⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-pkix-roadmap-09.txt

📁 PKIX的RFC英文文档
💻 TXT
📖 第 1 页 / 共 5 页
字号:
PKIX Working Group                                         A. Arsenault Internet Draft                                               Diversinet Document: draft-ietf-pkix-roadmap-09.txt                      S. Turner Expires: January, 2003                                             IECA                                                               July 2002              Internet X.509 Public Key Infrastructure: Roadmap   Status of this Memo        This document is an Internet-Draft and is in full conformance with    all provisions of Section 10 of [RFC2026].        This document is an Internet-Draft. Internet-Drafts are working    documents of the Internet Engineering Task Force (IETF), its areas,    and its working groups. Note that other groups may also distribute    working documents as Internet-Drafts.         Internet-Drafts are draft documents valid for a maximum of six    months and may be updated, replaced, or obsoleted by other documents    at any time. It is inappropriate to use Internet-Drafts as reference    material or to cite them other than as "work in progress."        The list of current Internet-Drafts can be accessed at    http://www.ietf.org/ietf/1id-abstracts.txt         The list of Internet-Draft Shadow Directories can be accessed at    http://www.ietf.org/shadow.html.        This draft is being discussed on the 'ietf-pkix' mailing list. To    subscribe, send a message to ietf-pkix-request@imc.org with the    single word subscribe in the body of the message. There is a Web    site for the mailing list at <http://www.imc.org/ietf-pkix/>.         Abstract        This document provides an overview or "roadmap" of the work done by    the IETF PKIX working group. It describes some of the terminology    used in the working group's documents, and the theory behind an    X.509-based Public Key Infrastructure, Privilege Management    Infrastructure (PMI), and Time Stamping and Data Certification    Infrastructures. It identifies each document developed by the PKIX    working group, and describes the relationships among the various    documents. It also provides advice to would-be PKIX implementors    about some of the issues discussed at length during PKIX development,    in hopes of making it easier to build implementations that will    actually interoperate.            Arsenault, Turner                                                    1  Internet-Draft                PKIX Roadmap                  July 2002    1 INTRODUCTION.....................................................3    1.1 THIS DOCUMENT..................................................3    1.2 TERMINOLOGY....................................................3    1.3 HISTORY........................................................5    2 PKI..............................................................8    2.1 THEORY.........................................................8    2.2 ARCHITECTURE MODEL.............................................9    2.3 PUBLIC KEY CERTIFICATES.......................................11    2.4 FUNCTIONS OF A PKI............................................11    2.4.1 REGISTRATION................................................11    2.4.2 INITIALIZATION..............................................12    2.4.3 CERTIFICATION...............................................12    2.4.4 KEY PAIR RECOVERY...........................................12    2.4.5 KEY GENERATION..............................................12    2.4.6 KEY UPDATE..................................................13    2.4.6.1 KEY EXPIRY................................................13    2.4.6.2 KEY COMPROMISE............................................13    2.4.7 CROSS-CERTIFICATION.........................................14    2.4.8 REVOCATION..................................................14    2.4.9 CERTIFICATE & REVOCATION NOTICE DISTRIBUTION & PUBLICATION..15    3 PMI.............................................................16    3.1 THEORY........................................................16    3.2 ARCHITECTURAL MODEL...........................................16    3.3 ATTRIBUTE CERTIFICATES........................................17    4 PKIX DOCUMENTS..................................................18    4.1 PROFILES......................................................18    4.2 OPERATIONAL PROTOCOLS.........................................22    4.3 MANAGEMENT PROTOCOLS..........................................25    4.4 POLICY OUTLINE................................................28    4.4 TIME STAMPING AND DATA CERTIFICATION..........................28    4.5 EXPIRED DRAFTS................................................32    5 IMPLEMENTATION ADVICE...........................................36    5.1 NAMES.........................................................36    5.1.1 NAME FORMS..................................................36    5.1.1.1 DISTINGUISHED NAMES.......................................36    5.1.1.2 SUBJECTALTNAME FORMS......................................37    5.1.1.2.1 INTERNET E-MAIL ADDRESSES...............................37    5.1.1.2.2 DNS NAMES...............................................38    5.1.1.2.4 URIS....................................................38    5.1.2 SCOPE OF NAMES..............................................38    5.1.3 CERTIFICATE PATH CONSTRUCTION...............................39    5.1.4 NAME CONSTRAINTS............................................40    5.1.4.1 RFC822NAMES...............................................41    5.1.4.2 DNSNAMES..................................................41    5.1.4.3 X.400 ADDRESSES...........................................42    5.1.4.5 DNS.......................................................42    5.1.4.6 URIS......................................................42    5.1.4.7 IPADDRESSES...............................................43    5.1.4.8 OTHERS....................................................43    5.1.5 WILDCARDS IN NAME FORMS.....................................43    5.1.6 NAME ENCODING...............................................44    5.2 POP...........................................................44    5.2.1 POP FOR SIGNING KEYS........................................44  Arsenault, Turner                                                    2  Internet-Draft                PKIX Roadmap                  July 2002    5.2.2 POP FOR KEY MANAGEMENT KEYS.................................45    5.3 KEY USAGE BITS................................................47    5.4 NON-REPUDIATION...............................................48    5.5 TRUST MODELS..................................................49    5.5.1 HIERARCHICAL................................................49    5.5.2 LOCAL/FEDERATION............................................49    5.5.3 ROOT REPOSITORY.............................................50    5.5.4 RP'S PERSPECTIVE............................................50    6 REFERENCES......................................................50    7 SECURITY CONSIDERATIONS.........................................54    8 ACKNOWLEDGEMENTS................................................55    9 AUTHOR'S ADDRESSES..............................................55         1 Introduction     1.1 This Document        This document is an informational Internet-Draft that provides a    "roadmap" to the documents produced by the PKIX working group. It is    intended to provide information; there are no requirements or    specifications in this document.        