⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-pkix-roadmap-09.txt

📁 PKIX的RFC英文文档
💻 TXT
📖 第 1 页 / 共 5 页
字号:
       and other attributes;        Arsenault, Turner                                                    9  Internet-Draft                PKIX Roadmap                  July 2002      - PKC holders are issued certificates and can sign digital        documents and decrypt documents using private keys;            - Clients that validate digital signatures and their certification        paths from a known public key of a trusted CA and that encrypt        document using public key from certificates of PKC holders;            - Repositories that store and make available PKCs and Certificate        Revocation Lists (CRLs).        Figure 1 is a simplified view of the architectural model assumed by    the PKIX Working Group.          +---+     cert. publish        +------------+            |   |  <---------------------  | End Entity | <-------      | C |                          +------------+      "out-of-band"      |   |                            | ^                loading      | e |                            | |      initial      | r |                            | |       registration/      | t |                            | |       certification      |   |                            | |      key pair recovery      | / |                            | |      key pair update      |   |                            | |      certificate update      | C |  PKI "USERS"               V |      revocation request      | R | -------------------+-+-----+-+------+-+-------------------      | L |  PKI MANAGEMENT    | ^              | ^      |   |    ENTITIES        | |              | |      |   |                    V |              | |      | R |                 +------+            | |      | e |   <------------ | RA   | <-----+    | |      | p |      cert.      |      | ----+ |    | |      | o |       publish   +------+     | |    | |      | s |                              | |    | |      | i |                              V |    V |      | t |                            +------------+      | o |   <------------------------|     CA     |------->      | r |                            +------------+  "out-of-band"      | y |      cert. publish              | ^         publication      |   |      CRL publish                | |      +---+                                 | |    cross-certification                                            | |    cross-certificate                                            | |       update                                            | |                                            V |                                          +------+                                          | CA-2 |                                          +------+                           Figure 1 - PKI Entities          Arsenault, Turner                                                   10  Internet-Draft                PKIX Roadmap                  July 2002 2.3 Public Key Certificates        ITU-T X.509 (formerly CCITT X.509) or ISO|IEC/ITU 9594-8, which was    first published in 1988 as part of the X.500 Directory    recommendations, defines a standard PKC format [X.509]. The PKC    format in the 1988 standard is called the version 1 (v1) format.        When X.500 was revised in 1993, two more fields,    subjectUniqueIdentifier and issuerUniqueIdentifier were added,    resulting in the version 2 (v2) format. These two fields may be used    to support directory access control.        The Internet Privacy Enhanced Mail (PEM) RFCs, published in 1993,    include specifications for a public key infrastructure based on X.509    v1 public key certificates [PEM]. The experience gained in attempts    to deploy [PEM] made it clear that the v1 and v2 public key    certificate formats are deficient in several respects. Most    importantly, more fields were needed to carry information which PEM    design and implementation experience has proven necessary. In    response to these new requirements, ISO|IEC, ITU, and ANSI X9    developed the X.509 version 3 (v3) PKC format. The v3 format extends    the v2 format by adding provision for additional extension fields.    Particular extension field types may be specified in standards or may    be defined and registered by any organization or community. In June    1996, standardization of the basic v3 format was completed [X.509].        ISO|IEC, ITU, and ANSI X9 have also developed standard extensions for    use in the v3 extensions field [X.509][X9.55]. These extensions can    convey such data as additional subject identification information,    key attribute information, policy information, and certification path    constraints. However, the ISO/IEC/ITU and ANSI X9 standard extensions    are very broad in their applicability. In order to develop    interoperable implementations of X.509 v3 systems for Internet use,    it is necessary to specify a profile for use of the X.509 v3    extensions tailored for the Internet. It is one goal of PKIX to    specify a profile for Internet, electronic mail, and IPSec    applications, etc. Environments with additional requirements may    build on this profile or may replace it.         2.4 Functions of a PKI        This section describes the major functions of a PKI. In some cases,    PKIs may provide extra functions.         2.4.1 Registration        This is the process whereby a subject first makes itself known to a    CA (directly, or through an RA), prior to that CA issuing a PKC or    PKCs for that subject. Registration involves the subject providing    its name (e.g., common name, fully-qualified domain name, IP    address), and other attributes to be put in the PKC, followed by the  Arsenault, Turner                                                   11  Internet-Draft                PKIX Roadmap                  July 2002    CA (possibly with help from the RA) verifying in accordance with its    Certification Practice Statement (CPS) that the name and other    attributes are correct.         