+ All Categories
Home > Documents > Certificate Revocation: What Is It And What Should It Be

Certificate Revocation: What Is It And What Should It Be

Date post: 09-Mar-2016
Category:
Upload: john-iliadis
View: 219 times
Download: 0 times
Share this document with a friend
Description:
Fifth European Intensive Programme on Information and Communication Technologies Security (IPICS 2002), organised by the University of the Aegean, Greece and IFIP. July 2002, Samos island, Greece
Popular Tags:
21
Certificate Revocation: What Is It and What Should It Be 1 Department of Information and Communication Systems Engineering University of the Aegean E-mail: {jiliad,sgritz}@aegean.gr 2 Department of Informatics Technological Educational Institute of Athens E-mail: [email protected] University of the Aegean De Facto Joint Research Group John Iliadis 1,2 , Stefanos Gritzalis 1
Transcript
Page 1: Certificate Revocation: What Is It And What Should It Be

Certificate Revocation: What Is It and What

Should It Be

1Department of Information and Communication Systems Engineering University of the Aegean E-mail: {jiliad,sgritz}@aegean.gr

2Department of Informatics Technological Educational Institute of Athens E-mail: [email protected]

University of the Aegean De Facto Joint Research Group

John Iliadis1,2, Stefanos Gritzalis1

Page 2: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 2 out of 21

Overview➢ Introduction➢ What is Certificate Revocation ?➢ Proposed mechanisms for Certificate Status

Information➢ Evaluation criteria for CSI mechanisms➢ The need for an alternative mechanism➢ Alternative Dissemination of CSI (ADoCSI)➢ Problems to be solved in ADoCSI

Page 3: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 3 out of 21

Introduction1. Is PKI a new era for Network

Security?2. Certificate Revocation? What

Certificate Revocation?3. Certificate Status Information

Mechanisms4. EU Directive: “secure and prompt

revocation service”

Page 4: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 4 out of 21

Certificate Revocation

CA1

AuthenticatingentityAE

Dependent entityDE

SignerSR

CSIrepository

CA2

CSIrepository

CA3

CSIrepository

Page 5: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 5 out of 21

CSI Mechanisms:CRLs

➢ Certificate Revocation Lists➢ Compare to Black lists: Banks, Cell phone

Operators. Dependent entities: merchants (online POS), Banks, other Cell phone operators

➢ CRL: Signed list containing serial numbers of revoked (/suspended?) certificates, the revocation dates and (optional) reasons

Page 6: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 6 out of 21

CSI Mechanisms:CRLs (cont.)

➢ Delta-Certificate Revocation Lists➢ Distribution Points➢ Fresh Revocation Information

(DeltaCRLs on top of DP CRLs)➢ Redirect CRL (dynamic re-partitioning

of large DP CRLs)

Page 7: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 7 out of 21

CSI Mechanisms:(cont.)

➢ Enhanced CRL Distribution Options➢ Separate location and validation

functions.➢ Positive CSI

➢ CRLs are all wrong… CSI should contain positive, not negative info. Dependent entity should set ad hoc freshness requirements and certificate holder should provide ad hoc CSI.

Page 8: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 8 out of 21

CSI Mechanisms:(cont.)

Online Certificate Status Protocol– Server returning signed CSI corresponding to

CSI requests by dependent entities. Possible OCSP Responses:

1. “Good”, meaning certificate has not been revoked,

2. “Revoked”, meaning certificate has been revoked or suspended,

3. “Unknown”, OCSP is not aware of that certificate

Page 9: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 9 out of 21

CSI: Freshness-constrained

Revocation Authority

➢ Repositories of CSI need not be trusted

➢ Separation of Certification Authority and Authority that issues CSI (Revocation Authority, RevA)

➢ Dependent entity requires fresh enough CSI from certificate holder

Page 10: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 10 out of 21

Evaluation Criteria: Type of Mechanism

➢ M1: Transparency,➢ M2: Offline revocation,➢ M3: Delegation of revocation,➢ M4: Delegation of CSI dissemination,➢ M5: Delegation of certificate path validation,➢ M6: Referral capability,➢ M7: Revocation reasons.

Page 11: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 11 out of 21

Evaluation Criteria: Efficiency

➢ E1: Timeliness of CSI,➢ E2: Freshness of CSI,➢ E3: Bounded revocation,➢ E4: Emergency CSI capability,➢ E5: Economy,➢ E6: Scalability,➢ E7: Adjustability.

Page 12: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 12 out of 21

Evaluation Criteria: Security

➢ S1: CSI disseminator authentication,➢ S2: CSI integrity,➢ S3: CA compromise➢ S4: RevA compromise,➢ S5: Contained functionality,➢ S6: Availability.

Page 13: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 13 out of 21

The need for an alternative CSI

mechanism➢ Dependent entities and certificate

holders are not necessarily experienced computer-users, nor are they security aware,

➢ PKI security-related procedures have to be made more transparent, as in the credit card system.

Page 14: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 14 out of 21

An Agent-based mechanism

➢ The transparency criterion has to be met: location, retrieval and validation of CSI has to be made transparent to the dependent entity.

➢ An Agent-based mechanism could do that, using the aforementioned CSI mechanisms and providing an indirection layer between dependent entity and CSI mechanisms

Page 15: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 15 out of 21

ADoCSI: Alternative Dissemination of Certificate

Status Information

The agents ADoCSI needs must be able to:

1. Suspend execution and resume it at another execution environment,

2. Retain their state, when transporting themselves to other execution environments,

3. Create child agents and deploy them,4. Select a network location, out of a list of locations, with

the least network congestion,5. Communicate the retrieved information back to their

owner or to their owner’s application that spawned the agent.

Page 16: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 16 out of 21

ADoCSI

CA2

CA1

CA3

CSIAMP1

AuthenticatingentityAE

Dependent entityDE

Interface Agent

CSIAMP2

SignerSR

User-CSIAgent

CA-CSI Agent

CA-CSI Agent

referral

CA-CSI Agent

CA-CSI Agent

Page 17: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 17 out of 21

ADoCSI (2)1. Agent Meeting Places (AMP) (also called

Agent Platforms)2. Dependent entity,3. Authenticating Entity or Signer,4. Certification Authority Certificate Status

Information (CA-CSI) Agent,5. User Certificate Status Information (User-

CSI) Agent,6. Interface Agent.

Page 18: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 18 out of 21

ADoCSI: Problems seeking solutions

ADOCSI researchers must find solutions to a series of problems that emerge from using Agents in CSI, namely :

2. How can the location function be implemented transparently ?

3. How can dependent entities retrieve and validate CSI transparently ?

4. How is a certificate path validated ?

5. What is the way this mechanism interacts with dependent entities ?

6. How are Agents protected from unauthorised modification or replacement ?

7. How can CSI carried by Agents be protected ?

8. How can an Agent tell a fraudulent Agent Meeting Place ?

Page 19: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 19 out of 21

ADoCSI: Problems seeking solutions (2)

1. How can AMPs be protected from DoS attacks ?2. How can dependent entities be protected against

User-CSI Agent replay attacks ?3. How are the Agent Meeting Places protected from

malicious Agents ?4. How can an Agent retrieve CSI for a dependent

entity, without letting the AMP know which certificate did it retrieve CSI for ?

A first paper commenting on these issues will soon appear.

Page 20: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 20 out of 21

References➢ References of general interest (PKI

mostly)➢ References to certificate revocation

resources➢ References to papers on securing

Software Agents

Page 21: Certificate Revocation: What Is It And What Should It Be

John Iliadis, Stefanos GritzalisUniversity of the Aegean, IPICS 2002Copyright © 2002

Slide 21 out of 21

References (2)➢ References of general interest (PKI

mostly)➢ References to certificate revocation

resources➢ References to papers on securing

Software Agents


Recommended