RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010.

Slides:



Advertisements
Similar presentations
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Advertisements

Local TA Management A TA is a public key and associated data used as the starting point for certificate path validation It need not be a self-signed certificate.
RPKI Certificate Policy Status Update Stephen Kent.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
CRL Processing Rules Santosh Chokhani November 2004.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
APNIC Trial of Certification of IP Addresses and ASes RIPE 52 Plenary George Michaelson Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
Configuring Active Directory Certificate Services Lesson 13.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
Revocation in MICS §4.4 May 11-13, 2009 Zürich, Switzerland.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Updates to the RPKI Certificate Policy I-D Steve Kent BBN Technologies.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Manifests (and Destiny?) Stephen Kent BBN Technologies.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
Comments on draft-ietf-pkix-rfc3280bis-01.txt IETF PKIX Meeting Paris - August 2005 Denis Pinkas
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
RPKI Certificate Policy Status Update Stephen Kent.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
TR-GRID CA Self-Auditing Results and Status Update EUGridPMA Meeting September 12-14, 2011 Marrakesh Feyza Eryol, Onur Temizsoylu TUBITAK-ULAKBIM
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
Key Rollover for the RPKI Steve Kent (Channeling Geoff Huston )
RPKI Certificate Policy Status Update Stephen Kent.
Cryptography and Network Security
Authentication Applications
APNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes
جايگاه گواهی ديجيتالی در ايران
Resource Certificate Profile
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

RPKI Certificate Policy Stephen Kent, Derrick Kong, Ronald Watro, Karen Seo July 21, 2010

2 Addition of Normative Language KeywordPrevious #Current # MAY021 SHOULD020 MUST1103 MUST NOT02 Originally the CP was an I-D. It was changed to be a regular document and as part of this the RFC 2119 keywords were removed. We’ve added them back in.

3 Other changes The other edits/comments fell into 3 categories: 1.Straightforward, minor, e.g., correction of typos, deletion of the word “unique” in Intro/overview; question re: redundancy and level of detail (due to using template); etc. (Comments so far on current version -- need to delete a sentence fragment, add a missing “be”, correct IESG contact info.) 2.Clarifications: l ISPs can distribute AS numbers (as well as address blocks) l CAs in the chain of certificates that terminate at a TA accepted by the RP

4 Other changes (2 of 2) (2. Clarifications -- continued) l "Expired and revoked certificates SHOULD be removed from the RPKI repository system, upon expiration or revocation, respectively.” 3.Items requiring an answer or more of a change (covered in subsequent slides): l Publication of certification information l Certificate modification re: revocation l Use of OCSP or SCVP l CA/RA termination

5 2.2 Publication of Certification Information  “Is a CA responsible for publishing ALL certifications it issues, or can it be selective in publication?...a similar question is raised regarding CRLs and RPKI-signed objects. Is the CA requires to publish ALL such issued objects?” l "Each CA MUST publish the certificates (intended for public consumption) it issues via the repository system.” l "Each CA MUST publish the CRL(s) that it issues via the repository system.” l "Each CA MUST publish its RPKI-signed objects via the repository system (for all such objects intended for public consumption).”  The above assumes that an RPKI CA issues a mix of certs (private and public) and thus needs to publish a single CRL that spans all of these certs. An alternative model is that an RPKI CA creates a subordinate CA for issuing private certs, and thus the CRL for that CA never need to be published.

6 4.8 Certification modification  “why is the treatment of augmentation of a subject's INRs treated differently from reduction in a subject's INRs? While section 4.8 deals with the steps involved in issuing a new certification in the case where a subject's INR's are augmented, there is no corresponding description of the process in reduction, other than the single sentence in section that does not refer to any other part of the CPS.”  Augmentation does not entail revocation of the old certificate.

Certificate status services  “is it true …that "This PKI does not make use of OCSP or SCVP" or is it more appropriate to state that "RPs SHOULD NOT rely on the use of OCSP or SCVP?”  It is true because we prohibit the inclusion of the OCSP EKU in resource certificates. We also don't allow the corresponding AIA extension for OCSP in resource certificates. So the only way OCSP could be used is by local convention, where an authority configures all of its users to rely on it as an OCSP responder for everyone else. We reworded the text to be clearer on this point.

8 5.8 CA or RA termination  “I am finding it difficult to reconcile this need for "an agreement" in the light of the observation that where a CA no longer has any INR resources then it cannot function as a CA in the RPKI, whether or not an agreement is reached, Why then is an agreement stipulated here?”  From: "The termination of a CA shall therefore be subject to the agreement between the issuer and the subscriber and will be described in the CPS for the issuer." To: "Procedures associated with the termination of a CA MUST be described in the CPS for that CA."

9 Back up slides with more detail

10 Introduction and Overview  “Uniqueness” is not an outcome of verification of a certificate. It would be more accurate to drop “uniqueness.”  Deleted “unique”from: l Introduction, paragraph 1: “These certificates will enable verification that the resources indicated in the certificate have been distributed to the holder of the associated private key and that this organization is the current, unique holder of these resources.” l Section 1.1 Overview, paragraph 1: “The ability to verify such claims is essential to ensuring the unique, unambiguous distribution of these resources.”

Certification Authorities  “The document appears to preclude the actions of LIRs / ISPS in distributing AS numbers. I do not believe that this is appropriate, nor accurate, in today's environment.”  From: "The organizations that distribute IP addresses IANA, RIRs, NIRs, ISPs) and AS numbers (IANA, RIRs, and NIRs) act as CAs in this PKI.”  To: "The organizations that distribute IP addresses and AS numbers (IANA, RIRs, NIRs, ISPs) act as CAs in this PKI."

Time or frequency of publication  “the document does not specify a CA's actions regarding the publication of expired and revoked certifications, nor indicate if the CA's CPS should include such information.”  Added: "Expired and revoked certificates SHOULD be removed from the RPKI repository system, upon expiration or revocation, respectively.”  Need to delete sentence fragment in last paragraph: l “The period of time within which a CA will publish a CRL with an entry for a revoked certificate after it revokes that certificate.”

Initial identity validation & Identification and authentication for re-key  “I am not sure that these need to be separate - for example is issuance after revocation any different from initial issuance - i.e. the same criteria of ("Method to prove possession of private key"), ("Authentication of organization identity"), ("Authentication of individual identity") and ("Validation of authority") apply, so why is called out - what new information is being provided here that is not already provided in the previous section?”  The draft follows the template (RFC 3647) established for a CP/CPS, which results in some redundant sections.

Identification and authentication for revocation request  “why does this section of the text NOT refer to the actions of a CA as described in sections 3.2.1, 3.2.2, and 3.2.5? It appears that revocation is described in more informal terms and issuance, yet the constraints on the CA to ensure that authenticity of the request are intended to be the same.”  As noted above, the draft follows the RFC 3647 template. Note: If the subject has lost access to its key, it cannot perform PoP (3.2.1).

Relying party public key and certificate usage  “In the light of related work on local TA generation I am left with the question of what exactly is being referred to here in this "chain”. I would prefer this term to be defined.”  From: "Before any act of reliance, relying parties shall independently …(2) assess the status of the certificate and all the CAs in the chain that issued the certificates relevant to the certificate in question."  To: "Before any act of reliance, relying parties MUST independently …(2) assess the status of the certificate and all the CAs in the chain (terminating at a TA accepted by the RP) that issued the certificates relevant to the certificate in question.”