Copyright Statement • Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.
32
Embed
Copyright Statement Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Copyright Statement
• Copyright Robert J. Brentrup and Sean W. Smith 2002. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.
Developing and Deploying a PKI for Academia
Robert Brentrup
Sean Smith
Educause Conference October 2002
Dartmouth PKI Lab• R&D to make PKI a practical component of a
campus network• Multi-campus collaboration sponsored by the
Mellon Foundation• Dual objectives:
– Deploy existing PKI technology to improve network applications
– Improve the current state of the art• identify security issues in current products
• develop solutions to the problems.
• Many other institutions are working on PKI.
• Internet2 has been very active in promoting this work establishing PKI Labs at Dartmouth and the University of Wisconsin. – I2 HEPKI-TAG, -PAG, -S/MIME
• Educause Net@EDU and CREN
• 1st Annual PKI Research Workshop– Sean Smith: program chair, proceedings editor
Community
What is PKI?• PKI is Public Key Infrastructure
• A pair of keys is used, one to encrypt, the other to decrypt
Public and Private Keys
• You publish the "public" key, You keep the "private" key a secret
• You don't need to exchange a secret "key" by some other channel
• Invented in 1976 by Whit Diffie and Martin Hellman
• Commercialized by RSA Security
Basic applications of PKI
• Authentication and Authorization of Web users and servers– It is the basis for the SSL protocol used to secure
web connections
• Secure e-mail (signed and encrypted)
• Electronic document signatures
• Network link data protection (VPN, wireless)
• Signing Program Code
Why would I use PKI?
• Effective security has become crucial to extend electronic communication and business processes beyond the current state of the art.
• Legislative mandates are requiring it.
What is X.509?
• A standard for the format of a public key certificate and related standards for how certificates are used.
• Current PKI product offerings inter-operate through this standard
• There are many other possible formulations, eg SDSI/SPKI
• Is X.509 THE solution?
What is a certificate?
• Signed data structure that binds some information to a public key
• The information is usually a personal identity or a server name
• Think of it as an electronic ID card
Basic Public Key Operations• Encryption
– encrypt with public key of recipient
– only the recipient can decrypt with their private key
• Signature – Compute message digest, encrypt with your private key
– Reader decrypts with your public key
– Re-compute the digest and compare the results, Match?
Basic Public Key Operations
What is a certificate authority?
• An organization that creates and publishes certificates
• Verifies the information in the certificate
• Protects general security of the system and it's records
• Allows you to check certificates and decide to use them in business transactions
What is a CA certificate?• A certificate authority generates a key pair
used to sign the certificates it issues
• For multiple institutions to collaborate:– Hierachical structure is setup among their CAs– Bridge Certification Authorities
• "peer to peer" approach
Hierarchy
CREN
Dartmouth Princeton MIT UAB
DST
UC
VeriSign
UWis NIH
???
or Bridge?
CREN
Dartmouth Princeton MIT UAB
DST
HEBCA
UC
VeriSign
UWis
FBCA
NIH
Deployment Results• PKI applications in production use
• develop more and scale up campus wide
• Electronically signed Payroll Applications
• Replace Web authentication• Banner SIS, other Oracle apps, same mechanism
• Library resource access control, local and JSTOR
• Electronic document signatures• NIH pilot, replace paper forms
Deployment issues?• Learning curve for planning a PKI is steep• PKI is as much about Policy as Technology• Commercial products have shortcomings:
– Many are expensive– Some are hard to install and operate– Many compatibility issues and user constraints
• Many applications only interesting if available to the entire "community"
• Many products have serious security issues
External Results• Extensive compatibility testing results published
on websites• Implemented multiple PKI system products,
notes available• Publishing example code derived from new
applications• Notes on PKI libraries and tool kits• Tools and additions to existing applications
– eg. browser mods and S/MIME plugins
Next Steps• Applications
– Workflow, signatures– Secure mail for Student health Services -HIPAA– PKI enhanced List-servers– Wireless network data protection– Databases and E-commerce
• Improvements in Infrastructure– Key storage hardening
• Tokens, smartcards, coprocessors
– Enrollment improvements– Trusted Third Party Services
Research Agenda
• Expression of Trust– PKI system that can be managed and issued by different authorities, but
from which many parties can draw judgments.
• Trust Attributes for Machines– machines throughout network to actually have the right certs...
• Using Trust at Clients– client tools that can reliably recognize and react to these properties…
• Using Trust in Applications– applications to obtain, react, and respond to this information
• Foundations of Trust– techniques to establish a basis for trust in computation in hostile places.
End User Studies• Understanding Incentives and Concerns
• User Concerns, Understanding, Behavior
• Vulnerability Analysis• How easily can users be conned into revealing passphrases?