Sok: Delegation and Revocation, the Missing Links in the Web's Chain Of

Total Page:16

File Type:pdf, Size:1020Kb

Sok: Delegation and Revocation, the Missing Links in the Web's Chain Of SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust Laurent Chuat∗, AbdelRahman Abdou†, Ralf Sasse∗, Christoph Sprenger∗, David Basin∗, Adrian Perrig∗ ∗Department of Computer Science, ETH Zurich †School of Computer Science, Carleton University Abstract—The ability to quickly revoke a compro- status is typically valid for four days, implying a rogue mised key is critical to the security of any public- certificate or a compromised private key remains us- key infrastructure. Regrettably, most traditional able by the adversary for four days in the worst case; certificate revocation schemes suffer from latency, the consequences can thus be severe. availability, or privacy problems. These problems Short-lived certificates [42], [55] provide compara- are exacerbated by the lack of a native delegation ble benefits to OCSP stapling. Again, four days is the mechanism in TLS, which increasingly leads domain suggested validity period. Questions remain, however, owners to engage in dangerous practices such as about the feasibility of reducing this period to sev- sharing their private keys with third parties. eral minutes to limit adversarial capabilities in case We analyze solutions that address the long- of private key compromise. In general, the tradeoff standing delegation and revocation shortcomings between promptly disseminating revocation informa- of the web PKI, with a focus on approaches that tion to browsers (requiring an extra round-trip and directly affect the chain of trust (i.e., the X.509 burdening CAs) and increasing the system’s efficiency certification path). For this purpose, we propose a (but sacrificing security) is now well established. Un- 19-criteria framework for characterizing revocation fortunately, browser vendors often favor efficiency over and delegation schemes. We also show that com- security when it comes to certificate revocation [30]. bining short-lived delegated credentials or proxy Besides revocation, new requirements with asso- certificates with an appropriate revocation system ciated problems have emerged for the web PKI. In would solve several pressing problems. particular, content delivery networks (CDNs) are now widely used and beg for a secure delegation sys- Index Terms—public-key infrastructure (PKI), dig- tem [29]. In practice, rather than explicitly delegating ital certificate, delegation, revocation, proxy certifi- specific rights to CDNs, domain owners often resort to cate, content-delivery network (CDN) some form of key sharing [9]. The delegation problem is, in fact, intimately related to that of revocation. If we could rely on an efficient and secure revoca- 1. Introduction tion system, the negative consequences of key sharing would be minimized as compromised keys could be Certificate revocation has always been a challenge invalidated as soon as misbehavior is observed. in the HTTPS public-key infrastructure (or web PKI, This evolution of the HTTPS landscape has put for short). Certificate revocation lists (CRLs) [12], [59] domain owners into an uncomfortable position: to sat- grow linearly in the number of revocations, making isfy their delegation and revocation needs, they must their communication to browsers inefficient. CRLs and either adopt insecure approaches or heavily depend on arXiv:1906.10775v2 [cs.CR] 20 Apr 2020 OCSP [35] require an extra round-trip communication CA support. We therefore ask the following fundamen- initiated by the browser to verify a certificate’s valid- tal question: Why are domain owners required to visit ity. This increases page-load delay and reveals users’ a CA for every issuance, renewal, revocation, and key browsing habits. The extra round trip may also block update they perform to any of their subdomains? the connection when the browser fails to receive a re- In our view, domain owners should be offered a sponse [47]. Failing open (i.e., proceeding with the con- flexible and secure solution that leaves them in full nection anyway) is effectively equivalent to not check- control of their domain and its subdomains. We thus ing if a certificate is revoked, jeopardizing security. formulate the following two requirements for any Given the above problems, some browser vendors possible solution. Domain owners should be able to have decided to disable online revocation checks (i.e., autonomously CRL and OCSP) and instead rely upon small sets of emergency revocations pushed to clients through soft- (R1) decide on the validity period or revocation status ware updates [25], [34]. OCSP stapling [39] addresses of their own certificates; and the extra-round-trip problem but, like CRLs, places an (R2) delegate all or a subset of their privileges to third additional burden and reliance on certification author- parties, without sharing a private key with them. ities (CAs) as they must be frequently contacted over Our systematization of knowledge has resulted a certificate’s lifespan. Moreover, a stapled certificate from our endeavor to identify solutions satisfying the above two requirements. We start by providing back- other schemes to satisfy the requirements and offer ground on delegation to CDNs (Section 2) to show additional properties. Finally, in Section 9, we discuss how the web and its trust model have evolved in related topics, and we draw conclusions in Section 10. recent years. We then review a wide spectrum of The main contributions of our work are to sys- approaches to revocation and delegation with differ- tematize existing work and suggest new solutions and ent features and trade-offs (Section 3). We divide directions in this important problem domain: revocation schemes into four categories, depending on • After segmenting revocation schemes into 4 cate- which actor provides the revocation information, and gories, we provide a detailed analysis of 19 dele- we distinguish delegation schemes with and without gation and revocation schemes with respect to 19 key sharing. We also highlight several problems of evaluation criteria. these approaches, showing why they fail to fully sat- • As those schemes offer a wide set of comple- isfy the requirements. Next, we examine different ap- mentary features, we examine how they can be proaches that extend the traditional chain of trust and combined so that both the requirements are met. promise to bring more security and flexibility to the • We show how proxy certificates can be adapted to HTTPS ecosystem (Section 4). These include name today’s web, and present three use cases for such constraints, short-lived certificates, proxy certificates, certificates. and delegated credentials. We focus on the latter two, • Finally, we point out that session resumption may proxy certificates and delegated credentials, as the undermine the security advantages provided by most promising candidates for satisfying the require- short-lived credentials, and we discuss potential ments and discuss them in more detail in Sections 5 workarounds. and 6. We refer readers who are not familiar with the The concept of proxy certificates was introduced HTTPS ecosystem to Durumeric et al. [15] or Clark more than a decade ago in the context of grid com- and van Oorschot [10] for background information. puting [56]. Proxy certificates allow entities holding non-CA certificates to delegate some or all of their privileges to other entities. We thoroughly investigate 2. Delegation to CDNs the challenges and advantages of such delegation in the context of the current web PKI. Allowing such dele- Content delivery networks (CDNs) pose new chal- gation would provide several security and efficiency lenges for the web PKI, as they fundamentally alter advantages. These include a domain owner’s ability the trust model upon which HTTPS relies [29]. Every to update and use multiple distinct keys (e.g., for CDN is composed of a myriad of servers that dis- multiple subdomains, or for different transactions per tribute content to users based on their location. The subdomain) much more easily and rapidly than with objective is usually to increase performance and avail- current practices. Domain owners can also issue short- ability, but CDN vendors may also provide security- lived proxy certificates for added security. Perhaps related services. The caching servers controlled by the more importantly, the owner’s main private key, corre- CDN, commonly referred to as edge servers, act as sponding to the public key in the CA-issued certificate, intermediaries between clients and the origin server need not be involved in online cryptographic opera- (controlled by the domain owner). At the moment, tions, and could thus be safely stored on a discon- this communication model is incompatible with TLS, nected (air-gapped) device. Additionally, proxy certifi- which was specifically designed to prevent man-in-the- cates need not be logged by Certificate Transparency middle (MitM) attacks, and may force domain owners servers, solving the problem of log servers disclosing to share their private key with the CDN operator who private subdomains [17], [48]. then acts as a MitM. More recently, another promising approach called Multiple options exist for redirecting HTTP re- delegated credentials was developed at the IETF quests to CDN servers. The most common techniques and described in an Internet Draft [3] as a first are the following: step towards standardization. On 1 November 2019, • Authoritative: The CDN’s name servers are de- Mozilla [22], Cloudflare [50], and Facebook [21] an- fined as authoritative for the domain in ques- nounced plans to support delegated credentials. We tion. This lets the CDN take full control over describe and study this new proposal in comparison the resolution of the entire domain. When try- to similar approaches, proxy certificates in particular. ing to contact example.com, the browser should In Section 7, we analyze the consequences of using obtain the IP address of one of the CDN’s edge short-lived certificates and investigate how TLS should servers. As the redirection happens through DNS, handle these certificates. the browser will attempt to establish a connec- In Section 8, we thoroughly analyze the different tion based on a valid certificate for example.com; approaches to revocation and delegation.
