29 October 2001Terena TF-LSD1 Certificate Retrieval With OpenLDAP David Chadwick.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Slide #1 URI List Index Lucent Technologies Tom Hiller Dean Willis Adam Roach.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
Indications in green = Live content Indications in white = Edit in master Indications in blue = Locked elements Indications in black = Optional elements.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Fed/Ed PKI 2008, June Subject Unique Identifier or Equivalent William A. Weems & Mark B. Jones Academic Technology U. Texas Health Science Center at Houston.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Secure Information Sharing Using Attribute Certificates and Role Based Access Control Ganesh Godavari, C. Edward Chow 06/22/2005 University of Colorado.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Copyright © 2003 Americas’ SAP Users’ Group Simple Document Management in Project Systems Kent Bettisworth BETTISWORTH & ASSOCIATES, INC. Tuesday, May.
Wednesday, June 03, 2015 © 2001 TrueTrust Ltd1 PERMIS PMI David Chadwick.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Configuration Management Supplement 67 Robert Horn, Agfa Healthcare.
VDA Security Services Freeware Libraries Update IETF S/MIME WG 29 March 2000 John Pawling J.G. Van Dyke & Associates (VDA), Inc;
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Secure Socket Layer (SSL)
Certificate Retrieval from OpenLDAP The X.509 attribute Parsing Server (XPS)
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
Extending OpenLDAP Luke Howard PADL Software Pty Ltd Copyright © 2003 PADL Software Pty Ltd. All rights reserved. PADL is a registered trademark of PADL.
Unit 1: Protection and Security for Grid Computing Part 2
COEN 351 Certificates, PKI, X509 Standard. Certificates Key distribution Crucial for authentication, privacy, signing, … Public Key Technology can use.
Certificate revocation list
Object-Oriented Analysis & Design Subversion. Contents  Configuration management  The repository  Versioning  Tags  Branches  Subversion 2.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
LDAP Items
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
KMIP 1.3 Deprecation February 20, Deprecation 5.1 KMIP Deprecation Rule Items in the normative KMIP Specification [KMIP-Spec] document can be marked.
The LDAP Schema Registry and its requirements on Slapd development OpenLDAP Developers' Day San Francisco 21 March 2003 Peter Gietz, DAASI International.
HEPSYSMAN UCL, 26 Nov 2002Jens G Jensen, CLRC/RAL UK e-Science Certification Authority Status and Deployment.
26 July 2007IETF 69 PKIX1 Use of WebDAV for Certificate Publishing and Revocation
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
ESA UNCLASSIFIED – For Official Use Workshop #23 Pasadena, USA 25 rd March 2015 Sam Cooper Common services update (part 2)
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Slide #1 Boston, Jan 5 – 6, 2005XCON WG Interim draft-levin-xcon-cccp-01.txt By Orit Levin
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Some Technical Issues in PKI Deployment David Chadwick
15 May 2001© 2001 University of Salford1 Deficiencies in LDAP when used to support Public Key Infrastructures David W Chadwick
Query Health Technical WG Update 1/12/2011. Agenda TopicTime Slot Administrative stuff and reminders2:00 – 2:05 pm Specification Updates QRDA HQMF Query.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
LDAP- Protocol and Applications. Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients.
Change Transactions: Changing Appointment Start Dates, Extending Existing Appointments and Reporting Funding Changes (including October increases) REWRITE.
PAPI-PERMIS Integration Project Proposal David Chadwick
LDAP for PKI Problems Cannot search for particular certificates or CRLs Cannot retrieve particular certificates or CRLs.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
SCVP-28 Tim Polk November 8, Current Status Draft -27 was submitted in June ‘06 –AD requested a revised ID 8/11 –No related discussion on list –Editors.
GRID-FR French CA Alice de Bignicourt.
Armenian e-Science Foundation Certification Authority Ara A. Grigoryan 1,2, Artem Harutyunyan 1,2,3, Arsen Hayrapetyan 1,2,4 1 Armenian e-Science Foundation;
LDAP PKI and PMI Schemas
زير ساخت كليد عمومي و گواهي هويت
Resource Certificate Profile
Implementation of EIDE Gateway using ACES Callouts
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
The devil is in the details
Presentation transcript:

29 October 2001Terena TF-LSD1 Certificate Retrieval With OpenLDAP David Chadwick

29 October 2001Terena TF-LSD2 The Project 18 months, funded by Terena and 5 NRENs –SWITCH, RedIRIS, SURFnet, CESNET, UNINETT Adding source code to OpenLDAP to support 2 Internet Drafts –Matched Values, LDAP Schema for PKIs and PMIs

29 October 2001Terena TF-LSD3 Matched Values Tasks Add code to Pick up and parse matched values control Do additional pass through attribute values returned by Search Filter, using new filter in matched values control Returned only matched values in Search Results

29 October 2001Terena TF-LSD4 Certificate Matching Tasks Parse certificates/CRLs, extract fields (key usage etc.) Define way of storing indexes on embedded fields Add extracted fields to new indexes Define syntaxes for AVAs Update client to present new filter request Perform new filtering, find the certificates or CRLs that match, then return them

29 October 2001Terena TF-LSD5 AVA Notation Certificate Base FieldLDAP AVA Notation Version numberuserCertificate.version Serial numberuserCertificate.serialNumber Algorithm IdentifieruserCertificate.signature.algorithm Issuer DNuserCertificate.issuer Start validity timeuserCertificate.validity.notBefore End validity timeuserCertificate.validity.notAfter Subject DNuserCertificate.subject Subject’s public keyuserCertificate.subjectPublicKey Subject’s PK alg id userCertificate.subjectPublicKey.algorithm Issuer unique iduserCertificate.issuerUID Subject unique iduserCertificate.subjectUID Extension object identifieruserCertificate.extensionOID Extension criticality flaguserCertificate.extensionCriticality

29 October 2001Terena TF-LSD6 How You Can Help - User Requirements Which fields should we extract and index on? PK Certificate –has 11 base field –16 standard X.509 extensions –2 PKIX extensions –an infinite number of private extensions (from Netscape, MS, Entrust, Baltimore etc.) AC Certificate has12 X.509 AC extensions CRL has –7 base fields –13 standard X.509 extensions

29 October 2001Terena TF-LSD7 X.509 PK Certificate Extensions subjectDirectoryAttributes subjectKeyIdentifier keyUsageprivateKeyUsagePeriod subjectAltName issuerAltNamebasicConstraints cRLNumber reasonCode instructionCode invalidityDate deltaCRLIndicator issuingDistributionPointcertificateIssuer nameConstraintscRLDistributionPoints certificatePolicies policyMappings authorityKeyIdentifierpolicyConstraints extKeyUsagecRLStreamIdentifier cRLScopestatusReferrals freshestCRL orderedListbaseUpdateTime deltaInfo inhibitAnyPolicy

29 October 2001Terena TF-LSD8 Implementation For each new extension –Server will need to know the ASN.1 data type –Server will need to build a new index –Client will need to be able to enter the matching information Implies a configuration option in OpenLDAP We are proposing to build –Indexes for every basic field and –A handful of X.509 and PKIX standard extensions –The OID and criticality flag of each extension Which extensions will be the most useful to YOU?

29 October 2001Terena TF-LSD9 Finally OpenLDAP has virtually no documentation and no comments in source code –If you have some let us have it!!!