Deputy Chief Executive Netrust Pte Ltd



Similar documents
PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory

Public Key Directory: What is the PKD and How to Make Best Use of It

PKD Board ICAO PKD unclassified B-Tec/36. Regulations for the ICAO Public Key Directory

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Certification Practice Statement

Introduction ICAO PKD

SAFE Digital Signatures in PDF

Security Digital Certificate Manager

Installation and Configuration Guide

Establishing and Managing the Schengen Masterlist of CSCAs

Security Digital Certificate Manager

Identity & Privacy Protection

e-authentication guidelines for esign- Online Electronic Signature Service

TELSTRA RSS CA Subscriber Agreement (SA)

HKUST CA. Certification Practice Statement

Class 3 Registration Authority Charter

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Danske Bank Group Certificate Policy

esign Online Digital Signature Service

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

An introduction to EJBCA and SignServer

CyberSource and NetSuite Getting Started Guide

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Implementation of biometrics, issues to be solved

Ford Motor Company CA Certification Practice Statement

CERTIMETIERSARTISANAT and ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS

NIST ITL July 2012 CA Compromise

CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Gandi CA Certification Practice Statement

The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005

DNSSEC Policy Statement Version Introduction Overview Document Name and Identification Community and Applicability

Procedure for How to Enroll for Digital Signature

SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates

Ericsson Group Certificate Value Statement

ING Public Key Infrastructure Technical Certificate Policy

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Eskom Registration Authority Charter

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Certificate Policy for. SSL Client & S/MIME Certificates

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Key Management Best Practices

PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Lecture VII : Public Key Infrastructure (PKI)

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

NCP Secure Enterprise Management Next Generation Network Access Technology

Equens Certificate Policy

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

Transnet Registration Authority Charter

Steps to Troubleshoot Error Your CA is not trusted. Please use a trusted CA

CLASS - III Digital Signature Certificate Application Check List (To be filled by applicant)

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

ADFS Integration Guidelines

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

e-mudhra CPS e-mudhra CERTIFICATION PRACTICE STATEMENT VERSION 2.1 (emcsl/e-mudhra/doc/cps/2.1) Date of Publication: 11 February 2013

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

The Estonian ID Card and Digital Signature Concept

Biometrics for Public Sector Applications

PRIME IDENTITY MANAGEMENT CORE

Certificate Authority Product Overview Technology White Paper

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Chapter 7 Managing Users, Authentication, and Certificates

Operational Research Consultants, Inc. Non Federal Issuer. Certificate Policy. Version 1.0.1

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States

Operational and Technical security of Electronic Passports

Secure Web Access Solution

Version 2.4 of April 25, 2008

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

Department of Defense PKI Use Case/Experiences

Interface Certification for a RMA Interface

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

RSA Digital Certificate Solution

THE LEADING EDGE OF BORDER SECURITY

X.509 Certificate Policy for India PKI

EuropeanSSL Secure Certification Practice Statement

CS 356 Lecture 28 Internet Authentication. Spring 2013

Transcription:

ICAO Public Key Directory R Rajeshkumar R Rajeshkumar Deputy Chief Executive Netrust Pte Ltd

The trust imperative E-Passports are issued by entities that assert trust Trust depends on the requirements of the relying party Border Control of foreign countries

Trust Decisions Verification of signature on passport validates that data in chip has not been tampered Does not automatically guarantee who put in the data Path Validation of the signing certificate crucial to ensuring the identity of the issuer

Trust Decisions For path validation: Trusted CSCA exchange If all countries published the list of CSCAs that they have received, comparison and validation can be done CSCA Master List Country C - Country A Country A ML - Country A - Country B - Country B Country B ML - Country A - Country B - Country C - Country C OTHERS HAVE THE SAME CSCA

Trust Decisions For path validation: Check CRL as part of signature validation Receive i latest t CRL from country on a regular basis If country publishes CRL on a web site, check that site frequently

Trust Decisions Reliability of DSC Any certificate issued under the CSCA can sign a document Document Signer - has intent and authorization to sign travel documents

Trust Decisions Sources of DSC Receive through bilateral exchange exchange mechanism needs to secure Harvest from passports presented at Border

Trust Decisions Compliance to Doc 9303 Certificate Profile has 18 fields With the different values allowed per field, total permutations possible is almost as large as the US Debt!! Managing the consequences of the various permutations is not practical Best if all issuers followed a single profile

Trust Decisions Compliance to Doc 9303 TF5 has prepared a guidance document detailing the mandated requirements of the attributes of CSCA, DSC, CRL and Master List. Current observation at least 40% of all issuers are non compliant, some seriously so.

Trust Decisions Other considerations Since E-Passports are difficult to forge, find the easy target an insider. A Country may try to issue valid travel documents in the name of another country.. We saw this in Paper Passports, not impossible in E-Passports. If we need to contact the Issuing Agency for a specific Passport, do we know how to contact t them?

