15 May 2001© 2001 University of Salford1 Deficiencies in LDAP when used to support Public Key Infrastructures David W Chadwick

Slides:



Advertisements
Similar presentations
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
SOAP.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Fed/Ed PKI 2008, June Subject Unique Identifier or Equivalent William A. Weems & Mark B. Jones Academic Technology U. Texas Health Science Center at Houston.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
LDAP Lightweight Directory Access Protocol LDAP.
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
Active Directory: Final Solution to Enterprise System Integration
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
The EC PERMIS Project David Chadwick
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
By Karan Oberoi.  A directory service (DS) is a software application- or a set of applications - that stores and organizes information about a computer.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
23/4/2001LDAP Overview - HEPix - LAL 2001 LDAP Overview HEPix – LAL Apr Michel Jouvin
LDAP Search Criteria Fall 2004 Rev. 2. LDAP Searches Can be performed on Single directory entry Contents of a single container Entire subtree Required.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Certificate Retrieval from OpenLDAP The X.509 attribute Parsing Server (XPS)
D D S PKI and Certs in LDAP Peter Gietz, DFN Directory services PKI and storage of PGP and X.509 certificates in LDAP LDAP Deployment BoF Amsterdam
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Implementing LDAP Client/Server System for Directory Service By Maochun Sun Project Advisor: Dr. Chung-E Wang Department of Computer Science California.
LDAP Items
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
26 July 2007IETF 69 PKIX1 Use of WebDAV for Certificate Publishing and Revocation
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Stroeder.COM TF-LSD Meeting S/MIME Certificate Collector  Motivation  Proposed Solution  Discussion.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
29 October 2001Terena TF-LSD1 Certificate Retrieval With OpenLDAP David Chadwick.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Some Technical Issues in PKI Deployment David Chadwick
Paulo Repa Lightweight Directory Access Protocol Paulo Repa
LDAP- Protocol and Applications. Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients.
11-Dec-00D.P.Kelsey, Certificates, WP6 meeting, Milan1 Certificates for DataGrid Testbed0 David Kelsey CLRC/RAL, UK
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
LDAP for PKI Problems Cannot search for particular certificates or CRLs Cannot retrieve particular certificates or CRLs.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
LDAP PKI and PMI Schemas
Introduction to LDAP Frank A. Kuse.
Cryptography and Network Security
LDAP
Presentation transcript:

15 May 2001© 2001 University of Salford1 Deficiencies in LDAP when used to support Public Key Infrastructures David W Chadwick

15 May 2001© 2001 University of Salford2 LDAP Directories n What are they? n Hierarchical distributed database that stores information (called attributes) about objects (called directory entries) n Accessible via an Internet and de-facto standard protocol called the Lightweight Directory Access Protocol (LDAP) n Supported by a wide range of suppliers, including Microsoft, Netscape, IBM, Novell, Siemens etc.

15 May 2001© 2001 University of Salford3 LDAP X.521 based Naming Relative Distinguished Name of Entry {null} {C=DE} {O=MyOrg Gmbh} {OU=Sales+ L=Munich} LDAP Distinguished Name of Entry {null) {C=DE} {O=MyOrg Gmbh, C=DE} {OU=Sales+ L= Munich, O=MyOrg Gmbh, C=DE}

15 May 2001© 2001 University of Salford4 LDAP DC based Naming RDN of Entry {null} {dc=com} {dc=MyOrg} {OU=Sales+ L=Munich} LDAP Distinguished Name of Entry {null) {dc=com} {dc=MyOrg,dc=com} {OU=Sales+ L= Munich, dc=MyOrg, dc=com}

15 May 2001© 2001 University of Salford5 Which is Better? n Both have their advantages n DC naming can leverage the DNS for name registration and DNS look up of LDAP servers. Also mandated by MS Active Directory n X.521naming is well established, more intuitive and needed for residential people n The most important point is n USE GLOBAL DISTINGUISHED NAMES

15 May 2001© 2001 University of Salford6 RDN Conflicting Requirements n Each child RDN must be unique  numbers n DNs should be user friendly as they appear in certificates  string based names

15 May 2001© 2001 University of Salford7 Standard Solution n PKIX and X.509 suggest use a two valued RDN n Use Common Name for user friendly part n Use Serial Number for guaranteeing uniqueness n E.g. cn=David Chadwick + sn= n Also can include the address in the Subject Alt Names certificate extension to help identify the certificate subject

15 May 2001© 2001 University of Salford8 Storing PKI Information in LDAP Directories n CA’s entry holds –Its own self signed certificate –Any certificates issued to this CA by another CA –Any certificates issued by this CA to another CA –Optionally the entire CRL issued by this CA n User’s entry holds –Any certificates issued to this user n Distribution point entries hold –CRLs issued by this CA

