EUGridPMA CAOPS-WG and IGTF Issues June 2012 Delft, NL David Groep, Nikhef, EUGridPMA, EGI and BiG Grid.

Slides:



Advertisements
Similar presentations
Classic X.509 secured profile version 4.2 Proposed Changes David Groep, Apr 20 th, 2009.
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1 ASGCCA Self-Audit Report APGridPMA Jinny Chien March
Architecture Decision Group Group Organization & Processes April 7, 2015 | Tuesday.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
IGTF and SHA-2 David Kelsey TAGPMA meeting, SDSC Feb 2012.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Policy Issues for Identity Management (and other attributes) EGI Technical.
CVE , lessons learned and actions David Groep, Nov 7 nd, 2008.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Homework #5 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Updates from the EUGridPMA David Groep, Oct 11 th, 2011.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Updates from the EUGridPMA David Groep, Apr 8 nd, 2008.
Assuring e-Trust always 1 Status of the Validation and Authentication service for TACAR and Grids.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
Large-scale issuing of host certs in a member-integrated or institutional CA environment.
The CA Distribution Process David Groep, July 2007.
Blueprint Meeting Notes Feb 20, Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1:
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
EUGridPMA Status, current trends and some technical topics March 2013 Boulder, CO, USA David Groep, Nikhef & EUGridPMA.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Updates from the EUGridPMA David Groep, Nov 7 nd, 2008.
EUGridPMA status and updates David Groep, GGF18. EUGridPMA Status Update, TAGPMA Ottawa David Groep – Items  EUGridPMA.
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
European Grid Policy Management Authority. Event - 2/total Speaker Name – Coverage of the EUGridPMA Green: Countries with an accredited.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
SHA-2, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
EUGridPMA Status, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
EGI-InSPIRE RI EGI.eu European Grid Infrastructure EGI-InSPIRE RI Credential Validation Middleware Requests compiling.
Updates from the EUGridPMA David Groep, May 9 st, 2007.
Status review and pending issues March 13, 2012 Oxford, UK David Groep, Nikhef, EUGridPMA, EGI and BiG Grid participation supported by IGE, the Initiative.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 02/13/2012.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
EUGridPMA Status Review … and proposals February 28, 2012 Taipei, TW David Groep, Nikhef, EUGridPMA, EGI and BiG Grid.
APGridPMA Update Eric Yen APGridPMA August, 2014.
OSG Security: Updates on OSG CA & Federated Identities Mine Altunay, PhD OSG Security Team OSG AHM March 24, 2015.
Cryptography CSS 329 Lecture 13:SSL.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
Welcome to Amsterdam EUGridPMA35 September EUGridPMA Amsterdam 2015 meeting – 2 David Groep – Welcome back in Amsterdam.
Jens' obligatory soap box Can't be a PMA without a SoapBox A random collection of Soapy things Nicosia, Jan 2009.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Updates from the EUGridPMA David Groep, Oct 17 st, 2007.
IGTF Risk Assessment Team 5/11/091.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
IGTF, WLCG, EGI and SHA-2 (and RFC proxies) David Kelsey (STFC-RAL and WLCG) TAGPMA meeting, Panama City Aug 2012.
PKGrid CA Self-Audit 2012 Adeel-ur-Rehman Mansoor Sheikh.
Document update - what has happened since GGF11
Classic X.509 AP updates (v4.1)
EUGridPMA CAOPS-WG and IGTF Issues March 2013 Charlottesville, VA, USA David Groep, Nikhef, EUGridPMA, and EGI.
EUGridPMA Status and Current Trends and some IGTF topics March 2016 Taipei, TW David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some technical topics November 2013 La Plata, AR David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics March 2014 Taipei, TW David Groep, Nikhef & EUGridPMA.
Homework #5 Solutions Brian A. LaMacchia
SHA-2 Migration status David Groep Nikhef Nikhef, Amsterdam
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
MaGrid CA Self audit and update
and the SHA-1 depreciation time line and status
Presentation transcript:

EUGridPMA CAOPS-WG and IGTF Issues June 2012 Delft, NL David Groep, Nikhef, EUGridPMA, EGI and BiG Grid

APGridPMA Taipei 2012 meeting - 2 David Groep – Geographical coverage of the EUGridPMA  25 of 27 EU member states (all except LU, MT)  +AM, CH, DZ, HR, IL, IR, IS, JO, MA, MD, ME, MK, NO, PK, RO, RS, RU, SY, TR, UA, CERN (int), DoEGrids(US)* + TCS (EU) Pending or in progress  ZA, SN, TN, EG, AE

