Ilari & Rene,

Certificate-based smart cards are widely used within the US Government. The 
Department of Defense has millions of it's so-called CACs (Common Access Cards) 
in use, and they are used by most DoD employees on a daily basis to access 
information systems (logical access). Other federal agencies have been less 
successful, but still somewhat successful, with the deployment of the PIV 
(Personal Identity Verification) cards for logical access.  It is very common 
for federal agencies to purchase laptops that have slots for smart cards.


The primary advantage of the CAC and PIV cards is that they provide both 
physical access and logical access. For physical access, the cards have 
embedded proximity chips. For logical access, the advantage is that they free 
relying parties from both identity and password management. If a card is lost, 
the employee can get a new card without having to change a single password. 
They also significantly ease the usability burden, as the employee need only 
remember a 6 digit PIN.


I have an article coming out in a few weeks that looks in depth at the CAC and 
PIV deployment.  When it is published, I will post a link here.


Ilari is correct in stating that the use of smartcards requires the deployment 
of a card-reading infrastructure. The growing use of smartcards for credit 
cards might result in the deployment of some credit card readers in the home, 
which could also be used for certificate-containing smartcards. Another 
promising form factor are USB tokens that combine a smartcard chip and a 
smartcard reader.


I believe that one way to move forward in providing strong logical 
authentication is systems that allow people to use the chips in their credit 
cards as an identity root. Another way to move forward is for universities and 
businesses to adopt multi-mode cards for their identification cards. With the 
cost of smart card readers plummeting (they cost less than $15 now retail, and 
the actual parts cost is substantially less), the fact that smartcards provide 
both high levels of usability and security should be attractive to many 
organizations.


Simson Garfinkel

________________________________
From: dane <dane-boun...@ietf.org> on behalf of Ilari Liusvaara 
<ilariliusva...@welho.com>
Sent: Saturday, September 17, 2016 12:13 PM
To: Rene 'Renne' Bartsch, B.Sc. Informatics
Cc: IETF DANE Mailinglist
Subject: Re: [dane] draft-ietf-dane-smime-12: TLS client-authentication

On Sat, Sep 17, 2016 at 05:37:12PM +0200, Rene 'Renne' Bartsch, B.Sc. 
Informatics wrote:
> Hi,
>
>
> everyone knows the problem:
>
> We have dozens or hundreds of services to login and every service wants
> a user-name and a password. Most users reuse their passwords and a lot
> of services do not protect the passwords securely (no hashing, salting,
> etc.). If a service is hacked or malicious, the perpetrator can be quite
> sure to be able to reuse the credentials at other services. Not to
> mention passwords like 12345.
>
> In TLS operation, a user can be authenticated with a client-certificate.
> The password is neither transmitted over the wire nor to the
> service-provider. There is only one single password for the
> client-certificate instead of multiple passwords for multiple services.

> So I suggest to add this case to the application description in section
> 6 of draft-ietf-dane-smime-12 or a successor/errata. (Sorry, I lost
> track of the current state of SMIMEA).

Unfortunately, client certificates tend to be UX disaster. Things only
get worse if one needs to consider multiple services, as using one key
for multiple services tends to have bad security consequences.

These tend to be the reasons browser vendors are phasing out <keygen>
and client certificate installation, pretty much meaning one has to
have physical smartcard for TLS client certificate authentication.

And such smartcards with the necressary equipment are pretty rare
(I happen to have one) and tend to be built around real-world identity,
which is great for some services, but not-so-great for most.

I have once experimented on what it would take to implement client
certificate authentication in a site, and pretty quickly gave up,
given the horrible UX it had (not to mention technical problems,
even with all the PKI baggage I could short-circuited).



-Ilari

_______________________________________________
dane mailing list
dane@ietf.org
https://www.ietf.org/mailman/listinfo/dane
dane Info Page - Internet Engineering Task 
Force<https://www.ietf.org/mailman/listinfo/dane>
www.ietf.org
Your email address: Your name (optional): You may enter a privacy password 
below. This provides only mild security, but should prevent others from messing 
with ...



_______________________________________________
dane mailing list
dane@ietf.org
https://www.ietf.org/mailman/listinfo/dane

Reply via email to