File: rfc1875.txt

package info (click to toggle)
doc-rfc 20170121-1
  • links: PTS, VCS
  • area: non-free
  • in suites: stretch
  • size: 541,932 kB
  • ctags: 32
  • sloc: xml: 267,963; sh: 101; python: 90; perl: 42; makefile: 13
file content (563 lines) | stat: -rw-r--r-- 19,089 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563






Network Working Group                                           N. Berge
Request for Comments: 1875                    Norwegian Computing Center
Category: Informational                                    December 1995


                     UNINETT PCA Policy Statements

Status of this Memo

   This memo provides information for the Internet community.  This memo
   does not specify an Internet standard of any kind.  Distribution of
   this memo is unlimited.

Table of Contents

   1.   Introduction.......................................2
   2.   PCA Identity.......................................2
   3.   UNINETT - a brief overview.........................2
   4.   PCA Scope..........................................2
   4.1  The certification tree.............................3
   4.2  Use of Registration Authorities (RAs)..............3
   5.   PCA Security & Privacy.............................3
   5.1  Security requirements imposed on the PCA...........3
   5.2  Security requirements imposed on CAs...............4
   5.3  Security requirements imposed on RAs...............4
   5.4  Measures taken to protect the privacy of any
        information collected in the course of certifying
        CAs and (for CAs) users............................4
   6.   Certification Policy...............................5
   6.1  Policy and procedures when certifying CAs..........5
   6.2  Policy and procedures when certifying RAs..........5
   6.3  Policy and procedures when certifying users........5
   6.4  Validity interval for issued certificates..........6
   6.5  The CAs right to a DN and procedures to resolve DN
        conflicts..........................................6
   6.6  The users right to a DN and procedures to resolve
        DN conflicts.......................................6
   7.   Certificate Management.............................7
   8.   CRL Management.....................................7
   9.   Naming Conventions.................................8
   10.  Business Issues....................................9
   10.1 Legal agreement concerning CAs.....................9
   10.2 Legal agreement concerning RAs.....................9
   10.3 Fees...............................................9
   11.  Other..............................................9
   11.1 Distribution of software needed by CAs, RAs and
        users..............................................9
   12.  Security Considerations............................9



Berge                        Informational                      [Page 1]

RFC 1875             UNINETT PCA Policy Statements         December 1995


   13.  References........................................10
   14.  Author's Address..................................10

1. Introduction

   This document provides information about policy statements submitted
   by the UNINETT Policy Certification Authority (UNINETT PCA).

   It's purpose is to provide information to members of the Internet
   community who wish to evaluate the trust they can place in a
   certification path that includes a certificate issued by the UNINETT
   PCA, or to set up a CA to be certified by the UNINETT PCA.

2. PCA Identity

   Distinguished Name (DN): C=no, O=uninett, OU=pca

   The UNINETT PCA will be run by:
   Norwegian Computing Center
   Gaustadallien 23
   P.O.Box 114 Blindern,
   N-0314 Oslo, Norway

   Contact person:
   Nils Harald Berge
   Email: Nils.Harald.Berge@nr.no
   Tel.: (+47) 22 85 25 00
   Fax : (+47) 22 69 76 60

   Duration: This policy is valid from Oct 1, 1995 to Jan 1, 1998

   Info about this PCA is available at: http://www.uninett.no/pca/

3. UNINETT - a brief overview

   UNINETT is a Limited Company (AS) operating the Norwegian network for
   academics and research. It is incorporated under Norwegian law, and
   it's company number is 968100211.

   More information is available from the UNINETT web server at:
   http://www.uninett.no/

4. PCA Scope

   The scope of the UNINETT PCA is determined by UNINETT Policy. It will
   chiefly certify CAs to run on behalf of legal entities such as
   schools and companies.




Berge                        Informational                      [Page 2]

RFC 1875             UNINETT PCA Policy Statements         December 1995


4.1 The certification tree

   The certification tree beneath the UNINETT PCA comprise three
   distinct entities: Certification Authorities (CAs), Registration
   Authorities (RAs) and users. CAs are described in the PEM documents
   [1,2,3,4]. An explanation of RAs is given bellow.

   There will be one CA, with possible sublevel CAs, per UNINETT member
   organization. The CA may be run by the organization itself, or by the
   organization running the PCA for organizations who do not want to
   take on the responsibility themselves.

4.2 Use of Registration Authorities (RAs)

   Since the CA may be located far away from the users, local
   authorities are needed for physical identification/authentication of
   users. For security reasons, and to avoid an unnecessary large number
   of CAs, these authorities are not allowed to issue certificates.

   A registration authority (RA) is an ordinary user, appointed by an
   organization or an organizational unit and trusted by a CA, serving
   as a point of contact for persons who want to register as users, i.e.
   to have a certificate issued. In order to avoid faked requests for
   certification, users must send their self-signed certificate to an
   appropriate RA, and then physically visit the RA with proof of
   identity. The RA will forward the self-signed certificate to the CA
   in a message signed by the RA, if the user is properly authenticated.

   For bulk certification (see 5.3) the RA must physically verify the
   identity of the user before giving out the password for access to the
   users private key.

   A CA may appoint as many RAs as it wish. The only difference between
   certifying an RA and an ordinary user is that the RA (a person) must
   sign an agreement with the certifying CA, stating the obligation to
   adhere to the agreed procedures.

5. PCA Security & Privacy

5.1 Security requirements imposed on the PCA

   - The PCA will have its private key stored on a smartcard.

   - The PCA will be run on a dedicated workstation with no network
     connection. The workstation will be physically secured.

   - Exchanging data between the PCA workstation and the rest of the
     world will be done by using tapes or floppy discs.



Berge                        Informational                      [Page 3]

RFC 1875             UNINETT PCA Policy Statements         December 1995


   - The PCA RSA key pair will have a length of 1024 bits.

   - Backups from the PCA workstation must be stored in at least one off
     site location. Backups must be physically secured

5.2 Security requirements imposed on CAs that are to be certified

   - A CA must be run on a dedicated workstation with no network
     connection. The workstation must be physically secured.

   - Exchanging data between the CA workstation and the rest of the world
     must be done by using tapes or floppy discs.

   - The CA RSA key pair must have a minimum length of 1024 bits.

   A security requirements document concerning CAs will be made
   available online, and expected to be obeyed.

5.3 Security requirements imposed on RAs that are to be certified

   - RAs must use a work station, with remote login disabled. Use of
     X-terminal, terminal emulator etc. with processes running on a
     remote machine is strictly prohibited.

   - The RA RSA key pair must have a minimum length of 512 bits.

   A security requirements document concerning RAs will be made
   available online, and expected to be obeyed.

5.4 Measures taken to protect the privacy of any information collected
    in the course of certifying CAs and (for CAs) users.

   CAs will not collect any security relevant information about users.
   In those cases when CAs generate keys (and certificates) on behalf of
   users, all information pertaining the users private key will be
   securely deleted after it has been received by the user.  CAs will
   always generate their own key pairs, thus no security relevant
   information will be collected by the PCA.

   All archived material concerning DNs for users will be stored on the
   CA workstations, which are physically protected and does not have any
   network connections.









Berge                        Informational                      [Page 4]

RFC 1875             UNINETT PCA Policy Statements         December 1995


6. Certification Policy

6.1 Policy and procedures when certifying CAs

   In order to be certified, a CA must sign an agreement with the
   UNINETT PCA stating the obligation to adhere to the agreed
   procedures.

   The persons responsible for running the CA will be evaluated by the
   UNINETT PCA, in order to determine whether they exhibit the necessary
   qualifications and have access to the resources needed in order to
   run the CA securely.

   The CA must submit its self signed certificate to the UNINETT PCA.

6.2 Policy and procedures when certifying RAs

   The organization or organizational unit is responsible for appointing
   RA persons, typically 1-3 persons per organization/unit. The person
   representing the RA must sign an agreement with the certifying CA,
   stating the obligation to adhere to the agreed procedures in order to
   be certified.

   The person representing the RA will be evaluated by the certifying
   CA, in order to determine whether he/she exhibits the necessary
   qualifications and has access to the resources needed to run the RA
   securely.

   The RA must submit its self signed certificate to the certifying CA.
   In the absence of RAs, or equivalent, the validity of the
   certification request (i.e. the identity of the requestor) must be
   verified by "out of band" means. These means will vary from case to
   case, depending on physical distance, prior knowledge etc.

6.3 Policy and procedures when certifying users

   There are two ways in which a user can be certified:

   - individual certification, or
   - bulk certification

   When applying individual certification, a user will generate his own
   key pair, and his own self-signed certificate. The certification
   procedure follows the PEM documents [1,2,3,4], with the exception
   that the certification request will be sent to an RA. The user must
   then visit the RA with proof of identity





Berge                        Informational                      [Page 5]

RFC 1875             UNINETT PCA Policy Statements         December 1995


   Bulk certification of users will typically be done when it is
   desirable to certify many users belonging to the same organization.
   An example could be the certification of students at the beginning of
   a semester, or initial certification of all employees belonging to a
   company. When bulk certifying users, the CA will generate the users'
   key pairs and certificates. A user's key pair together with the
   certificate will be DES-encrypted and sent electronically to the
   user.  The pass phrase to generate the DES-key can be collected at
   the local RA, given proof of identity. The pass phrase can also be
   sent by certified surface mail.

   When bulk certifying users the CA or RA shall not access or store any
   of the users' private information.

   A person's identity is verified by:

   - driver's licence
   - passport
   - bank card (Norwegian)

   CA and RA need not be separate entities. A CA may verify the identity
   of users directly, following the procedures described above.

6.4 Validity interval for issued certificates

   Validity interval for user and RA certificates is maximum 2 years
   from date of issue.

   There is in principle no special requirements regarding validity
   intervals for CA certificates, though it is recommended not to issue
   certificates for more than a 10 year period.

6.5 The CAs right to a DN and procedures to resolve DN conflicts

   CAs will preferably use DNs reflecting the organizational scope under
   which they certify users (see also "Naming conventions"). The
   certifying entity must ensure, with the aid of X.500 as
   disambiguation tool, the uniqueness of a DN.

6.6 The user's right to a DN and procedures to resolve DN conflicts

   It is the certifying CA who will determine a user's DN and ensure,
   with the aid of X.500 as disambiguation tool, the uniqueness of a DN.
   Users will preferably use DNs reflecting the organization to which
   they belong, and their full name (see also "Naming conventions").






Berge                        Informational                      [Page 6]

RFC 1875             UNINETT PCA Policy Statements         December 1995


7. Certificate management

   UNINETTs X.500 service will be used when storing certificates
   belonging to users within UNINETT member organizations. Other users
   may also use the X.500 service if available. All certificates issued
   will be maintained in a local database by the certifying entity in
   addition to the X.500 directory. If a CA does not have access to the
   X.500 service, all issued certificates must be mailed to the UNINETT
   PCA who will make the X.500 entries on behalf of the CA.

   Certificates can be requested in two ways, either directly from the
   X.500 directory, or by querying a mail-responder service maintained
   by the UNINETT PCA.

   Details on how certificates are mailed, and how to use the mail-
   responder service can be found at the following WWW site:
   http://www.uninett.no/pca/

8. CRL Management

   Certificate Revocation Lists (CRLs) must be issued at least once a
   month, on a specified date, by CAs. The UNINETT X.500 service will be
   used to publish CRLs. If a CA does not have access to the X.500
   service the CRL must be mailed to the UNINETT PCA who will make the
   X.500 entries on behalf of the CA.

   CRLs can be requested in two ways, either directly from the X.500
   directory, or by querying a mail-responder service maintained by the
   UNINETT PCA.

   Details on how CRLs are mailed, and how to use the mail-responder
   service can be found at the following WWW site:

   http://www.uninett.no/pca/

   The UNINETT PCA will continually update the CRL with revoked CA
   certificates.

   There is no automatic distribution service of CRLs. Therefore users
   will have to pull CRLs from the X.500 or the mail-responder. Black
   lists are currently not supported. Appropriate news groups and
   information services will be used to announce the issuance of new
   CRLs.








Berge                        Informational                      [Page 7]

RFC 1875             UNINETT PCA Policy Statements         December 1995


9. Naming Conventions

   Naming conventions for CAs:

   CAs' DNs will follow the conventions adopted by their organization.
   Organizations who do not have any preferences in this matter should
   use the following scheme:

   C=<country>, O=<organization> [, OU=<organizational-unit>]

   Country is the country code, e.g. all Norwegian organizations have
   C=no. Organization is the organization represented by the CA (e.g.
   the scope for which the CA certify users). Organizational-unit is
   optional, reflecting a unit within a large organization for cases in
   which the organization has more than one CA. Example: the CA
   responsible for certifying UNINETT employees will be assigned the
   following DN: C=no, O=uninett

   Naming conventions for users:

   Users' DNs will follow the conventions adopted by their organization.
   Organizations who do not have any preferences in this matter should
   use the following scheme:

   C=<country>, O=<organization>, [OU=<organizational-unit>,]
   CN=<personal name>

   Personal name will be a unique name for the user with respect to the
   organization to which the user belongs. An organization's CA is
   responsible for ensuring that all certified users have a distinct
   personal name. Usually personal name will be the user's full name.
   Use of OU is optional. Example if Per Olsen is an employee of UNINETT
   he will be assigned the following DN: C=no, O=uninett, CN=Per Olsen.

   The choice of which users to certify as belonging to the organization
   is made by the CA, not by the PCA.















Berge                        Informational                      [Page 8]

RFC 1875             UNINETT PCA Policy Statements         December 1995


10. Business Issues

10.1 Legal agreements concerning CAs

   If a CA wishes to be certified by the UNINETT PCA, the CA will have
   to sign a legal agreement with the UNINETT PCA. The legal agreement
   can be obtained by contacting the UNINETT PCA.

10.2 Legal agreements concerning RAs

   If an RA wishes to be certified by a CA, a person representing the RA
   will have to sign a legal agreement with the CA. The legal agreement
   can be obtained from the appropriate CA, or directly from the UNINETT
   PCA. Each CA will locally decide whether the RA is to be certified.

10.3 Fees

   The UNINETT PCA reserves the right to charge fees. The fee structure
   will be determined by UNINETT policy.

11. Other

11.1 Distribution of software needed by CAs, RAs and users

   The software needed is based on the SecuDE-package from GMD
   Darmstadt, and is available without fee for non-commercial purposes.
   All software distributions should include a signature from the
   UNINETT PCA to verify its integrity. Users, CAs, and RAs are expected
   to verify such signatures immediately after installation.

12. Security Considerations

   Security issues are discussed throughout this memo.


















Berge                        Informational                      [Page 9]

RFC 1875             UNINETT PCA Policy Statements         December 1995


13. References

   [1] Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part
       I: Message Encryption and Authentication Procedures", RFC 1421,
       IAB IRTF PSRG, IETF PEM WG, February 1993.

   [2] Kent, S., "Privacy Enhancement for Internet Electronic Mail: Part
       II: Certificate-Based Key Management", RFC 1422, IAB IRTF PSRG,
       IETF PEM, BBN, February 1993.

   [3] Balenson, D., "Privacy Enhancement for Internet Electronic Mail:
       Part III: Algorithms, Modes, and Identifiers", RFC 1423, IAB IRTF
       PSRG, IETF PEM WG, TIS, February 1993.

   [4] Kaliski, B., "Privacy Enhancement for Internet Electronic Mail:
       Part IV: Key Certification and Related Services", RFC 1424, RSA
       Laboratories, February 1993.

14. Author's Address

   Nils Harald Berge
   Norwegian Computing Center
   Gaustadallien 23
   P.O.Box 114 Blindern,
   N-0314 Oslo, Norway

   Phone: (+47) 22 85 25 00
   Fax : (+47) 22 69 76 60
   EMail: Nils.Harald.Berge@nr.no






















Berge                        Informational                     [Page 10]