分享
 
 
 

RFC1875 - UNINETT PCA Policy Statements

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group N. Berge

Request for Comments: 1875 Norwegian Computing Center

Category: Informational December 1995

UNINETT PCA Policy Statements

Status of this Memo

This memo provides information for the Internet community. This memo

does not specify an Internet standard of any kind. Distribution of

this memo is unlimited.

Table of Contents

1. IntrodUCtion.......................................2

2. PCA Identity.......................................2

3. UNINETT - a brief overview.........................2

4. PCA Scope..........................................2

4.1 The certification tree.............................3

4.2 Use of Registration Authorities (RAs)..............3

5. PCA Security & Privacy.............................3

5.1 Security requirements imposed on the PCA...........3

5.2 Security requirements imposed on CAs...............4

5.3 Security requirements imposed on RAs...............4

5.4 Measures taken to protect the privacy of any

information collected in the course of certifying

CAs and (for CAs) users............................4

6. Certification Policy...............................5

6.1 Policy and procedures when certifying CAs..........5

6.2 Policy and procedures when certifying RAs..........5

6.3 Policy and procedures when certifying users........5

6.4 Validity interval for issued certificates..........6

6.5 The CAs right to a DN and procedures to resolve DN

conflicts..........................................6

6.6 The users right to a DN and procedures to resolve

DN conflicts.......................................6

7. Certificate Management.............................7

8. CRL Management.....................................7

9. Naming Conventions.................................8

10. Business Issues....................................9

10.1 Legal agreement concerning CAs.....................9

10.2 Legal agreement concerning RAs.....................9

10.3 Fees...............................................9

11. Other..............................................9

11.1 Distribution of software needed by CAs, RAs and

users..............................................9

12. Security Considerations............................9

13. References........................................10

14. Author's Address..................................10

1. Introduction

This document provides information about policy statements submitted

by the UNINETT Policy Certification Authority (UNINETT PCA).

It's purpose is to provide information to members of the Internet

community who wish to evaluate the trust they can place in a

certification path that includes a certificate issued by the UNINETT

PCA, or to set up a CA to be certified by the UNINETT PCA.

2. PCA Identity

Distinguished Name (DN): C=no, O=uninett, OU=pca

The UNINETT PCA will be run by:

Norwegian Computing Center

Gaustadallien 23

P.O.Box 114 Blindern,

N-0314 Oslo, Norway

Contact person:

Nils Harald Berge

Email: Nils.Harald.Berge@nr.no

Tel.: (+47) 22 85 25 00

Fax : (+47) 22 69 76 60

Duration: This policy is valid from Oct 1, 1995 to Jan 1, 1998

Info about this PCA is available at: http://www.uninett.no/pca/

3. UNINETT - a brief overview

UNINETT is a Limited Company (AS) operating the Norwegian network for

academics and research. It is incorporated under Norwegian law, and

it's company number is 968100211.

More information is available from the UNINETT web server at:

http://www.uninett.no/

4. PCA Scope

The scope of the UNINETT PCA is determined by UNINETT Policy. It will

chiefly certify CAs to run on behalf of legal entities such as

schools and companies.

4.1 The certification tree

The certification tree beneath the UNINETT PCA comprise three

distinct entities: Certification Authorities (CAs), Registration

Authorities (RAs) and users. CAs are described in the PEM documents

[1,2,3,4]. An eXPlanation of RAs is given bellow.

There will be one CA, with possible sublevel CAs, per UNINETT member

organization. The CA may be run by the organization itself, or by the

organization running the PCA for organizations who do not want to

take on the responsibility themselves.

4.2 Use of Registration Authorities (RAs)

Since the CA may be located far away from the users, local

authorities are needed for physical identification/authentication of

users. For security reasons, and to avoid an unnecessary large number

of CAs, these authorities are not allowed to issue certificates.

A registration authority (RA) is an ordinary user, appointed by an

organization or an organizational unit and trusted by a CA, serving

as a point of contact for persons who want to register as users, i.e.

to have a certificate issued. In order to avoid faked requests for

certification, users must send their self-signed certificate to an

appropriate RA, and then physically visit the RA with proof of

identity. The RA will forward the self-signed certificate to the CA

in a message signed by the RA, if the user is properly authenticated.

For bulk certification (see 5.3) the RA must physically verify the

identity of the user before giving out the passWord for Access to the

users private key.

A CA may appoint as many RAs as it wish. The only difference between

certifying an RA and an ordinary user is that the RA (a person) must

sign an agreement with the certifying CA, stating the obligation to

adhere to the agreed procedures.

5. PCA Security & Privacy

5.1 Security requirements imposed on the PCA

- The PCA will have its private key stored on a smartcard.

