QuoVadis accreditation with EuGridPMA Alessandro Usai

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 ISA 562 Information Systems Theory and Practice 10. Digital Certificates.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America The Brazilian Grid Certification Authority.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
IHEP Grid CA Status Report Wei F2F Meeting 8 Mar Computing Centre, IHEP,CAS,China.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
KISTI Grid CA Status Report Korea Institute of Science and Technology Information Sangwan Kim Jae-Hyuck Kwan
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
HEPSYSMAN UCL, 26 Nov 2002Jens G Jensen, CLRC/RAL UK e-Science Certification Authority Status and Deployment.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
Certificate Requests to HIP Jani Pellikka 80 th IETF Mar 27 th – Apr 1 st 2011 Prague, Czech Republic.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
APGrid PMA face-to-face meeting, 9/16/2008 PRAGMA-UCSD CA Team Pacific Rim Application and Grid Middleware Assembly
Community PKIs Initiatives Updates TF-EMC2 Meeting Loughborough, UK 6-7 May, 2009 Licia Florio, TERENA
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
0 NAREGI CA Status Report APGrid F2F meeting in Singapore June 4, 2007 Rumiko Masuko.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
Baltic Grid Certification Authority 15th EUGridPMA, January 28th 2009, Nicosia1 Self-audit Hardi Teder EENet.
QuoVadis Group Overview for EUGridPMA. Snapshot Trust/Link certificate services for the global enterprise –Digital certificates including End User, Qualified,
QuoVadis Group EUGridPMA Update September Overview ► Founded in 1999 in Bermuda, with particular focus providing PKI managed services to multinational.
FP6−2004−Infrastructures−6-SSA [ Empowering e Science across the Mediterranean ] Rome, Tutorial for Certification Authority Managers,
BG.ACAD CA HTTP :// CA. ACAD. BG S ELF - AUDIT REPORT 2014 Vladimir Dimitrov IICT-BAS ( 32 nd EUGridPMA Meeting Poznan, 8-10.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
GRID-FR French CA Alice de Bignicourt.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
NECTEC-GOC CA A Brief Status Report 13 th APGrid PMA Face-to-Face meeting March 24 th, 2014 Large-Scale Simulation Research Laboratory Information Communications.
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
QuoVadis Group Roman Brunner, Group CEO Update for EUGridPMA – May 12, 2009.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
TNGrid CA 24 th EUGridPMA meeting Ljubljana, Slovenia, January, 2012 Heithem ABBES Mohamed JEMNI
IRAN-GRID Certificate Authority 13 th EUgridPMA Meeting Copenhagen May 2008 Majid Arabgol Hessamdding Arfaei Shahin Rouhani
MD-Grid CA Valentin Pocotilenco RENAM Association
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
AEGIS Certification Authority
Classic X.509 AP updates (v4.1)
UGRID CA Sergii Stirenko, Oleg Alienin
Cryptography and Network Security
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Public-Key Certificates
Presentation transcript:

QuoVadis accreditation with EuGridPMA Alessandro Usai

© 2008 SWITCH 2 So who are they (where are you going:)? The company was founded in 1999 with backing from a venture capital affiliate of the Zurich Financial Services Group. The company later underwent a management buyout and subsequent private equity investment from ABRY Partners. QuoVadis is a member of the CA/Browser Forum, and contributed to the creation of standards for the Extended Validation Certificate.QuoVadis is based in Bermuda. They have offices in Switzerland, UK, Holland, New Zealand;they will also open a second data centre in Zurich in November this year.

© 2008 SWITCH 3 QuoVadis current business profile QuoVadis’ accreditations (yearly audits): Qualified Certification Practice Statement (CSP) in Netherlands granted by the Independent Post and Telecommunications Authority (OPTA), based on a certification by the British Standards Institute (BSI) using the TTP.NL Scheme for Certification Authorities. Qualified CSP in Switzerland granted by BAKOM (Bundesamt für Kommunikation I.e.The Federal Office of Communication OFCOM) based on a certification from KPMG using ETSI (European Telecommunications Standards Institute) TS and other related standards. Authorised CSP in Bermuda based on that country’s Electronic Transactions Act. WebTrust for Certification Authorities, and WebTrust for Extended Validation (by Ernst & Young).