Recommended publications
  • No.Ntnu:Inspera:2546742.Pdf (10.61Mb)
    Krishna Shingala An alternative to the Public Key Krishna Shingala Infrastructure for the Internet of Things Master’s thesis in Communication Technology Supervisor: Danilo Gligoroski, Katina Kralevska, Torstein Heggebø Master’s thesis Master’s June 2019 An alternative to PKI for IoT PKI for to An alternative NTNU Engineering Communication Technology Communication Department of Information Security and Department of Information Faculty of Information Technology and Electrical Technology of Information Faculty Norwegian University of Science and Technology of Science University Norwegian An alternative to the Public Key Infras- tructure for the Internet of Things Krishna Shingala Submission date: June 2019 Responsible professor: Danilo Gligoroski, IIK, NTNU Supervisor: Danilo Gligoroski, IIK, NTNU Co-Supervisor: Katina Kralevska, IIK, NTNU Co-Supervisor: Torstein Heggebø, Nordic Semiconductor ASA Norwegian University of Science and Technology Department of Information Technology and Electrical Engineering Title: An alternative to the Public Key Infrastructure for the Internet of Things Student: Krishna Shingala Problem description: Internet of Things(IoT) enables participation of constrained devices on the Internet. Limited resources, bandwidth, and power on the devices have led to new protocols. Some examples of IoT driven and driving protocols are: – MQTT, CoAP that are application protocols for IoT; – 6LoWPAN enables efficient support of IPv6 on low power lossy networks; – CBOR enables concise data formatting; and – DTLS enables secure channel establishment over unreliable transport like the UDP. Security is one of the key factors for the success of IoT. TLS/DTLS secures the channel between the servers and the devices. Confidentiality is an important aspect of such a secure channel. Establishing the identity of an entity another.
    [Show full text]
  • Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh
    Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2021 © 2021 John Seunghyun Koh All Rights Reserved Abstract Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh Modern users carry mobile devices with them at nearly all times, and this likely has contribut- ed to the rapid growth of private user data—such as emails, photos, and more—stored online in the cloud. Unfortunately, the security of many cloud services for user data is lacking, and the vast amount of user data stored in the cloud is an attractive target for adversaries. Even a single compro- mise of a user’s account yields all its data to attackers. A breach of an unencrypted email account gives the attacker full access to years, even decades, of emails. Ideally, users would encrypt their data to prevent this. However, encrypting data at rest has long been considered too difficult for users, even technical ones, mainly due to the confusing nature of managing cryptographic keys. My thesis is that strong security can be made easy to use through client-side encryption using self-generated per-device cryptographic keys, such that user data in cloud services is well pro- tected, encryption is transparent and largely unnoticeable to users even on multiple devices, and encryption can be used with existing services without any server-side modifications. This dis- sertation introduces a new paradigm for usable cryptographic key management, Per-Device Keys (PDK), and explores how self-generated keys unique to every device can enable new client-side encryption schemes that are compatible with existing online services yet are transparent to users.
    [Show full text]
  • Best Practices for Privileged Access Management on Cloud-Native Infrastructure
    Best Practices for Privileged Access Management on Cloud-Native Infrastructure BY GRAVITATIONAL CONTENTS INTRODUCTION ......................................................................................................................................................................... 4 BACKGROUND OF ACCESS MANAGEMENT COMPONENTS ...................................................................................... 5 SSH ............................................................................................................................................................................................. 5 SSH Public Key Authentication ............................................................................................................................................ 5 OpenSSH Certificates ............................................................................................................................................................. 7 OpenSSH Certificate Authentication .................................................................................................................................. 7 LDAP .......................................................................................................................................................................................... 8 Identity Provider ...................................................................................................................................................................... 9 AUTHENTICATION AND AUTHORIZATION ...................................................................................................................
