VPN Configuration Guide. Certificates and Smart Cards

Similar documents
VPN Configuration Guide D-Link DFL-200

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide Linksys RV042/RV082

VPN Configuration Guide Netgear FVS338 / FVX538 / FVS124G

VPN Configuration Guide. Cisco Small Business (Linksys) WRVS4400N / RVS4000

VPN Quick Configuration Guide. Astaro Security Gateway V8

VPN Configuration Guide. Cisco Small Business (Linksys) WRV210

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide. Cisco Small Business (Linksys) RV016 / RV042 / RV082

VPN Configuration Guide DrayTek Vigor / VigorPro

VPN Configuration Guide. AVM FRITZ!Box

VPN Configuration Guide. Parallels Remote Desktop for Mac

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

VMware Horizon FLEX User Guide

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

VPN Configuration Guide LANCOM

VPN Configuration Guide D-Link DFL-800

VPN Configuration Guide WatchGuard Fireware XTM

VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router

Check Point FDE integration with Digipass Key devices

VPN Tracker for Mac OS X

VPN Configuration Guide. Dell SonicWALL

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

VPN Configuration Guide. Cisco ASA 5500 Series

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

VMware Horizon FLEX User Guide

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Outlook Web Access 2003 Remote User Guide

VPN Configuration Guide. Dealing with Identical Local and Remote Network Addresses

VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

YubiKey PIV Deployment Guide

U S E R G U I D E. Certificate Export/Import to E-token Pro (72K) Java FOR USERS OF E-TOKENS [VERSION 1.0]

Yale Software Library

VMware Horizon FLEX User Guide

HOTPin Integration Guide: DirectAccess

Fiery E100 Color Server. Welcome

HP ProtectTools Embedded Security Guide

Shakambaree Technologies Pvt. Ltd.

Guide for Securing With WISeKey CertifyID Personal Digital Certificate (Personal eid)

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Frequently Asked Questions: Cisco Jabber 9.x for Android

Easy Setup Guide for the Sony Network Camera

1-port USB 2.0 Print Server. Manual (GPSU21)

DIGIPASS CertiID. Getting Started 3.1.0

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA USA. November v1.0

Global VPN Client Getting Started Guide

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)

Smart Card Authentication. Administrator's Guide

Back to My Mac User s Guide

Digital Signature Certificate Online Enrollment Guide using etoken

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A

Bluetooth Wireless USB Adapter. User Manual (GBU211 / GBU311)

Entrust Certificate Services for Adobe CDS

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

PDF Signer User Manual

Installation Guide 1-port USB 2.0 Print Server 1 GPSU21

Managed Services PKI 60-day Trial Quick Start Guide

Deltek Touch Time & Expense for Vision 1.3. Release Notes

Entrust Managed Services PKI

DigiDelivery Client Quick Start

Patching the Windows 2000 Server Operating System on S8100 Media Servers, IP600 Communications Servers, & DEFNITY ONE Communications Systems

Smart Card Authentication Client. Administrator's Guide

Remote Access End User Reference Guide for F5 Edge VPN Client Access

This guide will help you with setting up an Apple Macintosh for a GPRS connection to O 2 Mobile Web

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.

Defender Token Deployment System Quick Start Guide

Smart Card Setup Guide

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Labour Market Programs Support System. LaMPSS Computer Compatibility Guide

Yubico Authenticator User's Guide

User guide. Business

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Document authored by: Native Instruments GmbH Hardware version: Traktor Kontrol X1 MK2 (01/2013)

Using etoken for Securing s Using Outlook and Outlook Express

TOSHIBA GA Printing from Windows

BorderGuard Client. Version 4.4. November 2013

EPM Performance Suite Profitability Administration & Security Guide

Driver Upgrade Instructions

Installing Logos SSL Certificates on Mobile Devices

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Print Server Application Guide. This guide applies to the following models.