© 2008 SWITCH 4 QuoVadis as a CA They currently have three root CAs (one CP/CPS for CA 1 and 3 and a separate one for CA 2). Switch will be linked to the root 1 CA (the one with 2048 bits). What does the CP/CPS look like? Important points to notice: Hardware, security procedures and auditing comply with the EuGridPMA requirements, In particular: HSM for Issuing CA to provide at least FISP Level 3 and/or EAL 4 security standards in both the generation and maintenance in all Root and Issuing CA private keys. Physical controls, procedural controls, personnel controls, audit logging procedures, records archival, key changeover, compromise and disaster recovery.

© 2008 SWITCH 5 The QuoVadis CA certificate hierarchy QuoVadis Root Certification Authority 2048 bits, 2001–2021 QV Schweiz ICA 2048 bits, 2006–2016 QuoVadis standard user certificates (1/2/3y) QuoVadis Root CA bits, 2006–2031 QuoVadis Global SSL ICA 2048 bits, 2007–2017 QuoVadis Business SSL server certificates (1/2/3y) QuoVadis EV SSL server certificates (1/2y) QuoVadis Grid ICA 2048 bits, 2008–2018 QuoVadis Grid user and server certificates (1y)

© 2008 SWITCH 6 What will the grid certificates look like? Notice In particular that: - common prefix for all Grid certs: DC=com, DC=quovadisglobal, DC=grid - prefix for SWITCH user certs: DC=com, DC=quovadisglobal, DC=grid, DC=switch, OU=users - prefix for SWITCH server certs: DC=com, DC=quovadisglobal, DC=grid, DC=switch, OU=hosts  User Certificate example  Host certificate  Issuing CA Certificate example

© 2008 SWITCH 7 EE Certificate Certificate: Data: Version: 3 (0x2) Serial Number: 31 (0x1f) Signature Algorithm: sha1WithRSAEncryption Issuer: C=BM, O=QuoVadis Limited, CN=QuoVadis Grid Issuing CA Validity Not Before: Aug 26 08:41: GMT Not After : Aug 26 08:41: GMT Subject: DC=com, DC=quovadisglobal, DC=grid, DC=switch, DC=users, O=SWITCH, CN=Alessandro Usai Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): … Exponent: (0x10001)

© 2008 SWITCH 8 X509v3 extensions: X509v3 Certificate Policies: Policy: > ROOT CA 1 id Policy: > IGTF Classic Profile X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Client Authentication X509v3 Subject Alternative Name: X509v3 Subject Key Identifier: 7A:5E:63:A9:B3:10:3B:CF:45:60:59:ED:61:59:DE:8B:A4:9A:BE:C9 X509v3 Authority Key Identifier: keyid:42:E6:13:39:8B:3A:41:66:EA:40:C1:0B:81:CE:10:F7:DA:71:74:B9 X509v3 CRL Distribution Points: URI: Authority Information Access: CA Issuers - URI: Signature Algorithm: sha1WithRSAEncryption … -----BEGIN CERTIFICATE----- … -----END CERTIFICATE-----

© 2008 SWITCH 9 Host Certificate Certificate: Data: Version: 3 (0x2) Serial Number: 33 (0x21) Signature Algorithm: sha1WithRSAEncryption Issuer: C=BM, O=QuoVadis Limited, CN=QuoVadis Grid Issuing CA Validity Not Before: Aug 27 08:33: GMT Not After : Aug 27 08:33: GMT Subject: DC=com, DC=quovadisglobal, DC=grid, DC=switch, DC=hosts, O=SWITCH, CN=server.switch.ch Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): … Exponent: (0x10001)

