SlideShare une entreprise Scribd logo
1  sur  46
Télécharger pour lire hors ligne
ADoCSI: Towards a Transparent
Mechanism for Disseminating
Certificate Status Information

John Iliadis, PhD student
Dept. of Information and Communication Systems Engineering
University of the Aegean
E-mail: jiliad@aegean.gr
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 1 of 23
Overview
• What is Certificate Revocation ?
• Mechanisms for Certificate Status Information
• Evaluation criteria for CSI mechanisms
• The need for an alternative mechanism
• Alternative Dissemination of CSI (ADoCSI)
• Problems to be solved in ADoCSI

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 2 of 23
Introduction
2.

Certificate Revocation? What Certificate
Revocation?

4.

Certificate Status Information Mechanisms

6.

EU Directive: “secure and prompt revocation
service”

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 3 of 23
Certificate Revocation

CA1
Authenticating
entity
AE

CSI
repository

Signer
SR
CA2
CSI
repository
Dependent entity
DE

CA3
CSI
repository

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 4 of 23
CSI Mechanisms: Certificate Revocation Lists

• Compare to Black lists: Banks, Cell phone
Operators. Dependent entities: merchants (online
POS), Banks, other Cell phone operators
• CRL: Signed list containing serial numbers of
revoked (/suspended?) certificates, the revocation
dates and (optional) reasons

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 5 of 23
CSI Mechanisms: Certificate Revocation Lists
(cont.)
• Delta-Certificate Revocation Lists
• Distribution Points
• Fresh Revocation Information (DeltaCRLs on top of
DP CRLs)
• Redirect CRL (dynamic re-partitioning of large DP
CRLs)

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 6 of 23
CSI Mechanisms: Certificate Revocation Lists
(cont.)
• Enhanced CRL Distribution Options
– Separate location and validation functions.
• Positive CSI
– CRLs are all wrong… CSI should contain
positive, not negative info. Dependent entity
should set ad hoc freshness requirements and
certificate holder should provide ad hoc CSI.

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 7 of 23
CSI Mechanisms: Online Certificate Status
Protocol
Server returning signed CSI corresponding to CSI
requests by dependent entities. Possible OCSP
Responses:
1.“Good”, meaning certificate has not been revoked,
2.“Revoked”, meaning certificate has been revoked or
suspended,
3.“Unknown”, OCSP is not aware of that certificate

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 8 of 23
CSI Mechanisms: Freshness-constrained Revocation
Authority
• Repositories of CSI need not be trusted
• Separation of Certification Authority and Authority
that issues CSI (Revocation Authority, RevA)
• Dependent entity requires fresh enough CSI from
certificate holder

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 9 of 23
Evaluation Criteria: Type of Mechanism
• Transparency,
• Offline revocation,
• Delegation of revocation,
• Delegation of CSI dissemination,
• Delegation of certificate path validation,
• Referral capability,
• Revocation reasons.
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 10 of 23
Evaluation Criteria: Efficiency
• Timeliness of CSI,
• Freshness of CSI,
• Bounded revocation,
• Emergency CSI capability,
• Economy,
• Scalability,
• Adjustability.

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 11 of 23
Evaluation Criteria: Security
• CSI disseminator authentication,
• CSI integrity,
• CA compromise
• RevA compromise,
• Contained functionality,
• Availability.

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 12 of 23
The need for an alternative CSI mechanism

• Dependent entities and certificate holders:
– experienced computer-users ?
– security aware ?

• PKI security-related procedures have to be made
more transparent (e.g. bank cards)

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 13 of 23
An Agent-based mechanism
• The transparency criterion has to be met:
– Transparently locating CSI
– Transparently retrieving CSI
– Transparently validating CSI

• Agent-based mechanism
– using existing CSI mechanisms
– providing an indirection layer between dependent
entity and CSI mechanisms

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 14 of 23
ADoCSI: Alternative Dissemination
of Certificate Status Information
The agents ADoCSI needs must be able to:
1. Suspend execution and resume it at another
execution environment,
2. Retain their state, when transporting themselves to
other execution environments,
3. Create child agents and deploy them,
4. Select a network location, out of a list of locations,
with the least network congestion,
5. Communicate the retrieved information back to their
owner or to their owner’s application that spawned
the agent.
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 15 of 23
ADoCSI: Alternative Dissemination
of Certificate Status Information

Authenticating
entity
AE

CSI
AMP2

Signer
SR

referral

CA1
CA-CSI Agent
CA-CSI Agent
CA2
CA-CSI Agent

CSI
AMP1
Dependent entity
DE
Interface Agent

John Iliadis, PhD Workshop,
Samos, October 2003

User-CSI
Agent

CA-CSI Agent
CA3

Slide 16 of 23
ADoCSI Recipe Ingredients
1. Agent Meeting Places (AMP) (also called Agent
Platforms)
2. Dependent entity,
3. Authenticating Entity or Signer,
4. Certification Authority Certificate Status
Information (CA-CSI) Agent,
5. User Certificate Status Information (User-CSI)
Agent,
6. Interface Agent.
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 17 of 23
ADoCSI: Problems seeking solutions
1. How can the location function be implemented
transparently ?
3. How can dependent entities retrieve and validate
CSI transparently ?
5. How is a certificate path validated ?
7. What is the way this mechanism interacts with
dependent entities ?

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 18 of 23
ADoCSI: Problems seeking solutions (2)
1.

How are Agents protected from unauthorised
modification or replacement ?

3.

How can CSI carried by Agents be protected ?

5.

How can an Agent tell a fraudulent Agent Meeting
Place ?

7.

How can AMPs be protected from DoS attacks ?

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 19 of 23
ADoCSI: Problems seeking solutions (8)
1.

How can dependent entities be protected against
User-CSI Agent replay attacks?

3.

How are the Agent Meeting Places protected
from malicious Agents ?

5.

How can an Agent retrieve CSI for a dependent
entity, without letting the AMP know which
certificate did it retrieve CSI for ?

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 20 of 23
Q&A

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 21 of 23
References

• PKI
• Certificate Revocation
• Software Agents’ Security

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 22 of 23
References (2)

• PKI
• Certificate Revocation
• Software Agents’ Security

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 23 of 23
ADoCSI: Towards a Transparent
Mechanism for Disseminating
Certificate Status Information

John Iliadis, PhD student
Dept. of Information and Communication Systems Engineering
University of the Aegean
E-mail: jiliad@aegean.gr
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 1 of 23

1
Overview
• What is Certificate Revocation ?
• Mechanisms for Certificate Status Information
• Evaluation criteria for CSI mechanisms
• The need for an alternative mechanism
• Alternative Dissemination of CSI (ADoCSI)
• Problems to be solved in ADoCSI

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 2 of 23

2
Introduction
2.

Certificate Revocation? What Certificate
Revocation?

4.

Certificate Status Information Mechanisms

6.

EU Directive: “secure and prompt revocation
service”

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 3 of 23

Although laws have already been voted, and regulatory frameworks put in place,
PKI is being expanding without this extra care needed for revocation. Both
technical and legal requirements exist (e.g. EU Directive “secure and prompt
revocation service). However, certificate holders and dependent entities have not
yet realised the need for it.
Government seems to be the driving force for PKI; at least in Europe, e-gov
initiatives do/could take advantage of PKI. User awareness programmes could be
initiated by appropriate government actions.

