Title: Online Public Key Infrastructure
1Online Public Key Infrastructure
- Queensland University of Technology,
- Australia
Taho University, Japan
University of Malaga, Spain
Supported by the Telecommunications Advancement
Organisation, Japan
2Motivation
- Offline PKI model not really offline
- requires relying parties to be online and trust
some entity (eg OCSP) - why not merely request the current public key.
- Offline model reduces risk to CA but increases
client vulnerability
3Overview
- Origins of PKI
- Methods of Public Key Distribution
- Offline PKI
- Requirements of Online PKI
- Online PKI Efforts
- Summary
4Origins of PKI
- 1976 Diffie and Hellman
- 1978 Kohnfelder
- 1988 ISO/CCITT X.500 Series
5Offline and Online Models
- Offline
- Certificates
- Certificate Revocation
- Possession of signature verification key
- Online
- Network access
- Trust (Server Authentication / Message
Authentication)
6Methods of Public Key Distribution
- Point-to-Point Delivery
- Trusted Public File
- Online Trusted Server
- Offline Server and Certificates
- Implicitly Guaranteed Authenticity
7Offline PKI
- Currently have offline PKI
- Supplemented by online checks
- Identified Problems
- Certificate Processing
- Certificate Revocation
8Certificate Processing
- Path Processing
- Policy Mapping
- Proposed Solutions
- Synthetic Certificates Russell et. al.
- Simple Certificate Validation Protocol IETF
- Delegated Path Validation (DPV) and Delegated
Path Discovery (DPD) - IETF
9Certificate Revocation
- Certificate may be revoked before expiration
- Certificate Revocation Lists(CRLs)
- Scalability Problem
10CRL Scalability?
- http//crl.verisign.com/
- May 2002
11Requirements of Online PKI
- Availability
- Distributed architecture
- Trust
- Authenticated server
- Integrity
- Key material is tamper proof
12Online PKI Efforts
- CerteM
- Domain Name System
- Lightweight Directory Access Protocol
- Modified OCSP
13CerteM
- Developed at University of Malaga, Spain by Lopez
et. al - Fundamental goal was to avoid the use of
inefficient CRLs - Hierarchical structure based on email addresses
and Key Service Units (KSUs)
14CerteM
15CerteM
edu.au
KSU
qut.edu.au
uq.edu.au
KSU
KSU
Bob
Alice
16CerteM
edu.au
KSU
qut.edu.au
uq.edu.au
KSU
KSU
Bob
Alice
17CerteM
edu.au
KSU
qut.edu.au
uq.edu.au
KSU
KSU
Bob
Alice
18Domain Name System
- DNS is demonstrably reliable and efficient
- High availability
- Questionable integrity
- Appealing to place application key material in
the DNS - Trust DNS to accurately map names and IPs
- A single request resolves the IP address of the
host and provides the current public key
19Domain Name System
- DNS has security problems
- Leading to DNS Security Extensions (DNSSEC)
- DNSSEC (RFC2065, then 2535)
- Adds data integrity and authentication services
- Defined the KEY Resource Record
- Debate over definition of key
20Domain Name System
- Additional extension
- CERT RR (RFC2538)
- Drafts for APPKEY RR
- Mixed opinion in DNS community about using DNS
for application key distribution
21Lightweight Directory Access Protocol
- Designed to be a lightweight X.500 directory
access protocol, over TCP/IP - Well defined interface
- Widely deployed
- Replication technology in place
22Lightweight Directory Access Protocol
- Security Status
- Early versions susceptible to masquerading and
modification attacks - SASL Simple Authentication and Security Layer
(Proposed Standard RFC 2222, 2444) - Access control to LDAP records vendor dependent
at present - V3 supports TLS
23OCSP (review)
Cert Records
CA
CRL
OCSP Responder
?
24OCSP (review)
Cert Records
CA
CRL
OCSP Responder
?
25OCSP (review)
Cert Records
CA
CRL
Time stamped status. (Good, Revoked, Unknown)
OCSP Responder
?
26Modified OCSP
Cert Records
CA
Given a name and requirement
OCSP Responder
?
27Modified OCSP
Cert Records
CA
Return the appropriate public key
Given a name and requirement
OCSP Responder
?
28Summary
- Origins of PKI
- Offline PKI
- Online PKI Efforts
- Current directory service technologies
- Considered OCSP
29Summary
- Outstanding Issues
- Ensuring availability
- Decentralised / distributed architecture
- Maintaining integrity of key material
- Cryptographic techniques
30Questions?
Jason Smith smith_at_isrc.qut.edu.au