Dartmouth PKI Lab Update



Similar documents
TLS-RSA-PSK. Channel Binding using Transport Layer Security with Pre Shared Keys

Securing Web Servers against Insider Attack

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview. SSL Cryptography Overview CHAPTER 1

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Web Application Report

Lab 7. Answer. Figure 1

PKI: Public Key Infrastructure

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Authenticity of Public Keys

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Secure Sockets Layer

Digital certificates and SSL

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

SSL A discussion of the Secure Socket Layer

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Key Management and Distribution

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

RFG Secure FTP. Web Interface

Communication Systems SSL

Breaking the Security Myths of Extended Validation SSL Certificates

CSC Network Security

Security Solutions

CSC 474 Information Systems Security

Enhancing Web Application Security

Practical Invalid Curve Attacks on TLS-ECDH

The Beautiful Features of SSL And Why You Want to Use Them?

Certificates and network security

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Advanced Administration

Low-Level TLS Hacking

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Deploying NetScaler Gateway in ICA Proxy Mode

Securing Your Apache Web Server With a Thawte Digital Certificate

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Microsoft Dynamics GP Release

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Agenda. How to configure

Programming with cryptography

How to configure Mac OS X Server

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

FileMaker Server 11. FileMaker Server Help

Building Customer Confidence through SSL Certificates and SuperCerts

SSL: Secure Socket Layer

Installation and Configuration Guide

Administering System Center 2012 Configuration Manager

Web Security Considerations

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

Alliance Key Manager A Solution Brief for Technical Implementers

Chapter 8. Network Security

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Linux Web Based VPN Connectivity Details and Instructions

Protocol Rollback and Network Security

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict All rights reserved

SSL VPN Technology White Paper

TLS/SSL in distributed systems. Eugen Babinciuc

Administering the Web Server (IIS) Role of Windows Server

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Exostar LDAP Proxy / Secure Setup Guide. This document provides information on the following topics:

Binding Security Tokens to TLS Channels. A. Langley, Google Inc. D. Balfanz, Google Inc. A. Popov, Microsoft Corp.

Network Security - ISA 656 Security

Chapter 17. Transport-Level Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Security of Cloud Storage: - Deduplication vs. Privacy

FileMaker Server 13. FileMaker Server Help

Name-based SSL virtual hosts: how to tackle the problem

Communication Security for Applications

Introduction to Cryptography

Table of Contents. Introduction. Audience. At Course Completion

WebScheduler TotalFBO TotalFBO Initial Installation TotalFBO Connecting to a Database TotalFBO

Key Management and Distribution

Using etoken for Securing s Using Outlook and Outlook Express

Network Fundamentals Carnegie Mellon University

Owner of the content within this article is Written by Marc Grote

PRIVACY, SECURITY AND THE VOLLY SERVICE

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

2X SecureRemoteDesktop. Version 1.1

ERserver. iseries. Secure Sockets Layer (SSL)

SSL, PKI and Secure Communication

Blaze Vault Online Backup. Whitepaper Data Security

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Securing your Online Data Transfer with SSL

Secure Socket Layer. Security Threat Classifications

Secure network protocols: how SSL/TLS, SSH, SFTP and FTPS work

Strong Security in Multiple Server Environments

DKIM Enabled Two Factor Authenticated Secure Mail Client

X-Road. egovernment interoperability framework

Fasthosts Internet Parallels Plesk 10 Manual

Transcription:

Dartmouth PKI Lab Update August 2001 Snowmass, Colorado Sean W. Smith, Ph.D. Department of Computer Science/ Institute for Security and Technology Studies Dartmouth College, New Hampshire www.cs.dartmouth.edu/~pkilab/ Copyright 2001, S.W. Smith

PKI Summit 1 Dartmouth PKI Lab Chartered 4Q2000, by Internet 2 Department of Computer Science Sean Smith, David Nicol Yasir Ali, Alex Iliev, Shan Jiang, Evan Knop, John Marchesini, Sean Richardson, Eileen Ye (Research) Dartmouth Computing Services Robert Brentrup, Larry Levine (Academic) Institute for Security and Technology Studies Ed Feustel (and Dave and Sean) (Society)

PKI Summit 2 Objective Trusted Information Services...in the emerging information environment...that is heterogeneous on every level... machines organizations relationships mobility dynamic Trust requires PKI. PKI requires Trust. Academic community as a prototype lab (and... PKI X509, SDSI/SPKI, PGP, XML...)

PKI Summit 3 Initial Plan Server: How do we establish foundation for trust, when computation is vulnerable to insider attack? Client: How can user tools enable effective trust judgments? Infrastructure: How do we deploy and manage the certificates, keys, etc., that enable this trust communication? Applications: How can applications engage in PKI-based trust judgments?

