Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)



Similar documents
Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

Federal PKI. Trust Infrastructure. Overview V1.0. September 21, 2015 FINAL

NIST Test Personal Identity Verification (PIV) Cards

Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Driving Safely on Information Highway. April 2006

FICC Shared Service Provider (SSP) Industry Day, 3/11. Questions and Answers

Integration of Access Security with Cloud- Based Credentialing Services

FBCA Cross-Certificate Remover 1.12 User Guide

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24

Federal Identity, Credentialing, and Access Management. Personal Identity Verification Interoperable (PIV-I) Test Plan. Version 1.1.

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Operational Research Consultants, Inc. Non Federal Issuer. Certificate Policy. Version 1.0.1

Department of Defense SHA-256 Migration Overview

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.03 May 3, 2011

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

Microsoft Trusted Root Certificate: Program Requirements

Identity, Credential, and Access Management. Open Solutions for Open Government

Department of Defense PKI Use Case/Experiences

Cross-Certification and PKI Policy Networking

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Bugzilla ID: Bugzilla Summary:

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004

Practical Challenges in Adopting PIV/PIV-I

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC

DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0

GSA FIPS 201 Evaluation Program

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

An Operational Architecture for Federated Identity Management

RAPIDPIV-I Credential Service Certification Practice Statement Redacted

State of PKI for SSL/TLS

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

Certification Practice Statement

DEPARTMENTAL REGULATION

X.509 Certification Practices Statement for the U.S. Government Printing Office Principal Certification Authority (GPO-PCA)

Department of Defense External Interoperability Plan Version 1.0

CERTIFICATION PRACTICE STATEMENT UPDATE

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Federal Public Key Infrastructure (FPKI) Compliance Audit Requirements

NIST ITL July 2012 CA Compromise

U.S. Department of Energy Washington, D.C.

NSTIC National Program Office Discussion Draft STANDARDS CATALOG

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

For Official Use Only (FOUO)

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Architecture for Issuing DoD Mobile Derived Credentials. David A. Sowers. Master of Science In Computer Engineering

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

More on SHA-1 deprecation:

Innovations in Digital Signature. Rethinking Digital Signatures

Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.

Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities

No additional requirements to use the PIV I card for physical facility access have been identified.

SIGNIFICANT CHANGES DOCUMENT

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Security and Security Certificates for OpenADR systems. Background. Content:

Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Identity, Credential, and Access Management

CA-DAY Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft

Entrust Managed Services Non-Federal Public Key Infrastructure X.509 Certificate Policy

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

DoD Root Certificate Chaining Problem

SSL BEST PRACTICES OVERVIEW

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

Cisco Trust Anchor Technologies

ETSI TR V1.1.1 ( )

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Public Key Infrastructure (PKI) Technical Troubleshooting Guide

Required changes to Table 6 2 in FIPS 201

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

DIMACS Security & Cryptography Crash Course, Day 2 Public Key Infrastructure (PKI)

Axway Validation Authority Suite

PKI NBP Certification Policy for ESCB Signature Certificates. OID: version 1.5

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Airbus Group Public Key Infrastructure. Certificate Policy. Version 4.6

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: version 1.2

Public Key Infrastructure (PKI)

Concept of Electronic Approvals

Future directions of the AusCERT Certificate Service

Transcription:

