Overview of RSA Laboratories

advertisement
PKI Future Directions
29 November 2001
Russ Housley
RSA Laboratories
CS – Class of 1981
Outline
• Background
• Privilege Management
• Certification Status
• Management Protocols
• Legal and Policy
• Applications
2
Digital Signing
• A one-way hash function is used to create a hash
of the data to be signed
• A digital signature is cryptographic
transformation of the hash value and the signer’s
private key
Original
Message
Hash
Hash
Value
Sign
Signature
Value
Originator
Private Key
3
X.509 Certificate Format
VERSION
12345
SERIAL NUMBER
SIGNATURE ALGORITHM
C=US, S=VA, O=RSA Labs
C=US, S=VA, O=RSA Labs
CN=Russell Housley
RSA with SHA-1
ISSUER
VALIDITY
1/1/01 - 1/1/02
SUBJECT
SUBJECT PUBLIC
KEY INFO
ACBDEFGH
v1 or v2 or v3
RSA, 48...321
ISSUER UNIQUE ID
SUBJECT UNIQUE ID
RSTUVWXY
EXTENSIONS
SIGNATURE
4
X.509 CRL Format
v1 or v2
VERSION
SIGNATURE ALGORITHM
C=US, S=VA, O=RSA Labs
ISSUER
LAST UPDATE
12/2/01
RSA with SHA-1
11/25/01
NEXT UPDATE
REVOKED
CERTIFICATES
CRL EXTENSIONS
SIGNATURE
SEQUENCE OF
SERIAL NUMBER
9/27/01
12345
REVOCATION DATE
CRL ENTRY EXTENSIONS
5
Privilege Management
• Extensions allow arbitrary information to be
bound to the subject identity
• Should only include an attribute in the identity
certificate if it meets two criteria
– The CA is authoritative for the attribute
– The expected lifetime of the attribute will not increase
the likelihood of revocation
• When these criteria cannot be met, then an
attribute certificate should be used instead
6
Attribute Certificate
VERSION
C=US, S=VA, O=RSA Labs
HOLDER
C=US, S=VA,O=RSA Labs, OU=IT
ISSUER
SIGNATURE ALGORITHM
123456789
v1 or v2
RSA with SHA-1
SERIAL NUMBER
VALIDITY
11/29/01 - 11/30/01
ATTRIBUTES
ISSUER UNIQUE ID
EXTENSIONS
SIGNATURE
SEQUENCE OF
ATTRIBUTE TYPE
Administrator
{ 2 5 4 72 } (role)
SET OF
ATTRIBUTE VALUES
7
Linking Identity Certificates
and Attribute Certificates
• The attribute certificate holder field is a pointer to
an identity certificate
• Two techniques:
– Matching subject –
Links to any identity certificate for that subject
– Matching issuer / serial number pair –
Links to a particular certificate
8
Certificate Status
• Certificate Revocation Lists (CRLs)
– Delta CRLs
– Sliding Window Delta CRLs
– Indirect CRLs
• Online Certificate Status Protocol (OCSP)
– RFC 2560
– Client must build certification path
– Irrevocable trust in OCSP responder
• Delegated Path Validation
– Simple Certificate Validation Protocol (SCVP)
• draft-ietf-pkix-scvp-06, July 2001
– Server builds path and validates it for the client
– Irrevocable trust in SCVP responder
9
Sliding Window Delta CRLs
Full CRL
Number
22
23
24
25
26
27
28
29
30
31
32
33
Delta CRL
Since
13
14
15
16
17
18
19
20
21
22
23
24
8AM
4AM
4PM
Noon
Monday
Midnight
8PM
4AM
8AM
4PM
Noon
Midnight
8PM
Tuesday
In this example, one can fetch the smaller Delta
CRL if the cache is current within 36 hours.
10
Indirect CRLs
Hierarchical PKI
In this example, one
can validate the Indirect
CRL once, caching
information about all of
the CAs in the
hierarchy.
Each certificate issued
to a CA contains a CRL
Distribution Points
extension that points to
the Indirect CRL.
11
OCSP Response
VERSION
C=US, O=RSA, CN=OCSP1
id-MD5, A5CF3378E4BB0012,
ED3556A790CC34FF, 2560
RESPONDER ID
PRODUCED AT
Good
THIS UPDATE
NEXT UPDATE
http://pki.rsa.com/20011129.crl
20011129094500Z
CERTIFICATE ID
CERTIFICATE STATUS
20011129080000Z
v1
20011130080000Z
SINGLE EXTENSIONS
RESPONSE EXTENSIONS
Nonce = 48
SIGNATURE
12
SCVP Architecture
OCSP
Responder
Certificate
Client
Yes / No
SCVP
Responder
X.500
Directory
LDAP
Directory
Other …
13
Management Protocols
• Too many choices …
–
–
–
–
–
PKCS #10 [RFC 2314]
Certificate Request Message Format [RFC 2511]
Certificate Management Protocol (CMP) [RFC 2510]
Certificate Management using CMS (CMC) [RFC 2797]
Simple Certificate Enrollment Protocol (SCEP) [Cisco]
• Need simple, straightforward enrollment
– Enable your grandparents to get a certificate and send
digitally signed electronic mail …
• Yet, allow face-to-face registration for high-value
electronic commerce
– Qualified Certificates [RFC 3039]
14
Legal and Policy
• Electronic Signatures in Global and National
Commerce Act (E-Sign)
• Health Insurance Portability and Accountability
Act (HIPAA)
• Government Paperwork Elimination Act (GPEA)
• European Directive 1999/93/EC
– Qualified certificates required
• American Bar Association is updating RFC 2527
– Certificate Policy and Certification Practices Framework
15
Applications
• Signed documents
– ETSI Electronic Signature Format [RFC 3126]
– Electronic signature policies [RFC 3125]
– XML Digital Signatures [RFC 3075]
• Time stamping servers
– Time-Stamp Protocol (TSP) [RFC 3161]
• Wireless Applications Protocol (WAP)
native cell
phone security
services
handset
clear http
or https
gateway
Web
Server
16
For More Information
Russ Housley
rhousley@rsasecurity.com
+1 703 435 1775
www.rsasecurity.com/rsalabs
17
Download