Weaving a Web of Trust IRUS Bay Area Roundtable October 9, 1998 Rohit Khare (Adam Rifkin) Weaving a Web of Trust Mission How can users decide what to trust on the Web? Mechanism Does X have permission to do Y with resource Z? October 9, 1998 Introduction Principles Principals Policies Pragmatics Applications Limits of Trust Implications Weaving a Web of Trust Why What When How 2 Introduction Clara Customer fires up her favorite Web browser one morning and connects to her Bank to pay her rent. The Bank's computer duly opens up an encrypted session, and Clara fills out the payment form from her landlord A Welter of Decisions... Can the Bank really believe it’s Clara? Vice versa? What kind of ‘receipt’ can Clara rely on? Has the rent bill been delegated accurately? Cryptography answers ‘how’, not ‘why’ Tamper-proofing is not the same as entrusting October 9, 1998 Weaving a Web of Trust 3 New Conflicts in Open Systems The Bank no longer controls both ends Assumptions about trusted hardware, ATM card scanners, private communications links invalidated Furthermore, Web applications tend towards interoperable infrastructure technology Common cryptographic channel security Common certificate formats and repositories Common user interface hooks How can [online banks] convey trustworthiness without marble? October 9, 1998 Weaving a Web of Trust 4 Scenario: Entrusting an Applet Sara Surfer hears about a whiz-bang new financial applet from Jesse Jester. She hops over to FlyByNight.Com and downloads their latest and greatest auto-stock-picker Automated support for trust decisions: Helping Sara decide whether to trust the applet’s advice: third party ratings, endorsements, &c Controlling the privileges of that applet: to read portfolios, even execute trades, but not leak info October 9, 1998 Weaving a Web of Trust 5 Scenario: Content Filtering Many transactions can be ‘rolled-back’ Often some recourse if trust is violated: files recovered, money refunded, boarding denied Social effects cannot “Should Johnny view page P?” is another trust issue Indecency and inappropriateness is in the eye of several beholders Intersection of school, parents, and political policy Need to integrate several mechanisms Black- and White- lists Entrusting publishers vs contents October 9, 1998 Weaving a Web of Trust 6 Trust Management Traditional, ‘closed’ security falls short Access Control Lists and user databases operate over a known, finite universe of principals & resources PolicyMaker introduced a new approach Blaze, Feigenbaum, et al. at IEEE Oakland 1996 A TM engine strings together assertions into proofs ...Where assertions can come from many sources ...And the crytpography falls out as just one way to entrust the binding of an assertion to a speaker We need to ask why rather than how October 9, 1998 Weaving a Web of Trust 7 Principles Why Digital TM engines can be more exacting in establishing authority, so: Be Specific Broader assertions are less reliable Trust Yourself All trust decisions must loop back to own axioms Be Careful Logical design doesn’t preclude implementation holes October 9, 1998 Weaving a Web of Trust 8 Principle: Be Specific In real life, holistic judgments are vague: “I trust my spouse” — for what? “I trust my Bank” — that’s not how they see it General-purpose Web tools frustrate: Web servers deal in bags of bits between machines Not easy to distinguish a medical record file Not easy to identify the actual user Web client interfaces don’t understand either ‘Do you want to submit this data unencrypted’ - swat! Underlying OS security can thwart limits Sandboxing mobile code, redistribution limits October 9, 1998 Weaving a Web of Trust 9 Principle: Trust Yourself Assertion Chains should lead back to self “My credit card number is xxxx” CreditCorp’s certificate Issuing Bank own records “United.com is the airline” (it isn’t) Local DNS Root Servers ICANN Jon Postel “Jon’s public key is yyyy” (oops!) (X.509) Signed by USC Signed by state of CA Signed by Feds “Jon’s public key is zzzz” (PGP) Signed by Jon Signed by Fred Signed by self “Public key nnnn is Jon” (SDSI/SPKI) “Self’s DNS’s Jon is nnnn” — root your own naming tree October 9, 1998 Weaving a Web of Trust 10 Principle: Be Careful Identify (& Justify) every trust decision Can be buried in operational logic Example: Is Scooter a Member? W3C has Public, Member, and Team web access Originally, Member IP address masks were used Verbal contracts trusted employees to protect info AltaVista’s web crawler was seen as a Member ... And information leaked out to the index! Required