Download presentation
Presentation is loading. Please wait.
Published byTracy Spencer Modified over 9 years ago
1
Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center
2
December 13, 20022: Virtual Smart Card Enmeshed Private Keys Premise: Private keys and users don’t mix Inherently insecure model No guarantee of good or any password choice No guarantee of secure private key location E.g., users store keys in network based file systems No guarantee how private key was handled E.g., users copy/e-mail keys to remote machines & leave them cannot User managed keys cannot be trusted
3
December 13, 20023: Virtual Smart Card Solitary Private Keys Premise: Never give a user their private key Can’t mishandle something you don’t have stronger Can provide a stronger security guarantee Signed cert as secure as institution’s accounts Must provide agent-based key handling E.g., smart cards
4
December 13, 20024: Virtual Smart Card Virtual Smart Card (vsc) Premise: Physical smart cards (psc) in software vsc’s have a 1-to-1 concept correspondence to psc’s ConceptPhysicalVirtual ProcurementPurchase/downloadRequest/generate PossessionPhysicalAuthentication OperationsIndirect Tamper protectionSelf-destructRestricted access Theft protectionSettable pinSettable password
5
December 13, 20025: Virtual Smart Card VSC Conceptualization A vsc is implemented using a secure, access restricted server One server holds many user’s private keys Hence, one server instantiates many vsc’s Can be well secured Restricted physical access Cages, keyed room, etc. Restricted logical access Only three access protocols needed: dns, ntp, and vsc Keys can be encrypted via user-supplied passwords
6
December 13, 20026: Virtual Smart Card VSC Procurement 1. Ask for a cert 2. Generate keys and send cert request 3. E-mail cert url User never sees the private key! CA 4. Download CA signed public cert* *When available on 1 st request or automatic poll.
7
December 13, 20027: Virtual Smart Card VSC Operation (vsc-proxy) 2. Generate proxy public/private key Sign proxy cert 3. Sign proxy cert Private key never sees the network! Get public cert 1. Get public cert Externally authenticated Externally authenticated (e.g., Kerberos)
8
December 13, 20028: Virtual Smart Card VSC Theft Protection 1. Generate key-string from a strong user password Send encrypted key-string 2. Send encrypted key-string Externally authenticated Externally authenticated (e.g., Kerberos) 3. Encrypt user’s x509 private key and discard key-string User must now supply key-string for vsc to use private key
9
December 13, 20029: Virtual Smart Card VSC Advantages I Simple and effective Models well-known physical object -- smart card Initial certificate request is trivial Private keys never exposed Can be further encrypted by user Can get proxy cert anywhere in the world No need to copy public/private keys
10
December 13, 200210: Virtual Smart Card VSC Advantages II Can provide special extensions EDG VOM extensions (natural fit) Can provide special always-on services Perhaps proxy cert revalidation stronger Can provide stronger security guarantee Signed cert as secure as institution’s accounts
11
December 13, 200211: Virtual Smart Card VSC Disadvantages Private keys are concentrated Can be user-encrypted Similar problem in Kerberos May violate current CA CP/CPS Political vs. practical reality No more secure than external authentication Need good authentication (e.g., K5)
12
December 13, 200212: Virtual Smart Card Conclusion Virtual Smart Cards effective Simple, relatively transparent, secure Provides a path to more stringent security Physical smart cards Simplify user’s lives Ease of use reduces security lapses Promotes a congenial grid security environment!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.