Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.

Slides:



Advertisements
Similar presentations
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Issues with CMIPv6 Suresh Krishnan.
Advertisements

SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt draft-lu-ldp-igp-sync-bcast-00 by Wenhu Lu & Sriganesh Kini 75th IETF – Stockholm, Sweden (July 26-31,
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Slide title :32-35pt Color: R153 G0 B0 Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson satsning på Public Safety - National Security HIØ Personalseminar – 9. mai 06 - Ed.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Proactive fault management in mobile core network Niko Isotalo Instructor: Ira Antikainen Supervisor:
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt BSNL 3G Network Parameters affecting Data Speed
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security Stewart Kowalski, Ericsson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt KPI Reporting and Analysis Templates Naren Mohan
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Site DB creation and updates 05/08/2006 by Performance Team.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Bitstream and Hybrid Model VQEG Meeting, Kyoto, March 2008 Jörgen Gustafsson and Martin Pettersson.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Service requirements from 3GPP TS SDO Emergency Services Coordination Workshop (ESW06) Columbia.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-02 Suresh Krishnan Ana Kukec Khaja Ahmed.
1 Analysis of NGMN Requirements REQ 5: Performance Management in Real-time.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Simple DNA draft-krishnan-dna-simple-03 Suresh Krishnan Greg Daley.
CDB Chris Bonatti (IECA, Inc.) Tel: (+1) Proposed PKI4IPSEC Certificate Management Requirements Document IETF #59 – PKI4IPSEC Working.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Dynamic and Persistent Scheduling for Voice over IP Traffic in the Long-Term Evolution Uplink Master’s.
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP 2.0 TLS handling Magnus Westerlund draft-ietf-mmusic-rfc2326bis-12.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Risk-based regression testing in a telecommunication system node Master’s thesis presentation
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Robust Reconfigurable Erlang Component System ErlCOM Gabor Batori, Zoltan Theisz, Domonkos Asztalos.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Verification of a GPRS Charging System in a Simulated Test Environment Author: Kirsi Koskenheimo Supervisor:
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Some Background about 3GPP SA4’s RTSP extensions Thorsten Lohmar.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt DNA wg IETF71.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Guidelines for Firewall Administrators Mobile IPv6 Suresh Krishnan, Niklas Steinleitner, Ying Qiu, Gabor.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Authentication/Authorization for possible deployments Relevant scenarios for CAFE.
Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Simple DNA draft-ietf-dna-simple-03 Suresh Krishnan Greg Daley.
2/25/2016CSI WG/IETF761 Open Source Project SEND & Extensions Beijing University of Posts & Telecommunications HUAWEI Yuhong LI (Speaker) Wendong WANG.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Guidelines for Firewall Vendors Mobile IPv6 Suresh Krishnan, Yaron Sheffer, Niklas Steinleitner, Gabor.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Flow Distribution Rule Language for Multi-Access Nodes draft-larsson-mext-flow-distribution-rules-01.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Multi-component KPI:s ETSI/STQ_Mobile(08)18TD10.
Document update - what has happened since GGF11
Secure Proxy ND Support for SEND draft-krishnan-csi-proxy-send-00
Cryptography and Network Security
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
APNIC Trial of Certification of IP Addresses and ASes
Resource Certificate Profile
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
CPPA3 Overview.
OCSP Requirements GGF13.
Presentation transcript:

Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Scope of the document  SEND uses X.509v3 certificates defined in RFC3280  RFC3280 is generic and hence does not define any SEND specific information  We need additional specification to nail down SEND specific certificate information  This document covers three major areas –Extended Key Usage definitions –Certificate Revocation –Certificate extensions

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Extended Key Usage  The Internet PKI document [RFC3280] specifies the extended key usage X.509 certificate extension.  The extension indicates one or more purposes for which the certified public key may be used.  The extended key usage extension can be used in conjunction with key usage extension, which indicates the intended purpose of the certified public key.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Three new key purposes  Router –Node owning this certificate is allowed to advertise the prefix  Proxy –Node owning this certificate is allowed to modify MAC addresses in ND mesages  Client –Node owning this certificate owns the address specified.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Certificate Revocation  In-band or out-of-band? –CRL vs OCSP (RFC2560)  CRL size is unbounded –May not fit in a single ND message –This makes CRL (IOHO) unsuitable for SEND certificate revocation  OCSP response, on the other hand, is small and bounded

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Modifications to SEND  To CPS –Trust Anchor: TA which the client is willing to accept –OCSP Responder: The hash of the OCSP Responders public key trusted by the client, or the concatenated list of hashes of more OCSP Responders' public keys.  To CPA –Certificate –Trust Anchor: to help the client to find out which advertisement is useful –OCSP response: A definitive OCSP response message containing the response for each of the certificates from the request as specified in Section 2.2 of [RFC2560]. –OCSP responder: to help the client to find out which advertisement is useful.

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Certificate extensions  Lists the certificate extensions required by SEND and define required level of support  MUST implement –Subject Alternative Name –Extended Key Usage –Key Usage –Basic Constraints –Authority Information Access (mark non-critical)

Slide title In CAPITALS 50 pt Slide subtitle 32 pt Thanks Questions?

Top right corner for field-mark, customer or partner logotypes. See Best practice for example. Slide title 40 pt Slide subtitle 24 pt Text 24 pt Bullets level pt © Ericsson AB 2008SEND Certificate Profiles Extension definitions  The Subject Alternative Name extension (type iPAddress) contains the subnet prefix that the router is authorized to advertize. It is described in [RFC3971]. It SHOULD be marked as critical, as it is possible that some certificates in the beginning does not contain this extension. In such scenarios the validation of subjectAltName iPAddress delegation extension MAY be relaxed.  The Extended Key Usage extension defines the application or protocol specific purposes for which the certificate key pair may be used. It is described in Section 3. It MUST be marked as critical.  The Key Usage extension defines the basic purposes for which the key pair may be used. The Router Authorization Certificate MUST have at least the digitalSignature and nonRepudiation bits set, since it's key pair is used for the CGA generation and Router Advertisement signing. Other certificates would usually have set the keyCertSign bit set. This extension MUST be marked as critical and MUST be processed independently of the Extended Key Usage extension. The certificate purpose must be consistent with both the Extended Key Usage extension and the Key Usage extension.  The Basic Constraints extension defines specifies whether the subject of the certificates is a CA or an end entity, as well as the maximum depth of valid certification path. In accordance with [RFC3280], it MUST be marked as critical.  The Authority Information Access extension specifies how to retrieve additional CA information, e.g. the information about the OCSP responder. It MUST be marked as non-critical and usually the host will learn the OCSP responder from the configuration file.