TechSec WG: Related activities overview and Fonkey Project update TechSec WG, RIPE-46 September 3, 2003 Yuri Demchenko.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Make Secure Information Sharing (SIS) Easy and an Reality C. Edward Chow, PI Osama Khaleel Bill Kretschmer C. Edward Chow, PI Osama Khaleel Bill Kretschmer.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Donkey Project Technologies and Target applications March 6, 2003, Vrije Universiteit Yuri Demchenko.
IODEF Design principles and IODEF Data Model Overview IODEF Data Model and XML DTD pre-draft Version 0.03 TERENA IODEF WG Yuri Demchenko.
Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson Andrew Cormack Yuri Demchenko Jan Meijer.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
DICOM Security Lawrence Tarbox, Ph.D. Chair, WG 14 Mallinckrodt Institute of Radiology Washington University in St. Louis School of Medicine.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate revocation list
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Incident Object Description and Exchange Format
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Riccardo Genghini - Ws E-Sign Chairman – IETF PKIX San Francisco March Electronic Signature infrastructure for Europe Riccardo Genghini Cen/Isss.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Shibboleth: An Introduction
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Microsoft Management Seminar Series SMS 2003 Change Management.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Optimising XML Schema for IODEF Data model INCH WG, IETF57 July 16, 2003 Yuri Demchenko.
©2001 Priority Technologies, Inc. All Rights Reserved Meteor Status Miami Face to Face Meeting January 16 – 18, 2002.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
OASIS Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales eSecurity OASIS Digital Signature Services and ETSI standards Juan Carlos.
HMA Identity Management Status
HMA Identity Management Status
NAAS 2.0 Features and Enhancements
Presentation transcript:

TechSec WG: Related activities overview and Fonkey Project update TechSec WG, RIPE-46 September 3, 2003 Yuri Demchenko

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _2 Outline  IODEF development at IETF INCH-WG  PKI and other Security related developments at IETF  Other developments in Application Security area u XML Security u Network Identity management: Liberty Alliance vs WS-Federation  Fonkey Project update

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _3 IETF INCH WG (INCident Handling) INCH WG - Status and recent developments  Requirements for Format for INcident Report Exchange (FINE) u To be updated before IETF-58  The Incident Data Exchange Format Data Model and XML Implementation Document Type Definition u To be updated before IETF-58  Planned implementation u CERT/CC AIRCERT project - u eCSIRT Project - u APCERT – very active, contribution to multilingual issues u GRID community (EGEE Project)

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _4 IODEF: implementation issues  Implementation Guide – initial drafting u To address implementation issues u Technology issues: XML generation and parsing, XML Signature and Encryption, Key management, Information input/output  Support tools for early implementers u Schema definition and Documentation u IODEF XML Library for Java  Reference/Demo implementation to address u XML processing and XML Signature/ Encryption u Variables naming: for elements and attributes –Documental vs system attributes

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _5 IETF PKIX WG - Public-Key Infrastructure (X.509) PKIX-WG is wrapping up. The remaining problems and new drafts discussed at the meeting:  Meet ISO/ITU development of PKI  Algorithm and optimisation of path building for Cert verification and trust management: "it is easy to do but difficult to do well"  X.509 PKC extension for IP addresses and Autonomous Systems (what is specifically important for S-BGP and so-BGP)  Introduction of name comparison for international character sets (mandatory after Jan 2003): create a problem when matching name in and Cert - suggested solution was to use “stringprep” algorithm developed by IDN WG for internationalised domain names (RFC3454)  LDAP matching rules and LDAP Schema for attribute extraction  Multidomain PKI issue raised by Japanese Government PKI Project (draft-shimaoka-multidomain-pki-00.txt) u found also a case in US inter-university PKI deployment  Russian Cryptographic algorithm (GOST) to be standardised for PKI

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _6 EESSI/ETSI for Europe  European Electronic Signature Standardisation Initiative (EESSI) by ETSI -  EC published decision of OJ EU 15/7/2003 I 175/24 on set of standards for electronic signature use ( in compliance with Annex II f to Directive 1999/93/EC)  CWA (March 2003): security requirements for trustworthy systems managing certificates for electronic signatures — Part 1: System Security Requirements  CWA (March 2002): security requirements for trustworthy systems managing certificates for electronic signatures — Part 2: cryptographic module for CSP signing operations — Protection Profile (MCSO-PP)  Standards for electronic signature products (in compliance with Annex III to Directive 1999/93/EC)  CWA (March 2002): secure signature-creation devices.  Other useful documents u “ETSI TR Requirements for role and attribute certificates -

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _7 Enroll BOF ( Addressed issues:  Initial introduction model and enrolment for Public Key based network and application security solutions  There are no commonly accepted approaches and methods for initial introduction and enrolment for obtaining (more secure, long-term) credentials and problems with getting X.509 PKC u One of problems affecting PKI deployment  Important deployment issue for many areas where PKI is used, including DNSSEC, ADSL, AuthZ/AuthN, etc.  Discussed solutions: u “Imprinting”/”Leap-of-trust” – trust what you saw first, like duck u ??

