PKI Architecture for VISIONng Proposal by A-TrustA



Similar documents
TELSTRA RSS CA Subscriber Agreement (SA)

Certification Practice Statement

APPLICATION FOR DIGITAL CERTIFICATE

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

Microsoft vs. Red Hat. A Comparison of PKI Vendors

HKUST CA. Certification Practice Statement

Incorporating Digital Signing & Encryption in Transactions in the Payment System of Sri Lanka

Equens Certificate Policy

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Ford Motor Company CA Certification Practice Statement

CERTIMETIERSARTISANAT and ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS

Certification Practice Statement

StartCom Certification Authority

esign Online Digital Signature Service

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

The Estonian ID Card and Digital Signature Concept

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

TeliaSonera Server Certificate Policy and Certification Practice Statement

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Department of Defense PKI Use Case/Experiences

An introduction to EJBCA and SignServer

Government CA Government AA. Certification Practice Statement

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

CERTIFICATION PRACTICE STATEMENT (CPS) SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. Version 2.0

PKI NBP Certification Policy for ESCB Signature Certificates. OID: version 1.5

- X.509 PKI SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1

Ericsson Group Certificate Value Statement

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1

Visa Public Key Infrastructure Certificate Policy (CP)

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Public Key Infrastructure for a Higher Education Environment

Citizen CA Certification Practice statement

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

How To Understand And Understand The Security Of A Key Infrastructure

Comodo Certification Practice Statement

Certificate Policy for. SSL Client & S/MIME Certificates

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: version 1.2

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Business Issues in the implementation of Digital signatures

Trustis FPS PKI Glossary of Terms

What Are They, and What Are They Doing in My Browser?

CERTIFICATION PRACTICE STATEMENT UPDATE

The Costs of Managed PKI:

Neutralus Certification Practices Statement

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

KIBS Certification Practice Statement for non-qualified Certificates

Concept of Electronic Approvals

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

Land Registry. Version /09/2009. Certificate Policy

Peer to Peer Settlement for Next Generation IP Networks Using the ETSI OSP Protocol (ETSI TS ) for Cascading Peering Settlements

Egyptian Best Practices Securing E-Services

Comodo Certification Practice Statement

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Getronics Certification Certificate of Authentic Trustworthy

TC TrustCenter GmbH Certification Practice Statement and Certificate Policy for Qualified Certificates

Secure Data Exchange Solution

How to Configure Certificate Based Authentication for WorxMail and XenMobile 10

BUYPASS CLASS 3 SSL CERTIFICATES Effective date:

Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory

User Manual Internet Access. for the public key. certification service

Vodafone Group CA Web Server Certificate Policy

No additional requirements to use the PIV I card for physical facility access have been identified.

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

CERTIFICATE POLICIES (CP) Legal Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP

Danske Bank Group Certificate Policy

SSL Certificates Enrollment, Collection, Installation and Renewal Release Date: May, 2015

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Configuring Digital Certificates

Optimized Certificates A New Proposal for Efficient Electronic Document Signature Validation

How To Issue A Certificate On A Cablelabs Device (Cablelabs) To A Certificate Request Agent (Cra)

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

X.509 Certificate Policy for India PKI

Service Description. 3SKey. Connectivity

TeliaSonera Root CA v1 Certificate Practice Statement. Published by: TeliaSonera AB

Class 3 Registration Authority Charter

TR-GRID CERTIFICATION AUTHORITY

Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS)

Qatar Ministry of Interior - Public Key Infrastructure Certificate Policy

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

X.509 Certificate Revisited

ENROLMENT GUIDE FOR MCACert

Swiss Government Root CA II. Document OID:

ING Public Key Infrastructure Technical Certificate Policy

Transcription:

PKI Architecture for VISIONng Proposal by A-TrustA October 2001 Stephan Grill grill@a-trust.at

Overview Objective Products and Services of A-Trust Requirements Description of the PKI Architecture Certificates Processes Certificate Policy Next Steps

Objective This presentation describes the integration of a PKI proposed by A-Trust to support the VoIP pilot of the VISIONng working group The proposal aims to provide a fairly simple solution for the pilot phase which can be generalized for the production phase The proposal is intended as a basis for discussion The proposal is based on limited information gathered in a 2-hour meeting on 2001/10/11

A-Trust Products trust sign : Qualified certificate compliant with the Austrian signature law (SigG) and ordinance (SigVO), and the European directive for signatures (article 5 (1)). trust mark token : Certificate based on secure technological components. Compliant with the european directive (article 5 (2)). rust mark vsc : rust mark webserver : rust mark s-box : rust mark developer : rust mark VoIP : rust mark attributes : User certificate based on virtual smart cards Webserver certificate Certificate for an HSM Developer certificate Certificate for the use of VoIP clients Attribute certificate rust client : End user software for the use of certificates and the signatures

A-Trust Services egistration Service: evocation Service: irectory Service: CSP Service : A Housing: Service for identifying users that request a certificate Service for subscribes to suspend or revoke a certificate Service to locate certificates and CRLs Service to query a certificate status online Service to manage a CA for other organizations