- The PCA will be run on a dedicated workstation with no network

connection. The workstation will be physically secured.

- Exchanging data between the PCA workstation and the rest of the

world will be done by using tapes or floppy discs.

- The PCA RSA key pair will have a length of 1024 bits.

- Backups from the PCA workstation must be stored in at least one off

site location. Backups must be physically secured

5.2 Security requirements imposed on CAs that are to be certified

- A CA must be run on a dedicated workstation with no network

connection. The workstation must be physically secured.

- Exchanging data between the CA workstation and the rest of the world

must be done by using tapes or floppy discs.

- The CA RSA key pair must have a minimum length of 1024 bits.

A security requirements document concerning CAs will be made

available online, and expected to be obeyed.

5.3 Security requirements imposed on RAs that are to be certified

- RAs must use a work station, with remote login disabled. Use of

X-terminal, terminal emulator etc. with processes running on a

remote machine is strictly prohibited.

- The RA RSA key pair must have a minimum length of 512 bits.

A security requirements document concerning RAs will be made

available online, and expected to be obeyed.

5.4 Measures taken to protect the privacy of any information collected

in the course of certifying CAs and (for CAs) users.

CAs will not collect any security relevant information about users.

In those cases when CAs generate keys (and certificates) on behalf of

users, all information pertaining the users private key will be

securely deleted after it has been received by the user. CAs will

always generate their own key pairs, thus no security relevant

information will be collected by the PCA.

All archived material concerning DNs for users will be stored on the

CA workstations, which are physically protected and does not have any

network connections.

6. Certification Policy

6.1 Policy and procedures when certifying CAs

In order to be certified, a CA must sign an agreement with the

UNINETT PCA stating the obligation to adhere to the agreed

procedures.

The persons responsible for running the CA will be evaluated by the

UNINETT PCA, in order to determine whether they exhibit the necessary

qualifications and have access to the resources needed in order to

run the CA securely.

The CA must submit its self signed certificate to the UNINETT PCA.

6.2 Policy and procedures when certifying RAs

The organization or organizational unit is responsible for appointing

RA persons, typically 1-3 persons per organization/unit. The person

representing the RA must sign an agreement with the certifying CA,

stating the obligation to adhere to the agreed procedures in order to

be certified.

The person representing the RA will be evaluated by the certifying

CA, in order to determine whether he/she exhibits the necessary

qualifications and has access to the resources needed to run the RA

securely.

The RA must submit its self signed certificate to the certifying CA.

In the absence of RAs, or equivalent, the validity of the

certification request (i.e. the identity of the requestor) must be

verified by "out of band" means. These means will vary from case to

case, depending on physical distance, prior knowledge etc.

6.3 Policy and procedures when certifying users

There are two ways in which a user can be certified:

- individual certification, or

- bulk certification

When applying individual certification, a user will generate his own

key pair, and his own self-signed certificate. The certification

procedure follows the PEM documents [1,2,3,4], with the exception

that the certification request will be sent to an RA. The user must

then visit the RA with proof of identity

Bulk certification of users will typically be done when it is

desirable to certify many users belonging to the same organization.

An example could be the certification of students at the beginning of

a semester, or initial certification of all employees belonging to a

company. When bulk certifying users, the CA will generate the users'

key pairs and certificates. A user's key pair together with the

certificate will be DES-encrypted and sent electronically to the

user. The pass phrase to generate the DES-key can be collected at

the local RA, given proof of identity. The pass phrase can also be

sent by certified surface mail.

When bulk certifying users the CA or RA shall not access or store any

of the users' private information.

A person's identity is verified by:

- driver's licence

- passport

- bank card (Norwegian)

CA and RA need not be separate entities. A CA may verify the identity

of users directly, following the procedures described above.

6.4 Validity interval for issued certificates

Validity interval for user and RA certificates is maximum 2 years

from date of issue.

There is in principle no special requirements regarding validity

intervals for CA certificates, though it is recommended not to issue

certificates for more than a 10 year period.

6.5 The CAs right to a DN and procedures to resolve DN conflicts

CAs will preferably use DNs reflecting the organizational scope under

which they certify users (see also "Naming conventions"). The

certifying entity must ensure, with the aid of X.500 as

disambiguation tool, the uniqueness of a DN.

6.6 The user's right to a DN and procedures to resolve DN conflicts

It is the certifying CA who will determine a user's DN and ensure,

with the aid of X.500 as disambiguation tool, the uniqueness of a DN.

Users will preferably use DNs reflecting the organization to which

they belong, and their full name (see also "Naming conventions").

