rfc1875.txt
来自「<VC++网络游戏建摸与实现>源代码」· 文本 代码 · 共 564 行 · 第 1/2 页
TXT
564 行
RFC 1875 UNINETT PCA Policy Statements December 1995 Bulk certification of users will typically be done when it is desirable to certify many users belonging to the same organization. An example could be the certification of students at the beginning of a semester, or initial certification of all employees belonging to a company. When bulk certifying users, the CA will generate the users' key pairs and certificates. A user's key pair together with the certificate will be DES-encrypted and sent electronically to the user. The pass phrase to generate the DES-key can be collected at the local RA, given proof of identity. The pass phrase can also be sent by certified surface mail. When bulk certifying users the CA or RA shall not access or store any of the users' private information. A person's identity is verified by: - driver's licence - passport - bank card (Norwegian) CA and RA need not be separate entities. A CA may verify the identity of users directly, following the procedures described above.6.4 Validity interval for issued certificates Validity interval for user and RA certificates is maximum 2 years from date of issue. There is in principle no special requirements regarding validity intervals for CA certificates, though it is recommended not to issue certificates for more than a 10 year period.6.5 The CAs right to a DN and procedures to resolve DN conflicts CAs will preferably use DNs reflecting the organizational scope under which they certify users (see also "Naming conventions"). The certifying entity must ensure, with the aid of X.500 as disambiguation tool, the uniqueness of a DN.6.6 The user's right to a DN and procedures to resolve DN conflicts It is the certifying CA who will determine a user's DN and ensure, with the aid of X.500 as disambiguation tool, the uniqueness of a DN. Users will preferably use DNs reflecting the organization to which they belong, and their full name (see also "Naming conventions").Berge Informational [Page 6]RFC 1875 UNINETT PCA Policy Statements December 19957. Certificate management UNINETTs X.500 service will be used when storing certificates belonging to users within UNINETT member organizations. Other users may also use the X.500 service if available. All certificates issued will be maintained in a local database by the certifying entity in addition to the X.500 directory. If a CA does not have access to the X.500 service, all issued certificates must be mailed to the UNINETT PCA who will make the X.500 entries on behalf of the CA. Certificates can be requested in two ways, either directly from the X.500 directory, or by querying a mail-responder service maintained by the UNINETT PCA. Details on how certificates are mailed, and how to use the mail- responder service can be found at the following WWW site: http://www.uninett.no/pca/8. CRL Management Certificate Revocation Lists (CRLs) must be issued at least once a month, on a specified date, by CAs. The UNINETT X.500 service will be used to publish CRLs. If a CA does not have access to the X.500 service the CRL must be mailed to the UNINETT PCA who will make the X.500 entries on behalf of the CA. CRLs can be requested in two ways, either directly from the X.500 directory, or by querying a mail-responder service maintained by the UNINETT PCA. Details on how CRLs are mailed, and how to use the mail-responder service can be found at the following WWW site: http://www.uninett.no/pca/ The UNINETT PCA will continually update the CRL with revoked CA certificates. There is no automatic distribution service of CRLs. Therefore users will have to pull CRLs from the X.500 or the mail-responder. Black lists are currently not supported. Appropriate news groups and information services will be used to announce the issuance of new CRLs.Berge Informational [Page 7]RFC 1875 UNINETT PCA Policy Statements December 19959. Naming Conventions Naming conventions for CAs: CAs' DNs will follow the conventions adopted by their organization. Organizations who do not have any preferences in this matter should use the following scheme: C=<country>, O=<organization> [, OU=<organizational-unit>] Country is the country code, e.g. all Norwegian organizations have C=no. Organization is the organization represented by the CA (e.g. the scope for which the CA certify users). Organizational-unit is optional, reflecting a unit within a large organization for cases in which the organization has more than one CA. Example: the CA responsible for certifying UNINETT employees will be assigned the following DN: C=no, O=uninett Naming conventions for users: Users' DNs will follow the conventions adopted by their organization. Organizations who do not have any preferences in this matter should use the following scheme: C=<country>, O=<organization>, [OU=<organizational-unit>,] CN=<personal name> Personal name will be a unique name for the user with respect to the organization to which the user belongs. An organization's CA is responsible for ensuring that all certified users have a distinct personal name. Usually personal name will be the user's full name. Use of OU is optional. Example if Per Olsen is an employee of UNINETT he will be assigned the following DN: C=no, O=uninett, CN=Per Olsen. The choice of which users to certify as belonging to the organization is made by the CA, not by the PCA.Berge Informational [Page 8]RFC 1875 UNINETT PCA Policy Statements December 199510. Business Issues10.1 Legal agreements concerning CAs If a CA wishes to be certified by the UNINETT PCA, the CA will have to sign a legal agreement with the UNINETT PCA. The legal agreement can be obtained by contacting the UNINETT PCA.10.2 Legal agreements concerning RAs If an RA wishes to be certified by a CA, a person representing the RA will have to sign a legal agreement with the CA. The legal agreement can be obtained from the appropriate CA, or directly from the UNINETT PCA. Each CA will locally decide whether the RA is to be certified.10.3 Fees The UNINETT PCA reserves the right to charge fees. The fee structure will be determined by UNINETT policy.11. Other11.1 Distribution of software needed by CAs, RAs and users The software needed is based on the SecuDE-package from GMD Darmstadt, and is available without fee for non-commercial purposes. All software distributions should include a signature from the UNINETT PCA to verify its integrity. Users, CAs, and RAs are expected to verify such signatures immediately after installation.12. Security Considerations Security issues are discussed throughout this memo.Berge Informational [Page 9]RFC 1875 UNINETT PCA Policy Statements December 199513. References [1] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", RFC 1421, IAB IRTF PSRG, IETF PEM WG, February 1993. [2] Kent, S., "Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management", RFC 1422, IAB IRTF PSRG, IETF PEM, BBN, February 1993. [3] Balenson, D., "Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers", RFC 1423, IAB IRTF PSRG, IETF PEM WG, TIS, February 1993. [4] Kaliski, B., "Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services", RFC 1424, RSA Laboratories, February 1993.14. Author's Address Nils Harald Berge Norwegian Computing Center Gaustadallien 23 P.O.Box 114 Blindern, N-0314 Oslo, Norway Phone: (+47) 22 85 25 00 Fax : (+47) 22 69 76 60 EMail: Nils.Harald.Berge@nr.noBerge Informational [Page 10]
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?