CDB-040224-1 Chris Bonatti (IECA, Inc.) Tel: (+1) 301-548-9569 Proposed PKI4IPSEC Certificate Management Requirements Document IETF #59 – PKI4IPSEC Working.

Slides:



Advertisements
Similar presentations
NAT-PT Applicability Statement Design Team IETF #57, IETF V6OPS WG Vienna, Austria July 16, 2003.
Advertisements

Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
IETF-IEEE Relationship Status Report. Agenda Administrivia – Nose count and agenda bash – Approval of minutes from leadership meeting RFC 4441bis status.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Multicasting Applications Across Inter-Domain Peering Points Percy S. Tarapore, AT&T Robert Sayko, AT&T Greg Shepherd, Cisco Toerless Eckert, Cisco Ram.
MPKI Interoperability I-D ChangeLog from -01 to -02 Jan 16, 2004 Masaki SHIMAOKA SECOM Trust.net.
MPKI Interoperability I-D ChangeLog from -00 to -01 Oct 27, 2003 Masaki SHIMAOKA SECOM Trust.net.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
Status report for draft-ietf-ipsec-pki-profile Paul Hoffman, Director VPN Consortium for Brian Korver
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Certificate Path Building draft-ietf-pkix-certpathbuild-01.txt Peter Hesse Matt Cooper Yuriy Dzambasow Susan Joseph Richard Nicholas.
[Insert Project Name] Architecture Review (AR) [Insert Date of AR] [Insert Clarity ID] Centers for Medicare & Medicaid Services eXpedited Life Cycle (XLC)
Open Pluggable Edge Services (opes) 62 nd IETF Meeting Minneapolis, MN, USA.
1 SIPREC Recording Metadata format (draft-ram-siprec-metadata-format- 01) IETF-80 SIPREC MEETING R Parthasarathi On behalf of the team Team: Paul Kyzivat,
SIP working group status Keith Drage, Dean Willis.
[Insert Project Name] Architecture Review [Insert Date of AR] Centers for Medicare & Medicaid Services eXpedited Life Cycle (XLC)
INFO415 An overview of systems development
11/10/2003Pki4ipsec-nov03-agenda BOF Profiling Use of PKI in IPsec pki4ipsec Chairs: Gregory M Lebovitz Steve.
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
Yang Shi, Chris Elliott, Yong Zhang IETF 73 rd 18 Nov 2008, Minneapolis CAPWAP WG MIB Drafts Report.
Submission November 2003 Dorothy Stanley (Agere Systems) IETF Liaison Report November 2003 Dorothy Stanley – Agere Systems IEEE Liaison To/From.
Megaco IP Phone Status Peter Blatherwick TIA TR , May 2000 Meeting Megaco IP Phone Standards Status Update Peter Blatherwick Nortel Networks,
LDAP Items
July 27, 2009IETF NEA Meeting1 NEA Working Group IETF 75 Co-chairs: Steve Hanna
SACM Requirements Nancy Cam-Winget March 2014.
IETF #82 DRINKS WG Meeting Taipei, Taiwan Fri, Nov 18 th
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
BGPSEC Router Key Roll-over draft-rogaglia-sidr-bgpsec-rollover-00 Roque Gagliano Keyur Patel Brian Weis.
Open Pluggable Edge Services (opes) 61st IETF Meeting Washington, D.C., USA.
Disman – IETF 56 Alarm MIB Sharon Chisholm Dan Romascanu
PAWS Protocol to Access White Space DB IETF 81 Gabor Bajko, Brian Rosen.
Enterprise IPv6 Transition Analysis IETF 62 IPv6 Operations Working Group March 7-11, 2005 Minneapolis, MN Presenter Jim Bound Jim Bound (Editor), Yanick.
CDNI Requirements (draft-lefaucheur-cdni-requirements-02) CDNI Working Group IETF 81 Quebec City, Canada July 28, 2011 Kent Leung Yiu.
Multiple Interfaces (MIF) WG IETF 79, Beijing, China Margaret Wasserman Hui Deng
Transient BCE for Proxy Mobile IPv6 draft-ietf-mipshop-transient-bce-pmipv6-00.txt Oliver Marco
IPv6 Working Group IETF58 Minneapolis November 2003 Bob Hinden & Brian Haberman Chairs.
RADEXT WG IETF 91 Rechartering. Why? Current charter doesn’t allow us to take on new work that is waiting in the queue Has an anachronistic Diameter entanglement.
Status of L3 PPVPN Working Group Documents March 2005 – Minneapolis IETF Ross Callon Ron Bonica Rick Wilder.
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well.
Pki4ipsec - IETF 59 - Seoul, Korea1 pki4ipsec Profiling Use of PKI in IPSEC WG.
March 2006 CAPWAP Protocol Specification Update March 2006
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
IETF-90 (Toronto) DHC WG Meeting Wednesday, July 23, GMT IETF-90 DHC WG1 Last Updated: 07/21/ :10 EDT.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
March 19, 2003AAA WG, IETF 561 AAA WG Meeting IETF 56 San Francisco, CA March 19, 2003.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
1 Header Compression over IPsec (HCoIPsec) Emre Ertekin, Christos Christou, Rohan Jasani {
Public Key Infrastructure Using X.509 (PKIX) Working Group March 20,
NETLMM Applicability Draft (Summary) 28 Sep
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Diameter SIP Application
Interface to the Routing System (IRS) BOF IETF 85, Atlanta November 2012.
CDB Chris Bonatti (IECA, Inc.) Tel: (+1) Proposed PKI4IPSEC Certificate Management Requirements Document IETF #60 – PKI4IPSEC Working.
MODERN BoF Managing, Ordering, Distributing, Exposing, and Registering telephone Numbers IETF 92.
CDB Chris Bonatti (IECA, Inc.) Tel: (+1) Proposed PKI4IPSEC Certificate Management Requirements Document IETF #61 – PKI4IPSEC Working.
Profiling Use of PKI in IPsec (pki4ipsec) Date: Monday, Mar 7, 2005 at Location: Rochester room Chairs: Paul Knight Gregory Lebovitz Mail list:
IETF68 DIME WG Diameter Applications Design Guidelines Document (draft-fajardo-dime-app-design-guide-00.txt)
1 Link Scoped IPv6 Multicast Addresses Jung-Soo Park, Myung-Ki Shin ETRI 54th IETF – Yokohama, Japan draft-ietf-ipv6-link-scoped-mcast-01.txt.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-05.txt Bernard Aboba Microsoft IETF 62, Minneapolis, MN.
Discovery of CRL Signer Certificate Stefan Santesson Microsoft.
Draft-dploy-requirements-00 Overview: draft-dploy-requirements-00 Gregory M Lebovitz pki4ipsec BOF.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
CAPWAP Threat Analysis
WP3: D3.1 status, pending comments and next steps
Working Group Re-charter Draft Charter Reference Materials
Resource Certificate Profile
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