Using Entrust certificates with Microsoft Office and Windows

How to Publish Your Smart Card Certificates Using Outlook 2010

BusinessLink Software Support

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

User Guide. Version 3.0 April 2006

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

PKI Certificate Renewal Guide. How to Install Medicare Australia's Public Certificate

Using Devices. Chapter 3

USER GUIDE WWPass Security for Windows Logon

Configuring Infoblox DHCP

TABLE OF CONTENTS. Vendor Registration Usage of Digital Signature Certificate... 3

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

Transcription:

VPN Configuration Guide Certificates and Smart Cards

equinux AG and equinux USA, Inc. 2009 equinux USA, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of equinux AG or equinux USA, Inc. Your rights to the software are governed by the accompanying software license agreement. The equinux logo is a trademark of equinux AG and equinux USA, Inc., registered in the U.S. and other countries. Every effort has been made to ensure that the information in this manual is accurate. equinux is not responsible for printing or clerical errors. Apple, the Apple logo, ibook, Mac, Mac OS, MacBook, PowerBook are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Aladdin and etoken are registered trademarks of Aladdin. equinux shall have absolutely no liability for any direct or indirect, special or other consequential damages in connection with the use of the quick setup guide or any change to the router generally, including without limitation, any lost profits, business, or data, even if equinux has been advised of the possibility of such damages. www.equinux.com 2

Introduction... 5 Important Prerequisites... 6 Introduction to Digital Certificates... 8 Using Certificates with VPN Tracker... 10 Certificate Management in Mac OS X... 10 Which Certificates Do I Need?... 12 Selecting Certificates in VPN Tracker... 13 Certificate Settings in VPN Tracker... 15 Using Smart Cards with VPN Tracker... 16 Vendor Software Installation... 16 Verifying Access... 18 Selecting Smart Card Certificates in VPN Tracker... 18 Advanced Topics... 19 Certificates and Exported Connections... 19 Troubleshooting... 20 3

4

Introduction This configuration guide describes how VPN Tracker can be integrated in a PKI (Public Key Infrastructure) using digital certificates or smart cards. You will find an introduction to digital certificates a guide on using X.509 certificates with VPN Tracker a guide on using smart cards with VPN Tracker Smart card integration will be shown using Aladdin etoken USB tokens and software. Note This documentation is only a supplement to, not a replacement for, the instructions that have been included with your VPN gateway and if you are using smart cards your smart card. Please be sure to read those instructions and understand them before starting. 5

Important Prerequisites Public Key Infrastructure (PKI) Requirements If you have an existing PKI that uses certificates: Certificates (and private keys for the client/user certificates) need to be available in a format supported by the Mac OS X keychain If you have an existing PKI that uses smart cards: Software is required to make your smart card certificates available in Mac OS X through the keychain. If you have already installed your vendor s driver or software, you can easily determine if it satisfies this requirement by checking if your smart card appears as a keychain in the Mac OS X Keychain Access application (Applications > Utilities > Keychain Access) If your vendor does not provide the necessary software, there may be a third party solution available Note We will be using the term smart card to describe both an actual smart card that is placed into a card reader, and a USB token with a non-removable smart card chip that plugs directly into your Mac. From VPN Tracker s perspective, there is no difference if the smart card chip is accessed through a card reader, or built into a USB token. If you do not have an existing PKI in place: Use the Certificate Assistant built into the Mac OS X Keychain Access application to create certificates (Keychain Access > Certificate Assistant). Some VPN gateways also can create and export certificates. Your VPN Gateway Your VPN gateway must support the use of authentication based on digital certificates (X.509 certificates) Your VPN gateway must be properly configured for certificate-based authentication, and the appropriate certificates must be installed on the VPN gateway. Refer to your vendor s documentation for details. 6

Your Mac VPN Tracker runs on Mac OS X 10.4 or 10.5 The configuration described in this guide requires at least VPN Tracker 5.4. Make sure you have all available updates installed. The latest VPN Tracker release can always be obtained from http://www.vpntracker.com To use smart cards, a Professional Edition license for VPN Tracker is required Tip To easily upgrade your existing VPN Tracker Personal Edition licenses to VPN Tracker Professional Edition, use the equinux License Manager at http://my.equinux.com. 7

