PKI : state of the art and future trends
|
|
|
- Jason Darcy Shepherd
- 10 years ago
- Views:
Transcription
1 PKI : state of the art and future trends David Chadwick [email protected] 25 Sept TrueTrust Ltd 1
2 Contents Review of X.509 state of the art to date What is new in X.509 (2016) What is new elsewhere ITU-T ISO IETF Conclusion 25 Sept TrueTrust Ltd 2
3 X.509 to date First version in 1988 (v1 certs) Second version in 1993 (v2 certs not used) Third version in 1997 (v3 certs basis of today s PKIs) Fourth version in 2001 (X.509 AC infrastructure basis of OASIS SAML attribute assertions) Subsequent versions: 2005, 2009, 2013 mainly bug fixes and minor enhancements Next version in 2016/7 has introduced a new trust model for open PKIs 25 Sept TrueTrust Ltd 3
4 Why a new Trust Model? Original X.509 PKI model assumed everyone would have a certificate from a CA, so that certificate subjects were also relying parties (RPs) Three cornered trust model Every RP had a relationship with its trust anchor/root of trust Cross certification ensured trust in other CAs when RP and subject had different CAs 25 Sept TrueTrust Ltd 4
5 3 Cornered (Closed) Trust Model Direct Trust relationship Indirect trust relationship Certification Authority Relying Party Public key certificate Certificate Subject 25 Sept TrueTrust Ltd 5
6 Certification Path Self-issued by trust anchor Trust anchor information = Cross certification Certification path CA - certificates PKI Relying party End - entity public - key certificate 25 Sept TrueTrust Ltd 6
7 Cross Certification Rarely/Never happens in practice Trust, legal and liability issues Certifying CA needs to trust certified CA Certifying CA takes on liabilities when cross certified CA fails to act properly, or is attacked, or makes a mistake etc. So lawyers ensured cross certification was not commercially viable 25 Sept TrueTrust Ltd 7
8 Lots of Trust Anchor CAs Direct Trust relationship Indirect trust relationship CA Certificates Self-issued by trust anchors PKI Relying party End - entity public - key certificates 25 Sept TrueTrust Ltd 8
9 State of Art - Today s PKI Technically X.509 PKI works and is ubiquitous Most common use of PKI is SSL/TLS for secure communication with millions of web servers But most RPs (users) do not have certificates or relationships with any CAs Over 600 commercial CAs in existence From many different countries How can an RP know if all of these are trustworthy? Reading their CPs/CPSs is not practical How can an RP get damages if CA is untrustworthy or careless or is hacked etc. When it has no formal relationship with CA Taking into account cross border legal issues 25 Sept TrueTrust Ltd 9
10 Many are not Trustworthy! In March 2011, Comodo s root CA was hacked and issued 9 SSL certificates for 7 domains including Microsoft, Google, Skype, Yahoo and Mozilla In Sept 2011, Diginotar CA went out of business after hackers broke in and issued at least 531 fraudulent certificates It issued certificates for the Dutch Government! Malaysian Agricultural Research and Development Institute CA (DigiCert Sdn. Bhd.) had its keys stolen in 2011 which allowed a fake Adode Flash Updater to be created which installed malware on users PCs turning them into spies. This CA s cert is now revoked by browsers 25 Sept TrueTrust Ltd 10
11 Compelled Certificate Creation Attack Government agency compels a national CA to issue a false SSL certificate to it in name of an Org or intermediate CA This certificate is then used by law enforcement to launch a MITM attack e.g. via a cyber café or hotel internet connection User s browser sees a genuine trusted SSL certificate from the site and lock icon is displayed Whilst Agency decrypts data using its MITM certificate and re-encrypts it for the genuine web site Packet Forensics from Arizona produce a commercial box for this MITM attack 25 Sept TrueTrust Ltd 11
12 Part of Packet Forensics Marketing Brochure 25 Sept TrueTrust Ltd 12
13 How do RPs manage? Browser manufacturers act as a proxy for all users in validating that a CA is trustworthy They SHOULD only add root certificates of trustworthy CAs to their trust stores They SHOULD check revocation information before validating a web sites certificates They SHOULD check all policy information in certificates such as key usage, policy fields, name constraints etc. when validating certificates They SHOULD remove untrustworthy root and subordinate CA certificates from their trust stores Can still find MD5 root certs, used by APTs Flame, Stuxnet etc. They SHOULD offer liabilities to users if they get it wrong and the user suffers a loss because of their neglect DO THEY? Read: Ahmad Samer Wazan, Romain Laborde, David W Chadwick, François Barrere, AbdelMalek Benzekri. Which web browsers process SSL certificates in a standardized way? 24th IFIP International Security Conference, Cyprus, May 18-20th, Sept TrueTrust Ltd 13
