Lecture9-PKIA 2022-Evolving Role of PKIs in Facilitating Trust Over The Internet
Lecture9-PKIA 2022-Evolving Role of PKIs in Facilitating Trust Over The Internet
in Facilitating
Trust over the Internet
Vishwas Patil
Senior Research Scientist, IIT Bombay
1) Create
2) Store
3) Distribute
4) Revoke
digital certificates.
In 1988, ITU-T released the X.509 standard outlining the set of roles, policies,
hardware, software and procedures needed to manage certificates.
PKI - Digital Certificate
Digital certificates are by far the most widely used technique to safeguard
electronic communications and transactions.
CA⟨⟨AMAZON⟩⟩
PKI - Components
Observation
Observation
Natural Entity Legal/Virtual Entity
Org3
PKI CA acts as a Trust Anchor
Root2
Org3
PKI CA acts as a Trust Anchor
Root2
Org3
Cross Certification (Trust Transition)
Security has a UI/UX Problem
● Secure connection = Green
● Insecure = Red
● Neither instance shows the details
behind the decision
● Once trusted, always trusted
(intermediate nodes in a trust
chain/path)
In X.509, trust decisions are binary
Authentication is the primary objective
Types of PKI Deployments (public, private)
Digital Certificate (Key) as a Credential
Banking
Enterprise WiFi
Satellite TV
Telecom
Authentication as Implied Authorization
PKI - Issues
1) Create (duration, CSR, validation, …)
2) Store (Key management)
3) Distribute (CRLs)
4) Revoke (Pinning, Stapling)
Alternative PKIs
● PGP (Pretty Good Privacy)
Top-down vs Bottom-up
Retrofittings done to the PKI
X.509 Versions
X.509 Versions (Current version is V3)
X. 509 v3 extensions provide for the association of additional attributes with users
or public keys.
CA⟨⟨AMAZON⟩⟩
Wildcard Certificate
Certificate Pinning/Stapling
Certificate and Keys are hard coded and not checked for revocation!
Mobile apps
Hardware devices
IoTs
…
Trusted Lists Initiative in EU
Trusted Lists
EuroPKI 2009
CA⟨⟨AMAZON-Key⟩⟩
CA⟨⟨AMAZON⟩⟩
Security & Privacy considerations
DigiNotar CA compromised, 2011
Certificate Transparency
RFC 6962
● DANE needs the DNS records to be signed with DNSSEC for its security
model to work.
A MITM will need to use a different certificate that the MITM controls, in order to
read and/or manipulate the data exchanged.
If the connection between client and server is influenced by a MITM, then the
certificates seen will be different based on the perspectives.
If the information returned by the notary is different than the information seen by
the client, then the client probably shouldn’t trust the information presented by the
server
Trusted-Third-Party is a Persistent Witness!
● OCSP requires a check on validity of a digital certificate before its usage
● This check leaves a log at the OCSP server about an interested party
(requester) trying to contact/authenticate another entity
● The OCSP logs at CRL servers have end-user privacy violation potential
● The recent Certificate Transparency initiative exposed identifiers of internal
resources of organizations that were supposed to be private.
Sovereign Keys
● The Sovereign Keys design allows clients and servers to use cryptographic
protocols without having to depend on any third parties after the moment the
server creates a Sovereign Key.
● Sovereign Keys are created by writing to a semi-centralized, verifiably
append-only data structure.
● The main requirement for being able to do this is that the requesting party
controls a CA-signed certificate for the relevant domain, or uses a
DNSSEC-signed key to show that they control that domain.
Sovereign Keys (contd.)
● Master copies of the append-only data structure are kept on machines called
”timeline servers”.
● There is a small number, around 10-20, of these.
● The level of trust that must be placed in them is very low, because the
Sovereign Key protocol is able to cryptographically verify the important
functions they perform.
● Sovereign Keys are preserved so long as at least one server has remained
good.
Alternative efforts: pros & cons
Authentication & Authorization (Expressive+Effective)
● X.509
● PGP
● SPKI/SDSI
● Kerberos
● SSO: OAuth, OpenID
● Policy languages: SAML, XACML
● Evolving space
Authentication as a Service
Recent advancements in blockchain technology now allow every public key to
have its own address, which is called a decentralized identifier (DID).
flexi-ACL
A framework to
encapsulate, evaluate
credentials provided by
various trusted parties
and enforce them
dynamically.
flexi-ACL Typical Structure
flexi-ACL Rule Examples
flexi-ACL Rule Block
Recap
1. We do not have a uniform, global criteria for identity representation.
dynamic
Should there be a singular technology to
manage Trust over the Internet?
Building a Dynamic Trust Management System
Thank you.
[email protected]
Security measures
In
iti
al
Tr
us
t
Tr
ust
O
ve
rT
im
e
Time till next reload/refresh
La
ck
of
Tr
u st