Certificates and Web of Trust Yousof Alsatom [email_address] Slide
Agenda <ul><li>SSL Certification  </li></ul><ul><ul><li>What is SSL & How it works </li></ul></ul><ul><ul><li>Certificates...
History and Definitions  <ul><li>http://www.youtube.com/watch?v=zPqtx1J6udc </li></ul><ul><li>SSL is an acronym for Secure...
What is SSL & How it works <ul><li>SSL Certificate contains a public and private key pair as well as verified identificati...
Certificate Authority (CA) <ul><li>CA, issues and manages security credentials and public keys for message encryption </li...
Root Anchors <ul><li>CA’s market share declined year-over-year, February Netcraft Survey shows Symantec’s overall unit mar...
Obtaining certificates <ul><li>User generates private key </li></ul><ul><li>User creates a Certificate Signing Request (CS...
Is SSL enough ? Slide
SSL Attack <ul><ul><li>SSL can fail in many ways, but there are 3 principal attacks:  </li></ul></ul><ul><ul><li>Passive M...
SSL Threat Model  (SSLLabs Amsterdam, 2011 ) Slide
CA & MD5 hash function Slide  Normal
CA & MD5 hash function Slide  Attack Then a website certificate (the red one in the diagram) bearing the genuine website's...
Man In The Middle (MITM) attacks <ul><li>Gmail service in Iran, August 2011 </li></ul><ul><li>The attacker used a fraudule...
State of Art for protection, (SSLLabs Amsterdam, 2011 ) <ul><li>Use an extended validation (EV) certificate (difficult to ...
What is the alternatives? Slide
First solution Slide
Before we start <ul><li>Why I Wrote PGP </li></ul><ul><ul><li>&quot;Whatever you do will be insignificant, but it is very ...
Pretty Good Privacy <ul><li>Pretty Good Privacy (PGP) </li></ul><ul><li>Data encryption and decryption computer program </...
How PGP works - Encryption <ul><li>PGP creates a session key, which is a one-time-only secret key. This key is a random nu...
How PGP works - Decryption <ul><li>Decryption works in the reverse.  </li></ul><ul><li>The recipient's copy of PGP uses hi...
Web of Trust <ul><li>The user decide whom trust and whom not. </li></ul><ul><li>It is thus a cumulative trust model </li><...
Other alternatives <ul><li>Convergence </li></ul><ul><ul><li>“ is something we would add in Chrome.” Moxie Marlinspike </l...
Other alternatives, Perspectives  <ul><li>Computer Science Department at Carnegie Mellon University </li></ul><ul><ul><li>...
Conclusion <ul><li>Centralized trust model </li></ul><ul><ul><li>Public key infrastructure (PKI) which is relay on CA </li...
References  <ul><li>Ivan Ristic, Michael Small. A Study of What Really Breaks SSL, HITB Amsterdam 2011 </li></ul><ul><li>B...
Demo <ul><li>WOT </li></ul><ul><li>Perspective  </li></ul><ul><li>Convegerence  </li></ul>Slide
Upcoming SlideShare
Loading in...5
×

Certificates and Web of Trust

1,735

Published on

IT Security and Privacy, PGP, Web of trust, MD5, Certificates

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,735
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • The Secure Sockets Layer (SSL) is a security protocol used by Web browsers and Web servers to help users protect their data during transfer. An SSL Certificate contains a public and private key pair as well as verified identification information. When a browser (or client) points to a secured domain, the server shares the public key with the client to establish an encryption method and a unique session key. The client confirms that it recognizes and trusts the issuer of the SSL Certificate. This process is known as the &amp;quot;SSL handshake&amp;quot; and it can begin a secure session that protects message privacy and message integrity.
  • Transcript of "Certificates and Web of Trust"

