TPM-Based Certificates for AAMW and SSL/TLS
The firewall uses the TPM-based certificate to ensure secure identification of the device. The firewall has burnt-in idev-id certificate built on TPM. The idev-id certificate provides the firewall’s JNPR serial number and model, proving that the firewall was manufactured in a Juniper facility. Hence, TPM certificate is a secure way for a Juniper device to prove its identity.
Benefits of TPM-Based Certificates
-
Provides trust. Helps to establish advanced security in an insecure digital world.
-
Provides confidentiality. Helps encrypt the data and visible only to the server and client.
-
Provides integrity. Ensures that the data remains unmodified during the transfer.
How Does a Conventional SSL/TLS Certificate Work?
Secure Sockets Layer (SSL) is a protocol that allows encryption. It helps to secure and authenticate communications between a client and a server. It can also secure email, VoIP, and other communications over unsecured networks. SSL is also called as Transport Layer Security (TLS).
In unsecured HTTP connections, hackers can easily intercept messages between client and server. SSL certificates use a public/private keypair system to initiate the HTTPS protocol. Hence, SSL certificates enable secure connections for users and clients to connect. SSL/TLS works through:
- Secure communication that begins with a TLS handshake. The two communicating parties open a secure connection and exchange the public key.
- During the TLS handshake, the two parties generate session keys. The session keys encrypt and decrypt all communications after the TLS handshake.
- Different session keys encrypt communications in each new session.
- TLS ensures that the user on the server side, or the website the user is interacting with, is who they claim to be.
- TLS also ensures that data has not been altered, since a message authentication code (MAC) is included with transmissions.
When a signed SSL certificate secures a website, it proves that the organization has verified and authenticated its identity with the trusted third party. When the browser trusts the CA, the browser now trusts that organization’s identity too.
The easiest way to check if the website has an SSL installed is to see if the website URL starts with “HTTPS:”. If the website has an SSL certificate installed on the server, click the padlock icon in the address bar to view the certificate information.
How Firewall Manages the TPM-Based Certificates Using PKI
Applications such as the advanced anti-malware (AAMW) with Juniper ATP Cloud can use TPM-based certificates for attestation. This allows the applications to verify your device's legitimacy. The firewall manages the TPM-based certificates with public key infrastructure (PKI) using the pkid process. Note the following when using the pkid process for TPM-based certificates:
-
The firewall loads the TPM-based certificate using the pkid process during the device start and restart operations.
-
The device loads the certificate and the private key handle against the TPM based certificate ID, referred as
idev-idcertificate ID, from your device's local certificate list. To view the TPM-based certificate ID, referred asidev-id, use theshow security pki node-local local-certificate certificate-id idev-idcommand. -
You should not use the command
request security pki node-local local-certificate verify certificate-id idev-idto verify theidev-idcertificate ID. The verification doesn't go through as the CA certificate for theidev-idcertificate ID is not available on your firewall. You'll notice an error messagelocal certificate verification can't performed for IDev-ID certificate as the CA cert for the same is not availablewhen you try to verify using the command.
How AAMW and SSL/TLS Use TPM-Based Certificates
Applications such as the AAMW using Juniper ATP Cloud on firewall must use the TPM burnt-in certificate for all its device identification and authentication instead of conventional certificates. The feature helps to establish a secure client authenticated SSL connection with the cloud server using the new TPM certificate. This applies to both control and data plane (SSL-I)/TLS connections established by AAMW. The cloud server confirms the authenticity of TPM private key using TPM public key that the client shares during the SSL handshake. The device identification information is part of the shared TPM certificate.
When you configure SSL-Initiation (SSL-I) profile, there's a requirement on the pkid side to load the TPM certificate and private key handle on start/restart against a certain certificate ID. You can use this certificate to configure the SSL-I profile. This certificate can be used by AAMW for TLS connections. SSL-I need changes on data plane side to use TPM chip for sign/verify purpose for AAMW TLS connections. SSL-I provide the SSL client functionality to ATP Cloud with client authentication. SSL-I mode needs to be supported with TPM certificate/private key. Earlier, SSL-I use the file system local certificate and private key.
You can use SSL-I in two modes:
-
SSL-I with TPM certificate/keys
-
SSL-I with file-system certificate/key
You can configure the tpm option using the set services ssl
initiation profile profile-name crypto-hardware-offload command.