Some New Technologies for the Smart Nation Platform

Size: px
Start display at page:

Download "Some New Technologies for the Smart Nation Platform"

Transcription

1 Some New Technologies for the Smart Nation Platform L AW R E N C E E. HUGHES CO- F O U N D E R A N D C TO S I X S CAPE C OMMUNICATIONS, P TE. LTD. CO- C H A IR, S I N G A PORE I P V 6 F O R U M L HUGHES@SIXSC APE.COM

2 Sixscape Management Team

3 Mondato Mobile Financial Services Startup of the Year for Asia 2014 The other finalists were strong, but Sixscape is a MOON SHOT. If they execute it is going to change the Internet.

4 Problem Statement

5 The IPv4 Internet is Broken By the mid-1990 s we realized that public IPv4 addresses would run out by 2000 or so, at the then current allocation rate There was no successor protocol that could be rolled out in time. As a temporary measure, the IETF splintered the monolithic IPv4 Internet into millions of private internets hiding behind the few precious public addresses, using NAT. That gave us another years, but those years were over in 2010! The successor protocol (IPv6) is now mature and being deployed globally.

6 DNS Security is Broken DNS Is Inadequate for the Mobile Internet DNS without DNSSEC is very easy for hackers to break it is possible to modify the addresses stored in a local caching DNS server, so when you use it to resolve the name of your banking website, you could get an address in some hacker s basement ( Kaminsky attack ) DNSSEC deployment is not going well there were too many deployed DNS servers when it was introduced (20 million worldwide) and it requires a high level of PKI and crypto expertise to deploy it Most DNS clients don t know how to handle DNSSEC information, so are not able to detect an attack There is no per-user authentication for DNS dynamic registrations DNS registrations can take hours to propagate not adequate for mobile IPv6 nodes than might change address frequently

7 Username/Password Authentication is Hopelessly Broken There is an epidemic of compromised username/password credentials on websites today. One Russian group has harvested 1.2 billion unique credentials. 360 million credentials are for sale. Compromise happens when a hacker gets access to a web server and grabs a copy of the username/password database. The damage can be minimized by use of RFC 2898, PBKDF2. The better solution is to move to Strong Client Authentication with X.509 client digital certificates. Each user is issued a client certificate that binds their public key to their name, address and organization When you connect with SSL/TLS, instead of entering your username and password, you upload your client certificate. A cryptographic challenge verifies you have the corresponding private key (without revealing it). The website can obtain your identity from the uploaded cert. With SCA, you can completely lock down the username/password database on the web server.

8 Our Solutions

9 What are the main differences between the legacy IPv4 and new IPv6 Internets? Real address scopes (interface, link, site, global) Working, scalable multicast More robust ICMP, now including IP address resolution Autonomous address generation by nodes But the two biggies are: Ample global addresses NO NAT!!!

10 So what cool new things can we do on our shiny new NAT-less IPv6 Internet? For the first time since the mid-1990 s any node can, in theory, connect directly to any other node in the world. We can leap past Client/Server architecture (made necessary by NAT) to Direct End2End connections! BUT we need better address resolution to make this possible. DNS is not really up to the challenge. DNS has no per-user authentication, so anyone can change registered addresses DNS takes a long time for new registrations to propagate (not good for mobile devices that may change addresses multiple times in a single day) DNS is woefully insecure, and it is very difficult to roll out DNSSEC on such a large, existing critical infrastructure (20M servers worldwide). DNS registers the address of nodes, not of people (or more precisely, the last place some person registered their address)

11 Benefits of Direct End2End Connections No need for intermediary servers - No bottlenecks, reliability or security issues at intermediary nodes Traffic is decentralized only goes over shortest path between the two communicating nodes More reliable so long as there is network connectivity between the two nodes, communication can happen Higher performance if the two nodes are in same site, bandwidth is not limited by ISP connection (could be Gigabit) Security is better harder to monitor or block traffic than in the current Client/Server model Overall system capacity much higher

12 How Connections Work over IPv4

13 End2End Direct Connections over IPv6

14 IRP the Next Generation Address Registry IRP allows any app to securely register the current IPv6 address of the logged-in user at any time It includes a user directory to provide per-user authentication, and links the registered address to a person, not a node Connections to the IRP server can be IPv4 or IPv6, and are over explicit TLS v1.2 (only one port required, 4604) Authentication to IRP server uses X.509 Strong Client Authentication (with optional fallback to Username/Password) IRP includes full PKI certificate management request, download, revoke, renew certs, plus obtain other users certs, check cert validity and revocation status, get CA certs, etc. This allows hiding PKI complexity in the apps making it mostly invisible to the users. It also allows the PKI to be distributed one server per Internet domain, like DNS.

15 IRP PKI Functionality via Secure Protocol

16 IRP Security Issues Connections over IRP are secured with TLS 1.2, usually with X.509 certificate based Strong Client Authentication. These certs can be obtained from the Domain Identity Registry (DIR) servers. Once obtained, these client certs can also be used for website Strong Client Authentication, S/MIME, network access, etc. IRP provides the necessary PKI for validity and revocation checking. Unlike DNS, the security aspects or IRP were designed in from the start no complex transition for a massive infrastructure in place. All IRP clients know how to process the security mechanisms.

17 IRP Distributed Deployment There is one Domain Identity Registry server for each Internet domain (just like DNS). The collection of all DIR servers constitutes a Global Identity Registry. The nodename and port of the preferred DIR server(s) for a given domain are published in DNS via SRV records no need to configure the IP address of DIR servers. Any node can easily find the DIR server that issued a certificate in order to check validity and revocation status. Like DNS, this allows the service to scale to the global level potentially billions of addresses and client certificates. Traditional PKI can handle the current volume of server certs, but the volume of client certs is orders of magnitude greater. Client cert PKI must be distributed. No one server could possibly handle the load.

18 DIR Domain Identity Registry

19 IRP Deployment A DIR server is built from several components: PKI Database (currently implemented with PostgreSQL) PKI_Tool GUI app for viewing and managing objects in the PKI Database, including creating certificate hierarchies (root and intermediate certs), signing Certificate Signing Requests submitted from clients. IRP_Server Windows Service that implements the IRP protocol against the local PKI Database OCSP_Server Alternate access to revocation information in PKI Database for Legacy applications (e.g. IIS, Apache web servers) CRL Generator Alternate way of providing revocation information to even older legacy applications that can only work with Certificate Revocation Lists Hardware Security Module (HSM) for holding and secure use of CA private keys (we support Thales and AEP Keyper HSMs).

20 IRP Submitted to IANA, Issued Port 4604 We submitted the basic specification of IRP to IANA. It was reviewed by Lars Eggert (chair of IRTF). It was determined to be viable and novel (did not duplicate any existing IETF protocols), so it was issued port 4604 (much like SMTP was issued port 25 years ago). We have created a working Domain Identity Registry server and client. Plus a first End2End client: SixChat kind of a decentralized Whatsapp with true End2End automated security using IPv6 global addresses. Sixscape Communications is now productizing these and will be creating additional products that leverage IRP: Microsoft Outlook add-in to simplify S/MIME Microsoft Office add-in for signing, encrypting and securely exchanging documents

21 SixChat Protocol Submitted to IANA, Issued Port 4605 Our SixChat protocol allows true End2End Direct secure communications over IPv6 no intermediary nodes required for normal use. It includes a new Peer to Peer handshake equivalent to the one in SSL/TLS. We couldn t use TLS because it is hopelessly tied to Client/Server architecture SixChat is real Peer2Peer. SixChat currently supports chat and S/MIME , soon will support file transfer, and later voice and video. SixChat User Agents can originate multiple outgoing connections and accept multiple incoming connections. SixChat User Agents depend on IRP for address resolution and PKI.

22 Applications

23 Applications of IRP to Authentication We can no longer rely on Username/Password authentication. The alternative, for both web apps and native mobile device apps, is cryptographic authentication (AKA Strong Client Authentication) using X.509 client digital certificates. Our DIR servers solve the problem of issuing and managing even very large numbers of client certs, very securely. Our IRP protocol allows relying applications to easily check client certificate validity and revocation status. It is virtually impossible for a hacker to do bulk harvesting of credentials on a server that uses our authentication scheme. Almost all SSL/TLS implementations support the basic mechanism. We just finally made it practical. We use it ourselves in IRP! We will be selling SDKs that allow anyone to modify their applications to use it.

24 Applications of IRP to IPsec based VPNs IPsec does not work well on IPv4 (it is incompatible with NAT) IPsec works great on IPv6 (there is no NAT to break it) SSL-VPN is a bad design and there is no IETF standard for it As IPv6 is deployed, VPNs will change from SSL-VPN to IPsec IPsec connections use Diffie-Hellman for key exchange, but require IPsec certificates for mutual authentication ( shared secret is not scalable and difficult to secure). See PKIX and IKE v2 RFCs for details. Today, Cisco s SCEP (Simple Certificate Enrollment Protocol) can be used for nodes to obtain an IPsec certificate, but IRP has user authentication, better reliability and supports revocation checking. The same IRP server used for client certs can also provide IPsec certs.

25 Applications of IRP to SEcure Neighbor Discovery Current IPv6 networks use unsecured Neighbor Discovery protocol for address resolution, router discovery, SLAAC, and Duplicate Address Detection. Unsecured ND is subject to many of the same attacks that IPv4 ARP is subject to. The IETF created a secure version of ND (SEcure Neighbor Discovery) in RFC 3971 and It secures all of the above network functions. It is not widely deployed yet because it requires an RPKI to create SEND compatible digital certificates. These RPKI certs include IP address and trust anchor extensions (RFCs 6494 & 6495). IRP can also be used to issue and manage RPKI certs to allow deploying SEND on all nodes in an IPv6 network. This will result in major security improvements and resistance to entire classes of hacking attacks that IPv4 and current IPv6 (with unsecured ND) are subject to.

26 Applications of IRP to Singapore s Smart Nation Platform Our technologies make it possible to issue and manage an unlimited number of X.509 digital certificates. Devices can request and download them via secure protocol. This will allow securing many devices easily. With SEND, the underlying network can be made far more secure and resistant to many hacking attacks, such as Man-Inthe-Middle and rogue Router Advertisements. Our DIR server solves the problem of issuing RPKI certs to all nodes. With IoT, Client/Server is no longer optimal devices need to be able to communicate directly with each other. Our secure address registry and distributed PKI makes this possible.

27 Applications of IRP to 5G Telephony We are creating apps that support our IRP and SixChat protocols on Android Phones (later ios as well). These require a high level of security in the device, to protect private keys. Fortunately some key new standards are being created now to provide this. You can find out more about these standards at The relevant standards here are TEE (Trusted Execution Environment) and SE (Secure Element)

28 Trusted Execution Environment (TEE) and Secure Element (SE) TEE is a software based scheme that already exists on 350M mobile devices. It provides a reasonably secure environment. SE adds hardware protection to TEE, and is starting to appear on recent devices (Galaxy S6 and iphone6). SE takes security to a whole new level for mobile devices. These technologies make it safe to use your mobile device for mobile payments and other sensitive transactions. TEE and SE are great containers for identity credentials (e.g. X.509 client certs and private keys). Our Global Identity Registry is the ideal way to securely load identity credentials into these containers, and provide the necessary infrastructure for validity and revocation checking of those credentials.

29 TEE and SE The key to securing mobile devices As of Feb 2015 there were already 350M devices with TEE. 100% of new Android devices will be supporting TEE by TEE is supported by Samsung, HTC, ZTE, Meizu and Alcatel/TCL. Galaxy S6 and iphone6 are first mobile devices to include SE.

30 SixChat A Decentralized Secure Messaging App for the IPv6 Internet Imagine a messaging app with no intermediary servers. Alice s phone connects directly to Bob s, and they chat, speak, send , and do file transfers completely privately. Traffic goes via the shortest network path between Alice and Bob. If they are in the same network, the traffic never goes out to the ISP or Internet. Even if the ISP connection goes down, if there is a working network path between them, Alice and Bob can still communicate. Assuming Alice and Bob both have client certs (from DIR), upon connectimg they mutually authenticate and exchange a session key. All traffic is encrypted and digitally signed. This kind of traffic is almost impossible to monitor or block. Is it worth getting IPv6 service to have this?

31 Your cellphone can become your Security Token Once you have your private key securely protected inside your phone, you can use it for securing payments and secure messaging from your phone. But, using WiFi or Bluetooth, you can use your phone as a wireless security token on your notebook or desktop! Your computer can use the private key in your phone to authenticate you to online services (like your bank), without that private key ever leaving your phone. This is similar to a FIPS USB security token, but does not require a physical connection (and you always have your phone with you!)

32 IRP-Enabled Add-in For Outlook Allows user to easily request and install a client cert to enable S/MIME When you send an encrypted message to other users, add-in will automatically obtain client certs for each recipients (for any that it doesn t already have) Automates validity and revocation status checking for all client certs involved. Allows sending messages to other users of Outlook with our add-in using Direct End2End secure messaging no intermediary servers! Makes S/MIME as simple to use as non-secure

33 IRP-Enabled Add-in For MS Office Allows user to easily request and install a client cert to enable digital signatures and digital envelopes for documents. Simplifies digitally signing Office documents, so that anyone (with our add-in) can easily verify the signature Simplifies encrypting Office documents for any number of recipients, including yourself (for secure storage). Only people specified when document is encrypted will be able to open those documents. Allows sending messages directly to other users of Office with our add-in using Direct End2End secure messaging no intermediary servers! (note: both users need IPv6 for this)

34 Summary Sixscape Communications is taking PKI and address registration to entirely new levels of usability and scaling, to solve numerous difficult problems in existing networks, and especially in IPv6 networks as they are deployed. Unlike existing PKI architectures, ours is distributed, which allows it to scale to the volumes required for things such as Strong Client Authentication on websites, IPsec VPNs and SEcure Neighbor Discovery. Unlike existing IP address registries, ours has strong authentication and the identity is linked to a person (or a device), not a fixed server. Direct End2End connectivity is an powerful new style of network communications, made possible by the characteristics of the IPv6 Internet.

35 In case you are wondering what inspired our name and logo Netscape Communications made enormous contributions to the IPv4 Internet with the first viable web browser, first viable web server, SSL and many other innovations. Sixscape Communications is making the same kind of contributions to the IPv6 Internet, with our Global Identity Registry, IRP and SixChat protocols, and End2End Direct connectivity.

36 THANK YOU

IRP - the Identity Registration Protocol L AW R E N C E E. HUGHES CO- F O U N D E R AND C TO S I X S CAPE C O M M U N I C ATIONS, P TE. LTD.

IRP - the Identity Registration Protocol L AW R E N C E E. HUGHES CO- F O U N D E R AND C TO S I X S CAPE C O M M U N I C ATIONS, P TE. LTD. IRP - the Identity Registration Protocol L AW R E N C E E. HUGHES CO- F O U N D E R AND C TO S I X S CAPE C O M M U N I C ATIONS, P TE. LTD. L HUGHES@SIXSC APE.COM The IPv4 Internet is Broken By the mid-1990

More information

User s Guide to IRP Client v0.8

User s Guide to IRP Client v0.8 User s Guide to IRP Client v0.8 Lawrence E. Hughes, CTO Sixscape Communications, Ltd. 22 March 2014 IRP (Identity Registration Protocol) is similar to DNS (Domain Name System) in some respects. Unlike

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Public-Key Infrastructure NETS E2008

Public-Key Infrastructure NETS E2008 Public-Key Infrastructure NETS E2008 Many slides from Vitaly Shmatikov, UT Austin slide 1 Authenticity of Public Keys? private key Alice Bob public key Problem: How does Alice know that the public key

More information

Some Lessons Learned from Designing the Resource PKI

Some Lessons Learned from Designing the Resource PKI Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007 Address and Routing Security The basic security questions that need to be answered are: Is this a valid

More information

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide Table of Contents INTRODUCTION... 4 SCENARIO OVERVIEW... 5 CONFIGURATION STEPS... 6 Core Site Configuration... 6 Generate Self-Issued Certificate

More information

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7. Lecture 13 Public Key Distribution (certification) 1 PK-based Needham-Schroeder TTP 1. A, B 4. B, A 2. {PKb, B}SKT B}SKs 5. {PK a, A} SKT SKs A 3. [N a, A] PKb 6. [N a, N b ] PKa B 7. [N b ] PKb Here,

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

Crypto meets Web Security: Certificates and SSL/TLS

Crypto meets Web Security: Certificates and SSL/TLS CSE 484 / CSE M 584: Computer Security and Privacy Crypto meets Web Security: Certificates and SSL/TLS Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

Comodo Certificate Manager

Comodo Certificate Manager Comodo Certificate Manager Simple, Automated & Robust SSL Management from the #1 Provider of Digital Certificates 1 Datasheet Table of Contents Introduction 3 CCM Overview 4 Certificate Discovery Certificate

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu

X.509. CPSC 457/557 10/17/13 Jeffrey Zhu X.509 CPSC 457/557 10/17/13 Jeffrey Zhu 2 3 X.509 Outline X.509 Overview Certificate Lifecycle Alternative Certification Models 4 What is X.509? The most commonly used Public Key Infrastructure (PKI) on

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Lecture 15 Public Key Distribution (certification)

Lecture 15 Public Key Distribution (certification) 0 < i < 2 n = N X i,y i random secret keys index i = random (secret) value Merkle s Puzzles (1974) Puzzle P i = {index i,x i,s} Y i S fixed string, e.g., " Alice to Bob" { P 0 < i < 2 i n } Pick random

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from Lecture 15 PKI & Authenticated Key Exchange COSC-260 Codes and Ciphers Adam O Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Today We will see how signatures are used to create public-key infrastructures

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Lecture Notes 14 : Public-Key Infrastructure

Lecture Notes 14 : Public-Key Infrastructure 6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These

More information

Configuring OpenVPN on pfsense

Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Posted by Glenn on Dec 29, 2013 in Networking 0 comments In this article I will go through the configuration of OpenVPN on the pfsense platform.

More information

An Overview of Secure and Authenticated Remote Access to Central Sites

An Overview of Secure and Authenticated Remote Access to Central Sites Workshop on Data Access to Micro-Data (WDA) Nuernberg, August 20-21 An Overview of Secure and Authenticated Remote Access to Central Sites Dr Milan Marković Banca Intesa ad Beograd, Serbia milan.markovic@bancaintesabeograd.com

More information

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client. Introduction: Intended Audience The StrideLinx Remote Access Solution is designed to offer safe and secure remote access to industrial equipment worldwide for efficient remote troubleshooting, programming

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

Introducción al RPKI (Resource Public Key Infrastructure)

Introducción al RPKI (Resource Public Key Infrastructure) Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

6 March 2012

6 March 2012 6 March 2012 richard.lamb@icann.org www.majorbank.se=? 1.2.3.4 Get page Login page Username / Password Account Data DNS Resolver ISP www.majorbank.se = 1.2.3.4 DNS Server webserver www @ 1.2.3.4 Majorbank

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Client Certificates Are Going Away

Client Certificates Are Going Away Client Certificates Are Going Away What now? Garrett Wollman, TIG May 2, 2016 1 Overview of this talk 1. Review of the current situation and how we got here 2. Our response to the deprecation of client

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

TFS WorkstationControl White Paper

TFS WorkstationControl White Paper White Paper Intelligent Public Key Credential Distribution and Workstation Access Control TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 Important Concepts 4 Logon Modes 4 Password

More information

Innovative uses as result of DNSSEC

Innovative uses as result of DNSSEC Innovative uses as result of DNSSEC AKA: Some happenings in the DANE* WG in the IETF. * DNS-based Authentication of Named Entities Some background... When you connect to https://www.example.com you use

More information

Update on Resource Certification. Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008

Update on Resource Certification. Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008 Update on Resource Certification Geoff Huston, APNIC Mark Kosters, ARIN IEPG, March 2008 Address and Routing Security What we have had for many years is a relatively insecure interdomain routing system

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

RPKI. Resource Pubic Key Infrastructure

RPKI. Resource Pubic Key Infrastructure RPKI Resource Pubic Key Infrastructure Purpose of RPKI RPKI replaces IRR or lives side by side? Side by side: different advantages Security, almost real time, simple interface: RPKI Purpose of RPKI Is

More information

QUANTUM SAFE PKI TRANSITIONS

QUANTUM SAFE PKI TRANSITIONS QUANTUM SAFE PKI TRANSITIONS Quantum Valley Investments Headquarters We offer quantum readiness assessments to help you identify your organization s quantum risks, develop an upgrade path, and deliver

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

10/4/2016. Advanced Windows Services. IPv6. IPv6 header. IPv6. IPv6 Address. Optimizing 0 s

10/4/2016. Advanced Windows Services. IPv6. IPv6 header. IPv6. IPv6 Address. Optimizing 0 s Advanced Windows Services IPv6 IPv6 FSRM, FCI, DAC and RMS PKI IPv6 IP is the foundation of nearly all communication The number of addresses is limited Technologies like NAT help in addition to enhancements

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Deploying a New Hash Algorithm. Presented By Archana Viswanath

Deploying a New Hash Algorithm. Presented By Archana Viswanath Deploying a New Hash Algorithm Presented By Archana Viswanath 1 function? Hash function - takes a message of any length as input - produces a fixed length string as output - termed as a message digest

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering

IPv6 Security Vendor Point of View. Eric Vyncke, Distinguished Engineer Cisco, CTO/Consulting Engineering IPv6 Security Vendor Point of View Eric Vyncke, evyncke@cisco.com Distinguished Engineer Cisco, CTO/Consulting Engineering 1 ARP Spoofing is now NDP Spoofing: Threats ARP is replaced by Neighbor Discovery

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

CS Certificates, part 2. Prof. Clarkson Spring 2017

CS Certificates, part 2. Prof. Clarkson Spring 2017 CS 5430 Certificates, part 2 Prof. Clarkson Spring 2017 Review: Certificates Digital certificate is a signature binding together: identity of principal public key of that principal (might be encryption

More information

SSH Communications Tectia SSH

SSH Communications Tectia SSH Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product

More information

A Free, Automated, and Open Certificate Authority. Josh Aas Co-Founder, Executive Director

A Free, Automated, and Open Certificate Authority. Josh Aas Co-Founder, Executive Director A Free, Automated, and Open Certificate Authority Josh Aas Co-Founder, Executive Director What is HTTPS HTTPS is HTTP over a connection secured by TLS (used to be called SSL). It s how websites encrypt

More information

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48 I N D E X Numerics A 3DES (Triple Data Encryption Standard), 48 Access Rights screen (VPN 3000 Series Concentrator), administration, 316 322 Action options, applying to filter rules, 273 adding filter

More information

Considerations for using short-term certificates

Considerations for using short-term certificates Considerations for using short-term certificates draft-nir-saag-star Yoav Nir Thomas Fossati Yaron Sheffer Toerless Eckert Why are we doing this? Lots of interest in short-term certificates In the standards

More information

Some DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007

Some DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007 Some DNSSEC thoughts DNSOPS.JP BOF Interop Japan 2007 Geoff Huston Chief Scientist, APNIC June 2007 The DNS is a miracle! You send out a question into the net And an answer comes back! Somehow But WHO

More information

Understanding Traffic Decryption

Understanding Traffic Decryption The following topics provide an overview of SSL inspection, describe the prerequisites for SSL inspection configuration, and detail deployment scenarios. About Traffic Decryption, page 1 SSL Inspection

More information

CipherMail encryption. CipherMail white paper

CipherMail  encryption. CipherMail white paper CipherMail email encryption CipherMail white paper Copyright 2009-2017, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Firepower Threat Defense Site-to-site VPNs

Firepower Threat Defense Site-to-site VPNs About, on page 1 Managing, on page 3 Configuring, on page 3 Monitoring Firepower Threat Defense VPNs, on page 11 About Firepower Threat Defense site-to-site VPN supports the following features: Both IPsec

More information

CT30A8800 Secured communications

CT30A8800 Secured communications CT30A8800 Secured communications Pekka Jäppinen October 31, 2007 Pekka Jäppinen, Lappeenranta University of Technology: October 31, 2007 Secured Communications: Key exchange Schneier, Applied Cryptography:

More information

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename 6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename Certificate formats (DER, PEM, PKCS #12) 6.2 Certificate Authorities

More information

Introduction to IPsec. Charlie Kaufman

Introduction to IPsec. Charlie Kaufman Introduction to IPsec Charlie Kaufman charliek@microsoft.com 1 IP Security (IPsec) IETF standard for Network Layer security Popular for creating trusted link (VPN), either firewall-firewall, or machine

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

Certificate Management

Certificate Management Certificate Management This guide provides information on...... Configuring the NotifyMDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

Techological Advantages of Mobile IPv6

Techological Advantages of Mobile IPv6 Techological Advantages of Mobile IPv6 Nokia Research Center Mountain View, CA USA Charles E. Perkins http://people.nokia.net/charliep charliep@iprg.nokia.com 1 NOKIA NERD2000.PPT/ 11/20/00 / HFl Outline

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

Owner of the content within this article is Written by Marc Grote

Owner of the content within this article is   Written by Marc Grote Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Securing E-Mails with S/MIME and Smartcards in Exchange 2003 Written by Marc Grote - mailto:grotem@it-training-grote.de

More information

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

Public Key Infrastructure. What can it do for you?

Public Key Infrastructure. What can it do for you? Public Key Infrastructure What can it do for you? What is PKI? Centrally-managed cryptography, for: Encryption Authentication Automatic negotiation Native support in most modern Operating Systems Allows

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

User-Relative Names for Globally Connected Personal Devices

User-Relative Names for Globally Connected Personal Devices User-Relative Names for Globally Connected Personal Devices Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans Kaashoek, Robert Morris Massachusetts Institute of Technology IPTPS February

More information

Let s Encrypt and DANE

Let s Encrypt and DANE Let s Encrypt and DANE CaribNOG 13 Barbados 18 Apr 2017 The Deploy360 Programme The Challenge: The IETF creates protocols based on open standards, but some are not widely known or deployed People seeking

More information

Better Mutual Authentication Project

Better Mutual Authentication Project Better Mutual Authentication Project Recommendations & Requirements for Improving Web Authentication for Retail Financial Services Presented to W3C Workshop on: Transparency & Usability of Web Authentication

More information

Introduction to the DANE Protocol

Introduction to the DANE Protocol Introduction to the DANE Protocol ICANN 46 April 10, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC and other Internet technologies: Case Studies Tutorials

More information

Authenticating on a Ham Internet

Authenticating on a Ham Internet Authenticating on a Ham Internet The FCC regulations for amateur radio, part 97, rule that encryption cannot be used to obscure the meaning of communications. Many read the rules and assume that there

More information

CS November 2018

CS November 2018 Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University

More information

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates. Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4

More information

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

DoD Wireless Smartphone Security Requirements Matrix Version January 2011 DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation

More information

APNIC Trial of Certification of IP Addresses and ASes

APNIC Trial of Certification of IP Addresses and ASes APNIC Trial of Certification of IP Addresses and ASes ARIN XVII Open Policy Meeting George Michaelson Geoff Huston Motivation: Address and Routing Security What we have today is a relatively insecure system

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

Cryptographic Protocols 1

Cryptographic Protocols 1 Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

secure communications

secure communications Jabber security Peter Saint-Andre stpeter@jabber.org secure communications with Jabber Jabber is... open technologies real-time messaging presence multimedia negotiation and more invented by Jeremie Miller

More information

RSA Validation Solution

RSA Validation Solution RSA Validation Solution Agenda Need for Certificate Validation Certificate Validation CRLs OCSP RSA Validation Solution RSA Validation Manager RSA Validation Client Summary Agenda Need for Certificate

More information

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017 About & Beyond PKI Blockchain and PKI André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich February 9, 2017 1 Agenda Does blockchain secure PKIs in the longterm? Disadvantages of classic PKIs

More information

DNS Security. Wolfgang Nagele DNS Group Manager

DNS Security. Wolfgang Nagele DNS Group Manager DNS Security Wolfgang Nagele DNS Group Manager DNS: the Domain Name System Specified by Paul Mockapetris in 1983 Distributed Hierarchical Database Main purpose: Translate names to IP addresses Since then:

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies

Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies Overview of the Resource PKI (RPKI) Dr. Stephen Kent VP & Chief Scientist BBN Technologies Presentation Outline The BGP security problem RPKI overiew Address & AS number allocation system Certificates

More information

Table of Contents 1 IKE 1-1

Table of Contents 1 IKE 1-1 Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration

More information

Understanding Traffic Decryption

Understanding Traffic Decryption The following topics provide an overview of SSL inspection, describe the prerequisites for SSL inspection configuration, and detail deployment scenarios. Traffic Decryption Overview, page 1 SSL Handshake

More information

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and

More information

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018

Wi-Fi Security for Next Generation Connectivity. Perry Correll Aerohive, Wi-Fi Alliance member October 2018 Perry Correll Aerohive, Wi-Fi Alliance member October 2018 1 Value of Wi-F1 The value Wi-Fi provides to the global economy rivals the combined market value of Apple Inc. and Amazon. The fact that Wi-Fi

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information