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011

Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE... 3 2. FREQUENTLY ASKED QUESTIONS... 3 2.1 WHAT IS THE SHA-256 TRANSITION?... 3 2.2 WHY IS THE FEDERAL PKI TRANSITIONING TO AN INFRASTRUCTURE THAT USES SHA-256 HASHES NOW?.. 3 2.3 WHAT EFFECT WILL THE SHA-256 TRANSITION HAVE ON FEDERAL AGENCIES?... 3 2.4 HOW DO I KNOW MY AGENCY IS READY FOR THE SHA-256 TRANSITION?... 4 2.5 HOW SHOULD AGENCIES PREPARE FOR THE SHA-256 TRANSITION?... 4 2.6 WHAT SHOULD A FEDERAL AGENCY DO THAT IS NOT YET READY TO TRANSITION TO SHA-256?... 4 2.7 FOR FEDERAL BRIDGE CERTIFICATION AUTHORITY (FBCA) CROSS CERTIFIED ENTITIES, HOW WILL THE TRANSITION TO SHA-256 AFFECT MY RELATIONSHIP WITH THE FEDERAL BRIDGE?... 4 2.8 FOR PKI SSPS, HOW WILL THE TRANSITION TO SHA-256 AFFECT MY RELATIONSHIP WITH THE COMMON POLICY ROOT?... 5 2.9 CAN PIV OR PIV INTEROPERABILITY (PIV-I) CARDS BE ISSUED WITH SHA-1 AFTER DECEMBER 31, 2010?5 2.10 FOR LEGACY FEDERAL AGENCIES TRANSFERRING THEIR CROSS CERTIFICATION FROM THE FBCA TO COMMON, WHAT DOES THIS MEAN IN TERMS OF THE TRANSITION TO SHA-256?... 5 2.11 CAN LEGACY FEDERAL AGENCIES TRANSFERRING THE CROSS CERTIFICATION FROM THE FBCA TO COMMON RETAIN THEIR LOWER (I.E., BASIC AND RUDIMENTARY) ASSURANCE LEVEL OIDS SINCE THERE ARE NO EQUIVALENT COMMON POLICY ASSURANCE LEVELS?... 5 2.12 DO PIV CARDS PREVIOUSLY ISSUED WITH SHA-1 CERTIFICATES NEED TO BE REISSUED; AND IF SO, BY WHAT TIMELINE?... 5 2.13 WHEN DO THE CURRENT FBCA AND COMMON CA ROOT SHUT DOWN AND WHAT WILL BE THE IMPACT TO ME? 5 2.14 BY WHEN MUST I TRANSITION COMPLETELY TO SHA-256?... 5 2.15 WHAT HAPPENS IF I CANNOT TRANSITION TO SHA-256 BY DECEMBER 31, 2013?... 5 2.16 DO END-ENTITY CERTIFICATES ISSUED WITH SHA-1 HAVE TO EXPIRE BY DECEMBER 31, 2013, OR WILL THEY REMAIN VALID FOR A FULL THREE-YEAR PERIOD FROM THE TIME OF ISSUANCE?... 6 2.17 WHAT IS THE FPKIPA, NIST, AND OMB GOING TO DO TO ENSURE THAT VENDORS HAVE COMPLIANT PRODUCTS AVAILABLE?... 6 2.18 DO I NEED A NEW MAPPING TO GET A SHA-1 FRCA CERTIFICATE?... 6 DETAILED TECHNICAL QUESTIONS... 6 VALIDATION:... 6 2.19 HOW DOES THIS TRANSITION AFFECT CERTIFICATE VALIDATION OF SHA-1 CERTIFICATES USING S?... 6 2.20 HOW DOES THIS TRANSITION AFFECT CERTIFICATE VALIDATION OF SHA-1 CERTIFICATES USING ONLINE CERTIFICATE STATUS PROTOCOL (OCSP)?... 6 2.21 IF I HAVE APPLICATIONS THAT WILL BE UNABLE TO VALIDATE SHA-256 CERTIFICATES, HOW DO I ACCOMMODATE AUTHENTICATION OF USERS WHO HAVE BEEN ISSUED SHA-256 CERTIFICATES BY THEIR AGENCY OR PIV-I VENDOR?... 6 2.22 WILL I STILL BE ABLE TO VALIDATE CERTIFICATES THAT CHAIN BACK TO THE OLD FEDERAL PKI INFRASTRUCTURE AFTER IT IS SHUT DOWN ON MARCH 31, 2011?... 7 SIGNING:... 7 2.23 HOW LONG CAN S AND OCSP RESPONSES BE SIGNED WITH SHA-1?... 7 2.24 ARE THERE SPECIAL SECURITY REQUIREMENTS FOR SIGNING OCSP RESPONSES WITH SHA-1?... 7 CROSS-CERTIFICATES... 7 2.25 WHAT DOES THE NEW FEDERAL PKI ARCHITECTURE LOOK LIKE?... 7 2.26 HOW DO I GET A SHA-256 CROSS-CERTIFICATE IF I AM CURRENTLY CROSS CERTIFIED WITH THE FBCA OR COMMON POLICY CA?... 10 2.27 WHAT DO I NEED TO DO TO GET A CROSS-CERTIFICATE FROM THE SHA-1 FRCA?... 10 2.28 WHAT IS THE SIA TO INCLUDE WHEN I ISSUE A NEW CROSS-CERTIFICATE TO THE NEW FBCA?... 10 1

