1 Trusted Transitive Introduction Max Pritikin (Presentation by Cullen Jennings) Revision A.

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
Lecture 6/2/12. Forms and PHP The PHP $_GET and $_POST variables are used to retrieve information from forms, like user input When dealing with HTML forms.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Hannes Tschofenig (IETF#79, SAAG, Beijing). Acknowledgements I would like to thank to Pasi Eronen. I am re- using some of his slides in this presentation.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
1 CS 502: Computing Methods for Digital Libraries Lecture 22 Web browsers.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
SSL From Your Smartphone Support for Android Smartphones /
Bootstrapping Key Infrastructures Max Pritikin IETF 91, 10 Nov 2014 Aloha!
Windows 2003 and 802.1x Secure Wireless Deployments.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
Access Control Module 8. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A vSphere Environment Introduction to VMware.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
ArcGIS Server and Portal for ArcGIS An Introduction to Security
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Module 5: Designing a Terminal Services Infrastructure.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Module 5: Configuring Access for Remote Clients and Networks.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
21/05/2010 AU DEPARTMENT OF COMPUTER SCIENCE FACULTY OF SCIENCE AARHUS UNIVERSITY TATIONpRESEN The homeport system Jeppe Brønsted, Post Doc, Phd Aarhus.
Deepnet Unified Authentication for Outlook Anywhere.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Cullen Jennings Certificate Directory for SIP.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
● A system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML. What is the World.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Web Server.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Using facilities as a data source to drive business Paul Ehrlich, PE Business Development Leader Trane Global Controls.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Hostway Confidential & Proprietary Introduction to Web Hosting.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
20161 Student Version An Introduction to Online Timetabling.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
By: The Immigrants :D I mean the Mexican and the Colombian I mean Daniel and Felipe.
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
Bootstrapping Key Infrastructures
Secure Connected Infrastructure
Chapter 1 Introduction to Networking
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Virtual Private Networks
An Introduction to Online Timetabling
Presentation transcript:

1 Trusted Transitive Introduction Max Pritikin (Presentation by Cullen Jennings) Revision A

222 Introduction Enrollment protocols already exist CMC, CMP, others All of these depend on undefined Out-of-Band steps “problem” Trusted Transitive Introduction (TTI) is a proposed model for this Out-of-Band exchange

333 What is exchanged out-of-band? The ‘entity label’ for the service consumer Generalized: some configuration information A piece of keying information to be used Raw symmetric key Raw public key Fingerprints of public key A set of permissions for operations for the service consumer Authorization for the impending enrollment (from the charter)

444 Out-of-Band Introduction Petitioner The device joining a secure domain. “client” Registrar The authentication & authorization infrastructure of the secure domain. “server” Post Introduction Secure Communication The introduction via a phone call, , floppy disk, in house provisioning system, smartcard, etc Existing authentication and authorization infrastructure between user/ administrator and Petitioner device Existing authentication and authorization infrastructure between user/ administrator and Registrar device

555 Transitive Trusted Introduction (TTI) Introducer Performs the introduction. “user” Post Introduction Secure Communication Introduction is not a negotiation, order does not matter! Existing authentication and authorization infrastructure between user/ administrator and Petitioner device Existing authentication and authorization infrastructure between user/ administrator and Registrar device Petitioner The device joining a secure domain. “client” Registrar The authentication & authorization infrastructure of the secure domain. “server”

666 EXAMPLE: Joining device to a service Petitioner Registrar Post Introduction Secure Communication 1. Device is purchased. 2. Configuration of device by owner. 3. Device is introduced to a network server. User service provider Introduction Data exchanged: Service Provider Key material collected Configuration information (e.g. enrollment URL) collected Petitioner Introduction Data sent Introduction Data exchanged: Petitioner Key material collected Configuration information collected (e.g. capabilities) Registrar Introduction Data sent Introducer

777 Imprinting New devices IMPRINT on the first infrastructure they meet From a pure model perspective this is entirely true. There is no alternative. Any out-of-band mechanism depends on the admin/user using this imprint for initial configuration anyway

888 Summary— Introduction, Introduction, Introduction Introduction is the hard part of enrollment Introduction can happen in different orders Before any enrollment protocol there is an introduction exchange that takes place. This has been characterized as an "out-of-band" exchange of data and has normally been identified as out-of-scope. It is my argument that it is in scope and can be best solved using the Trusted Transitive Introduction model. This WG should work on an introduction protocol

999 EXTRA SLIDES TO FOLLOW Below is an example of using TTI to introduce a VPN network device to a corporate VPN network. These slides show a Cisco SOHO device instantiation of the TTI model.

10 Browser based TTI of a VPN device Welcome The HTML form(s) displayed by the Petitioner Introduction The HTML form(s) displayed by the Authority Completion The final HTML form(s) displayed by the Petitioner User Interface ‘wizard’ just to show how easy this can be for a user

11 Welcome phase

12 Introduction phase Mfgr Cert Serial Number Enter serial number from the back of the device:

13 Completion phase