PKI Summit 4 Status, Aug 2001 Server: Trusted Third Parties, immune to insider attack Completed: PIR, Amored Vault, WebALPS In Progress: Box Office, S/MIME Client: Completed: Web/SSL/Certificate Spoofing In Progress: Secure Web Client Infrastructure: In Progress: Set up COTS, open-source testbeds, LDAP In Planning: Campus PKI (using server, client tools) Applications: In Progress: Early Adopters, Pilots In Planning: Quite a bit... (using server, client, infrastructure tools)

PKI Summit 5 Servers Problem: How can users trust remote computation? Our Approach: Build trusted third parties: protect computation inside armored coprocessor... that destroys secrets upon tamper (FIPS 140-1 Level 4) and can proves it s the real thing, doing the right thing Enabling Technology: IBM 4758 (Sean s IBM project) (open development environment... so real deployment path exists)

PKI Summit 6 Completed: Private Information Retrieval Protecting query privacy from insider attack Consider domains with sensitive data: health information unfashionable politics oil exploration information MP3 files Problem: How do we build a server that efficiently provides material to authorized users......so that the server op learns nothing, not even statistics? Solution: Use coprocessors... and careful data structures [SmSa01]

PKI Summit 7 Completed: Armored Vault Protecting archived private material from insider attack I ll get that data! No you won t! rag replacements You ll only get what we all agreed. Neither cash nor guns can change that!

PKI Summit 8 Armored Vault DRM for Big Brother : How can stakeholders trust that policy is followed? Prototype domain: network data Archive is encrypted and bound to policy Security: Armored vault follows policy exactly, despite rogue insiders Flexibility: The policy can consist of any computation. Prototype built from Snort and the IBM 4758-2 [Ill01,IS01] Future: look at other areas of selective weakening of privacy: key escrow, administrative access to encrypted data PKI authorization DRM, policy with Wisconsin

PKI Summit 9 Completed: WebALPS Protecting SSL Web servers from insider attack SSL doesn t help, if you can t trust the server at the other end WebALPS: move the server end into an armored co-server [Sm00] Security: rogue insiders cannot access sensitive client data and computation Prototype built from Apache, OpenSSL, and the IBM 4758-2 JSM01] [Ji01,

PKI Summit 10 WebALPS: Extending the Tunnel Client Server WebALPS Co-Server ClientHello Client Random Server Random ServerHello Server s Public Key Certificate Certificate for WebALPS Co-Server ServerHelloDone Encrypted Encrypted Encrypted ClientKeyExchange Premaster Secret Premaster Secret Premaster Secret Client Random, ChangeCipherSpec Server Random Finished *&^%$#@! ChangeCipherSpec *&^%$#@! Finished Client is ready to use the agreed cipher to send messages. Co-Server is ready to use the agreed cipher to send and read messages.

PKI Summit 11 In Progress: Hardened Box Office Protecting campus e-commerce server from insider attack Ties in: campus PKI is channel for trust Problem: Many campus agents want to sell tickets, etc., online Computing Services is happy to set up a server, but does not want to risk exposing private customer data Solution: Use a WebALPS-hardened server Internal application catches customer data, then signs and encrypts it for entity, and emails it Status: target: online by 10/2001

PKI Summit 12 In Progress: Hardened S/MIME Web Mail Protecting user private keys from insider attack Ties in: prototype for one approach to where do we keep the private keys? Problem: Web-based mail offers client mobility......but adding PKI requires trusting the server with the private keys (thanks to a grumble by Wisconsin s Eric Norman) Solution: Use a WebALPS-hardened server Generates, certifies, stores user keys.....and applies them only when authorized by user Neither bribery nor subpoena reveals user keys! [Knopp01]

PKI Summit 13 Client How can users make good trust judgments? INTERNET Real Server Client Adversary

PKI Summit 14 The Current Infrastructure Problem 1: Web/SSL tries for server identity, not attributes Problem 2: Does it work? URL? Location bar information? SSL Icon? SSL warning window? Certificate information? Status bar

PKI Summit 15 Build a Better Browser Completed: www.cs.dartmouth.edu/~pkilab/demos/spoofing/ In Progress: Extending clients to have unspoofable windows [Ye02] Future: Use attribute certificates to communicate security properties of machines...within these windows

PKI Summit 16 Infrastructure Use COTS and open-source tools to setup and administer institution scale PKI environment deploying Unicert, CDSA, CryptLibs, IBM 4758 Transition to Institutional LDAP Directory Tools to Support Research Projects Interconnect with our legacy Entrust PKI Research goal: real prototypes, solving real problems!

PKI Summit 17 Applications Existing: Early Adopters-Middleware Payroll Authorization Development Project Planning: Rights Management (with Wisconsin PKI Lab) Privacy Integrity Federal apps

PKI Summit 18 Conclusion Initial Plan: Trusted services in the emerging information environment... Research Infrastructure Applications Follow-on Plan: CRITICAL MASS

PKI Summit 19 For More Information www.cs.dartmouth.edu/~pkilab/ Robert Brentrup Robert.J.Brentrup@dartmouth.edu Ed Feustel efeustel@ists.dartmouth.edu Sean Smith sws@cs.dartmouth.edu