2.29 WHAT IS THE SIA TO INCLUDE WHEN I ISSUE A NEW CROSS-CERTIFICATE TO THE NEW FEDERAL COMMON POLICY CA?... 10 2.30 WHAT IS THE SIA TO INCLUDE WHEN I ISSUE A CROSS CERTIFICATE TO THE NEW SHA-1 FRCA?... 10 2.31 WHAT IS THE DN FOR THE NEW FBCA?... 10 2.32 WHAT IS THE DN FOR THE NEW FEDERAL COMMON POLICY CA?... 10 2.33 WHAT IS THE DN FOR THE NEW SHA-1 FRCA?... 10 2.34 WILL MY CURRENT CROSS-CERTIFICATE BE REVOKED WHEN I RECEIVE MY NEW CROSS-CERTIFICATE?... 11 2.35 HOW ARE CERTIFICATE POLICIES MAPPED IN THE NEW ENVIRONMENT?... 11 TRUST STORES (ROOT CERTIFICATE DISTRIBUTION)... 11 2.36 WHEN WILL THE CURRENT COMMON POLICY ROOT CERTIFICATE BE REMOVED FROM THE MICROSOFT TRUST LIST?... 11 2.37 WHEN WILL THE NEW FEDERAL COMMON POLICY CERTIFICATE BE IN THE MICROSOFT TRUST LIST?... 11 2.38 WHAT VENDORS WILL BE DISTRIBUTING THE FEDERAL COMMON POLICY CERTIFICATE?... 11 2.39 WHEN DO I NEED TO HAVE THE NEW FEDERAL COMMON POLICY CERTIFICATE DISTRIBUTED TO MY USERS? 11 2.40 WILL THE NEW FBCA CERTIFICATE BE INSTALLED IN VENDOR TRUST LISTS, AND IF SO, BY WHEN?... 11 2.41 DOES THE DISPLAYED THUMBPRINT OF THE CERTIFICATE HAVE TO BE SHA-256?... 12 2.42 DO THE BIOMETRIC CONTAINERS ON A PIV OR PIV-I CARD HAVE TO BE SIGNED WITH SHA-256?... 12 REFERENCES... 12 2.43 WHAT AUTHORITATIVE DOCUMENTS SHOULD I READ TO SUCCESSFULLY ACCOMPLISH THE TRANSITION TO SHA-256?... 12 2

1. INTRODUCTION 1.1 Background The Federal government requires the use of SHA-256 in all digital signatures generated by CAs signing Personal Identity Verification (PIV) Cards, beginning on January 1, 2011. While the Federal government allows some limited use of SHA-1 in a deprecated mode, use in the PIV environment is not permitted after January 1, 2011. Therefore, the FPKI Community is currently transitioning its infrastructures to the stronger algorithm and will continue to do so over the next several months. The risk of continued use of SHA-1 is significant. In addition, 80-bit security strength for cryptography does not provide an acceptable level of protection. These risks increase the urgency for transition. There is no value in further delay. 1.2 Objective and Audience The objective of this document is to answer the most frequently asked questions regarding the FPKI community s transition to SHA-256. When there is a conflict, the authoritative documents listed in Section 2.43, References, should be relied upon. 2. FREQUENTLY ASKED QUESTIONS 2.1 What is the SHA-256 Transition? The FPKI Community is moving to a stronger hash algorithm to comply with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-57 and NIST SP 800-78 requirements, and to improve the security posture of systems deployed in the FPKI Community. 2.2 Why is the Federal PKI transitioning to an infrastructure that uses SHA-256 hashes now? NIST SP 800-78, Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV) and the Federal PKI Certificate Policies require the use of SHA-256 in all digital signatures generated by CAs signing PIV Cards, beginning on January 1, 2011. NIST SP 800-57, Recommendation for Key Management Part 1, also requires the use of SHA-256 in all digital signatures generated, beginning on January 1, 2011. While NIST SP 800-131, Draft Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes, allows some limited use of SHA-1 in a deprecated mode, use in the PIV environment is not permitted after January 1, 2011. Therefore, the FPKI Community is currently transitioning its infrastructures to the stronger algorithm and will continue to do so over the next several months. The risk of continued use of SHA-1, based on Moore s Law and [Wang 2005] attack is significant. In addition, 80-bit security strength for cryptography does not provide an acceptable level of protection. Moore s law and attacks on the algorithm increase the urgency for transition. There is no value in further delay. 2.3 What effect will the SHA-256 Transition have on Federal Agencies? All PIV credentials issued on or after January 1, 2011 will contain digital certificates (PIV Authentication, Card Authentication, Digital Signature and Key Management) signed using SHA- 256, and all certificate status information will be signed using SHA-256. Without appropriate attention, this transition to SHA-256 may be problematic for applications within your Agency or Organization that utilize digital credentials, including those applications currently being enabled to accept PIV credentials. 3

2.4 How do I know my agency is ready for the SHA-256 Transition? Agencies that are ready for the SHA-256 transition have verified that applications can perform the following functions: 1. Accept SHA-256 certificates; 2. Validate certificates with SHA-256 Certificate Revocation Lists (s) in the path; and 3. Generate signatures for signing data. 2.5 How should agencies prepare for the SHA-256 Transition? 1. Inventory existing public key enabled applications within your Agency or Organization that use certificates for authentication, digital signature, and/or encryption. 2. Determine which applications are at risk of being unable to process SHA-256 by a. Verifying COTS Vendor/Manufacturer support of SHA-256; b. Verifying COTS product minimum required versions for SHA-256 support. 3. Request SHA-256 signed test CA certificates from the Federal ICAM (FICAM) SHA-256 Test Infrastructure by sending an email to wendy.brown@pgs.protiviti.com. In addition, the General Services Administration HSPD-12 Managed Services Office (MSO) is making end user SHA-256 signed test certificates available to Federal agencies in limited quantities. These can be requested by sending an email to stephen.duncan@gsa.gov. 4. Create a SHA-256 Test Plan and institute a testing program for all PKI/PIV-enabled applications. There are three fundamental capabilities that must be tested for each application: a. Capability to accept SHA-256 signed PIV certificates and s; b. Capability to process SHA-256 signed data; and c. Capability to produce SHA-256 signatures. 5. Voluntarily report test results are posted to https://www.idmanagement.gov/fpkipa/sha2 (this web page requires a user name and password, which can be attained by contacting FPKI.Webmaster@gsa.gov). 2.6 What should a Federal Agency do that is not yet ready to transition to SHA- 256? If you are a PKI Shared Service Provider (SSP) customer, coordinate with your SSP. If your agency runs a Legacy PKI, write a letter to the Federal PKI Policy Authority (FPKIPA) indicating your intention to continue to operate using SHA-1 and coordinate with the Federal PKI Management Authority (FPKIMA) to cross certify with the SHA-1 Federal Root CA (FRCA). Discontinue issuing certificates until your agency is ready to issue SHA-256 certificates. 2.7 For Federal Bridge Certification Authority (FBCA) cross certified entities, how will the transition to SHA-256 affect my relationship with the Federal Bridge? Agencies prepared to move to SHA-256 on January 1, 2011 will continue their relationship with the FBCA. Agencies that are not prepared to move to SHA-256 on January 1, 2011 must establish a separate relationship with the SHA-1 Federal Root CA (FRCA). 4

2.8 For PKI SSPs, how will the transition to SHA-256 affect my relationship with the Common Policy Root? An SSP who wishes to issue SHA-1 certificates after December 31, 2010 must stop issuing from their old CA after December 31, 2010, and begin issuing from a new CA starting January 1, 2011 and assert the SHA-1 differentiated OIDs from the SHA-1 FRCA. However, these certificates will no longer be compliant with HSPD-12 / FIPS 201. 2.9 Can PIV or PIV Interoperability (PIV-I) Cards be issued with SHA-1 after December 31, 2010? No. PIV and PIV-I Card issuers must cease issuing cards using SHA-1 on or before January 1, 2011. 2.10 For Legacy Federal Agencies transferring their cross certification from the FBCA to COMMON, what does this mean in terms of the transition to SHA- 256? The CA must issue certificates at SHA-256. The current mappings are retained in the new cross certificate issued from the COMMON policy with the following exceptions: 1. FBCA Medium becomes Common Policy 2. FBCA Medium Hardware becomes Common Hardware 3. FBCA High becomes Common High 2.11 Can legacy Federal Agencies transferring the cross certification from the FBCA to COMMON retain their lower (i.e., Basic and Rudimentary) assurance level OIDs since there are no equivalent COMMON policy assurance levels? The cross-certificate is with the Common CA, and the Rudimentary and Basic policies remain mapped to FBCA Rudimentary and Basic. 2.12 Do PIV Cards previously issued with SHA-1 certificates need to be reissued; and if so, by what timeline? No. All PIV cards issued before December 31, 2010 are valid until they expire or are revoked. 2.13 When do the current FBCA and Common CA Root shut down and what will be the impact to me? The current FBCA and Common CA Root shut down on March 31, 2011. CAs that currently maintain a relationship with the FPKI and that wish to continue a relationship with the FPKI must establish a relationship with the new FBCA, new Common CA, or the SHA-1 Federal Root CA. 2.14 By when must I transition completely to SHA-256? To maintain a relationship with the FPKI, CAs must transition to SHA-256 by December 31, 2013. 2.15 What happens if I cannot transition to SHA-256 by December 31, 2013? Since the SHA-1 FRCA will shut down on December 31, 2013, any relationship with the Federal PKI through cross certificates will cease. 5

2.16 Do end-entity certificates issued with SHA-1 have to expire by December 31, 2013, or will they remain valid for a full three-year period from the time of issuance? Since the SHA-1 FRCA will shut down on December 31, 2013, any relationship with the Federal PKI through cross certificates will cease. 2.17 What is the FPKIPA, NIST, and OMB going to do to ensure that vendors have compliant products available? The Federal Government is continuing to coordinate with vendors to encourage development of compliant products. 2.18 Do I need a new mapping to get a SHA-1 FRCA certificate? No. To request a SHA-1 FRCA certificate, an authorized official must write a letter to the FPKIPA indicating that the organization who operates the CA is accepting the risk of using SHA-1 past December 31, 2010. The FPKIPA will then authorize the FPKIMA to issue a cross certificate with the appropriate policy mappings from the SHA-1 FRCA. Detailed Technical Questions Validation: 2.19 How does this transition affect certificate validation of SHA-1 certificates using s? s can be signed using SHA-1 through December 31, 2011. A CA that has only issued certificates signed with SHA-1 may continue to use SHA-1 when signing s. Certificates issued prior to December 31, 2010 with expiration dates after December 31, 2010 can be validated against s signed with SHA-1. CAs that previously issued SHA-1 certificates and now issue SHA-2 certificates can continue to issue s using SHA-1 through December 31, 2011. 2.20 How does this transition affect certificate validation of SHA-1 certificates using Online Certificate Status Protocol (OCSP)? Certificates issued to OCSP responders that cover SHA-1 certificates can be signed using SHA-1 through December 31, 2013 provided that the OCSP responses are pre-generated. 2.21 If I have applications that will be unable to validate SHA-256 certificates, how do I accommodate authentication of users who have been issued SHA-256 certificates by their agency or PIV-I vendor? Until applications are upgraded to validate SHA-256 certificates, users who have been issued SHA-256 certificates cannot be authenticated. Agencies that are not fully transitioning to SHA-256 must focus first on those applications with external partner users to ensure they can support validation of certificates with SHA-256 hashes. 6

2.22 Will I still be able to validate certificates that chain back to the old Federal PKI infrastructure after it is shut down on March 31, 2011? Certificates should chain back to the new COMMON policy. It is expected that the new COMMON policy Root certificate will be distributed as the new Federal Trust Anchor. However, the FPKIMA has been asked to issue cross-certificates from the Legacy Common Policy CA to the new Common Policy CA and to the SHA-1 FRCA. These cross certificates will allow a longer time to fully deploy the new Federal Trust Anchor. Signing: 2.23 How long can s and OCSP responses be signed with SHA-1? CAs that do not begin signing certificates with a minimum of SHA-224 may continue signing s with SHA-1 until December 31, 2013. CAs that previously signed certificates using SHA-1 that begin signing certificates with a minimum of SHA-224 may continue using SHA-1 to sign s through December 31, 2011. If the or OCSP Response only covers SHA-1 certificates, s can be signed with SHA-1 until December 31, 2013. 2.24 Are there special security requirements for signing OCSP Responses with SHA-1? After December 31, 2010, OCSP responders that generate signatures on OCSP responses using SHA-1 shall only provide signed responses that are pre-produced (i.e., any signed response that is provided to an OCSP client shall have been signed before the OCSP responder received the request from the client). Cross-Certificates 2.25 What does the new Federal PKI architecture look like? The new Federal PKI Architecture is depicted in the figures below. The first diagram depicts the FPKI Root Relationships. The second diagram depicts the relationships between the FPKI and entities that have relationships with the FPKI. 7

Old Common to SHA-1 Unrevocable certificate to help RPs that have not installed the new anchor and need a full SHA- 1 path - expires 12/31/2013 Old Common to New Common Unrevocable certificate to help RPs that have not installed the new anchor - expires 12/31/2013 New Common to SHA- 1 Revocable certificate to enable RPs that have installed the new Common trust anchor to validate certificates on the SHA-1 side of the FPKI. SHA-1 SHA-1. New Common PIV, PIV-I, MHW. New FBCA PIV, PIV-I, MHW. Fed Issuers Other Bridges SSPs Fed Issuers Other Bridges Other SHA-1 SHA-1. PIV MHW, PIV MHW, PIV-I MHW, PIV-I Other SHA-1 8

