44
Federal Agencies and PKI Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee [email protected]; 202-622-1552 http://gits-sec.treas.gov

Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee [email protected];

Embed Size (px)

Citation preview

Page 1: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Federal Agencies and PKIFederal Agencies and PKI

Richard Guida, P.E.

Member, Government Information Technology Services Board

Chair, Federal PKI Steering Committee

[email protected]; 202-622-1552

http://gits-sec.treas.gov

Page 2: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

E-Transaction LandscapeE-Transaction Landscape

• Intra-agency– personnel matters, agency management

• Interagency– payments, account reconciliation, litigation

• Agency to trading partner– procurement, regulation

• Agency to the public

Page 3: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

E-Transactions DriversE-Transactions Drivers

• Long-term cost savings

• Trading partner practices (e.g., banks)

• Public expectations

• Federal/State Statutes (e.g., GPEA) and policies

• International competition

Page 4: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Challenges All Applications FaceChallenges All Applications Face

• Authentication of Users

• Non-repudiation for transactions

• Confidentiality (privacy)

• Interoperability

• Liability

• Scalability/extensibility

Page 5: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Public Key TechnologyPublic Key Technology

• Authentication

• Technical non-repudiation

• Data integrity

• Confidentiality

• Interoperability

• Scalability/extensibility

Page 6: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

6

How PK Technology WorksHow PK Technology Works

• Two keys, mathematically linked

• One is kept private, other is made public

• Private not deducible from public

• For digital signature: One key signs, the other validates

• For confidentiality: One key encrypts, the other decrypts

Page 7: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Digital Signature (exampleDigital Signature (example)

• Sender hashes document, signs hash with private key and sends with document

• Recipient hashes document he or she received, creating “raw hash”

• Recipient applies public key of sender to signed hash to get sender’s raw hash

• If raw hashes are same, transaction validates

Page 8: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Confidentiality (example)Confidentiality (example)

• Sender generates symmetric encryption key and encrypts document with it

• Sender encrypts symmetric key with public key of recipient, sends that and encrypted document to recipient

• Recipient decrypts symmetric key with his or her private key

• Recipient decrypts document with symmetric key

Page 9: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

The Critical QuestionsThe Critical Questions

• How can the recipient know with certainty the sender’s public key? (to validate a digital signature)

• How can the sender know with certainty the recipient’s public key? (to send an encrypted message)

Page 10: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

A document which -

• is digitally signed by a trusted third party (called Certification Authority)

• is based on identity-proofing done by a Registration Authority

• contains the individual’s public key and some form of the individual’s identity

• has a finite validity period

Public Key CertificatePublic Key Certificate

Page 11: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

11

X.509 v3 CertificateX.509 v3 Certificate

Page 12: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Public Key InfrastructurePublic Key Infrastructure

• Registration Authorities to identity proof users

• Certification Authorities to issue certificates and CRLs

• Repositories (publicly available data bases) to hold certificates and CRLs

• Some mechanism to recover data when encryption keys are lost/compromised

• Certificate Policy and related paper

Page 13: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Intra-Agency PKI ExamplesIntra-Agency PKI Examples

• DOD (~50K+ certs => >>4M certs by 2002; high assurance with smartcards)

• FAA (~1K certs => 20K+ certs in 2000; software now, migrating to smartcards)

• FDIC (~1K certs => 7K+ certs in 2000)

• NASA (~1K certs => 25K+ certs in 2000)

Page 14: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Potential Interagency UsesPotential Interagency Uses

• VA and SSA on medical evidence

• Dept of Education, SSA, VA on student loan applications, disbursements, etc.

• USDA/NFC for on-line payroll matters

• DOD/Treasury re: payments

• FDIC/other financial regulators re: sharing information

Page 15: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Federal PKI ApproachFederal PKI Approach

• Establish Federal PKI Policy Authority

• Develop/deploy Bridge CA using COTS– Four levels of assurance (emulate Canada)– Prototype early 2000, production mid 2000

• Deal with directory issues in parallel– Border directory concept; “White Pages”

• Use ACES for public transactions

Page 16: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

FPKIPA and Bridge CA TopicsFPKIPA and Bridge CA Topics

• Federal PKI Policy Authority Overlay

• FBCA Overview

• Technical Boundary Conditions

• Policy/Political Boundary Conditions

• Potential Architectures

• Current Status

• Schedule

Page 17: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Federal Policy Authority OverlayFederal Policy Authority Overlay