    1. 1. Certificates and Web of Trust Yousof Alsatom [email_address] Slide
    2. 2. Agenda <ul><li>SSL Certification </li></ul><ul><ul><li>What is SSL & How it works </li></ul></ul><ul><ul><li>Certificates Authorities </li></ul></ul><ul><ul><li>Root Anchors </li></ul></ul><ul><li>Problems with this hierarchical approach of trust management </li></ul><ul><li>Possible Alternatives to SSL, </li></ul><ul><ul><li>PGP </li></ul></ul><ul><ul><ul><li>Web of Trust </li></ul></ul></ul><ul><ul><li>Perspective </li></ul></ul><ul><ul><li>Convergence </li></ul></ul>Slide
    3. 3. History and Definitions <ul><li>http://www.youtube.com/watch?v=zPqtx1J6udc </li></ul><ul><li>SSL is an acronym for Secure Sockets Layer </li></ul><ul><li>Standard security technology developed by Netscape in 1994. </li></ul><ul><li>It creates an encrypted link between a web server and a web browser. </li></ul><ul><li>The SSL protocol is used by millions of e-Business providers to protect their customers ensuring their online transactions remain confidential. </li></ul>Slide Source
    4. 4. What is SSL & How it works <ul><li>SSL Certificate contains a public and private key pair as well as verified identification information. </li></ul><ul><ul><li>When a browser (or client) points to a secured domain </li></ul></ul><ul><ul><li>The server shares the public key with the client to establish an encryption method and a unique session key. </li></ul></ul><ul><ul><li>The client confirms that it recognizes and trusts the issuer of the SSL Certificate. </li></ul></ul><ul><ul><li>This process is known as the &quot;SSL handshake&quot; and it can begin a secure session that protects message privacy and message integrity. </li></ul></ul>Slide
    5. 5. Certificate Authority (CA) <ul><li>CA, issues and manages security credentials and public keys for message encryption </li></ul>Slide
    6. 6. Root Anchors <ul><li>CA’s market share declined year-over-year, February Netcraft Survey shows Symantec’s overall unit market share grew to 42.1 percent </li></ul><ul><li>Symantec has agreed to acquire VeriSign's Identity and Authentication business for an aggregate purchase price of $1.28 billion </li></ul>Slide
    7. 7. Obtaining certificates <ul><li>User generates private key </li></ul><ul><li>User creates a Certificate Signing Request (CSR) containing </li></ul><ul><ul><li>user identity </li></ul></ul><ul><ul><li>domain name </li></ul></ul><ul><ul><li>public key </li></ul></ul><ul><li>CA processes the CSR </li></ul><ul><ul><li>validates user identity </li></ul></ul><ul><ul><li>validates domain ownership </li></ul></ul><ul><ul><li>signs and returns the certificate </li></ul></ul><ul><li>User installs private key and certificate on a web server </li></ul>Slide
    8. 8. Is SSL enough ? Slide
    9. 9. SSL Attack <ul><ul><li>SSL can fail in many ways, but there are 3 principal attacks: </li></ul></ul><ul><ul><li>Passive MITM </li></ul></ul><ul><ul><ul><li>Session hijacking </li></ul></ul></ul><ul><ul><li>Active MITM </li></ul></ul><ul><ul><ul><li>Rogue certificates </li></ul></ul></ul><ul><ul><ul><li>SSL bypass </li></ul></ul></ul><ul><ul><ul><li>User attacks (Who read warning anyway) </li></ul></ul></ul><ul><ul><li>Third-party compromise </li></ul></ul><ul><ul><li>more : visit https://www.sllabs.com </li></ul></ul>Slide
    10. 10. SSL Threat Model (SSLLabs Amsterdam, 2011 ) Slide
    11. 11. CA & MD5 hash function Slide Normal
    12. 12. CA & MD5 hash function Slide Attack Then a website certificate (the red one in the diagram) bearing the genuine website's identity but another public key is created and signed by the rogue CA. A copy of the genuine website is built, put on another web server, and equipped with the rogue website certificate. A rogue CA certificate is constructed (the black one in the diagram). It bears exactly the same signature as the website certificate. Thus it appears as being issued by the CA, whereas in fact the CA has never even seen it. The user will not mention this because there is a problem in the MD5 hash function
    13. 13. Man In The Middle (MITM) attacks <ul><li>Gmail service in Iran, August 2011 </li></ul><ul><li>The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it). </li></ul><ul><li>Google Chrome users were protected from this attack because Chrome was able to detect the fraudulent certificate. </li></ul>Slide
    14. 14. State of Art for protection, (SSLLabs Amsterdam, 2011 ) <ul><li>Use an extended validation (EV) certificate (difficult to forge) </li></ul><ul><li>Configure your SSL server properly: </li></ul><ul><ul><li>Good key size and coverage of desired domain names </li></ul></ul><ul><ul><li>Good protocols and 128-bit forward-secrecy cipher suites </li></ul></ul><ul><ul><li>Patches and workarounds applied </li></ul></ul><ul><li>Redirect all port 80 traffic to port 443 </li></ul><ul><li>Use HTTP Strict Transport Security </li></ul><ul><li>Forces all traffic over SSL, even with HTTP links </li></ul><ul><li>Can include subdomains to address cookie issues </li></ul>Slide
    15. 15. What is the alternatives? Slide
    16. 16. First solution Slide
    17. 17. Before we start <ul><li>Why I Wrote PGP </li></ul><ul><ul><li>&quot;Whatever you do will be insignificant, but it is very important that you do it.” </li></ul></ul><ul><li>Mahatma Gandhi. </li></ul>Slide Phil Zimmermann
    18. 18. Pretty Good Privacy <ul><li>Pretty Good Privacy (PGP) </li></ul><ul><li>Data encryption and decryption computer program </li></ul><ul><li>Provides cryptographic privacy and authentication for Data communication. </li></ul><ul><li>PGP is often used for </li></ul><ul><ul><li>Signing </li></ul></ul><ul><ul><li>Encrypting and decrypting texts, E-mails, files directories and whole disk partitions to increase the security of e-mail communications. </li></ul></ul>Slide
    19. 19. How PGP works - Encryption <ul><li>PGP creates a session key, which is a one-time-only secret key. This key is a random number generated from the random movements of your mouse and the keystrokes you type. </li></ul>Slide
    20. 20. How PGP works - Decryption <ul><li>Decryption works in the reverse. </li></ul><ul><li>The recipient's copy of PGP uses his or her private key to recover the temporary session key </li></ul>Slide
    21. 21. Web of Trust <ul><li>The user decide whom trust and whom not. </li></ul><ul><li>It is thus a cumulative trust model </li></ul><ul><li>hen any user signs another's key, he or she becomes an introducer of that key. As this process goes on, it establishes a web of trust. </li></ul>Slide Primary Key infrastructure Vs. Web of Trust, Walking the Web of Trust, Germano Caronni, Sun Microsystems Laboratories, IEEE 2000
    22. 22. Other alternatives <ul><li>Convergence </li></ul><ul><ul><li>“ is something we would add in Chrome.” Moxie Marlinspike </li></ul></ul><ul><ul><li>Convergence allows you to choose who you want to trust, rather than having someone else's decision forced on you. You can revise your trust decisions at any time, so that you're not locked in to trusting anyone for longer than you want. </li></ul></ul>Slide
    23. 23. Other alternatives, Perspectives <ul><li>Computer Science Department at Carnegie Mellon University </li></ul><ul><ul><li>Funded by </li></ul></ul><ul><ul><ul><li>The National Science Foundation (NSF) </li></ul></ul></ul><ul><ul><ul><li>Carnegie Mellon CyLab </li></ul></ul></ul><ul><ul><li>Perspectives keeps a record of the keys used by a service over time, then the client can see there is a change in the certificates </li></ul></ul><ul><ul><li>One use of Perspectives is to provide an additional layer of protection to detect attacks even when the browser trusts the CA that signed the certificate. </li></ul></ul>Slide Wendlandt David G. Andersen Adrian Perrig, Carnegie Mellon University MD5 and Perspectives, 01.01.2009
    24. 24. Conclusion <ul><li>Centralized trust model </li></ul><ul><ul><li>Public key infrastructure (PKI) which is relay on CA </li></ul></ul><ul><li>Decentralized trust model (better) </li></ul><ul><ul><li>PGP </li></ul></ul><ul><ul><ul><li>WOT </li></ul></ul></ul><ul><li>One hand doesn’t clap </li></ul><ul><li>Install WOT and Perspective in your browser </li></ul>Slide
    25. 25. References <ul><li>Ivan Ristic, Michael Small. A Study of What Really Breaks SSL, HITB Amsterdam 2011 </li></ul><ul><li>Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study, ISBN: 978-1-60558-784-4, 2009 </li></ul><ul><li>Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing, Dan Wendlandt David G. Andersen Adrian Perrig, Carnegie Mellon University </li></ul><ul><li>MD5 and Perspectives, 01.01.2009 </li></ul><ul><li>Walking the Web of Trust, Germano Caronni, Sun Microsystems Laboratories, IEEE 2000 </li></ul><ul><li>http://www.techthefuture.com/technology/certificate-authority-system-insecure-firefox-add-on-offers-alternative/ </li></ul><ul><li>http://www.verisign.com/ssl/index.html?tid=gnps </li></ul><ul><li>http://info.ssl.com/article.aspx?id=10241 </li></ul><ul><li>http://en.wikipedia.org/wiki/Secure_Sockets_Layer </li></ul><ul><li>http://en.wikipedia.org/wiki/Certificate_authority </li></ul><ul><li>https://ssl.trustwave.com/support/support-how-ssl-works.php </li></ul><ul><li>http://en.wikipedia.org/wiki/Pretty_Good_Privacy </li></ul><ul><li>http://www.pgpi.org/doc/pgpintro/ </li></ul><ul><li>http://www.whichssl.com/what_is_ssl.html </li></ul><ul><li>http://www.symantec.com/about/news/release/article.jsp?prid=20110301_02 </li></ul><ul><li>http://perspectives-project.org/faq / </li></ul><ul><li>http://searchsecurity.techtarget.com/definition/certificate-authority </li></ul><ul><li>Very interesting video, Speaker: MOXIE MARLINSPIKE, 2011 : http://www.youtube.com/watch?feature=player_embedded&v=Z7Wl2FW2TcA# ! </li></ul>Slide
    26. 26. Demo <ul><li>WOT </li></ul><ul><li>Perspective </li></ul><ul><li>Convegerence </li></ul>Slide

    ×