9

2.26 How do I get a SHA-256 cross-certificate if I am currently cross certified with the FBCA or Common Policy CA? Provide the FPKIMA with the correct subjectinfoaccess (SIA) value and indicate if you require the full three year validity (or ten years for SSPs) period (instead of the current expiration date). If a new certificate request (PKCS #10) is required, it must be submitted to the FPKIMA. In addition, you must ensure your contact information on file with the FPKIMA and the Memorandum of Agreement (MOA) with the FPKIPA is current. Contact the FPKIMA for more information. 2.27 What do I need to do to get a cross-certificate from the SHA-1 FRCA? First, write a letter to the FPKIPA stating that your organization accepts responsibility for the risk associated with the continued use of SHA-1. Then, provide the FPKIMA with a copy of the letter to the FPKIPA and the correct value for your SIA and Distinguished Name (DN). If you want the certificate for a validity period up to December 31, 2013, provide a new p10 to the FPKIMA. Contact the FPKIMA for more information. 2.28 What is the SIA to include when I issue a new cross-certificate to the new FBCA? http://http.fpki.gov/bridge/cacertsissuedbyfbca.p7c ldap://ldap.fpki.gov/cn=federal%20bridge%20ca,ou=fpki,o=u.s.%20government,c= US?cACertificate;binary,crossCertificatePair;binary 2.29 What is the SIA to include when I issue a new cross-certificate to the new Federal Common Policy CA? http://http.fpki.gov/fcpca/cacertsissuedbyfcpca.p7c ldap://ldap.fpki.gov/cn=federal%20common%20policy%20ca,ou=fpki,o=u.s.%20go vernment,c=us?cacertificate;binary,crosscertificatepair;binary 2.30 What is the SIA to include when I issue a cross certificate to the new SHA-1 FRCA? http://http.fpki.gov/sha1frca/cacertsissuedbysha1frca.p7c ldap://ldap.fpki.gov/cn=sha- 1%20Federal%20Root%20CA,ou=FPKI,o=U.S.%20Government,c=US?cACertificate;bi nary,crosscertificatepair;binary 2.31 What is the DN for the new FBCA? cn=federal Bridge CA, ou=fpki, o=u.s. Government, c=us 2.32 What is the DN for the new Federal Common Policy CA? cn=federal Common Policy CA, ou=fpki, o=u.s. Government, c=us 2.33 What is the DN for the new SHA-1 FRCA? cn= SHA-1 Federal Root CA, ou= FPKI, o=u.s. Government, c=us 10

2.34 Will my current cross-certificate be revoked when I receive my new crosscertificate? Current cross-certificates will not be revoked until the FPKIMA is notified that the new certificate has been deployed. However, all current cross-certificates will be revoked no later than March 31, 2011. 2.35 How are certificate policies mapped in the new environment? Current policy mappings are retained when new cross-certificates with the new SHA-256 FBCA are issued. If a cross-certificate with the new Federal Common Policy CA is requested, current policy mappings are retained with the exception that mappings to: id-fpki-certpcy-mediumassurance => become mapped to id-fpki-common-policy id-fpki-certpcy-mediumhardware => become mapped to id-fpki-common-hardware id-fpki-certpcy-highassurance => become mapped to id-fpki-common-high If a cross-certificate with the SHA-1 FRCA is requested, current policy mappings are translated to the equivalent SHA-1 policy. Trust Stores (Root Certificate Distribution) 2.36 When will the current Common Policy Root certificate be removed from the Microsoft Trust List? The FPKIMA will request that it be removed after March 31, 2011. However, actual removal depends on Microsoft s update cycle. 2.37 When will the new Federal Common Policy certificate be in the Microsoft Trust List? The FPKIMA will request that it be added as soon as possible. However, the actual date depends on Microsoft s update cycle. It is anticipated that the new Common Policy certificate will be included in a February 2011 update to the Microsoft Trust Store. 2.38 What vendors will be distributing the Federal Common Policy certificate? The FPKIMA will be requesting that the Federal Common Policy certificate be distributed in the Adobe AATL by Apple, Java, Microsoft, and Mozilla. 2.39 When do I need to have the new Federal Common Policy certificate distributed to my users? The new Federal Common Policy certificate must be distributed to users by no later than December 31, 2013. However, users are encouraged to begin using the new Federal Common Policy certificate as soon as possible, preferably before March 31, 2011. 2.40 Will the new FBCA certificate be installed in vendor Trust Lists, and if so, by when? No. The FBCA certificate should not be used as a trust anchor. 11

2.41 Does the displayed thumbprint of the certificate have to be SHA-256? No. The thumbprint is calculated and displayed by the application used to view the certificate, and is not an attribute of the certificate itself. 2.42 Do the biometric containers on a PIV or PIV-I Card have to be signed with SHA-256? Yes. After December 31, 2010 all valid signatures must be at SHA-256. REFERENCES 2.43 What authoritative documents should I read to successfully accomplish the Transition to SHA-256? NIST SP 800-78, Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV) Federal PKI Certificate Policies NIST SP 800-57, Recommendation for Key Management Part 1 NIST SP 800-131, Draft Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes 12