7. Certificate management

UNINETTs X.500 service will be used when storing certificates

belonging to users within UNINETT member organizations. Other users

may also use the X.500 service if available. All certificates issued

will be maintained in a local database by the certifying entity in

addition to the X.500 Directory. If a CA does not have access to the

X.500 service, all issued certificates must be mailed to the UNINETT

PCA who will make the X.500 entries on behalf of the CA.

Certificates can be requested in two ways, either directly from the

X.500 directory, or by querying a mail-responder service maintained

by the UNINETT PCA.

Details on how certificates are mailed, and how to use the mail-

responder service can be found at the following WWW site:

http://www.uninett.no/pca/

8. CRL Management

Certificate Revocation Lists (CRLs) must be issued at least once a

month, on a specified date, by CAs. The UNINETT X.500 service will be

used to publish CRLs. If a CA does not have access to the X.500

service the CRL must be mailed to the UNINETT PCA who will make the

X.500 entries on behalf of the CA.

CRLs can be requested in two ways, either directly from the X.500

directory, or by querying a mail-responder service maintained by the

UNINETT PCA.

Details on how CRLs are mailed, and how to use the mail-responder

service can be found at the following WWW site:

http://www.uninett.no/pca/

The UNINETT PCA will continually update the CRL with revoked CA

certificates.

There is no automatic distribution service of CRLs. Therefore users

will have to pull CRLs from the X.500 or the mail-responder. Black

lists are currently not supported. Appropriate news groups and

information services will be used to announce the issuance of new

CRLs.

9. Naming Conventions

Naming conventions for CAs:

CAs' DNs will follow the conventions adopted by their organization.

Organizations who do not have any preferences in this matter should

use the following scheme:

C=<country>, O=<organization> [, OU=<organizational-unit>]

Country is the country code, e.g. all Norwegian organizations have

C=no. Organization is the organization represented by the CA (e.g.

the scope for which the CA certify users). Organizational-unit is

optional, reflecting a unit within a large organization for cases in

which the organization has more than one CA. Example: the CA

responsible for certifying UNINETT employees will be assigned the

following DN: C=no, O=uninett

Naming conventions for users:

Users' DNs will follow the conventions adopted by their organization.

Organizations who do not have any preferences in this matter should

use the following scheme:

C=<country>, O=<organization>, [OU=<organizational-unit>,]

CN=<personal name>

Personal name will be a unique name for the user with respect to the

organization to which the user belongs. An organization's CA is

responsible for ensuring that all certified users have a distinct

personal name. Usually personal name will be the user's full name.

Use of OU is optional. Example if Per Olsen is an employee of UNINETT

he will be assigned the following DN: C=no, O=uninett, CN=Per Olsen.

The choice of which users to certify as belonging to the organization

is made by the CA, not by the PCA.

10. Business Issues

10.1 Legal agreements concerning CAs

If a CA wishes to be certified by the UNINETT PCA, the CA will have

to sign a legal agreement with the UNINETT PCA. The legal agreement

can be oBTained by contacting the UNINETT PCA.

10.2 Legal agreements concerning RAs

If an RA wishes to be certified by a CA, a person representing the RA

will have to sign a legal agreement with the CA. The legal agreement

can be obtained from the appropriate CA, or directly from the UNINETT

PCA. Each CA will locally decide whether the RA is to be certified.

10.3 Fees

The UNINETT PCA reserves the right to charge fees. The fee structure

will be determined by UNINETT policy.

11. Other

11.1 Distribution of software needed by CAs, RAs and users

The software needed is based on the SecuDE-package from GMD

Darmstadt, and is available without fee for non-commercial purposes.

All software distributions should include a signature from the

UNINETT PCA to verify its integrity. Users, CAs, and RAs are expected

to verify such signatures immediately after installation.

12. Security Considerations

Security issues are discussed throughout this memo.

13. References

[1] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part

I: Message Encryption and Authentication Procedures", RFC1421,

IAB IRTF PSRG, IETF PEM WG, February 1993.

[2] Kent, S., "Privacy Enhancement for Internet Electronic Mail: Part

II: Certificate-Based Key Management", RFC1422, IAB IRTF PSRG,

IETF PEM, BBN, February 1993.

[3] Balenson, D., "Privacy Enhancement for Internet Electronic Mail:

Part III: Algorithms, Modes, and Identifiers", RFC1423, IAB IRTF

PSRG, IETF PEM WG, TIS, February 1993.

[4] Kaliski, B., "Privacy Enhancement for Internet Electronic Mail:

Part IV: Key Certification and Related Services", RFC1424, RSA

Laboratories, February 1993.

14. Author's Address

Nils Harald Berge

Norwegian Computing Center

Gaustadallien 23

P.O.Box 114 Blindern,

N-0314 Oslo, Norway

Phone: (+47) 22 85 25 00

Fax : (+47) 22 69 76 60

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有