So users sharing passwords are at least limited to within an organisation.
Sounds perfectly reasonable.
I don't know the ins and outs of your client base but I did a similar
project a couple of years ago before client side SSL was feasible. Since all
our clients were inter-gov agencies we put in a gateway to gateway VPN
solution over the internet. We then got the reverse proxy to forward the
incoming IP address so we could tell (& validate) where the users were
coming from. This also meant we could tailor content to the organisation
prior to knowing who the user was. It also meant users could use their own
organisation logonids to identify themselves to us - something that was
appreciated.
One limitation we had was not being able to touch client machines. Also all
executable content was blocked at various firewalls so a Java applet
solution was out of the question. Pity because we'd already prototyped
applet/smartcard authentication. Another option was using one-time password
technology (something we use for our own staff). This would mean 0 client
installs and reduces the risk of password sharing (it would also mean
issuing the token generators to users).
I like the idea of installing the keystore/cert at the workstation level.
Means less hassle with VPN infrastructure or cert per user. You would,
howver, be putting the onus onto the administrators (how many per org?) to
do the right thing and not install the keys/certs elsewhere.
Since you can install stuff on client machines I would think the way to go
would be to install an IE extension. Your extension could then do its own
thing (using OpenSSL :-) and encrypt the data itself - don't even need SSL.
Of course it would have to hold the PIN/passphrase to unlock the
workstations private key... and you'd want to make it hard to copy the
keystore and extension to another machine. It would be nice if the server
can initiate a standard client SSL request that invokes your extension
without prompting the user for a cert (then again maybe it can?).
----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, March 10, 2001 4:55 AM
Subject: RE: Client certificates: Key store per workstation, not per user?
> I need to use the client certificates with IE. I will have a look into the
> crypte API.
>
> Thanks
> rainer
>
> -----Original Message-----
> From: Greg Stark [mailto:[EMAIL PROTECTED]]
> Sent: Freitag, 9. März 2001 18:34
> To: [EMAIL PROTECTED]
> Subject: Re: Client certificates: Key store per workstation, not per
> user?
>
>
> Rainer,
>
> You write,
> "...Second, I think, that without client-certificates
> man-in-the-middle attacks are possible, using tools like dsniff."
>
> and this is not correct. As long as the client does proper checking of the
> server certificate AND you use SSLv3 or higher, you are not vulnerable to
> MITM attacks.
>
> I think I understand what you are trying to do but are you writing
your
> own, custom, client software, or are you using MS IE? If the latter, I
don't
> know how hard it would be to implement what you want, but another resource
> you might want to query is the MS Crypto API mailing list archives
> (http://discuss.microsoft.com/archives/cryptoapi.html). You might search
on
> CRYPT_MACHINE_KEYSET to get some posts on similar sorts of issues.
>
> _____________________________________
> Greg Stark
> Ethentica, Inc.
> [EMAIL PROTECTED]
> _____________________________________
>
>
>
> ----- Original Message -----
> From: <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Friday, March 09, 2001 10:56 AM
> Subject: RE: Client certificates: Key store per workstation, not per user?
>
>
> > My project is a inter-government project over the internet, with 2400
> > independent organizations in the first phase. Authentication is a
> important
> > issue. We agreed, that smart cards would be a good solution, but are
> beyond
> > the timescale of the projekt, because we cannot implement that for
10000+
> > users within 6 month. Besides, there is a country-wide project going on,
> > that targets this issue with a 2-year timeframe.
> >
> > UserID and password over SSL are considered as insufficient. First,
> because
> > it is difficult that passwords are kept secret properly in this
> environment.
> > AKAIK, this is still the security threat #1. Second, I think, that
without
> > client-certificates man-in-the-middle attacks are possible, using tools
> like
> > dsniff.
> >
> > Hence, lacking smart cards, an authentication scheme using userid/pw
plus
> > client certificates werde devised. An administrator can only download
and
> > install a certificate, a user can only access the application using the
> > userid. Well, the user could export the certificate and post it on a
> public
> > server, but that is definitely a different thing that just writing down
> the
> > password on the back of the mousepad.
