50 likes | 207 Views
July 30, 2010 1300-1400 IETF 78 – Maastricht T. Gondrom S. Fischer-Dieskau. draft-ietf-ltans-validate-03. draft-ietf-ltans-validate-03. Informational
E N D
July 30, 2010 1300-1400 IETF 78 – Maastricht T. Gondrom S. Fischer-Dieskau draft-ietf-ltans-validate-03
draft-ietf-ltans-validate-03 • Informational • Describes verification data that should be integrated into signatures/timestamps, when they should be acquired and how to include them in the archived structures to ensure long-term verification of signatures (recommendations)
draft-ietf-ltans-validate-03 • Topics: • Types of trust centers (fully trusted - partially trusted) • Explain Layer model vs. chain model • Algs in all certs are still secure: mandatory • No cert has been revoked: mandatory • Certs in chain to root are all not expired: ?? (the first must obviously be valid, but does expiry of higher certs impact validity of lower cert signatures?) • List of verification data • certificates of all • parties involved in the issuance of the time stamp certificate, • Certificate Revocation Lists (CRLs) and/or OCSP responses are needed.
draft-ietf-ltans-validate-03 • List of verification data: • Cert of signature/timestamp • For protected signatures: All certs up to root • For used timestamps: all certs up to root • OCSP or CRLs (technical implications of using CRL on retrieval due to “gray time” until revocation) • Fully trusted TSAs can ensure out-of-band communication of breaches (public interest) and thus allow to ommit OCSP/CRL and be sufficient with only full Cert chain.
draft-ietf-ltans-validate-03 • Course of action: • Drop document? • Integrate document into ari? • Submit? • Get cross review of PKIX? • (posted to their mailing-list but so far no answer)