14 What is the alternative? Introduce a trusted third party trust broker who acts on behalf of RPs in validating certificates RP enters into a contractual relationship with TB, who will offer guarantees and compensation if it makes a wrong trust decision about a certificate TB will read CPs and CPSs of CAs and determine how trustworthy they are, what their certificates can be used for, and what liabilities they offer We have a four cornered trust model Rationale and model is presented in Ahmad Samer Wazan, Romain Laborde, François Barrere, Abdelmalek Benzekri, David W Chadwick. "PKI interoperability: Still an issue? A solution in the X.509 realm" Proc 8th World conference on Information Security Education, New Zealand July Sept TrueTrust Ltd 14
15 Trust Evaluation Direct trust relationship Indirect trust relationship Trust Broker Certification Authority Four Cornered (Open) Trust Model Relying Party Public key certificate Certificate Subject 25 Sept TrueTrust Ltd 15
16 New X.509 Trust Model Does Not Solve Everything Still need standardised protocol(s) for communications between RP and TB Support for TBs will need to be built into web browsers either via a plugin or direct manufacturer support Needs a profitable business model to ensure that entrepreneurs will offer a TB service All of the above is traditionally outside the scope of ITU-T X Sept TrueTrust Ltd 16
17 Other Proposed Changes in X.509 (2016) Cleaning up of the text Removing errors and inconsistencies and replacing badly worded descriptions Removing non-pki and PMI material from X.509 Move the directory authentication specifications from X.509 to X.511. Move Password Policy specifications from X.509 to X.511 Move Password Policy schema definitions from X.509 to X.520 Cleanly separate PKI and PMI into different sections In Aug 13 issued a defect report on text which said ACs and PKCs could appear in the same CRL Removing unused and duplicate ASN.1 data structures certificationpath, forwardcertificationpath and crosscertificate (pkipath is used instead) 25 Sept TrueTrust Ltd 17
18 Other X.509 Work PKI Profiles for Smart Grids Wireless PKI (WPKI) Cloud Computing Cryptographic Message Syntax (CMS) eliminate all obsolete ASN.1 features and make it usable with all ASN.1 standardized encoding rules Procedures for establishing and maintaining a PKI For large PKI networks with machine to machine interactions Certified Mail Transport and Certified Post Office Protocols The electronic equivalent of registered post 25 Sept TrueTrust Ltd 18
19 Smart Grids Vast numbers of devices connected to electricity grids possibly more than existing Internet so PKI scalability issues Means many more roots of trust, how will this be handled Means millions of cheap devices holding their own private keys and roots of trust, may be built in foreign factories by unvetted workers, so probably easily compromised, thus revocation issues CRLs today are consistently larger than first envisaged, so cause bandwidth and latency problems. OCSP also has performance issues What is the identity of the certificate subject? Manufacturer of device? Supplier of electricity? Owner of property? Occupant of property? Most not known when key is installed in device, so may need dynamic certification or other means of identifying subject such as an AC Who is authorised to request re-certification, or revocation? How do we rekey a hardware device whose private key has been compromised? How do we protect the privacy of the data subject? 25 Sept TrueTrust Ltd 19
20 ISO/IEC JTC1/SC27 New Study Group: Framework for PKI Policy / Practices / Audit TOR: To gauge interest in the development of an internationally accepted and standardized approach to the management, operation, assessment, and certification of PKI Trust Service Providers at varying levels of assurance. This includes management, procedural, assurance and technical standards Still at very early stage of fleshing out content. Focus seems to be on audit of trust service providers Next meeting Incheon, Republic of Korea, 21 st 25 th October Sept TrueTrust Ltd 20
21 IETF (1) PKIX Working Group Started in 1995 with goal of developing Internet standards to support X.509 PKIs Published over 60 RFCs about X.509 including: Protocols for certificate management, time stamping, online certificate status, use of LDAPv2 & FTP/HTTP, Data Validation and Certification Server, Delegated Path Validation and Delegated Path Discovery, Server based certificate validation, trust anchor management Profiles for PKCs and ACs, Qualified certificates New certificate extensions: logotype, proxy certs, warranty, permanent ID, attributes supporting authentication in PPP and WLAN, IP addresses and AS identifiers, subject identification method, clearance attribute Others: Diffie-Hellman POP Algorithm, SHA 224, DNS Certification Authority Authorization (CAA) Resource Record 25 Sept TrueTrust Ltd 21
22 IETF (2) Certificate Transparency from Google Experimental RFC 6962, June 2013 Log servers hold Merkle hash trees (append only logs) of all issued certificates. Any CA can send a cert to a log server and get a signed time stamp in response Monitor servers check on all log servers periodically and will flag any unauthorized or suspicious certificates Auditors (typically running in browsers) can check that any certificate and time stamp they receive appears in the log. If not, the certificate of the SSL site is suspect and should not be trusted Will stop MITM attacks, compelled certificate creation attacks, duplicate certs with stolen keys etc. Sovereign Keys from Electronic Frontier Foundation is a similar idea, using timeline servers to hold public keys of web sites 25 Sept TrueTrust Ltd 22