> >
> > The authentication service will check the relationship between
certificate
> > and userid. Ideally a user should be able to work from any PC certified
> for
> > her organization, but nowhere else. In this sense, we do not use
personal
> > certificates, but 'organizational' certificates, as a user may use any
> > certificate within the organization. We cannot rely on all organizations
> > having roaming profiles, where all users would have access to the
> > certificate without depending on the location.
> >
> > The question is the CertStore. To reduce the administrative burden, only
> one
> > certificate per workstation would suffice. Kind of
> "c:\windows\profiles\all
> > users\keystorefile".
> >
> > I would like to your opinion
> > Rainer
> >
> > -----Original Message-----
> > From: bruce cartland [mailto:[EMAIL PROTECTED]]
> > Sent: Freitag, 9. März 2001 14:50
> > To: [EMAIL PROTECTED]
> > Subject: Re: Client certificates: Key store per workstation, not per
> > user?
> >
> >
> > I thought Kerberos was symmetric?
> >
> > I'd like to hear more on the requirement(s)? Identify workstations for
> > audit? Identify users? Not use clear text?
> >
> > I'd love to hear opinion but client side certs for workstations sounds a
> bit
> > strange. The workstation would have to store the keystore/cert unlock
code
> > somewhere. If you just want to identify the workstation (for audit
> > presumably) the server can tell the IP address (can be spoofed though).
> > Perhaps it would be better if the server picked up the MAC address of
the
> > workstation? (haven't found a good way of doing that without running
some
> > kind of service on the workstation the server can talk back to - which
can
> > run into problems with routers/proxies/NATs between the server &
client).
> >
> > User identity + encryption can be done just using userid/pwd + server
SSL.
> >
> > What about using smartards & client side certs for mobile users?
> >
> > I've been told of a nice (commercial) implementation which extends IE or
> > netscape where the server can initiate a client cert request over
http/s.
> > The browser prompts the user to select the keystore/cert, etc. These may
> be
> > stored on a smartcard. I'm hoping to get a demo soon. I'll be very
> > interested to here about alternatives.
> >
> > regards
> > bc
> > ----- Original Message -----
> > From: <[EMAIL PROTECTED]>
> > To: <[EMAIL PROTECTED]>
> > Sent: Friday, March 09, 2001 11:48 PM
> > Subject: RE: Client certificates: Key store per workstation, not per
user?
> >
> >
> > > Does it work in a browser-only environment? Would communicator support
> it?
> > >
> > > Rainer
> > >
> > > -----Original Message-----
> > > From: Jean-Marc Desperrier [mailto:[EMAIL PROTECTED]]
> > > Sent: Freitag, 9. März 2001 13:31
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: Client certificates: Key store per workstation, not per
> > > user?
> > >
> > >
> > > [EMAIL PROTECTED] wrote:
> > >
> > > > I would like to use SSL with client certificates, but assign them to
> > > > workstations instead of users.
> > >
> > > I think you should watch what can be done with kerberos for this kind
of
> > > feature.
> > >
> > > > Does someone know, if there is a way to install a certificate on Win
> > > NT/2K,
> > > > that is shared by all users of a workstation?
> > >
> > > 2K supports Kerberos, with certificate I believe
> > >
> > > ______________________________________________________________________
> > > OpenSSL Project http://www.openssl.org
> > > User Support Mailing List [EMAIL PROTECTED]
> > > Automated List Manager [EMAIL PROTECTED]
> > > ______________________________________________________________________
> > > OpenSSL Project http://www.openssl.org
> > > User Support Mailing List [EMAIL PROTECTED]
> > > Automated List Manager [EMAIL PROTECTED]
> > >
> > >
> >
> > ______________________________________________________________________
> > OpenSSL Project http://www.openssl.org
> > User Support Mailing List [EMAIL PROTECTED]
> > Automated List Manager [EMAIL PROTECTED]
> > ______________________________________________________________________
> > OpenSSL Project http://www.openssl.org
> > User Support Mailing List [EMAIL PROTECTED]
> > Automated List Manager [EMAIL PROTECTED]
>
> ______________________________________________________________________
> OpenSSL Project http://www.openssl.org
> User Support Mailing List [EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
> ______________________________________________________________________
> OpenSSL Project http://www.openssl.org
> User Support Mailing List [EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]