2.4.2 Initialization        Initialization is when the subject (e.g., the user or client system)    gets the values needed to begin communicating with the PKI. For    example, initialization can involve providing the client system with    the public key or PKC of a CA, or generating the client system's own    public-private key pair.         2.4.3 Certification        This is the process in which a CA issues a PKC for a subject's public    key, and returns that PKC to the subject or posts that PKC in a    repository.         2.4.4 Key Pair Recovery        In some implementations, key exchange or encryption keys will be    required by local policy to be "backed up," or recoverable in case    the key is lost and access to previously-encrypted information is    needed. Such implementations can include those where the private key    exchange key is stored on a hardware token that can be lost or    broken, or when a private key file is protected by a password which    can be forgotten. Often, a company is concerned about being able to    read mail encrypted by or for a particular employee when that    employee is no longer available because she is ill or no longer works    for the company.        In these cases, the user's private key can be backed up by a CA or by    a separate key backup system. If a user or her employer needs to    recover these backed up key materials, the PKI must provide a system    that permits the recovery without providing an unacceptable risk of    compromise of the private key.         2.4.5 Key Generation        Depending on the CA's policy, the private-public key pair can either    be generated by the user in his local environment, or generated by    the CA. In the latter case, the key material may be distributed to    the user in an encrypted file or on a physical token (e.g., a smart    card or PC card).          Arsenault, Turner                                                   12  Internet-Draft                PKIX Roadmap                  July 2002 2.4.6 Key Update        All key pairs need to be updated regularly (i.e., replaced with a new    key pair) and new PKCs issued. This will happen in two cases:    normally, when a key has passed its maximum usable lifetime; and    exceptionally, when a key has been compromised and must be replaced.         2.4.6.1 Key Expiry        In the normal case, a PKI needs to provide a facility to gracefully    transition from a PKC with an existing key to a new PKC with a new    key. This is particularly true when the key to be updated is that of    a CA. Users will know in advance that the key will expire on a    certain date; the PKI, working together with PKC-using applications,    should allow for appropriate keys to work before and after the    transition. There are a number of ways to do this; see [CMP] for an    example of one.         2.4.6.2 Key Compromise        In the case of a key compromise, the transition will not be    "graceful" in that there will be an unplanned switch of PKCs and    keys; users will not have known in advance what was about to happen.    Still, the PKI must support the ability to declare that the previous    PKC is now invalid and shall not be used, and to announce the    validity and availability of the new PKC.        Note: compromise of a private key associated with a Root CA is    catastrophic for users relying on that Root CA. If a Root CA's    private key is compromised, that CA's PKC must be revoked and all    PKCs subordinate to it must also be revoked. Until such time as the    Root CA has been issued a new PKC and the Root CA issues PKCs to    users relying upon it, users relying on that Root CA are cut off from    the rest of the system, as there is no way to develop a valid    certification path back to a trusted node.        Further, users will likely have to be notified by out-of-band    mechanisms about the change in CA keys. If the old key is    compromised, any "update" message telling subordinates to switch to a    new key could have come from an attacker in possession of the old    key, and could point to a new public key for which the attacker    already has the private key. It is possible to have anticipated this    event, and "pre-placed" replacement Root CA keys with all relying    parties, but some secure, out-of-band mechanism will have to be used    to tell users to make the switch, and this will only help if the    replacement key has not been compromised.        Additionally, once the Root CA is brought back up with a new key, it    will likely be necessary to re-issue PKCs, signed with the new key,    to all subordinate users, since their current PKC would be signed    with a now-revoked key.  Arsenault, Turner                                                   13  Internet-Draft                PKIX Roadmap                  July 2002         2.4.7 Cross-certification        A CA certificate is a certificate in a hierarchy that is neither a    self-signed certificate, nor an end-entity certificate. [2459bis]    does not make a difference between a CA certificate and a cross    certificate since it defines a cross-certificate as "a certificate    issued by one CA to another CA". Some people in the WG believe that    a cross certificate is a special kind of CA certificate. A cross    certificate is issued by a CA under one Top CA for another CA under    a different Top CA. CAs in the same hierarchy have part of their    names imposed by the Top CA or by the CAs under that Top CAS. When a    cross certificate is issued, there is no relationship between the    names of the CAs.        Typically, a cross-certificate is used to allow client systems or    end entities in one administrative domain to communicate securely 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -