+ All Categories
Home > Documents > Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga...

Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga...

Date post: 24-Dec-2015
Category:
Upload: garry-merritt
View: 222 times
Download: 0 times
Share this document with a friend
Popular Tags:
21
Online AAI José A. Montenegro José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: [email protected] Email: [email protected] Web: www.lcc.uma.es/~monte Web: www.lcc.uma.es/~monte
Transcript
Page 1: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

Online AAI

José A. MontenegroJosé A. MontenegroGISUM Group

Security Information SectionUniversity of Malaga

Malaga (Spain)

Email: [email protected]: [email protected]: www.lcc.uma.es/~monteWeb: www.lcc.uma.es/~monte

Page 2: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

2

AAI?

Authentication & Authorization Infrastructure Several possibilities We focused on PKI + PMI

Development Background PKI

Cert’eM - Online PKI and more … X509 ITU-T

PMI Extending Cert’eM – Online PMI X509 ITU-T

Page 3: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

3

Online AAI? = CRL problem

CRL Issue

Keycompromised

Revocation Request

Revocation time

T10T0

Time

CRL Issue

Dishonest UseDishonest Use

CRL = Problem in PKI and exacerbate in PMI,

therefore an AAI issue to take into account

Online AAI as possible solution

Page 4: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

4

What is Cert’eM?

PKI online Designed & Implemented in ’98. Try to solve CRLs problems

OCSP service did not develop yet.

Email based on X509 usually linked to X500 name X509 proposal lets links to Email address (Rfc 822)

Use an architecture of CAs that satisfy the needs of near-certification;

Page 5: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

5

Cert’eM: Hierarchical Email Nodes

•••

••• ••• •••

••• ••• ••• •••

KSU

KSUKSU

KSU KSU KSU KSU

es

uma.es

lcc.uma.es

= END USER

Page 6: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

6

Cert’eM: Certificate Request Information Flow

[email protected][email protected]

[email protected]?

[email protected]

[email protected][email protected]

[email protected]?

[email protected] r.s.t

c

b.c

t

s.t

KSUKSUKSUKSU

KSUKSU

KSUKSU

KSUKSU

KSUKSU

bobalice

Page 7: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

7

Cert’eM: KSU ElementsCertification Authority

(KSU lcc.uma.es)

Certification Server (lcc.uma.es)

Certification Kernel (lcc.uma.es)

Private Key CA

User Data

X509 Certificate

read

readwri

te

wri

te

Certificate Request

6

5

4

3

2

1 1

close request

pending request

6 5 4

ongoing [email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

process 1process 1

process Nprocess N

principalprincipal

Cache Certificates Local Certificates

Page 8: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

8

Cert’eM: Protocol …

Connection Phase C : HELLO [<clientID>] S : +OK {the client has permission} S : -ERR1 { the client host is not allowed S : -ERR2 { the client <clientID> is not allowed}

Transaction Phase C: GETCERT <userID> S : CERT S : CERT <<certcert> <> <vsvs>> S : +OKor S : -NSC {no such certificate}

Page 9: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

9

… Cert’eM: Protocol

Transaction Phase S : CERT S : CERT <<certcert> <> <vsvs>>

Can be local or external search Local = Database search External = Use of Cache mechanism and

communication between KSU

Termination Phase C: EXIT S : +Ok

Page 10: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

10

Cert’eM: Locating KSUs

lcc.uma.es 111.111.222.222

lcc.uma.es correo.lcc.uma.es 111.111.222.222

lcc.uma.es certem-tcp.lcc.uma.es 111.111.222.222

[email protected]<3>

<2>

<1>

Page 11: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

11

Cert’eM Conclusion

guarantees that CAs will only certify those users close to them;

provides real-time revocation of keys (without the need of CRLs);

close to S/MIME

Can provide quality service to GRIDs

slight protocol inter-KSU and user-KSU

provided services to several projects we have been implicated (not only theoretic solution)

Page 12: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

12

X509 ITU-T PKI

Developed to Spanish Banking Entity (BANESTO) in 2001

Using only GPL libraries: OpenSSL GTK OpenLDAP

Page 13: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

13

X509 ITU-T PMI (I)

ITU-T proposal defines four PMI models: General, Control Role (PERMIS Project) Delegation (Our proposal)

We have extended OpenSSL library with attribute certificates management and authorization capabilities, because:

This library is widely deployed There was no previous experience with the

introduction of attribute certificates in OpenSSL We wanted to approach privilege delegation

procedures (we are still in the way) and … we had already developed a PKI using

OpenSSL

Page 14: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

14

X509 ITU-T PMI (II)

Page 15: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

15

Extending Cert’eMz

Cert’eM technology applies to Authorization + Openssl Attribute certificates

The main elements are the Attribute Certificate Service Units (ACSUs)(ACSUs), that integrate attributes certification and management functions:

- managed by an Attribute Authority

- contains a database to store the attribute certificates of “local” users

- updating and revocation of certificates and local operations

Page 16: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

16

AAI scenario (I)

[[email protected], operation] SAlice

Alice Bob

AAI

Who is the user ? &What can he do ?

ACAC PKCPKC 1 AB: TokenToken

2 BAAI: RequestRequest

3 AAI B: AC + PKCAC + PKC

1 AB: TokenToken

2 BAAI: RequestRequest

3 AAI B: AC + PKCAC + PKC

Request

Page 17: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

17

AAI scenario (II)

How link identity and attribute certificates?

Page 18: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

18

Future Work

Actually working in delegation model

Delegation statements establish a Directed graphs D. G. offer a global vision of delegation system

Theoretical model apply to PMI, and it work!!!

Page 19: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

19

Thank you

Any Any QQuueessttiioonn??José A. MontenegroJosé A. Montenegro

GISUM Group Security Information Section

University of Malaga Malaga (Spain)

Email: [email protected]: [email protected]

Web: www.lcc.uma.es/~monteWeb: www.lcc.uma.es/~monte

Page 20: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

20

AAI: Relation to TACAR …

c

TACAR ([email protected])

ACSUACSU

a.b.c

b.c

KSUKSU

KSUKSU

KSUKSU

alice

ACSUACSU

ACSUACSU

t

r.s.t

s.t

KSUKSU

KSUKSU

KSUKSU

bob

ACSUACSU

ACSUACSU

ACSUACSU

ca@c?Cca@c

ca@c?

Cca@c

ca@t?Cca@t

ca@t?

Cca@t

Page 21: Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Email: monte@lcc.uma.es Web: monte.

21

… AAI: Relation to TACAR

Remember CA belongs to upper level. Domain c and t is stored in TACAR

TACAR is common root to “a.b.c” and “r.s.t” tree

How to localize TACAR? Same way as whichever KSU/ACSU node. Add [email protected] and [email protected]

certificates to TACAR


Recommended