110 likes | 117 Views
This solution leverages cross-certification to delegate authority, allowing STI-CA to issue TN-PoP certificates to Customer AF, ensuring standard X.509 compliance with backward compatibility for signature validation.
E N D
Issuing delegate certs to Customer AF using Cross-Certification Feb 19, 2019 David Hancock, Chris Wendt (Comcast)
Current "proxy" model for issuing TN-PoP Certs to Customer AF STI-CA Procedures and performed each time a new TN-PoP cert issued CA root certificate CA intermediate certificate STI-CA issues TN-level end-entity cert to ACME Proxy Acting as interworking function and firewall, ACME Proxy relays cert order to STI-CA. 2 1 2 3 3 4 1 4 ACME Certificate path TN Provider ACME Proxy Customer AF downloads cert (or cert URL) from ACME Proxy • Customer AF orders TN-level cert from ACME-Proxy • (ACME account pre-authorized with external account binding) ACME End-entity cert chains directly to STI-CA intermediate cert TN-PoP certificate Customer AF
New TN-POP SHAKEN 2.0 Solution Use Cross-Certification to delegate STI-CA authority, as specified in RFC 5280 Goal: Standard X.509 with backward compatibility for signature validation on STI-VS
RFC 5280 defines two classes of certs • CA certificates • MUST contain a Basic Constraints object with cA boolean set to TRUE • Certificate’s private key can be used to sign another certificate in cert path • End-entity certificates • MUST either omit the Basic Constraints object, or contain Basic Constraints with cA set to FALSE • Certificate private key cannot be used to sign another certificate
RFC 5280 also defines three sub-classes of CA certs • Self-issued certificate • CA cert where the issuer and subject are the same entity • Self-signed certificate (aka root cert) • CA self-issued certificate where signature can be verified using cert’s public key • Cross-certificate • CA cert where the subject and issuer are different entities
Using cross-certs to delegate CA authority • CA-1 can delegate its authority to another "delegate" CA-2 by issuing a cross-certificate to CA-2 • The delegate CA-2 can then issue end-entity certs, chained to the cross-certificate • For domain certs, CA-1 can include a Name Constraints object in the cross-certificate to limit the Subject name-space of the end-entity certs issued by the delegate CA-2
Domain CA delegation example • STI-CA Intermediate/Root Certificate • Issuer: nationalCA1.com • Subject: nationalCA1.com • Basic Constraints: cA = true • CA1 public key • Signature National CA 1 CA intermediate/root cert • Cross-certificate • Issuer: nationalCA1.com • Subject: delegateCA2.com • Basic Constraints: cA = true • Name Constraints: *.delegateCA2.com • CA2 public key • Signature Certificate path Delegate CA 2 cross-certificate (with constraints) Constraints • End-entity certificate • Issuer: delegateCA2.com • Subject: subdomain.delegateCA2.com • CA2 public key • Signature Endpoint end-entity cert
Leveraging cross-certificates for SHAKEN Customer AF case • STI-CA delegates CA responsibilities to TN Provider • STI-CA issues a cross-certificate to TN Provider • TN Provider then uses the cross-certificate to issue STI end-entity certs to its multiple Customer AFs • STI-CA includes constraints in the cross-certificate that limit the scope of end-entity certificates issued by the TN Provider (i.e., place limits on contents of TNAuthList (SPC and TNBlock))
Issuing STI certs to Customer AF using Delegate CA model • STI-CA Root Certificate • Issuer: STI-CA • Subject: STI-CA • STI-CA public key • Signature STI-CA CA intermediate/root cert Issue cross-certificate with constraints (ACME) Certificate path 1 2 TN Provider • Cross-certificate • Issuer: STI-CA • Subject: TN Provider • TNAuthList constraints • TN Provider public key • Signature Delegate CA cross-certificate (with constraints) Issue STI end-entity certificates (ACME) Constraints • STI end-entity Certificate • Issuer: TN Provider • Subject: CAF-3 • TNAuthList • SPC value • Customer AF TNs • Customer AF public key • Signature Customer AF 1 Customer AF 2 Customer AF 3 STI cert 1 STI cert 2 STI cert 3
How are constraints established and enforced? • The STI-PA authorizes constraints per TN Provider; constraints conveyed to STI-CA in SPC Token • STI-CA issues cross-certificate with constraints authorized by STI-PA to TN Provider • TN Provider issues STI end-entity certificates to Customer AFs within scope of constraints • Verification services verify that STI end-entity certificates honor constraints
The complete Customer AF certificate management flow STI-CA STI-PA CA intermediate/root cert Get SPC Token with constraints Order cross-certify cert with constraints (via ACME) 1 3 5 4 2 TN Provider Store issued STI certificate Delegate CA cross-certificate with constraints STI-CR Order STI certificate STI certificate Download cert STI-CR URL Customer AF