coordination of password database, filesystem permissions, and Robot Exclusion file October 9, 1998 Weaving a Web of Trust 11 Principals What Microsoft Authenticode entrusts ActiveX controls based on: encrypted communication between machines; signed identity of the author(s); and a ‘safe applet pledge’ certificate from MS and a ‘commercial sw publisher’ certificate from Verisign/D&B Names People An identity which persists across transactions; liable Addresses Computers Limited lifetime; can only prove correct execution Credentials Organizations Persistent lifetime; can link People & Computers October 9, 1998 Weaving a Web of Trust 12 Principal: People Trust = behavioral consistency Legal and social precedent holds individuals liable Ultimately, people back computers and organizations Human identity should be established outside of any particular application E.g. Verisign’s multiple levels, from email to notary to credit check to personal investigation Identity alone is not trustworthy Bank trusts Clara Customer, not Clara Beekham Once the organization establishes a role linking the two October 9, 1998 Weaving a Web of Trust 13 Principal: Computers The Web’s Trusted Computing Base? Client PCs have many points of failure Even https: relies on routing and domain naming Entrusting Devices as Devices To execute cryptographic operations correctly To modify internal state or trigger peripherals Checksums, clock freshness, channel security, etc can only prove a consistent address Example: Cellphone cloning fraud conflates device authentication (ser #) with user authorization (bill) October 9, 1998 Weaving a Web of Trust 14 Principal: Organizations Organizations are much like people Literally and legally, as ‘incorporation’ suggests Scale has a quality all its own Easier to trust a group of people over time with internal checks and balances and standards Anytime trust has to be shared with a different principal Credentials bind people to devices It is more efficient to intermediate relationships Reflects the same transaction costs as optimal firm-size theory does in real world economics October 9, 1998 Weaving a Web of Trust 15 Policies When Who you are What you have What you can do Principal-Centric Object-Centric Action-Centric TM Engines take a proposition (principal, action, object), assertions, and a policy evaluator as input to generate an authorization matrix Policies can be composable on behalf of several stakeholders Credit Line Branch Manager October 9, 1998 Savings Account Create, Read/Write Create, Read/Write Vault Deposit, Withdraw Teller Read Read/Write Deposit Guard None None Withdraw Weaving a Web of Trust 16 Policies: Principal-Centric Placing trust in principals (or roles) Typically, classify individuals into groups [Denning 76] proved information flow w/lattices Principle of least privilege encourages specificity ... and label each object or action with a minimum or maximum authorization level [Bell and LaPadula] compartmentalization of processes — read downwards, write upwards, sanitization Useful when there are fewer users than objects or actions October 9, 1998 Weaving a Web of Trust 17 Policies: Object-Centric Placing trust in objects (or keys) Typically, protect resources with keys Hand out the combination to a vault Secret-sharing can require multiple cooperating keyholders (e.g. a safe-deposit box) Optionally compartmentalize access Different interfaces have different keys Deposit and Withdraw handles in MS COM-speak Possession of the right pointer limits the visible functions Useful when there are fewer objects than users or actions October 9, 1998 Weaving a Web of Trust 18 Policies: Action-Centric Placing trust in demonstrated abilities Typically test and compile into an authorization certificate Driver’s License or swimming test Manage classes of capabilities Bank might be factored into Account Creation, Bookkeeping, and Vault Access ... Then map onto personnel and objects as needed Example: Drinking age laws are intrinsic, not from a registry of drinkers or access controls on bottles October 9, 1998 Weaving a Web of Trust 19 Policies: Implementation Trusting someone to drive a car: By identity: a list of authorized drivers By object: a set of keys to be handed out By capability: rent a car with license & insurance Choice of ‘primary axis’ depends on: Simplicity: which is the smallest set? bank employees Dynamism: avoid enumerating the volatile. drivers Efficiency: what’s easiest to check? Licenses Watch for conflicting policy styles Hotel erred in using payment-ability as identity October 9, 1998 Weaving