24
Re-using existing PKIs for online Identity Management Martijn Oostdijk Novay 22/10/09 | Session ID: 305 Classification: Intermediate

Re-using existing PKIs for online Identity Management

Embed Size (px)

DESCRIPTION

Using ePassports with Information Card. Presented at RSA Conference Europe 2009.

Citation preview

Page 1: Re-using existing PKIs for online Identity Management

Re-using existing PKIs for online Identity Management

Martijn OostdijkNovay22/10/09 | Session ID: 305

Classification: Intermediate

Page 2: Re-using existing PKIs for online Identity Management

2

Agenda

Electronic Passports

A short introduction to Identity 2.0

Using the ePassport PKI for online IdM

Conclusions

Page 3: Re-using existing PKIs for online Identity Management

How to apply what you learn here?

• I will demonstrate how third parties (you?) can piggyback “traditional” PKI infrastructure to facilitate your organization’s IdM

• You are invited to come and discuss pros and cons of the combination of PKI and user-centric IdM

• You will understand the risks involved and benefits of this combination, and be able to judge whether it is cost-effective for your organization

Educate + Learn = Apply

Page 4: Re-using existing PKIs for online Identity Management

An Introduction to Identity 2.0

Page 5: Re-using existing PKIs for online Identity Management

Web / Identity 2.0 means…

“Everybody knows you’re not a dog.”

Page 6: Re-using existing PKIs for online Identity Management

An attempt to define “Identity”

• Identity is what you and others claim about you

• In real life, whether you trust a claim– Depends on context,

– Depends on “authorities” or “Identity Providers”

• parents, school, government– Depends on “Identity Providers by proxy”

• signed note, diploma, passport, driver’s license

• On the Internet there is little context

• Identity Providers needed for trust

Page 7: Re-using existing PKIs for online Identity Management

Identity Management

Client(C)

Relying Party(RP)

Identity Provider(IdP)

Would like to use service

Facilitates this process by- checking credentials of C- controlled release of attributes about C

Page 8: Re-using existing PKIs for online Identity Management

8

Online or offline IdP?

Online IdP

• Redirect RP to IdP

• Drawback: single point of failure

• Drawback: infrastructure cost

• Drawback: privacy?

Offline IdP

• IdP signed an identifier for client to present to RP

• No single point of failure

• Drawback: revocation

• No need to trust IdP w.r.t. privacy

• Drawback: can we trust user / user’s PC to store identifier?

Page 9: Re-using existing PKIs for online Identity Management

What is Identity 2.0?

• Identity 2.0 is User-centric Identity

• The user is in control over what information is shared with RP

• Two standards are popular:– OpenID

– Information Card

• Hot or hype? (Like everything 2.0?)

• We’ll focus on Information Card here

Page 10: Re-using existing PKIs for online Identity Management

Laws of Identity 2.0

By Kim Cameron of Microsoft1. User control

2. Minimal disclosure, constrained purpose

3. Justifiable parties

4. Directed identity

5. Pluralism of operators and technologies

6. Human integration

7. Consistent experience across contexts

Explained for dummies:

• People using computers should be in control of giving out information about

themselves, just as they are in the physical world.

• The minimum information needed for the purpose at hand should be

released, and only to those who need it. Details should be retained no longer

than necesary.

• It should NOT be possible to automatically link up everything we do in all

aspects of how we use the Internet. A single identifier that stitches

everything up would have many unintended consequences.

• We need choice in terms of who provides our identity information in different

contexts.

• The system must be built so we can understand how it works, make rational

decisions and protect ourselves.

• Devices through which we employ identity should offer people the same

kinds of identity controls - just as car makers offer similar controls so we can

all drive safely.

Page 11: Re-using existing PKIs for online Identity Management

Information Card

• Open standard (sort of)

• Self-signed cards: Attributes kept at client

• Managed cards: Attributes kept at IdP

• Windows CardSpace is Microsoft’s implementation

• To prevent phishing: GUI dialog leaves context of OS

Page 12: Re-using existing PKIs for online Identity Management

Electronic Passports

Page 13: Re-using existing PKIs for online Identity Management

ePassport

• Issued by government, standardized by ICAO

• Contains chip with– Information about card holder

– Mechanism to verify integrity of that information

– Mechanism to verify authenticity of chip

– Mechanism to communicate confidentially

• Tested and found “secure” up to EAL4+

• Intended for verification by border official’s equipment

• (Not intended for online verification)

Page 14: Re-using existing PKIs for online Identity Management

ePassport

Chip

Logo

MRZ

Antenna

Page 15: Re-using existing PKIs for online Identity Management

Logical Data Structure

hashes DGs + signature issuing stateSOd

public key for Active AuthenticationDG15

[some people with really long names][DG11]

photo faceDG2

name, etc, a.o. date of birth and BSNDG1

index of DGs presentCOM

Page 16: Re-using existing PKIs for online Identity Management

16

ePassport security mechanisms

CONTROLS:

• Basic Access Control

• Passive Authentication

• Active Authentication

• Extended Access Control

• Biometry

THREATS:

• Skimming & tracking (privacy)

• Eavesdropping (privacy)

• Altering (authenticity, integrity)

• Cloning (authenticity)

• Disclosure of biometrics (confidentiality)

• Look-a-like fraud

Page 17: Re-using existing PKIs for online Identity Management

ePassports form a worldwide PKI!

• Passive authentication means:– Data groups signed by “document signer”

– Document signer’s certificate signed by “country signer”

• Country signer’s certificate is given to other countries so that they can verify integrity and authenticity– Sometimes on government’s web site

– In that case, third parties can read content after performing BAC

• Can ePassports be used in Identity 2.0 scheme such as Information Card?

Page 18: Re-using existing PKIs for online Identity Management

Using the ePassport PKI for online IdM

Page 19: Re-using existing PKIs for online Identity Management

ePassport + CardSpace

User

Card Space

Hosted at IDP

Run at clientNFC Device(hardware)

Security Token

Service

SOCKET

CLIENT

RELYING PARTY

IDENTITY PROVIDER

Web Server

Page 20: Re-using existing PKIs for online Identity Management

Information Card protocol

1. Access2. Policy

3. Filter cards

4. Select card

5. Request token

6. Give token

7. Give token

5/6. BAC + AA + DG1 + DG15 + SOd

IdP Client

RP

User

Page 21: Re-using existing PKIs for online Identity Management

Result

• An online IdP can verify a user’s ePassport remotely– If the ePassport supports Active Authentication,

– and Basic Access Control (and BAC keys known to the IdP),

– and the country signing certificate is known to the IdP

• If data is protected by EAC– ePassport issuing countries can limit access to selected IdPs

• The IdP can translate attributes– To protect privacy

– E.g. date-of-birth becomes “currently over 18 years of age”

– User still in control of what gets sent to RP

Page 22: Re-using existing PKIs for online Identity Management

Conclusions

Page 23: Re-using existing PKIs for online Identity Management

Conclusions

• Trend: Identity 2.0 (user-centric)

• Trend: governments rolling out massive worldwide PKI

• Such a PKI is very 1.0, but can be used in an Identity 2.0 scheme– Although role of IdP is somewhat different:

• A trusted online IdP is good for privacy– IdP translates “raw” attributes (such as date-of-birth) to more

privacy friendly attributes (such as “currently over 18 years of age”)

– Combining offline and online identity management offers some flexibility in terms of privacy protection

Page 24: Re-using existing PKIs for online Identity Management

Questions?