IE20100277U1 - Securing a computer network using OWL2 digital certificates - Google Patents

Securing a computer network using OWL2 digital certificates

Info

Publication number
IE20100277U1
IE20100277U1 IE2010/0277A IE20100277A IE20100277U1 IE 20100277 U1 IE20100277 U1 IE 20100277U1 IE 2010/0277 A IE2010/0277 A IE 2010/0277A IE 20100277 A IE20100277 A IE 20100277A IE 20100277 U1 IE20100277 U1 IE 20100277U1
Authority
IE
Ireland
Prior art keywords
certificate
owl2
securing
public key
certificates
Prior art date
Application number
IE2010/0277A
Other versions
IES85986Y1 (en
Inventor
O Tuathail Eamon
Original Assignee
Eamon O'tuathail
Filing date
Publication date
Application filed by Eamon O'tuathail filed Critical Eamon O'tuathail
Publication of IE20100277U1 publication Critical patent/IE20100277U1/en
Publication of IES85986Y1 publication Critical patent/IES85986Y1/en

Links

Abstract

ABSTRACT Public Key Infrastructure (PKI) is the use of digital certificates to provide authentication, confidentiality and other security services for computer networks. A digital certificate binds a public key with the principal's identity. Up to now, PKI has used X.509 digital certificates based on ASN.1 for encoding and distinguished names (DNs) for identification. The rapidly evolving semantic web aims to provide a machine-understandable representation of knowledge. Knowledge is encoded using the updated Web Ontology Language, version 2 (OWL2). Uniform Resource Identifiers (URIS) are used for identification. The present invention relates to securing computer networks using OWL2-based digital certificates. Specifically it relates to a computer network (1) comprising of a client computer (2), a server computer (3) and a network connection (4) between them; and an OWL2 digital certificate (S) and a security protocol (6) that accesses the certificate to determine the public key, identifier and other information needed for securing the network communication.

Description

Securing a computer network using 0WI2 digital certitzcj ates Field at invention The present invention relates to securing a computer network using Public Key Infrastructure (PKI) based on semantic web concepts.
With the universal acceptance of web standards (such as XML and URI) and the growing interest in semantic web standards (such as OWL2 and RDF) it is advantageous to build PKI based on this foundation (with signing via XML digital signatures), rather than on older constructs that are little known and have little use outside of security/networking circles - such as ASN.1, Distinguished Names (DNs) and Object Identifiers (OIDS).
Background to the invention The humble username and password still remain the dominant authentication mechanism worldwide, despite the fact that most security experts believe Public Key Infrastructure (PKI) offers a far superior level of security (and broader range of security services — e. g. data integrity and confidentiality). PKI has not been a failure, but it certainly has not been a huge success either. PKI has been successfully deployed in some large corporate networks (where there are skilled system administrators available) and certain other areas (e.g. server-side authentication/confidentiality for eCommeree sites) but in general it has had i limited impact.
At the heart of PKI is a very simple concept — securing a computer network using an electronic document known as a digital certificate that ties together the subject's identifier and public key, and a Certification Authority (CA) makes this information and additional security assertions securely available so that others (who trust the CA) may rely upon it.
What should be a very simple infrastructure has evolved into something that takes far too much effort, money and time to get right.
One of the issues is that what one needsto learn about existing PKI (X509, ASN.1, DNS, OIDS) have little or no use outside of PKI for many administrators, and are simply unknown to general computer users.
The present invention aims to reimagine how PKI works using the modern semantic web and to secure computer networks based on the result. tit Cum) Moving from ASN.1 to OWL2 The biggest difference between X509 and the presentinvention is that the former uses ASN.1 and the latter the W3C standard, Web Ontology Language, version 2 (OWL2), which is part of the W3C's Semantic Web initiative (http://www.w3.org/standards/sem anticweb/).
The number of people using ASN.1 on new projects is decreasing, whereas the number using OWL2 is increasing, and is likely to accelerate as the Semantic Web evolves. ASN.1 users are concentrated in the ITU/ISO standards arena, whereas OWL2 is seeing a much more diverse userbase (CC/PP for describ-ing device capabilities and user preferences, Dublin Core for metadata, many ontologies and plenty of custom applications).
OWL2 is a key building block for the semantic web and hence is increasingly likely to be part of the general skillset of developers, administrators and experienced users in future.
OWL2 is an assertional language -, a certificate is a set of one or more assertions (e.g. this public key belongs to this subject) and hence it is an ideal basis for specifying certificates.
The real goal of the semantic web is to enable software agents make inferences based on A statements. Though this is a work in progress, as advances are made it becomes more useful to have verified identity information, such as certificates, readily available (rather than having to translate them from other formats).
One advantage ASN.1 has over XML-based OWL2 is that it is more compact. In the age of huge hard disks and fast networks, such an advantage is not overwhelming.
Moving from DNs to URIs Identity (of people, computers, resources) is the foundation of securing computer networks.
In the XML world, URIS provide uniqueness. In practice, URIs have been shown to work extremely well. URIs have massive public acceptance, appearing on everything from buses to newspapers to breakfast cereal boxes. The following URI is far more acceptable to end- users than a similar DN: mailtozjohn.doe@example.com In stark contrast, the Distinguished Names (DNs) used by X509 have zero public acceptance, and even within the development community, relatively few have a good understanding of them.
The proponents of DNs will argue they offer more than just uniqueness for the subject's identifier — they also offer a hierarchical naming scheme. True, but this is much too rigid for the real world. People move locality and country and change organizational units often.
DNS imposes a static formal hierarchical structure when in most cases it is far more fluid.
The Semantic Web is all about classification, so additional statements may be added to the certificate to indicate organizational association if needed.
Moving from OIDS to URIs ASN.1 uses Object Identifiers (OIDS) to uniquely identify objects in a well-known hierarchy. Standard-setting organizations and individual companies may apply for an object node in the hierarchy and any objects they created can be placed below their node and marked as “belonging” to them.
The present invention uses URIS to identify constructs that need to have identity. There is no need to apply for a URI — so, unlike 0IDs, there is no global registry, but such a registry brings little tangible benefit.
Moving from ASN.1 Extensions to Certified Statements The significant new feature in version 3 X509 certificates was the introduction of extensions. This allowed certification authorities to append to the certificate custom information in addition to the subject's public key. Examples could include a photograph or biometric information. Custom extensions have been created by companies that write certification authorities and specialist security companies, but very few general corporate development teams havecreate such extensions, despite the fact that they could be highly useful.
X509 certificate extensions must be written in ASN.1, and this is a major problem for the general developer community which does not know ASN.1.
With the present invention, certificates contain a range of OWL2/RDF statements, {E10 02 including custom statements added by local certification authorities. Since it is a syntax that will be better known, hopefully we will see a significant increase in the use of certificate extensions.
With the semantic web, many statements may be made about subjects — and such statements may come from many different places. Whether we believe them or not is a totally different issue - much like the web today — some places we trust, and some not so.
The benefit of having such statements inside the certificate is that the certification authority is vouching for their authenticity.
Removal of Little Used Fields Two fields that X509 certificates may contain but the OWLZ digital certificates in the present invention does not, are: 0 Issuer Unique Identifier — allows an issuer's name to be reused Subject Unique Identifier — allows a subject's name to be reused V These fields are optional in X5057 and section 4.1.2.8 of IETF RFC2459 recommends that names not be reused and that CA3 should not generate certificates with unique identifiers.
Removal of Field Containing Duplicated Information The Signature field in the X.509 certificate stores the algorithm identifier for the algorithm that the CA uses to sign the certificate. (An aside: this field really should be called algorithm identifier, because that is what it contains and not a signature). This information is repeated in the X.509 certificate when the actual certificate is stored (the encrypted field).
With the present invention, the XML Digital Signature contains information about the algorithm used to sign the certificate and this information is not supplicated inside the certificate.
Adding Extension Fields to Main Body of Certificate With the present invention, certain fields that would normally appear as extensions in X.509 certificates (e.g. Key usage, CRL distribution point) have moved to the main body of the certificate. It is recommended that most certificates have these fields filled in, and it, is more clearly indicated by not marking them as “extensions”.
Statement 0 in ention Accordingly, there is provided a method for securing a computer network comprising the steps of: ° defining an OWL2 digital certificate to store the principal's identity and public key, - modifying a security protocol to access the principal's identity and public key from said certificate, ° connecting computer devices via a computer network, and - securing said network using said security protocol.
In one embodiment, the security protocol is Transport Layer Security (TLS).
In one embodiment, the security protocol is XML Digital Signatures.
In one embodiment, the security protocol is XML Encryption.
In one embodiment, the security protocol is the Security Assertion Markup Language (SAML).
The principle advantage of the presented invention is that providing PKI based on Semantic Web standards is likely to see greater use of PKI and its easier integration with other information processes.
Brie scri tion he drawi Fig. I shows the major components.
Detailed description The present invention relates to securing computer networks using OWL2-based digital certificates.
E10 02 As shown in figure 1, it relates to a computer network (1) comprising of a client computer (2), a server computer (3) and a network connection (4) between them; and an OWL2 digital certificate (5) and a security protocol (6) that accesses the certificate to determine the public key, identifier and other information needed for securing the network communication.
It is assumed that the reader has ready access to computers, network equipment and standard security protocols (TLS/SSL, SAML, XML Digital Signatures/Encryption etc.), and hence our discussion below focuses on what is unique in the presented invention.
Our discussion of the invention is divided into two parts: - Part 1 discusses the layout of the OWL2 certificate itself - Part 2 explains how such a digital certificate can be used with computer networks and security protocols PART 1 — OWLZ Digital Certificate Format The primary role of a certificate is to specify an assertion by a certification authority that a particular public key is associated with a particular subject. Additional assertions (extensions) may also be made by the Certification Authority (CA) about the subject and they too must be securely stated.
Certificate Statements An OWL2 certificate must contain the following statements defined using the Web Ontology Language, version 2: ° VersionUri [URI]: Indicates which certificate version format is used - CertificateUri [URI]: A unique identifier for this particular certificate - SubjectUri [URI]: A unique identifier for the subject ' hasSubjectPublicKeyInfo [depends on algorithm]: the public key information, algorithm identifier and parameters E10 0277 - IssuerUri [URI]: which certification authority issued this certificate ° Validity Period -— NotValidAfter and NotValidBefore (date): The period in which this certificate is to be consider valid (provided it has not been revoked) An OWL2 digital certificate may contain the following statements: » - hasCRLDistributionPoint (CRLDistributionPoint): Where to find the certificate revocation list for this CA - KeyUsage (list of URls): How should this certificate be used - CertificationPracticeStatementUri: Where to locate policy information A certificate may also contain additional statements.
