SlideShare a Scribd company logo
1 of 14
Using least privileged design
   principals to improve trust in the
          online marketplace

                       Ryan Hurst, GlobalSign
                        ryan.hurst@globalsign.com
                                @rmhrisk

Presented at the NIST Workshop on Improving Trust in the Online Marketplace
                             April 10-11, 2013
Only the minimum amount of access

necessary to perform an operation should be

granted, and that access should be granted

   only for the minimum amount of time

                necessary.
Have we been doing this?
I don’t think so. At least not as much as we can.

 Lots of tail risk from Certificate Authorities that most
  users will never legitimately encounter a certificate
                      from. – Brad Hill

  SSL Observatory found 1,482 “CAs”: do all of these
  need the ability to issuing for any name space? Do
  they all need to issue Server SSL certificates?
Some observations.
• Limited usage of the BasicConstraints extension’s
  pathLenConstraint.
• Limited use of some clients ability to restrict CA
  usages to subsets via EKU.
• Almost zero usage of Name Constraints outside
  the Federal Bridge.
• No observed adoption of automatic issuance
  auditing for these CAs.
• Often single PKI used for internal and external
  certificates even though internal often doesn’t
  need public trust.
But why is this the case?
• These mostly represent CAs have legitimate
  need to represent their community of users.
• It’s hard to imagine all the possible use cases
  in the beginning of a project.
• It’ also hard to change a the CAs once the are
  setup.
• Why add additional complexity this is hard
  enough.
Do they need to be unconstrained?
• In some cases yes.

• But In most they serve only a few namespaces.

• In some they are also limited to a few use cases.

• We need to remember though that requirements
  change.
Where to start reducing exposure?
• First we need to understand their needs:
  –   Who do they serve?
  –   What are the certificates used for?
  –   What clients rely on the certificates?
  –   How many namespaces are involved?
  –   How frequently does the list of namespaces change?

• Find ways to respond to changed needs more
  quickly.
• Look at how we can use the tools we have
  available to restrict permissions.
What tools do we have to work with?
• Hosted “managed” CAs where TTP manage keys and
  restrict access to pre-vetted namespaces.
• Subordinating “issuing CAs” with pathLength to 0 to
  ensure root is always aware of new issuing CAs.
• Using separate CA infrastructure for internal and
  external scenarios.
• Delegate CAs specific sets of usage via Extended Key
  Usage and rely on the clients enforcement of nesting
  rules (86%+ clients support)
• Adopting Name Constraints restricting to a limited set
  of namespaces.
What have we found implementing
                 this.
• Client and library support for Name Constraints (NC) is very
  good, exception is OSX/IOS (11.19%); still workable means
  needs to be marked Non-Critical.
• XP’s Support of NC more restrictive than other platforms;
  still workable but requires planning.
• Effective enforcement of NC requires specifying all
  namespaces, not just those used.
• Client support of “nested EKUs” better than expected.
• Many customers who were hosting their own CAs can
  actually move hosted services quite easily /w API support.
• For many customers applying name constraints for “core
  name spaces” is acceptable if paired with managed services
  for more dynamic list of names.
But what about the problems?
• As we know complex mechanisms are hard to
  deploy; they are:
  – Hard to model, Miss-understood, and
    misconfigured.
• Name Constraints is complicated complicated:
  – DN ordering issues, inconsistent naming issues.
• One of the largest delays is associated with
  these organizations getting grasp on minimal
  namespaces.
Can we do more?
• Yes.
• Adoption of Certificate Transparency of (CT) within our own
  operations.
• Making publication of an authoritative list of subordinate
  CAs standard.
• Leveraging CT as a means to reduce reliance on post
  issuance audits.
   – Many of these CAs use EJBCA and the MS Certificate Authority;
     can implement CT as an extension.
• Work to close the gap on client support for Name
  Constraints so we can ultimately mark the extension
  critical.
• Adopt Name Constraints for hosted CAs as well
Why do I care?
• A simple changes that can greatly reduce the
  surface area of attack.
• Can potentially increase adoption of SSL as a
  more flexible alternatives to wildcards.
   – Improve key management practices.
   – Move to shorter lived certificates.
   – Fewer barriers to adoption.
• Other technology efforts to reduce risk such
  efforts such as CT, CAA and the variants of
  pinning are great but don’t address all risk –
  approach discussed here is complimentary.
A Band-Aid, not a Panacea
• Top 8-10 global CAs can’t apply this to most of their
  infrastructure – these CAs responsible >95% of SSL
  certificates.

• Large organizations with very complicated namespaces and
  distributed IT are likely unable to adopt many of these
  approaches.

• Those clients that do not understand these restrictions do
  not benefit.

• Significant, long-term attack surface reduction for what is
  arguably the weakest link.
QUESTIONS

More Related Content

Viewers also liked

POOJA TRIPATHY-resume
POOJA TRIPATHY-resumePOOJA TRIPATHY-resume
POOJA TRIPATHY-resume
Pooja110189
 
презентація досвіду з морального виховання
презентація досвіду з морального вихованняпрезентація досвіду з морального виховання
презентація досвіду з морального виховання
ryabich1976
 

Viewers also liked (6)

2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll
 
συμπαν
συμπανσυμπαν
συμπαν
 
The Journey to Enterprise PaaS (Cloud Foundry Summit 2014)
The Journey to Enterprise PaaS (Cloud Foundry Summit 2014)The Journey to Enterprise PaaS (Cloud Foundry Summit 2014)
The Journey to Enterprise PaaS (Cloud Foundry Summit 2014)
 
POOJA TRIPATHY-resume
POOJA TRIPATHY-resumePOOJA TRIPATHY-resume
POOJA TRIPATHY-resume
 
презентація досвіду з морального виховання
презентація досвіду з морального вихованняпрезентація досвіду з морального виховання
презентація досвіду з морального виховання
 
The Five Stages of Cloud Native
The Five Stages of Cloud NativeThe Five Stages of Cloud Native
The Five Stages of Cloud Native
 

More from CASCouncil

More from CASCouncil (20)

100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
 
Six Reasons http Will Become a Thing of the Past
Six Reasons http Will Become a Thing of the PastSix Reasons http Will Become a Thing of the Past
Six Reasons http Will Become a Thing of the Past
 
What Kind of SSL/TLS Certificate Do I Need?
What Kind of SSL/TLS Certificate Do I Need?What Kind of SSL/TLS Certificate Do I Need?
What Kind of SSL/TLS Certificate Do I Need?
 
Payments Security – Vital Information all Payment Processors need to know
Payments Security – Vital Information all Payment Processors need to knowPayments Security – Vital Information all Payment Processors need to know
Payments Security – Vital Information all Payment Processors need to know
 
TLS Certificates on the Web – The Good, The Bad and The Ugly
TLS Certificates on the Web – The Good, The Bad and The Ugly TLS Certificates on the Web – The Good, The Bad and The Ugly
TLS Certificates on the Web – The Good, The Bad and The Ugly
 
Symantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebSymantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the Web
 
CA/Browser Forum—To effect positive changes to improve internet security
CA/Browser Forum—To effect positive changes to improve internet security  CA/Browser Forum—To effect positive changes to improve internet security
CA/Browser Forum—To effect positive changes to improve internet security
 
Update on the Work of the CA / Browser Forum
Update on the Work of the CA / Browser ForumUpdate on the Work of the CA / Browser Forum
Update on the Work of the CA / Browser Forum
 
Extended Validation Builds Trust
Extended Validation Builds TrustExtended Validation Builds Trust
Extended Validation Builds Trust
 
CA Day 2014
CA Day 2014 CA Day 2014
CA Day 2014
 
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
 
New Ideas on CAA, CT and Public Key Pinning for a Safer Internet
New Ideas on CAA, CT and Public Key Pinning for a Safer InternetNew Ideas on CAA, CT and Public Key Pinning for a Safer Internet
New Ideas on CAA, CT and Public Key Pinning for a Safer Internet
 
Alternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure WebAlternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure Web
 
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements
Addressing non-FQDNs and new gTLDs in SSL Baseline Requirements
 
State of the Web
State of the WebState of the Web
State of the Web
 
Trust Service Providers: Self-Regulatory Processes
Trust Service Providers: Self-Regulatory ProcessesTrust Service Providers: Self-Regulatory Processes
Trust Service Providers: Self-Regulatory Processes
 
Certificates, Revocation and the new gTLD's Oh My!
Certificates, Revocation and the new gTLD's Oh My!Certificates, Revocation and the new gTLD's Oh My!
Certificates, Revocation and the new gTLD's Oh My!
 
CAs And The New Paradigm Shift
CAs And The New Paradigm ShiftCAs And The New Paradigm Shift
CAs And The New Paradigm Shift
 
CA Self Regulation
CA Self RegulationCA Self Regulation
CA Self Regulation
 
New Window of Opportunity
New Window of OpportunityNew Window of Opportunity
New Window of Opportunity
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Using Least Privileged Design Principals To Improve Trust In The Online Marketplace

  • 1. Using least privileged design principals to improve trust in the online marketplace Ryan Hurst, GlobalSign ryan.hurst@globalsign.com @rmhrisk Presented at the NIST Workshop on Improving Trust in the Online Marketplace April 10-11, 2013
  • 2. Only the minimum amount of access necessary to perform an operation should be granted, and that access should be granted only for the minimum amount of time necessary.
  • 3. Have we been doing this? I don’t think so. At least not as much as we can. Lots of tail risk from Certificate Authorities that most users will never legitimately encounter a certificate from. – Brad Hill SSL Observatory found 1,482 “CAs”: do all of these need the ability to issuing for any name space? Do they all need to issue Server SSL certificates?
  • 4. Some observations. • Limited usage of the BasicConstraints extension’s pathLenConstraint. • Limited use of some clients ability to restrict CA usages to subsets via EKU. • Almost zero usage of Name Constraints outside the Federal Bridge. • No observed adoption of automatic issuance auditing for these CAs. • Often single PKI used for internal and external certificates even though internal often doesn’t need public trust.
  • 5. But why is this the case? • These mostly represent CAs have legitimate need to represent their community of users. • It’s hard to imagine all the possible use cases in the beginning of a project. • It’ also hard to change a the CAs once the are setup. • Why add additional complexity this is hard enough.
  • 6. Do they need to be unconstrained? • In some cases yes. • But In most they serve only a few namespaces. • In some they are also limited to a few use cases. • We need to remember though that requirements change.
  • 7. Where to start reducing exposure? • First we need to understand their needs: – Who do they serve? – What are the certificates used for? – What clients rely on the certificates? – How many namespaces are involved? – How frequently does the list of namespaces change? • Find ways to respond to changed needs more quickly. • Look at how we can use the tools we have available to restrict permissions.
  • 8. What tools do we have to work with? • Hosted “managed” CAs where TTP manage keys and restrict access to pre-vetted namespaces. • Subordinating “issuing CAs” with pathLength to 0 to ensure root is always aware of new issuing CAs. • Using separate CA infrastructure for internal and external scenarios. • Delegate CAs specific sets of usage via Extended Key Usage and rely on the clients enforcement of nesting rules (86%+ clients support) • Adopting Name Constraints restricting to a limited set of namespaces.
  • 9. What have we found implementing this. • Client and library support for Name Constraints (NC) is very good, exception is OSX/IOS (11.19%); still workable means needs to be marked Non-Critical. • XP’s Support of NC more restrictive than other platforms; still workable but requires planning. • Effective enforcement of NC requires specifying all namespaces, not just those used. • Client support of “nested EKUs” better than expected. • Many customers who were hosting their own CAs can actually move hosted services quite easily /w API support. • For many customers applying name constraints for “core name spaces” is acceptable if paired with managed services for more dynamic list of names.
  • 10. But what about the problems? • As we know complex mechanisms are hard to deploy; they are: – Hard to model, Miss-understood, and misconfigured. • Name Constraints is complicated complicated: – DN ordering issues, inconsistent naming issues. • One of the largest delays is associated with these organizations getting grasp on minimal namespaces.
  • 11. Can we do more? • Yes. • Adoption of Certificate Transparency of (CT) within our own operations. • Making publication of an authoritative list of subordinate CAs standard. • Leveraging CT as a means to reduce reliance on post issuance audits. – Many of these CAs use EJBCA and the MS Certificate Authority; can implement CT as an extension. • Work to close the gap on client support for Name Constraints so we can ultimately mark the extension critical. • Adopt Name Constraints for hosted CAs as well
  • 12. Why do I care? • A simple changes that can greatly reduce the surface area of attack. • Can potentially increase adoption of SSL as a more flexible alternatives to wildcards. – Improve key management practices. – Move to shorter lived certificates. – Fewer barriers to adoption. • Other technology efforts to reduce risk such efforts such as CT, CAA and the variants of pinning are great but don’t address all risk – approach discussed here is complimentary.
  • 13. A Band-Aid, not a Panacea • Top 8-10 global CAs can’t apply this to most of their infrastructure – these CAs responsible >95% of SSL certificates. • Large organizations with very complicated namespaces and distributed IT are likely unable to adopt many of these approaches. • Those clients that do not understand these restrictions do not benefit. • Significant, long-term attack surface reduction for what is arguably the weakest link.

Editor's Notes

  1. Lots of tail risk from Certificate Authorities that most users will never legitimately encounter a certificate from.Usenix 2011, SSL Observatory,http://static.usenix.org/event/sec11/tech/slides/eckersley.pdf
  2. http://gs.statcounter.com/#os-ww-monthly-201203-20130352.61%Windows 7,23.38%Windows XP,6.13%Vista,3.90%,Win 8,86.02%Total
  3. OSX + IOS = 11.19% - http://gs.statcounter.com/#os-ww-monthly-201203-201303XP Name Constraints:http://unmitigatedrisk.com/?p=201http://unmitigatedrisk.com/?p=198Nested EKUhttp://unmitigatedrisk.com/?p=57
  4. http://www.certificate-transparency.org/http://tools.ietf.org/html/rfc6844