SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Fraunhofer-Institut für Digitale Medientechnologie IDMT
IDMT VPN Remote Access
Ives Steglich
Munich, 12. Oct 2004
Seite 2
Overview
Current Situation and Architecture
Goals and Requirements for Improvement
Proposed Soft- and Hardware
Proposed Architecture
How does the USB-Token work?
Usageprocess
Conclusions
Seite 3
Current Situation and Network Architecture
Architecture
Remote User
CISCO VPN Client
Firewall and VPN Gateway
CISCO PIX
Steps to establish an connection
1. VPN Tunnel initialization
authenticated by shared secret
2. Access to internal Network
authenticated by XAUTH trough tacacs+
Internet
Internal LAN
Remote
User
VPN
Tunnel
Firewall and
VPN-Gateway
Tacacs+
Server
Seite 4
Goals and Requirements for new Solution
Main Goals
1. remove the shared secret for remote users
2. keep the available infrastructure
3. use smartcards
4. be open for other usages
5. integration into the local LDAP
6. use open source whenever possible
Requirements from Goals and Architecture
- introduce certificates and administration
- setup an in-house pki
- pki must speak SCEP
- smartcards must be operable with
linux and windows
Seite 5
Proposed Soft- and Hardware
Software for PKI
OpenCA
Reasons:
- understands SCEP
- can publish certs in LDAP
- open source
- good cooperation with development team
Hardware for Smartcards
Aladdin eToken Pro
Reasons:
- works with Microsoft Crypto API
- PKCS#11 library for linux available
(but hard to get, not offically distributed)
- enables OpenCA administration from Linux
and Windows (Mozilla, IE)
Seite 6
Proposed Architecture
Remote
User
OpenCA-Setup
One Server with RA, PUB and SCEP Interfaces
One Server with the CA (offline)
Access to RA-Interface certificatebased
stored at Smartcards
PIX-Setup
Remote Users Authentication with RSA Certs
Client Setup
VPN-Gateway identification with Certs
Own Authentication with RSA Certs
Internet
Internal LAN
Firewall and
VPN-Gateway
In-house PKI
VPN
Tunnel
Tacacs+
Server
RA/SCEP/PUB
Interfaces
Offline
CA
Seite 7
How does the USB-Token work?
General
- uses proprietary format from Aladdin
- therefore needs specific drivers
- not PKCS#15 compatible
(but can be used parallel if space is left on token
PKCS#15 doesn’t works with Microsoft Crypto API)
Linux
- based on PC/SC-Lite
- works with Mozilla through PKCS#11
- doesn’t work right now with OpenSSL engine
- hotplugable
Windows
- works with Mozilla through PKCS#11
- works with Microsoft Crypto API
- hotplugable
PKCS#11
PC/SC Lite
Mozilla
Aladdin RTE
OpenSSL ?
Linux
Linux USB-Hotplugsystem
Windows
CSP PKCS#11
MozillaIE VPN Client
Aladdin RTE
Windows USB-Subsystem
Seite 8
Usageprocess
Token Initialization
- has to be done at Linux
- key generation with Linux+Windows
- certificate Iistallation with Linux+Windows
- only one Login for User and Admin possible
Process
- Two Options:
- batch-orientied serverside-key-generation
(p12 files import through Mozilla or Win-System)
- token-based-key-generation
(through users themselves)
- Administration:
- requests initiated through users
- granted at RA through ‘Groupleaders’
- certs issued through CA-Operator
Seite 9
Conclusions
• Authentication for Remote-VPN-Access
• Option to skip one step during VPN-Login
• Transparent usage with Linux and Windows
• Encrypt, Decrypt and Sign E-Mails
• Authentication for webbased services
(PKI-Access and Administration)
• Dezentralized Management
• LDAP Storage and Access to Certificates
• Still not perfect
• Overview about smartcards providing PKCS#11 libs:
http://jce.iaik.tugraz.at/products/14_PKCS11_Wrapper/
tested_products/index.php
Seite 10
Usage Examples
Seite 11
Seite 12
Thanks for your attention!
Questions?

Más contenido relacionado

Similar a Certificate Based VPN Remote Access - 1. OpenCA Workshop 2004 / OpenXPKI

26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
Making Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDKMaking Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDK
Michelle Holley
 

Similar a Certificate Based VPN Remote Access - 1. OpenCA Workshop 2004 / OpenXPKI (20)

JDO 2019: What you should be aware of before setting up kubernetes on premise...
JDO 2019: What you should be aware of before setting up kubernetes on premise...JDO 2019: What you should be aware of before setting up kubernetes on premise...
JDO 2019: What you should be aware of before setting up kubernetes on premise...
 
presentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfpresentation_4102_1493726768.pdf
presentation_4102_1493726768.pdf
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs
 
[workshop] The Revolutionary WebRTC
[workshop] The Revolutionary WebRTC[workshop] The Revolutionary WebRTC
[workshop] The Revolutionary WebRTC
 
LlinuxKit security, Security Scanning and Notary
LlinuxKit security, Security Scanning and NotaryLlinuxKit security, Security Scanning and Notary
LlinuxKit security, Security Scanning and Notary
 
Hack the System_Fluence workshop 2
Hack the System_Fluence workshop 2Hack the System_Fluence workshop 2
Hack the System_Fluence workshop 2
 
The next step from Microsoft - Vnext (Srdjan Poznic)
The next step from Microsoft - Vnext (Srdjan Poznic)The next step from Microsoft - Vnext (Srdjan Poznic)
The next step from Microsoft - Vnext (Srdjan Poznic)
 
Hackerworkshop exercises
Hackerworkshop exercisesHackerworkshop exercises
Hackerworkshop exercises
 
Docker and IBM Integration Bus
Docker and IBM Integration BusDocker and IBM Integration Bus
Docker and IBM Integration Bus
 
RemoteAdmin.pptx
RemoteAdmin.pptxRemoteAdmin.pptx
RemoteAdmin.pptx
 
DevOPS training - Day 1/2
DevOPS training - Day 1/2DevOPS training - Day 1/2
DevOPS training - Day 1/2
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
Feedback on Big Compute & HPC on Windows Azure
Feedback on Big Compute & HPC on Windows AzureFeedback on Big Compute & HPC on Windows Azure
Feedback on Big Compute & HPC on Windows Azure
 
Making Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDKMaking Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDK
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL
 
Generating Signatures for cyberattacks.
Generating Signatures for cyberattacks.Generating Signatures for cyberattacks.
Generating Signatures for cyberattacks.
 
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under LinuxPractical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
Practical Guide to Run an IEEE 802.15.4 Network with 6LoWPAN Under Linux
 
Eclipse Kura Shoot a-pi
Eclipse Kura Shoot a-piEclipse Kura Shoot a-pi
Eclipse Kura Shoot a-pi
 

Último

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Certificate Based VPN Remote Access - 1. OpenCA Workshop 2004 / OpenXPKI

  • 1. Fraunhofer-Institut für Digitale Medientechnologie IDMT IDMT VPN Remote Access Ives Steglich Munich, 12. Oct 2004
  • 2. Seite 2 Overview Current Situation and Architecture Goals and Requirements for Improvement Proposed Soft- and Hardware Proposed Architecture How does the USB-Token work? Usageprocess Conclusions
  • 3. Seite 3 Current Situation and Network Architecture Architecture Remote User CISCO VPN Client Firewall and VPN Gateway CISCO PIX Steps to establish an connection 1. VPN Tunnel initialization authenticated by shared secret 2. Access to internal Network authenticated by XAUTH trough tacacs+ Internet Internal LAN Remote User VPN Tunnel Firewall and VPN-Gateway Tacacs+ Server
  • 4. Seite 4 Goals and Requirements for new Solution Main Goals 1. remove the shared secret for remote users 2. keep the available infrastructure 3. use smartcards 4. be open for other usages 5. integration into the local LDAP 6. use open source whenever possible Requirements from Goals and Architecture - introduce certificates and administration - setup an in-house pki - pki must speak SCEP - smartcards must be operable with linux and windows
  • 5. Seite 5 Proposed Soft- and Hardware Software for PKI OpenCA Reasons: - understands SCEP - can publish certs in LDAP - open source - good cooperation with development team Hardware for Smartcards Aladdin eToken Pro Reasons: - works with Microsoft Crypto API - PKCS#11 library for linux available (but hard to get, not offically distributed) - enables OpenCA administration from Linux and Windows (Mozilla, IE)
  • 6. Seite 6 Proposed Architecture Remote User OpenCA-Setup One Server with RA, PUB and SCEP Interfaces One Server with the CA (offline) Access to RA-Interface certificatebased stored at Smartcards PIX-Setup Remote Users Authentication with RSA Certs Client Setup VPN-Gateway identification with Certs Own Authentication with RSA Certs Internet Internal LAN Firewall and VPN-Gateway In-house PKI VPN Tunnel Tacacs+ Server RA/SCEP/PUB Interfaces Offline CA
  • 7. Seite 7 How does the USB-Token work? General - uses proprietary format from Aladdin - therefore needs specific drivers - not PKCS#15 compatible (but can be used parallel if space is left on token PKCS#15 doesn’t works with Microsoft Crypto API) Linux - based on PC/SC-Lite - works with Mozilla through PKCS#11 - doesn’t work right now with OpenSSL engine - hotplugable Windows - works with Mozilla through PKCS#11 - works with Microsoft Crypto API - hotplugable PKCS#11 PC/SC Lite Mozilla Aladdin RTE OpenSSL ? Linux Linux USB-Hotplugsystem Windows CSP PKCS#11 MozillaIE VPN Client Aladdin RTE Windows USB-Subsystem
  • 8. Seite 8 Usageprocess Token Initialization - has to be done at Linux - key generation with Linux+Windows - certificate Iistallation with Linux+Windows - only one Login for User and Admin possible Process - Two Options: - batch-orientied serverside-key-generation (p12 files import through Mozilla or Win-System) - token-based-key-generation (through users themselves) - Administration: - requests initiated through users - granted at RA through ‘Groupleaders’ - certs issued through CA-Operator
  • 9. Seite 9 Conclusions • Authentication for Remote-VPN-Access • Option to skip one step during VPN-Login • Transparent usage with Linux and Windows • Encrypt, Decrypt and Sign E-Mails • Authentication for webbased services (PKI-Access and Administration) • Dezentralized Management • LDAP Storage and Access to Certificates • Still not perfect • Overview about smartcards providing PKCS#11 libs: http://jce.iaik.tugraz.at/products/14_PKCS11_Wrapper/ tested_products/index.php
  • 12. Seite 12 Thanks for your attention! Questions?