⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-pkix-ipki-new-rfc2527-01.txt

📁 PKIX的RFC英文文档
💻 TXT
📖 第 1 页 / 共 5 页
字号:
PKIX Working Group            S. Chokhani  (CygnaCom Solutions, Inc.)Internet Draft                W. Ford      (VeriSign, Inc.)                              R. Sabett    (Cooley Godward LLP)                               C. Merrill   (McCarter & English, LLP)                               S. Wu        (Infoliance, Inc.)                                                                Expires in six months from                            January 3, 2002             Internet X.509 Public Key Infrastructure      Certificate Policy and Certification Practices Framework             < draft-ietf-pkix-ipki-new-rfc2527-01.txt >Status of this MemoThis document is an Internet-Draft and is subject to all provisionsof Section 10 of RFC2026.  Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups.  Note that other groups may also distribute working documents as Internet-Drafts.Internet-Drafts are draft documents valid for a maximum of 6 months and may be updated, replaced, or may become obsolete by other documents at any time.  It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress.     The list of current Internet-Drafts can be accessed at     http://www.ietf.org/1id-abstracts.html     The list of Internet-Draft Shadow Directories can be accessed at     http://www.ietf.org/shadow.html.To view the entire list of current Internet-Drafts, please check the "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast).Copyright (C) The Internet Society 2001. All Rights Reserved. AbstractThis document presents a framework to assist the writers of certificate policies or certification practice statements for participants within public key infrastructures, such as certification authorities, policy authorities, and communities of interest that wish to rely on certificates.  In particular, the framework provides a comprehensive list of topics that potentially (at the writer's discretion) need to be covered in a certificate policy or a certification practice statement.  This document is being submitted to the RFC Editor with a request for publication as an Informational RFC that will supercede RFC 2527 [CPF].Chokhani, Ford, Sabett, Merrill, & Wu    INTERNET DRAFT    [Page 1]                     TABLE OF CONTENTS1.	INTRODUCTION							 31.1		BACKGROUND							 31.2  		PURPOSE							 51.3  		SCOPE								 52.	DEFINITIONS								 63.	CONCEPTS								 83.1		CERTIFICATE POLICY					 83.2		CERTIFICATE POLICY EXAMPLES				103.3		X.509 CERTIFICATE FIELDS				103.3.1			Certificate Policies Extension		103.3.2			Policy Mappings Extension			113.3.3			Policy Constraints Extension			123.3.4			Policy Qualifiers					123.4		CERTIFICATION PRACTICE STATEMENT			133.5		RELATIONSHIP BETWEEN CP AND CPS			143.6		RELATIONSHIP AMONG CPs, CPSs, AGREEMENTS, AND 				OTHER DOCUMENTS				153.7		SET OF PROVISIONS						174.	CONTENTS OF A SET OF PROVISIONS				194.1		INTRODUCTION						194.1.1			Overview						194.1.2  		Document Name and Identification		204.1.3			PKI Participants					204.1.4			Certificate usage					214.1.5			Policy Administration				214.1.6			Definitions and acronyms			214.2		PUBLICATION AND REPOSITORY RESPONSIBILITIES	214.3		IDENTIFICATION AND AUTHENTICATION (I&A)		224.3.1			Naming						224.3.2			Initial Identity Validation			224.3.3			I&A for Re-key Requests				234.3.4			I&A for Revocation Requests			234.4		CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS	244.4.1			Certificate Application				244.4.2			Certificate Application Processing		244.4.3			Certificate Issuance				244.4.4			Certificate Acceptance				254.4.5			Key Pair and Certificate Usage		254.4.6			Certificate Renewal				264.4.7			Certificate Re-key				264.4.8			Certificate Modification			274.4.9			Certificate Revocation and Suspension	274.4.10		Certificate Status Services			284.4.11		End of Subscription				284.4.12		Key Escrow and Recovery				294.5		FACILITY, MANAGEMENT, AND OPERATIONAL CONTROLS  294.5.1			Physical Security Controls			294.5.2			Procedural Controls				304.5.3			Personnel Controls				304.5.4			Audit Logging Procedures			314.5.5			Records Archival					314.5.6			Key Changeover					324.5.7			Compromise and Disaster Recovery		324.5.8			CA or RA Termination				33Chokhani, Ford, Sabett, Merrill, & Wu    INTERNET DRAFT    [Page 2]4.6		TECHNICAL SECURITY CONTROLS				334.6.1			Key Pair Generation and Installation	334.6.2			Private Key Protection and Cryptographic 			 Module Engineering Controls			344.6.3			Other Aspects of Key Pair Management	364.6.4			Activation Data					364.6.5			Computer Security Controls			364.6.6			Life Cycle Security Controls			374.6.7			Network Security Controls			374.6.8			Timestamping					374.7		CERTIFICATE, CRL, AND OCSP PROFILES			374.7.1			Certificate Profile				374.7.2			CRL Profile						384.7.3			OCSP Profile					384.8		COMPLIANCE AUDIT AND OTHER ASSESSMENT		384.9		OTHER BUSINESS AND LEGAL MATTERS			394.9.1			Fees							404.9.2			Financial Responsibility			404.9.3			Confidentiality of Business Information	404.9.4			Privacy of Personal Information		414.9.5			Intellectual Property Rights			414.9.6			Representations and Warranties		414.9.7			Disclaimers of Warranties			424.9.8			Limitations of Liability			424.9.9			Indemnities						424.9.10		Term and Termination				424.9.11		Individual notices and communications				with participants				434.9.12		Amendments						434.9.13		Dispute Resolution Procedures			444.9.14		Governing Law					444.9.15		Compliance with Applicable Law		444.9.16		Miscellaneous Provisions			444.9.17		Other Provisions					455.	OUTLINE OF A SET OF PROVISIONS				456.	ACKNOWLEDGMENTS							517.	REFERENCES								528.	AUTHORS' ADDRESSES						53	NOTES									53	LIST OF ACRONYMS							54-----------------------------------------------------------------1. INTRODUCTION1.1  BACKGROUNDIn general, a public-key certificate (hereinafter "certificate") binds a public key held by an entity (such as person, organization, account, device, or site) to a set of information that identifies the entity associated with use of the corresponding private key.  