Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas

Slides:



Advertisements
Similar presentations
SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Advertisements

RPKI Certificate Policy Status Update Stephen Kent.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
CRL Processing Rules Santosh Chokhani November 2004.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
MPKI Interoperability I-D ChangeLog from -01 to -02 Jan 16, 2004 Masaki SHIMAOKA SECOM Trust.net.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Unit 1: Protection and Security for Grid Computing Part 2
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
1 PKI Disaster Recovery and Key Rollover Bull S.A.S.
1 SeGW Certificate profile (Revised) 3GPP2 TSG-S WG4 /TSG-X WG5 (PDS) S X xx Source: QUALCOMM Incorporated Contact(s): Anand.
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Cryptography and Network Security Chapter 14
Slide title In CAPITALS 50 pt Slide subtitle 32 pt SEND Certificate Profile draft-krishnan-cgaext-send-cert-eku-01 Suresh Krishnan Ana Kukec Khaja Ahmed.
SonOf3039 Status Russ Housley Security Area Director.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Discovery of CRL Signer Certificate Stefan Santesson Microsoft.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
RPKI Certificate Policy Status Update Stephen Kent.
Key management issues in PGP
Trust Anchor Management Problem Statement
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Authentication Applications
Resource Certificate Profile
Digital Certificates and X.509
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
National Trust Platform
Presentation transcript:

Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas

2 Topics that will be addressed Root key update, keyUsage (NR/CC bit), privateKey Usage period Ambiguity in naming, CRL checking, Indirect CRLs, « Delegated CRLs » and « Indirect CRLs ».

3 Root CA key update RFC 2510 “Certificate Management Protocols” contains text « buried » there. Root key change is not a client-server protocol, since it can simply be performed by placing static data in a repository: –"old with new" certificate, –"new with new" certificate, –"new with old" certificate. In order to promote root key changes, the text should be placed (and adapted) inside 3280bis. A text proposal to adapt the text from RFC 2510 has been sent to the mailing list on November 15, 2004.

4 keyUsage (NR/CC bit) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –« The nonRepudiation bit is asserted when the subject public key is used to verify digital signatures, other than signatures on certificates (bit 5) and CRLs (bit 6), used to provide a non- repudiation service which protects against the signing entity falsely denying some action. In the case of later conflict, a reliable third party may determine the authenticity of the signed data ». Proposal for a compromise with X )/Cor.3 (04/2004): –« The contentCommitment bit is asserted when the subject public key is used to verify digital signatures, other than signatures on certificates (bit 5) and CRLs (bit 6) and is intended to signal that the signer is intending to commit to the content being signed. In the case of later conflict, this may help a non-repudiation service provider to determine if the subject's claimed repudiation is true or false ».

5 privateKeyUsagePeriod Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –“D.1 Private Key Usage Period This extension SHOULD NOT be used within the Internet PKI. (…) CAs conforming to this profile MUST NOT generate certificates with private key usage period extensions unless at least one of the two components is present and the extension is non-critical.” A discussion on the list indicated in 2003 that this was useful for HSMs and, even more, for Time-Stamping Units. PrivateKeyUsagePeriod should be allowed /RECOMMENDED for HSMs and TSUs.

6 Ambiguity in naming (1/2) A detailed response was sent to Tim on July 18. Name collisions problems may exist for leaf certificates, CA certificates and CRL certificates. Problems for CA certificates and CRL certificates arise only *during* the path verification algorithm. Once a leaf certificate has been verified to be valid, the output of the path verification algorithm is a sequence of certificates up to a given trust anchor. A major issue is that RFC 3280 does not provide the full certification path as an output of the validation algorithm and is silent about what to do with it. Leaf certificates may be used in two contexts: a) access control or end-entity authentication, b) non repudiation.

7 Ambiguity in naming (2/2) Mail from Steve Kent the same day : “I appreciate your comments on subtle issues associated with name collisions, and how these issues differ for ACL or end entity authentication use vs. non-repudiation use”. “I don't think 3280 or its successor should be providing detailed guidance for application developers re use of certs. But but another document, maybe a BCP, would be a good lace to do this. One could discuss in more detail the question of what constitutes a safe ACL entry or a suitable name to display for a received message, etc. Similar example could be provided for NR application contexts”. A BCP (Best Current Practice), or a BCR (Best Current Recommendation) ? A warning in the security considerations section, pointing to an informative annex would also be appropriate.

8 CRL checking (conforming clauses) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –« Conforming implementations that support CRLs are not required to implement this algorithm, but they MUST be functionally equivalent to the external behavior resulting from this procedure when processing CRLs that are issued in conformance with this profile ». There should be separate sections addressing the processing that MUST be supported by Relying Parties supporting : –mandatory-to-support extensions, –non-mandatory-to-support extensions.

9 CRL checking (incorrect state input) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –« This algorithm assumes that all of the needed CRLs are available in a local cache. –« This algorithm begins by assuming the certificate is not revoked. The algorithm checks one or more CRLs until either the certificate status is determined to be revoked […] ». The current text is incorrect : –“If the revocation status remains undetermined, then return the cert_status UNDETERMINED”. In practice all the needed CRLs may not be in the cache, so the algorithm should start (and finish) with « UNDETERMINED ».

10 CRL checking (cache) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –« This algorithm assumes that all of the needed CRLs are available in a local cache. Further, if the next update time of a CRL has passed, the algorithm assumes a mechanism to fetch a current CRL and place it in the local CRL cache. » If the cache contains an old CRL (which is a “needed CRL”) where SN of the target certificate is present, the current result of the algorithm is “UNDETERMINED”, instead of “REVOKED”. If the cache contains two valid CRLs, the most recent CRL will not necessarily be used. The result of the algorithm may be “NOT_REVOKED”, instead of “REVOKED”. The algorithm needs to be modified to take into consideration theses two cases. Current time CRL 0 CRL 1 CRL 2

11 CRL checking (input parameter) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : “ Revocation Inputs To support revocation processing, the algorithm requires two inputs: (a) certificate: The algorithm requires the certificate serial number and issuer name to determine whether a certificate is on a particular CRL. [ … ]” This is insufficient. One input should be the full certification path.

12 CRL checking (signature verification) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : “(f) Obtain and validate the certification path for the issuer of the complete CRL. If a key usage extension is present in the CRL issuer's certificate, verify that the cRLSign bit is set. (g) Validate the signature on the complete CRL using the public key validated in step (f)”. It is unclear what means “validate the certification path for the issuer of the complete CRL”. Because of possible CA or CRL name collisions, the “same sequence of DNs from the same TA as the one used to validate the target certificate” shall be used. The revocation status of the CRL issuer certificate shall also be tested. TA CN = BestCA

13 Indirect CRLs (5.3.4 Certificate Issuer) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –“When present, the certificate issuer CRL entry extension includes one or more names from the issuer field and/or issuer alternative name extension of the certificate that corresponds to the CRL entry”. Extract from: draft-ietf-pkix-rfc3280bis-01.txt ( CRL Distribution Points) : –“The cRLIssuer identifies the entity who signs and issues the CRL. If present, the cRLIssuer MUST contain at least one an X.500 distinguished name (DN), and MAY also contain other name forms”. In section “ Issuer Alternative Name” there is no requirement for uniqueness of IssuerAltName. It is getting worse with name collisions ! Please suppress “and/or issuer alternative name extension”.

14 Indirect CRLs (CA name ambiguity) There is the need to add the following: –“In order to prevent CA DN ambiguity, a CRL Issuer SHALL not accept to manage revocation status information for a given CA DN, if it already manages revocation status information for another CA that has the same DN”.

15 Delegated CRLs and Indirect CRLs Santosh : « If you want to propose a single delegated CRL, this must be done via a new extension or show how existing implementations can stay compliant with it ». Response: Delegated CRLs may be supported –without a new extension, –by preserving backward compatibility (?). If a CRL Issuer (that is not a CA) inserts an IDP CRL extension, but only “works” for a single CA, RP software MAY work using the existing algorithm, and MAY use a simpler piece of code. Benefits: a simple piece of Relying Party code to support the simple case where a CRL Issuer is only “working” for one CA.

16 Two issues 1.Meaning of the indirectCRL boolean from the IDP extension. 2.What do we call “indirect CRL” ? The indirectCRL boolean is absolutely necessary to signal the presence of “certificate issuer CRL entry extensions”. The indirectCRL boolean is not necessary, if no “certificate issuer CRL entry extension” is present. The name of the boolean could be changed to “multipleCAs”.

17 Indirect CRLs (reconciliation ?) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –“If the scope of the CRL only includes certificates issued by the CRL issuer then the indirectCRL boolean MUST be set to FALSE. Otherwise, if the scope of the CRL includes certificates issued by one or more authorities other than the CRL issuer, the indirectCRL boolean MUST be set to TRUE”. Proposed replacement: –“If the issuing distribution point CRL extension is present and if the scope of the CRL only includes certificates issued by a CA that is also the CRL Issuer, then the multipleCA boolean MUST be set to FALSE. –Otherwise, if the scope of the CRL includes certificates issued by more than one CA, the multipleCA boolean MUST be set to TRUE ”.

18 Indirect CRLs (vocabulary) Extract from: draft-ietf-pkix-rfc3280bis-01.txt : –If the scope of the CRL includes one or more certificates issued by an entity other than the CRL issuer, then it is an indirect CRL. Proposed replacement: –If the issuer of the CRL is a not a CA, or if the issuer of the CRL is a CA and the scope of the CRL includes certificates issued by one or more other CAs, then this CRL is called an indirect CRL. A definition for “delegated CRL” might be: –A delegated CRL is an indirect CRL where the issuer of the CRL is not a CA and where the scope of the CRL only include certificates issued by one CA.

19 Indirect CRLs (to be noticed) The two following sentences, extracted from draft-ietf-pkix-rfc3280bis-01.txt are not aligned : –If the scope of the CRL includes one or more certificates issued by an entity other than the CRL issuer, then it is an indirect CRL. –Otherwise, if the scope of the CRL includes …… certificates issued by one or more authorities other than the CRL issuer, the indirectCRL boolean MUST be set to TRUE”. Proposals to fix both sentences have been proposed in previous slides.