140 likes | 233 Views
Providing secure mobile access to information servers with temporary certificates. Diego R. López drlopez@cica.es. Introduction Objectives of the system Secure access standards and mobility requirements Temporary (short-lived) certificates Characteristics Loading and issuing
E N D
Providing secure mobile access to information servers with temporary certificates Diego R. López drlopez@cica.es
Introduction Objectives of the system Secure access standards and mobility requirements Temporary (short-lived) certificates Characteristics Loading and issuing System implementation Components Authentication protocol The user’s view Conclusions
User mobility and secure access • User mobility (not just computer mobility) • Minimal HW/SW requirements • Simplicity of use • Secure access to servers • User authentication • Short-lived “connections”
Secure access standards • Based on SSL/TLS • Server and client exchange X.509 certificates • X.509 certificates are assumed to be • Static • Associated with an entity’s identity • Valid in the long term • Identity is not often subject to change • Permanently stored by browsers and other information clients
Mobility requirements • A token is used • Removable • Protected by a secret known to the user • Current standard: PKCS#11 • Used by most common clients • Requires specific software and/or hardware
Temporary (short-lived) certificates • Are issued for a short period • Typical validity is a few hours • Time “removes” them • Simplify key generation procedures • Weaker algorithms or shorter key lengths can be employed • Simplify key management procedures • CA key changes only affect servers, not clients
Loading temporary certificates • A loading program authenticates the user • The token contains both • The loading program • The authentication data • Minimal hardware and software requirements • An (almost) universal token: a diskette • An (almost) universal language: Java
Issuing temporary certificates • An on-line Certification Authority (CA) has to issue the certificate • Validate the authentication data • Analyze user request • Server(s) to be accessed • Validity period • Issue the certificate
System components (client side) • An Information Reader (IR): • Any information client able to use X.509 certificates • In the current implementation, Netscape 4.xx • A Temporary Certificate Client (TCC): • Negotiates with the service the session parameters • Starts the IR and initiates key generation procedures • The client JAR file is about 700K
System components (authentication data) • A PKCS#12 object encrypted with a passphrase • Contains one of the keys (the private key) from a keypair assigned to the user • Included with other configuration data in a text file stored in the token: TCSERVER erika.cica.es:4433:4434 TCS1-CICA URL https://tbidata.cica.es TBI-IDBS TIME 30 USER C=es, O=cica, CN=p4 -----BEGIN CICAP12----- MIIC3AIBAzCABgkqhkiG9w0BBwGggCSABIICvjCCArowggK2Bgsqhki AqCCAqUwggKhMBsGCiqGSIb3DQEMAQYwDQQIrGHBS1QCRGkCAQEEggK XqyG5goN4YYGtiv8/NoLxnRhZG6Jdleybh90uMUmhyaivCxnLFoIKlf XTMohqpPdnl6CS5eF1u8V2dSv9+zAd3jh2E2He1hyWQBeSV7UpHWefb ...
System components (server side) • A Temporary Certificate Sever (TCS) • Acts as a (set of) on-line CA(s) • A directory that holds data pertaining to users • The other key (the publickey) from the keypair assigned to the user • Acceptable session parameters • CAs the user can request certificates from
E-mail News Databases WWW 8.- Acces to information servers Others TCC token 2.-Connect to TCS 5.- Kc2,CA ? 3.- Rs 6.- Kc2, CA 4. Ekc1(Rs,Rc),Kt2 7.-Skca (Kt2) IR TCS Directory Authentication protocol 1.- Passphrase
Conclusions • Thin-client based approach to information servers access control • Eases user mobility: • Practically any host with Internet access can be employed • Simplifies access control management • Open issues • Generalization of the procedures for other IRs • Finer granularity in access control • Token-less authentication protocol (applet)