Public Key Infrastructure in idrac



Similar documents
COSC4377. Chapter 8 roadmap

Cloud Computing. Lecture 5 Grid Security

A STEP- BY-STEP GUIDE

Configuring HTTPS support. Overview. Certificates

Factory Application Certificates and Keys Products: SB700EX, SB70LC

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

DELL Remote Access Configuration Tool

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

SSL/TLS: The Ugly Truth

CS 772. Network Security: Concepts, Protocols and Programming Fall 2008 Final Exam Time 2 & 1/2 hours Open Book & Notes.

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Safety 1st Mobile Security. Markus Kopf payleven

X.509 Certificate Generator User Manual

Using custom certificates with Spectralink 8400 Series Handsets

Using etoken for SSL Web Authentication. SSL V3.0 Overview

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

Security Digital Certificate Manager

Security Policy Revision Date: 23 April 2009

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

Network Security Protocols

Managing Web Server Certificates on idrac

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

Security Digital Certificate Manager

Encrypted Connections

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities

Dell Compellent Storage Center

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Configuring idrac6 for Directory Services

Installing idrac Certificate Using RACADM Commands

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Lab Configure Basic AP Security through IOS CLI

Kerberos -Based Active Directory Authentication to Support Smart Card and Single Sign-On Login to DRAC5

Configuring SSL Termination

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Chapter 7 Managing Users, Authentication, and Certificates

BEA Weblogic Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013

Generating and Installing SSL Certificates on the Cisco ISA500

ASA 8.x: Renew and Install the SSL Certificate with ASDM

NIST ITL July 2012 CA Compromise

Cryptography Basics. 1 Secret Key Encryption. 1.1 Classical Cryptosystems. Lecture Notes (Syracuse University) Cryptography Basics: 1

Clearswift Information Governance

Configuring Digital Certificates

Key Management and Distribution

CS 356 Lecture 28 Internet Authentication. Spring 2013

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

How to Setup and Configure ESXi 5.0 and ESXi 5.1 for OpenManage Essentials

Integrating idrac7 With Microsoft Active Directory

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

How To Understand And Understand The Security Of A Key Infrastructure

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Chapter 4 Virtual Private Networking

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Secure Data Transfer

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Public Key Infrastructure (PKI)

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Integrating idrac 7 with Microsoft Active Directory

Virtual Private Network with OpenVPN

Implementing Secure Sockets Layer on iseries

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

Certificates for computers, Web servers, and Web browser users

Generating SSH Keys and SSL Certificates for ROS and ROX Using Windows AN22

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Credit Card Security

Requesting Access to IBM Director Agent on Windows Planning / Implementation

Configuring Single Sign-On for Application Launch in OpenManage Essentials

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

IBM i Version 7.3. Security Digital Certificate Manager IBM

Securing Service Access with Digital Certificates

IBM Client Security Solutions. Client Security User's Guide

Extended SSL Certificates

[SMO-SFO-ICO-PE-046-GU-

What Are Certificates?

HMRC Secure Electronic Transfer (SET)

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example

Asymmetric cryptosystems fundamental problem: authentication of public keys

GENERAL FILE TRANSFER GUIDELINES

Security Guide. BES12 Cloud

Two Factor Authentication in SonicOS

Ciphire Mail. Abstract

Integrated SSL Scanning

Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER

webmethods Certificate Toolkit

RSA Authentication Manager 7.1 Basic Exercises

4.1 SSL: Secure Socket Layer

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC)

Remote Installation of VMware ESX Server Software Using Dell Remote Access Controller

Public Key Infrastructure

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Overview. SSL Cryptography Overview CHAPTER 1

CASHNet Secure File Transfer Instructions

EMC Data Protection Search

Crypto Lab Public-Key Cryptography and PKI

Purchase and Import a Signed SSL Certificate

SSL Insight Certificate Installation Guide

Transcription:

A Dell Technical White Paper Dell Enterprise Team Jeethendra Telagu

THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. 2011 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. Dell, the DELL logo, and the DELL badge are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. March 2011 ii

