMgMuKpqK13pHMhC8kuxaSeCo+yt8TadcgnG8bEo+erdrSBveY3C MBkkZqrM0St4KkmMuHMXhsp5FX71XBiVW1+JGCBLfI7hxWDZCxGTMg bR4Fk+ctyUxIv3CQ93uYVkg9ca6awCxtS0EI7sLuEB+HKuOLjzTsH+ +Txw9NAHq4r|))) friends)) (subject (public-key (rsa-pkcs1-md5 (e #23#) (n |AKg3tOzoJ5PGQ5q9jzxzwxE8o6bIZ6/cE8gEL+1xJa23viE3bz68ru hpD5muqJ+uyDCNxgAZ0JVXJazmX1QjiGudj9kEmuni8gJRLZRu0T5E3 K7OU2dodu0kdDg32kym7+ooZNe/F0zWGekfESeezyQ25kvNO3XQvMHX afWcYjRw|)))))

SPKI/SDSI: Authorization Model Simple trust policy model Authorizations specified in flexible, user- defined tags Authorizations can be defined as specific or as general as the user desires Delegation (specific)

SPKI/SDSI: Authorization Certificate (cert (issuer (public-key (rsa-pkcs1-md5 (e #23#) (n |AMMgMuKpqK13pHMhC8kuxaSeCo+yt8TadcgnG8bEo+erdrSBveY3C MBkkZqrM0St4KkmMuHMXhsp5FX71XBiVW1+JGCBLfI7hxWDZCxGTMg bR4Fk+ctyUxIv3CQ93uYVkg9ca6awCxtS0EI7sLuEB+HKuOLjzTsH+ +Txw9NAHq4r|)))) (subject (public-key (rsa-pkcs1-md5 (e #23#) (n |AKg3tOzoJ5PGQ5q9jzxzwxE8o6bIZ6/cE8gEL+1xJa23viE3bz68ru hpD5muqJ+uyDCNxgAZ0JVXJazmX1QjiGudj9kEmuni8gJRLZRu0T5E3 K7OU2dodu0kdDg32kym7+ooZNe/F0zWGekfESeezyQ25kvNO3XQvMHX afWcYjRw|)))) (tag (http (* set GET POST) (* prefix (propagate))

(tag (http (* set GET POST) (* prefix SPKI/SDSI: Tag Intuitively, a tag is a set of requests.

Proxy to Proxy Alice (Client Proxy)Bob (Server Proxy) D a (private key) E a (public key) Alice’s client certs List of CA certs D b (private key) E b (public key) ACL Server certs Set up SSL connection: Server auth Session key for privacy Freshness Protection from MIM Initialization:

Proxy to Proxy Case 1: user’s key is directly on the ACL Alice (Client)Bob (Server) D a (private key) E a (public key) Alice’s client certs List of CA certs D b (private key) E b (public key) ACL Server certs [tag] Da Response ACL: {E c, E b, E a}

Proxy to Proxy Alice (Client Proxy)Bob (Server Proxy) D a (private key) E a (public key) Alice’s client certs List of CA certs D b (private key) E b (public key) ACL Server certs [tag] Da Rejected: [tag] Da, certs ACL Case 2: user’s key is “indirectly” on the ACL Client performs certificate chain discovery. Server verifies certificate chain. ACL: {‘E b friends’}

Certificate Chaining Example Bob’s ACL says only MIT faculty are allowed to access his server. Alice’s first request is simply signed with Alice’s key, and Bob rejects this request. Alice’s second request contains a chain consisting of the following certificates: –A certificate saying she is an LCS Professor –A second certificate saying LCS Professors are MIT faculty

Certificate Chain Discovery (Client Proxy) Derive certificate chains Input: device’s ACL, requestor’s public key, requestor’s set of signed certificates, tag Output: a chain of certificates leading from an entry on the ACL to the requestor’s public key. (The certificate chain consists of signed certificates. It proves that the requestor is authorized to perform the tag’s operations on the device.) * Recall, intuitively, a tag is a set of requests.

Certificate Chain Verification (Server Proxy) Verify certificate chains Input: device’s ACL, requestor’s public key, requestor’s certificate chain, tag Output: 1 if certificate chain proves that the public key is authorized to perform the tag’s operations on the device; 0 otherwise.

Proxy to Proxy Alice (Client Proxy)Bob (Server Proxy) D a (private key) E a (public key) Alice’s client certs List of CA certs D b (private key) E b (public key) ACL Server certs [tag] Da Rejected: [tag] Da, certs ACL Case 2 revisited user’s key is “indirectly” on the ACL Signed request provides proof of authenticity of the request Certificate chain provides proof that the request is authorized

Example: Public resource Mary wants to turn on/off a public light switch. 1.Mary sends request (either signed or unsigned) via her proxy to the light switch’s proxy. [tag] Dm Light switch’s proxy may require requests to be signed for auditing purposes. “ok” 2.Light switch’s proxy has no ACL. It honors Mary’s request.

Example: user’s key directly on ACL Mary wants to log into an account on a dialup machine. ACL: {E c, E f, E m} 1.Mary sends signed request via her proxy to the dialup’s proxy. [tag] Dm “ok” 2.Dialup’s proxy has an ACL which contains Mary’s public-key. It checks the signature on Mary’s request, and honors Mary’s request to login if the signature verifies.

Example:user’s key is indirectly on ACL Mary wants to play music on John’s speaker. ACL: {‘E j friends’} 1.Mary sends signed request via her proxy to John’s speaker’s proxy. [tag] Dm “ok” 4.John’s speaker’s proxy verifies second request. [tag] Dm, cert chain 3.Mary’s proxy uses the Cert Chain Discovery Algorithm to derive a chain of certificates proving that Mary is a member of the group John’s friends. Mary sends the certificate chain and signed request to John’s speaker’s proxy. ACL 2.John’s speaker’s proxy rejects first request, and returns the ACL.

Summary: Issues we are dealing with Specifying, granting, delegating and revoking authorizations Creating, maintaining and auditing groups Attribute searching Facilitating scalability Designing simple, user-friendly systems

Questions?