polito.it
Politecnico di Torino (logo)

Securing digital identities: from the deployment to the analysis of a PKI ecosystem with virtual HSMs leveraging open-source tools

Alessandro Loconsolo

Securing digital identities: from the deployment to the analysis of a PKI ecosystem with virtual HSMs leveraging open-source tools.

Rel. Antonio Lioy. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2024

[img]
Preview
PDF (Tesi_di_laurea) - Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (2MB) | Preview
[img] Archive (ZIP) (Documenti_allegati) - Altro
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (67kB)
Abstract:

The objective of this work is to implement a PKI using exclusively open-source tools, with a particular focus on the integration of EJBCA CE with a virtual HSM. The primary goal is to establish trust between the Authorities and the End Entities within the ecosystem and then to identify the principal challenges that might be encountered during the deployment, from a security, performance and management point of view. The system has been implemented within a containerised environment, with Docker Compose orchestrating the modules of the infrastructure. The designed architecture comprises two EJBCA CE instances, which have been configured as the CA and the VA, respectively. Each instance is equipped with its own database and virtual HSM, and its functionalities are subject to RBAC, thereby ensuring that the principle of least privilege is upheld for the entities within the organisation. SoftHSM2 has been selected as the HSM for this project, due to its strong compatibility with the EJBCA framework. The analysis of the resulting PKI demonstrates that such open-source tools offer a viable and cost-effective option for the provision of strong authentication, particularly in terms of scalability and flexibility. From a performance perspective, the infrastructure has shown the capacity to issue a significant number of certificates with high throughput. Nevertheless, the system exhibits several security deficiencies, including the inability to segregate the CA from the RA, the incompatibility of EJBCA CE with more modern and secure enrolment protocols, such as ACME and EST, and the utilisation of a virtual HSM, which cannot be considered a substitute for a physical one in any case. In conclusion, this solution is suitable for a variety of applications, for instance educational purposes or testing environments. In the context of production, this solution may be adopted by SMBs that do not have complex requirements and wish to enhance their security posture with a minimal investment. Conversely, large enterprises, that have more rigorous security demands, and must adhere to strict compliance policies and establish public trust, will find this solution unsuitable for their needs.

Relatori: Antonio Lioy
Anno accademico: 2023/24
Tipo di pubblicazione: Elettronica
Numero di pagine: 77
Soggetti:
Corso di laurea: Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering)
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA
Ente in cotutela: Universidad Nacional de Cordoba (ARGENTINA)
Aziende collaboratrici: Universiade National de Córdoba - Facultad de Ciencias Exactas Fisicas y Naturales
URI: http://webthesis.biblio.polito.it/id/eprint/31741
Modifica (riservato agli operatori) Modifica (riservato agli operatori)