VersionUri The version of the OWL2 specification used for this certificate. Certification authorities should issue certificates with the most recent version they support. Client software should work with the most recent version they support and previous versions.
CertificateUri This is a unique identifier that distinguishes this certificate from others issued by this Issuer. It plays the role of a "serial number" for a certificate. CertificateUri and IssuerUri together provide global uniqueness.
SubjectUri A unique identifier for the subject whose public key info is stored -in this certificate. If this certificate is for a root CA itself, then the SubjectUri and IssuerUri must be the same (e.g. a "self-signed" cert). A CA must ensure that for each subject a different SubjectUri is used. A CA may issue multiple certificatesto the same subject (e.g. one for signing and one for encryption).
|E1002 hasSubjectPublicKeyInfo The public key information that needs to be associated with the subject.
This is an ObjectProperty of range PublicKeyInfo - whose sub-classes contain information for different algorithms. Two sub-classes are currently defined, one named RSAPublicKeyInfo for RSA (with DatatypeProperties Modulus and Public Exponent) and one named DSAPublicKeyInfo for DSA (with DatatypeProperties for P, Q and G).
IssuerUri A unique identifier for the CA issuing this certificate.
NotValidBefore and N otValidAfter The dates before and after which the certificate should not be considered valid. hasCRLDistributionPoint An optional ObjectProperty of type CRLDistributionPoint.
' CRLDistributionPoint has the following properties: - CRLIssuer — where the CRL can be found (if not the same CA as who issued the certificate) - DistributionPointUr1— The Url from where the CRL may be downloaded ° hasRevocationReason — why the revocation is needed hasRevocationReason is an enumeration with the following values (based on RFC 2459, section: 4.2.1): - Affi1iationChanged - CaCompromise - CessationOfOperation |E1002 - KeyCompromise - Superseded ° Unused hasKeyUsage hasKeyUsage indicates permissible usage for this certificate — it is an enumeration with the following values: - CRLSign - dataEncipherment ' decipher0nly - digitaisignature ' encipheronly - keyAgreement - keyCertSign ' keyBncipherment ' nonkepudiation ° cqdesigning ° timeStamping t1sC1ientAuthentication t1sServerAuthentication lE1oo277 CertificationPracticestatementUri .
Information containing the policy in force during the operation of the CA and the granting of certificates. It is a URL to a document that may be displayed to end-users and administrators.
Sample Certificate rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI"> http://www.clipcode.com/Identity/OWL2/March10 rdf:datatype="http://www.w3.org/2001/XMLSchema#date"> 2010—03—02 rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI"> mailto:john.doe@example.com rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI"> http://www.cerp_auth.example.com rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI"> http://www.cert_auth.example.com/l234 rdf:datatype="http://www.w3.org/2001/XMLSchema#date"> 20l2—03—O1 Securing the Certificate with XML Digital Signatures XML digital signatures (as defined in the W3C XML Signature Syntax and Processing standard - http://wWw.w3.org/TR/xmldsig-core/) are used to provide integrity for the certificate. OWL2 certificates must be signed by the Certification Authority (CA) using XML digital signatures. lE1oo2 PART2-Using OWL2 digital certificates with computer networks & security protocols This section discusses use of OWL2 certificates with a range of well-known security protocols.
Most protocols that make use of certificates are not tied to a particular format (e.g. X509), but rather allow the format to be configured as a normal part of the protocol.
Some however, need to be slighted extended to support the new certificate format type.
XML Signature and XML Encryption XML Encryption (http://www.W3.org/TR/xmlenc-core/) provides for the encryption of-, and XML Digital Signatures provides for the signing of XML data. In both cases, the cert data may be provided by a Keylnfo element. The Keylnfo has the following definition: <1-— (1,1) elements from (O,unbounded) namespaces »—> E10 02 It contains an unbounded choice of a variety of keying data. It is noted that included in the choice is the wildcard any, which allows third parties to extend the available Keylnfo structures. The presented invention provides a schema which defines an element, Owl2CertData, that may be placed within Keylnfo. Its identifier is: - http2!/wwwclipcode.com/identity/20100304/Owl2Data and it has the following schema: "http://clipcode.com/Identity/owl2—xmldsig—keyinfo.xsd" elementFormDefault=“qualified" xmlns= - "http://clipcode.com/Identity/owl2—xmldsig—keyinfo.xsd" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax~ns#"> type="Owl2CertDataType" /> type="rdf:RDF" /> It is noted that the signing of OWL2 certificates themselves make use of XML Signatures.
Transport Layer Security (TLS) I Secure Sockets Layer (SSL) TLS is the updated version of SSL.
E10 02 Unlike XML Digital Signatures, the IETF TLS specification (RFC 2246 - http2//www.ietf.org/rfc/rfc2246.txt]) Version 1.0 is not flexible in the certificate formats it uses — the current TLS specification states that Distinguished Names (DNs) must be used and that the certificate formats must be X509 (e.g. Section 7.4.2 of RFC 2246 states: “A11 certificate profiles, key and cryptographic formats are defined by the IETF PKIX working group”).
To use OWL2 certificates with TLS, TLS needs to be extended in a small number of places. The version number needs to be incremented, and two messages, Certificate Request and Certificate need to be extended.
TLS Version Number The TLS Record Layer contains a two-byte version field, one byte for major version and one byte for minor version. To indicate usage of the updated version of TLS, the minor version number field is to be set to 2 (it is I for TLS 1.0 and {J for SSL). The major version number remains at 3, as it is for TLS 1.0 and SSL.
Implementations of this updated version of TLS must support OWL2 certificates and may support X.509 certificates.
TLS Certificate Request Message This message is sent from a non-anonymous server to a client and contains a list of identifiers for Certification Authorities which the server finds acceptable.
With X509, CA identifiers are Distinguished Names and with the present invention, they are URIS. The Certificate Request message has been extended to include an identifier format and support for carrying URIS or DNs.
Note: the syntax used in RF C2246 does not directly permit the specification of extensibility — hence we use “...” to indicate the possibility of additional formats beyond the present invention and X.509 certificates.
Using the syntax of RFC2246: enum {uri (1), dn (2), ...} CAIdentifierFormatType; E10 0277 opaque Uri<1..2“l6—1>; opaque DistinguishedName; struct { ClientCertificateType certificate_typesf CAIdentifierFormatType identifier_format; union { DistinguishedName dn_certificate_authorities<3..2“l6-l>; Uri uri_certificate_authorities<3..2“l6—1>; IO } } } CertificateRequest; TLS Certificate Message With TLS, the server sends the Certificate message after the Server Hello message and the client sends it after receiving Server Hello Done, if_ it has received a Certificate Request message from the server during the initial handshake. This message has been extended to include an identifier for the certificate format and support for carrying OWL2 certificates. enum {Owl2Pki [1], X509 (2), ...} CertificateFormatType; opaque Owl2Cert; opaque ASN.lCert<1..2“24—1>; strnct { CertificateFormatType certificate_format; union { Owl2Cert Owl2;certificate_list; ASN.1Cert x509_certificate_list; lE1oo2 } Certificate; Security Assertion Markup Language (SAML) SAML is defined by the OASIS Security Services Committee (http://www.oasis-open.org/committees/tc__horne.php?wg_abbrev=security).
It is noted SAML uses Keylnfo from XML Signature, and what is specified in section 5.1 of this specification regarding Keylnfo also applies to its usage in SAML.
SAML Name Identifier Format The Format attribute for Name Identifiers is used in , and elements (section 8.3 of [SAML]) and it defines which format the name is in. For names used with OWLZ certificates, use the following URI: http2//clipcode.com/Identity/20100302/Owl2PKINameFormat SAML Authentication C ontext [SAl\/IL,-AUTH-CTX] states that for SAML: “Authentication context is defined as the information, additional to the authentication assertion itself, that the service provider may require before it makes an entitlements decision. with respect to an authentication assertion.” The SAML specification defines authentication contexts for X5.09 and SPKI certificates, and based on these is the following authentication context for OWL2 certificates: "http://clipcode.com/Identity/20100302/Owl2PKI—AC" xmlns:ac="urn:oasis:names:tc:SAML:2.0:ac" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="http://clipcode.com/Identity/20100302/Owl2PKI~AC" finalDefault="extension"> schemaLocation= "clipcode~saml—schema—authn-context—owl2pki~O . 1 . xsd" /> E10 02 77 Authentication context to be use with OWLZPKI certificates base="ac:AuthnContextDeclarationBaseType"> I0 maxOccurs="unbounded" /> m1oo2 minOccurs="O" maxOccurs="unbounded" /> type="PasswordAuthnMechanismType"/> base="ac:PrincipalAuthenticationMechanismType"> ref="ac:RestrictedPassword“ /> type="xs:integer" use="optional" /> E10 0277.
I Protocol Bindings Section 3.1.2.1 of the SAML Bindings specification states: Unless otherwise specified, in any SAML binding's use ofSS'L 3.0 [SSL3] or TLS 1.0 [RF C2246], servers MUST authenticate to clients using a X509 V3 certificate. The client MUST establish server identity based on contents of the certificate (typically through examination of the certificate is subject DNfiela', subject/IltName attribute, etc. ).
With the introduction of configurabie certificate ‘format support in TLS that includes supports 0wl2 certificates, this should now be changed to: Unless otherwise specified, in any SAML binding's use of SSL 3.0 [SSL3] or TLS J .0 [RF C2246 ] or T LS 1.], servers MUST authenticate to clients using a certificate valid for the SSL/TLS version, such as X109 certificate or an OWL2 certificate. The client MUST establish server identity based on contents of the certificate (typically through examination of the certificate is subject Uri — for OWL2 certificates, or subject DN field, subject/1ItName attribute, etc. for X5 09 certificates).