Role of the PKD Single repository of validated DSCs and CRLs Repository of Master Lists published by Participants CSCA Registry Yellow Pages for the Passport Issuance Agency of the Participant Compliance reference for DSC/CRL/ML against Doc 9303

Structure of the PKD Country upload point a mailbox for Passport Issuers to upload their DSC, CRL and Master List An internal process of validation and due diligence A Download directory where validated entries are available for download

Structure of the PKD Supply side Passport authorities Regulatory body Compliance (ICAO) Market formed by members Technology platform (Netrust) Demand side Border Control

Components of the PKD Two locations connected through redundant MPLS connection Synchronised in real time 4 directories each location + 2 backup directories Upload is the only directory that can be accessed by the internet. Copy of data from Upload to Staging directory handled by software Montreal Operations office Can only connect to Netrust datacenter through VPN CSCAs of Participants are maintained in HSM

Workflow of the PKD Import of CSCA into HSM at Montreal a ceremonial process Upload of DSC/CRL/Masterlist by participant Verification and Approval Publish to live Download Participant and non-participant

Internal validation process Compliance check against Doc 9303 Validation against CSCA stored in Montreal HSM Email notification of receipt of new entry to the Participant Cool down period of 4 days for DSC and Master List Allows for Participant to check if they really intended to upload the entry and if it is a valid entry Protection against internal fraud No cool down period for CRLs An assertion of trust is always verified, an assertion of mistrust is always accepted

Non Conformant entries A Participant s CSCA, DSC or CRL may not be compliant to Doc 9303 There are valid passports in circulation issued using these non-conformant credentials and cannot be ignored PKD allows for the publishing of nonconformant entries

Non Conformant entries PKD board has published a document that details the variations to Doc 9303 that are acceptable, and variations that are not acceptable. Entries E i with acceptable variations i will be allowed into the PKD with a warning

Non Conformant entries If CSCA is non conformant in an non-acceptable way Netrust will prepare a discussion paper for the PKD Board detailing the non-conformance found along with possible impact to validation process. The PKD board will vote on whether to allow import of the CSCA. Participant has to promise to rollover CSCA and become compliant within 6 months. If PKD Board votes to allow import, Netrust prepares p a signed token which is sent to the software in Montreal to allow for a one time exception for that specific CSCA.

Non Conformant entries If DSC is non conformant in an non-acceptable way Entries that are uploaded to the PKD get automatically quarantined if they are not acceptable. Netrust will prepare a discussion paper for the PKD Board detailing the non-conformance found along with possible impact to validation process. The PKD board will vote on whether to allow import of the CSCA. Participant has to promise correct the non-compliance in the next cycle of DSC generation. Netrust runs a manual process to allow processing of quarantined entries. Any future non compliance will be rejected

Publishing of entries All conformant entries and entries with acceptable non conformance are published in a good entries branch of the PKD. All non-conformant entries with unacceptable deviations, i but approved by the board are published in a bad entries branch of the PKD.

Publishing of entries The PKD board has approved a list of Machine Readable Error Codes (MREC) to list the deviations in the CSCA, DSC or CRL. All entries with deviations are published along with MREC to allow downloading entities to differentiate the entries and decide whether to accept them at border or not in an automated fashion.

Publishing of entries The intent is to allow all entries into the PKD, while ensuring that all Participants will eventually be fully compliant to Doc 9303.

Downloading of entries Web based access anybody can download only complete ldif can be downloaded. Participants use LDAP access to download Either full LDIF or can do ldap query. Authentication is username+password over SSL Main concern is quality of service, not access control

Downloading of entries Accessible at https://pkddownloadsg.icao.int int https://pkddownloadth.icao.int Script prevention measures in place Version number is listed and file is available for download Checksum available at https://pkddownloadsg.icao.int/icao/pkdchksum.jsp https://pkddownloadth.icao.int/icao/pkdchksum.jspp / /p j p Soon, law enforcement of non-participants will be able to automate download as well

Vendor Test Bench Available to any vendor interested in implementing the PKD interface. A one time charge of US$9,600 Allows for access and support for 6 months for implementing the PKD interface and allows access to Doc 9303 compliance tool. If Interface Specifications change, registered vendors will get another 6 months of access for free. Currently three registered vendors: Entrust,Bundesdrukerei,Primekey

PKD Advantages Authoritative source of validated DSCs and CRLs Authoritative source of country CSCAs through CSCA master list Yellow pages for contacting the Passport Issuing agency of each Participant A reference for compliance to Doc 9303 for Certificates and CRLs Defect lists are being discussed and might soon be a part of the PKD

In country Management of Trust In country authoritative source for own DSCs Automated download from PKD and validation of own country data Automated import of PKD contents to local repositories Secure import of CSCAs ceremonial Verification of CSCAs received through bilateral means using the CSCA Master Lists Secure import of DSCs/CRLs received through diplomatic means Harvesting of new DSCs from Passports for future decisions.

In country Management of Trust IMMIGRATION TERMINALS COUNTRY PKD STAGING Immigration Terminals installed with Signature Verification Module Local Query Local Query CONSUMER Local Directory Replication to CONSUMER MASTER repository containing Document Signing Certificates (DSR) & Certificate Revocation Lists (CRL) Upload to MASTER directory Import of Country CA Certificates to HSM Import of nonnull CRLs Approving Officer 1 Approving Officer 2 Global Query NB: Immigration Terminal can invoke a Local Query to the CONSUMER Local Directory or a Global Query to the MASTER Repository COUNTRY e-passport CA & RA Import of DSC and CRL from ICAO PKD Approving Officer 3 ICAO Public Key Directory (PKD) Software Modules Signature Verification Module Registration Authority (RA) Certification Authority (CA) Standalone and offline Software Modules Country CA Cert Import Module Non-null CRL Import Module ICAO PKD Download and DSC/ CRL Import Module

Summary PKD is an essential component of verification at Border PKD is a tool for ensuring compliance to Doc 9303 PKD participation ensures wider acceptance of your travel documents

Thank You R Rajeshkumar R.Rajeshkumar@netrust.net Rajesh@netrust.net RRaj88@gmail.com Deputy Chief Executive Netrust Pte Ltd http://www.netrust.net