Top Banner
April 2003 ARIN XI Memphis, TN Memphis, TN ARIN DBWG ARIN DBWG Tim Christensen Tim Christensen Authentication Authentication Update Update
25

ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

Mar 27, 2015

Download

Documents

Steven McKnight
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNMemphis, TN

ARIN DBWGARIN DBWGTim ChristensenTim Christensen

Authentication Authentication UpdateUpdate

Page 2: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

OverviewOverview

Mandate for change

Applying authentication to processes

Choosing the first method

Make it happen

Next steps

Page 3: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Why Change, Why Now?Why Change, Why Now?

Community has made it clear that mail-from authentication is inadequate and want better options

Stewardship principles dictate that ARIN move away from loose security

Release of new database clears path for forward progress

Page 4: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Applying Better Applying Better AuthenticationAuthentication

Identify use cases for authentication mechanisms: What processes benefit from stronger authentication?

►Inbound templates and requests

►Outbound mail

►Outbound files

►Web publishing

►Web transactions

Page 5: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

ApproachApproach

Community has asked for spectrum of authentication choices►Password (md5-pw, des, etc.)

►PGP

►X.509

Implement one at a time, evaluate, and repeat

Consider mail-from deprecation after evaluating adoption progress

Page 6: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Authentication Authentication Deployment PreceptsDeployment Precepts

Phased, opt-in adoption

Permit multiple authentication methods

Prohibit a POC’s use of mail-from when an “improved” authentication method is selected by a POC

Page 7: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choosing the First Choosing the First Authentication MethodAuthentication Method

Investigate other RIRs’ implementations►APNIC – using userid/password, PGP, and

X.509; running Certificate Authority (CA)

►LACNIC – using userid/passphrase

►RIPE NCC – using password and PGP

Page 8: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choosing the First Choosing the First Authentication MethodAuthentication Method

Community input – public policy mtgs.►Certificates “good”

►When implementing PGP don’t use public key servers

Engineering evaluation►Applicability to processes

►Strength of security

►Coordination with other ongoing eng efforts

►Other RIR implementations

Page 9: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

The choice: X.509 FirstThe choice: X.509 FirstPermits application of secure authentication to widest array of processes:►Can protect (authenticate and encrypt) email

templates

►Can authenticate web transactions

►Can authenticate data produced by ARIN

Provides best combination of:►Control

►Security

►Utility

Page 10: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

How X.509 Adopters Get How X.509 Adopters Get Tighter AuthenticationTighter Authentication

POC generatesCertificate Signing

Request (CSR)

POC sends CSRin a new template

to ARIN

ARIN verifiesCSR contents

ARIN generatescertificate, updates

database, and returns it to POC

POC usescertificate to

sign templates

POC maintainsauthentication

certificate(“rollover”)

ARINauthenticates

templatessubmitted by that

POC

Page 11: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Getting ThereGetting ThereIdentify process touch points►Registration template processing (email)

►Non-template email communication

►Online processing (future)

Establish test bed

Propose process changes►CSR processing

►Running the ARIN Certificate Authority (CA)

►Signed template acceptance & rejection

►Response to authentication failure

Page 12: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimeline

Page 13: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimelineEstablish requirements and prerequisites

Page 14: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimelineAccomplish prerequisites

Establish requirements and prerequisites

Page 15: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimelineAccomplish prerequisites

Explore options

Establish requirements and prerequisites

Page 16: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Establish requirements and prerequisites

Page 17: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Page 18: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Page 19: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choose first deployment method

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Page 20: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choose first deployment method

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Develop process changesPOC-Auth TemplateProcedural changesSystematic changes

Page 21: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choose first deployment method

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Develop process changes

Form beta community and testInterested? [email protected] beta training & testingRefine/respond to beta issuesTraining (internal/external)

Page 22: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choose first deployment method

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Develop process changes

Form beta community and test

Deploy

Page 23: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choose first deployment method

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Develop process changes

Form beta community and test

Implement other methods

Deploy

Page 24: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Choose first deployment method

TimelineTimelineAccomplish prerequisites

Explore options

Understand existing RIR implementations

Identify use cases & touch points

Establish requirements and prerequisites

Establish test bed

Develop process changes

Form beta community and test

Implement other methods

Deploy

Deprecate Mail-From?

Page 25: ARIN XIMemphis, TN April 2003 ARIN DBWG Tim Christensen Authentication Update.

April 2003ARIN XI Memphis, TNARIN XI Memphis, TN

Thank You!