3
Certificate Revocation

CA1
Authenticating
entity
AE

CSI
repository

Signer
SR
CA2
CSI
repository
Dependent entity
DE

CA3
CSI
repository

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 4 of 23

4
CSI Mechanisms: Certificate Revocation Lists

• Compare to Black lists: Banks, Cell phone
Operators. Dependent entities: merchants (online
POS), Banks, other Cell phone operators
• CRL: Signed list containing serial numbers of
revoked (/suspended?) certificates, the revocation
dates and (optional) reasons

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 5 of 23

Certificate Revocation Lists Standards: X.509, ISO 9594, RFC 2459
A dependent entity has to locate, retrieve and validate a CRL. The location
function can be embedded in the certificate of the signer.
•Can/will the s/w the dependent entity uses retrieve and validate the CRL?
•If CRL not found or old, must the s/w attempt to locate a more recent version or
alert the dependent entity?
•Is the dependent entity security-aware? What about authentication fatigue?
•How can a dependent entity validate a CRL if it does not possess the certificate
used to sign it, or the CA certificate ?

5
CSI Mechanisms: Certificate Revocation Lists
(cont.)
• Delta-Certificate Revocation Lists
• Distribution Points
• Fresh Revocation Information (DeltaCRLs on top of
DP CRLs)
• Redirect CRL (dynamic re-partitioning of large DP
CRLs)

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 6 of 23

•Delta-CRL: Containing only the changes/additions since the last full CRL
(DeltaCRLIndicator extension)
•Distribution Points: Partitioning of CRLs depending on: certificate serial numbers,
namespaces, issuance dates, …
•Fresh Revocation Information: DeltaCRLs on top of DP CRLs
•Redirect CRLs: Dynamic re-partitioning of CRLs when they grow to be
unmanageably large. Extension in DP CRL, pointing to the new DP CRL.

6
CSI Mechanisms: Certificate Revocation Lists
(cont.)
• Enhanced CRL Distribution Options
– Separate location and validation functions.
• Positive CSI
– CRLs are all wrong… CSI should contain
positive, not negative info. Dependent entity
should set ad hoc freshness requirements and
certificate holder should provide ad hoc CSI.

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 7 of 23

Location and Validation functions in CSI:
The location function is used in order to locate the source of CSI the dependent entity is looking for. It is usually contained in
the certificate of the signer.
The validation function is used in order to verify that a retrieved piece of CSI contains status information regarding the
certificate presented to the dependent entity by the certificate holder.
Enhanced CRL Distribution Options
According to the Enhanced CRL Distribution Options mechanism, the location and validation functions can be separated in the
following way:
Certificate of certificate holder contains a pointer to an empty CRL, which contains only a StatusReferral extension, pointing to
newly issued CRLs. The latter contain cRLScope extensions, integrating the validation function.
Using Enhanced CRL Dist. Options, a dependent entity needs not download CSI in order to establish whether it is more fresh to
the one it already possesses, thanks to StatusReferrals. Moreover, dynamic re-partitioning and load-balancing of CSI can be
achieved through cRLScope extensions contained in the actual CRLs.
Positive CSI
According to Positive CSI, it should be the dependent entity that should set freshness requirements for CSI, dynamically and
depending on each case where certificates are used. Furthermore, it must be the certificate holder that has to provide the
dependent entity with the requested CSI.
A certificate holder should be able to revoke his own key on his own, by signing a “Suicide Note” and delivering it to a
“Suicide Bureau”. There should be a network of "Suicide Bureaus" (SB), which gather suicide notes from every possible
source, and either replicate the information they hold or have a means to refer queries to each other.
When a dependent entity wishes for CSI it can ask for fresh CSI from the certificate holder; the latter, in turn, should ask an SB
for a "certificate of health", stating that ‘no evidence has been received that the key has been lost or compromised’. The
dependent entity could set in this case requirements on the freshness of the "certificate of health" provided by the SB to the
certificate holder and by the latter to the dependent entity.

7
CSI Mechanisms: Online Certificate Status
Protocol
Server returning signed CSI corresponding to CSI
requests by dependent entities. Possible OCSP
Responses:
1.“Good”, meaning certificate has not been revoked,
2.“Revoked”, meaning certificate has been revoked or
suspended,
3.“Unknown”, OCSP is not aware of that certificate

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 8 of 23

OCSP responses can contain three values concerning time:
1.
thisUpdate, which indicates the time at which the CSI
communicated to the requester was known to be correct,
2.
nextUpdate, which indicates when the next update of CSI is
expected to be available,
3.
producedAt, which indicates the time at which the CSI
communicated to the requester was signed by the entity that runs the OCSP
service.

8
CSI Mechanisms: Freshness-constrained Revocation
Authority
• Repositories of CSI need not be trusted
• Separation of Certification Authority and Authority
that issues CSI (Revocation Authority, RevA)
• Dependent entity requires fresh enough CSI from
certificate holder

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 9 of 23

Freshness-constrained Revocation Authority proposes a revocation service where
revocation can be definite, and where the repositories of revocation information
need not be trusted. According to this service, the role of the Certification
Authority (CA) is separated from the role of the Revocation Authority (RevA). The
CA issues long-term certificates, which contain freshness constraints on the CSI
the dependent entities will use in order to validate the certificates. Such a
certificate also contains a pointer to the RevA that is responsible for issuing CSI
regarding the specific certificate. The RevA issues frequently timestamped
certificates which are used in order to provide the dependent entities with positive
assertions regarding the validity of the certificate. The dependent entities
themselves impose their own CSI freshness requirements, when certificate holders
use their certificates in order to authenticate themselves.
When a certificate holder attempts to authenticate, the dependent entity will impose
its own freshness requirements and will expect from the certificate holder to
provide a short-lived certificate, issued by the RevA, that fulfils these freshness
requirements
It is obvious that this method allows for flexible balancing of the authentication
costs and level of protection on a per transaction basis. Furthermore, the CSI, that
is the short-lived, timestamped certificate, need not be communicated from a
trusted repository. .

9
Evaluation Criteria: Type of Mechanism
• Transparency,
• Offline revocation,
• Delegation of revocation,
• Delegation of CSI dissemination,
• Delegation of certificate path validation,
• Referral capability,
• Revocation reasons.
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 10 of 23

M1. Transparency. Transparency in locating the CSI repository (CSI location function) and
verifying that the CSI contained in that repository is the one the dependent entity is looking for
(CSI validation function),
M2. Offline revocation. Whether a user can revoke his certificate by himself without having to
contact the respective CA,
M3. Delegation of revocation. Delegation of the revocation by the CA to another authority,
either another CA or another authority that operates only as a Revocation Authority (RevA)
and not as a Certification Authority,
M4. Delegation of the CSI dissemination. Delegation of CSI dissemination by the CA to
another authority; the latter may be trusted by the dependent entities or not, depending on the
mechanics of the CSI dissemination in each case,
M5. Delegation of the certificate path validation. Delegation of the certificate path validation
from the dependent entity to another entity; the dependent entity should be provided with the
means to verify the origin of the validation result; in addition to that, the entity that performs
the certificate path validation should be trusted by the dependent entity,
M6. Referral capability. If the CSI repository does not contain the CSI the dependent entity is
looking for, the repository could refer the dependent entity to another CSI repository that may
contain the aforementioned CSI,
M7. Revocation Reasons. The certificate path validation function should take into
consideration the reasons for the revocation of a certificate (e.g. reasonCode in X.509v2 CRLs)
in order to assert on the validity of a certificate in a certificate path.

