Donkey Project Technologies and Target applications March 6, 2003, Vrije Universiteit Yuri Demchenko.

Slides:



Advertisements
Similar presentations
GT 4 Security Goals & Plans Sam Meder
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
The EC PERMIS Project David Chadwick
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
WebFTS as a first WLCG/HEP FIM pilot
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
TechSec WG: Related activities overview and Fonkey Project update TechSec WG, RIPE-46 September 3, 2003 Yuri Demchenko.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
DICOM Security Lawrence Tarbox, Ph.D. Chair, WG 14 Mallinckrodt Institute of Radiology Washington University in St. Louis School of Medicine.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Shibboleth: An Introduction
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Access Policy - Federation March 23, 2016
Key management issues in PGP
Applying eduGAIN to network operations The perfSONAR case
Cryptography and Network Security
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Adding Distributed Trust Management to Shibboleth
S/MIME T ANANDHAN.
O. Otenko PERMIS Project Salford University © 2002
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

Donkey Project Technologies and Target applications March 6, 2003, Vrije Universiteit Yuri Demchenko

©February 21, Amsterdam. Donkey Project Slide2 _2 Outlines  Problems in traditional PKI and Identity Management  Donkey goals and functionality  Design issues  Timetable and Next steps  Discussion: u Using and extending Donkey functionality u Possible applications  Reference information

©February 21, Amsterdam. Donkey Project Slide2 _3 Donkey Goal(s) Open extendable system for public key and Identity management Initial stage Open global distributed system for publishing and retrieving named, signed public keys Intended development Identity management for federated cross-domain AuthN and AuthZ Donkey website:

©February 21, Amsterdam. Donkey Project Slide2 _4 What is Donkey: Donkey functionality  Donkey allows anyone to publish a named key, together with optional data (Donkey package) u Multiple parties are allowed to publish a key with the same name. Applications must select the correct key when multiple keys match u Donkey is NOT a permanent storage: key must be republished to remain available u Donkey does NOT define a policy for key/payload usage –This is an application specific function  Donkey allows anyone to query for a published key, based on the key's name (required) and signers (optional)  Donkey allows anyone to sign a published key

©February 21, Amsterdam. Donkey Project Slide2 _5 Design issues: Package structure (Proprietary) Internal format (Python data object) but XML based exchange format  Package ID  Content u Header –Flags –Names u Owner Public Key – must be unique u Body –Payload Application dependent content and format Intended for AA and Identity management May include specific format definition (e.g., embedded XML Schema)  Signatures

©February 21, Amsterdam. Donkey Project Slide2 _6 Design considerations Build upon existing solutions and standards  But still capable to do a low start Gradual development  Build up upon key storage/management engine XML for package extensibility and exchange  Including prospective use of the XML Protocol

©February 21, Amsterdam. Donkey Project Slide2 _7 Donkey Project milestones  Overview and inventory/planning - current stage u Selected basic technologies and development environment u Overview document  March-April: Prospective applications area overview u Requirements (common and specific for applications) u Draft Protocol description/definition  April-May: API(s) definition and Donkey prototyping u API requirements  June-August: Development and pilot implementation for 1-2 applications

©February 21, Amsterdam. Donkey Project Slide2 _8 Donkey current status Just started work on Donkey prototype  Key generation (DSA or RSA keys)  Creating a new Donkey package  Add and verify signature to/of an existing Donkey package  Data model and XML DTD/Schema for Donkey packages Goal: Create a base for experiments with application specific payloads

©February 21, Amsterdam. Donkey Project Slide2 _9 Some specific next tasks  Overview of existing solutions for AA and Identity management  Analysis of applications specific requirements u OpenPGP Keyserver u Attribute/Privilege storage u Identity/Credentials Storage  Trust analysis  Threats analysis

