Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006

Slides:



Advertisements
Similar presentations
RPKI Standards Activity Geoff Huston APNIC February 2010.
Advertisements

A Profile for Trust Anchor Material for the Resource Certificate PKI Geoff Huston SIDR WG IETF 74.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 70.
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Validation Algorithms for a Secure Internet Routing PKI David Montana Mark Reynolds BBN Technologies.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
RPKI Validation - Revisited draft-huston-rpki-validation-00.txt Geoff Huston George Michaelson APNIC.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Local TA Management In prior WG meetings I presented a model for local management of trust anchors for the RPKI In response to these presentations, a.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
The Resource Public Key Infrastructure Geoff Huston APNIC.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
APNIC eLearning: Intro to RPKI 10 December :30 PM AEST Brisbane (UTC+10)
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Certificate Requests to HIP Jani Pellikka 80 th IETF Mar 27 th – Apr 1 st 2011 Prague, Czech Republic.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Status Report SIDR and Origination Validation Geoff Huston SIDR WG, IETF 71 March 2008.
Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas
LDAP for PKI Problems Cannot search for particular certificates or CRLs Cannot retrieve particular certificates or CRLs.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
RPKI Certificate Policy Status Update Stephen Kent.
TAG Presentation 18th May 2004 Paul Butler
Cryptography and Network Security Chapter 14
ASN.1: Cryptographic files
November 2006 Geoff Huston APNIC
Trust Anchor Management Problem Statement
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
RPKI Trust Anchor Geoff Huston APNIC.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
APNIC Trial of Certification of IP Addresses and ASes
Security in ebXML Messaging
زير ساخت كليد عمومي و گواهي هويت
Cryptography and Network Security Chapter 14
Public-Key Certificates
APNIC Trial of Certification of IP Addresses and ASes
Cryptography and Network Security Chapter 14
Resource Certificate Profile
Digital Certificates and X.509
Progress Report on Resource Certification
ROA Content Proposal November 2006 Geoff Huston.
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14
Presentation transcript:

Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson

Objective Take RFC3280 profile and RFC3779 extension Provide a profile for “right-of-use” certificates That reflect legitimate “right of use” of public number resources Where validation can be based on the existing address allocation framework That provides a consistent and bounded set of fields and values within the context of resource certificates That can be used as a validation framework for secure IDR approaches

The Profile Applies to X.509 Version 3 PKI Resource Certificates X.509 Version 2 PKI Certificate Revocation List RFC4211 Certificate Requests [PCKS#10 Certificate Request Profile to be added]

X.509 V3 PKI Resource Certificates (1) Notes: Serial Number: unique per issuer Not monotonic increasing sequence Signature: sha-256 with RSA Subject Public Key: 2048 bits One alternative option is to specify "no less than 2048 bits" and allow for longer key sizes. On the other hand it may be preferable to move to EC-DSA instead of RSA, in which case allowing for the option of longer RSA key sizes may be considered inappropriate. Basic Constraints: Critical, No Path Length Constraint Subject Key Identifier: non-Critical, MUST be present Authority Key Identifier: non-Critical, MUST be present

X.509 V3 PKI Resource Certificates (2) Notes (con’t) CRLDP: RSYNC URI The reason for the specification of an RSYNC URI as a MUST in this profile is to ensure that relying parties who wish to maintain a local copy of a synchronized repository are not forced to maintain a retrieval capability using a potentially unbounded set of URI types. The profile is attempting to ensure that rsync should be all that is required to perform a repository synchronization operation.

X.509 V3 PKI Resource Certificates (3) Notes (con’t) Authority Information Access propose to use Access Method of “id-ad-caRepository” Subject Information Access propose to use CA Access Method of ““id-ad-caRepository” and non-CA Access Method of ? Certificate Policies: Critical extension IP Resources: Critical extension AS Resources: Critical extension Either, or both must be present

X.509 V2 PKI Certificate Revocation List Notes: No indirection (CRL issuer is the CA) Scope is all certificates issued by this CA No Delta CRLs CRL Number: determines “most recent” CRL

X.509 Request CRMF (RFC 4211) Subject Name: should be considered by the issuer CRLDP The issue of where and how to specify where the subject will publish the CRL if the CA bit is set and honoured by the issuer is described here as information that is either provided in this field in the certificate request or provided via an "out-of-band" exchange. An alternative is to say that this field MUST be provided if the CA bit is set in the request SIA If this field is missing than it is also an option for the Issuer to deny the request and not issue a certificate if the issued certificate was to have the CA bit set IP Resources, AS Resources

X.509 Request CRMF (RFC 4211) Control Fields: Authenticator Control The method of generation and authentication of this field is to be specified. The desirable properties include the ability to validate the subject and the authenticity of the provided public key. Control Fields: Resource Class This specification of the resource class is related the various forms of resource allocation which imply that an entity may be the holder of resources with differing validation dates and differing validation paths. It may not be possible to issue a single certificate with an all-encompassing resource set. This allows for the issue of a certificate that is encompassing within a nominated resource class. The alternative is to specify the resources for which the certificate is to be issued, which assumes that the specified resources fall under the same resource class

Trust Anchors Use existing address distribution framework as a template for trust anchor selection Use a set of self-signed RIR resource certificates Each RIR self-signs against those resources where it has administrative responsibility No cross-certification Potential to use a single IANA root in the future

Resource Certificate Validation The certificate can be verified using the Issuer's public key and the signature algorithm The current time lies within the certificate's Validity From and To values. The certificate contains all fields that MUST be present and contains field values as specified in this profile for all field values that MUST be present. No field value that MUST NOT be present is present in the certificate. The Issuer has not revoked the certificate by placing the certificate's serial number on the Issuer's current Certificate Revocation List, and the CRL is itself valid. That the resource extension data is equal to or more specific than the resource extension data contained in a valid certificate where this Issuer is the Subject (the previous certificate in the ordered sequence) The Certificate Path originates at a trust anchor, and there exists a signing chain across the Certificate Path where the Subject of Certificate x in the Certificate Path matches the Issuer in Certificate x+1 in the Certificate Path. The Issuer’s certificate is valid

Next Steps Refine current open issues PKCS#10 Request Profile Subject Public Key Access Method for AIA, SIA Certificate Request Control Fields PKCS#10 Request Profile Security Considerations