Providing secure mobile access to information servers with temporary certificates Diego R. López
Providing secure mobile access to information servers using temporary certificates Diego R. López - Introduction Objectives of the system Secure access standards and mobility requirements Temporary (short-lived) certificates Characteristics Loading and issuing System implementation Components Authentication protocol The user’s view Conclusions
Providing secure mobile access to information servers using temporary certificates Diego R. López - User mobility and secure access l User mobility (not just computer mobility) w Minimal HW/SW requirements w Simplicity of use l Secure access to servers w User authentication w Short-lived “connections”
Providing secure mobile access to information servers using temporary certificates Diego R. López - Secure access standards l Based on SSL/TLS l Server and client exchange X.509 certificates l X.509 certificates are assumed to be w Static Ô Associated with an entity’s identity w Valid in the long term Ô Identity is not often subject to change w Permanently stored by browsers and other information clients
Providing secure mobile access to information servers using temporary certificates Diego R. López - Mobility requirements l A token is used w Removable w Protected by a secret known to the user l Current standard: PKCS#11 w Used by most common clients w Requires specific software and/or hardware
Providing secure mobile access to information servers using temporary certificates Diego R. López - Temporary (short-lived) certificates l Are issued for a short period w Typical validity is a few hours w Time “removes” them l Simplify key generation procedures w Weaker algorithms or shorter key lengths can be employed l Simplify key management procedures w CA key changes only affect servers, not clients
Providing secure mobile access to information servers using temporary certificates Diego R. López - Loading temporary certificates l A loading program authenticates the user w The token contains both Ô The loading program Ô The authentication data l Minimal hardware and software requirements w An (almost) universal token: a diskette w An (almost) universal language: Java
Providing secure mobile access to information servers using temporary certificates Diego R. López - Issuing temporary certificates l An on-line Certification Authority (CA) has to issue the certificate w Validate the authentication data w Analyze user request Ô Server(s) to be accessed Ô Validity period w Issue the certificate
Providing secure mobile access to information servers using temporary certificates Diego R. López - System components (client side) l An Information Reader (IR): w Any information client able to use X.509 certificates w In the current implementation, Netscape 4.xx l A Temporary Certificate Client (TCC): w Negotiates with the service the session parameters w Starts the IR and initiates key generation procedures w The client JAR file is about 700K
Providing secure mobile access to information servers using temporary certificates Diego R. López - System components (authentication data) l A PKCS#12 object encrypted with a passphrase w Contains one of the keys (the private key) from a keypair assigned to the user w Included with other configuration data in a text file stored in the token: TCSERVER erika.cica.es:4433:4434 TCS1-CICA URL TBI-IDBS TIME 30 USER C=es, O=cica, CN=p BEGIN CICAP MIIC3AIBAzCABgkqhkiG9w0BBwGggCSABIICvjCCArowggK2Bgsqhki AqCCAqUwggKhMBsGCiqGSIb3DQEMAQYwDQQIrGHBS1QCRGkCAQEEggK XqyG5goN4YYGtiv8/NoLxnRhZG6Jdleybh90uMUmhyaivCxnLFoIKlf XTMohqpPdnl6CS5eF1u8V2dSv9+zAd3jh2E2He1hyWQBeSV7UpHWefb...
Providing secure mobile access to information servers using temporary certificates Diego R. López - System components (server side) l A Temporary Certificate Sever (TCS) w Acts as a (set of) on-line CA(s) l A directory that holds data pertaining to users w The other key (the public key) from the keypair assigned to the user w Acceptable session parameters w CAs the user can request certificates from
Providing secure mobile access to information servers using temporary certificates Diego R. López - Authentication protocol 5.- Kc2,CA ? 6.- Kc2, CA TCC token 1.- Passphrase 2.-Connect to TCS 3.- Rs 4. Ekc1(Rs,Rc),Kt2 7.-Skca (Kt2) 8.- Acces to information servers Others WWW News Databases TCSDirectoryIR
Providing secure mobile access to information servers using temporary certificates Diego R. López - The user’s view
Providing secure mobile access to information servers using temporary certificates Diego R. López - Conclusions l Thin-client based approach to information servers access control w Eases user mobility: Ô Practically any host with Internet access can be employed w Simplifies access control management l Open issues w Generalization of the procedures for other IRs w Finer granularity in access control w Token-less authentication protocol (applet)