Michael Myers VeriSign, Inc.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Dynamic Symmetric Key Provisioning Protocol (DSKPP)
XML Key Management Requirements W3C XML Key Management Working Group Meeting – Dec 9 th, 2001 Frederick Hirsch (Zolera Systems) Mike Just (Entrust)
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Open Policy Meeting SIG: Whois Database October 2000 APNIC Certificate Authority.
SSL Implementation Guide Onno W. Purbo
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Overview of draft-ietf-sidr-roa-format-01.txt Matt Lepinski BBN Technologies.
Lecture 23 Internet Authentication Applications
Chapter 5 Network Security Protocols in Practice Part I
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Public Key Superstructure It’s PKI Jim, but not as we know it! 7 th Annual “IDtrust” Symposium 5 March 2008, Gaithersburg MD, USA Stephen Wilson Lockstep.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
PUBLIC KEY INFRASTRUTURE Don Sheehy
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Homework #8 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Trusted Archive Protocol (TAP) Carl Wallace
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
ITA, , 7-Secure .pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA)
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
VDA Security Services Freeware Libraries Update IETF S/MIME WG 29 March 2000 John Pawling J.G. Van Dyke & Associates (VDA), Inc;
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
S/MIME Freeware Library IETF S/MIME WG 13 December 2000 Getronics Government Solutions.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Certificate revocation list
Communications-Electronics Security Group. PKI interoperability issues for UK Government Richard Lampard
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Cullen Jennings Certificate Directory for SIP.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
CMC and PKI4IPSEC Jim Schaad. Requirements Issues What does MAY really mean What does SHOULD really mean Requirements on Admin Peer Requirements on structure.
LTANS service and protocol Carl Wallace (on behalf of Peter Sylvester) 6 Aug 2004, 60th IETF, San Diego.
TNC Proposals for NEA Protocols Presentation by Steve Hanna to NEA WG meeting at IETF 71 March 11, 2008.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Overview of draft-ietf-sidr-roa-00.txt Steve Kent BBN Technologies.
CCSDS Security/DTN Status 11/6/2015 DENNIS IANNICCA CCSDS GRC CHARLES SHEEHE CCSDS GRC POC 1.
Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
Brian Tung Issues List by Jeff Hutzelman
Domain Security Services Using S/MIME draft-ietf-smime-domsec-04.txt William Ottaway DERA Malvern,UK IETF 47 Adelaide, Australia.
S/MIME Capabilities Certificate Extension Stefan Santesson Microsoft.
SCVP-28 Tim Polk November 8, Current Status Draft -27 was submitted in June ‘06 –AD requested a revised ID 8/11 –No related discussion on list –Editors.
SCEP Simple Certificate Enrollment Protocol.
Resource Certificate Provisioning Protocol Geoff Huston IETF 70 December 2007.
Electronic mail security
Jim Schaad Soaring Hawk Security
Security Services for
S/MIME T ANANDHAN.
MAIL AND SECURITY PERTEMUAN 13
WEQ-012 PKI Overview March 19, 2019
Update on BRSKI-AE – Support for asynchronous enrollment
Presentation transcript:

Michael Myers VeriSign, Inc. mmyers@verisign.com CMC (RFC 2797) Michael Myers VeriSign, Inc. mmyers@verisign.com

Objectives Industry de-facto standard use of PKCS-10 for certificate requests and PKCS-7 for responses. Primary objectives: Simplify online certificate management by building on existing PKCS7 and PKCS10 practice. Reuse existing security encapsulation mechanism then being standardized as CMS in the IETF. Define core functions useful for automated certificate management. Straw poll of WG at San Jose IETF ratified the need for an alternative.

Background VeriSign, Cisco started work earlier. Went through several variations (including a draft called Certificate Request Syntax (CRS)). Emerged as Certificate Management over CMS (CMC) with Certificate Request Message Format (CRMF) as a by-product. Brian LaMacchia and Jim Schaad are principal technical architects of final versions. Now RFC 2797.