CDB Chris Bonatti (IECA, Inc.) Tel: (+1) Proposed PKI4IPSEC Certificate Management Requirements Document IETF #59 – PKI4IPSEC Working Group 1 March 2004 – Seoul, Republic of Korea

CDB Status of Draft Publication history: –draft-dploy-requirements MAR –draft-bonatti-pki4ipsec-profile-reqts JAN-30 Requirements are based upon the existing Project DPLOY work, but have been extensively tailored to the PKI4IPSEC charter and assumed scenario. Currently published as a personal draft pending acceptance into the WG.

CDB Document Structure 1.Introduction 2.Architecture –VPN System (VPN Peers & VPN Admin) –PKI System (CA, RA, Repository) –VPN-PKI interaction (steps in certificate life cycle) 3.Requirements –Subsections address different requirement areas 4.Security Considerations Annexes A. References B. Acknowledgements C. Editor's Address D. Summary of Requirements Plan to include a summary table similar to those in RFCs 1122, 1123, and E. Change History

CDB Changes to Draft Rewrote and trimmed to fit proposed scope of deliverable (2) from IETF PKI4IPSEC charter, and remove references to Project Dploy objectives. Added definitions of Community Realm, CRL Distribution Points (CDP), and Authority Info Access (AIA) Restructured the "Architecture" section to bring the presentation of Figure 1 to the front to go along with the overview of the section, and to add a new step diagram showing the certificate life cycle to the "VPN-PKI Interaction" subsection.

CDB Changes to Draft (2) Added a new subsection to describe the VPN peer. Subsection 3.2 was deleted to maintain the focus on generic requirements agreed in Minneapolis. Selection of specific protocols will be done in the deliverable (3) profile. Deleted the requirement from to include the maximum CRL size in the certificate template. This may need to be specified in the profile, but not be in the certificate itself. Revised to to clarify that key escrow requirements and any key transport between the VPN admin and the peer are beyond scope.

CDB Changes to Draft (3) Added AIA extension as a MAY requirement in Removed the requirement for HTTP support in favor of a requirement for a single mandatory protocol to be specified in the profile. Removed subsection on "Intra-IKE Considerations" as these should be dealt with in the existing deliverable (1) PKI profiles. Considerable editorial revision was also done. See Annex E for a complete list of changes.

CDB “Big” Issues Expansion of scope to include case where VPN admin does not exist. –Expands from “80% solution” to 90%, by picking up the lower tail. –Requirements and solution need little change as scenario is the same as a community of one with the Peer and Admin collocated. –Pre-authorization is obviously not necessary. Reconsider the adequacy of Figure 2 to elaborate the complexity of the certificate life cycle. Should it, perhaps, be split into multiple figures?

CDB “Big” Issues (2) Section needs to be generated pending WG approval of additional use case for PKI generation of keys. Need to determine the relationship between IKE certificates, and certificates for ongoing cert management use. Closure on MUST ID fields in IKE certificates: –Certificates MUST contain at least one of Subject or the SubjectAltName iPAddress, dNSName, or rfc822Name. –Some question of whether or how Key_ID will be supported. Perhaps SubjectAltName otherName can support.

CDB “Big” Issues (3) Section 4 (Security Considerations) needs to be generated. Annex D needs to be generated.

CDB Way Forward Propose that this draft be adopted by the WG as a first cut at the Informational RFC described in charter deliverable (2). Continue to address issues and massage requirements.

CDB Questions?