© 2008 SWITCH 10 X509v3 extensions: X509v3 Certificate Policies: Policy: Policy: X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Authority Key Identifier: keyid:42:E6:13:39:8B:3A:41:66:EA:40:C1:0B:81:CE:10:F7:DA:71:74:B9 X509v3 Subject Key Identifier: 7A:5E:63:A9:B3:10:3B:CF:45:60:59:ED:61:59:DE:8B:A4:9A:BE:C9 X509v3 CRL Distribution Points: URI: Authority Information Access: CA Issuers - URI: X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Subject Alternative Name: DNS:server.switch.ch Signature Algorithm: sha1WithRSAEncryption -----BEGIN CERTIFICATE----- … -----END CERTIFICATE-----

© 2008 SWITCH 11 Issuing CA Certificate Certificate: Data: Version: 3 (0x2) Serial Number: 13 (0xd) Signature Algorithm: sha1WithRSAEncryption Issuer: C=BM, O=QuoVadis Limited, CN=QuoVadis Root Certification Authority Validity Not Before: Aug 26 17:01: GMT Not After : Aug 24 17:01: GMT Subject: C=BM, O=QuoVadis Limited, CN=QuoVadis Grid Issuing CA (or ICA?) Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): …

© 2008 SWITCH 12 Exponent: (0x10001) X509v3 extensions: X509v3 Basic Constraints: critical CA:TRUE X509v3 Key Usage: critical Certificate Sign, CRL Sign X509v3 Authority Key Identifier: keyid:AD:0B:3E:70:61:2D:D2:8F:F0:E7:4F:DD:1D:DF:F1:32:70:CD:D6:37 X509v3 Subject Key Identifier: 42:E6:13:39:8B:3A:41:66:EA:40:C1:0B:81:CE:10:F7:DA:71:74:B9 X509v3 CRL Distribution Points: URI: Authority Information Access: CA Issuers - URI: Signature Algorithm: sha1WithRSAEncryption … -----BEGIN CERTIFICATE----- … -----END CERTIFICATE-----

© 2008 SWITCH 13 Switch Requirements/feedback Certificate lifetime of at least ten years for the Issuing CA End Entities and Server certificates lifetime of no more than 13 months. Any further certificate policies extension for the Issuing CA certificate must not include a URI. No intermediate certificate with a key longer than 2048 bits (CA 1). The issuing CA CRL lifetime will be of at least 7 days. No OCSP (online certificate status protocol) responder URI in the Grid certificates, at least initially.

© 2008 SWITCH 14 What will change? SwissSign hierarchy cumbersome e.g. we will not need a safe in a bank anymore:) Less hassle as we will NOT have the field in the certificates DNs. Switch SLCS CA is not affected by the transition! The RAs management will remain the same What will not change?

© 2008 SWITCH 15 QuoVadis timeline QuoVadis CP/CPS and Issuing CA: The process for the Issuing CA and update of the CP/CPS will be roughly as follows: Draft of the initial proposed updates to the CP/CPS over the next few weeks. Agreement with QuoVadis on the technical specifications for the issuing CA and the end user/device certificates (this includes OIDs etc) Build of the issuing CA and first tests: as an estimate the issuing CA should be able to be built by the end of the year. Final updates to the CP/CPS and formal approve by the QuoVadis PMA (dependent on the building of the issuing CA, but quick in principle Submission of the CP/CPS for approval by the EUGridPMA.

© 2008 SWITCH 16 EUGridPMA Accreditation Timeline Can we start with the current CP/CPS review?Any volunteers for the reviewers? Start the real review when the CP/CPS document is approved by QuoVadis We would like to be accredited by May 2009 the latest in Zurich, but if possible by January 2009 at the EUGridPMA meeting in Cyprus. A representative of QuoVadis might attend the meeting in Cyprus, if this is deemed useful.