📄 draft-ietf-pkix-ldap-pki-schema-00.txt
字号:
7. Filter ExamplesThe following examples are written using the string representation of Search filters defined in [18]. Line-breaks have been added as an aid to readability.i) To match on the serial number of a PKI certificate using extensibleMatch with component matching (userCertificate:componentFilterMatch:= item:{ component "serialNumber", rule integerMatch, value 12345 })ii) To exactly match one certificate using extensibleMatch with certificateExactMatch and GSERCertificateExactAssertion (userCertificate:certificateExactMatch:= {serialNumber 12345 , issuer rdnSequence: "O=truetrust ltd, C=GB" } )iii) To exactly match one certificate using equalityMatch with certificateExactMatch and GSERCertificateExactAssertion (UserCertificate= {serialNumber 12345 , issuer rdnSequence: "O=truetrust ltd, C=GB" })iv) To exactly match one certificate using equalityMatch with certificateExactMatch and SimpleCertificateExactAssertion (UserCertificate=12345$O=truetrust ltd, C=GB)v) To exactly match one certificate using extensibleMatch with component matching (userCertificate:componentFilterMatch:=and:{ item:{ component "serialNumber", rule integerMatch, value 12345 }, item:{ component "issuer.rdnSequence", rule distinguishedNameMatch, value "O=truetrust ltd, C=GB" } })vi) To match on certificates containing a certain email address as a subjectAltName (userCertificate:componentFilterMatch:=item:{ component "toBeSigned.extensions.*.extnValue. content.(2.5.29.17).*.rfc822Name", rule caseIgnoreIA5Match, value "person@email.address.com" })8. Security ConsiderationsThis [Internet Draft/Standard] describes the schema for the storageand matching of attribute certificates and revocation lists in anLDAP directory server. It does not address the protocol for theretrieval of this information.LDAP servers SHOULD use access control information to protect theinformation during its storage. In addition, clients MAY choose toencrypt the attributes in the attribute certificates before storingthem in an LDAP server.9. ReferencesNormative[1] Bradner, S. The Internet Standards Process -- Revision 3. RFC2026 October 1996.[4] J. Sermersheim "Lightweight Directory Access Protocol (v3)" <draft-ietf-ldapbis-protocol-02.txt> July 2001[5] S.Bradner. "Key words for use in RFCs to Indicate RequirementLevels", RFC 2119, March 1997.[6] M. Wahl, S. Kille, T. Howes. "Lightweight Directory AccessProtocol (v3): UTF-8 String Representation of Distinguished Names",RFC2253, December 1997.[9] ITU-T Rec. X.509(2000) The Directory: AuthenticationFramework[10] D. Crocker, P. Overell, "Augmented BNF for SyntaxSpecifications: ABNF", RFC 2234, November 1997[13] S. Legg, "Generic String Encoding Rules", <draft-legg-ldap-gser-XX.txt>, March 2002, a work in progress[16] S. Legg, "Common Elements of GSER Encodings", <draft-legg-ldap-gser-abnf-XX.txt>, March 2002, a work in progressInformative[2] Yeong, W., Howes, T., and Kille, S. "Lightweight Directory AccessProtocol", RFC 1777, March 1995.[8] S.Boeyen, T. Howes, P. Richard "Internet X.509 Public KeyInfrastructure, LDAPv2 Schema", RFC 2587, June 1999[12] Howes, T., Kille, S., Yeong, W., Robbins, C., "The String Representation of Standard Attribute Syntaxes", RFC 1778, March 1995[14] R. Housley, W. Ford, W Polk, D. Solo. "Internet X.509 Public Key Infrastructure - Certificate and CRL Profile" <draft-ietf-pkix-new-part1-08.txt>, July 2001[17] M. Wahl, "A Summary of the X.500(96) User Schema for use with LDAPv3", RFC 2256, Dec 1997[18] Howes, T. "The String Representation of LDAP Search Filters". RFC 2254, December 1997.10. Intellectual Property NoticeThe IETF takes no position regarding the validity or scope of anyintellectual property or other rights that might be claimed topertain to the implementation or use of the technology described inthis document or the extent to which any license under such rightsmight or might not be available; neither does it represent that it hasmade any effort to identify any such rights.Information on theIETF's procedures with respect to rights in standards-track andstandards-related documentation can be found in BCP-11. [BCP-11]Copies of claims of rights made available for publication and anyassurances of licenses to be made available, or the result of anattempt made to obtain a general license or permission for the use ofsuch proprietary rights by implementors or users of this specificationcan be obtained from the IETF Secretariat.The IETF invites any interested party to bring to its attention anycopyrights, patents or patent applications, or other proprietaryrights which may cover technology that may be required to practicethis standard.Please address the information to the IETF ExecutiveDirector.11. CopyrightCopyright (C) The Internet Society (2001). All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, publishedand distributed, in whole or in part, without restriction of anykind, provided that the above copyright notice and this paragraph areincluded on all such copies and derivative works. However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose ofdeveloping Internet standards in which case the procedures forcopyrights defined in the Internet Standards process must befollowed, or as required to translate it into languages other thanEnglish.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.12. Authors' AddressesDavid ChadwickIS InstituteUniversity of SalfordSalfordEnglandM5 4WTEmail: d.w.chadwick@salford.ac.ukSteven LeggAdacel Technologies Ltd.405-409 Ferntree Gully Road,Mount Waverley,Victoria, 3149AustraliaEmail: steven.legg@adacel.com.au13. Changes >From <draft-pkix-ldap-schema-00.txt>i) Added ABNF notation for all of the syntaxes.ii) Removed the restriction on the syntax of Distribution Point Names.iii) Removed constraints on IssuerSerial.iv) Bug detected in X.509 AttributeCertificateExactMatch that will needresolving.v) Changed the string encodings for non-exact matches to keywords for each component instead of $ separators.>From <draft-pkix-ldap-schema-01.txt>i) Added and corrected all X.509 PKI schema definitions, since these have been removed from RFC2252-bis.ii) Changed assertion syntaxes to use the syntax defined by Component Matching Rulesiii) Included all the matching rules for AC extensions>From <draft-pkix-ldap-schema-02.txt>i) Separation in PKI and PMI IDs.ii) Examples of filters have been addediii) Text has been added to mandate that servers must store and retrieve many of the syntaxes defined in this ID exactly as given.iv) The ;binary encoding option has been removed in accordance with work in the LDAPBIS group. A new LDAP-specific encoding has been defined which has exactly the same syntax as the old ;binary encoding.v) We have obsoleted RFC 2587 and RFC 2256 and copied the relevant schemas into this document.vi) We have added some new PKI schema appearing for the first time in X.509(2000) e.g. pkiPath14. Outstanding Issuesi. We need to decide if userSMIMECertificates should also be supported as part of this profile or not.ii. We have added a CPS attribute and a CPS pointer attribute. These are adapted from the certificationPracticeStmt attribute in the X.509 standard which is a choice of either the CPS or a pointer to it. However our pointer is simply a URI (as in the CPS qualifier extension in the PKIX profile) whereas the X.500 pointer is a GeneralName and an optional hash. Are these changes sensible and acceptable?iii. We have added a matching rule to the certificatePolicy attribute. No matching rule is defined in X.509, so we have reported this as a defect. Should we stick with the X.509 syntax or create two alternative attributes (a pointer and a policy) as in the CPS case.iv. We have made the matching rule for supportedAlgorithms as the objectIdentifierFirstComponentMatch. RFC2256 did not specify any matching rule and X.509(2001) specifies a more complex matching rule. Should we align with X.509 or not?15. Table of Contents1. Introduction 12. Subschema Publishing 23. PKI Attributes and Syntaxes 23.1 userCertificate Attribute 23.2 cACertificate Attribute 23.3 Certificate Syntax 23.4 authorityRevocationList Attribute 33.5 certificateRevocationList Attribute 33.6 deltaRevocationList Attribute 33.7 Certificate List Syntax 33.8 crossCertificatePair Attribute 43.9 Certificate Pair Syntax 43.10 PKI Path Attribute 43.11 PKI Path Syntax 53.12 CPS Attribute 53.13 CPS Pointer Attribute 53.14 Certificate Policy Attribute 53.15 Certificate Policy Syntax 53.16 Certificate Policy Pointer Attribute 63.17 Supported Algorithms Attribute 63.18 Supported Algorithm Syntax 64. Public Key Certificate Matching Rules and Assertion Syntaxes 64.1 Certificate Exact Match 74.2 Certificate Match 84.3 Certificate Pair Exact Match 124.4 Certificate Pair Match 125 Certificate Revocation List Matching Rules 135.1 Certificate List Exact Match 135.2 Certificate List Match 146. PKI Object Classes 156.1 PKI user object class 156.2 PKI CA object class 166.3 CRL Distribution Point object class 166.4 Delta CRL object class 166.5 Certificate Policy and CPS object class 166.6 PKI Certification Path object class 167. Filter Examples 168. Security Considerations 179. References 18Normative 18Informative 1810. Intellectual Property Notice 1811. Copyright 1912. Authors' Addresses 1913. Changes 2014. Outstanding Issues 2015. Table of Contents 21
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -