Identity and Client Security for Remote...

21
Identity and Client Security for Remote Access Virtual Credential Container Yukio Tsuruoka NTT Information Sharing Platform Laboratories

Transcript of Identity and Client Security for Remote...

Page 1: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Identity and Client Securityfor Remote Access

‐ Virtual Credential Container ‐

Yukio Tsuruoka

NTT Information Sharing Platform Laboratories

Page 2: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Contents

• About NTT…

• Background

• Outline

• Client security

• Use case: remote access

• Solution: proof‐of‐concept demonstration

• Related topics

• Summary

2Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 3: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Nippon Telegraph and Telephone  (NTT) Corporation

NTT is a holding company conducting planning and R&D of telecommunication services

Subsidiaries include:• NTT East & NTT West  ‐ local operation in Japan

• NTT Communications ‐ long distance and international telecommunication, IP networks, and ICT solutions

• NTT Data  ‐ system integration and network service

• NTT DoCoMo ‐mobile network operator    

3

www.ntt.co.jp/index_e.html(TSE:9432,  NYSE: NTT)

Reference:   www.ntt.co.jp/about_e/corporatedata.html

Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 4: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

NTT’s services

• FTTH (provided by NTT East and NTT West)– 6 million subscribers,  177% growth rate

– NGN commercial service has started 

– Planned: 20 million NGN subscribers by 2010

• Mobile network services (by NTT DoCoMo)– 53 million subscribers,  80% are 3G users

– 7.2Mbps HSDPA access service has started

4Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 5: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

NTT’s activities regardingidentity management

• NTT Communications– Provides Single Sign‐On (SSO) service to ISP (OCN) users– Users can access both OCN (7.7 million IDs) and “goo”sites (8 million IDs) using SSO via  SAML 2.0

• NTT Data – SSO achieved by ID Federation of intranet (20,000 IDs, 200 systems) and group company network (32,000 IDs, 20 systems)

• NTT Software– Identity federation module supports SAML 2.0:– TrustBind/Federation Manager

5

http://www.ntt.com/release/2007NEWS/0007/0702.html

Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 6: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Background

• Enterprise concerns: risk of information leakage and legal compliance

• To increase manageability, enterprises tend to aggregate business information at one point

• Information is accessed from various locations (branch offices or outside the office) through a broadband access network

• Secure remote access is the key element to protecting corporate assets

6Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 7: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Security of Remote Access 

• Requirement:  maintain secrecy of credentials

• Software‐based credential container– Example: Windows certificate store

– Credentials must be protected from malware

• Hardware‐based credential container(cryptographic token)

– Example: USB cryptographic key

– High security, but requires additional hardware cost and  may be lost

7Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 8: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Outline

• Problem– Protect credentials from malware in Windows– Minimize additional costs of protection

• Solution– Use virtualization for protection (Virtual Credential Container) and

– Use standard protocols (Liberty Advanced Client) for provisioning of credentials

• Merit– Security of remote access strengthened with little additional cost (no external device needed)

8Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 9: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Outline of solution – client configuration

Apr 7, 2008 Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved. 9

PC hardware

virtual machine(service domain) 

virtual machine(user domain)

service OS (Linux) Windows

NTT VCCapplication(browser, for example)

virtual machine monitor

Intel ICP

NTT virtual credential container (VCC)  stores credentials securelyIntel Identity capable platforms (ICP) provisions credentials based on Liberty Advanced Client specifications

Provisioning server

Client security can be strengthen without (the need for) external devices

Advanced Clientprotocol

Page 10: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Client security

Threats in user authentication

• Threat T1: malware attack

• Threat T2: laptop loss or theft

malicious user

server 

malware

user applications

cryptographicprocessing

client laptop

T1

T2

credential container

key store

10Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 11: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Countermeasures to malware (T1)• Monitoring  (Based on a black list)

– Example: Virus scan by software

• Integrity check (based on a white list) – Check that the fundamental set of software is not forged. – Example:  BIOS, OS, and drivers are checked.

• Minimizing the possible damage– Preventing key leakage even if application environment is infected by malware

– Domain separation: split execution environments for critical operations (e.g., cryptographic operations) from that for applications

11Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 12: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Domain separation by virtualization

PC hardware

virtual machine(service domain) 

virtual machine (user domain)

user OS (Windows)

virtual credential container (VCC)

applications

virtual machine monitor

malware × ICP

Driver*

Separate credential container from Windows environmentMalware can not access credential container

*: supports Microsoft Crypto API and PKCS#11

12Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 13: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Use case: remote access scenario

office network

remote access credentials are provisioned and stored securely to laptop located at office 

hot spot

credentials

(1) authentication

(3) store credentials

(2) provision credentials

(Advanced Client specification, provisioning service)

employee portal

business trip

credentials

broadband network(NGN, for example)

VPN‐gateway

13Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 14: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Provisioning sequence based on Advanced Client specification

client

NTT VCC(PM)

Intel ICP(PMM)

employee portal

browser+ plug‐in

PM: Provisioned Module              VCC: Virtual Credential ContainerPMM: PM Manager                        ICP: Identity Capable Platforms

VPN gateway

Liberty Advanced Client specification

(Advanced Client provisioning service)

authentication

handle

handle

credential

credential

credential

14Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 15: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Issues: Countermeasures against laptop theft (T2)

• A malicious user detaches hard disk and reads credentials ⇒ Do not store credentials as plaintext

• Software encryptionExamples:  Microsoft BitLocker,  EFS

• Special HardwareExample:   hard disk with full disk encryption

• Deposit credentials with a credential server, and download credentials on‐demand

15Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 16: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Deposit credentials with a credential server

PC

virtual machine

credentialcontainer(CC)

credentialserver (CS)

network

PIN

K1credential 

Initial settings:Deposit credential K1 with a credential server. Initial settings:Deposit credential K1 with a credential server. 

Download:A user inputs PIN at the credential server, then credential K1 is sent to a credential container.

Download:A user inputs PIN at the credential server, then credential K1 is sent to a credential container.

16Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 17: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Security of virtualization

• We expect less vulnerability in VMM than that in OSs because the code is smaller

• Several threats related to virtualization have been reported– Example: virtual machine based rootkit, subsystem as spy problem

– However, there are countermeasures 

• From the technical point of view, there is no serious obstacle to the security of virtualization

17Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 18: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Usage model of virtual credential container

Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008 18

Centralized model Distributed modelThere is a central authentication (key) device, which must be carried all the timeThere is a central authentication (key) device, which must be carried all the time

Multi‐device (ubiquitous) environment:  a user wants to be able to use a service equally from various devices ⇒ requires relationship management among devices

federation

All devices have a keyAll devices have a key

VCC VCC

VCC

use

use use

Page 19: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Future works

• Explore more uses cases– SaaS (Software as a Service)– Fully converged Next Generation Networks

• Enhance manageability functions– Monitoring, updating, and deleting credentials (and programs that manage and use them)

• Adopt technologies to a wider variety of clients– Smart phones– Information appliances– Home gateways

19Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008

Page 20: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

Towards secure credential ecosystems

Apr 7, 2008 Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved. 20

EnterprisesConsumers

Network operators(BB, Wireless, VPN…)

Service providers(SaaS, ASP…)

Device vendors(PC, Mobile, Software…)

Contact us for more information: ufo‐[email protected]

Benefits•security•lower cost•convenience and confidence

Benefits•lower cost of and shorter time to deployment•prevent illegal use

Benefits•advanced security•increase customer loyalty

Benefits•efficient provisioning•various network usage

Virtual Credential Container (VCC) technologywith open identity standards

Page 21: Identity and Client Security for Remote Accessprojectliberty.org/liberty/content/download/4143/27846/file/3. 08040… · Deposit credential K1 with a credential server. Download:

SummaryThe demo prototype consists of• NTT Virtual Credential Container (VCC)

– stores credentials securely for remote‐access

• Intel Identity Capable Platforms (ICP) – provision credentials based on Liberty Advance Client specifications

• The solution will bring:– Significant cost reduction and greater client manageability to network operators, service providers, and enterprises 

– Convenience and confidence to users21Copyright © 2008 Nippon Telegraph and Telephone Corporation  All Rights Reserved.Apr 7, 2008