23 IETF (3) HTTP Strict Transport Security (HSTS) RFC 6797, Nov 2012, from Web Security Working Group Allows web sites to say that they are only contactable via HTTPS HTTP Response header contains the sites security policy Browsers remember the policy and will strictly enforce it This stops users clicking through browser security warnings of web sites that the browser does not trust Public Key Pinning Extension for HTTP Internet draft of Web Security WG HTTP protocol extension allowing web sites to instruct browsers to remember ("pin") the hosts' public keys for a given period of time During this time, browsers will require hosts to present a certificate chain including at least one Public Key that matches one of the pinned ones 25 Sept TrueTrust Ltd 23
24 IETF (4) Web PKI Operations (wpkops) working group improve the consistency of Web security behavior address the problems caused by hundreds of variations of Web PKI currently in use describe how Web PKI "actually" works in browsers and servers in common use today by The trust model on which it is based; The contents and processing of fields and extensions; The processing of the various revocation schemes; How the TLS stack deals with PKI, including varying interpretations and implementation errors, as well as state changes visible to the user. The state changes that are visible to and/or controlled by the user (to help predict the decisions that will be made the users and so determine the effectiveness of the Web PKI). Identification of when Web PKI mechanisms are reused by other applications and implications of that reuse. The working group will not describe how the Web PKI should work examine the certification practices of certificate issuers. investigate applications (such as client authentication, document signing, code signing, and secure ) 25 Sept TrueTrust Ltd 24
25 Conclusions X.509 PKI is now ubiquitous The PKI technology is pretty robust and secure providing the algorithms are kept up to date and the implementations are complete and correct The trust framework, policies, and procedures are the weakest areas This is where most of the standards work is now focussed, and where most of the successful attacks are New application domains are continually been found, with new requirements New/revised/enhanced standards are required for these 25 Sept TrueTrust Ltd 25
26 Any Questions? 25 Sept TrueTrust Ltd 26
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
State of PKI for SSL/TLS
State of PKI for SSL/TLS NIST Workshop on Improving Trust in the Online Marketplace Russ Housley Vigil Security, LLC Introduction State of the PKI for SSL/TLS: Mostly working, but too fragile Facing motivated
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004 Stefan Kotes, Engineering Manager Agenda Tumbleweed company overview Certification
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
SSL, PKI and Secure Communication
SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1 Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
ARPKI: Attack Resilient Public-Key Infrastructure
ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
epki Root Certification Authority Certification Practice Statement Version 1.2
epki Root Certification Authority Certification Practice Statement Version 1.2 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1 1.1.1 Certification Practice Statement...
Making Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by
Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates
Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Purpose, Methods, Revocation, PKIX To distribute public keys securely Requires - Certificates and Certification Authorities - Method for retrieving certificates
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.3 May 15, 2014 Table of Contents TABLE OF CONTENTS:... 2 1. INTRODUCTION... 7 1.1 OVERVIEW... 7 1.2 DOCUMENT
Microsoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Key Management and Distribution
Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
Ciphermail S/MIME Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail S/MIME Setup Guide September 23, 2014, Rev: 6882 Copyright 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 S/MIME 3 2.1 PKI...................................
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications
By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
Restricting Access with Certificate Attributes in Multiple Root Environments A Recipe for Certificate Masquerading
Restricting Access with Certificate Attributes in Multiple Root Environments A Recipe for Certificate Masquerading Capt James M. Hayes, USAF Systems and Network Attack Center National Security Agency Suite
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], buttyan@crysys.