Requirements Ease of Use VoIP telephony should be as easy and comfortable as current telephony technology Central Point of Contact The VoIP operator should be the central point of contact for the customer: Acts as registration authority on behalf of the Trust Service Providers (TSP) Performs billing for the certificates

Security Requirements (1) Signaling Connections AD-BES Gatekeeper AD-BES Gatekeeper VoIP Client VoIP provider 1 VoIP Client VoIP provider 2 Secure connections in phase 1 Secure connections in later phases

Security Requirements (2) Secured Processes Secure registration of the VoIP client to the gatekeeper (phase 1) Secure communication between gatekeepers (phase 2) Secure subscription of VoIP services at the provider (phase 2) 2-way Authentication Client should be able to verify the identity of the gatekeeper (GK) GK must verify the identiy of the VoIP client Confidential Communication Communication must be confidential Media stream between VoIP clients is not secured using the PKI

Security Requirements (3) Relationship between VoIP Provider and TSP All connections within the domain of one VoIP provider are secured by certificates of only one TSP Each VoIP provider selects only one TSP to issue VoIP certificates for its customers Each VoIP domain corresponds exactly to one PKI domain Each VoIP provider may use any TSP as long as the certificates match the policy and format requirements of VISIONng

Security Requirements (4) Phase 1 Only connections within a domain are secured Only one root-certificate needs to be managed by the software Phase 2 Connections between different domains are secured as well Certificates of multiple TSPs need to be managed by the software

Proposed Architecture Two User Certificates VoIP certificate that supports ease of use (phase 1) E-Commerce certificate that supports high security (phase 2) Server Certificate (phase 1) For authenticating the GK VISIONng root certificate (phase 2) when inter-domain connections must be secured using multiple PKI domains.

VoIP Certificate (Phase 1) Supports ease of use - PIN entry is optional Used for registering at the GK Is a soft token certificate Can be moved between different PCs (optional): different PCs at work, home, friend, etc. Information contained in the certificate Same as in trust mark VSC Authentication information for VoIP provider (optional) UPT number

E-Commerce Certificate (Phase 2) Supports high security Used for changing subscription information at the provider Can be used for general E-Commerce applications PIN entry is mandatory Smart card certificate (optional) Information contained in the certificate A-Trust proposes the trust mark token certificate

Additional Certificates Server Certificate (Phase 1) used for authenticating the GK Information contained in the certificate A-Trust proposes the trust mark webserver certificate VISIONng root certificate (Phase 2) Used to sign the root certificates of individual PKI domains Accepted by all involved VoIP providers and subscribers

Description of Processes Client Subscription 1) User contacts VoIP provider to subscribe for VoIP services 2) VoIP provider Collects VoIP subscription information Acts as Registration Authority for the TSP Verifies required identity information for the VoIP certificate Requests keys and certificate from the TSP Updates required user information in the AD-BES Mails pkcs12 file with VoIP keys and certificate to user 3) User downloads/installs the VoIP client software + trust client root certificate already pre-installed 4) User installs VoIP certificate Process needs to be refined depending on: whether user does already have an E-Commerce certificate VoIP provider wants to act as Registration Authority

Description of Processes Certificates for Gatekeeper 1) GK generates a key pair 2) GK operator submits a server certificate request to TSP 3) TSP returns the certificate 4) GK operator installs the certificate

Description of Processes Certificate Lifetime VoIP Certificate The VoIP operator revokes the certificate when the user cancels the subscription The VoIP operator renews the certificate when the certificate expires before the subscription The user revokes the certificate when misuse of the private key is assumed E-Commerce Certificate Comparable with any other personal identiy certificate

Description of Processes Certificate Status Checking VoIP clients and GKs must check the status of certificates This can be done using CRLs or OCSP A-Trust currently provides both services

Certificate Policy VoIP Certificate A dedicated policy has to be defined VoIP certificates may only be used for VoIP applications Gatekeeper Certificate A dedicated policy has to be defined

Open Questions Relationship between VoIP provider and TSPs Does a VoIP provider work exclusively with only one TSP, i.e. All VoIP certificates of one VoIP provider are issued by the same TSP? Do all VoIP provider act as registration authority of a TSP? Relationship between VoIP vendors and subscribers Subscriber authenticate always to GKs of their VoIP providers; GKs service only requests of their subscribers The list of trusted root certificates does not change Relationship between different VoIP providers Is the VoIP certificate bound uniquely to a VoIP provider? Then it cannot be used for the services of a different VoIP provider. Moving VoIP certificates How should the VoIP certificates be moved to different VoIP clients (just the PKCS12 file, including the trusted root certificate, as part of a comprehensive user profile,...?)

Next Steps Refine proposed architecture Overall processes PKI related SW architecture for VoIP client & Gatekeeper Develop specifications related to VoIP certificates Certificate format Registration/revocation process Certificate policy Technical integration of certificates Investigation of the integration of existing VoIP products with A-Trust standard certificates