10
Evaluation Criteria: Efficiency
• Timeliness of CSI,
• Freshness of CSI,
• Bounded revocation,
• Emergency CSI capability,
• Economy,
• Scalability,
• Adjustability.

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 11 of 23

E1. Timeliness of CSI. Dependent entities should be able to locate and receive CSI on time, for them to use such
information in authenticating entities or verifying the signatures of entities,
E2. Freshness of CSI. How ‘fresh’ is the status information delivered to dependent entities,
E3. Bounded revocation. New CSI should become available to the dependent entities within a bounded time
period,
E4. Emergency CSI capability. Facility to generate emergency CSI to the dependent entities (e.g. in case the
certificate of an entity that many people use and trust has been revoked),
E5. Economy. Economy should be examined both from the point of view of the authorities that control the use of
certificates (e.g. Certification Authorities, Registration Authorities, Revocation Authorities) and from the point of
view of the entities that use certificates (e.g. dependent entities, certificate holders). The CSI dissemination
mechanism should not cause any obstacles, delays or disruptions in the normal working practice that the dependent
entities and certificate holders follow. The CSI dissemination mechanism should not require from the dependent
entities or certificate holders to have a clear and profound understanding of the mechanism itself, and interact to a
great extent with the mechanism in order to make it operate properly.
E6. Scalability. When the number of the CSI dissemination mechanism authorities and users (e.g. CAs, RevAs,
dependent entities, certificate holders) increases, new problems or difficulties in the operation of the mechanism
should not emerge. Scalability relates more to resources, in contrast to economy which relates more to
infrastructure and mode of operation,
E7. Adjustability. The dependent entities (or the CA, RevA as well) should be able to adjust the location or
validation function operation in order to create a balance between performance and protection, depending on the
requirements and the risk policy in each case. Ideally, the dependent entity should be able to do this, since it is the
dependent entity that takes the risk.

11
Evaluation Criteria: Security
• CSI disseminator authentication,
• CSI integrity,
• CA compromise
• RevA compromise,
• Contained functionality,
• Availability.

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 12 of 23

S1. CSI disseminator authentication. Dependent entities must verify the origin of
the CSI they receive. The CSI disseminator is usually the RevA (the service is
operated by the CA) itself. If authentication is not used, a malicious entity
pretending to be a trusted CSI dissemination entity, could provide the dependent
entities with false CSI that appears to be valid,
S2. CSI integrity. Verifying the integrity of the CSI, when it is stored in the CSI
repository, transferred to the dependent entities and when it is stored in the
dependent entities’ local repository. Such verification must be possible lest a
malicious entity modifies the CSI in transit, before the dependent entity receives it;
should this happen, the dependent entity may not realise that the received CSI is
old, partial or invalid in any way,
S3. CA compromise. The effects of a CA key being compromised should be
minimised,
S4. RevA compromise. There should be a mechanism for the dependent entities to
know whether the RevA has been compromised. This mechanism must not be the
same with the one used by the dependent entities in order to receive CSI on
certificates that belong to entities other than the RevA,
S5. Contained functionality. If RevA is compromised, it should not be possible for
the entities that gained control of the RevA to issue new certificates,
S6. Availability. The CSI dissemination mechanism has to be resilient against
unreliable networks.

12
The need for an alternative CSI mechanism

• Dependent entities and certificate holders:
– experienced computer-users ?
– security aware ?

• PKI security-related procedures have to be made
more transparent (e.g. bank cards)

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 13 of 23

Users are not necessarily experienced computer users; the majority of them are not
sensitive or cautious enough about security measures. Even when they are, there
are other reasons that could lead them into taking the wrong security decisions,
such as “authorisation fatigue”.
Security-related processes have to be made more transparent, for those users to be
able to offer and receive securely electronic services. This is the reason why the
use of credit and debit cards has expanded. End-users of the credit and debit card
system (cardholders) and the respective dependent entities (e.g. merchants) do not
need to take any special security measures in order to take advantage of the credit
and debit card system. All they have to do is adopt simple human procedures in
order to facilitate the operation of the underlying security system.
This has to be done with PKI as well, in the long run. Authenticating entities,
signers and dependent entities should not have to carry out special security
procedures. There has to be a security infrastructure that allows them to profit from
the use of certificates without them having to contribute to the operation of that
security infrastructure, except for some simple procedures which would ensure that
the security infrastructure works for their profit.

13
An Agent-based mechanism
• The transparency criterion has to be met:
– Transparently locating CSI
– Transparently retrieving CSI
– Transparently validating CSI

• Agent-based mechanism
– using existing CSI mechanisms
– providing an indirection layer between dependent
entity and CSI mechanisms

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 14 of 23

The transparency criterion has to be met, for CSI mechanisms to succeed in the
distant future. A level of indirection could be added to them, using Software
Agents that carry out the CSI location, retrieval and validation tasks a human
would have to do otherwise.
Agents residing in the domain of dependent entities’ will decide what CSI the
dependent entities need or will need, roam the network in order to locate that CSI
and retrieve it for the dependent entities once they are connected again to the
network. The major difference of such a mechanism to the others would, or rather
should, be transparency. Such a mechanism could use all CSI formats and
mechanisms already presented; all the Agent will do is add a level of indirection,
thus providing CSI mechanism transparency to the security unaware dependent
entity. Such a mechanism is currently under research, at the University of the
Aegean. We call it ADOCSI (Alternative Dissemination of Certificate Status
Information).

14
ADoCSI: Alternative Dissemination
of Certificate Status Information
The agents ADoCSI needs must be able to:
1. Suspend execution and resume it at another
execution environment,
2. Retain their state, when transporting themselves to
other execution environments,
3. Create child agents and deploy them,
4. Select a network location, out of a list of locations,
with the least network congestion,
5. Communicate the retrieved information back to their
owner or to their owner’s application that spawned
the agent.
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 15 of 23

15
ADoCSI: Alternative Dissemination
of Certificate Status Information

Authenticating
entity
AE

CSI
AMP2

Signer
SR

referral

CA1
CA-CSI Agent
CA-CSI Agent
CA2
CA-CSI Agent

CSI
AMP1
Dependent entity
DE
Interface Agent

John Iliadis, PhD Workshop,
Samos, October 2003

User-CSI
Agent

CA-CSI Agent
CA3

Slide 16 of 23

16
ADoCSI Recipe Ingredients
1. Agent Meeting Places (AMP) (also called Agent
Platforms)
2. Dependent entity,
3. Authenticating Entity or Signer,
4. Certification Authority Certificate Status
Information (CA-CSI) Agent,
5. User Certificate Status Information (User-CSI)
Agent,
6. Interface Agent.
John Iliadis, PhD Workshop,
Samos, October 2003

Slide 17 of 23

17
ADoCSI: Problems seeking solutions
1. How can the location function be implemented
transparently ?
3. How can dependent entities retrieve and validate
CSI transparently ?
5. How is a certificate path validated ?
7. What is the way this mechanism interacts with
dependent entities ?

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 18 of 23

18
ADoCSI: Problems seeking solutions (2)
1.

How are Agents protected from unauthorised
modification or replacement ?

3.

How can CSI carried by Agents be protected ?

5.

How can an Agent tell a fraudulent Agent Meeting
Place ?

7.

How can AMPs be protected from DoS attacks ?

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 19 of 23

19
ADoCSI: Problems seeking solutions (8)
1.

How can dependent entities be protected against
User-CSI Agent replay attacks?

3.

How are the Agent Meeting Places protected
from malicious Agents ?

5.

How can an Agent retrieve CSI for a dependent
entity, without letting the AMP know which
certificate did it retrieve CSI for ?

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 20 of 23

20
Q&A

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 21 of 23

21
References

• PKI
• Certificate Revocation
• Software Agents’ Security

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 22 of 23

[Adams98]
Adams C., Zuccherato R., A General, Flexible Approach to Certificate Revocation,
Entrust Technologies
[EuDir99]
Directive 1999/93/EC of the European Parliament and of the Council on a
Community framework for electronic signatures, 13 December 1999.
[Fox98]
Fox B., LaMacchia B., Certificate Revocation: Mechanics and Meaning, In
Proceedings of Financial Cryptography 98, LNCS 1465, New York, Springer Verlag
[Gritz97]
Gritzalis, S., Spinellis, D. Addressing Threats and Security Issues in World Wide
Web Technology, In Proceedings of the 3rd IFIP International Conference on Communications and
Multimedia Security, Chapman & Hall, 1997
[Gritz98]
Gritzalis S., Iliadis J., Addressing security issues in programming languages for
mobile code, In Proceedings of the DEXA '98 9th Workshop of Database and Expert Systems
Applications, IEEE Computer Society Press, August 1998
[Hall98]
Hallam-Baker P., Ford W., Enhanced CRL Distribution Options, IETF PKIX
Working Group, Internet Draft, 7 August 1998, available at http://www.ietf.org/internet
drafts/draft-ietf-pkix-ocdp-01.txt
[Hous99]
Housley R., Ford W., Polk W., Solo D., Internet X.509 Public Key Infrastructure
Certificate and CRL Profile, , IETF Network Working Group, Request for Comments 2459
(Category: Standards Track), January 1999, available at http://www.ietf.org/rfc/rfc2459.txt
[Iliad02]
J. Iliadis, S. Gritzalis, D. Gritzalis, "ADoCSI: Towards an Alternative Mechanism
for Disseminating Certificate Status Information", to appear

22
References (2)

• PKI
• Certificate Revocation
• Software Agents’ Security

John Iliadis, PhD Workshop,
Samos, October 2003

Slide 23 of 23

[Iliad00a]
J. Iliadis, D. Spinellis, S. Katsikas, D. Gritzalis, B. Preneel. "Evaluating Certificate Status
Information Mechanisms". In Proceedinds of the 7th ACM Conference on Computer and Communication
Security: CCS '2000, pages 1-8. ACM Press, November 2000.3.
[Iliad00b]
Ioannis S. Iliadis, Diomidis Spinellis, Sokratis Katsikas and Bart Preneel, "A Taxonomy of
Certificate Status Information Mechanisms", In Information Security Solutions Europe ISSE 2000,
Barcelona, Spain, September 2000. European Forum for Electronic Business.
[ISO9594]
Framework.

ISO/IEC 9594-8 (1994), Open Systems Interconnection - The Directory: Authentication

[Micali96]
Micali S., Efficient Certificate Revocation, Technical Memo 542b, Laboratory for Computer
Science, Massachusetts Institute of Technology, March 1996
[Myer99]
Myers M., Ankney R., Malpani A., Galperin S., Adams C., X.509 Internet Public Key
Infrastructure Online Certificate Status Protocol, IETF Network Working Group, Request for Comments
2560 (Category: Standards Track), January 1999, available at http://www.ietf.org/rfc/rfc2560.txt
[Naor98]
Naor M., Nissim K., Certificate Revocation and Certificate Update, In Proceedings 7th
USENIX Security Symposium, Jan 1998, San Antonio, Texas
[Rivest98]
Rivest R., Can We Eliminate Revocation Lists?, In Proceedings of Financial Cryptography
1998, available at http://theory.lcs.mit.edu/~rivest/revocation.ps
[Stub95]
Stubblebine S. G., Recent-Secure Authentication: Enforcing Revocation in Distributed
Systems, In Proceedings IEEE Symposium on Research in Security and Privacy, pages 224-234, May 1995,
Oakland
[X.509]
ITU-T Recommendation X.509 (1997 E): Information Technology - Open Systems
Interconnection - The Directory: Authentication Framework, June 1997

23

Contenu connexe

En vedette

Dino's presentation of unit 1
Dino's presentation of unit 1Dino's presentation of unit 1
Dino's presentation of unit 1Tatjana Lekić
 
Développement durable dossier de production groupe 39 SKEMA
Développement durable dossier de production groupe 39 SKEMADéveloppement durable dossier de production groupe 39 SKEMA
Développement durable dossier de production groupe 39 SKEMAMathieu Cantegrit
 
מידעון אביב- פרויקט אפיק
מידעון אביב- פרויקט אפיקמידעון אביב- פרויקט אפיק
מידעון אביב- פרויקט אפיקNoa Greenstep
 
whenhecomescalling_final
whenhecomescalling_finalwhenhecomescalling_final
whenhecomescalling_finalInessa Wong
 
Final Draft- cash for work
Final Draft- cash for workFinal Draft- cash for work
Final Draft- cash for workSolomon Raj
 

En vedette (10)

Collection
CollectionCollection
Collection
 
It news
It newsIt news
It news
 
Kelompok 3. 5b
Kelompok 3. 5bKelompok 3. 5b
Kelompok 3. 5b
 
El
ElEl
El
 
Dino's presentation of unit 1
Dino's presentation of unit 1Dino's presentation of unit 1
Dino's presentation of unit 1
 
Développement durable dossier de production groupe 39 SKEMA
Développement durable dossier de production groupe 39 SKEMADéveloppement durable dossier de production groupe 39 SKEMA
Développement durable dossier de production groupe 39 SKEMA
 
Silabus Fisika
Silabus FisikaSilabus Fisika
Silabus Fisika
 
מידעון אביב- פרויקט אפיק
מידעון אביב- פרויקט אפיקמידעון אביב- פרויקט אפיק
מידעון אביב- פרויקט אפיק
 
whenhecomescalling_final
whenhecomescalling_finalwhenhecomescalling_final
whenhecomescalling_final
 
Final Draft- cash for work
Final Draft- cash for workFinal Draft- cash for work
Final Draft- cash for work
 

Similaire à ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status Information

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
Certificate Validation using block chain
Certificate Validation using block chainCertificate Validation using block chain
Certificate Validation using block chainAshokkumarK20CS004
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Document authentication system powered by assuretec
Document authentication system powered by assuretecDocument authentication system powered by assuretec
Document authentication system powered by assuretecMurugan Ramasamy
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization ModelsCSCJournals
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
Cyber object types and controls.pdf
Cyber object types and controls.pdfCyber object types and controls.pdf
Cyber object types and controls.pdfRobert Kloots
 
