Voting Over the DISN-CAC Analysis Feasibility Evaluation
Total Page:16
File Type:pdf, Size:1020Kb
UNCLASSIFIED Voting Over the DISN-CAC Analysis Feasibility Evaluation Submitted To: October 5, 2012 Prepared by: Dreifus Associates Ltd, Inc. VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Table of Contents Executive Summary ........................................................................................................ 6 1. Objectives ............................................................................................................... 10 2. Defense Networks Background .............................................................................. 11 Information Assurance (IA) ........................................................................................ 12 NIPRNet ..................................................................................................................... 14 NIPRNet Environment ................................................................................................ 15 Usage ..................................................................................................................... 16 Security ................................................................................................................... 17 Public Key Infrastructure (PKI) ............................................................................... 18 Internal Applications ............................................................................................... 19 3. Electronic Voting Systems Background .................................................................. 21 High-Level Conceptual Internet Based Voting System Architecture .......................... 21 Specification and Standards ...................................................................................... 23 Security ...................................................................................................................... 24 PKI in Voting Systems ............................................................................................... 26 4. Common Access Card Background ........................................................................ 28 National Strategy for Trusted Identities in Cyberspace .............................................. 30 User Vetting ............................................................................................................... 31 Architecture ................................................................................................................ 34 Usage ........................................................................................................................ 36 Applications ................................................................................................................ 37 Security ...................................................................................................................... 39 Middleware ................................................................................................................. 39 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Data Elements ........................................................................................................... 41 External .................................................................................................................. 41 Card Bar Code Information ..................................................................................... 42 Internal .................................................................................................................... 42 Privacy Considerations .............................................................................................. 43 5. Client Configurations .............................................................................................. 44 6. Feasibility Evaluation .............................................................................................. 56 7. Risks and Mitigations .............................................................................................. 75 8. Conclusions and Recommendations ...................................................................... 77 Recommended Additional Research .......................................................................... 80 Appendix A – Abbreviations and Acronyms .................................................................. 81 Appendix B – Common Access Card ........................................................................... 83 Appendix C – LPS Light Weight Portable Security ........................................................ 86 Appendix D – DoD PKI External Interoperability Landscape ......................................... 88 Appendix E – Source References ................................................................................. 89 Appendix F – Source Organizations .............................................................................. 98 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Tables Table 1: DISA Networks ................................................................................................ 11 Table 2: Sample of DoDI, DISA and NIST Guidelines for NIPRNet .............................. 14 Table 3: IPv4 Private IP Ranges ................................................................................... 15 Table 4: Specifications and Standards .......................................................................... 24 Table 5: Data Security Standards ................................................................................. 24 Table 6: CAC and Smart Card Related Specifications and Standards .......................... 29 Table 7: Assurance Levels ............................................................................................ 32 Table 8: PIV Data Objects Access Control Rules .......................................................... 35 Table 9: CAC Certificate Containers ............................................................................. 36 Table 10: Network Distinctions ...................................................................................... 59 Table 11: Network Considerations ................................................................................ 61 Table 12: Authentication Considerations ....................................................................... 66 Table 13: Voting Client Considerations ......................................................................... 69 Table 14: Electronic Voting System Considerations ...................................................... 72 Table 15: Framework Risk Summary ............................................................................ 76 Table 16: Abbreviations and Acronyms ......................................................................... 82 Table 17: CAC Data Elements ...................................................................................... 85 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Figures Figure 1: High Level Conceptual Voting System ........................................................... 22 Figure 2: CAC External Data Elements ......................................................................... 41 Figure 3: UEFI Interface Position in the BIOS Start up chain ........................................ 48 Figure 4: Deploying Secure Host Images ...................................................................... 55 Figure 5: Pre-Decisional Baseline Conceptual Voting Framework ................................ 57 Figure 6: Illustrative Network Enclave with Voting Client(s) .......................................... 67 Figure 7: Voting Location Servers ................................................................................. 70 Figure 8: CAC Data Architecture ................................................................................... 83 Figure 9: LPS Operating System Environment .............................................................. 86 Figure 10: DoD PKI External Interoperability Landscape .............................................. 88 VOTING OVER THE DISN-CAC ANALYSIS UNCLASSIFIED Executive Summary This report documents a review and evaluation of the feasibility of applying the Defense Information System Networks (DISN), specifically the Non-Classified Internet Protocol Router Network (NIPRNet), as a conduit to support Uniformed and Overseas Citizens Absentee Voting (UOCAVA) voters in the voting process, coupled with the Defense Department’s primary form of identification, the Common Access Card (CAC), as an available, standardized means of asserting reliable identification of potential voters. In addition, an understanding is developed of considerations for protecting the privacy of personal identifiable information, and providing accountability, reliability and transparency. The initial sections of the report detail the research and analysis performed on each of the key components; the NIPRNet, the CAC, Electronic Voting Systems and the remote voting client. The data elements and internal data structures of the CAC, including the underlying authoritative identity framework (that includes the vetting of CAC recipients), are evaluated for suitability and fit in asserting identity authentication for the purposes of enabling Local Election Officials (LEOs) to perform vetting and adjudication decisions regarding an individual’s eligibility to vote. Comparability to analogous applications that apply the CAC and other digital electronic-based security architectures for the delivery of high-reliability services was also evaluated. Based upon a review of each