Title: Without Security, Web Services are Dead on Arrival
1Without Security, Web Services are Dead on Arrival
Phillip Hallam-Baker Principal Scientist
2Walking the WalkVeriSign and Web Services
- Provider of Web Services
- XKMS Service live over 1 year
- VeriSign Trust Gateway
- Visit trade show booth for details
- User of Web Services
- Integrate multiple IT infrastructures
- VeriSign
- Signio
- Network Solutions
- Illuminet
- HO Systems
3Web Services is about
- Efficiently interfacing to legacy applications
- Legacy meaning it works
- The mainframe running Cobol from dusty decks
- Connecting to external computing resources
- Supply chain infrastructure
- Automatically place receive orders
- Outsourced computing infrastructure
- Accounting Facilities
- Payroll
- Inventory
- Etc.
4Example Common Interface to Legacy Systems
5Software Industry Strategy
- Key Strategy High volume
- Amortize development costs over more users
- Reduce unit cost to purchaser
- Sell more copies, make more profits.
- Problem
- Purchase cost is no longer main principal
software cost - Total Cost of Ownership is considered
- Price of software approaches cost of production
- As a result of the Internet this is approximately
zero - Solution Amortize Deployment, Maintenance costs
6Objective
- Web Services like email
- Anyone can talk to everyone
- Not like Power Cord
- Different Mains Adapter for Every Device
- 600 service fee to repair broken connector
7And Security?
- Dont want our Power Cords Web Services to
catch Fire
8Why Security Is Needed
- Without Trust and Security
- Web Services are Dead on Arrival
9Web Services Security Groups
10The Problem
Operating System
11What Parts of Web Services Security Should Be
Infrastructure?
- Replicate security context provided by O/S
- Protected Memory
- Prevents modification of process state
- Prevents interception of function calls
- Prevent disclosure
- Access Control
- Authentication
- Authorization
- Auditing
12Is SSL Enough?
- For some applications
- Yes
- As Infrastructure
- No
- SSL Only supports data in transit, not in storage
- SSL does not support multi-party transactions
- SSL is all or nothing
- Messages are opaque to firewalls
- SSL does not support non-Repudiation
13Routing
- SOAP supports message routing
- E.g. to channel through a SOAP Firewall/Trust
Gateway
Internet
Enterprise B
Enterprise A
X
TG
14WS-Security
- SOAP Message Level Security
- Confidentiality
- Integrity
- Authentication
- Builds on XML Standards
- XML Signature Encryption
15WS-SecureConversation
16WS-Policy, WS-PolicyAttachments WS-SecurityPolicy
Which version ?
I speak standard YAWS(Yet Another Web Service)
Which options?
- What Encryption
- Do you support?
- Do you require?
Etc. etc etc.
17Part III Web Services Infrastructure Security
Applications
- Key Management
- XKMS
- Key Agreement TBA
- Distributed Access Control
- SAML
- XACML
- XrML
- Ancillary
- Provisioning SPML
- Biometrics XCBF
- Privacy Profile P3P
18XML Key Management Specification (XKMS)
- Management of Public Keys
- Because all you need to know to communicate
securely with anyone is their public key - Registration
- Alice registers her email signature public key
- Alice might later request reissue, revocation,
recovery - Information
- Bob looks up the key for alice_at_somecorp.com
- Bob checks to see if it is valid
- Core Objective
- Shield the client from the complexity of PKI
19Traditional PKI
Directory
Alice
Bob
ASN1
PKIX
20XKMS PKI Interface
Alice
Bob
ASN1
PKIX
21Example Federal BridgeCertificate Location
Validation
Federal Bridge CA Infrastructure
FBCA Code
XKMS xkms.a1.eop.gov
Alice alice_at_a1.eop.gov
Bob bob_at_navy.mil
22Distributed Access Control
- Authorization Decision
- Can Alice access the general ledger?
- Authentication
- Is Alice the real Alice?
- Attributes
- Alice is a Finance department employee
- Authorization Policy
- Finance department employees may access the
general ledger.
23Distributed Access Control
Request
24Part IV Futures
25WS-TrustAxiom
- It cant be turtles all the way down.
26WS-KeyAgreement
- We Cant Sign Every Message
- Public key cryptography is slow
- This is not the plan
- Use Public Key to Establish a Framework of Trust
- Leverage that framework with fast symmetric key
cryptography - Use mechanisms similar to SSL, IPSEC
- Optimize them for Web Services deployment
- Get extensive expert review
27Questions and Answers