Framework on Key Compromise, Key Loss & Key Rollover

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Presented by YOUR NAME THE DATE
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
MPKI Interoperability I-D ChangeLog from -01 to -02 Jan 16, 2004 Masaki SHIMAOKA SECOM Trust.net.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
National Smartcard Project Work Package 8 – Security Issues Report.
CLUE Framework IETF 84 July 30 – Aug 3, 2012 Mark Duckworth Allyn Romanow Brian Baldino Andy Pepperell.
SIP working group status Keith Drage, Dean Willis.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Standards and Guidelines for IS Auditing (ISACA).
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
1 PKI Disaster Recovery and Key Rollover Bull S.A.S.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
OSG PKI Contingency and Recovery Plans Mine Altunay, Von Welch October 16, 2012.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 Using Common Criteria Protection Profiles. 2 o A statement of user need –What the user wants to accomplish –A primary audience: mission/business owner.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
SonOf3039 Status Russ Housley Security Area Director.
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Wed 24 Mar 2010SIDR IETF 77 Anaheim, CA1 SIDR Working Group IETF 77 Anaheim, CA Wednesday, Mar 24, 2010.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Transcoding Design Team draft-camarillo-sipping-transc-framework-00.txt draft-camarillo-sipping-transc-3pcc-00.txt draft-camarillo-sipping-transc-b2bua-00.txt.
Trust Anchor Update Requirements for DNSSEC Russ Mundy for the editors Steve Crocker, Howard Eland, Russ Mundy.
Chapter 5 Population Health Quality and Safety Learning Objectives 1. Explain why it is difficult to monitor healthcare quality and safety at the population.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
TAG Presentation 18th May 2004 Paul Butler
CLUE WG Interim Meeting San Jose, CA Sept , 2012
Alternative Governance Models for PKI
IP Flow Information eXport (IPFIX)
Public Key Infrastructure (PKI)
CLUE WG Interim Meeting San Jose, CA Sept , 2012
Trust Anchor Management Problem Statement
DRM SIAC Paper Destruction Working Group 13 September 2011
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
The Domain Policy DDDS Application
Network Services Interface Working Group
Public Key Infrastructure Using X.509 (PKIX) Working Group
زير ساخت كليد عمومي و گواهي هويت
جايگاه گواهی ديجيتالی در ايران
Resource Certificate Profile
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Secure Key Distribution and Authorization
REVP Session #58 Closing Report
Network Services Interface Working Group
IEEE MEDIA INDEPENDENT HANDOVER
Privacy Recommendation PAR Proposal
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
IEEE MEDIA INDEPENDENT HANDOVER DCN:
TGr Authentication Framework
IEEE IETF Liaison Report
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
FrAmework for Multi-agency Environments
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
TGr Authentication Framework
Chapter 15 Key Management
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Ready to transition/ Clear to transition
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Presentation transcript:

Framework on Key Compromise, Key Loss & Key Rollover PKIX WG Denis Pinkas. Bull SAS.

PKIX New Work Item Proposal The goal is to develop an Informational RFC to address cases of : key compromise, key loss, and key rollover.

Detailed scope (1 / 2) One goal of the document is to present a framework to assist the writers of policy or practice statements and the designers of a Public Key Infrastructure to prepare disaster recovery plans in case of a private key compromise or a private key loss. The framework will provide a comprehensive list of potential key compromise or key loss conditions that (at the discretion of policy or practice statements writers) should be considered so that it is possible to nicely recover from situations which normally should not happen, but might happen.

Detailed scope (2 / 2) Since keys do not last for ever, key rollover should be planned in advance and guidance is also necessary. The keys to be considered as the keys from: end-users, Certification Authorities, Revocation Authorities, Attribute Authorities, and Time Stamping Units.

Relationship with RFC 4210 There is no intent to develop any new protocol. RFC 4210 already contains a protocol for key rollover (“old by new”, “new by old” and “new by new”). However the text from RFC 4210 describes only what a CA should do, but does not say how a relying party should use the information issued by a CA. The proposed wor item would yield a document providing more details and guidance, by explaining how to achieve root key rollover using the information specified in RFC 4210.

The Way Forward If the work item is accepted by the PKIX WG, then an editing team is ready to progress the document. It would be composed of: Denis Pinkas (lead editor), Arshad Noor (co-editor), Joel Kazin (co-editor).