copyright statement copyright robert j. brentrup 2005. this work is the intellectual property of the...

24
Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Upload: stuart-stanley

Post on 17-Dec-2015

225 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Copyright Statement

• Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 2: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Delegated Guest Access to Secure Networks

Robert Brentrup

Educause Poster Session

October 19, 2005

Page 3: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Network Security• Wireless networks are inherently more vulnerable

– No longer need to be inside a building– Anyone in range can listen– Have to expect uninvited “guests”

• Wired Equivalent Privacy (WEP) intended to protect traffic between the supplicant and access point.

– WEP has encryption flaws which diminish its effectiveness.

• WiFi Protected Access (WPA2) provides a stronger encryption scheme

– and supports a wider range of authentication techniques.

Page 4: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Problem

• If authenticated access is implemented– to limit use to members of the community– and to enable strong data encryption

• How do guests access the network conveniently?– Visitors are a daily occurence– Don’t want multi-day process to get a guest

account approved and created

Page 5: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Motivation for System

• Visitors are given access to labs by host

• Already allow sponsored accounts for longer time periods– But overheard is too high for short visit

• Why not allow local users to delegate privileges to guests?– Would give immediate access– Delegation allows decentralized authorization

Page 6: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Design Goals• Provide access to authorized guests• Guests may use comprehensive services granted to

local users• Require strong access control• Use standard protocols• Timeframe of authorization limited• Do not require central control• Provide audit trail• Prefer to use PKI authentication

Page 7: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Greenpass Solution• Use 802.1x protocol for authentication

– Works for Wireless or VPN

• Use EAP/TLS to identify users• Use RADIUS server for authorization decision

– Recognize some X.509 certificate issuers– Allow local users to delegate network access permission– SPKI certificate delegation chain– Recognized by small RADIUS modification– HTTP Cookies simplify use

• No user software install required• Client Java tool for delegation

Page 8: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Design: Information Flow

Page 9: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Hybrid PKI

Page 10: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Why SPKI/SDSI?

• Focuses specifically on the problem of authorization that we are trying to solve.

• Provisions for delegation of authority naturally gives rise to the distributed model of delegated access that we envisioned.

• Simple and lightweight, easy to work with.

• Guest access is tied directly to the guest’s public key rather than indirectly through the guest’s name.

Page 11: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Block Diagram

Page 12: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Guest Unauthorized

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 13: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Guest Introduction

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 14: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Guest Fingerprint

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 15: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Authorized Delegator

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 16: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Select Guest

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 17: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Guest Lookup

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 18: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Delegation Tool

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 19: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Delegation Complete

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 20: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Guest Authorized

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 21: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Authorized User

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

Page 22: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Results

• Greenpass incorporates SPKI/SDSI with existing PKI standards to create an authentication scheme that is decentralized and not cumbersome to users.

• Published Open Source Components:

– Delegation Server, Introduction Cache

– Delegation Signing Tool

– Authorization Certificate Cache

– Radius modifications

Page 23: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Future Work

• Finer grained definition of authorization.

• Alternatives to SDSI/SPKI

• No X.509 PKI ? – everyone is a guest.

• Support for other devices (PDAs, VoIP devices).

Page 24: Copyright Statement Copyright Robert J. Brentrup 2005. This work is the intellectual property of the author. Permission is granted for this material to

Credits, Contacts and Links• Primarily designed by Nicholas Goffee and Sung Kim as their Master's degree

thesis projects advised by Prof. Sean Smith.

– Other contributors to the Greenpass project are: Kwang-Hyun Baek, Meiyuan Zhao, John Marchesini, Chris Masone, Punch Taylor, Robert Brentrup and Nick Santos.

• For Further Information

– Sean Smith - [email protected]

– Robert Brentrup - [email protected]

• www.dartmouth.edu/~pkilab/greenpass/

• www.cs.dartmouth.edu/reports/abstracts/TR2004-484/