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsSimultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsTyrone Grandison
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesJohn ILIADIS
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalUlf Mattsson
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Logikcull.com
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
DocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate VerificationDocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate VerificationIRJET Journal
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksPonmudiselvan.N Selvan
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docxdurantheseldine
 

Similaire à ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status Information (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
Certificate Validation using block chain
Certificate Validation using block chainCertificate Validation using block chain
Certificate Validation using block chain
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Document authentication system powered by assuretec
Document authentication system powered by assuretecDocument authentication system powered by assuretec
Document authentication system powered by assuretec
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Cyber object types and controls.pdf
Cyber object types and controls.pdfCyber object types and controls.pdf
Cyber object types and controls.pdf
 
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsSimultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two Decades
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Cacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 finalCacs na isaca session 414 ulf mattsson may 10 final
Cacs na isaca session 414 ulf mattsson may 10 final
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
DocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate VerificationDocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
DocsInBlocks - A Blockchain-Based Document Handler for Candidate Verification
 
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
 

Plus de John ILIADIS

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsJohn ILIADIS
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's PlaygroundJohn ILIADIS
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.John ILIADIS
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsJohn ILIADIS
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?John ILIADIS
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security SoftwareJohn ILIADIS
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringJohn ILIADIS
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network SecurityJohn ILIADIS
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayJohn ILIADIS
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...John ILIADIS
 

Plus de John ILIADIS (11)

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and Underdelivering
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network Security
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status Information

