One document matched: draft-digital-signature-system-deployment-00.txt
Internet-Draft J. Marchioni
Working Group: Individual ARX, Inc
draft-digital-signature-system-deployment-00 Y. Itzhaki
Category: Informational T. Yas'ur
Obsoletes: None Algorithmic Research, Ltd
Expires: 29 March 2009 30 September 2008
Approach to Digital Signature Systems Deployment
Status of This Memo
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress.
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Abstract
Conventional deployments store keys on PC hard disks, application-
server hard disks, or in tokens, and also introduce complications
for user enrollment and management. User and administrator
frustration with the conventional approach has cramped development
of a market for PKI. As a result, PKI has not reached its
utilization potential and is far from becoming ubiquitous.
This document describes architecture for deployment of secure and
efficient digital signature capabilities based on a centralized key-
management approach and emphasizes the importance of not disrupting
existing identity and authentication management and application
infrastructure. An alternative architecture is documented here so
that PKI deployments will lower their associated administrative
burdens and deliver improved scalability.
Table of Contents.
1. Introduction 1
2. The Digital Signature Solution Deployment 2
2.1. Operations and Infrastructure 2
2.1.1. Identity Proofing 2
2.1.2. Signature-User Enrollment 2
2.1.3. RA Proxy 3
2.1.4. Key and Certificate Management 3
2.1.5. Certificate Management Options 3
2.1.6. Revocation, CRLs and OCSP 4
2.1.7. Automatic Refresh: Keys and/or Certificates 4
2.1.8. Re-keying 4
2.2. Applications and User Authentication 5
2.2.1. Key and Signature Services for the Application 5
2.2.2. Signature and Verification Process 6
2.2.3. User Authentication 6
2.2.4. Middleware and Programmatic Interfaces 6
3. Security Considerations 7
4. Conclusion 8
Informative References 8
IPR Statement 11
Acknowledgement 11
Authors Addresses 12
Copyright Notice 12
Marchioni & Itzhaki Informational [Page 1]
Internet-Draft Digital Signature System Deployment 30 September 2008
1. Introduction.
This document presents an approach to deploying digital signature
solutions, but does not mandate use of a solution-specific or PKI-
specific identity proofing policy, procedure, enrollment software,
or PKI-specific authentication scheme. The approach leverages an
organization's pre-established user and authentication
infrastructure to drive the management of end-user signature
credentials i.e., management of signature keys and certificates.
The described architecture results in minimum impact by the
signature PKI on business operations.
While the architecture mandates use of PKI and digital signature
standards, it also allows deployment of several optional security
and middleware components that can be used to meet requirements of
a broad diversity of security policies, applications, and business
processes, and include:
o FIPS-140 [REF] evaluated hardware options to provide extra
physical and programmatic access control and integrity
protection for private keys and digital-signature operations;
o SHS [REF] is mandated and provides integrity protection of
signed objects (documents or data);
o Triple-DES [REF] and AES [REF] are symmetric-cryptographic
options that provide confidentiality and integrity protection
of signature private keys;
o X.509 v3 certificates and X.509 v2 CRLs [REF] are mandatory to
ensure signature verification and support non-repudiation
under off the shelf applications;
o RSA (1024 to 4096-bit) [REF] and ECDSA [REF] are options that
provide integrity and non-repudiation protection of digital
signatures on user-signed data, certificates and CRLs;
o SSL/TLS [REF] options provide confidentiality and integrity
protection of signature object hash values and signature
blocks sent between the application and key server;
o PKCS#1 [REF] and PKCS#7 [REF] are used to enable signature
verification by off the shelf applications;
o PKCS#10 [REF] is used for public-key certification requests to
enable key certification operations;
o PKCS#11 [REF], OASIS DSS [REF], CAPI [REF], and ASSP [REF] are
middleware-interface options to allow a diversity of
applications access to signature services.