©February 21, Amsterdam. Donkey Project Slide2 _10 Donkey functionality for AuthN/AuthZ Donkey will be built upon existing PKI and AA applications: PGP Key Server Internet2 PubCookie/WebISO and Shibboleth/AA PAPI (AuthZ and Web SSO) A-Select (AuthZ and Web SSO) PERMIS (PrivilEge and Role Management Infrastructure Standards Validation Project) Akenti (cross-domain AA for Grid applications)

©February 21, Amsterdam. Donkey Project Slide2 _11 Standards for security assertions PGP X.509 Public Key Certificate (PKC) X.509 Attribute Certificate (AC) for Privilege Management SAML (Security Assertion Mark-up Language) Liberty Alliance Network Identity (XML and SAML based) Web Services Security (SOAP Extensions)

©February 21, Amsterdam. Donkey Project Slide2 _12 Problems in PKI and Identity Management X.509 PKI is a heavy-weight solution and usually enterprise oriented:  Requires Certificate Authority (CA) to create and trust a certificate (PKC)  Certificate creation/revocation mechanism is complex, slow and expensive  LDAP as a standard mechanism to publish X.509 Certs is not easily extensible and (generically) not globally scaled Distributed applications and mobile users require secure remote access to electronic credentials and identity information P2P networks normally (based on DHT) require non-hierarchical (non-PKI) security infrastructure Advent of XML/SOAP based standards for SSO/Identity management creates technological alternative for traditional PKI and PMI

©February 21, Amsterdam. Donkey Project Slide2 _13 Donkey and DNSSEC DNSSEC can be a source of public keys for zones/nodes but it's not intended to provide this service for other applications:  Intended for host names, not arbitrary names  Updates are slow (propagation through caches, administrative overhead)  Requires DNSSEC protocol for public key access/request (standard request for KEY and SIG RRs) Donkey can provide (shadow/alternative) key distribution infrastructure using application specific protocols to off-load DNSSEC

©February 21, Amsterdam. Donkey Project Slide2 _14 Identity management and SSO Two Identity standards  Microsoft passport – deployed since 2000  Liberty alliance – emerging, deployment 2003

©February 21, Amsterdam. Donkey Project Slide2 _15 Microsoft Passport  Proposed as a solution for Internet-wide Credentials management and Authentication service  Recently proposed Passport Manager Licensing Program u Allows access to and use of Passport Manager source code to develop, debug and support both commercial and noncommercial software for the purpose of integration  Passport Password Quality Meter u tools to gauge and improve the strength of their Passport password  Next Step for the Industry: Federated Security and Identity  Federated security is the ability for sites, services and applications to safely accept and recognize identities and authentication assertions issued by any one of a trusted set of partners u Based on industry emerging Web Services Security

©February 21, Amsterdam. Donkey Project Slide2 _16 Securely available credentials  Obvious need for such a service u Mobile users/agents u Persistent storage of valuable information u Scope of former IETF SACRED WG u Intersects with Identity management  Required functionality u Use/integrate/interchange credentials from different appliances (Internet, mobile telephone, smartcard/bankcard, etc.) u Credentials server vs direct access to home storage of credentials u Technology (storage and protocol) must be opaque to credentials u Need to support different types of user authentication u Primary and secondary credentials vs credentials delegation

©February 21, Amsterdam. Donkey Project Slide2 _17 Liberty Identity and Protocol Liberty is a set of protocols that collectively provide a solution for identity federation management, cross-domain authentication, and session management.  The Liberty architecture contains three actors: Principal, identity provider, and service provider Liberty protocol provides federation of Principal’s identity between the identity provider and the service provider.  Principal is authenticated to the identity provider  Identity provider provides an authentication assertion to the Principal  Principal can present the assertion to the service provider  Principal is then also authenticated to the service provider if the service provider trusts the assertion.  An identity federation is said to exist between an identity provider and a service provider when the service provider accepts authentication assertions regarding a particular Principal from the identity provider

©February 21, Amsterdam. Donkey Project Slide2 _18 Reference information  PKI Basics  X.509 Public Key Certificate (PKC)  X.509 Attribute Certificate (AC)  Role Based Access Control (RBAC)

