XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.

Slides:



Advertisements
Similar presentations
Internet Peer-to-Peer Application Infrastructure Darren New Invisible Worlds, Inc.
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Chapter 17: WEB COMPONENTS
Secure Network Bootstrapping Infrastructure May 15, 2014.
Jabber and Extensible Messaging and Presence Protocol (XMPP) Presenter: Michael Smith Cisc 856 Dec. 6, 2005.
MyProxy: A Multi-Purpose Grid Authentication Service
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Haga clic para cambiar el estilo de título Haga clic para modificar el estilo de subtítulo del patrón DIRAC Framework A.Casajus and R.Graciani (Universitat.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
P2P (Peer To Peer) Used: when applications need to communicate between devices. Examples: – Interactive game of checkers – Instant Messaging P2P can be.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
NHIN Specifications Richard Kernan, NHIN Specification Lead (Contractor), Office of the National Coordinator for Health IT Karen Witting, Contractor to.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Configuring Active Directory Certificate Services Lesson 13.
CONNECT as an Interoperability Platform - Demo. Agenda Demonstrate CONNECT “As an Evolving Interoperability Platform” –Incremental addition of features.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
CNRI Handle System and its Applications
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Digital Object Architecture
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Web Services An introduction for eWiSACWIS May 2008.
XMPP – Extensible Messaging and Presence Protocol Vidya Satyanarayanan.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Building Security into Your System Bill Major Gregory Ponto.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
15 May 2006 IVOA - Victoria: VOEvent 11 Jabber/XMPP Matthew J. Graham Caltech T HE US N ATIONAL V IRTUAL O BSERVATORY.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Cryptography CSS 329 Lecture 13:SSL.
Module 8: Securing Network Traffic by Using IPSec and Certificates
NAAS 2.0 Features and Enhancements
Module 8: Securing Network Traffic by Using IPSec and Certificates
Building Security into Your System
Presentation transcript:

XMPP Concrete Implementation Updates: 1

Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on Internet and DNS, Many open source libraries to implement applications, user interfaces and integrate with existing systems and workflows. Direct – Realized using asynchronous message delivery, along with a publish-subscribe mechanism for specific events. Secure – Realized using TLS channel encryption, SASL authentication and authorization mechanisms, and extensive support for X509 based PKI infrastructure. Scalable – Realized using direct “Server Federation”, Clustering features of XMPP servers, A single XMPP server can support 1000’s of end points. »In addition, XMPP can serve as the “Innovation Platform” providing capabilities for HISP’s to innovate and create the next generation healthcare applications using: Presence features Direct Server to Server federation, no intermediaries thus reducing the probability of attack on the internet. Out of band File Transfer features Service Discovery and negotiation features Publish-Subscribe services Collaboration services Protocol binding support for HTTP/S, SOAP etc. Real time communication features.

HITSC Comments »XMPP SASL mechanism support for X509 certificates SASL External provides support for X509 certificates for authentication. »Details: TLS TCP connection is established between a client and server –As part of the negotiation client certificate is presented. After TLS is established, SASL verification process is started and “SASL External” mechanism is selected. –Server uses the certificate already presented in the TLS handshake to authenticate the client. »References: (SASL External with Certificates) SASL Framework XMPPIMAP External DIGEST PLAIN ….

Concrete Implementation Group Q & A »Presence and Implicit assumption of availability: 4 different Presence states –Away (Resource Temporarily not available) –Available (Resource available and interested in chatting) –Busy –Extended Away (Away for a long time) Clients can add text to each of these states to more accurately represent state like “In a Meeting”, “Do not Disturb” etc. »Out of Band File Transfer when user is offline Can be accomplished in multiple ways: –File Transfer can be accomplished by adding exception handling software to client software to store the file on the server for user to retrieve the file later. –Creating a “User Proxy” that is always online and mediates the file transfer based on the user status.

Concrete Implementation Group Q & A Cont’d »Certificate model for Interoperability between XMPP Servers The most secure way of communicating between the servers is to use TLS + SASL EXTERNAL –Certificates need to be rooted in same CA. –XMPP Standards Foundation runs an Intermediate CA (StartCom) to generate certificates for XMPP servers. –Servers can request certificates for their domain which can be exchanged during the TLS and SASL negotiations. Most XMPP Server to Server communication use “Server Dialback Authentication” (e.g Google Talk) –Weak Identity verification technique compared to SASL. –XMPP servers use DNS to verify a server generated key to verify the identity of the server.

Concrete Implementation Group Q & A Cont’d »Existing Client and Server Software: Open Source Servers –New Extension is needed to achieve interoperability with NHIN Exchange –New Extension is needed to provide HISP services to end points that are not associated with a HISP. Open Source Clients –Most of the existing clients don’t support “Signing and Encryption” of messages. –Most of the existing clients don’t support SASL External.

Prototype Instantiation and Configuration 7

Security Model of the XMPP Implementation 8 Channel Security: »The client to server communication (Source/Destination to HISP) is encrypted using TLS based on X509 server certificates. »The clients are authenticated to the server using SASL mechanisms. SASL PLAIN uses (user + pwd) SASL EXTERNAL supports client X509 certificates. »The Server to Server communication will be encrypted using TLS. »The Server to Server authentication/authorization is performed using SASL EXTERNAL mechanism. (X509 certificates)

Security Model of the XMPP Implementation Cont’d 9 Certificate Support: »Client Certificates are distinct from server certificates Client certificates can be at the individual level or at the organization level »Server Certificates are distinct from client certificates The most secure way of communicating between the servers is to use TLS + SASL EXTERNAL –Certificates need to be rooted in same CA. –XMPP Standards Foundation runs an Intermediate CA (StartCom) to generate certificates for XMPP servers. –Servers can request certificates for their domain which can be exchanged during the TLS and SASL negotiations. »Allows certificate chains and/or anchors for certificate validation. »Allows certificate revocation using OSCP and/or locally cached CRL’s. »Payload Signing and Encryption will be accomplished using NHIN-D JAgent.

HIE Interoperability 10

HIE Interoperability Cont’d 11 Scenario4: Interacting with existing EHR/EMR systems