Marchioni & Itzhaki Informational [Page 2]
Internet-Draft Digital Signature System Deployment 30 September 2008
2. The Digital Signature Solution Deployment.
2.1. Operations and Infrastructure.
+-------------+ +------------------+ +--------------------+
| | | | | |
| Established | | Established +---/ | |
| ID-Proofing +=====+ User-Management | / | Key & Certificate |
| Procedure | ^ | System | /---+ Server |
| | | | | ^ | |
+-------------+ | +------------------+ | +--------------------+
| |
Domain-Established LDAP or Directory-Specific
Standard Operating Procedure Protocol
Figure 1. Example of Enrollment, Key and Certificate Management
2.1.1. Identity Proofing. Most organizations have an established,
documented and standard operating procedure for identity proofing
that requires in-person verification. These procedures are
typically under the control of screening departments such as human-
resources, or those that screen suppliers and/or customers. When
a person's identity is verified (proofed) that person is enrolled in
the organization's established user/supplier/customer database,
typically an LDAP-enabled directory or database, and an identity
credential is issued. The PKI or digital-signature system
deployed must not disrupt these established identity and
authentication management(IAM) policies, procedures and
infrastructure, rather the signature PKI must be driven by the
established infrastructure.
2.1.2. Signature-User Enrollment. The deployment virtualizes an
organization's established identity-directory (or database) services
as the registration authority (RA) (i.e., RA proxy) for the
signature PKI. [Note the deployment described here may leverage a
range of pre-existing identity-credentialing systems to authenticate
users and manage their digital-signature credentials, i.e.,
signature key pair and signature certificate]. All signature-key
and signature-certificate provisioning and management functions must
be performed transparently and securely for the end user and systems
administrator (see next section).
Marchioni & Itzhaki Informational [Page 3]
Internet-Draft Digital Signature System Deployment 30 September 2008
2.1.3. Registration Authority (RA) Proxy. The key and certificate
server must listen to a set of events on the user directory (e.g.,
new user, remove user, change user details, etc.) and translate
these routine administrative operations into signature-key and
certificate-management events (e.g., generate key pair, revoke
private key, issue/revoke certificate, etc.), without the need for
additional PKI-specific administrator intervention.
2.1.4. Key and Certificate Management. The deployment provides a
network-attached multi-user server for key and certificate
generation and storage, and for private-key operations. Such a
server can be any basic hardware server, or one that has undergone
FIPS-140 evaluation for higher assurance in key protection.
Signature keys and certificates are generated, stored and managed
inside the server, and private keys are never exposed outside this
server. If such a server has also been evaluated for FIPS 140
security, it can provide hardware security without the need
for personal-hardware tokens. In fact some servers, depending on
FIPS level (FIPS 140-2 defines four levels of security, simply named
"Level 1" to "Level 4"), can be viewed as a large network-attached
smart card that generates and stores all users' signature
credentials, and executes all signature (private-key) operations.
Furthermore, user (and administrator) can only use and access their
own signature key(s), and have access to none other. Access for key
usage is controlled by the authentication scheme chosen by the
organization, [see sec 2.2.3], and the specific server's protection
profile.
The operational impact is an elimination of the high burden in
logistics, cost, help-desk support, and lack of user acceptance,
associated with the purchase, provisioning, distribution, and
management of individual public-key hardware or software tokens.
2.1.5. Certificate Management Options. Certificate management can be
provided either by an embedded Certification Authority (CA) in the
key and certificate server (the server), or by one of two optional
middleware (or procedural) interfaces between the server and an
external CA:
(i) a middleware interface that allows the server to act as an
RA Proxy between the organization's user management
infrastructure and the external CA by making PKCS#10 key-
certification requests from the server on behalf of each
user directly to the external CA;
(ii) a middleware (or procedure) can allow the embedded CA to be
established as a subordinate to a Root CA by exporting its
public key (e.g., subject = subordinate CA xyz) and
submitting a PKCS#10 key-certification request to an
external Root CA.
Marchioni & Itzhaki Informational [Page 4]
Internet-Draft Digital Signature System Deployment 30 September 2008
Organizations can then have the option to securely and transparently
manage and control their own CA or get certificate-management
services from an independent third party CA. Furthermore, the
systems administrator and users have no training obstacles or added
burdens related to PKI-service management and use, regardless of the
chosen CA option.
Under this approach (RA Proxy), the organization need not change
their current policies, procedures, and systems for (a) identity
proofing and management, and (b) user enrollment/revocation. Thus
the deployment of the digital-signature system and PKI does not
negatively impact established policy and infrastructure, nor end-
user and administrator routines or business operations.
2.1.6. Revocation, CRLs and OCSP. This approach mandates a user is
revoked by revoking his/her private key, i.e., the private key is
immediately deleted by the server. Therefore, at the time of
revocation the user no longer has a capability to make even one more
signature. Hence, all signatures that verify with that user's
certificate have been made when the user had valid
signature privileges, and not after. At the time the private key is
revoked the user's certificate is also revoked and placed on the CRL.
