CA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft

Similar documents
Microsoft Trusted Root Certificate: Program Requirements

Bugzilla ID: Bugzilla Summary:

Possible conflict between Microsoft Root Certification Technical Requirement V 2.0 and CABF Baseline Requirement about extendedkeyusage

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

CERTIFICATION PRACTICE STATEMENT UPDATE

CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments. Ben Wilson, Chair, CA / Browser Forum

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

NIST ITL July 2012 CA Compromise

Websense Content Gateway HTTPS Configuration

SSL BEST PRACTICES OVERVIEW

Gain a New Level of Trust with Extended Validation SSL Certificates

GlobalSign Digital IDs for Adobe AIR Code Signing

WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing

WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] CA/BROWSER FORUM

More on SHA-1 deprecation:

Department of Defense SHA-256 Migration Overview

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

extended validation SSL certificates: a standard for trust THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

State of PKI for SSL/TLS

Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Independent Accountants Report

Comodo 2048 bit SSL Certificates. Security for your online business now and long into the future

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Extended Validation SSL Certificates

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

Implementing SHA-2 in Active Directory Certificate Services (ADCS)

Internal Server Names and IP Address Requirements for SSL:

SSL Report: ebfl.srpskabanka.rs ( )

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

ETSI TR V1.1.1 ( )

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.

Independent Accountants Report

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI All rights reserved

Public Key Infrastructure (PKI)

Digital Signature Verification using Historic Data

SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Operating a CSP in Switzerland or Playing in the champions league of IT Security

Frost & Sullivan. Publisher Sample

HTTPS is Fast and Hassle-free with CloudFlare

Analyzing the MD5 collision in Flame

Best prac*ces in Cer*fying and Signing PDFs

GeoTrust Extended Validation SSL and Customer Confidence

Visa Public Key Infrastructure Certificate Policy (CP)

Overview. Comodo Certificate Manager

NetScaler 2048-bit SSL Performance

NIST Test Personal Identity Verification (PIV) Cards

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Based on: CA/Browser Forum. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.1.

EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support

Electronic Signature. István Zsolt BERTA Public Key Cryptographic Primi4ves

Managing SSL Certificates with Ease

Public Key Infrastructures

Analysis of the HTTPS Certificate Ecosystem

TR-GRID CERTIFICATION AUTHORITY

Computer and Network Security. Outline

The Impact of Extended Validation (EV) Certificates on Customer Confidence

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Breaking the Security Myths of Extended Validation SSL Certificates

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.

Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010

Breaking the Myths of Extended Validation SSL Certificates

Introducing Director 11

TR-GRID CERTIFICATION AUTHORITY

Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates

Comodo Certificate Manager. Comodo Enterprise

SSL: Paved With Good Intentions. Richard Moore

SSL Certificates: A Simple Solution to Website Security

Is Your SSL Website and Mobile App Really Secure?

X.509 Certificate Management: Avoiding Downtime and Brand Damage

2014 IBM Corporation

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management entrust@entrust.com entrust.com

fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages.

X.509 Certificate Revisited

QuoVadis Group. EUGridPMA Update September 2014

SSL/TLS: The Ugly Truth

ETSI TC ESI PRESENTATION TO CAB FORUM. ETSI All rights reserved

IPv4 Shortage Multiple SSL Certificates on a single IP address

Novell ichain Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Asymmetric cryptosystems fundamental problem: authentication of public keys

Transcription:

CA-DAY 2014 Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft

Microsoft s Root Program in 2014

New Technical Requirements Published in November 2013 First major revision since 2009 Housekeeping RSA 1024 Removal SHA1 Deprecation Policy Audit Policy Most new technical requirements are already addressed by most CAs. We extend certain requirements from root certificates to intermediates and end-entity certificates require that members apply appropriate restrictions to their entire certificate chains, not only attributes http://social.technet.microsoft.com/wiki/contents/articles/1760.windows-root-certificate-program-technical-requirements-version-2-0.aspx

Housekeeping Issues More Root Certificates Allowed per CA Before: 3 roots / CA (due to XP and Server 2003) Now: 3 roots per algorithm type per CA brand (e.g. 3+3+3) Business Justification for all EKUs No business, no EKU. Removing unused EKUs in 2014 Algorithm Policies Minimum RSA 2048, Migration to SHA-2 begins in earnest Certificate Attributes separate SSL and Code Signing EKUs, no more mixing of EKUs OCSP required for revocation of end-entity certificates, no CRLs anymore No conflicts with the Baseline Requirements Except for our SHA1 deprecation policy No requirement for the CAB Forum to monitor CA activities

Housekeeping How Will We Ensure Compliance? (read) Certificate Reputation / Certificate Hygiene (Telemetry) As CAs issue certificates outside our requirements, we will bring them to their attention: notify, mitigate. CAs will issue better certs, better BR compliance Consequences for repeat offenders Audits can only selectively verify compliance with any criteria (<4% of transactions) Certificate Reputation samples from as much as 99% of actual transactions, identifies discrepancies, seeks CA mitigation against continued issuance

Transition from RSA 1024 CA industry had a general deadline to abandon RSA 1024 certificates by the end of 2013, and migrate to RSA 2048. In January 2014 we see only a few new RSA 1024 certificates issued 3-5 Years notice that RSA 1024 would not be recognized on Windows NIST added 3 years to their RSA 1024 forecast, is no longer adding measurable amounts of time CAs have transitioned away from issuing RSA 1024 (good) There remain thousands of still time valid RSA 1024 certs, many expiring in 2014 Significant RSA 1024 remain time valid and trusted by publicly trusted root CAs

Transition from RSA 1024 How Will We Ensure Compliance? RSA 1024 root certificate deprecation Root certs remain in distribution, remove all except code signing and time stamping EKUs (no longer valid for other uses e.g. SSL) Monitor telemetry for low or no incidence of RSA 1024 for code signing Remove root certs from distribution by the Program in 2014 If RSA 1024 is compromised before root cert removal, we can disallow all RSA 1024 via the Weak Crypto Framework, and remove root certs http://technet.microsoft.com/en-us/library/dn375961.aspx

SHA-1 Deprecation (SHA-2 Migration) Security advisories (NIST) have sought migration to SHA2 algorithm by 2013, like RSA 1024 Yet 98%+ of installed base remain SHA1 certificates Microsoft requirement seeks migration to SHA2 by 1 Jan 2016 (no SHA1 for code) Windows will cease to recognize SHA1 after 1 Jan 2017 (no SHA1 for SSL) Dilemma is shared by customers who still seek SHA1 and CAs who still issue them

New Audit Policy For our root program, member CAs are now required to complete audits that incorporate the CA Browser Forum Baseline Requirements (BR) v1.x (WebTrust for CAs, ETSI 102 042) We are phasing out the audit equivalency exception for government CAs 2007: government could conduct audit according to local law or regulation (ecommerce or e-signature laws) 2014: governments will transition to BR-based audits: WebTrust, ETSI, or local law or regulation audit with BR criteria Many government CAs are already audited by WebTrust and ETSI criteria Three year transition period (until Jan 2017) Adequate time to communicate with government CAs and ensure compliance with new requirement

A Look Ahead to 2014 CA Risk Reduction Increasing segregation of use (SSL, Code signing) at the root or intermediate CA level Complete root rollover from RSA 1024 roots Increase SHA2 cert issuance Adoption of telemetry as measure of CA performance New Attacks on CA Infrastructure are possible

Questions? Windows Root Certificate Program http://social.technet.microsoft.com/wiki/contents/articles/3281.introduction-tothe-microsoft-root-certificate-program.aspx Weak Crypto Framework http://technet.microsoft.com/en-us/library/dn375961.aspx Tom Albertson Program Manager, Windows Root Certificate Program casubmit@microsoft.com; tomalb@microsoft.com

A Disciplined Approach to Key Management Technology alone cannot provide ultimate security. Strong key management disciplines are critical to any security strategy.

Michael Kranawetter Head of Information Security Chief Security Advisor Microsoft Deutschland GmbH