26 July 2007IETF 69 PKIX1 Use of WebDAV for Certificate Publishing and Revocation

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Enabling Secure Internet Access with ISA Server
REST - Representational State Transfer
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
1 Caching in HTTP Representation and Management of Data on the Internet.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Implementing Native Mode and Internet Based Client Management.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
HTTP HyperText Transfer Protocol Part 3.
1 Enabling Secure Internet Access with ISA Server.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Team - CA CSCI 5234 Web Security.  Collect and document information of ecommerce security mechanisms.  Using: wiki engine for collaboration.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Assuring e-Trust always 1 Status of the Validation and Authentication service for TACAR and Grids.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Web HTTP Hypertext Transfer Protocol. Web Terminology ◘Message: The basic unit of HTTP communication, consisting of structured sequence of octets matching.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Chapter 8 Cookies And Security JavaScript, Third Edition.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
1 PKI Disaster Recovery and Key Rollover Bull S.A.S.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
1 Seminar on Service Oriented Architecture Principles of REST.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
2007cs Servers on the Web. The World-Wide Web 2007 cs CSS JS HTML Server Browser JS CSS HTML Transfer of resources using HTTP.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
15 May 2001© 2001 University of Salford1 Deficiencies in LDAP when used to support Public Key Infrastructures David W Chadwick
RESTful Web Services What is RESTful?
LDAP for PKI Problems Cannot search for particular certificates or CRLs Cannot retrieve particular certificates or CRLs.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
Document update - what has happened since GGF11
Managing State Chapter 13.
Third Party Transfers & Attribute URI ideas
REST- Representational State Transfer Enn Õunapuu
Cryptography and Network Security
Node.js Express Web Services
Authentication Applications
Web Caching? Web Caching:.
Resource Certificate Profile
Digital Certificates and X.509
WebDAV Design Overview
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

26 July 2007IETF 69 PKIX1 Use of WebDAV for Certificate Publishing and Revocation

26 July 2007IETF 69 PKIX2 Rationale LDAP is not a good mechanism for the distribution of certificates and CRLs for a number of reasons –Cannot usually access LDAP servers through firewalls –Cannot search for certificates or CRLs based on their contents –Cannot retrieve individual certificates when a user has several –Can be difficult to install and use – problems with ;binary and not ;binary Whole area of revocation still poses problems

26 July 2007IETF 69 PKIX3 Revocation Problems CRLs can get extremely large (several megabytes) for downloading every day or every few hours Where do we get them from – problems with LDAP through firewalls Some systems therefore use short lived certificates without revocation e.g. Grids, SAML What is the ideal frequency of issuing CRLs or length of short lived certificates? Issuer makes the choice but RP takes the risk (and pays the cost) Conclusion. Should revisit the best way of distributing certificates and revocation information

26 July 2007IETF 69 PKIX4 Ideal Solution Certificates should only need to be issued once and last for as long as is needed, and be reusable as many times as needed by as many relying parties as the user wishes. This offloads work from the issuer. Distribution protocols should not be inhibited by firewalls, therefore should be based on http Revocation information should instantly be made available to all relying parties Should place the responsibility for determining when to retrieve revocation information onto the relying parties, since these bare the risks Checking certificate validity should be as efficient as possible

26 July 2007IETF 69 PKIX5 Conceptually based on the REST Principles Representational State Transfer (REST) principles came from PhD dissertation about the web by Roy Fielding, author of RFC 2616 (HTTP1.1), see e.htm Based on client server interactions in which servers are stateless (i.e. no cookies since these are sitewide not server specific) Any state retained by the server must be modeled as a resource and all resources are uniquely addressable by a URL i.e. the web is the state machine Each server response should indicate if it is cacheable or not cacheable

26 July 2007IETF 69 PKIX6 Applying REST to X.509 The state of a certificate is either that it EXISTS Or DOES NOT EXIST WAS NEVER CREATED Or WAS CREATED BUT IS NOW REVOKED Applying URLs to these states we have URL ? URL !Nothing at Either URL Certificate at this URL CRL at this URL

26 July 2007IETF 69 PKIX7 We define 2 new Authority Information Access Methods Certificate URL (URL ?) Revocation URL (URL !) We embed these URLs in every certificate that we issue Any Relying Party can now instantaneously check on the state of a certificate by contacting these URLs

26 July 2007IETF 69 PKIX8 We use the WebDAV protocol, an enhancement of HTTP WebDAV protocol [RFC 2518] provides extensions to HTTPv1.1 protocol [RFC 2616] Each X.509 certificate or CRL becomes a WebDAV resource WebDAV uses GET to read a resource, PUT to create a resource or overwrite an existing one and DELETE to delete a resource WebDAV supports creation of sets of resources called collections So all certificates of a user become a WebDAV collection WebDAV specifies the MKCOL method to replace HTTP PUT or POST for collections, since latter are allowed to overwrite existing content at the specified URL, whereas MKCOL will fail if there is any existing content at the specified URL. We need this to stop a certificate issuer from overwriting a user’s existing collection when creating a new collection