Contents Overview of Public Key Infrastructure... 4 Registration Authority... 4 Certificate Authority... 5 Certificate Management... 5 Certificate Distributor... 5 Asymmetric Keys... 5 Components of an Asymmetric Key... 7 Exponent... 7 Modulus... 7 Third Party PKI... 7 Implementing PKI Using idrac... 8 Obtaining an idrac Web Server Digital Certificate using Third Party PKI... 8 Registering With the Third Party PKI... 8 Generating a CSR... 8 Receiving a Digitally Signed Certificate from the Trusted Third Party PKI... 9 Uploading the Digital Certificate to idrac... 10 Authentication Using a Web Server Certificate... 11 Logging Into idrac Using PKI... 13 Conventional User ID and Password Method... 13 Public Key Infrastructure Method... 13 Advantages of Using Public Key Infrastructure... 14 Disadvantages of Using Public Key Infrastructure... 14 iii

Overview of Public Key Infrastructure Public Key Infrastructure (PKI) is a set of policies or procedures defined by individuals or a standards body to create, manage and distribute digital certificates to support the secure exchange of data. idrac6 supports PKI over SSH. This security feature improves SSH scripting automation by removing the need to embed or prompt for a user ID or password. The various components of PKI include: Registration Authority (RA) Certificate Authority (CA) Certificate Management (CM) Certificate Distributor (CD) The central feature of the PKI framework is the Certificate Authority (CA), as shown in the following figure: Figure 1. PKI Infrastructure RA User info to register Confirmation User CM CA Request for CA (CSR, user info, public key) CD CA.crt + Digitally signed certificate Registration Authority Before a user can use the services of a CA, they must first enroll with a Registration Authority (RA). The Registration Authority registers the user after validating the user s identity. Thereafter, whenever the user requests a service from the CA, the Registration Authority will first check the user s credentials. 4

Certificate Authority The Certificate Authority (CA) provides several key functions in the PKI framework. First, the CA checks that that the user is who they claim to be by confirming their identity with the Registration Authority. The CA then generates a unique key pair (CA key) which corresponds to the registered user. The key pair consists of a private key and a public key. The CA public key will be generated in the form of a public key digital certificate. The CA distributes the CA public key certificate to the corresponding registered user. Another main function of the CA is to certify the user public key (a public key generated by the user in their host machine) and generate a digital certificate. The CA binds the user s unique identity or the user information provided by the user with the public key by digital signature. The digital signature is an encryption of the user s unique identity, certificate information, and user s public key, using the CA private key which corresponds to that user. The signature then becomes the part of the public key digital certificate. The digital certificate is then distributed to the user. The x.509 v3 standard is the most commonly used digital certificate format. Certificate Management The Certificate Management manages the list of CA public key digital certificates corresponding to the registered users. Each digital certificate is generated with a validity period. The CM validates the certificate against its validity time and revokes any expired certificates. Note that any public key certificate signed by an expired or invalid root CA private key is also invalid. Certificate Distributor The Certificate Distributor distributes the digital certificates to the corresponding users registered with the Registration Authority. Asymmetric Keys An asymmetric key cryptosystem uses a key pair consisting of a unique private key and a corresponding public key. As the name implies, the private key is held secret and the public key is made public. The asymmetric key cryptosystem uses the private key for encryption and the public key for decryption. The key pair is typically generated using the RSA algorithm. 5

Figure 2. Overview of an Asymmetric Key Exchange Alice Pa1 = private key Pa2 = public key Bob Pb1 = private key Pb2 = public key Pa2 Pb2 EM1 = Pb2(M1) M1 = Pb1(EM1) EM2 = Pa2(M2) M2 = Pa1(EM2) Consider the example shown in Figure 2 to understand asymmetric key cryptology. Alice and Bob each have a unique key pair. The private key is held secret and the public key information is exchanged between the two users. First, Alice uses Bob s public key Pb2 to encrypt message M1 before sending it to Bob. Encrypted message EM1 = Pb2(M1) Next, Bob extracts message M1 by decrypting EM1. Bob uses his private key Pb1 for decryption. Decrypted message M1 = Pb1(EM1) Bob then uses Alice s public key Pa2 to encrypt message M2 before sending it to Alice. Encrypted message EM2 = Pa2(M2) Finally, Alice uses her private key Pa1 to decrypt and extract the message M2. 6