a Web of Trust 20 Pragmatics How The topological shift from a single secure node to a net of separately administered domains is driving the development of a new generation of Web TM tools Identifying Principals Decentralized PKI Labeling Resources Web Metadata Codifying Policies Policy Languages Automating the Web of Trust TM Engines October 9, 1998 Weaving a Web of Trust 21 Pragmatics: Identifying Principals Digital Certificates alone aren’t trustworthy [Kohnfelder78] introduced Certification Authorities CA Utility is proportional to its reach Clearinghouse simplifies group-membership ... But its power is inversely related The further up the pyramid, the greater the liability Unprincipled compared to PGP/SPKI/SDSI: Identity certificates are not specific about authorization Hierarchy ends in God, not self Logistical difficulties of updating global revocation lists October 9, 1998 Weaving a Web of Trust 22 Pragmatics: Labeling Resources Traditional fixed set of security attributes UNIX file permissions, AFS ACLs, process handles Separable security labels as metadata PICS labels, Resource Description Framwork (RDF) Deliverable in, with, or from third parties Self-description of schemas Loadable rating scales or attribute vocabularies Difficulty of binding to variable Web pages Languages, obsolescence, bundling together pages October 9, 1998 Weaving a Web of Trust 23 Pragmatics: Codifying Policies Web’s ‘trust problems’ are too varied to compile in PICS filtering, applet authorization; soon payment method selection and privacy policy negotiation Externalized policy evaluators More flexible to put in a general-purpose TM Engine Possible to compose policies written in several languages and styles Example: REFEREE can load in policy interpreters as well as policies, rather than PICSRulz alone October 9, 1998 Weaving a Web of Trust 24 Applications Collaborative Authoring & Publication Extending trust to push networks, readers Content Filtering Acceptable content; rights management; privacy Highlights composable policy, diverse label stores Electronic Commerce Negotiating by assertion rather than policy JEPI Downloadable Code Trusted applet; trusted runtime/OS October 9, 1998 Weaving a Web of Trust 25 Limits of Trust Limits of Web Security Security services below, at, and above HTTP layer Trust as a Social Contract Game-theoretic model of rational opponents [Axelrod] Trust is a learning process; how can tools help? Trust in the Mirror Moving the world into the box magnifies latent flaws in existing relationships The Social Security PEBES Case (“mail vs. e-mail”): speed, anonymity of electronic queries changes the risk profile October 9, 1998 Weaving a Web of Trust 26 Limits: Web Servers Unprincipled Not able to specifically identify resources at risk within a server (“medical records”) Not responsible for own security; varies by OS Not careful in logging anomalies or for rollback Principal identification scattered E.g. SSL client-auth info cannot pass up to HTTP Lower-layer IP source or DNS lookup spoofable Inflexible policies Typically limited to user-and-password configurations October 9, 1998 Weaving a Web of Trust 27 Limits: Web Clients Unprincipled Does not adapt behavior to specific site IE4 Zones Requires trusting monolithic sw vendor instead of self Not carefully integrated with OS: cache leaks, cookies Principal identification scattered Desktop PCs & Macs have a weak concept of User User interface hides computer address — spoofable Organizational identification relies on images, DNS Inflexible Policies Content-filtering, applet, and privacy checks built-in Weaving a Web of Trust October 9, 1998 28 Implications Web Developers Commit to developing standardized TM infrastructure Web Users Awareness of the flood of trust decisions of “mere” surfing motivates developers to do their part Application Stakeholders Identify and justify your systems’ trust decisions Citizens What are the social consequences of fragmenting our trust communities into self-contained world-views? October 9, 1998 Weaving a Web of Trust 29 For Further Information... This Talk http://www.ics.uci.edu/~rohit/web-of-trust Our Paper http://www.cs.caltech.edu/~adam/papers/www The Book http://www.w3j.com/7/ Digital Signature Labels http://www.w3.org/DSig/ Simple PKI http://www.ietf.org/html.charters/spki-charter.html REFEREE http://www.research.att.com/~jf/pubs/www6-97.html PolicyMaker ftp://dimacs.rutgers.edu/pub/dimacs/ TechnicalReports/TechReports/1996/96-17.ps.gz Contact Us October 9, 1998 rohit@ics.uci.edu, adam@cs.caltech.edu Weaving a Web of Trust 30