  • 1. ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status Information John Iliadis, PhD student Dept. of Information and Communication Systems Engineering University of the Aegean E-mail: jiliad@aegean.gr John Iliadis, PhD Workshop, Samos, October 2003 Slide 1 of 23
  • 2. Overview • What is Certificate Revocation ? • Mechanisms for Certificate Status Information • Evaluation criteria for CSI mechanisms • The need for an alternative mechanism • Alternative Dissemination of CSI (ADoCSI) • Problems to be solved in ADoCSI John Iliadis, PhD Workshop, Samos, October 2003 Slide 2 of 23
  • 3. Introduction 2. Certificate Revocation? What Certificate Revocation? 4. Certificate Status Information Mechanisms 6. EU Directive: “secure and prompt revocation service” John Iliadis, PhD Workshop, Samos, October 2003 Slide 3 of 23
  • 5. CSI Mechanisms: Certificate Revocation Lists • Compare to Black lists: Banks, Cell phone Operators. Dependent entities: merchants (online POS), Banks, other Cell phone operators • CRL: Signed list containing serial numbers of revoked (/suspended?) certificates, the revocation dates and (optional) reasons John Iliadis, PhD Workshop, Samos, October 2003 Slide 5 of 23
  • 6. CSI Mechanisms: Certificate Revocation Lists (cont.) • Delta-Certificate Revocation Lists • Distribution Points • Fresh Revocation Information (DeltaCRLs on top of DP CRLs) • Redirect CRL (dynamic re-partitioning of large DP CRLs) John Iliadis, PhD Workshop, Samos, October 2003 Slide 6 of 23
  • 7. CSI Mechanisms: Certificate Revocation Lists (cont.) • Enhanced CRL Distribution Options – Separate location and validation functions. • Positive CSI – CRLs are all wrong… CSI should contain positive, not negative info. Dependent entity should set ad hoc freshness requirements and certificate holder should provide ad hoc CSI. John Iliadis, PhD Workshop, Samos, October 2003 Slide 7 of 23
  • 8. CSI Mechanisms: Online Certificate Status Protocol Server returning signed CSI corresponding to CSI requests by dependent entities. Possible OCSP Responses: 1.“Good”, meaning certificate has not been revoked, 2.“Revoked”, meaning certificate has been revoked or suspended, 3.“Unknown”, OCSP is not aware of that certificate John Iliadis, PhD Workshop, Samos, October 2003 Slide 8 of 23
  • 9. CSI Mechanisms: Freshness-constrained Revocation Authority • Repositories of CSI need not be trusted • Separation of Certification Authority and Authority that issues CSI (Revocation Authority, RevA) • Dependent entity requires fresh enough CSI from certificate holder John Iliadis, PhD Workshop, Samos, October 2003 Slide 9 of 23
  • 10. Evaluation Criteria: Type of Mechanism • Transparency, • Offline revocation, • Delegation of revocation, • Delegation of CSI dissemination, • Delegation of certificate path validation, • Referral capability, • Revocation reasons. John Iliadis, PhD Workshop, Samos, October 2003 Slide 10 of 23
  • 11. Evaluation Criteria: Efficiency • Timeliness of CSI, • Freshness of CSI, • Bounded revocation, • Emergency CSI capability, • Economy, • Scalability, • Adjustability. John Iliadis, PhD Workshop, Samos, October 2003 Slide 11 of 23
  • 12. Evaluation Criteria: Security • CSI disseminator authentication, • CSI integrity, • CA compromise • RevA compromise, • Contained functionality, • Availability. John Iliadis, PhD Workshop, Samos, October 2003 Slide 12 of 23
  • 13. The need for an alternative CSI mechanism • Dependent entities and certificate holders: – experienced computer-users ? – security aware ? • PKI security-related procedures have to be made more transparent (e.g. bank cards) John Iliadis, PhD Workshop, Samos, October 2003 Slide 13 of 23
  • 14. An Agent-based mechanism • The transparency criterion has to be met: – Transparently locating CSI – Transparently retrieving CSI – Transparently validating CSI • Agent-based mechanism – using existing CSI mechanisms – providing an indirection layer between dependent entity and CSI mechanisms John Iliadis, PhD Workshop, Samos, October 2003 Slide 14 of 23
  • 15. ADoCSI: Alternative Dissemination of Certificate Status Information The agents ADoCSI needs must be able to: 1. Suspend execution and resume it at another execution environment, 2. Retain their state, when transporting themselves to other execution environments, 3. Create child agents and deploy them, 4. Select a network location, out of a list of locations, with the least network congestion, 5. Communicate the retrieved information back to their owner or to their owner’s application that spawned the agent. John Iliadis, PhD Workshop, Samos, October 2003 Slide 15 of 23
  • 16. ADoCSI: Alternative Dissemination of Certificate Status Information Authenticating entity AE CSI AMP2 Signer SR referral CA1 CA-CSI Agent CA-CSI Agent CA2 CA-CSI Agent CSI AMP1 Dependent entity DE Interface Agent John Iliadis, PhD Workshop, Samos, October 2003 User-CSI Agent CA-CSI Agent CA3 Slide 16 of 23
  • 17. ADoCSI Recipe Ingredients 1. Agent Meeting Places (AMP) (also called Agent Platforms) 2. Dependent entity, 3. Authenticating Entity or Signer, 4. Certification Authority Certificate Status Information (CA-CSI) Agent, 5. User Certificate Status Information (User-CSI) Agent, 6. Interface Agent. John Iliadis, PhD Workshop, Samos, October 2003 Slide 17 of 23
  • 18. ADoCSI: Problems seeking solutions 1. How can the location function be implemented transparently ? 3. How can dependent entities retrieve and validate CSI transparently ? 5. How is a certificate path validated ? 7. What is the way this mechanism interacts with dependent entities ? John Iliadis, PhD Workshop, Samos, October 2003 Slide 18 of 23
  • 19. ADoCSI: Problems seeking solutions (2) 1. How are Agents protected from unauthorised modification or replacement ? 3. How can CSI carried by Agents be protected ? 5. How can an Agent tell a fraudulent Agent Meeting Place ? 7. How can AMPs be protected from DoS attacks ? John Iliadis, PhD Workshop, Samos, October 2003 Slide 19 of 23
  • 20. ADoCSI: Problems seeking solutions (8) 1. How can dependent entities be protected against User-CSI Agent replay attacks? 3. How are the Agent Meeting Places protected from malicious Agents ? 5. How can an Agent retrieve CSI for a dependent entity, without letting the AMP know which certificate did it retrieve CSI for ? John Iliadis, PhD Workshop, Samos, October 2003 Slide 20 of 23
  • 21. Q&A John Iliadis, PhD Workshop, Samos, October 2003 Slide 21 of 23
  • 22. References • PKI • Certificate Revocation • Software Agents’ Security John Iliadis, PhD Workshop, Samos, October 2003 Slide 22 of 23
  • 23. References (2) • PKI • Certificate Revocation • Software Agents’ Security John Iliadis, PhD Workshop, Samos, October 2003 Slide 23 of 23
  • 24. ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status Information John Iliadis, PhD student Dept. of Information and Communication Systems Engineering University of the Aegean E-mail: jiliad@aegean.gr John Iliadis, PhD Workshop, Samos, October 2003 Slide 1 of 23 1
  • 25. Overview • What is Certificate Revocation ? • Mechanisms for Certificate Status Information • Evaluation criteria for CSI mechanisms • The need for an alternative mechanism • Alternative Dissemination of CSI (ADoCSI) • Problems to be solved in ADoCSI John Iliadis, PhD Workshop, Samos, October 2003 Slide 2 of 23 2
  • 26. Introduction 2. Certificate Revocation? What Certificate Revocation? 4. Certificate Status Information Mechanisms 6. EU Directive: “secure and prompt revocation service” John Iliadis, PhD Workshop, Samos, October 2003 Slide 3 of 23 Although laws have already been voted, and regulatory frameworks put in place, PKI is being expanding without this extra care needed for revocation. Both technical and legal requirements exist (e.g. EU Directive “secure and prompt revocation service). However, certificate holders and dependent entities have not yet realised the need for it. Government seems to be the driving force for PKI; at least in Europe, e-gov initiatives do/could take advantage of PKI. User awareness programmes could be initiated by appropriate government actions. 3
  • 28. CSI Mechanisms: Certificate Revocation Lists • Compare to Black lists: Banks, Cell phone Operators. Dependent entities: merchants (online POS), Banks, other Cell phone operators • CRL: Signed list containing serial numbers of revoked (/suspended?) certificates, the revocation dates and (optional) reasons John Iliadis, PhD Workshop, Samos, October 2003 Slide 5 of 23 Certificate Revocation Lists Standards: X.509, ISO 9594, RFC 2459 A dependent entity has to locate, retrieve and validate a CRL. The location function can be embedded in the certificate of the signer. •Can/will the s/w the dependent entity uses retrieve and validate the CRL? •If CRL not found or old, must the s/w attempt to locate a more recent version or alert the dependent entity? •Is the dependent entity security-aware? What about authentication fatigue? •How can a dependent entity validate a CRL if it does not possess the certificate used to sign it, or the CA certificate ? 5
  • 29. CSI Mechanisms: Certificate Revocation Lists (cont.) • Delta-Certificate Revocation Lists • Distribution Points • Fresh Revocation Information (DeltaCRLs on top of DP CRLs) • Redirect CRL (dynamic re-partitioning of large DP CRLs) John Iliadis, PhD Workshop, Samos, October 2003 Slide 6 of 23 •Delta-CRL: Containing only the changes/additions since the last full CRL (DeltaCRLIndicator extension) •Distribution Points: Partitioning of CRLs depending on: certificate serial numbers, namespaces, issuance dates, … •Fresh Revocation Information: DeltaCRLs on top of DP CRLs •Redirect CRLs: Dynamic re-partitioning of CRLs when they grow to be unmanageably large. Extension in DP CRL, pointing to the new DP CRL. 6
