Certificate Enrolment STEs Group Name: SEC#17.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date: 2015-07-08.

Slides:



Advertisements
Similar presentations
RadSec – A better RADIUS protocol
Advertisements

Internet Protocol Security (IP Sec)
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Digital Certificate Installation & User Guide For Class-2 Certificates.
MyProxy: A Multi-Purpose Grid Authentication Service
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Cryptography and Network Security
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SEC Clarification Group Name: WG4 (SEC-2014-xxxx) Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
 YS-1 The PIC Pre-IKE Credential Provisioning Protocol Yaron Sheffer (RADGUARD) and Hugo Krawczyk (Technion) March 2000.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Facing the Challenges of M2M Security and Privacy
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Credential Identifiers Group Name: SEC#14.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
Windows 2003 and 802.1x Secure Wireless Deployments.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
On Persistent AE Identifiers Group Name: SEC#12.2 Source: Phil Hawkes, Qualcomm Inc (TIA), Francois Ennesser,
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
App-ID Use Cases, Syntax and Attributes SEC App-ID_Use_Cases,_Syntax_and_Attributes Group Name: Architecture Source: Darold Hemphill, iconectiv,
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
Authorization for IoT Group Name: oneM2M SEC WG Source: Francois Ennesser, Gemalto NV Meeting Date: Agenda Item:
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
SEC Identity_of_registrar_CSE Identity of Registrar CSE Group Name: SEC, ARC and PRO Source:FUJITSU Meeting Date: Agenda Item: Authentication.
Insert Your Name Insert Your Title Insert Date Client Registration Open Issues Update 5/27/2011 Denis Pochuev (original proposal by Alan Frindell)
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
Certificate Enrolment STEs Group Name: SEC#17.3 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Primitive End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting.
Certificate Enrolment STEs Group Name: SEC#18 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
OneM2M Challenges of M2M Security and Privacy
Interworking with an External Dynamic Authorization System Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.2,
Credential Identifiers Group Name: SEC#14.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
M2M Service Session Management (SSM) CSF
E2EKey Resource Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.3, Agenda Item: End-to-End Security.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
End-to-End Primitive Security: Challenges and Suggestions Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
Insert Your Name Insert Your Title Insert Date Client Registration Examples Alan Frindell 2/18/2011.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
KERBEROS SYSTEM Kumar Madugula.
Clarification of Access Control Mechanism on Rel-1 & Rel-2 Group Name: SEC ( ARC & PRO for information) Source: FUJITSU Meeting Date: Agenda.
Consideration Security Issues on Registration Group Name: WG4 (SEC) Source: Shingo Fujimoto, FUJITSU, Meeting Date:
On-Boarding and Enrolment Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting Date: SEC#22, Agenda.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
[authenticationProfile] <mgmtObj> specialization
End-to-End Security for Primitives
Cryptography and Network Security
MAF&MEF Interface Specification discussion of the next steps
Module 8: Securing Network Traffic by Using IPSec and Certificates
Overview of E2E Security CRs
Summary of the MAF and MEF Interface Specification TS-0032
Module 8: Securing Network Traffic by Using IPSec and Certificates
Update on BRSKI-AE – Support for asynchronous enrollment
Presentation transcript:

Certificate Enrolment STEs Group Name: SEC#17.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date: Agenda Item: TS-0003 – Release 2 Small Technical Enhancements

oneM2M Enrolment Requirements Rel 1 supports remote security provisioning of symmetric key credentials for the M2M SP’s domain – We have called this “enrolment” in some places For Rel 2, we want to extend this to support remote security provisioning of public key credentials = public key certificates for the M2M SP’s domain – This type of process is sometimes called “Certificate Enrolment” and sometimes called “Certificate Management” – Given existing use of the term “enrolment”, it would seem that “Certificate Enrolment” would be appropriate terminology for us © 2015 oneM2M Partners 2 SER-020The oneM2M System shall enable legitimate M2M Service Providers to provision their own credentials into the M2M Devices/Gateways. Implemented in Rel-1 SER-021The oneM2M System shall be able to remotely and securely provision M2M security credentials in M2M Devices and/or M2M Gateways. Implemented in Rel-1

Cert Enrolment: Intro (1) What? A protocol for an End-Entity to obtain a public key certificate for which the private key is known to the End-Entity, – and for configuring Certificate Authority (CA) certificates Why? Enables mutual authentication between the end-entity and all other entities in that PKI. Which Common Protocols should we consider 1.Certificate Management Protocol (CMP) RFC 4210, RFC Certificate Management over CMS (CMC) RFC Certificate Management over CMS (CMC): Transport Protocols RFC Enrolment over Secure transport (EST) RFC 7030 Uses CMC 5.Simple Certificate Enrolment Protocol (SCEP) Not a standard. IETF draft-nourse-scep-23 – No standards exist for certificate management/enrolment over UDP © 2015 oneM2M Partners 3

Cert Enrolment: Intro (2) How do CA,RA and End-Entity interact? – Requests EE [  RA x N]  CA. Responses return on same path How does CA/RA know that EE knows private key? Options – EE generated key pair EE generates the private/public key pair, EE Provides proof-of-possession by signing req, and sending with req CA/RA verifies the proof-of-possession CA generates the certificate, which is returned to the EE – CA or RA Generated CA/RA generates the private/public key pair, CA generates the certificate CA/RA encrypts private key (using secret/password known to EE) CA/RA sends private key to EE in encrypted form, along with cert © 2015 oneM2M Partners 4

oneM2M Certificate Enrolment What? – A CSE/AE = EE Interacting with an RA or CA to obtain CA certificates trusted by the M2M SP End-Entity certificate containing the CSE-ID or AE-ID Certificate chain from EE cert to one of above CA certs Why? – Enables mutual authentication between CSE/AE and all other entities in M2M SP’s PKI. Which entity would assume role of CA or RA? – M2M Enrolment Function (MEF) – Performs similar role in symmetric key enrolment – See later slide titled “Motivation for MEF as EST Server” © 2015 oneM2M Partners 5

Transport There may be multiple devices with Middle Node(s) on path between AE/CSE & the infrastructure domain Options for transporting certificate enrolment msgs between AE/CSE & MEF 1.oneM2M reference points Mca+Mcc Advantage: utilize CDMH for efficient delivery Disadvantage: Requires CSE/AE to register first, and at that point in time CSE/AE may be unable to authenticate to Registrar! 2.End-to-end TCP session: Note: TCP packets pass through multiple devices containing MNs Advantage: No need for CSE/AE to register first. Simpler. Disadvantage: Can’t utilize CDMH 6

Option 1:oneM2M ref. points 7 AE/CSE Link IP TCP TLS HTTP oneM2M MN CSE Link IP TCP TLS HTTP oneM2M IN CSE Link IP TCP TLS HTTP oneM2M RA/CA Link IP TCP TLS HTTP oneM2M CertEnrol Client CertEnrol Server

Option 2: End-to-end TCP 8 AE/CSE Link IP TCP MN CSE Link IP TCP IN CSE Link IP TCP RA/CA Link IP TCP CertEnrol Client CertEnrol Server

Event Frequency & CMDH Benefit Certificate Enrolment is an infrequent event for each AE/CSE– e.g. once every N years The efficiency gains, of using CMDH for infrequent events, will be negligible when considering all the other frequent events. Removes advantage of using oneM2M reference points (Option 1) Suggests using option 2: End-to-End TCP 9

EST Enrolment over Secure Transport (EST) – Secures enrolment process using TLS (over TCP) – EST Client = End-Entity – EST Server analogous to Registration Authority RFC 7030 does not address EST Server ↔ CA interface EST Requests/Responses use Certificate Management over CMS (CMC) RFC

EST Layers 11

EST General Client/Server Interaction 1.The client establishes TLS-secured HTTP session with an EST server a.Client authenticates the Server b.Server may authenticates client (if not, then step 2.b is mandatory) 2.The client and server perform a set of EST request/responses interactions a.Specific EST service is requested based on a portion of URI /cacerts, /simpleenroll, /simplereenroll, /fullcmc, /serverkeygen, /csrattrs b.Client/user may provide HTTP Basic/Digest username/ password authenticat’n for proof-of-identity. Required if client not authenticated in Step 1.b c.The client verifies that the server is authorized to serve this client d.The server verifies that the client is authorized to make use of this server and the request that the client has made e.The server acts upon the client request 12

EST Authentication Options Certificate TLS Mutual Authentication – RECOMMENDED option in RFC 7030 – Could use TLS authentication defined for Certificate-based Remote Security Provisioning Framework (RSPF) –TS-0003 Clause Certificate-less TLS Mutual Authentication – EST text seems to expect that this would use weak secrets (e.g. Passwords) and recommends using SRP or similar – Could use TLS-PSK with strong secrets, TLS authentication defined for PSK & GBA RSPFs –TS-0003 Clause , Server-Only TLS – Client authenticated using HTTP Basic/Digest Auth with username/ password – For oneM2M, this would be a good way to enrol user devices e.g. smartphones, tablets and laptops – Suggestion: allow as new option for symmetric key enrolment! 13

Plan Introduce changes as two “Small Technical Enhancements” STE 1: Introduce EST for certificate enrolment – Update TLS mutual authentication text for Certificate, GBA and PSK RSPFs in TS-0003 (for symmetric key enrolment) so it can be used EST NOTE: aligns symmetric key & certificate enrolment STE 2: Add username/password client authentication – TLS Server-only authentication of MEF, followed by – HTTP Basic/Digest Authentication w/ Username/passwd – Supported for both symmetric key & certificate enrolment 14

Motivation as MEF for EST Server As proposed on previous slide, the plan is to align symmetric key & certificate enrolment MEF could choose to support symmetric key enrolment and/or certificate enrolment! Simpler for oneM2M ecosystem if there is a single entity with multiple options 15

Anticipated STE 1 TS-0003 Changes ClauseUpdate/ new Clause titleChangeRelative Work UpdateEnrolment PhaseHigh level overview of cert enrolment Low 6.2.6UpdateTrust Enabler Security Functions Support for cert enrolment Low 8.3.1UpdateGeneral Overview to RSPFsoverview certificate enrolment High UpdatePSK, Certificate and GBA RSPF Details support use for certificate enrolment Medium 9.2.2UpdateBootstrap Instruction Configuration Procedure AE-ID/CSE-ID to put in certificate Low 16

Anticipated STE 2 TS-0003 Changes ClauseUpdate/ new Clause titleChangeRelative Work UpdateEnrolment PhaseInclude Username/Password RSPF Low 8.1.4NewUsername/Password Security Framework Any details useful to include here Medium 8.3.1UpdateGeneral Overview to RSPFs Include Username/Password RSPF Low NewUsername/Password RSPF Full specificationHigh 9.2.1UpdateBootstrap Credential Configuration Procedure Adding credential configuration for username/password RSPF Low NewTLS ciphersuite details for Username/Password RSPF Medium 17

Anticipated TS-0001 Changes Clause 11 in TS-0001 will also need minor updates to extend “enrolment” concept to include certificate enrolment – Mostly confined to clause 11.2 “M2M Initial Provisioning Procedures” 18