Introduction to Digital Certificates A digital certificate is an electronic document that can be used to identify a user, a server or a company. Each certificate is signed by a Certificate Authority (CA). By signing a certificate, the CA assures that it has verified the identity of the certificate holder. Certificates that are not signed by a CA are known as self-signed certificates. Certificates can be used for digital signatures (for example, to allow a connecting VPN client to verify that it is indeed talking to the company s VPN gateway, and not someone posing as the company s VPN gateway), and for encryption (to prevent an attacker from listening in on the communication). Certificate Authorities (CAs) A multitude of certificate authorities exist, as a matter of fact, anyone can create their own certificate authority using the Certificate Assistant built into the Keychain Access application on Mac OS X. A number of well-known certificate authorities are pre-configured as trusted on every Mac OS X system, indicating that they have certain documented procedures in place for verifying the identity of a certificate holder before placing their signature on the digital certificate. You can see the list of these trusted CAs in Keychain Access > System Roots (if you do not see the keychains on the left, use View > Show Keychain List to display it). Beginning with Mac OS X 10.5, it has also been possible to mark certificate authorities as trusted in a user s keychain. Trusted certificate authorities in normal keychains are indicated with a white/blue cross on their certificate icon. If your company has its own certificate authority to sign internally used certificates, it will likely show up like this in Keychain Access. 8

Public and Private Keys A digital certificate consists of a public and a private part. The public part (public key, sometimes simply called certificate) contains no secret information, it can be passed around freely. As a matter of fact, it must be passed around for public key cryptography to work. For example, if Alice wants to communicate with Bob in an encrypted fashion, Alice must give her certificate (the public part) to Bob in order for them to establish an encrypted communication. Also, to permit Bob to verify that it was indeed Alice who signed a given message, Bob must have Alice s certificate. Verifying digital signatures is also where certificate authorities come into play: While it would be perfectly possible for Alice to give Bob her certificate using a trusted way of communication (for example, by handing it over personally when they meet), this is no longer feasible when a large cooperation has thousands of customers that need to verify its signature. By having a generally trusted certificate authority sign its certificate, the company can avoid the need to give the certificate to each user personally. Instead, a company can simply place its certificate somewhere on its website where the users can download and verify it using the trusted certificate authority that signed the certificate. Usually that happens invisibly: For example, when accessing https://www.amazon.com, a web browser will automatically get Amazon s certificate and verify it against the trusted certificate authorities on the system. Only if there is a mismatch, or no trusted certificate authority to verify the certificate, a warning will appear. The private part (private key) is the part of a certificate that must be kept confidential. When someone is in possession of the private key, they can use the certificate to create digital signatures. If that someone is not the legitimate certificate holder, they can use the certificate to impersonate the legitimate certificate holder. This is why it is important to store the private key in a secure manner. On Mac OS X, this is usually accomplished by placing the private key into a keychain. A private key stored in a keychain can only be accessed when the correct keychain password has been entered to unlock the keychain. Smart Cards An even more secure way of storing digital certificates is on smart cards. Private keys that are stored on smart cards are never actually transferred to the computer using the smart card, but the smart card performs all cryptographic operations itself: If Alice (or rather a software program on Alice s computer) wants to digitally sign a piece of data, Alice needs to enter her access code (PIN) to permit access to her smart card, which will then perform the signing operation itself, never giving the software program access to the actual private key. 9

Using Certificates with VPN Tracker To use certificates with VPN Tracker, the certificates must be available in a keychain. This chapter therefore will first cover the basics of certificate management using the keychain on Mac OS X, before showing how to include certificates in VPN Tracker. Certificate Management in Mac OS X In Mac OS X, certificates (and their private keys) are stored in keychains. Keychains are managed using the Keychain Access application (found in Applications > Utilities). A keychain protects the private key by only permitting access if the keychain has been unlocked using the appropriate password. Also, if applications attempt to access a private key in a keychain for the first time, the user is asked to permit access, even if the keychain is unlocked. By default, a user has a single keychain, the login keychain, protected with their password. It is possible to change the login keychain s password to a different one, and to create additional keychains. Importing Certificates Certificates can be imported into a Mac OS X keychain using any of the usual certificate formats (PEM, DER, PKCS#7, PKCS#12). To import a certificate, simply double-click the certificate file, or choose File > Import Items... in Keychain Access. If the certificate contains a private key and the certificate file is protected by a password, you will be asked for this password: 10

If the certificate contained a private key, you will see both the certificate and its private key in the list after importing. A combination of a certificate and its private key is called an identity in Mac OS X. If only the public part of the certificate was imported, you will see only the certificate listed after importing. Importing Certificate Authorities Importing a certificate authority works the same as importing a regular certificate. After importing, you will be asked if you want to trust this certificate authority. If you choose Always Trust, certificates signed by this certificate authority will be trusted automatically in the future. Note On Mac OS X 10.4, certificate authorities must be placed in the X.509 Anchors keychain. It is not possible to set certificate authorities as trusted that are not in this special keychain. 11

Checking a Certificate s Trust Keychain Access easily lets you see if a given certificate is trusted, and if not, why not. Simply select the certificate and examine the top part of the Keychain Access window (if the details are not visible, use View > Show Summary to display them): Which Certificates Do I Need? To use certificate-based authentication in VPN Tracker, you will need the following certificates in your Mac OS X keychain: VPN Gateway: VPN gateway s certificate (without the private key) or Certificate authority (CA) that signed the VPN gateway s certificate. Its certificate must be set as trusted on your Mac. The VPN gateway must be capable of sending its actual certificate upon connection initiation, which is the case for almost all VPN gateways VPN Client: VPN client (VPN user) certificate and Private key belonging to the VPN client (VPN user) certificate Tip You can easily check if a private key is available for a given certificate by selecting the My Certificates category in the left column in Keychain Access. If a certificate appears there, it has a private key available. 12

Selecting Certificates in VPN Tracker If you have not yet done so, set the authentication method to Certificates. Note Your VPN gateway must be properly configured for X.509 certificate based authentication. In the certificate selection window, select your certificates (click the Edit button, if the certificate selection window does not open automatically). 13

Local Certificate The local certificate is the certificate you are using to identify to the VPN gateway as a user/client. It is sometimes called client certificate or user certificate. A private key is required for the local certificate, since it must sign messages to the VPN gateway. If you cannot find your certificate here even though you have imported it into the Mac OS X keychain, make sure the corresponding private key is also available in the keychain. You can easily check that by selecting the My Certificates category in Keychain Access. If it does not appear there, the private key is missing. Remote Certificate The remote certificate is the VPN gateway s certificate. A private key is not needed. There are two options: 1. Select your VPN gateway s certificate 2. Select Use certificate supplied by peer to take the certificate supplied by the VPN gateway upon connecting, and verify it against the certificate authorities installed on your Mac. Please not that for this to work, the certificate of the certificate authority (CA) that signed your VPN gateway s certificate must be installed and trusted on your Mac. Note Even though CA certificates may show up in the list, you should never select a CA certificate here. Inspecting a Certificate When a certificate is selected, you can easily see its details by clicking the disclosure triangle. 14

Certificate Settings in VPN Tracker Identifiers It is possible to use the information from the various fields of a certificates as an identifier for the VPN connection. To do this, set the Local (or Remote) Identifier to Local (or Remote) Certificate" VPN Tracker will then use the certificate s information (such as subject, organization, country etc.) as the identifier for the connection. Note A Local Certificate / Remote Certificate identifier will technically be sent as an identifier of type ASN.1 Distinguished Name (DN). On your VPN gateway, such an identifier may also be called simply Distinguished Name or Subject. Advanced Settings There are several settings on the Advanced tab that influence how certificates are verified. These options should usually be left enabled. However, in some cases, in particular when attempting to connect to unsupported VPN gateways, turning off the first and second option might help you connect (for example, if the VPN gateway does not support sending its certificate). The setting Verify remote certificate should however never be turned off, except for debugging purposes. Without it, VPN Tracker will not verify that it is indeed getting the correct certificate from the remote VPN gateway! 15

Using Smart Cards with VPN Tracker Storing certificates on a smart card provides even more security than using certificate-based authentication with certificates stored locally on your Mac. This chapter shows how to set up smart card based authentication with VPN Tracker using Aladdin etoken. Vendor Software Installation To access your smart card on your Mac, you will first have to install the software provided by your smart card vendor. The following steps show the software installation for Aladdin etoken. Step 1 Start the installation Insert the CD that came with your etoken, or download the software from the Aladdin website Double-click the etoken PKI Client installer to start the installation 16

Step 2 Follow the installation wizard The installation program will guide you through the necessary installation steps Make sure to carefully read all instructions Step 3 Finish the installation by logging out When the installation has finished, you will have to log out (and log back in) to complete the installation. The installation will provide you with two software applications. The PKIMonitor allows you to monitor the attached etoken devices, and the etoken Properties application lets you configure your etoken and import certificates onto the device. Please refer to your vendor s documentation for additional details on how to set up your smart card or token. 17

Verifying Access To verify that you are indeed able to access your smart card or token through the Mac OS X keychain, start the Keychain Access application. You should be able to find your token in the keychain list on the left (use View > Show Keychain List if the keychain list is not displayed). If you have not done so yet, import or create your certificates on the smart card now. The best way to do this is through the software tools provided by your smart card vendor (such as through the etoken Properties application when using Aladdin etoken). Make sure that the private key for your client/user certificate is also present on the smart card. You can easily verify this by selecting the My Certificates category in Keychain Access. If the certificate is displayed there, the private key is available. Selecting Smart Card Certificates in VPN Tracker Selecting a certificate located on a smart card works exactly the same as selecting a regular certificate. Please refer to Selecting Certificates in VPN Tracker for details. 18

Advanced Topics Certificates and Exported Connections Certificates are never included in an exported connection, since most organizations with a PKI infrastructure already have wellestablished (and secure) procedures of distributing certificates to users in place. Please note that the exported connection does include the information which certificates were selected. When exporting for use with a Personal or Professional Edition license: If the selected certificates are present on the recipient s Mac, VPN Tracker will use these certificates If the selected certificated do not exist on the recipient s Mac, the recipient will be able to select different certificates When exporting for use with a Player Edition license, or when exporting a locked connection: The recipient will not be able to edit their VPN connection settings. It is therefore important to select the correct certificates before exporting. 19

Troubleshooting Most errors can be resolved quickly by carefully following the hints given by VPN Tracker in its log. However, here are some frequently asked questions that cannot be covered by the log hints. My connection works fine, but I am prompted for my keychain password or keychain access permission every time I connect If you are using a smart card, this behavior is inherent to the way smart cards work, storing the access code is not possible If you are using normal certificates stored in your keychain, please make sure the Mac OS X keychain subsystem has write access to the keychain that your certificate and private key are stored in, and to the folder the keychain is in. You can run the Keychain First Aid tool that is part of Keychain Access (Keychain Access > Keychain First Aid) to verify permissions. My certificate is only in the Remote Certificate list, however, I want to select it as the Local Certificate A certificate that is to be used as the local certificate must have its private key stored in the keychain (or on the smart card). If a certificate does not have a private key available, it will not be displayed in the Local Certificates list. I cannot add my certificate to the keychain: Keychain Access keeps complaining that the certificate already exists, but I searched for it and it is not there! A certificate is uniquely identified by the combination of issuer (i.e. the certificate authority signing it), and the serial number. If your keychain already contains a certificate issued by the same certificate authority with the same serial number, it will not be possible to add another certificate with the same issuer and serial number combination, even though the rest of the certificate may be completely different. Unfortunately, it is fairly easy to accidentally create certificates with duplicate serial numbers when using the Mac OS X Certificate Assistant. There are two possible ways of resolving this problem: 20

Recreate the certificate using an unused serial number (in Certificate Assistant, check the box Let me override defaults to modify the serial number) If you do not have the possibility to recreate the certificate, put the offending certificate into a separate keychain I followed the advice in the log and double-checked my configuration, but the connection still fails Before contacting technical support, please run the Keychain First Aid tool that is part of Keychain Access (Keychain Access > Keychain First Aid). Then try connecting again. Also double-check that you have selected the correct certificates. A certificate authority (CA) certificate should never be selected as the local or remote certificate. If the problem persists, and you need to contact us, please include the following information with your support request: A Technical Support Report from VPN Tracker (Help > Generate Technical Support Report) Screenshots of the VPN configuration on your VPN gateway, if possible The output of the Terminal command security dump-keychain (preferred), or screenshots of the details of all certificates used with the connection: In Keychain Access, select each certificate and choose File > Get Info. Make sure the details are visible (click the triangle, if necessary) and take a screenshot of the details. 21