In the case of a man in the middle attack, a hacker will have both the public key and the encrypted messages, but still cannot decrypt the encrypted message because of the lack of private keys. (Note that in asymmetric key cryptography the message encrypted by a private key can only be decrypted by the corresponding public key.) Components of an Asymmetric Key The typical RSA key consists of the following information: Exponent Modulus Exponent The exponent can have a maximum size of 65537, with a range of 3 65537. The greater the exponent, the more secure the key is. However data encrypted with a key which has a large exponent takes more time to decrypt. The private and public keys will have unique exponents. Modulus The size of the modulus defines the key size. The key size ranges from 786 bits to 4096 bytes. Both the private key and corresponding public key will have the same modulus. Third Party PKI Third Party PKI or Trusted Third Party PKI can be used for certificate authority services. The components of third party PKI are the same as PKI except the Certificate Authority function is handled and maintained by a trusted third party. Companies such as Verisign offer services for third party PKI. 7

Implementing PKI Using idrac Obtaining an idrac Web Server Digital Certificate using Third Party PKI The idrac has a web server that is configured to use the industry-standard SSL security protocol to transfer encrypted data over the network. SSL protocol is built on the asymmetric key cryptosystem technology previously discussed. The SSL-enabled system can perform the following tasks: Authenticate itself to an SSL-enabled client Allow the client to authenticate itself to the server Allow both systems to establish an encrypted connection The idrac web server has a Dell-signed SSL web certificate by default. However, to ensure high security, a SSL web server digital certificate signed by a third party PKI should be used. The process to obtain the certificate is as follows: 1. Register with the third party PKI 2. Generate a certificate signing request (CSR) 3. Submit a Request for Certificate to the Third Party PKI CA 4. Receive a digitally signed certificate from the CA 5. Upload the digital certificate to idrac Registering With the Third Party PKI. The user has to first register with the third party PKI by providing user information. Once the user s identity is confirmed, the third party PKI generates a CA key pair corresponding to that user. The CA private key is held secret by the third party PKI whereas the CA public key is distributed to the user as a CA digital certificate. Generating a CSR The user can then use the idrac GUI to generate a CSR or certificate signing request. The idrac internally generates a key pair and uses the user information as well as the public key from the CA to generate a CSR file. (The CSR file can also be encrypted with the user private key.) The CSR consist of the user s information and the CA public key: Common name Organization name Organization unit Locality State CA public key 8

A sample CSR file is shown below: -----BEGIN CERTIFICATE REQUEST----- MIIBijCB9AIBADBLMQswCQYDVQQGEwJVUzELMAkGA1UECBMCVHgxCzAJBgNVBAcT AlJSMQ0wCwYDVQQKEwREZWxsMRMwEQYDVQQDEwpqZWV0aGVuZHJhMIGfMA0GCSqG SIb3DQEBAQUAA4GNADCBiQKBgQC++EOp37BPaAFWb3OiA85n3jU+U5fUsUxTRiqP DbpwfiwBDlyImnrdKVbqOdeSFAZSDEf/Crdcza083qWjYoyw8N0sdeg/EB3irMzn yv2fng6ymo8e+bl5e/s3dk2qyutfz1+et5yo5nlibbzrqhlktffgj1k6qqi3vx6s QlNGVQIDAQABoAAwDQYJKoZIhvcNAQEFBQADgYEAIgu0TLALvJRwt6Ku36CiFmSa IMpHMxCTlAh38PulG1QlAUtgru4lNuGAiQhHxFuH5fnKFazkda/7JVzBXWFK5rLF UGVGikLNHvkCA+Td/mz6LQzHWKtBk+4pNHSoXvPudQ+GR3AwsV8/zAEibjVFNYCX MCHSKklJi8n8gQG07Cw= -----END CERTIFICATE REQUEST----- Receiving a Digitally Signed Certificate from the Trusted Third Party PKI The third party PKI CA verifies that the user is the registered user, and then creates a digitally signed certificate and issues it to the user: 1. The CA decrypts the CSR file using the user public key and extracts the certificate information. 2. The CA generates a public key certificate using the certificate information from the CSR file and the user public key. The certificate is generated in a Web certificate format such as X.509 v3. 3. The CA signs the certificate using the user CA private key. The signature is appended to the certificate. 4. The digitally signed certificate is issued to the user along with the CA public key in the form of a CA public key digital certificate. A sample digitally signed certificate is shown below Certificate: Data: Version: 1 (0x0) Serial Number: 7829 (0x1e95) Signature Algorithm: md5withrsaencryption Issuer: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/Email=server-certs@thawte.com Validity 9

Not Before: Jul 9 16:04:02 1998 GMT Not After : Jul 9 16:04:02 1999 GMT Subject: C=US, ST=Maryland, L=Pasadena, O=Brent Baccala, OU=FreeSoft, CN=www.freesoft.org/Email=baccala@freesoft.org Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:b4:31:98:0a:c4:bc:62:c1:88:aa:dc:b0:c8:bb: 33:35:19:d5:0c:64:b9:3d:41:b2:96:fc:f3:31:e1: 66:36:d0:8e:56:12:44:ba:75:eb:e8:1c:9c:5b:66: 70:33:52:14:c9:ec:4f:91:51:70:39:de:53:85:17: 16:94:6e:ee:f4:d5:6f:d5:ca:b3:47:5e:1b:0c:7b: c5:cc:2b:6b:c1:90:c3:16:31:0d:bf:7a:c7:47:77: 8f:a0:21:c7:4c:d0:16:65:00:c1:0f:d7:b8:80:e3: d2:75:6b:c1:ea:9e:5c:5c:ea:7d:c1:a1:10:bc:b8: e8:35:1c:9e:27:52:7e:41:8f Exponent: 65537 (0x10001) Signature Algorithm: md5withrsaencryption 93:5f:8f:5f:c5:af:bf:0a:ab:a5:6d:fb:24:5f:b6:59:5d:9d: 92:2e:4a:1b:8b:ac:7d:99:17:5d:cd:19:f6:ad:ef:63:2f:92: ab:2f:4b:cf:0a:13:90:ee:2c:0e:43:03:be:f6:ea:8e:9c:67: d0:a2:40:03:f7:ef:6a:15:09:79:a9:46:ed:b7:16:1b:41:72: 0d:19:aa:ad:dd:9a:df:ab:97:50:65:f5:5e:85:a6:ef:19:d1: 5a:de:9d:ea:63:cd:cb:cc:6d:5d:01:85:b5:6d:c8:f3:d9:f7: 8f:0e:fc:ba:1f:34:e9:96:6e:6c:cf:f2:ef:9b:bf:de:b5:22: 68:9f Uploading the Digital Certificate to idrac The user uploads the digitally signed certificate from the third party PKI to the idrac web server. At this point, the User host machine with SSL client should have the following information Copy of digitally signed certificate. User private key CA public key digital certificate 10

Authentication Using a Web Server Certificate Figure 3. Authentication Using a Web Server Certificate SSL client Pa1.key = Private key Pa2.crt = Digitally signed public key certificate CA.crt = Certificate Authority digital certificate idrac web server Pa2.crt = Digitally signed public key certificate SK = Session key ESK = Encrypted session key = pa1(sk) Pa2.crt + CA.crt Verifies pa2.crt is same as the one configured in the idrac Verifies the signature in the Pa2.crt using the CA.crt Pa2.crt Verifies Pa2.crt is same as the one configured with the client Verifies the signature in the pa.crt using the CA public key digital certificate. ESK SK = pa2.crt(esk) Establish encrypted session using SK 11