APGridPMA Taipei 2012 meeting - 3 David Groep – Agenda  26 rd EUGridPMA meeting September 2012, Lyon FR  27 rd EUGridPMA meeting Abu Dhabi, January 2013  28 th PMA meeting Kyiv, UA, May 2013  29 th PMA meeting Bucharest, RO, 9-11 Sept 2013

APGridPMA Taipei 2012 meeting - 4 David Groep – Karlsruhe meeting results and issues   SHA-2 migration  AAOPS Guidelines available – to be applied now  IPv6 support  OCSP  RA Practice Profile  RA migration to a new CA**  GFD.125bis

APGridPMA Taipei 2012 meeting - 5 David Groep – Why the Risk Assessment?  hash algorithms (like SHA-x, MDx, RIPE-MD) are basis for cryptographic integrity of all PKI certs  SHA-1 most commonly used, but weaking rapidly  ‘strength’ is the inherent entropy of the digest value  strength is decreasing due to clever cryptanalysis  good advice (NIST) has deprecated SHA-1 in 2010  more attacks are forthcoming  but moving to new hash algorithms (SHA-2) requires ubiquitous software support  which needs to be in all M/W used by IGTF RPs  but which is not (yet) there

APGridPMA Taipei 2012 meeting - 6 David Groep – Weighing the risks  assess the current state of the attacks on SHA-1  gauge probability of successful exploit in our PKI  document possible remediations  that can be taken to preserve integrity of the IGTF  for various attack scenarios and ‘complexity levels’  and consider the impact on our RP operations  which things may break?  how severe is a such breakage and balance these risks against each other  in an orderly fashion  ahead of time! Risk Assessment Doc

APGridPMA Taipei 2012 meeting - 7 David Groep – ToC for

APGridPMA Taipei 2012 meeting - 8 David Groep – SHA-2 Decisions and Road Forward  ALL IGTF CAs should have or get the capability of issuing SHA- 2 based certificates. All CAs MUST implement this a.s.a.p, and REPORT on the implementation of SHA-2 issuing capabilities by October 1,  This implementation of SHA-2 should encompass BOTH end-entity certs AND CRLs  CAs should schedule to start issuing SHA-2 based certs by January 1, 2013 (only if by December 2012 it is clear that everything will still break in more than one infrastructure may some CAs consider not moving).  CAs MAY consider shortening the validity period for EECs that are still SHA-1 based after , so that the sun-set date for SHA- 1 (March 2014) is maintained. This will also encourage users to move to SHA-2.

APGridPMA Taipei 2012 meeting - 9 David Groep – SHA-2 decisions – the user end  There should be user explanatory documents describing the move to SHA-2  From Jan 2013 onwards, users SHOULD have the capability of requesting SHA-2 based certs from all CAs  Since software should accept at least SHA-256 and SHA-512 out of the SHA-2 family of hashes. To ensure that will happen, some CAs should use SHA-256 and others SHA-512, so there will and should be no IGTF guidance as to which one to choose.

APGridPMA Taipei 2012 meeting - 10 David Groep – IPv6 use at the CA end  All CAs should have an IPv6 capable end-point for their CRL (and OCSP responder), preferably BEFORE OCTOBER 1, 2012!  To encourage CAs to enable IPv6 and get the proper DNS records set, monthly reminders will be sent if your CA does not offer the CRL over IPv6 (or lacks the AAAA records). After October 1st, these reminders will come weekly.  Get your DNS servers on IPv6 as well  And, yes, I know the IGTF itself does not have that yet, but I’m looking into alternatives for Enom Inc.

APGridPMA Taipei 2012 meeting - 11 David Groep – RA MIGRATION AND RPS

APGridPMA Taipei 2012 meeting - 12 David Groep – RA Practices Profile  'well organised' communities of subscribers  which are called 'RAs' in the context of e.g. DoEGrids  could benefit significantly  from having their own well-defined 'Registration Practices Statement' (RPS) AND  keeping their own records and vetting data and gain the ability to 'outlive' their CA issuing providers and even migrate between CAs with only limited impact to the individual subscribers.  and contract issuing CAs in competition  However, this is *not* going to result in any change in the IGTF structure itself, nor in additional 'membership categories' for PMAs. It is the CAs that are anyway responsible for ensuring proper RA practices, and as such they get to defend and present RPS practices. All communication will be and remain through the CAs.

