User Tools

Site Tools


projects:auth:intro

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

projects:auth:intro [2015/01/19 07:38]
jann created
projects:auth:intro [2016/08/31 02:56] (current)
jann [Contribution]
Line 69: Line 69:
 Are there more details about the "​Authentication platform"?​ I might have Are there more details about the "​Authentication platform"?​ I might have
 some input on that based on a variety of projects... ;) some input on that based on a variety of projects... ;)
 +</​code>​
 +
 +<​code>​
 +-------- Forwarded Message --------
 +Subject: Authenticating hams on the internet
 +Date: Tue, 30 Aug 2016 23:14:43 +1200
 +From: Ross Whenmouth <​ross@topwire.co.nz>​
 +To: dg8ngn@darc.de
 +
 +Hi Jann,
 +
 +In response to your paper presented at TAPR DCC2014 on the European HAMNET:
 +https://​www.tapr.org/​pdf/​DCC2014-TheEuropeanHAMNET-DG8NGN.pdf
 +
 +On the last page, you asked "How can I authenticate radio amateur operators?"​. I would like to suggest that X.509 certificates could be used for authentication - see:
 +http://​blog.algoram.com/​blog/​2015/​06/​19/​using-the-arrl-logbook-of-the-world-certificate-to-validate-yourself-to-web-services-as-a-licensed-radio-amateur/​
 +
 +As mentioned on the above site, the ARRL is already issuing X.509 certificates to hams as part of their "​Trusted QSL" program (part of LoTW - "​Logbook of The World"​. To gain a certificate,​ I had to install and run the TSQL software to request a new certificate,​ then send a snail-mail letter to the ARRL containing a photocopy of my passport and amateur radio licence. The ARRL has also stated that they would like to see other (amateur) organisations around the world become certifying authorities.
 +
 +
 +Thus, for a "hams only" service facing the internet (packet BBS?, VPN/IP tunnel?, remote radio control?, etc), access should be able to be controlled on the basis of whether the client has a valid certificate signed by a recognised CA (DARC?, ARRL, RSGB?, NZART? etc)
 +
 +
 +
 +Certificates could even be used for authentication of data sent over the radio (the meaning of the message is sent in the clear != encryption) eg something like
 +[START][MYCALL][Cleartext_message][NONCE][SIGNATURE][END]
 +
 +[MYCALL] is used as the database key to find my certificate/​public key.
 +The [NONCE] is a changing number, used to prevent replay attacks (if I send the same message more than once, it has a different [NONCE] each time so a receiver can be sure that I intended to send it more than once).
 +The [SIGNATURE] is a cryptographic hash (eg SHA) of [MYCALL][Cleartext_message][NONCE] which is encrypted with the private key for my certificate (please note that this does not obscure the "​meaning of the message"​ - ITU rules etc).
 +
 +Anyone who receives the message can calculate the hash themselves SHA([MYCALL][Cleartext_message][NONCE]). Anyone who has my public key can "​decrypt"​ the [SIGNATURE] and check that it matches the SHA hash that they calculated themselves (match means that message is authentic).
 +
 +
 +If you do not have my certificate,​ but you do have the CA's public key, then I (or anyone else) can send my certificate to you and you can check that it is valid:
 +[MYCALL][my_publickey][CA_ID][Expiry_date][Signature]
 +Again [Signature] is a hash of the message which is encrypted with the CA's private key.
 +If you have the CA's public key, you can decrypt the signature and check that it matches the locally generated hash eg
 +if (decrypt(signature,​ publickey[CA_ID]) == sha([MYCALL][my_publickey][CA_ID][Expiry_date]))
 +then you know that my certificate was signed by the CA and thus [my_publickey] is valid and can be used to authenticate my messages.
 +
 +
 +
 +73 ZL2WRW
 +Ross Whenmouth <​ross@topwire.co.nz>​
 </​code>​ </​code>​
projects/auth/intro.1421649511.txt.gz ยท Last modified: 2015/01/19 07:38 by jann