Claims (1)

Claims
1. A method for securing a computer network comprising the steps of: defining an OWL2 digital certificate to store the principal‘s identity and public key, modifying a security protocol to access the principals identity and public key from said certificate, connecting computer devices via a computer network, and securing said network using said security protocol. . A method as claimed in claim I, wherein the security protocol is Transport Layer Security (TLS). . A method as claimed in claim 1, wherein the security protocol is XML Digital Signatures. . A method as claimed in claim 1, wherein the security protocol is XML Encryption. . A method as claimed in claim 1, wherein the security protocol is the Security Assertion Markup Language (SAML).
IE2010/0277A 2010-05-05 Securing a computer network using OWL2 digital certificates IES85986Y1 (en)

Publications (2)

Publication Number Publication Date
IE20100277U1 true IE20100277U1 (en) 2012-05-09
IES85986Y1 IES85986Y1 (en) 2012-05-09

Family

ID=

Similar Documents

Publication Publication Date Title
Farrell et al. An internet attribute certificate profile for authorization
Gutmann {Plug-and-Play}{PKI}: A {PKI} Your Mother Can Use
US9178869B2 (en) Locating network resources for an entity based on its digital certificate
Bhatti et al. An integrated approach to federated identity and privilege management in open systems
EP1668815B1 (en) Delegated certificate authority
US20020194471A1 (en) Method and system for automatic LDAP removal of revoked X.509 digital certificates
Koshutanski et al. Distributed identity management model for digital ecosystems
Tehrani et al. The missing piece: On namespace management in NDN and how DNSSEC might help
Wagner et al. DNS-based trust scheme publication and discovery
Schaad Certificate Management over CMS (CMC) Updates
IE20100277U1 (en) Securing a computer network using OWL2 digital certificates
Cánovas et al. A credential conversion service for SAML-based scenarios
Berger A Scalable Architecture for Public Key Distribution Acting in Concert with Secure DNS
IES85986Y1 (en) Securing a computer network using OWL2 digital certificates
IES20100277A2 (en) Securing a computer network using OWL2 digital certificates
Jones et al. Layering public key distribution over secure DNS using authenticated delegation
Pala et al. Extending PKI interoperability in computational grids
Farrell et al. RFC 5755: An Internet Attribute Certificate Profile for Authorization
Sharif et al. Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities
Rabinovich A search engine for the global PKI
Koshutanski et al. Towards user-centric identity interoperability for digital ecosystems
Kovinić et al. Securing Service Access with Digital Certificates
Jones et al. Layering a Public Key Distribution Service Over Secure DNS:“Everybody Comes to RIKS”
Larsen Addressing Security Requirements within the SPACE System
Poggi et al. XML-based Trust Management in MAS.