SEVA: Securing Extranets Yves ROUDIER, Refik MOLVA Institut Eurécom

Slides:



Advertisements
Similar presentations
New Security Services Based on PKI
Advertisements

Internet Protocol Security (IP Sec)
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
PKI Implementation in the Real World
Lecture 23 Internet Authentication Applications
Hannes Tschofenig (IETF#79, SAAG, Beijing). Acknowledgements I would like to thank to Pasi Eronen. I am re- using some of his slides in this presentation.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
10/20/2011Pomcor 1 Deployment and Usability of Cryptographic Credentials Francisco Corella Karen Lewison Pomcor.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Abdelilah Essiari Gary Hoo Keith Jackson William Johnston Srilekha Mudumbai Mary Thompson Akenti - Certificate-based Access Control for Widely Distributed.
Chapter 11: Active Directory Certificate Services
Using Digital Credentials On The World-Wide Web M. Winslett.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Data Security in Local Networks using Distributed Firewalls
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Makrand Siddhabhatti Tata Institute of Fundamental Research Mumbai 17 Aug
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
魂▪創▪通魂▪創▪通 Use Case and Requirement for Future Work Sangrae Cho Authentication Research Team.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Intranet, Extranet, Firewall. Intranet and Extranet.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Session 11: Security with ASP.NET
Internet-Based Client Access
Securing Microsoft® Exchange Server 2010
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Ákos FROHNER – DataGrid Security Requirements n° 1 Security Group D7.5 Document and Open Issues
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Module 9: Fundamentals of Securing Network Communication.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
19 December 1998EMGnet meeting INRIA Rhône-Alpes1 An Overview of Security Issues in the Web José KAHAN OBLATT W3C/INRIA 19 December 1998.
Cherubim Dynamic Security System Roy Campbell and Denny Mickunas Tin Qian, Vijay Raghavan, Tim Fraser, Chuck Willis, Zhaoyu Liu Department of Computer.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
WEB SERVER SOFTWARE FEATURE SETS
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
15 Copyright © 2004, Oracle. All rights reserved. Adding JAAS Security to the Client.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
2 Copyright © Oracle Corporation, All rights reserved. Basic Oracle Net Architecture.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Secure Connected Infrastructure
Module 8: Securing Network Traffic by Using IPSec and Certificates
Server-to-Client Remote Access and DirectAccess
Materials Microcharacterization Collaboratory
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

SEVA: Securing Extranets Yves ROUDIER, Refik MOLVA Institut Eurécom

Extranets: Deployment Issues client (browser) server (web) firewall HTTP request User Application Access Control User Management "server" intranet "client" intranet User ? Network Access Control ? ?

SEVA: Overview Automated management of access control –configuration and collaboration of security devices –delegation + role based access control Transparent mechanism –retrofitting clients / servers without modification –using a remote network like a local one Strong security –cryptographic mechanisms –fine grained authorizations and resource scoping

SEVA: Overall Architecture client (browser) server (web) "server" intranet "client" intranet Initial Agreement (Role-Based Delegation) groups of resources Roles Access Control rules - fine grained - application-level Defines Transparent and automated enforcement

Role Based Delegation Handle 1 Admin handle 1 "server" intranet "client" intranet group of resources (Handle = uniform naming) SPKI User or Role URL 2 SPKI authorization certificate User handle 1 URL 1 Authorization certificate

Handle 1 Role Based Delegation Admin Handle 1 "server" intranet "client" intranet Handle 1 Access control User Handle 1 Authorization certificate Handle 1 URL 2 URL 1 Authorization certificate

Scoping of Authorizations Handle 1 Handle 2 Handle 3 Admin Handle 3 "server" intranet "client" intranet Handle 3. Handle 1 Missing in SPKI ! user rights(handle 1)  rights(handle 3)

Defining Rights Based on SPKI (Simple Public Key Infrastructure) –access-, not identification-centric: key = principal –role-based: group certificates –delegation: access control, key management New in SEVA –agent-based automated issuance –one resolution  several accesses (cert (issuer (public-key (rsa-pkcs1 (e #11#) (n |AKfUCx8fOMNPYBHBJDF8GRSEP2+Egg9f3EZ/ry3SN7tyah7+VOMqSHgb hDV8Bl1C0lhDvC2KdEWlJ7iGj5l5cl+4+h4KMXOIiZ//3R2QObuYq7pMM 2aOjDPuPFmeBZZX3w5g0hOFZv4CouGdVO5G3x5OJGxJuIts73rPyHei+h8x|)))) (subject (name SEVA)) (tag (read

Defining Resources Based on CNRI’s handle system (draft IETF) –naming layer: uniform without modifying servers –naming authority responsible for its resources New in SEVA –integrated with SPKI authorizations –navigation protocol modified to verify access rights –Extranet  Handle System / jan2001-hs-overview Naming Authority [prefix] Item Identifier [suffix] : 1 : URL : : {Relative: 24 hours} : public-read, authorized-write : : {empty}

User Interface client (browser) server (web) firewall KSKS "server" intranet "client" intranet Smartcard Update access rights Transparent protection -unmodified client / server software -operation similar to local server yet strong security -materialized by smartcard -enforced through traffic tagging Traffic tagging layer

Traffic Tagging client (browser) server (web) firewall Traffic tagging Tag verification (access control) "server" intranet "client" intranet Network-Level Access Control -stream authentication Application-Level Access Control: -fine granularity (resource + operation) -application level HTTP request Lightweight Tagging -one-way function

SEVA: Current Status Working Prototype –Traffic tagging –Application-level verification mechanism –Role management and delegation –Resource management and scoping Embedded technologies –SPKI –Handle System –Java Card –cryptography: Cryptix (Java), Cryptlib (C), GemXpresso

Summary: Classical vs. SEVA Extranets Access Control Management –identity / delegation+role –coarse / fine-grained Access Control Location –definition: network+application / application only –enforcement: network+application / network only Access Control Enforcement –configuration: manual / automated –user authentication: explicit / transparent