    [Show full text]
  • Challenges in Managing SSH Keys – and a Call for Solutions
    Challenges in Managing SSH Keys – and a Call for Solutions Tatu Ylonen University of Helsinki [email protected] Abstract In some cases a single key can access tens of thousands of servers, such as for keys originally installed for emergency SSH (Secure Shell) uses public keys for authenticating servers response, auditing, or patch management purposes. Some of and users. While SSH’s key management design was great these keys are very old. for grass-roots deployments, it is now causing significant Second, extensive monitoring of the usage of the keys has operational and security challenges in large computing envi- revealed that typically about 90% of the authorized keys are ronments. This paper summarizes progress in SSH key man- unused. That is, they are access credentials that were provi- agement so far, highlights outstanding problems, and presents sioned years ago, the need for which ceased to exist or the requirements for a long-term solution. Proposals are solicited person having the private key left, and the authorized key from the research community to address the issue; so far the was never deprovisioned. Thus, the access was not terminated industry has been unable to come up with an ideal solution. when the need for it ceased to exist. This signifies a failure of The problem is of high practical importance, as most of our identify and access management (IAM) practices. critical Internet infrastructure, cloud services, and open source software development is protected using these keys. In many organizations – even very security-conscious or- ganizations – there are many times more obsolete authorized keys than they have employees.
    [Show full text]
  • Maintaining Security and Trust in Large Scale Public Key Infrastructures
    Maintaining Security and Trust in Large Scale Public Key Infrastructures Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des Grades Doktor-Ingenieur (Dr.-Ing.) von Dipl. Wirtsch.-Inform. Johannes Braun geboren in Herrenberg. Referenten: Prof. Dr. Johannes Buchmann Prof. Dr. Max M¨uhlh¨auser Tag der Einreichung: 16.03.2015 Tag der m¨undlichen Pr¨ufung: 30.04.2015 Hochschulkennziffer: D 17 Darmstadt 2015 List of Publications [B1] Johannes Braun. Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication. IEEE Conference on Com- munications and Network Security (CNS 2014) - Poster Session, pages 510{ 511, IEEE Computer Society, 2014. Cited on pages 52 and 173. [B2] Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, and Max M¨uhlh¨auser.CA trust management for the Web PKI. Journal of Computer Security, 22: 913{959, IOS Press, 2014. Cited on pages 9, 66, 89, and 104. [B3] Johannes Braun, Johannes Buchmann, Ciaran Mullan, and Alex Wiesmaier. Long term confidentiality: a survey. Designs, Codes and Cryptography, 71(3): 459{478, Springer, 2014. Cited on page 161. [B4] Johannes Braun and Gregor Rynkowski. The potential of an individ- ualized set of trusted CAs: Defending against CA failures in the Web PKI. International Conference on Social Computing (SocialCom) - PAS- SAT 2013, pages 600{605, IEEE Computer Society, 2013. Extended version: http://eprint.iacr.org/2013/275. Cited on pages 9, 32, and 57. [B5] Johannes Braun, Florian Volk, Johannes Buchmann, and Max M¨uhlh¨auser. Trust views for the Web PKI. Public Key Infrastructures, Services and Appli- cations - EuroPKI 2013, vol.
    [Show full text]
  • Perspectives: Improving SSH-Style Host Authentication with Multi-Path Probing
    Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract Furthermore, a study by Reis et al. used client-side mea- surements to confirm that real-time snooping and modifi- The popularity of “Trust-on-first-use” (Tofu) authentica- cation of web traffic is a reality in today’s networks [20]. tion, used by SSH and HTTPS with self-signed certificates, In this paper, we examine a novel approach to authen- demonstrates significant demand for host authentication ticating a server’s public key. Traditional approaches to that is low-cost and simple to deploy. While Tofu-based server key authentication, such as a public-key infrastruc- applications are a clear improvement over completely inse- ture (PKI) [7, 5], rely on trusted entities (e.g., Verisign) cure protocols, they can leave users vulnerable to even that grant certificates based on the validation of real-world simple network attacks. Our system, PERSPECTIVES, identities. When done securely, such verification requires thwarts many of these attacks by using a collection of “no- significant (often manual) effort. While some network tary” hosts that observes a server’s public key via multiple hosts, primarily commercial websites, can afford to pay network vantage points (detecting localized attacks) and the high verification cost for these certificates, clients have keeps a record of the server’s key over time (recognizing no simple and effective means to authenticate connectivity short-lived attacks). Clients can download these records to most other hosts on the Internet. on-demand and compare them against an unauthenticated Because the high cost of creating and managing a host key, detecting many common attacks.
    [Show full text]
  • Automated Verification for Secure Messaging Protocols and Their
    Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet To cite this version: Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet. Automated Verification for Secure Mes- saging Protocols and Their Implementations: A Symbolic and Computational Approach. 2nd IEEE European Symposium on Security and Privacy , Apr 2017, Paris, France. pp.435 - 450, 10.1109/Eu- roSP.2017.38. hal-01575923 HAL Id: hal-01575923 https://hal.inria.fr/hal-01575923 Submitted on 21 Aug 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach Nadim Kobeissi Karthikeyan Bhargavan Bruno Blanchet INRIA Paris INRIA Paris INRIA Paris Abstract—Many popular web applications incorporate end-to- for application-specific messaging patterns and deployment end secure messaging protocols, which seek to ensure that constraints. Such custom protocols deserve close scrutiny, messages sent between users are kept confidential and authen- but their formal security analysis faces several challenges. ticated, even if the web application’s servers are broken into First, web applications often evolve incrementally in an or otherwise compelled into releasing all their data.
    [Show full text]
  • Public Key Pinning for TLS Using a Trust on First Use Model
    Public Key Pinning for TLS Using a Trust on First Use Model Gabor X Toth* Tjebbe Vlieg* *University of Amsterdam February 2013 Abstract Although the Public Key Infrastructure (PKI) using X.509 is meant to prevent the occurrence of man-in-the-middle attacks on TLS, there are still situations in which such attacks are possible due to the large number of Certification Authorities (CA) that has to be trusted. Recent incidents involving CA compromises, which lead to issuance of rogue certificates indicate the weakness of the PKI model. Recently various public key pinning protocols – such as DANE or TACK – have been proposed to thwart man-in-the-middle attacks on TLS connections. It will take a longer time, however, until any of these protocols reach wide deployment. We present an approach intended as an interim solution to bridge this gap and provide protection for connections to servers not yet using a pinning protocol. The presented method is based on public key pinning with a trust on first use model, and can be combined with existing notary approaches as well. Keywords: TLS, PKI, X.509, public key pinning, trust on first use 1 Introduction There are widely known problems with the Public Key Infrastructure using X.509 (PKIX) and its use in TLS certificate validation. Currently, users have to trust a large number of certificate authorities (CA), which are less and less trustworthy due to security breaches in their systems, leading to the issuance of rogue certificates [1,2]. Even if a CA is not compromised, it can still issue intermediate CA certificates to the wrong entities [3], or it can be forced to issue rogue certificates by a government trying to spy on its citizens.
    [Show full text]
  • Secure Transport Protocols
    Secure Transport Protocols Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria (DEI) Politecnico di Milano alessandro.barenghi - at - polimi.it G. Pelosi, A. Barenghi (DEI) Secure Transport Protocols 1 / 32 Practical cryptography Common Use scenarios After analyzing all the required cryptographic primitives (symmetric and asymmetric ciphers, hashes), we can tackle: 1 The TLS secure transport protocol (HTTPS and Secure Mail Transport) 2 The Secure SHell (SSH) protocol (secure interactive terminal access) 3 The Tor Onion Routing protocol (Transport anonymity) In all cases the bulk of the data is encrypted with an ephemeral key with a block cipher The ephemeral key is agreed via an asymmetric key cipher All protocols employ public key authentication mechanisms to provide authenticated connections G. Pelosi, A. Barenghi (DEI) Secure Transport Protocols 2 / 32 TLS - A brief history The SSL times The Secure Socket Layer (SSL) protocol was designed in 1995 by Tal ElGamal to provide transport security for HTTP over TCP. The first public version was SSL 2.0 TLS - Birth and evolution In 1999 the IETF standardized the first version of TLS, starting from SSL v3.0, and fixing some security issues which were persisting since SSL v2.0 (SSL and TLS are not interoperable) TLS was updated three times since then (v1.1, v1.2, v1.3) The most widespread version is v1.2, v1.3 was standardized less than 2 years ago, v1.1 e v1.0 are expected to be deprecated by 2020 TLS fino alla versione 1.2 consente il downgrade trasparente della connessione
    [Show full text]
  • Paper, We Provide a Broad Perspective of the for Enhancing the Certificate Infrastructure Used in Practice
    2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements Jeremy Clark and Paul C. van Oorschot School of Computer Science Carleton University, Canada {clark,paulv}@scs.carleton.ca Abstract—Internet users today depend daily on HTTPS for issues in the CA/Browser (CA/B) trust model leading to secure communication with sites they intend to visit. Over fragility (compromise of a single CA can, at least tem- the years, many attacks on HTTPS and the certificate trust porarily, undermine system-wide security) and lack of trust model it uses have been hypothesized, executed, and/or evolved. Meanwhile the number of browser-trusted (and thus, de facto, agility, poor support for certificate revocation, a reduction user-trusted) certificate authorities has proliferated, while the in CA diligence in certificate issuance, and user interface due diligence in baseline certificate issuance has declined. We challenges related to reliably signalling to end-users, in survey and categorize prominent security issues with HTTPS ways not ignored or spoofed, security indicators and site and provide a systematic treatment of the history and on-going authentication information. challenges, intending to provide context for future directions. We also provide a comparative evaluation of current proposals In this paper, we provide a broad perspective of the for enhancing the certificate infrastructure used in practice. SSL/TLS (henceforth TLS) mechanism, as employed with Keywords-SSL; certificates; browser trust model; usability. web browsers for securing HTTP traffic. We consider HTTPS, the underlying CA infrastructure, CA/B trust I. INTRODUCTORY REMARKS model, and proposed enhancements.
    [Show full text]
  • CSCI-UA.9480 Introduction to Computer Security
    CSCI-UA.9480 Introduction to Computer Security Session 1.5 Usable Security and Secure Messaging Prof. Nadim Kobeissi Usable Security: Then and Now 1.5a CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 2 “Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations.” – Kaufmann, Perlman and Speciner. CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 3 The last word on your identity: you. But this isn’t the case in computer security. ● Two-factor authentication? Attacker can manipulate a trusted party while you’re away. ● Trusted internal network? Attacker breaks into mail room employee’s email and sends a bugged PDF to the CEO. CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 4 We know humans are fallible. So we need security to be easy. ● If humans had only 1KB of resilient storage, we’d be fine! ● If secure systems aren’t easy, they either fail open, or they lead to forced compromises on behalf of the user. CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 5 Email encryption: PGP. ● “Pretty Good Privacy” (1990s.) ● Created for email encryption: ○ Asynchronous (no online handshake necessary.) ○ Non-repudiable (binding signatures.) CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 6 Did you know? PGP’s author, Phil Zimmermann, was criminally investigated in 1991 because PGP allegedly violated the Arms Export Control Act and was supposed to be classified as a munition. CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 7 Remember: Diffie-Hellman. a b ga gb ga mod p gb mod p Public values: g, p Private keys: a, b Public keys: ga, gb Shared secret: gab mod p CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi 8 PGP works in a similar way (but with RSA.) Ask Bsk A B pk Apk pk Bpk c = RSAENC(Bpk, m) s = RSASIG(Ask, c) (true|false) = RSAVER(Apk, c) m = RSADEC(Bsk, c) RSA can be used for both public key encryption and for public key signatures.
    [Show full text]
  • SSL Virtual Clean Room Security Architecture 1 Problem Statement 2 Technology Overview
    WHITEPAPER SSL Virtual Clean Room Security Architecture 1 Problem Statement A local area network (LAN) is currently isolated from the public internet. Any access into this LAN is physical i.e. a user is to be physically located in the LAN site. It would be more convenient to be able to securely access various services on the LAN through trusted clients on the public internet. This document presents technologies that can be used to achieve this goal and outlines an end-to-end solution towards it. 2 Technology Overview 2.1 VPN A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network [1]. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. From a user perspective, the resources available within the private network can be accessed remotely [1]. Traditional VPNs are characterized by a point-to-point topology, and they do not tend to support or connect broadcast domains. Designers have developed VPN variants, such as Virtual Private LAN Service (VPLS), and layer-2 tunneling protocols, to overcome this limitation. Best Practices 1. Plan out a comprehensive network security policy. Factor in the following questions: a. What are the classes of users? b. What level of access is allowed to a class? c. Which devices are allowed to connect to the corporate network through a VPN? d.
    [Show full text]