KMIP Trust Establishment Proposal

KMIP Trust Establishment Proposal

<p> 1KMIP Trust Establishment Proposal</p><p>2Subject: Proposal for using public key infrastructure (PKI) techniques for establishing trust between a 3KMIP client and a KMIP server. 4Date: 6 October 2010 5Contact: Judy Furlong, EMC/RSA 6Contributors: Robert Griffin, EMC/RSA, David Lawson, Emulex, Larry Hofer, Emulex, Robert Nixon, 7Emulex</p><p>8Revision History 9 17 September 2009: Initial version 10 9 July 2010: Updated Draft 11 30 September 2010: Draft for KMIP F2F 12 6 October 2010: Draft for KMIP TC</p><p>13Overview 14This proposal defines changes to KMIP v1 [1]. The proposal describes a method for how a KMIP client 15and a KMIP server exchange their respective public key certificates and establish a trust relationship with 16one another. Once established, the trust relationship enables implementation of additional layers of 17security controls on KMIP messages such as digitally signing the payload of a KMIP message. 18</p><p>19References 20[1] OASIS, Key Management Interoperability Protocol (KMIP) Specification Version 1.0 Committee 21 Specification 0.1, 15 June 2010. 22[2] ISO/IEC 9798-3:1998 Information technology -- Security techniques -- Entity authentication -- Part 3: 23 Mechanisms using digital signature techniques</p><p>1 1 241. Pre-Conditions 25The trust establishment proposal assumes the following pre-conditions: 26  The credential (either public key or public key certificate) for a Trusted Root Certification Authority 27 (CA) has been transmitted out-of-bands and embedded in the KMIP client or otherwise pre- 28 established. 29  The KMIP client has generated or requested and loaded an asymmetric key pair and associated 30 public key certificate. [Note: The KMIP client certificate is not expected to chain to the Trusted 31 Root CA embedded in the KMIP client.] 32  The KMIP server has created its own asymmetric key pair and has had its public key certified by 33 a CA that chains to the Trusted Root CA whose credential is embedded in the KMIP client. 34 35</p><p>2 2 362. New KMIP Operations 37This proposal defines two new KMIP operations, Exchange Credential and Confirm Credential, both of 38which are initiated by a KMIP client. These operations allow a KMIP client and a KMIP server to 39exchange and trust credentials such as public key certificates that will subsequently be used to 40authenticate and/or protect KMIP messages exchanged by these parties. This proposal assumes the 41exchanged credential is a public key certificate, but it’s possible other types of credentials may be added 42in subsequent revisions.</p><p>431 Exchange Credential 44This operation allows a KMIP client and KMIP server to exchange credentials such as public key 45certificates that will be used to authenticate and/or protect subsequent KMIP message exchanged by 46these parties. 47The request which is generated by the KMIP client contains information about the type of credential being 48exchanged, a nonce value generated by the KMIP client and the credential of the KMIP client. 49 Request Payload Object REQUIRED Description Object Type Yes Determines the type of credential object being exchanged. Initial version assumes X.509v3 public key certificate (or certificate chain). IV/Counter/Nonce Yes Nonce value (N1) generated by KMIP client for this message. Credential Yes The credential of the KMIP client. Initial version assumes X.509v3 certificate (or certificate chain).</p><p>50 Table 1: Exchange Credential Request Payload 51 52The response which is generated by the KMIP server contains information about the type of credential 53being exchanged, the nonce value generated by the KMIP client and included in the request message, a 54nonce value generated by the KMIP server encrypted using the public key from the KMIP client certificate 55provided in the request message, and the credential of the KMIP server. 56 Response Payload Object REQUIRED Description Object Type Yes Determines the type of credential object being exchanged. Initial version assumes X.509 public key certificate (or certificate chain). IV/Counter/Nonce Yes Nonce value (N1) from the Exchange Credential request message. Encrypted IV/Counter/Nonce No Nonce value (N2) generated by KMIP server and encrypted in public key extracted from the KMIP client </p><p>3 3 certificate in the Exchange Credential request message. This encrypted nonce value must be included if the KMIP server requires that the KMIP client submit a Confirm Credential request. Credential Yes The credential of the KMIP server. Initial version assumes X.509 certificate (or certificate chain).</p><p>57 Table 2: Exchange Credential Response Payload 58 59Upon receipt of the Exchange Credential response, the KMIP client compares the nonce (N1) sent by the 60KMIP server to the one it generated and included in the Exchange Credential request. Assuming the two 61nonces match, the KMIP client will then verify the certificate (or certificate chain) of the KMIP server using 62the Trusted Root CA credential embedded in the KMIP client in the pre-condition, out-of-bands step. If 63verification of the KMIP server certificate is successful, the KMIP client stores the KMIP server certificate 64(or certificate chain) for future use. Finally, if the encrypted nonce (N2) is present in the Exchange 65Credential response, the KMIP client then uses its private key to decrypt the encrypted nonce (N2) which 66was generated by the KMIP server.</p><p>672 Confirm Credential 68At the conclusion of a successful Exchange Credential operation, the KMIP client has authenticated the 69KMIP server by verifying its certificate (or certificate chain) and confirmed it has been communicating with 70a live KMIP server since the KMIP server returned the nonce generated by the KMIP client. However, the 71KMIP server has not confirmed that the client it has been communicating with is in fact the one which 72possesses the private key that corresponds to the KMIP client public key certificate. 73In order to prove to the KMIP server that the KMIP client is in possession of the private key, the KMIP 74client can send a Confirm Credential request message. The request message contains a new nonce 75value that has been generated by the KMIP client, a decrypted version of the encrypted nonce received 76from the KMIP server in the Exchange Credential response, and the first nonce value generated by the 77KMIP client and provide in the Exchange Credential request. 78 Request Payload Object REQUIRED Description IV/Counter/Nonce Yes New nonce value (N3) generated by KMIP client for this message. IV/Counter/Nonce Yes Decrypted copy of the encrypted nonce value (N2) generated by KMIP server from the Exchange Credential response message IV/Counter/Nonce Yes Nonce value (N1) generated by KMIP client obtained from the Exchange Credential request message.</p><p>79 Table 3: Confirm Credential Request Payload 80 81Upon receipt of the Confirm Credential request, the KMIP server looks for the presence of the new nonce 82(N3) to ensure it’s a fresh message and the initial nonce (N1) to tie it with the previous Exchange 83Credential request message. The server then compares unencrypted nonce (N2) with the value it 84generated and included in the Exchange Credential response message. If these nonces are the same, </p><p>4 4 85the KMIP server has now confirmed that the KMIP client is in possession of the corresponding private 86key. The KMIP server can store the KMIP client certificate (or certificate chain) for future use. 87Assuming all nonce checks are successful the KMIP server generates and sends a Confirm Credential 88response. The response message includes a copy of the new nonce (N3) from the Confirm Credential 89request. 90 Response Payload Object REQUIRED Description IV/Counter/Nonce Yes New nonce value (N3) generated by KMIP client and obtained from the Confirm Credential request message.</p><p>91 Table 4: Confirm Credential Payload</p><p>5 5</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us