X.509 at the University of Michigan CIC-RPG Meeting June 7, 1999 Kevin Coffman Bill Doster

Slides:



Advertisements
Similar presentations
INFN CA1 active since July manager: –Roberto Cecchini types of certificates released: –personal –server –object signing.
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Digital Certificate Installation & User Guide For Class-2 Certificates.
MyProxy: A Multi-Purpose Grid Authentication Service
Inter-Institutional Registration UNC Cause December 4, 2007.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Password? CLASP Project Update C5 Meeting, 16 June 2000 Denise Heagerty, IT/IS.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
COMP3123 Internet Security Richard Henson University of Worcester October 2010.
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Kerberos Authentication for Multi-organization Cross-Realm Kerberos Authentication User sent request to local Authentication Server Local AS shares cross-realm.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Abdelilah Essiari Gary Hoo Keith Jackson William Johnston Srilekha Mudumbai Mary Thompson Akenti - Certificate-based Access Control for Widely Distributed.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Using Digital Credentials On The World-Wide Web M. Winslett.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Internet Security Terms and Techniques Chris Avram Faculty of Information Technology Monash University 1U-Cubed ‘99Chris Avram.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Authentication June 24/2003. Overview Terminology Local Passwords Early Password Services Kerberos Basics Tickets Ticket Acquisition Kerberos Authentication.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
Session 11: Security with ASP.NET
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
KX509: Leveraging Kerberos to Obtain Digital Certificates for Web Client Authentication University of Michigan Kevin Coffman Bill Doster.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Unit 1: Protection and Security for Grid Computing Part 2
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Building Security into Your System Bill Major Gregory Ponto.
Module 11: Securing a Microsoft ASP.NET Web Application.
Fall 2010/Lecture 321 CS 426 (Fall 2010) Key Distribution & Agreement.
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
UMBC’s WebAuth Robert Banz – UMBC
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cybersecurity Computer Science Innovations, LLC. Certificates Generate Public and Private Key Sign the Public Key with a CA Private Key Append the Cert.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Fermilab CA Infrastructure EDG CA Managers Mtg June 13, 2003.
1 Example security systems n Kerberos n Secure shell.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Radius, LDAP, Radius used in Authenticating Users
Microsoft Word 2003 Illustrated Complete
Using SSL – Secure Socket Layer
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
Presentation transcript:

X.509 at the University of Michigan CIC-RPG Meeting June 7, 1999 Kevin Coffman Bill Doster

Project Goals n Transparent Web Authentication n Eliminate password prompts n Lotus Notes Authentication n Position for inter-institution Authentication

Non-Goals n Not a complete PKI n Not to be used for document signing n Not to be used for encryption n Not a complete replacement of the current cookie method

Why X.509? n An accepted standard n Application support out of the box –Web servers, web browsers, directory servers, IMAP servers, etc. n Allows the possibility for inter-institution authentication n No need for N²-1 cross-realm trusts

Description n Use short-term (approximately 1 day) certificates - “Junk Keys” n Obtain certificates securely n For Authentication ONLY! n Use OpenSSL for creating and signing certificates

Why “Junk Keys”? n Revocation becomes a non-issue n Private Key storage is less an issue n Certificate publication for sharing is not necessary n Certificate management is less critical

Drawbacks n Cannot be used for signing or encryption n Not possible to verify certificate via LDAP

Options for obtaining the CA’s Certificate n Bake it into browsers we distribute n Via a web interface using SSL and Verisign Certificate n Store it in the file-system

Obtaining CA Certificate via Web CA Apache + OpenSSL + Scripts + Verisign Certificate Browser Netscape or Internet Explorer Certificate Green lines imply SSL Protected

Options for obtaining the User Certificate n Via a web-based interface [ SSL ] n Pam / Gina / Login [ TGT or SSL ] n Standalone program [ TGT (or SSL) ] n Leave it up to application [ TGT (or SSL) ]

Obtaining User Certificate via Web (Netscape) User selects URL ID and password?? ID and password Lookup full name Lookup Entity ID Generate and Sign Certificate Verify identity keyGen Public Key Signed Certificate Generate key pair and store keys Store Certificate Netscape Browser Web server / CA

Obtaining User Certificate via Web (IE part 1) User selects URL ID ?? Send a VBScript asking for user’s unique ID ieReq.pl Web server / CA Internet Explorer Browser

Obtaining User Certificate via Web (IE part 2) password ?? ieGenReq.pl Web server / CA Internet Explorer Browser ID (uniqname) Lookup full name Lookup Entity ID Generate VBScript to create key pair and PKCS #10 request Run VBScript to generate key pair and PKCS #10 request

Obtaining User Certificate via Web (IE part 3) PKCS #7 Check password Generate certificate and wrap it in PKCS #7 format Generate VBScript to accept PKCS #7 ieTreatReq.pl Web server / CA Internet Explorer Browser password + PKCS #10 Run VBSript to accept PKCS #7 Phew! Done!

Obtaining User Certificate via Standalone Pgm (Netscape) public key signed certificate Client Machine Certificate Authority getcert keyutilcertutil key3.dbcert7.db Lookup full name Lookup Entity ID Generate and sign certificate Orange lines imply Kerberized exchange

Obtaining User Certificate via Standalone Program (IE) signed certificate Certificate Authority Client Machine Use OpenSSL to generate key pair public key Store key pair Store certificate Lookup full name Lookup Entity ID Generate and sign certificate

Storing the Certificates n How to destroy the certificates after use? n NT 4.0 w/SP3 and later has special storage classes that lives only for the life of a login n Make use of Kerberos credential storage? n Internet Explorer vs. Netscape

Problems n Documentation - Flood or Drought n Macintosh support lags other platforms

Current Status n Internet Explorer (Windows only) looks promising n Netscape (Windows, Solaris) do-able but not clean n Macintosh support does not currently look promising for either browser

References n This presentation: – n OpenSSL: – n Netscape Security Services: – n Microsoft CryptoAPI: –

?? Questions / Discussion ??