why PKI and digital signatures suck



Similar documents
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Public Key Infrastructure

7 Key Management and PKIs

Asymmetric cryptosystems fundamental problem: authentication of public keys

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Computer and Network Security. Outline

SSL/TLS: The Ugly Truth

How To Understand And Understand The Security Of A Key Infrastructure

How To Make A Trustless Certificate Authority Secure

Introduction to Cryptography

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Grid Computing - X.509

CSC574 - Computer and Network Security Module: Public Key Infrastructure

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Lecture VII : Public Key Infrastructure (PKI)

Controller of Certification Authorities of Mauritius

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Public Key Infrastructure (PKI)

Concept of Electronic Approvals

eid Security Frank Cornelis Architect eid fedict All rights reserved

VeriSign Code Signing Digital Certificates for Adobe AIR Technology

Apache, SSL and Digital Signatures Using FreeBSD

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Web Security: Encryption & Authentication

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

CS 392/681 - Computer Security

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

CS Network Security: Public Key Infrastructure

E-commerce Shopping Carts Digital Cert. Merchants

Chapter 7 Managing Users, Authentication, and Certificates

Certification Practice Statement

Security Digital Certificate Manager

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Hard vs. Soft Tokens Making the Right Choice for Security

PKI: Public Key Infrastructure

Receiving Secure from Citi For External Customers and Business Partners

WIRELESS LAN SECURITY FUNDAMENTALS

Websense Content Gateway HTTPS Configuration

Ciphermail S/MIME Setup Guide

NIST ITL July 2012 CA Compromise

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

The Concept of Trust in Network Security

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

European Electronic Identity Practices

White Paper. The risks of authenticating with digital certificates exposed

Forging Digital Signatures

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Security Digital Certificate Manager

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Evaluation of Certificate Revocation in Microsoft Information Rights Management v1.0

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Network Security: Public Key Infrastructure

Apache Security with SSL Using Ubuntu

Strong Security in Multiple Server Environments

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Network Security Essentials Chapter 7

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

CALIFORNIA SOFTWARE LABS

PKI Services: The Best Kept Secret in z/os

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.

CS 356 Lecture 28 Internet Authentication. Spring 2013

The Case For Secure

Business Issues in the implementation of Digital signatures

Chapter 6 Electronic Mail Security

Certify your Software Integrity with thawte Code Signing Certificates

understanding SSL certificates THAWTE IS A LEADING GLOBAL PROVIDER OF SSL CERTIFICATES

SecureStore I.CA. User manual. Version 2.16 and higher

Encrypted PostgreSQL

Sync Security and Privacy Brief

Siemens PKI Certificate Authority (CA) Hierarchy

Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED

Cryptography and Network Security Chapter 15

Ten Risks of PKI: What You re not Being Told about Public Key Infrastructure

X.509 Certificate Revisited

Certification Practice Statement

Key Management and Distribution

X.509 and SSL. A look into the complex world of X.509 and SSL UUASC 07/05/07. Phil Dibowitz

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL

Transcription:

why PKI and digital signatures suck some theories on real-world crypto usage chaos communication camp 2003 christian mock <cm@quintessenz.org> http://www.tahina.priv.at/~cm/talks/pkisucks.{sxi,pdf} version 0.2

contents this talk is not about algorithms and code cryptanalysis PGP vs S/MIME it is about PKI, commercial CAs, signature law the painful experience of implementing real world systems with PKI the politics of digital signatures, e-government etc.

alice and bob in crypto-wonderland? in theory, assymmetric crypto with PKI is simple and elegant: Photo Credit:US National Oceanic and Atmospheric Administration get a certificate from a CA sign & verify encrypt & decrypt authenticate solves a lot of problems, easily

if it only were that simple... problems: certificate authorities standards: so many of them handling of certificates software bugs digital signature laws

commercial certificate authorities trusted third party? sure: you're forced to trust...and forced to pay...and handle all the paperwork, yearly

are CAs trustworthy? 2001: verisign issues two "microsoft corp" SW signing certs to unknown persons and windows apparently didn't use CRLs 2003:.at "bürgerkarte" shows wrong first name for holder this is a legally binding signature certificate identity checked with an official ID document

who owns the CAs? verisign belongs partly to SAIC SAIC's board members come from the NSA and the military... verisign bought up thawte, it's biggest competitor austrian CA a-trust is owned by a consortium of banks, lawyer's and notary public's association, chamber of commerce and incumbent telco

inhouse certificate authorities the "big" commercial solutions are complex and expensive CAs integrated in other systems (windows, FW-1,...) are often not interoperable open source? no "ready to deploy" solutions both OpenCA and pyca need integration effort both are too complex for smaller needs want to have your root cert signed by a commercial CA? spend even more money!

a certificate is a certificate is a certificate - not! there's (at least) four ways to put email addresses in X.509 certs and in any real life project, you can be sure to meet at least three what to encode in a cert depends on the software using it and that may mean your cert will either work with your VPN client or your email client and don't forget the many file formats and MIME types...

juggling certificates now which of those root certs to I need to download and trust in order to be able to accept Alice's certificate? in the end, you "trust" them all until it works oh fsck, my cert expired, so I need to renew and send it to everyone I communicate with and there is software out there which can only keep one "own" cert at a time there's no single certificate server like with PGP keyservers

all client software sucks! 2002: MS software and Konqueror treat "end user" certs as CAs easy MITM attack against those complete breakdown of the PKI trust-model but... nobody seemed to care much. lots of software are incomplete implementations (CRL support, features, interoperability,...)

digital signatures these conclusions are drawn from the austrian situation, but should be similiar EU-wide (EU directive on electronic signatures) security requirements are very high: "advanced signature" replaces manual signature non-advanced signature not useable for egovernment needs a high level of security keys & certs on smart card smart card reader with display and keypad "secure viewer" application for signing and verification

but: is it really secure? solutions run on windows -> weakest link CA doesn't even forbid usage on win9x/me - no OS security features - what about malware? TOS say end user has to make sure no unauthorized code runs on his machine only a few "secure viewers" are approved -> easily targetted by malicious software

legal questions assume someone wants to dispute a digitally signed contract could have been his secure viewer showing something other than the signed doc could have been some malware sneaked the document thru his signing process what if expert witnesses couldn't exclude those possibilities? what if malware was actually found on the PC? what would that mean for the whole legal model?

technical/handling complexity.at signature law requires "certificate blocking" and "certificate revocation" ever seen software that knows about "certificate blocking"? to verify a signature you need the components prescribed by the signer's CA in 2005, you'll need to re-sign all signed docs signature law defines "lifetime" for algorithms and key lengths

solution in search of a problem why should I spend money on a cert + hardware if nobody accepts it? and I make it harder for me to weasel out of stuff market for qualified signatures is very small two austrian CAs merged last year (resulting in chaos for cert owners) only 1 of 5.at CAs issues qualified certs CAs try to push their services where people can't escape, e.g. universities

Bürgerkarte (Citizen Card) "Further, with the Bürgerkarte a security infrastructure will be created which in the future will be accessible to citizens and therefore to the economy's customers. Companies can create secure online services for their customers and use the Bürgerkarte infrastructure. The Bürgerkarte therefore helps to dispel a fundamental restraint of electronic business - the presently lacking trust in the transaction's security." www.buergerkarte.at (translation: cm)

Bürgerkarte... even those who made the signature laws have to relax the requirements "Bürgerkarte light": keys stored on service provider's server, signatures confirmed via mobile phone + SMS additional key pairs required because you can't authenticate with a qualified certificate public sector allowed to sign without qualified cert need Bürgerkarte + payment service + delivery service accounts one single application exists ATM

conclusions PKI/CA security model is flawed mix of high-security components and low-security components human error not taken into account possible scaling problems (CRLs) gets watered down even by the makers of sig laws nobody cared when it was completely broken handling and interoperability problems who needs that stuff, anyways?

alice and bob in reality-land (or: enough of that bitching!) PKI and public-key crypto has its place try to avoid falling under signature laws build your own inhouse CA make your own risk assessment and select appropriate (and realistic) security measures

real-world example customer wanted secure, easy VPN authentication for road-warriors and in-house WLAN risk analysis: cert-based auth is more secure and easier to handle than username/password built CA software on openssl and perl works fine, customer thinks about using it for email encryption with business partners

discuss! thank you for listening now it's time for fundamental discussions on my theories cm@quintessenz.org http://www.tahina.priv.at/~cm/stuff/pkisucks.{sxi,pdf}