• Federal PKI Policy Authority facilitates interoperability through FBCA (e.g., determines cert policy mappings)

• All agencies that interoperate through FBCA are voting members

• FPKIPA members = FPKISC members

• Interoperability through the FBCA is NOT required (but hopefully attractive)

Page 18: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

FBCA OverviewFBCA Overview

• Non-hierarchical hub for interagency interoperability

• Ability to map levels of assurance in disparate certificate policies

• Ultimate “bridge” to CAs external to Federal government

• Directory contains only FBCA-issued certificates and ARLs

Page 19: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

FBCA PKI Architecture

US Federal

Page 20: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Technical Boundary ConditionsTechnical Boundary Conditions

• Comply with FIPS (140-1, 186)– Level 3 Crypto Module for FBCA

• Meet MISPC to maximum extent practical

• Interoperate with as many COTS as possible

• Comply with X509V3 (certs, policy processing)

Page 21: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Policy/Political Boundary ConditionsPolicy/Political Boundary Conditions

• Desire to use COTS if possible

• Desire solution which is as fully “inclusive” for vendors as possible

• Support four levels of assurance– Rudimentary, Basic, Medium, High– Analogous to Canadian PKI

• FBCA use not mandatory

• Requirements focus on agencies as certificate issuers, not relying parties

Page 22: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Potential ArchitecturesPotential Architectures

• Multiple CAs within membrane, with single signing key

• Single CA

• Multiple CAs within membrane, cross-certified among themselves

Page 23: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Multiple CAs, One KeyMultiple CAs, One Key

• Avoids cross-certification within membrane, so:– minimizes certificate path length– reduces overall path processing complexity

• May require porting key to other tokens (allowed under 140-1 if encrypted)

• Creates complications in directory postings for ARLs and cross-certs to external CAs

Page 24: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Single CASingle CA

• Most straightforward technical solution

• Pushes interoperability issues to Bridge membrane

• Is worst political solution– one winner, many losers– non-inclusionary

Page 25: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Multiple CAs, Cross-certifiedMultiple CAs, Cross-certified

• In essence, the “quark” model

• Certificate path length may be +1

• Adding CAs within membrane should be straightforward albeit not necessarily easy

• Requires solving inter-product interoperability issues within membrane rather than outside - which is good

Page 26: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Current StatusCurrent Status

• Decision: cross-certified CAs within membrane

• Initial vendor products: Entrust and GTE for “prototype” FBCA

• Migration from prototype to production FBCA will entail adding other CAs inside the membrane

• GSA/FTS has responsibility to execute

Page 27: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

ScheduleSchedule

• Draft Bridge Certificate Policy: late 1999

• Draft FPKIPA Charter/CONOPS: late 1999

• Prototype Bridge: early 2000

• Operational Bridge: mid to late 2000

Page 28: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

28

Initial Border Directory ConceptInitial Border Directory Concept

• Each agency would have Border Directory for certificates and CRLs– may shadow all or part of local directory

system (allows for agency discretion)– CAs may publish directly in border directory – unrestricted read access

• Directory resides outside agency firewall– chain (X.500 DSP) to FBCA DSA

Page 29: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Initial Border Directory ConceptInitial Border Directory Concept

InternalDirectory

Infrastructure

PCA 2

FBCADSA

InternalDirectory

Infrastructure BorderDSA 2

X.500 DSA

BorderDSA 1

X.500 DSA

PCA 1

Agency 1 Agency 2

FBCA

DSP

chaining

DSP

chai

ning

Page 30: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

30

Concerns with Initial ConceptConcerns with Initial Concept

• Agencies must stand up X.500 DSA

• But:– Some agencies have no X.500 directories;

instead use LDAP servers (and may be tied to OS or major applications), proprietary, or nothing

– X.500 DSAs seen as expensive; initial cost, plus care and feeding (X.500 DSAs complex, and chaining can be challenging)

Page 31: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

31

Expanding the ConceptExpanding the Concept

• Approach must provide for more than just agency X.500 directories

• FBCA directory can be directory nexus– Link to X.500 border DSAs via DSP chaining– Link to LDAP oriented agencies via referrals