Section 1.2 of this document defines key terms used in this document.    Section 1.3 covers some of the basic history behind the PKIX working    group. Section 2 covers Public Key Infrastructure (PKI) theory and    functions. Section 3 covers Privilege Management Infrastructure (PMI)    theory and functions. Section 4 provides an overview of the various    PKIX documents. It identifies which documents address which areas,    and describes the relationships among the various documents. Section    5 contains "Advice to implementors." Its primary purpose is to    capture some of the major issues discussed by the PKIX working group,    as a way of explaining why some of the requirements and    specifications say what they say. This explaination should cut down    on the number of misinterpretations of the documents, and help    developers build interoperable implementations. Section 6 contains a    list of contributors we wish to thank. Section 7 provides a list    references. Section 8 discusses security considerations, and Section    9 provides contact information for the editors.         1.2 Terminology        There are a number of terms used and misused throughout PKI-related,    PMI-related, and Time Stamp and Data Certification literature. To    limit confusion caused by some of those terms, used throughout this    document, we will use the following terms in the following ways:          - Attribute Authority (AA) - An authority trusted by one or more        users to create and sign attribute certificates. It is important        to note that the AA is responsible for the attribute        certificates during their whole lifetime, not just for issuing        them.  Arsenault, Turner                                                    3  Internet-Draft                PKIX Roadmap                  July 2002            - Attribute Certificate (AC) - A data structure containing a set of        attributes for an end-entity and some other information, which        is digitally signed with the private key of the AA which issued        it.            - Certificate - Can refer to either an AC or a public key        certificate. Where there is no distinction made the context        should be assumed that the term could apply to both an AC or a        public key certificate.            - Certification Authority (CA) - An authority trusted by one or        more users to create and assign public key certificates.        Optionally the CA may create the user's keys. It is important to        note that the CA is responsible for the public key certificates        during their whole lifetime, not just for issuing them.            - Certificate Policy (CP) - A named set of rules that indicates the        applicability of a public key certificate to a particular        community or class of application with common security        requirements. For example, a particular certificate policy might        indicate applicability of a type of public key certificate to        the authentication of electronic data interchange transactions        for the trading of goods within a given price range.            - Certification Practice Statement (CPS) - A statement of the        practices which a CA employs in issuing public key certificates.            - End-entity - A subject of a certificate who is not a CA in the        PKI or an AA in the PMI. (An EE from the PKI can be an AA in the        PMI.)            - Public Key Certificate (PKC) - A data structure containing the        public key of an end-entity and some other information, which is        digitally signed with the private key of the CA which issued it.            - Public Key Infrastructure (PKI) - The set of hardware, software,        people, policies and procedures needed to create, manage, store,        distribute, and revoke PKCs based on public-key cryptography.            - Privilege Management Infrastructure (PMI) - A collection of ACs,        with their issuing AA's, subjects, relying parties, and        repositories, is referred to as a Privilege Management        Infrastructure.            - Registration Authority (RA) - An optional entity given        responsibility for performing some of the administrative tasks        necessary in the registration of subjects, such as: confirming        the subject's identity; validating that the subject is entitled        to have the values requested in a PKC; and verifying that the        subject has possession of the private key associated with the        public key requested for a PKC.        Arsenault, Turner                                                    4  Internet-Draft                PKIX Roadmap                  July 2002      - Relying party - A user or agent (e.g., a client or server) who        relies on the data in a certificate in making decisions.            - Root CA - A CA that is directly trusted by an EE; that is,        securely acquiring the value of a Root CA public key requires        some out-of-band step(s). This term is not meant to imply that a        Root CA is necessarily at the top of any hierarchy, simply that        the CA in question is trusted directly. Note that the term        'trust anchor' is commonly used with the same meaning as 'root        CA' in this document.            - Subordinate CA - A "subordinate CA" is one that is not a Root CA        for the EE in question. Often, a subordinate CA will not be a        Root CA for any entity but this is not mandatory.            - Subject - A subject is the entity (AA, CA, or EE) named in a        certificate, either a PKC or AC. Subjects can be human users,        computers (as represented by Domain Name Service (DNS) names or        Internet Protocol (IP) addresses), or even software agents.            - Time Stamp Authority (TSA) - A TSA is a trusted Third Party who        provides a "proof-of-existence" for a particular datum prior to        an instant in time.       

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -