90 likes | 179 Views
E-certification: State of the Art & Prospects. Dr. Stephen Kent Co-chair: PKIX WG – IETF VP & Chief Scientist - Information Security BBN Technologies. Digital Signature Uses. Authentication Input to authorization decisions
E N D
E-certification: State of the Art & Prospects Dr. Stephen Kent Co-chair: PKIX WG – IETF VP & Chief Scientist - Information Security BBN Technologies
Digital Signature Uses • Authentication • Input to authorization decisions • Identify attributes need to be aligned to access control requirement • Application specific • Context specific • Non-repudiation • Used for dispute resolution • Needs ancillary functions • Time stamping, archiving, …
Major IETF PKI Standards • PKIX • Certificate & CRL profile • Server-based Certificate Validation Protocol (SCVP) • Online Certificate Status Protocol (OCSP) • Time Stamp Protocols • PKI Certificate Policy & Certification Practice Statements (CP & CPS) • LTANS • Evidence Record Syntax (ERS)
The One Certificate Fallacy • Individuals have multiple identities, each appropriate and meaningful in a different, often limited context • Unless these identities are embedded in certificates, each RP has to map a certificate subject name to the locally meaningful ID for authorization • This mapping requires another “registration” activity, which is what a CA/RA does • Each mapping database represents an opportunity to introduce additional authorization errors • If each relying party has to execute this activity for each user, a single identity certificate doesn’t help
Using a National ID Certificate • Forget the one user one certificate model • Due to authorization problems • For privacy reasons • But, an identity certificate issued by a national authority is valuable • It provides a reference for domain-specific ID certificate issuance, cutting costs • Domain-specific certificates preserve privacy, reduce fallout if a mapping error is made
Ongoing IETF PKI Work • PKIX • Certificate Image • Trust Anchor Management Protocol • LTANS • XML Evidence Record Syntax • SIDR • Resource certificate & CRL profile • Certificate Policy for the Resource PKI • Compound Trust Anchor format
Resource PKI • A global PKI for authorization • Attests to resource (IP address space & autonomous system number) holdings • Regional Internet Registries (RIRs) and ISPs as Certification Authorities • No meaningful IDs in certificates! • RIRs & IANA have agreed to acts as CAs • Cisco & Juniper have (lab) code for 1st stage deployment
RPKI Example IANA ARIN APNIC RIPE AfriINIC LACNIC Unallocated addresses Reserved addresses ISPX ISPY ISPZ SUBL SUBL SUBK SUBL