  • 30. CSI Mechanisms: Certificate Revocation Lists (cont.) • Enhanced CRL Distribution Options – Separate location and validation functions. • Positive CSI – CRLs are all wrong… CSI should contain positive, not negative info. Dependent entity should set ad hoc freshness requirements and certificate holder should provide ad hoc CSI. John Iliadis, PhD Workshop, Samos, October 2003 Slide 7 of 23 Location and Validation functions in CSI: The location function is used in order to locate the source of CSI the dependent entity is looking for. It is usually contained in the certificate of the signer. The validation function is used in order to verify that a retrieved piece of CSI contains status information regarding the certificate presented to the dependent entity by the certificate holder. Enhanced CRL Distribution Options According to the Enhanced CRL Distribution Options mechanism, the location and validation functions can be separated in the following way: Certificate of certificate holder contains a pointer to an empty CRL, which contains only a StatusReferral extension, pointing to newly issued CRLs. The latter contain cRLScope extensions, integrating the validation function. Using Enhanced CRL Dist. Options, a dependent entity needs not download CSI in order to establish whether it is more fresh to the one it already possesses, thanks to StatusReferrals. Moreover, dynamic re-partitioning and load-balancing of CSI can be achieved through cRLScope extensions contained in the actual CRLs. Positive CSI According to Positive CSI, it should be the dependent entity that should set freshness requirements for CSI, dynamically and depending on each case where certificates are used. Furthermore, it must be the certificate holder that has to provide the dependent entity with the requested CSI. A certificate holder should be able to revoke his own key on his own, by signing a “Suicide Note” and delivering it to a “Suicide Bureau”. There should be a network of "Suicide Bureaus" (SB), which gather suicide notes from every possible source, and either replicate the information they hold or have a means to refer queries to each other. When a dependent entity wishes for CSI it can ask for fresh CSI from the certificate holder; the latter, in turn, should ask an SB for a "certificate of health", stating that ‘no evidence has been received that the key has been lost or compromised’. The dependent entity could set in this case requirements on the freshness of the "certificate of health" provided by the SB to the certificate holder and by the latter to the dependent entity. 7
  • 31. CSI Mechanisms: Online Certificate Status Protocol Server returning signed CSI corresponding to CSI requests by dependent entities. Possible OCSP Responses: 1.“Good”, meaning certificate has not been revoked, 2.“Revoked”, meaning certificate has been revoked or suspended, 3.“Unknown”, OCSP is not aware of that certificate John Iliadis, PhD Workshop, Samos, October 2003 Slide 8 of 23 OCSP responses can contain three values concerning time: 1. thisUpdate, which indicates the time at which the CSI communicated to the requester was known to be correct, 2. nextUpdate, which indicates when the next update of CSI is expected to be available, 3. producedAt, which indicates the time at which the CSI communicated to the requester was signed by the entity that runs the OCSP service. 8
  • 32. CSI Mechanisms: Freshness-constrained Revocation Authority • Repositories of CSI need not be trusted • Separation of Certification Authority and Authority that issues CSI (Revocation Authority, RevA) • Dependent entity requires fresh enough CSI from certificate holder John Iliadis, PhD Workshop, Samos, October 2003 Slide 9 of 23 Freshness-constrained Revocation Authority proposes a revocation service where revocation can be definite, and where the repositories of revocation information need not be trusted. According to this service, the role of the Certification Authority (CA) is separated from the role of the Revocation Authority (RevA). The CA issues long-term certificates, which contain freshness constraints on the CSI the dependent entities will use in order to validate the certificates. Such a certificate also contains a pointer to the RevA that is responsible for issuing CSI regarding the specific certificate. The RevA issues frequently timestamped certificates which are used in order to provide the dependent entities with positive assertions regarding the validity of the certificate. The dependent entities themselves impose their own CSI freshness requirements, when certificate holders use their certificates in order to authenticate themselves. When a certificate holder attempts to authenticate, the dependent entity will impose its own freshness requirements and will expect from the certificate holder to provide a short-lived certificate, issued by the RevA, that fulfils these freshness requirements It is obvious that this method allows for flexible balancing of the authentication costs and level of protection on a per transaction basis. Furthermore, the CSI, that is the short-lived, timestamped certificate, need not be communicated from a trusted repository. . 9
  • 33. Evaluation Criteria: Type of Mechanism • Transparency, • Offline revocation, • Delegation of revocation, • Delegation of CSI dissemination, • Delegation of certificate path validation, • Referral capability, • Revocation reasons. John Iliadis, PhD Workshop, Samos, October 2003 Slide 10 of 23 M1. Transparency. Transparency in locating the CSI repository (CSI location function) and verifying that the CSI contained in that repository is the one the dependent entity is looking for (CSI validation function), M2. Offline revocation. Whether a user can revoke his certificate by himself without having to contact the respective CA, M3. Delegation of revocation. Delegation of the revocation by the CA to another authority, either another CA or another authority that operates only as a Revocation Authority (RevA) and not as a Certification Authority, M4. Delegation of the CSI dissemination. Delegation of CSI dissemination by the CA to another authority; the latter may be trusted by the dependent entities or not, depending on the mechanics of the CSI dissemination in each case, M5. Delegation of the certificate path validation. Delegation of the certificate path validation from the dependent entity to another entity; the dependent entity should be provided with the means to verify the origin of the validation result; in addition to that, the entity that performs the certificate path validation should be trusted by the dependent entity, M6. Referral capability. If the CSI repository does not contain the CSI the dependent entity is looking for, the repository could refer the dependent entity to another CSI repository that may contain the aforementioned CSI, M7. Revocation Reasons. The certificate path validation function should take into consideration the reasons for the revocation of a certificate (e.g. reasonCode in X.509v2 CRLs) in order to assert on the validity of a certificate in a certificate path. 10
  • 34. Evaluation Criteria: Efficiency • Timeliness of CSI, • Freshness of CSI, • Bounded revocation, • Emergency CSI capability, • Economy, • Scalability, • Adjustability. John Iliadis, PhD Workshop, Samos, October 2003 Slide 11 of 23 E1. Timeliness of CSI. Dependent entities should be able to locate and receive CSI on time, for them to use such information in authenticating entities or verifying the signatures of entities, E2. Freshness of CSI. How ‘fresh’ is the status information delivered to dependent entities, E3. Bounded revocation. New CSI should become available to the dependent entities within a bounded time period, E4. Emergency CSI capability. Facility to generate emergency CSI to the dependent entities (e.g. in case the certificate of an entity that many people use and trust has been revoked), E5. Economy. Economy should be examined both from the point of view of the authorities that control the use of certificates (e.g. Certification Authorities, Registration Authorities, Revocation Authorities) and from the point of view of the entities that use certificates (e.g. dependent entities, certificate holders). The CSI dissemination mechanism should not cause any obstacles, delays or disruptions in the normal working practice that the dependent entities and certificate holders follow. The CSI dissemination mechanism should not require from the dependent entities or certificate holders to have a clear and profound understanding of the mechanism itself, and interact to a great extent with the mechanism in order to make it operate properly. E6. Scalability. When the number of the CSI dissemination mechanism authorities and users (e.g. CAs, RevAs, dependent entities, certificate holders) increases, new problems or difficulties in the operation of the mechanism should not emerge. Scalability relates more to resources, in contrast to economy which relates more to infrastructure and mode of operation, E7. Adjustability. The dependent entities (or the CA, RevA as well) should be able to adjust the location or validation function operation in order to create a balance between performance and protection, depending on the requirements and the risk policy in each case. Ideally, the dependent entity should be able to do this, since it is the dependent entity that takes the risk. 11
  • 35. Evaluation Criteria: Security • CSI disseminator authentication, • CSI integrity, • CA compromise • RevA compromise, • Contained functionality, • Availability. John Iliadis, PhD Workshop, Samos, October 2003 Slide 12 of 23 S1. CSI disseminator authentication. Dependent entities must verify the origin of the CSI they receive. The CSI disseminator is usually the RevA (the service is operated by the CA) itself. If authentication is not used, a malicious entity pretending to be a trusted CSI dissemination entity, could provide the dependent entities with false CSI that appears to be valid, S2. CSI integrity. Verifying the integrity of the CSI, when it is stored in the CSI repository, transferred to the dependent entities and when it is stored in the dependent entities’ local repository. Such verification must be possible lest a malicious entity modifies the CSI in transit, before the dependent entity receives it; should this happen, the dependent entity may not realise that the received CSI is old, partial or invalid in any way, S3. CA compromise. The effects of a CA key being compromised should be minimised, S4. RevA compromise. There should be a mechanism for the dependent entities to know whether the RevA has been compromised. This mechanism must not be the same with the one used by the dependent entities in order to receive CSI on certificates that belong to entities other than the RevA, S5. Contained functionality. If RevA is compromised, it should not be possible for the entities that gained control of the RevA to issue new certificates, S6. Availability. The CSI dissemination mechanism has to be resilient against unreliable networks. 12
  • 36. The need for an alternative CSI mechanism • Dependent entities and certificate holders: – experienced computer-users ? – security aware ? • PKI security-related procedures have to be made more transparent (e.g. bank cards) John Iliadis, PhD Workshop, Samos, October 2003 Slide 13 of 23 Users are not necessarily experienced computer users; the majority of them are not sensitive or cautious enough about security measures. Even when they are, there are other reasons that could lead them into taking the wrong security decisions, such as “authorisation fatigue”. Security-related processes have to be made more transparent, for those users to be able to offer and receive securely electronic services. This is the reason why the use of credit and debit cards has expanded. End-users of the credit and debit card system (cardholders) and the respective dependent entities (e.g. merchants) do not need to take any special security measures in order to take advantage of the credit and debit card system. All they have to do is adopt simple human procedures in order to facilitate the operation of the underlying security system. This has to be done with PKI as well, in the long run. Authenticating entities, signers and dependent entities should not have to carry out special security procedures. There has to be a security infrastructure that allows them to profit from the use of certificates without them having to contribute to the operation of that security infrastructure, except for some simple procedures which would ensure that the security infrastructure works for their profit. 13
  • 37. An Agent-based mechanism • The transparency criterion has to be met: – Transparently locating CSI – Transparently retrieving CSI – Transparently validating CSI • Agent-based mechanism – using existing CSI mechanisms – providing an indirection layer between dependent entity and CSI mechanisms John Iliadis, PhD Workshop, Samos, October 2003 Slide 14 of 23 The transparency criterion has to be met, for CSI mechanisms to succeed in the distant future. A level of indirection could be added to them, using Software Agents that carry out the CSI location, retrieval and validation tasks a human would have to do otherwise. Agents residing in the domain of dependent entities’ will decide what CSI the dependent entities need or will need, roam the network in order to locate that CSI and retrieve it for the dependent entities once they are connected again to the network. The major difference of such a mechanism to the others would, or rather should, be transparency. Such a mechanism could use all CSI formats and mechanisms already presented; all the Agent will do is add a level of indirection, thus providing CSI mechanism transparency to the security unaware dependent entity. Such a mechanism is currently under research, at the University of the Aegean. We call it ADOCSI (Alternative Dissemination of Certificate Status Information). 14
  • 38. ADoCSI: Alternative Dissemination of Certificate Status Information The agents ADoCSI needs must be able to: 1. Suspend execution and resume it at another execution environment, 2. Retain their state, when transporting themselves to other execution environments, 3. Create child agents and deploy them, 4. Select a network location, out of a list of locations, with the least network congestion, 5. Communicate the retrieved information back to their owner or to their owner’s application that spawned the agent. John Iliadis, PhD Workshop, Samos, October 2003 Slide 15 of 23 15
  • 39. ADoCSI: Alternative Dissemination of Certificate Status Information Authenticating entity AE CSI AMP2 Signer SR referral CA1 CA-CSI Agent CA-CSI Agent CA2 CA-CSI Agent CSI AMP1 Dependent entity DE Interface Agent John Iliadis, PhD Workshop, Samos, October 2003 User-CSI Agent CA-CSI Agent CA3 Slide 16 of 23 16
  • 40. ADoCSI Recipe Ingredients 1. Agent Meeting Places (AMP) (also called Agent Platforms) 2. Dependent entity, 3. Authenticating Entity or Signer, 4. Certification Authority Certificate Status Information (CA-CSI) Agent, 5. User Certificate Status Information (User-CSI) Agent, 6. Interface Agent. John Iliadis, PhD Workshop, Samos, October 2003 Slide 17 of 23 17
  • 41. ADoCSI: Problems seeking solutions 1. How can the location function be implemented transparently ? 3. How can dependent entities retrieve and validate CSI transparently ? 5. How is a certificate path validated ? 7. What is the way this mechanism interacts with dependent entities ? John Iliadis, PhD Workshop, Samos, October 2003 Slide 18 of 23 18
  • 42. ADoCSI: Problems seeking solutions (2) 1. How are Agents protected from unauthorised modification or replacement ? 3. How can CSI carried by Agents be protected ? 5. How can an Agent tell a fraudulent Agent Meeting Place ? 7. How can AMPs be protected from DoS attacks ? John Iliadis, PhD Workshop, Samos, October 2003 Slide 19 of 23 19
  • 43. ADoCSI: Problems seeking solutions (8) 1. How can dependent entities be protected against User-CSI Agent replay attacks? 3. How are the Agent Meeting Places protected from malicious Agents ? 5. How can an Agent retrieve CSI for a dependent entity, without letting the AMP know which certificate did it retrieve CSI for ? John Iliadis, PhD Workshop, Samos, October 2003 Slide 20 of 23 20
  • 44. Q&A John Iliadis, PhD Workshop, Samos, October 2003 Slide 21 of 23 21
  • 45. References • PKI • Certificate Revocation • Software Agents’ Security John Iliadis, PhD Workshop, Samos, October 2003 Slide 22 of 23 [Adams98] Adams C., Zuccherato R., A General, Flexible Approach to Certificate Revocation, Entrust Technologies [EuDir99] Directive 1999/93/EC of the European Parliament and of the Council on a Community framework for electronic signatures, 13 December 1999. [Fox98] Fox B., LaMacchia B., Certificate Revocation: Mechanics and Meaning, In Proceedings of Financial Cryptography 98, LNCS 1465, New York, Springer Verlag [Gritz97] Gritzalis, S., Spinellis, D. Addressing Threats and Security Issues in World Wide Web Technology, In Proceedings of the 3rd IFIP International Conference on Communications and Multimedia Security, Chapman & Hall, 1997 [Gritz98] Gritzalis S., Iliadis J., Addressing security issues in programming languages for mobile code, In Proceedings of the DEXA '98 9th Workshop of Database and Expert Systems Applications, IEEE Computer Society Press, August 1998 [Hall98] Hallam-Baker P., Ford W., Enhanced CRL Distribution Options, IETF PKIX Working Group, Internet Draft, 7 August 1998, available at http://www.ietf.org/internet drafts/draft-ietf-pkix-ocdp-01.txt [Hous99] Housley R., Ford W., Polk W., Solo D., Internet X.509 Public Key Infrastructure Certificate and CRL Profile, , IETF Network Working Group, Request for Comments 2459 (Category: Standards Track), January 1999, available at http://www.ietf.org/rfc/rfc2459.txt [Iliad02] J. Iliadis, S. Gritzalis, D. Gritzalis, "ADoCSI: Towards an Alternative Mechanism for Disseminating Certificate Status Information", to appear 22
  • 46. References (2) • PKI • Certificate Revocation • Software Agents’ Security John Iliadis, PhD Workshop, Samos, October 2003 Slide 23 of 23 [Iliad00a] J. Iliadis, D. Spinellis, S. Katsikas, D. Gritzalis, B. Preneel. "Evaluating Certificate Status Information Mechanisms". In Proceedinds of the 7th ACM Conference on Computer and Communication Security: CCS '2000, pages 1-8. ACM Press, November 2000.3. [Iliad00b] Ioannis S. Iliadis, Diomidis Spinellis, Sokratis Katsikas and Bart Preneel, "A Taxonomy of Certificate Status Information Mechanisms", In Information Security Solutions Europe ISSE 2000, Barcelona, Spain, September 2000. European Forum for Electronic Business. [ISO9594] Framework. ISO/IEC 9594-8 (1994), Open Systems Interconnection - The Directory: Authentication [Micali96] Micali S., Efficient Certificate Revocation, Technical Memo 542b, Laboratory for Computer Science, Massachusetts Institute of Technology, March 1996 [Myer99] Myers M., Ankney R., Malpani A., Galperin S., Adams C., X.509 Internet Public Key Infrastructure Online Certificate Status Protocol, IETF Network Working Group, Request for Comments 2560 (Category: Standards Track), January 1999, available at http://www.ietf.org/rfc/rfc2560.txt [Naor98] Naor M., Nissim K., Certificate Revocation and Certificate Update, In Proceedings 7th USENIX Security Symposium, Jan 1998, San Antonio, Texas [Rivest98] Rivest R., Can We Eliminate Revocation Lists?, In Proceedings of Financial Cryptography 1998, available at http://theory.lcs.mit.edu/~rivest/revocation.ps [Stub95] Stubblebine S. G., Recent-Secure Authentication: Enforcing Revocation in Distributed Systems, In Proceedings IEEE Symposium on Research in Security and Privacy, pages 224-234, May 1995, Oakland [X.509] ITU-T Recommendation X.509 (1997 E): Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, June 1997 23