Table 1. Legend Authentication Using a Web Server Certificate Authentication components present with SSL client or user host machine Pa1.key Private key Pa2.crt Public key certificate digitally signed by the trusted third party PKI Ca.crt Certificate Authority digital certificate SK Session key ESK Encrypted session key Authentication components configured in idrac Pa2.crt Public key certificate digitally signed by the trusted third party PKI Figure 3 illustrates the process of authentication using a Web Server Certificate: 1. The Host machine sends the public key certificate (Pa2.crt) and CA digital certificate (CA.crt) to the idrac. 2. The idrac web server verifies the authenticity of the user by comparing the public key certificate with the one configured in the idrac. The idrac also confirms the user s identity by verifying the signature in the Pa2.crt using the CA.crt. If the user verification is successful, the idrac web server sends the copy of the public key certificate Pa2.crt to the client. If the user verification fails, the idrac web server terminates the SSL session. 3. The SSL client verifies the public key certificate to confirm that it is talking to the intended server. 4. The SSL client generates a session key SK, encrypts the session key using the private key Pa1.key, and sends the encrypted key to the server: Encrypted session key = ESK = Pa1(SK) 5. The idrac Web server extracts the session key SK using the public key web certificate Pa2.crt. 6. Henceforth all communication between client and server and vice versa will be encrypted by the session key SK. 12

Logging Into idrac Using PKI A user can login to idrac using the following two options Authentication using a user ID and password Authentication using Public Key Infrastructure Conventional User ID and Password Method The user can SSH to idrac using the user id and password. The idrac identifies the user by comparing the user ID and password against the list of user IDs and corresponding passwords configured in the idrac and allows the user to login if they match. However, in this case the user password is exposed to hackers. Public Key Infrastructure Method In this method the user digital signature is used for authentication. The user can generate an RSA asymmetric key pair in the Host machine. The user can then encrypt the private key which can be held secret in the Host machine, and configure idrac with the user id and the public key. The following steps outline this process. For details, see the idrac User s Guide. 1. Generate an RSA key pair in the Host machine. The key pair can be generated using the OpenSSH tool in a Linux machine, or the PuTTy KeyGen utility on a Windows-based machine. 2. The private key should be held secret in the Host machine. 3. Configure idrac with a user id and upload the public key. Each user can be configured with up to four public keys. 4. Open a SSH client in the Host machine and login to the idrac using the user id and the private key. If you have PuTTy, gen an SSH agent. The Putty gen can be configured for PKI authentication as follows: a. Open PuTTy. b. Select session to enter a Hostname or IP address. c. Select SSH->Auth to browse to and upload the private key. d. Enter the User ID in the SSH terminal to log into idrac. 5. The SSH client encrypts a message using the private key and sends the user id and the message to the idrac server. 6. The idrac server verifies the user s authenticity by decrypting the message using the public key associated with the user. If the user authenticity is verified successfully the idrac encrypts the session key with the public key and sends it back to the SSH client. 13

7. The SSH client extracts the session key by decrypting the encrypted key using the private key. 8. Henceforth all communication between the SSH client and server will be secured by encryption, using the session key. (In case the user authentication fails in step 6, the SSH client will prompt for a user password.) Advantages of Using Public Key Infrastructure There should be no security threat as long as the private key is held secret. The security of the Asymmetric keys depends on the key size. The greater the key size the more secure the PKI implementation. When the PKI over SSH is set up and used correctly, the user does not have to enter the username or password when logging into the idrac6. This can be very useful for setting up automated scripts to perform various functions. This feature can be managed with RACADM and also from the GUI. See the idrac Users Guide for more information. Disadvantages of Using Public Key Infrastructure As the key size increases, the time taken for encryption and decryption is almost proportionally increased. While generating the key pair care should be taken to choose a high exponent value. The greater the exponent size the more secure the key is. If the exponent size is not specified during key generation most of the tools default to 3. The message encrypted with a key of exponent size 3 can be easily decrypted as below o Message = (Encrypted message)^1/3. 14