In most cases involving identity certificates, this entity is known as the "subject" or "subscriber" of the certificate.  Two exceptions, however, include devices (in which the subscriber is usually the individual or organization controlling the device) and anonymous Chokhani, Ford, Sabett, Merrill, & Wu    INTERNET DRAFT    [Page 3]certificates (in which the identity of the individual or organization is not available from the certificate itself).  Other types of certificates bind public keys to attributes of an entity other than the entity's identity, such as a role, a title, or creditworthiness information.  A certificate is used by a "certificate user" or "relying party" that needs to use, and rely upon the accuracy of, the binding between the subject public key distributed via that certificate and the identity and/or other attributes of the subject contained in that certificate.  A relying party is frequently an entity that verifies a digital signature from the certificate's subject where the digital signature is associated with an email, web form, electronic document, or other data.  Other examples of relying parties can include a sender of encrypted email to the subscriber, a user of a web browser relying on a server certificate during a secure sockets layer (SSL) session, and an entity operating a server that controls access to online information using client certificates as an access control mechanism.  In summary, a relying party is an entity that uses a public key in a certificate (for signature verification and/or encryption).  The degree to which a relying party can trust the binding embodied in a certificate depends on several factors.  These factors can include the practices followed by the certification authority (CA) in authenticating the subject; the CA's operating policy, procedures, and security controls; the scope of the subscriber's responsibilities (for example, in protecting the private key); and the stated responsibilities and liability terms and conditions of the CA (for example, warranties, disclaimers of warranties, and limitations of liability). A Version 3 X.509 certificate may contain a field declaring that one or more specific certificate policies apply to that certificate [ISO1].  According to X.509, a certificate policy (CP) is "a named set of rules that indicates the applicability of a certificate to a particular community and/or class of applications with common security requirements."  A CP may be used by a relying party to help in deciding whether a certificate, and the binding therein, are sufficiently trustworthy and otherwise appropriate for a particular application.  The CP concept is an outgrowth of the policy statement concept developed for Internet Privacy Enhanced Mail [PEM1] and expanded upon in [BAU1]. A more detailed description of the practices followed by a CA in issuing and otherwise managing certificates may be contained in a certification practice statement (CPS) published by or referenced by the CA.  According to the American Bar Association Information Security Committee's Digital Signature Guidelines (hereinafter "DSG")(1) and the Information Security Committee's PKI Assessment Guidelines (hereinafter "PAG")(2), "a CPS is a statement of the practices which a certification authority employs in issuing certificates." [ABA1, ABA2]  In general, CPSs also describe practicesrelating to all certificate lifecycle services (e.g., issuance, management, revocation, and renewal or re-keying), and CPSs provide details concerning other business, legal, and technical matters.Chokhani, Ford, Sabett, Merrill, & Wu    INTERNET DRAFT    [Page 4]The terms contained in a CP or CPS may or may not be binding upon a PKI's participants as a contract.  A CP or CPS may itself purport to be a contract.  More commonly, however, an agreement may incorporate a CP or CPS by reference and therefore attempt to bind the parties of the agreement to some or all of its terms.  For example, some PKIs may utilize a CP or (more commonly) a CPS that is incorporated by reference in the agreement between a subscriber and a CA or RA (called a "subscriber agreement") or the agreement between a relying party and a CA (called a "relying party agreement" or "RPA").  In other cases, however, a CP or CPS has no contractual significance at all.  A PKI may intend these CPs and CPSs to be strictly informational or disclosure documents.1.2  PURPOSEThe purpose of this document is twofold.  First, the document aims to explain the concepts of a CP and a CPS, describe the differences between these two concepts, and describe their relationship to subscriber and relying party agreements.  Second, this document aims to present a framework to assist the writers and users of certificate policies or CPSs in drafting and understanding these documents.  In particular, the framework identifies the elements that may need to be considered in formulating a CP or a CPS.  The purpose is not to define particular certificate policies or CPSs, per se.  Moreover, this document does not aim to provide legal advice or recommendations as to particular requirements or practices that should be contained within CPs or CPSs.  (Such recommendations, however, appear in [ABA2].) 1.3  SCOPEThe scope of this document is limited to discussion of the topics that can be covered in a CP (as defined in X.509) or CPS (as defined in the DSG and PAG).  In particular, this document describes the types of information that should be considered for inclusion in a CP or a CPS.  While the framework as presented generally assumes use of the X.509 version 3 certificate format for the purpose of providing assurances of identity, it is not intended that the material be restricted to use of that certificate format or identity certificates.  Rather, it is intended that this framework be adaptable to other certificate formats and to certificates providing 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -