HEBCA – The Operating Authority July 2005 Dartmouth PKI Summit.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
David L. Wasley Office of the President University of California A PKI Certificate Policy for Higher Education A Work in Progress Draft David L.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Higher Education Bridge Certificate Authority (HEBCA) Project Progress Fed/Ed June 2005.
US Higher Ed PKI Activities Internet2/EDUCAUSE ++ TF-EMC2 November, 2004 Amsterdam Michael R Gettes, Duke University TF-EMC2 November, 2004 Amsterdam Michael.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
The U.S. Federal PKI and the Federal Bridge Certification Authority
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
The 4BF The Four Bridges Forum Higher Education Bridge Certificate Authority.
Chapter 11: Active Directory Certificate Services
Higher Education Bridge Certificate Authority (HEBCA) Project Progress Fed/Ed December 2004.
Higher Education Bridge Certificate Authority (HEBCA) Project Progress July 2004 Dartmouth PKI Summit.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
HEBCA – Higher Education Bridge Certification Authority Presented by Scott Rea and Mark Franklin, Fed/Ed Meeting, 12/14/2005.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
1 11 th Fed/Ed PKI Meeting Some quick updates from recent HEPKI-TAG and SURA work Jim Jokl
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
1 Digital Credential for Higher Education John Gardiner August 11, 2004.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
Bridging Higher Education PKIs PKI Summit, August 2006 Snowmass, Colorado.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
WebTrust SM/TM Principles and Criteria for Certification Authorities CA Trust Jeff
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
HEPKI-TAG UPDATE Jim Jokl University of Virginia
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
The NIH PKI Pilots Peter Alterman, Ph.D. … again.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Higher Education Bridge Certification Authority Scaleable Linking of PKI trust domains Scaleable Linking of PKI trust domains David L. Wasley Fall 2006.
TAG Presentation 18th May 2004 Paul Butler
Alternative Governance Models for PKI
TAG Presentation 18th May 2004 Paul Butler
Dartmouth PKI: Plans & Challenges (Scott Rea – Dartmouth College) Internet2 Member Meeting, Dec 2006 PKI Implementers Workshop - Chicago, IL.
Description of Revision
جايگاه گواهی ديجيتالی در ايران
Inter-institutional Trust Fabric Overview and Synergies
Fed/ED December 2007 Jim Jokl University of Virginia
Higher Education Bridge Certificate Authority (HEBCA) Project Progress Sixth Annual PKI Summit at Snowmass, Colorado August 2004.
Presentation transcript:

HEBCA – The Operating Authority July 2005 Dartmouth PKI Summit

2 Agenda HEBCA Progress Update – What have we been doing? HEBCA Operating Authority – What does it do? Where does it fit in? AirGap – Solving the offline CA intercommunication with high available online Directory problem (on a shoe string budget)

3 HEBCA Project Update What’s been done in last 6 months? –Policy Authority formed –A slew of documents (required for Audit sign-off prior to production roll out) have been drafted Update of Certificate Policy Certificate Practices Statement Certificate Profiles Interoperability Guidelines Criteria and Methods Business Continuity and Disaster Recovery Plan Base Memorandum of Agreement (MOA) HEBCA Personnel Selection Procedures –HEBCA Test infrastructure instantiated at Dartmouth –HEBCA Test cross-certified with the Prototype FBCA

4 HEBCA Project Update What’s been done in last 6 months? –Establishment of the HEBCA.ORG domain –Auditors for pre-operational compliance engaged –Technical Interoperability completed with FBCA –HEBCA Production infrastructure completed (imminent deployment) AirGap solution constructed & operational –HEBCA/USHER Synergies project proposed, accepted and under way –Presentations on HEBCA concepts, progress, and related projects or participation in panel discussions at 6 different industry conferences / workshops –Participation in industry workgroups ( Path-Val, I-CIDM, FBCA CPWG, HEBCA PAWG, OSG TG-Sec, TAGPMA, HEPKI-TAG, IIWG, XAAWG )

5 HEBCA Project Update Issues Encountered and Solutions Implemented –Discovery of a vulnerability in the protocol for indirect CRLs Will now use Issuing CA to sign CRLs –How to construct a high availability online service based on an offline infrastructure (to mitigate risk) all on a shoestring budget Our AirGap Solution was constructed for under $100 in parts –FBCA requirement for US citizenship of “trusted roles” personnel prior to cross-certification Participation in industry collaborative process which has distilled a workable solution

6 HEBCA Operating Authority Organization PAWG

7 HEBCA Operating Authority The HEBCA OA is the organization that is responsible for the issuance of HEBCA certificates when so directed by the HEBCA PA, the posting of those certificates and any Certificate Revocation Lists (CRLs) or Certificate Authority Revocation Lists (CARLs) into the HEBCA repository, and maintaining the continued availability of the repository to all parties relying on HEBCA certificates. Specific responsibilities of the HEBCA OA include: Management and operation of the HEBCA infrastructure; Management of the registration process; Completion of the applicant identification and authentication process; and Complying with all requirements and representations of the Certificate Policy. Key personnel from the Dartmouth PKI Laboratory were chosen as the HEBCA Operating Authority by the HEBCA PA under the direction of EDUCAUSE (the project sponsor). Scott Rea is the Director of the HEBCA OA and the designated OA Administrator in accordance with the HEBCA CP.

8 HEBCA Overview What does it look like?

9 AirGap The Problem: –Offline CA –High Availability online Directory –CRLs generation and publish every 6 hours –Dual access/authorization for private key operations –Handling of after hours certificate revocation requests –Limited resources

10 AirGap The AirGap Solution: –Asynchronous storage device for schlurping signed data between the CA and the Directory (technically no different to a floppy based sneaker net used in similar situations in industry e.g. FBCA) –Storage is never connected to both devices at the same time – hardware enforces an “air gap” –Periodic checking to see if storage device is available Directory reads any new CRL and publishes it, posts a signed revocation request when it is received CA reads any new revocation requests, verifies signature, creates new CRL, deletes request –Storage connected to online Directory for 5 mins every 6 hours, otherwise connected to offline CA in order to minimize risk

11 AirGap Components: –Sewell Manual Share USB Switch –5V relay –5V AC adapter –Power Timer –Crucial 1Gb Flash Disk –Cron jobs running on both connection end points –Signed objects passed back and forth

12 AirGap

13 AirGap Benefits: –Offline CA talking to an Online Directory automatically without bringing the CA online = reduced risk and reduced costs –Potential replacement for 4 operators (2 folks, 2 shifts per day to manually move files back and forth) - $200K savings? –Less work for Administrators due to automation of processes –Reduced Audit? Audit process once and then periodic checking of logs vs detailed scrutiny of logs may be required for manual process –Parts readily available, built for under $100

14 Discussion or Questions?

15 For More Information HEBCA Website: Scott Rea -