Foundations for secure e-commerce (bmevihim219) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected]
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability Version 1.0.3 Prepared for: Department of Defense (DoD) PKI August 27, 2008 Page 1 Table of
phicert Direct Certificate Policy and Certification Practices Statement
phicert Direct Certificate Policy and Certification Practices Statement Version 1. 1 Effective Date: March 31, 2014 Copyright 2013-2014 EMR Direct. All rights reserved. [Trademark Notices] phicert is a
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :
SSL: Paved With Good Intentions. Richard Moore [email protected]
SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
TeliaSonera Server Certificate Policy and Certification Practice Statement
TeliaSonera Server Certificate Policy and Certification Practice Statement v.1.4 TeliaSonera Server Certificate Policy and Certification Practice Statement CA name Validation OID TeliaSonera Server CA
StartCom Certification Authority
StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.1 January, 2009 Table of Contents: TABLE OF CONTENTS:...2 1. INTRODUCTION...7 1.1 OVERVIEW...7 1.2 DOCUMENT
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Comodo Certification Practice Statement
Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
Digital Signatures in a PDF
This document describes how digital signatures are represented in a PDF document and what signature-related features the PDF language supports. Adobe Reader and Acrobat have implemented all of PDF s features
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
Digital Certificates Demystified
Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: [email protected] February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
TechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
Axway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
PKI Services: The Best Kept Secret in z/os
PKI Services: The Best Kept Secret in z/os Wai Choi, CISSP IBM Corporation August 7th, 2014 Session: 15773 Trademarks The following are trademarks of the International Business Machines Corporation in
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
CERTIFICATE POLICY KEYNECTIS SSL CA
CERTIFICATE POLICY KEYNECTIS SSL CA Date: 05/02/2009 KEYNECTIS SSL CA CERTIFICATE POLICY Subject: KEYNECTIS SSL CA Certificate Policy Version number: 1.1 Number of pages: 49 Status of the Project Final
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.
QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.3 Effective Date: 20 April 2009 Version: 4.6 Copyright QuoVadis
CMS Illinois Department of Central Management Services
CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised
CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)
Computer Science CSC/ECE 574 Computer and Network Security Topic 7.2 Public Key Infrastructure (PKI) CSC/ECE 574 Dr. Peng Ning 1 What Is PKI Informally, the infrastructure supporting the use of public
Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points
Configuring DoD PKI This document describes the procedures to configure an XML Firewall that is interoperable with the United Stated Department of Defense (DoD) Public Key Infrastructure (PKI). High-level
- X.509 PKI EMAIL SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1
- X.509 PKI EMAIL SECURITY GATEWAY Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1 Commerzbank AG - Page 1 Document control: Title: Description : RFC Schema: Authors: Commerzbank
Visa Public Key Infrastructure Certificate Policy (CP)
Visa Public Key Infrastructure Certificate Policy (CP) Version 1.7 Effective: 24 January 2013 2010-2013 Visa. All Rights Reserved. Visa Public Important Note on Confidentiality and Copyright The Visa Confidential
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Trusted Certificate Service (TCS)
TCS Personal and escience Personal CA CPS Version 2.0 (rev 15) Page 1/40 Trusted Certificate Service (TCS) TCS Personal CA, escience Personal CA, and Document Signing CA Certificate Practice Statement
Certificate Policy for. SSL Client & S/MIME Certificates
Certificate Policy for SSL Client & S/MIME Certificates OID: 1.3.159.1.11.1 Copyright Actalis S.p.A. All rights reserved. Via dell Aprica 18 20158 Milano Tel +39-02-68825.1 Fax +39-02-68825.223 www.actalis.it
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
TeleTrusT European Bridge CA Status and Outlook
TeleTrusT European Bridge CA Status and Outlook TeleTrusT Workshop, Saarbrücken, 2010-06-11 Dr. Guido von der Heidt, Siemens AG Copyright Siemens AG 2010. All rights reserved. Secure (E-Mail) Communication
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2
Certificate Policy KEYNECTIS SSL CA CP Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 KEYNECTIS SSL CA CP Version 1.2 Pages 51 Status Draft Final Author Emmanuel Montacutelli OpenTrust
Internet Security Research Group (ISRG)
Internet Security Research Group (ISRG) Certificate Policy Version 1.0 Updated May 5, 2015 Approved by ISRG Policy Management Authority ISRG Web Site: https://letsencrypt.org Page 1 of 83 Copyright Notice
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
X.509 Certificate Revisited
X.509 Certificate Revisited Tohari Ahmad Informatics Department, Faculty of Information Technology - FTIF, ITS Surabaya Email: [email protected] Abstract A digital certificate is used for identifying
Blue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
DigiCert Certification Practice Statement
DigiCert Certification Practice Statement DigiCert, Inc. Version 2.22 June 01, 2005 333 South 520 West Orem, UT 84042 USA Tel: 1-801-805-1620 Fax: 1-801-705-0481 www.digicert.com 1 General...7 1.1 DigiCert,
