Title: Online AAI
1Online AAI
- José A. Montenegro
- GISUM Group
- Security Information Section
- University of Malaga
- Malaga (Spain)
Email monte_at_lcc.uma.es Web www.lcc.uma.es/mont
e
2AAI?
- Authentication Authorization Infrastructure
- Several possibilities
- We focused on PKI PMI
- Development Background
- PKI
- CerteM - Online PKI and more
- X509 ITU-T
- PMI
- Extending CerteM Online PMI
- X509 ITU-T
3Online AAI? CRL problem
T0
T10
Time
CRL Problem in PKI and exacerbate in PMI,
therefore an AAI issue to take into
account Online AAI as possible solution
4What is CerteM?
- PKI online
- Designed Implemented in 98.
- Try to solve CRLs problems
- OCSP service did not develop yet.
- Email based on
- X509 usually linked to X500 name
- X509 proposal lets links to Email address (Rfc
822) - Use an architecture of CAs that satisfy the needs
of near-certification
5CerteM Hierarchical Email Nodes
6CerteM Certificate Request Information Flow
7CerteM KSU Elements
8CerteM Protocol
- Connection Phase
- C HELLO ltclientIDgt
- S OK the client has permission
- S -ERR1 the client host is not allowed
- S -ERR2 the client ltclientIDgt is not allowed
- Transaction Phase
- C GETCERT ltuserIDgt
- S CERT ltcertgt ltvsgt
- S OK
- or
- S -NSC no such certificate
9 CerteM Protocol
- Transaction Phase
- S CERT ltcertgt ltvsgt
- Can be local or external search
- Local Database search
- External Use of Cache mechanism and
communication between KSU - Termination Phase
- C EXIT
- S Ok
10CerteM Locating KSUs
lcc.uma.es 111.111.222.222
lt1gt
lcc.uma.es correo.lcc.uma.es 111.111.222.222
lt2gt
monte_at_lcc.uma.es
lt3gt
lcc.uma.es certem-tcp.lcc.uma.es
111.111.222.222
11CerteM Conclusion
- guarantees that CAs will only certify those users
close to them - provides real-time revocation of keys (without
the need of CRLs) - close to S/MIME
- Can provide quality service to GRIDs
- slight protocol inter-KSU and user-KSU
- provided services to several projects we have
been implicated - (not only theoretic solution)
12X509 ITU-T PKI
- Developed to Spanish Banking Entity (BANESTO) in
2001 - Using only GPL libraries
- OpenSSL
- GTK
- OpenLDAP
13X509 ITU-T PMI (I)
- ITU-T proposal defines four PMI models
- General,
- Control
- Role (PERMIS Project)
- Delegation (Our proposal)
- We have extended OpenSSL library with attribute
certificates management and authorization
capabilities, because - This library is widely deployed
- There was no previous experience with the
introduction of attribute certificates in OpenSSL - We wanted to approach privilege delegation
procedures (we are still in the way) - and we had already developed a PKI using OpenSSL
14X509 ITU-T PMI (II)
15Extending CerteMz
- CerteM technology applies to Authorization
- Openssl Attribute certificates
- The main elements are the Attribute Certificate
Service Units (ACSUs), that integrate attributes
certification and management functions - managed by an Attribute Authority
- contains a database to store the attribute
certificates of local users - updating and revocation of certificates and local
operations
16AAI scenario (I)
Alice_at_a.b.c, operation SAlice
Who is the user ? What can he do ?
1 A?B Token 2 B?AAI Request 3 AAI? B AC
PKC
17AAI scenario (II)
How link identity and attribute certificates?
18Future Work
- Actually working in delegation model
- Delegation statements establish a Directed graphs
- D. G. offer a global vision of delegation system
- Theoretical model apply to PMI, and it work!!!
19Thank you
Any Question?
José A. Montenegro GISUM Group Security
Information Section University of Malaga Malaga
(Spain) Email monte_at_lcc.uma.es Web
www.lcc.uma.es/monte
20AAI Relation to TACAR
TACAR (ca_at_tacar.org)
t
c
KSU
KSU
ACSU
ACSU
b.c
s.t
KSU
KSU
ACSU
ACSU
a.b.c
r.s.t
KSU
ACSU
KSU
ACSU
21 AAI Relation to TACAR
- Remember CA belongs to upper level.
- Domain c and t is stored in TACAR
- TACAR is common root to a.b.c and r.s.t tree
- How to localize TACAR?
- Same way as whichever KSU/ACSU node.
- Add ca.c_at_tacar.org and ca.t_at_tacar.org
certificates to TACAR