• There are other possibilities– CIO Council “White Pages”– GSA– Commercial services

Page 32: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Expanded FBCA Directory ConceptExpanded FBCA Directory Concept

InternalDirectory

Infrastructure

PCA 2

FBCADSA

InternalDirectory

Infrastructure BorderDSA 2

X.500 DSA

BorderDSA 1

LDAP Server

InternalDirectory

Infrastructure

PCA 1 PCA 3

Agency 1 Agency 2

Agency 3

FBCA

LD

AP

Que

ry-R

espo

nse

X.500 - D

SP

chaining

Page 33: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Access Certs for Electronic ServicesAccess Certs for Electronic Services

• “No-cost” certificates for the public

• For business with Federal agencies only (but agencies may allow other uses on case basis)

• On-line registration, vetting with legacy data; information protected under Privacy Act

• Regular mail one-time PIN to get certificate

• Agencies billed per-use and/or per-certificate

Page 34: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Access Certs for Electronic ServicesAccess Certs for Electronic Services

• RFP 1/99; bids received 4/99; first award 9/99 (DST), second award 10/99 (ORC)

• Contract has provisions for ACES-enabling applications

• Agency’s do interagency agreement with GSA

• Certificates available within three to six months

Page 35: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Electronic Signatures under GPEAElectronic Signatures under GPEA

• Government Paperwork Elimination Act (October 1998)

• Technology neutral - agencies select based on specifics of applications (e.g., risk)

• Gives electronic signature full legal effect• Focus: transactions with Federal agencies• Draft OMB Guidance 3/99; final 4/00

Page 36: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

OrganizationOrganization

O ffice o f M an ag em en t an d B u d g et

B u s in ess W G Tech n ica l W G L eg a l/P o licy W G

F ed era l P u b lic K ey In fras tru c tu re S teerin g C om m ittee

G overn m en t In fo rm ation Tech n o log y S ervices B oard

N ation a l P artn ersh ip fo r R e in ven tin g G overn m en t

O F F IC E O F TH E V IC E P R E S ID E N T

Page 37: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Federal PKI Steering CommitteeFederal PKI Steering Committee

• Over 50 members from two dozen agencies• Three Working Groups

– Business– Technical– Legal and Policy

• Minutes/activities on the web• http://gits-sec.treas.gov

Page 38: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

PKI Use and Implementation IssuesPKI Use and Implementation Issues

• Misunderstanding what it can and can’t do

• Requiring legacy fixes to implement

• Waiting for standards to stabilize

• High cost - a yellow herring

• Interoperability woes - a red herring

• Legal trepidation - the brightest red herring

Page 39: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Misunderstanding what it can and can’t doMisunderstanding what it can and can’t do

• Technical vs. legal non-repudiation– Probably to the former, possibly to the latter

• Establishing a PKI <> making clients PKI-aware– Building the highway is not the same as

building the cars that ride on the highway

Page 40: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Requiring legacy fixes to implementRequiring legacy fixes to implement

• Fixing directory anarchy– Don’t expect directory problems to abate -

they will be exacerbated

• Mapping to legacy data bases– Back end applications remain

Page 41: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Waiting for standards to stabilizeWaiting for standards to stabilize

• Far too much to expect– Evolution is constant process, it does not stop

for anyone

• And, not necessary– Internet standards are not stable but it still

works (fitfully at times…)– PKI standards are good enough for enterprise

deployment, getting there for interoperability

Page 42: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

High cost - a yellow herringHigh cost - a yellow herring

• Cost of ownership is not low– Registration, certificates, CRLs, PKI-aware

clients, repositories, directories, and so on

• But, compared to what?– Multiple stove-piped PIN applications with

poor security?

Page 43: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Interoperability woes - a red herringInteroperability woes - a red herring

• Interoperability often not needed in enterprise applications (single product)

• Even where needed, interproduct interoperability getting much better (Federal Bridge CA will help drive)

• No reason to delay use of this technology

Page 44: Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee Richard.Guida@cio.treas.gov;

Legal trepidation - the brightest red herringLegal trepidation - the brightest red herring

• PK technology is NOT the most complex subject presented in a courtroom

• Case law only develops when you use something

• Technology and commerce marches on regardless of legal uncertainties

• Unreasonable to demand standard of proof higher than in paper world