Top-Level Requirements Based as much as possible on the existing CMS, PKCS#10 and CRMF specifications. Support the current industry practice of a PKCS#10 request followed by a PKCS#7 response as a subset of the protocol. Must easily support the multi-key enrollment protocols required by S/MIME and other groups. Must supply a way of doing operations in a single-round trip whenever possible. Enable all key generation to occur on the client. Support mandatory and optional algorithms. Support pending responses to certificate requests for cases where external procedures are required to issue a certificate. Support Registration Authorities.

Protocol Overview Standardizes use of bare PKCS-10 for environments with a need for it. Defines a means to “wrap a 10 in a 7”. i.e use of CMS to encapsulate the PKCS 10 object. May also use CRMF instead of a 10. Responses based on CMS signedData. Again, this could be nothing more than a “7”. Or a responseBody in a CMS encapsulation.

Services Issuance (direct and deferred) Revocation Registration authority intervention Certificate/CRL retrieval Replay detection through nonces Transaction management through transaction IDs.

Simple request/response Simple PKI Request Simple PKI Response ------------------------- --------------------------   +----------+ +------------------+ | PKCS #10 | | CMS "certs-only" | +----------+--------------+ | message | | | +------------------+------+ | Certificate Request | | | | | | CMS Signed Data, | | Subject Name | | no signerInfo | | Subject Public Key Info | | | | (K_PUB) | | signedData contains one | | Attributes* | | or more certificates in | | | | the "certificates" | +-----------+-------------+ | portion of the | | signed with | | signedData. | | matching | | | | K_PRIV | | encapsulatedContentInfo | +-------------+ | is empty. | | | +--------------+----------+ | unsigned | +----------+

Full Request/Response +----------------+ +----------------+ | CMS signedData | | CMS signedData | | object | | object | +----------------+--------+ +----------------+--------+ | | | | | PKIData object | | ResponseBody object | | Sequence of: | | Sequence of: | | <enrollment attribute>* | | <enrollment attribute>* | | <certification request>*| | <CMS object>* | | <CMS objects>* | | <other message>* | | <other message>* | | | | | | where * == zero or more | | where * == zero or more | | | | | | All certificates issued | | Certificate requests | | as part of the response | | are CRMF or PKCS#10 | | are included in the | | objects. Attributes are | | "certificates" portion | | (OID, ANY defined by | | of the signedData. | | OID) pairs. | | Relevant CA certs and | | | | CRLs can be included as | +-------+-----------------+ | well. | | signed (keypair | | | | used may be pre-| +---------+---------------+ | existing or | | signed by the | | identified in | | CA or an LRA | | the request) | +---------------+ +-----------------+  

Control Attributes ----------------- ---------- -------------- Control Attribute OID Syntax ----------------- ---------- -------------- cMCStatusInfo id-cmc 1 CMCStatusInfo identification id-cmc 2 UTF8String identityProof id-cmc 3 OCTET STRING dataReturn id-cmc 4 OCTET STRING transactionId id-cmc 5 INTEGER senderNonce id-cmc 6 OCTET STRING recipientNonce id-cmc 7 OCTET STRING addExtensions id-cmc 8 AddExtensions encryptedPOP id-cmc 9 EncryptedPOP decryptedPOP id-cmc 10 DecryptedPOP lraPOPWitness id-cmc 11 LraPOPWitness getCert id-cmc 15 GetCert getCRL id-cmc 16 GetCRL revokeRequest id-cmc 17 RevokeRequest regInfo id-cmc 18 OCTET STRING responseInfo id-cmc 19 OCTET STRING QueryPending id-cmc 21 OCTET STRING idPOPLinkRandom id-cmc 22 OCTET STRING idPOPLinkWitness id-cmc 23 OCTET STRING idConfirmCertAcceptance id-cmc 24 CMCCertId

A few other technical details Subscriber privacy achieved through use of CMS enveloped data mechanisms. Three transport wrapping options MIME for HTTP and email Binary for out of band floppy disk transfer (either bare or MIME) Socket-based using the raw BER encoding. Able to prove identity based on a shared secret. Able to prove possession of encryption-only keys. Able to link identity proof to possession proof.