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _8 Lawful Intercept issues at IETF Presentation related to Lawful Intercept in IP Networks by Cisco Fred Baker, former IETF chair Cisco Architecture for Lawful Intercept In IP Networks  Cisco needs to answer their customers request to provide features for network surveillance and they provide these features in their equipment.  Draft doesn't describe internal solution but describes functionality only  European legislation on this issue Convention on Cybercrime, ETS No. : =17/07/03 =17/07/03

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _9 Application Security and XML Security Authentication, Authorisation and Accounting (AAA) vs Authentication and Authorisation (AuthN/AuthZ)  AAA is addressed by AAA-WG at IETF – currently focussed on mobile network problems  AAAArch-RG at IRTF – focussed on deployment issues  AuthN/AuthZ and Network Identity management u Two competing technologies Liberty Alliance and WS-Federation

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _10 Network Identity: Liberty Alliance vs WS-Federation Identity Federation take place when multiple user/entity identities in different trust/administration domains and united for SSO operation. Liberty is a set of protocols that collectively provide a solution for identity federation management, cross-domain authentication, and session management -  Three trust models based on Business or Trust agreements: ??? u Circles of trust are initiated and controlled by user/principal  Actors: Principal, Identity provider, and Service provider WS-Federation is the last published spec from WS-Security suite and is complimentary to WS-Trust and WS-Policy  Developed by Microsoft, IBM, Verisign, BEA

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _11 Fonkey Project Update Fonkey Project at NLnet Labs -  System to distribute cryptographic keys and reference/attribute information bound by Digital Signature Project Status  Current stage – initial design including technology overview and demo implementation u definition and pilot implementation of basic client-storage functionality, including Package format, Semantics of query language u XML Signature/Encryption tested u Key management tools tested  Further development will depend on interest from community and available resources

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _12 Design issues: Types of Package Generic Package structure – {Type, Public Key, Properties, Payload, Signature}  Key Package – like generic package u Unique ID is defined by Public Key u Location by Public Key attributes/info  Named Package – adds Name field to the generic package u Unique ID is defined by Name and Key u Location by Name  Signature Package – adds Subject (ID of the package signed by this Signature) and References (to signed parts/portions) u Unique ID is defined by Public Key and Subject u Location by (Subject, Public Key) pair

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _13 Fonkey Target Applications Fonkey is kept as simple as possible to create easily deployable infrastructure  Analysis of target application allows to define specific requirements and necessary extensions to the generic/basic functionality Target applications  PGP Keyserver with extended payload  Privilege Storage (bound to PK based identity)  Other applications under discussion u Location Server for IIDS u Identity Server for Liberty Project applications – under discussion

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _14 Target Application: Extended PGP Keyserver Reference - The OpenPGP HTTP Keyserver Protocol (HKP) Specific requirements  PGP key request via HTTP GET u Operations - {get, index, vindex, x-?} u Search - variable {key ID, V4 Fingerprint, V3 Fingerprint} u Modifier = {options {mr, nm}, fingerprint, exact  PGP key publish via HTTP POST u OpenPGP Packet in an ASCII Armored format (RFC2440) Benefits/new functionality with Fonkey  Adding application oriented payload  Flexible search for Key information  Integration with other types of PK infrastructures

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _15 Java Key management tools Key management tools to generate, export or import server and client keys and certificates:  Native Java key and certificate management tool keyrtool included as a standard tool in J2SE distribution that support X.509 public key certificates  OpenPGP key tool - provides support for OpenPGP key encryption and signature; should be also installed with OpenPGP JCE Provider; both packages are available from The Cryptix Foundation Ltd. -  IBM KeyMan needed for creating mutual trust between two entities using a certificate chains (mutual certificates with attached lineage of public certificates with common trusted root) -

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _16 XML Security packages for Java XML Security packages available from Apache Jakarta and IBM: Apache XML Security library supporting XML Signature (XML Encryption is under development) - IBM xss4j Security suite that supports XML Encryption and Decryption Transform and aims to support XACML - OpenSAML -  Or as a part of Shibboleth - Note. XML Security requires implementation and use of the whole set of XML related technologies: XML parser (xerces), XSLT (xalan), XML Schema tools

September 3, RIPE-46, Amsterdam TechSec WG: Related activity overview Slide _17 Fonkey technology overview Fonkey technology overview and demo will be available from the project web page -