©February 21, Amsterdam. Donkey Project Slide2 _19 Reference: PKI Basics PKI - Public Key Infrastructure  Binds subject’s distinguished name or identity with his/her public key  The major component of PKI is Public Key Certificate (PKC) u CRL – Certificate Revocation List as a component of PKC management  PKI components u Identification Service (IS) u Registration Authority (RA) u Certification Authority (CA) u Certificate Repository (CR), normally built on LDAP

©February 21, Amsterdam. Donkey Project Slide2 _20 Reference: PKC vs AC: Purposes  X.509 PKC binds an identity and a public key  AC is a component of X.509 Role-based PMI (Privilege Management Infrastructure) u AC contains no public key but it is issued to particular subject identified by DN u AC may contain attributes that specify group membership, role, security clearance, or other authorisation information associated with the AC holder u Analogy: PKC is like passport, and AC is like entry visa  PKC is used for Authentication and AC is used for Authorisation u AC may be included into Authentication message  PKC relies on Certification Authority and AC requires Attribute Authority (AA)

©February 21, Amsterdam. Donkey Project Slide2 _21 PKC vs AC: Certificates structure X.509 PKC  Version  Serial number  Signature  Issuer  Validity  Subject  Subject Public key info  Issuer unique identifier  Extensions AC  Version  Holder  Issuer  Signature  Serial number  Validity  Attributes  Issuer unique ID  Extensions

©February 21, Amsterdam. Donkey Project Slide2 _22 X.509 PKC Fields and Extensions – RFC 3280 X.509 PKC Fields  Serial Number  Subject  Subject Public Key  Issuer Unique ID  Subject Unique ID X.509 PKC Extensions  Standard Extensions u Authority Key Identifier u Subject Key Identifier u Key Usage u Extended Key Usage u CRL Distribution List u Private Key Usage Period u Certificate Policies u Policy Mappings u Subject Alternative Name u Issuer Alternative Name u Subject Directory Attributes u Basic Constraints u Name Constraints X.509 PKC Fields  Private Extensions u Authority Information Access u Subject Information Access  Custom Extensions

©February 21, Amsterdam. Donkey Project Slide2 _23 AC Attribute Types and AC Extensions AC Attribute Types  Service Authentication Information  Access Identity  Charging Identity  Group  Role  Clearance  Profile of AC AC Extensions  Audit Identity u To protect privacy and provide anonymity u May be traceable via AC issuer  AC Targeting  Authority Key Identifier  Authority Information Access  CRL Distribution Points

©February 21, Amsterdam. Donkey Project Slide2 _24 Role Based Access Control (RBAC) RBAC – Role Based Access Control  Role describes the function  Rights define access to the resource in a specific mode under specific conditions Benefits of RBAC  Easy manage and control  Seperate definition of role-user and role-privilege  Scaleability  Support of least privilege [rinciple  Enheritance and aggregation of privileges and rights  Possibility to delegate

©February 21, Amsterdam. Donkey Project Slide2 _25 Proxy Certificate Profile  Impersonation – used for Single-Sign-On and Delegation u Unrestricted Impersonation u Restricted Impersonation defined by policy  Proxy with Unique Name u Allows using in conjunction with Attribute Cert u Used when proxy identity is referenced to 3 rd party, or interact with VO policy  Limited validity time – approx. 24 hours Proxy Certificate (PC) properties:  It is signed by either an X.509 End Entity Certificate (EEC), or by another PC. This EEC or PC is referred to as the Proxy Issuer (PI).  It can sign only another PC. It cannot sign an EEC.  It has its own public and private key pair, distinct from any other EEC or PC.  It has an identity derived from the identity of the EEC that signed the PC.  Although its identity is derived from the EEC's identity, it is also unique.  It contains a new X.509 extension to identify it as a PC and to place policies on the use of the PC. This new extension, along with other X.509 fields and extensions, are used to enable proper path validation and use of the PC.