26 July 2007IETF 69 PKIX9 The AIA Access Methods AuthorityInfoAccessSyntax ::= SEQUENCE SIZE (1..MAX) OF AccessDescription AccessDescription ::= SEQUENCE { accessMethod OBJECT IDENTIFIER, accessLocation GeneralName } Define two new accessMethods, webdavCert and webdavRev, as follows: webdavCert OBJECT IDENTIFIER ::= { id-ad n} webdavRev OBJECT IDENTIFIER ::= { id-ad m} accessLocation must be a URL pointing to the WebDAV server where the certificate or CRL can be found

26 July 2007IETF 69 PKIX10 But what if a RP does not have a Cert? E.g. during certificate path processing a RP may need the certificate of an issuer We could say, tough, an RP must always be pushed ALL the certs that it needs from the client –But users don’t always know what all of these are, and it can make it more complex for users OR We could define a way for an RP to pull any certs that it needs, given the DN of an entity –Means we should standardise a way of naming WebDAV repositories so that standard URLs can be constructed

26 July 2007IETF 69 PKIX11 WebDAV Naming Model WebDAV resources are named by URLs, where the hierarchical names are delimited with the “/” character The name of a collection ends with / Use the rules of [RFC 4514] to convert X.500 DNs into strings, with the exceptions that we replace the comma "," separator between RDNs with the "/" character which is the WebDAV separator, and replace spaces with %20 –E.g. X.500 DN “c=gb, o=University of Kent, cn=David Chadwick", will be named in a WebDAV repository with the URL: – 20Chadwick/ We make each subject DN the name of a collection of certificates We make each issuer DN concatenated with cn=CRLs the name of a collection of CRLs –E.g. CRLs of “c=gb, o=University of Kent” CA will be located at [RFC 4514] LDAP String Representation of Distinguished Names

26 July 2007IETF 69 PKIX12 Security Considerations WebDAV revocation is vulnerable to DOS attacks. But so are OCSP and normal CRLs. –To mitigate can posses an old CRL, but can also download a complete WebDAV collection of CRLs from the issuer HTTP provides public access to the certificate, which may violate the privacy of the certificate subject –Use HTTPS and client authentication with access controls and/or return encrypted responses Intermediate Web servers may cache copies of frequently accessed web pages to improve performance –Web server MUST use the no-cache cache-response- directive when returning certificates and Not Found CRLs

26 July 2007IETF 69 PKIX13 Ideal Solution Revisited Certificates should only need to be issued once and last for as long as is needed Certs may be reusable as many times as needed by as many relying parties as the user wishes. Distribution protocols should not be inhibited by firewalls, therefore should be based on http Revocation information should be instantly made available to all relying parties Should place the responsibility for determining when to retrieve revocation information onto the relying parties, since these bare the risks Checking certificate validity should be as efficient as possible

26 July 2007IETF 69 PKIX14 Any Questions??

26 July 2007IETF 69 PKIX15 Supplementary Slides Only if time, and to answer specific questions

26 July 2007IETF 69 PKIX16 Unresolved Issues Should we allow multiple URLs for a certificate or CRL to be included in each issued cert? –This will limit DOS attacks but increase latency of certificate validation if one or more URLs are not available The discovery problem - How can RPs know which WebDAV repository to contact to pull a user’s certificate? –Currently DNS name of WebDAV server needs to be configured in by out of band means

26 July 2007IETF 69 PKIX17 Naming Individual Certs and CRLs Each PKC has the file suffix.p7c and filename of issuer DN plus certificate serial number, using the rules in RFC 4514 to create strings from DNs –E.g. " cn=CSCA, o=university of kent, c=gb+SN= p7c" Each AC has the file suffix.ace Filename of role ACs is created from the contents of its attribute values plus the serial number of the certificate –E.g. a role AC with the embedded attribute type PermisRole with attribute value Project Manager, and certificate serial number of would create the filename "PermisRole=Project Manager+SN= ace". Filename of a policy AC is created from the unique name of the policy embedded in the policy attribute value, –E.g. a policy with the name "AstroGridUsers" would produce the filename "Policy=AstroGridUsers.ace". Each CRL has the file suffix.crl and filename of the serial number of the certificate it revokes. –E.g. a CRL that revokes a certificate with serial number 1234 would produce the filename "serialNumber=1234.crl".

26 July 2007IETF 69 PKIX18 Searching for Certs WebDAV supports document properties using XML for name/value pairs. Stored as meta data with the resource So could store role=manager, serial number=1234 etc. as certificate properties Unfortunately the standard WebDAV protocol does not support retrieval of documents with specific property values, only with property names –E.g. Find all certificates with a serial number property. Useless !! WebDAV searching and locating capability (DASL) started in 1998, but the work was never completed and IETF working group shut down in 2000, but work has continued in the background and implementation are now reputed to exist We may be able to add this capability in the future