12
Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

Embed Size (px)

DESCRIPTION

December 13, 20023: Virtual Smart Card Solitary Private Keys Premise: Never give a user their private key Can’t mishandle something you don’t have stronger Can provide a stronger security guarantee Signed cert as secure as institution’s accounts Must provide agent-based key handling E.g., smart cards

Citation preview

Page 1: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

Virtual Smart Card

Andrew HanushevskyRobert Cowles

Stanford Linear Accelerator Center

Page 2: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 2: Virtual Smart Card

Enmeshed Private Keys

Premise: Private keys and users don’t mix Inherently insecure model

No guarantee of good or any password choice No guarantee of secure private key location

E.g., users store keys in network based file systems No guarantee how private key was handled

E.g., users copy/e-mail keys to remote machines & leave them

User managed keys cannotcannot be trusted

Page 3: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 3: Virtual Smart Card

Solitary Private Keys

Premise: Never give a user their private key Can’t mishandle something you don’t have

Can provide a strongerstronger security guarantee Signed cert as secure as institution’s accounts

Must provide agent-based key handling E.g., smart cards

Page 4: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 4: Virtual Smart Card

Virtual Smart Card (vsc)

Premise: Physical smart cards (psc) in software vsc’s have a 1-to-1 concept correspondence to psc’s

Concept Physical VirtualProcurement Purchase/download Request/generatePossession Physical AuthenticationOperations Indirect IndirectTamper protection Self-destruct Restricted accessTheft protection Settable pin Settable password

Page 5: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 5: Virtual Smart Card

VSC Conceptualization

A vsc is implemented using a secure, access restricted server One server holds many user’s private keys

Hence, one server instantiates many vsc’s Can be well secured

Restricted physical access Cages, keyed room, etc.

Restricted logical access Only three access protocols needed: dns, ntp, and vsc

Keys can be encrypted via user-supplied passwords

Page 6: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 6: Virtual Smart Card

VSC Procurement

1. Ask for a cert

2. Generate keys and send cert request

3. E-mail cert url

User never sees the private key!

CACA

4. Download CA signed public cert*

*When available on 1st request or automatic poll.

Page 7: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 7: Virtual Smart Card

VSC Operation (vsc-proxy)

2. Generate proxy public/private key

3. Sign proxy certSign proxy cert

Private key never sees the network!

1. Get public certGet public cert

Externally authenticatedExternally authenticated (e.g., Kerberos)

Page 8: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 8: Virtual Smart Card

VSC Theft Protection

1. Generatekey-string from a

strong user password

2. Send encrypted key-stringSend encrypted key-string

Externally authenticatedExternally authenticated (e.g., Kerberos)

3. Encrypt user’s x509 private key and

discard key-string

User must now supply key-string for vsc to use private key

Page 9: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 9: Virtual Smart Card

VSC Advantages I

Simple and effective Models well-known physical object -- smart card Initial certificate request is trivial

Private keys never exposed Can be further encrypted by user

Can get proxy cert anywhere in the world No need to copy public/private keys

Page 10: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 10: Virtual Smart Card

VSC Advantages II

Can provide special extensions EDG VOM extensions (natural fit)

Can provide special always-on services Perhaps proxy cert revalidation

Can provide strongerstronger security guarantee Signed cert as secure as institution’s accounts

Page 11: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 11: Virtual Smart Card

VSC Disadvantages

Private keys are concentrated Can be user-encrypted Similar problem in Kerberos

May violate current CA CP/CPS Political vs. practical reality

No more secure than external authentication Need good authentication (e.g., K5)

Page 12: Virtual Smart Card Andrew Hanushevsky Robert Cowles Stanford Linear Accelerator Center

December 13, 2002 12: Virtual Smart Card

Conclusion

Virtual Smart Cards effective Simple, relatively transparent, secure

Provides a path to more stringent security Physical smart cards

Simplify user’s lives Ease of use reduces security lapses

Promotes a congenial grid security environment!