APGridPMA Taipei 2012 meeting - 13 David Groep – RA migration: the practical use case  In this case, the community RA in NZ actually is well organised and has retained all documentation, so a migration of the entire community to the ASGCCA Catch-All function would sole the problem. The IGTF discussed the options and since  the RA has retained all documents and vetting data  the existing CA will continue to operate in a 'transitionary' mode, so there is an authentication point for the RA's subscribers  the documentation and vetting processed for the old and new CA are compatible  the RA will transfer audit capability for their documents to the new RA the users will be allowed to migrate from the old to the new CA without a new F2F vetting step, since the documentation remains available, and through authenticating with the 'old' credentials subscribers that re- apply to the new CAs can link their new request to the original vetting data. The new CA will issue in its own name space, so the full DN of the subscribers will change. This is, however, well solvable in the VO registration systems today, and common practice.

APGridPMA Taipei 2012 meeting - 14 David Groep – OCSP – PART II

APGridPMA Taipei 2012 meeting - 15 David Groep – OCSP conclusions IGTF CAs SHOULD provide production OCSP responder JAN 1, 2013 To enable this to happen, the following actions will be taken:  those that run OCSP responders (either the regular 'heavy' ones or the precomputer 'light-weight' OCSP responses that can be cahed and served over a CDN) will send some documentation  CABForum will (in about 3+ month) produce two whitepapers on OCSP: one for service operators and one for RP clients  All CAs should start deploying OCSP responders now, and setup a server for that  authorityInfoAccess OCSP endpopint extensions should be included in all EECs issued after Jan 1, 2013  from then on, AIA in client certs will be used, and after 400 days all EECs should have it.

APGridPMA Taipei 2012 meeting - 16 David Groep – OCSP conclusions  the server(s) running the OCSP responders should be highly available, and have controls around them to make sure they are secure and safe. If you use a signing OCSP responder, it should have an OCSP signer cert which is reasonably short- lived, and preferably hosted on an HSM.  pre-computed responses should be preferred, and can be signed beforehand off the normal issuing CA directly (making them smaller and easier to process) Client will interpret the OCSP responses and do the 'right' thing (known should be equal to 'bad').

APGridPMA Taipei 2012 meeting - 17 David Groep – But: what to do at the client end? Experiments by Krysztof Benedycak (quoting from his mail): “I did a small experiment using all OCSP responders defined in all CA certs from the IGTF distro + one from big guys, i.e. VeriSign. There is only few of them: -> OK -> OK -> OK -> OK -> no luck, 4xx HTTP error -> no luck, connection timeout Results: For all that I managed to query and get a positive answer I've used the same settings and get the same results, i.e.:  I've used unsigned request, however signed one was also accepted  anonymous TLS in case of https (for quo vadis)  nonce extension was not honored, never it seems that all responders create responses once per day (or so) as I always had "producedAt" several hours in the past and it was constant.”

APGridPMA Taipei 2012 meeting - 18 David Groep – The current proposal by Krysztof “Solely basing on this experiment, here are defaults and assumptions that I'm going to implement. Any comments are welcomed … 1.use in request or require response nonce? NO, not supported by servers 2.hash algorithm to be used in requests (for hashing checked cert issuer and key, not the one used for request signing)  fixed to SHA1  do we need to make it configurable? Are there any SHA2 hashes required/supported? and if the answer is yes: is there any chance that admins will be able to guess a better default value for the hash? 3.server's authentication in case of https responders  don't support this at all, i.e. use https for connection encryption only, as it would be quite hard in general (hen and egg problem)  alternatively we can check the responder's SSL certificate simply, by requiring it to be the same as the certificate of the authority which signed the later received response. But does such effort makes sense?

APGridPMA Taipei 2012 meeting - 19 David Groep – More from Krysztof... 4.signing of requests --> no; seems to be ignored by servers 5.client's authentication to the responder in case of https --> as above 6.no other extensions are going to be supported 7.OCSP answer for a particular certificate will be cached -> by default up to 24h -> cache time will be configurable

APGridPMA Taipei 2012 meeting - 20 David Groep – GFD.125BIS

APGridPMA Taipei 2012 meeting - 21 David Groep – Grid Certificate Profile Update  Document URL  version 3 with track changes  One addition made based on mail from Roberto  Can we sign off on this version?  Has anyone looked at it?

APGridPMA Taipei 2012 meeting - 22 David Groep – Agenda  26 rd EUGridPMA meeting September 2012, Lyon FR  27 rd EUGridPMA meeting Abu Dhabi, January 2013  28 th PMA meeting Kyiv, UA, May 2013  29 th PMA meeting Bucharest, RO, 9-11 Sept 2013