NIST ITL July 2012 CA Compromise



Similar documents
ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

Introducing Director 11

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

SUSE Customer Center Roadmap

X.509 Certificate Management: Avoiding Downtime and Brand Damage

SSL/TLS: The Ugly Truth

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Chapter 7 Managing Users, Authentication, and Certificates

Microsoft Trusted Root Certificate: Program Requirements

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Websense Content Gateway HTTPS Configuration

TELSTRA RSS CA Subscriber Agreement (SA)

Certificate technology on Pulse Secure Access

Certificate technology on Junos Pulse Secure Access

Technical Certificates Overview

Six Steps to SSL Certificate Lifecycle Management

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

Bugzilla ID: Bugzilla Summary:

Ericsson Group Certificate Value Statement

Operating System Security Hardening for SAP HANA

Administration Guide Certificate Server May 2013

COMODO CERTIFICATE MANAGER. Simplify SSL Certificate Management Across the Enterprise

Public Key Infrastructure

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Certification Practice Statement

Advanced Systems Management with Machinery

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

How To Make A Cloud Work For You

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

X.509 Certificate Revisited

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

How To Secure An Rsa Authentication Agent

Danske Bank Group Certificate Policy

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Equens Certificate Policy

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Criminal charges are not pursued: Hacking PKI

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Public Key Infrastructure (PKI)

RSA SecurID Software Token Security Best Practices Guide

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Why Digital Certificates Are Essential for Managing Mobile Devices

SIX STEPS TO SSL CERTIFICATE LIFECYCLE MANAGEMENT

Lecture VII : Public Key Infrastructure (PKI)

SSL BEST PRACTICES OVERVIEW

Public Key Infrastructure (PKI)

SUSE Linux Enterprise 12 Security Certifications

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)

Class 3 Registration Authority Charter

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.

Introduction to Network Security Key Management and Distribution

Software Defined Everything

Supplier Information Security Addendum for GE Restricted Data

ARPKI: Attack Resilient Public-Key Infrastructure

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

CERTIFICATION PRACTICE STATEMENT UPDATE

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

GEOSURE PROTECTION PLAN

7 Key Management and PKIs

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

CSC574 - Computer and Network Security Module: Public Key Infrastructure

Simplify SSL Certificate Management Across the Enterprise

SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates

The IVE also supports using the following additional features with CA certificates:

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides

Symantec Managed PKI Service for Windows Service Description

Implementing Linux Authentication and Authorisation Using SSSD

Challenges Implementing a Generic Backup-Restore API for Linux

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Microsoft vs. Red Hat. A Comparison of PKI Vendors

How To Make A Trustless Certificate Authority Secure

GlobalSign Digital IDs for Adobe AIR Code Signing

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

NIST Test Personal Identity Verification (PIV) Cards

Certification Practice Statement

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Transcription:

NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1

NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These recent attacks on CAs make it imperative that organizations ensure they are using secure CAs and must also be prepared to respond to a CA compromise or issuance of a fraudulent certificate. 2

Year 2001 2008 Recent Public Authority & Counterfeit Incidents Incidents VeriSign issues Microsoft Corporation code signing certificate to a non-microsoft employee. Thawte issues certificate for Live.com to non-microsoft employee Comodo issues mozilla.org certificate to Startcom Organization forges VeriSign RapidSSL certificates Comodo issues nine counterfeit certificates (Google, Yahoo, Live, etc.) when registration authority is compromised. StartSSL CA compromised 2011 DigiNotar compromised. 531 fraudulent certificates issued. Dutch government experiences major service outages. Boeing CA compromised 2012 Microsoft CA certificates forged by exploiting MD5 (Flame) 3 * Electronic Freedom Foundation uncovers many more unpublicized CA incidents by analyzing CRLs from public CAs

Diagram of PKI Ecosystem Issuing CA Root CA Issuing CA CA Registration Authority CRL CRL Subject End Entity OCSP Responder CRL Distribution Point Relying Party Root 4

Using Fraudulent s: A Two-Phased Attack Get fraudulent certificate(s). Use the fraudulent certificate(s) for nefarious purposes. 5

CA Compromise and Fraudulent Scenarios D CA Key Theft: Stolen or derived copy of CA private key is used to issue fraudulent certificates. RA Compromise: Infiltrate RA or steal credentials and authorize fraudulent certificates. B CA CA System Compromise: Malware or other infiltration used to get fraudulent certificate signed by CA (without getting copy of CA private key). C Impersonation: Trick RA into issuing a fraudulent certificate. A RA Subject Hacker 6

Man-in-the-Middle Eavesdropping Subject: Alice.com Issuer: CAx Public Key: Subject: Alice.com Issuer: CA1 Public Key: Fraudulent Eve s Private Key Eve Alice.com Alice.com Alice.com Private Key Bob is redirected thru Eve s server and presented with the fraudulent certificate. Eve can view all encrypted data. Bob normally connects to Alice.com directly and verifies the authenticity of the server using its certificate Bob 7

Impersonation Subject: Bob Issuer: CA1 Public Key: Bob authenticates to Alice.com using his certificate Alice.com Bob s Bob s Private Key Bob Eve authenticates as Bob to Alice.com using the fraudulent certificate Subject: Bob Issuer: CAx Public Key: Eve Fraudulent Eve s Private Key 8

Forge Digital Signatures Subject: Bob Issuer: CA1 Public Key: Bob digitally signs documents authorizing fund transfers Alice Bob s Bob s Private Key Bob Eve is able to forge Bob s signature using the fraudulent certificate Subject: Bob Issuer: CAx Public Key: Eve Fraudulent Eve s Private Key 9

CA Compromise & Counterfeit and Remediation Matrix Revoke Counterfeit s Revoke CA Cert Replace All Certs from CA Remove Root Cert from Relying Parties A. Impersonation B. RA Compromise C. CA System Compromise D. CA Signing Key Compromise E. Root CA Compromise 10

Detailed Steps for Preparing for & Responding in the Best Practices Document Preparing for a CA Compromise Relying a. Review CA Security and Communications: Once you have a complete list Preparatory Steps CA Subject Party of all CAs in use in your environment which may involve replacing a. Develop, Communicate, and Track Compliance with certificates from unapproved CAs review the security practices for each Policies and Procedures : The installation and management of CA (internal and external) to assure yourself that the CAs are minimizing certificates and private keys is generally very distributed within the risks of compromise. Review how each CA is monitored for potential enterprises, where installation and oversight typically falls to the compromise and the response and communication plans in place in case of each administrator responsible for the machines and applications a compromise. Ensure that the CA knows who within your organization to where the certificates are deployed. This increases the possibility contact. It is important to review the security of your CAs (internal and that best practices will not be followed. Consequently, it is important external) on a periodic basis. to define, communicate, and educate personnel on clear policies and procedures. Recommendations for these policies and procedures are Ensure that you are not using a root CA to issue end entity certificates. If a provided in the preparation steps below as well as other best root is being used to issue end entity certificates, replace those certificates practices from Venafi. with certificates from an Intermediate CA. b. Establish and Maintain Inventory: An important step in b. CA Transition Plan: If a CA is compromised, you must obtain certificates preparing for a CA compromise is building a comprehensive inventory from another CA. It is best to have plans in place for the new CA before a of the certificates and private keys deployed in your environment. CA compromise occurs. For external CAs, it may good to maintain a This includes tracking precisely which CAs are used by which relationship with multiple CAs so that contractual relationships are in place platforms and applications so that appropriate action can be taken if prior to a CA compromise event that requires you to move away from a one of them is compromised. A comprehensive inventory also vendor entirely. For internal CAs, implement a plan for rapidly establishing enables you to identify all certificates that need to be replaced in the a new CA in the event of a compromise. case of a compromise and to validate that they are actually replaced. c. Education: Responding to a CA compromise involves multiple stakeholders and roles. A response will be more successful if individuals in each of those A good first step in establishing an inventory is requesting a list of roles are educated beforehand. Here are some examples: issued certificates from your known CAs. However, this may not a. CA Management Personnel: Provide education on monitoring for account for all certificates in use in your environment, as some compromise events and procedures for taking remedial action systems might use other, unknown CAs or self signed certificates of (including communication plans) if a compromise occurs. which you are not aware. It is often prudent to perform a manual b. Owners (Subjects): Ensure that all certificate owners inventory (asking all administrators to report the certificates they are understand the consequences of a CA compromise and the responsible for) or automated inventory (performing automated importance of maintaining up to date contact information so that network and/or file scans to discover certificates). they can be notified in case of a compromise. In addition, certificate owners should understand the steps they would take to rapidly replace their certificate(s) if a compromise occurs. While creating an inventory, it is critical to identify owners for each c. Relying Parties: Ensure that all Relying Parties (i.e. owners of certificate and contact information. This enables you to rapidly systems that check certificates to authenticate or communicate contact all appropriate owners if a compromise occurs so they can with other systems) understand the importance of configuring all take action. Because certificate deployments and owners change, it is systems to check revocation status. These checks ensure that important to implement a system for keeping inventory and systems do not trust certificates that have been revoked by the ownership information up to date. issuing CA. If revocation checking is interfering with operations, Relying Parties should notify the central PKI organization to determine ways of addressing the issues without disabling the You should periodically analyze the collected inventory data. Then Impersonation RA Compromise Relying Relying Steps CA Subject Party Steps CA Subject Party a. Revoke the Fraudulent a. Revoke the Fraudulent b. Notify the Subject of the Fraudulent b. Revoke the credentials of the compromised RA (issuing new credentials if the RA will resume its duties). c. Notify potential Relying Parties to ensure they are checking for revocation. This notification may be provided through direct c. Carefully check all logs to ensure that all fraudulent certificates communication or public relations announcements. have been identified and revoked. d. Notify vendors of software or systems used by Relying Parties (e.g. d. Notify the Subject(s) of the Fraudulent (s) browsers). If the potential use of the fraudulent certificate will have a high impact, it may make sense for software and system vendors e. Notify potential Relying Parties to ensure they are checking for to explicitly block the use of the fraudulent certificate. revocation. This notification may be provided through direct communication or public relations announcements. e. Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the f. Notify vendors of software or systems used by Relying Parties (e.g. certificate cannot be checked due to an unavailable CRL or OCSP browsers). If the potential use of the fraudulent certificate will have responder). a high impact, it may make sense for software and system vendors to explicitly block the use of the fraudulent certificate. g. Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to an unavailable CRL or OCSP responder). a. Replacement Plan: If a CA is compromised, that CA s certificate must be revoked and all of the certificates issued by the CA become invalid and must be replaced. In environments with large numbers of active certificates, large scale replacements can be very disruptive and can cause operations to stop for extended periods of time. Therefore, it is critical to have a well defined plan for replacing certificates in a rapid yet orderly fashion. An inventory and list of owners serve as the foundation for a rapid response by ensuring that all certificate owners can be contacted when a compromise occurs. owners must also understand the steps for replacing certificates. However, since many certificate owners do not perform certificate operations frequently, they will likely need assistance. It is therefore important to have a plan for staffing a help desk to handle the large number of support requests as all certificates are replaced. If high priority systems and certificates have been identified during the inventory process, the replacement plan should also include steps for ensuring those certificates are replaced early in the process. Finally, it is important to have a method for monitoring the replacement of certificates so that it is clear which systems are not safe, where problems are occurring and when the process is complete. This monitoring and tracking also makes it possible to report back to executives and other stakeholders. A target timeframe should be set for the amount of time required to replace certificates and get systems and business applications back in operation. b. Root Inventory: Establish an inventory of all roots that are trusted in your organization and establish a plan for replacing them if necessary. This step is important in case a root CA is compromised and a root must no longer be trusted. CA Key or System Compromise Steps CA Subject a. Revoke the certificate of the compromised CA. b. Establish a point of contact or help desk to answer questions and provide support. c. Notify all Subjects who have been issued certificates from the compromised CA that their certificate will need to be replaced and provide instructions. d. Notify potential Relying Parties to ensure they are checking for revocation. This notification may be provided through direct communication or public relations announcements. e. Notify vendors of software or systems used by Relying Parties (e.g. browsers). If the potential use of the fraudulent certificate will have a high impact, it may make sense for software and system vendors to explicitly block the use of the fraudulent certificate. f. Replace all certificates from the compromised CA with new certificates from a different CA. For internal CAs, this may involve setting up a new CA. For external CAs, this may involve enrolling for new certificates. g. Inform all potential Relying Parties of the new CA that will be used. h. If a new root is required to validate the new certificates, make it available for secure distribution to all potential Relying Parties. i. If a new root certificate is required to validate certificates, install this root certificate in all necessary trust stores. j. Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to the unavailability of the CRL or OCSP responder.) Relying Party a. Revocation Checking: Ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to an unavailable CRL or OCSP responder). All standard builds and images (e.g. operating systems and applications) should have revocation checking enabled. In addition, wherever possible, application configuration management systems should be used to ensure that revocation checking is not turned off. b. Overall Response Plan: Organizations must have an overall CA compromise response plan. This plan must identify key points of contact (who should be contacted first in case a compromise is detected), delineate roles and responsibilities, provide a communications plan (to Subjects, Relying Parties, executives, etc.), specify a certificate replacement plan, provide a CA migration plan, and support other elements described in this document. Root CA Compromise Relying Party Steps CA Subject a. Revoke all non expired certificates issued from the CA and issue a final CRL. b. Establish a point of contact or help desk to answer questions and provide support. c. Notify all CAs that have been issued certificates from the root CA that those CAs are no longer valid. Ensure they contact the Subjects to whom they have issued certificates that those certificates are no longer valid and must be replaced. d. Notify vendors of software or systems that include the certificate for the compromised root CA in their product trust stores that the certificate must be removed. e. Notify all Relying Parties to inform them that the root certificate for the compromised root CA must be removed from their trust stores. This notification may be provided through direct communication or public relations announcements. f. Notify all Subjects who have been issued certificates from the compromised CA that their certificate will need to be replaced and provide instructions. g. Replace all certificates from subordinates of the compromised root CA with new certificates from different CAs. For internal CAs, this may involve setting up a new CA. For external CAs, this may involve enrolling for new certificates from a different CA from the same vendor or selecting a different vendor. h. Inform all potential Relying Parties of the new CA that will be used. i. If a new root CA is established, make the root certificate for the new CA available for secure distribution to all potential Relying Parties. k. Track the replacement of certificates through the completion of the process. j. If a new root certificate is required to validate certificates, install this root certificate in all necessary trust stores. 11 k. As an ongoing precaution, ensure that revocation checking is enabled and mandatory (i.e. operations or transactions cannot proceed if the status of the certificate cannot be checked due to the Proprietary and Confidential

Preparing for a CA Compromise Ensure only Approved Roots are Trusted K A Document Clear Policies Inventory Root CAs that are Trusted on Relying Party Systems J B Create CA Compromise Response Plan Enforce Revocation Checking on Relying Party Systems I C Educate all Stakeholders 12 Systems Trusting s (Relying Parties) Systems Where s are Installed (Subjects) Owners H Identify Cert Owners (Subjects) and Relying Parties G Verify that only Approved CAs are used. F Inventory Server-side and Clientside Certs CAs D Review CA Security and E Communications Policies Establish Backup CA Plans

Responding to a CA Compromise Validate That Revocation Checking is Enabled on Relying Party Systems G Validate Cert & Root H Replacement A Establish Clear Understanding of What Occurred (What Type of Compromise, etc.) B Activate Help Desk Remove/ F Replace Root s Replace E s D Notify Subjects, Relying Parties, and Vendors I Track and Report on Progress C Revoke s & Establish New CA(s) 13

Establishing a Comprehensive Inventory Systems with s A A A 3 Agent-based Discovery Inventory Database Internal & External CAs 1 Import from CAs A A A 4 Individual Import by Admins A A A 2 Network Discovery A - Agents Network Discovery Engines 14

Analyze Inventory and Evaluate Compliance authorities/self-signed certificates Key lengths Signing hash algorithms (e.g. MD5 or SHA1) Validity periods Expiration dates Locations Keystore types Owners Business applications Applicable policies and regulations Current management processes 15

Managing Ownership Information It is critical to have up-to-date ownership information Notifications for expirations Notifications in case of compromise Invalid notification is worse than no notification at all Best to have owners directly manage the updating of information Provide central oversight and support Terminated Reorg 16

Summary Preparing for and Responding to CA Compromise 1. Establish an accurate inventory of certificates Identify Owners 2. Ensure only trusted CAs are in use 3. Review CA security 4. Establish backup CA(s) 5. Inventory trust anchors (root certs) 6. Create strategy for rapid certificate replacement (to minimize business interruptions due to CA compromise) 7. Establish method of tracking replacement of certificates 17

??? Discussion 18. All rights reserved.

Unpublished Work of Venafi, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Venafi, Inc. Access to this work is restricted to Venafi employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Venafi, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Venafi, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Venafi, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Venafi marks referenced in this presentation are trademarks or registered trademarks of Venafi, Inc. in the United States and other countries. Al l third-party trademarks are the property of their respective owners. 19 Proprietary and Confidential

Encryption Management and Distribution Models CA or Cert/Key Mgmt System Misc. Automated Mgmt Manual Requests Agent Pull Agent Push A A Hybrid/ Staged Mgmt Manual Mgmt Agentless Standard or Proprietary Protocols (e.g. SCEP, KMIP,1619.3) No Embedded Lifecycle Management 20 Embedded Lifecycle Management A - Agent Proprietary and Confidential

Another Risk: Private Key Security Private keys and passwords are not changed when admins leave the organization Same password used on multiple keystores. Keystore 2 Password = abc123 Keystore passwords are not changed regularly. Keystore 1 Password = abc123 Server Performance Monitoring Customer Experience Monitoring Security Monitoring Server Private keys are manually passed to other groups/admins for distribution. Admins manually manage private keys, making it possible to copy them. 21 Proprietary and Confidential