private key protection. whats it about without the private key, the certificate is useless one of...

16
Private Key Protection

Upload: owen-sanchez

Post on 27-Mar-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Private Key Protection

Page 2: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

What’s it about

• Without the private key, the certificate is “useless”

• One of two main purposes of cert:– Prove possession of private key– Without revealing information about private

key

• Thus it is necessary to protect the private key

Page 3: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Use of Certificates

• Personal certificates– Private key activated by person at time of use– Private key activated once, then held “open”

• Host certificates– Private key unprotected (use when booted)– Or protected (passphrase when starting)

• CA certificates– Private key activated when signing

Page 4: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Protection of Private Key

• Software vs Hardware

• Passphrase, no passphrase

• Subject certificates can be revoked and reissued

• But what if they can’t?

• E.g., VOMS. Or the CA itself?

Page 5: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Protection from what?

• Compromise…– Attacker is able to use key– Normal confidentiality issues

• Loss…– Legitimate user unable to use key– Normal curation and storage issues

Page 6: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Compromise and Loss

• Compromise– Stolen key (unencrypted)– Break into machine with unencrypted key– Disgruntled employee vanishing with key material– Key stored on NFS partition with weak passphrase?

• Loss– Somebody steals all the copies of your keys– (We tell users to create backups, CAs are backed up)– ROBAB– Not just key, also crucial procedures

Page 7: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Consequences of Compromise

• Attacker can use the private key maliciously

• Worse, loss of trust in legitimate signatures => key cannot be used

• Potentially loss of trust in infrastructure and ops

Page 8: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Recovery from Compromise

• Announce revocation

• Subject certificates can be revoked and reissued

• But sometimes they can’t– When the trust is in the certificate– Not the DN– Cf VOMS. Or the CA!

Page 9: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Consequences of Loss

• Entity unable to use private key (duh)

• Potentially loss of trust in infrastructure and ops

• Potentially expensive recovery (e.g. from ROBAB)

Page 10: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Recovery from Loss

• Similar to compromise!

• New certificate must be created and distributed

• Means to re-establish trust

• Re-establish procedures

Page 11: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Preventing Loss AND Compromise Confidential Curation?

• Keep multiple separate copies– Which is good for curation purposes– But can be bad for confidentiality

• Documented and tested recovery procedures– Which is good for curation purposes– But can be bad for confidentiality

• More than one person can access backup– Which is good for curation purposes– But can be bad for confidentiality

Page 12: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Between a rock and a hard place

• Does it make sense to define these:– “Suspected compromise”– “Potential compromise”– “Possible compromise”

• And if so, what are they?

• Tetrapilectomy (Eco)

• “If the CA’s private key is compromised or suspected compromised…”

Page 13: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Other variations

Page 14: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

How to store a key for 10+ years

• Print on paper… (scannable font)

• Store in a safe location…how to one?– In a lab where access is guaranteed to:

cleaners, health and safety inspectors, electricians, …

– Truly safe locations are expensive (hard to argue business case)

– Off site?– Accessed by legitimate users (ROBAB)?

Page 15: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

n-of-m protection

• Shamir secret sharing (3-5, 4-7, 5-9, …)– Can re-encode easily

• 2048 bit key: large numbers– Only need 1024 secret bits, modulus is public!

• Needs programming!• Need HLL native bigint implementation

– Lisp, Java, Python, Caml

• Multiple implementations? (stable languages, not latest fad)

Page 16: Private Key Protection. Whats it about Without the private key, the certificate is useless One of two main purposes of cert: –Prove possession of private

Secret Sharing cont’d

• Now, each share is >= 1024 bits (or so, depending on parameter choice)

• 2**1024 = 10**309 = 16 ** 256 = 36**198

• Not rememberable – must be written down

• Share holder must understand how to use it…

• “Stable” member of staff…?

• Testing? Rekeying? Rekeying regularly?