pki & personal digital certificates, securing sensitive electronic communications, by nicholas...

61
PKI & Personal Digital Certificates, The Key to Securing Sensitive Electronic Communications MATC April 22, 2010 Nicholas Davis

Upload: nicholas-davis

Post on 16-Jan-2015

210 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

PKI & Personal Digital Certificates, The Key to Securing Sensitive

Electronic Communications

MATCApril 22, 2010

Nicholas Davis

Page 2: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

OverviewWhy is electronic privacy such a hottopic these days?Watch videoWhat is a digital certificate?What is PKI?Why are these technologies important?Trusted Root AuthoritiesUsing digital certificates for email encryptionKey Escrow, the double edged swordIntegrating digital certificates into email forsecurityNew uses for digital certificatesHow is PKI related to SSL?Using certificates for code signing ofsoftwareNSA conspiracy theoriesReal world issues with PKIDiscussion

Page 3: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Why is Electronic Privacy Such a Hot Topic Today?

• Evolution of the Internet, commerce, banking, healthcare

• Dependence on Email• Government regulations, SOX,

HIPAA, GLB, PCI, FERPA• Public Image• Business warehousing• Industrial Espionage• The United States government!

Page 4: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

The Topic is More Interesting When It Affects You!

Page 5: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Intercepting Your Electronic Communications

Page 6: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital certificates canprotect your

sensitive electronicinformation in multiple

WaysEncryption, Digital Signing and

Authentication

Page 7: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Discussion Topic One• Do you think the threat of Email

eavesdropping is real?• What about the government’s argument

about Email being like a “postcard?”• Should DOA be allowed to look at

DWD emails on a public network?• Are you angry now, or just afraid?• Who has the responsibility in this

situation?

Page 8: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What is a Digital Certificate?

Page 9: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Certificate Terminology Defined

Digital CertificateElectronic Passport

Good for authentication

Good non-repudiation

Proof of authorship

Proof of non-altered content

Encryption!

Better than username - password

Page 10: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What is in a Certificate?

Page 11: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Public and Private Keys

The digital certificate has two parts, aPUBLIC key and a PRIVATE keyThe Public Key is distributed toeveryoneThe Private Key is held very closelyAnd NEVER sharedPublic Key is used for encryption andverification of a digital signaturePrivate Key is used for Digital signing anddecryption

Page 12: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Public Key Cryptography

Page 13: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Getting Someone’s Public Key

The Public Key must be shared to beUsefulIt can be included as part of yourEmail signatureIt can be looked up in an LDAPDirectoryCan you think of the advantages anddisadvantages of each method?

Page 14: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Who Could This Public Key Possibly Belong To?

Page 15: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What is PKI?

• PKI is an acronym for Public Key Infrastructure

• It is the system which manages and controls the lifecycle of digital certificates

• The PKI has many features

Page 16: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What Is In a PKI?

• Credentialing of individuals

• Generating certificates

• Distributing certificates

• Keeping copies of certificates

• Reissuing certificates

• Revoking Certificates

Page 17: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Credentialing

• Non technical, but the most important part of a PKI!

• A certificate is only as trustworthy as the underlying credentialing and management system

• Certificate Policies and Certificate Practices Statement

Page 18: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Certificate Generation and Storage

• How do you know who you are dealing with in the generation process?

• Where you keep the certificate is important

Page 19: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Distributing Certificates

• Can be done remotely – benefits and drawbacks

• Can be done face to face – benefits and drawbacks

Page 20: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Keeping Copies – Key Escrow• Benefit –

Available in case of emergency

• Drawback – Can be stolen

• Compromise is the best!

• Use Audit Trails, separation of duties and good accounting controls for key escrow

Page 21: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Certificate Renewal

• Just like your passport, digital certificates expire

• This is for the safety of the organization and those who do business with it

• Short lifetime – more assurance of validity but a pain to renew

• Long lifetime – less assurance of validity, but easier to manage

• Use a Certificate Revocation List if you are unsure of certificate validity

Page 22: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Trusted Root Authorities

• A certificate issuer recognized by all computers around the globe

• Root certificates are stored in the computer’s central certificate store

• Requires a stringent audit and a lot of money!

Page 23: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

It Is All About Trust

Page 24: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Using Certificates to Secure Email

• Best use for certificates, in my opinion

• Digital certificate provides proof that the email did indeed come from the purported sender

• Public key enables encryption and ensures that the message can only be read by the intended recipient

Page 25: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Secure Email is Called S/MIME

• S/MIME = Secure Multipurpose Mail Extensions

• S/MIME is the industry standard, not a point solution, unique to a specific vendor

Page 26: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Using Certificates For Authentication

Page 27: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Certificates

• A digital passport, either contained on a secure device, or on a hard disk

• Secured with a password, making them truly a dual factor solution

• Can be used to authenticate machines as well as humans

Page 28: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Certificate Benefits

• True Dual Factor Authentication

• Low variable cost to produce

• Can contain authorization data as well as authentication data

Page 29: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Certificate Drawbacks

• High fixed cost to build initial infrastructure

• Can be copied and shared if not properly stored

• Expiration

• Often require access to an interface such as a card reader of USB port, not always available at kiosks

Page 30: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Signing of Email

• Proves that the email came from you• Invalidates plausible denial• Proves through a checksum that the

contents of the email were not altered while in transit

• Provides a mechanism to distribute your public key

• Does NOT prove when you sent the email

Page 31: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Using Digital Certificates for Digital Signing

Page 32: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Signatures Do Not Prove When a Message or Document Was Signed

You need a neutral third party time stamping service, similar to how hostages often have their pictures taken in front of a newspaper to prove they are still alive!

Page 33: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Send Me a Signed Email, Please, I Need Your Public Key

Page 34: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What Does a Digital Signature Prove?

Provides proof that the

email came from the

purported sender…Is

this email really from

Britney Spears?

Provides proof that the

contents of the email

have not been altered

from the original form

Page 35: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

A Digital Signature Can Be Invalid For Many Reasons

Page 36: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Why Is The Digital Signature of the Sender So Important?

Page 37: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What if This Happens at MATC?

Could cause harm in

a critical situation

Case Scenario

Multiple hoax emails sent with Chancellor’s name and email.

When real crisis arrives, people might not believe the warning.

It is all about trust!

Page 38: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Signing Summary

• Provides proof of the author

• Testifies to message integrity

• Valuable for both individual or mass email

• Supported by Wiscmail Web client (used by 80% of students)

Page 39: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Using Digital Certificates for Encryption

Page 40: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What Encryption Does

Encrypting data with a digital certificateSecures it end to end.• While in transit• Across the network• While sitting on email

servers• While in storage• On your desktop

computer• On your laptop

computer• On a server

Page 41: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Encryption Protects the Data At Rest and In Transit

Physical theft from office

Physical theft from airport

Virtual theft over the network

Page 42: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Why Encryption is Important• Keeps private information private• HIPAA, FERPA, SOX, GLB compliance• Proprietary research• Human Resource issues• Legal Issues• PR Issues• Industrial Espionage• Over-intrusive Government• You never know who is

listening and watching!

Page 43: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What does it actually look like in practice? -Sending-

Page 44: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What does it actually look like in practice (unlocking my private key)

-receiving-

Page 45: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What does it actually look like in practice?-receiving- (decrypted)

Page 46: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digitally signed and verified; Encrypted

Page 47: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

What does it look like in practice?-receiving- (intercepted)

Page 48: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Intercepting the Data in Transit

Page 49: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Digital Certificates For Machines Too

• SSL – Secure Socket Layer

• Protection of data in transit

• Protection of data at rest

• Where is the greater threat?

• Our certs protect both!

Page 50: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Case Study - Why the Registrar’s Office Chose Digital Certificates

• Cost• Easy Integration• Security• No individual

process evaluation• Leverages a

central, generic resource

• Ability to inter-communicate

Page 51: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Is the NSA Watching?• Discussion of NSA_key in Microsoft

Operating System

• What about UW-Madison?

Page 52: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

SUMMARY

• Authentication

• Digital Signing of Documents

• Encryption

• Digital certificates can do all of this!

Page 53: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Benefits of Using Digital Certificates

Provide global assurance of your identity,both internally and externally to the UW-MadisonProvide assurance of message authenticityand data integrityKeeps private information private, end toend, while in transit and storageYou don’t need to have a digital certificateTo verify someone else’s digital signatureCan be used for individual or generic mailaccounts.

Page 54: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Who Uses Digital Certificates at UW-Madison?

DoITUW Police and SecurityOffice of the RegistrarOffice of Financial AidOffice of AdmissionsPrimate Research LabMedical SchoolBucky Badger, because he’s a teamplayer and slightly paranoid about hisbasketball plays being stolen

Page 55: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

Who Uses Digital Certificates Besides UW-Madison?

US Department of DefenseUS Department of HomelandSecurityAll Western European countriesNew US PassportDartmouth CollegeUniversity of Texas at AustinJohnson & JohnsonRaytheonOthers

Page 56: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

The Telephone Analogy

When the

telephone was

invented, it was

hard to sell.

It needed to

reach critical

mass and then

everyone wanted

one.

Page 57: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

That All Sounds Great in Theory, But Do I Really Need It?• The world seems

to get along just fine without digital certificates…

• Oh, really?• Let’s talk about

some recent stories

Page 58: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

We Have Internal Threats Too @ UW-Madison!

Page 59: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

How Do Users Feel About the Technology?

• Ease of use

• Challenges

• Changes in how they do their daily work

• Benefits

• Drawbacks

Page 60: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

It Really Is Up To You!

• Digital certificates / PKI is not hard to implement

• It provides end to end security of sensitive communications

• It is comprehensive, not a mix of point solutions

• You are the leaders of tomorrow, make your choices count by pushing for secure electronic communications!

Page 61: Pki & personal digital certificates, securing sensitive electronic communications, by nicholas davis, uw madison

How Can I Help You?

[email protected]

http://www.cio.wisc.edu/security/digitalCert/