15 May 2001© 2001 University of Salford9 LDAP Schema n Standard object classes for LDAP entries and standard attribute types for information –pkiUser object class »may contain: userCertificate –pkiCA object class »may contain: cACertificate, certificateRevocationList, authorityRevocationList, and crossCertificatePair –deltaCRL object class »may contain: deltaRevocationList –cRLDistributionPoint object class »must contain: commonName »may contain: certificateRevocationList, authorityRevocationList and deltaRevocationList

15 May 2001© 2001 University of Salford10 Deficiencies in LDAP n Can’t transfer certificates using LDAPv2 as they are converted into ASCII strings and back again  wrecks the signature n Can’t search for particular certificates as no matching rules are defined n Can’t select individual certificates if a user has several in their entry n Little support for distributed directories as LDAP was originally conceived as an access protocol only

15 May 2001© 2001 University of Salford11 Current Workarounds n Can’t transfer certificates in LDAPv2 n Define PKI attributes as binary attributes in LDAPv3 (and try to retrofit to LDAPv2) –userCertificate;binary, cACertificate;binary, certificateRevocationList;binary, authorityRevocationList;binary etc. n Can’t search for certificates n Add mirror attributes to directory entries holding contents of various certificate fields e.g. –mail attribute to hold subjectAltName rfc822 field –certSN to hold certificate serial number

15 May 2001© 2001 University of Salford12 Current Workarounds (cont.) n Can’t select individual certificates n Either store different certificates in different attribute types or in different entries –Different attribute types is problematical, PKIs expect the standard attribute userCertificate –Different entries: 3 choices »Child entries »Sibling entries »Application specific subtrees

15 May 2001© 2001 University of Salford13 O=My Org OU=Some Unit CN=I/C Bids CN=John Smith + SN=1235 CN=Fred Jones + SN=2345 C=DE CN=Username2 CN=Jane Smith + SN=44567 CN=Username3 CN=I/C Sales Child Entries CN=Username1

15 May 2001© 2001 University of Salford14 O=My Org OU=Some Unit CN=John Smith (I/C Bids) CN=John Smith + SN=1235 CN=Fred Jones (I/C Sales) C=DE CN=Username1 CN=Jane Smith + SN=44567 CN=Username2 Sibling Entries

15 May 2001© 2001 University of Salford15 O=My Org OU=Sales OU=Bids OU=Some Unit CN=Fred Jones CN=John Smith OU=Unix Accounts CN=Username1 OU=International Commerce OU=S/MIME Encryption CN=John Smith + SN=1235 CN=Username2 C=DE CN=Jane Smith + SN=44567 Application Subtrees

15 May 2001© 2001 University of Salford16 Future Solutions n Matched Values Internet Draft defines an extension for returning single certificates – – n LDAP Schema Internet Draft defines certificate and CRL matching rules – –

15 May 2001© 2001 University of Salford17 Distributed Directory Problems n Distributed directories need n Ways of finding directory servers –Bootstrap the user to one or more directory servers –Knowledge References to link directory servers together –Certificate extensions to point to directory servers n Referrals and/or chaining to pass requests between servers –Referrals are in LDAPv3 (but not LDAPv2) –LDAP chaining is supported by some servers n Distributed authentication when passing requests between servers

15 May 2001© 2001 University of Salford18 Current Workarounds n Finding servers –Use the DNS SRV records (as in Win 2000) –Pre-configure clients with addresses of servers (as in Netscape and Entrust) –Add proprietary knowledge references to servers –Use an X.500 back end service –But no magic bullet here - still a difficult problem n Distributed Authentication –Configure client username/passwords into every LDAP server, or use no authentication –Use proxy servers that have their own un/pw for remote servers, and map local names into this

15 May 2001© 2001 University of Salford19 Future Solutions to Finding Servers n Use PKIX defined certificate extensions – –Authority Information Access points to superior CA – –Subject Information Access points to cross certified CAs n Standard knowledge references are being defined –subordinate refs –subordinate refs –other refs –other refs n Location mechanisms based on the DNS are being defined – – n Use CIP based referral server

15 May 2001© 2001 University of Salford20 n X.500 supports 3 mechanisms –signed operations –chained requests –use of Compare operation for UN/PWs n LDAP currently supports none –no support for signed operations –no support for chaining –LDAP servers could be built to support Compare n But LDAP could use the proxying feature of SASL so that a local LDAP server can assert the identity of the user to a remote LDAP server Future Solutions to Distributed Authentication

15 May 2001© 2001 University of Salford21 LDAP client Local LDAP Server Remote LDAP Server User Binds to local server Local server SASL Binds to remote server and specifies user’s name for authorisation The Proxying Feature of SASL

15 May 2001© 2001 University of Salford22 SASL Proxying n Is being added to OpenLDAP n BUT a number of problems with it –if first server is compromised, then unauthorised access to second server is achieved –separate SASL Binds are needed between the two LDAP servers for each client request. To solve this a new control carrying the user’s authorisation identity will need to be added to each LDAP request