However, the need to manage and reconcile CRLs under this approach
is less important resulting in a savings of processing,
administrative, and CRL-distribution overhead. Furthermore, if all
key management in the PKI followed a centralized approach the need
for OCSP responders might be eliminated, resulting in an added
efficiency in signature verification, i.e., those examining
signatures need not be online to verify signatures (see section
2.2.2. below). In any event, as long as the conventional approach
is used there will be a need for CRLs and OCSP.
2.1.7 Automatic Refresh: Keys and/or Certificates. Since keys and
certificates are managed centrally, the key-certificate server can
automatically refresh keys (i.e., generate new and revoke old
certificates (i.e., issue new certificate with new validity period)
upon expiration without the delays or logistics issues associated
with private keys and certificates managed on computer hard drives
or personal hardware tokens such as smart cards and USB sticks .
2.1.8. Re-keying. As security policies evolve, it may become necessary
to migrate from 1024-bit RSA to 2048-bit RSA, or from RSA to ECDSA.
Conventional deployment approaches mandate the provisioning and
distribution of physical personal signature-key media, either
software or hardware tokens. These deployments leave the
administrator with a serious logistical burden for re-keying. Under
such conventional deployments, the administrator first needs to
provision new key tokens for each user, and then carefully manage
the timing of their activation and swapping with tokens already in
the hands of the end users.
Marchioni & Itzhaki Informational [Page 5]
Internet-Draft Digital Signature System Deployment 30 September 2008
In the event that re-keying is required for signature keys, the
centralized approach offers an efficient method to re-keying the
user community. Since no personal signature-key media has been
distributed (see section 2.2.1. below), all users can be re-keyed at
once from the central network-attached key server without delay or
logistical issues.
2.2. Applications and User Authentication.
+---------------+ +---------------+ +--------------------+
| | | | | |
| Application +=====+ Desktop +---/ | Key & Certificate |
| Desktop | ^ | Middleware | /---+ Server |
| | | | | ^ | |
+---------------+ | +---------------+ | +--------------------+
| |
Middleware Interface Authenticated
e.g.,PKCS#11/CAPI SSL or TLS
Figure 2. Deployment Under the Desktop or Server Application
+---------------+ +----------------------+
| | | |
| Application | | Key & Certificate |
| Web Browser +---/ | Server with |
| | /---+ Web Services |
| | ^ | |
+---------------+ | +----------------------+
|
Authenticated
SSL or TLS
Figure 3. Deployment Under the Web Application
2.2.1. Key and Signature Services for the Application. The server
"appears" either as a local key media (e.g., USB stick or smart
card) to desktop applications, or as a Web-service key media to any
Web application.
The server must present itself to the application as a standard key
media using middleware that is compatible with the application.
Such middleware is typically based on either a PKCS#11, CAPI,
OASIS DSS Web Service, or other Web service interface like ASSP.
Marchioni & Itzhaki Informational [Page 6]
Internet-Draft Digital Signature System Deployment 30 September 2008
The functions normally provided by a software token, public-key
smart card or USB stick, (i.e., secure key generation, key storage,
signature operation, certificate storage, etc.) are provided by
the network-attached server via the middleware interfaces indicated
above.
2.2.2. Signature and Verification Process. Documents (or data) can be
hashed on the user's computer, this results in significant
savings of network bandwidth as compared to sending entire documents
to the server to be hashed. At the initiation of a signature
operation, an authenticated SSL/TLS session is established between
the user's computer and the server. A SSL/TLS session is
established only after the user (i.e., the signer) has been
authenticated by answering an identity challenge. The secure
session provides confidentiality and integrity for the hash sent to
the server, and for the signature block and certificate returned to
the user's application. The signature block and certificate are
then embedded in the document. When the signature needs to be
validated all that is needed is the signed document and the
application software to calculate signature verification.
2.2.3. User Authentication. A number of options for identity challenge
may be considered. To avoid disruption in pre-existing user
authentication policy and infrastructure, the options include:
(a) Kerberos SSO,(b) simple username/password-PIN, and (c) the
following two-factor authentication options: (i) RADIUS [REF] or
DIAMETER [REF] protocol with one-time password token, (ii)
challenge-response protocol with identity smart card, and (iii)
biometrics. Therefore, the organization can choose a level of user-
authentication security that matches the requirements of their
application, but nothing less secure than what is needed is made
available under the deployment.
2.2.4. Middleware and Programmatic Interfaces. Standard
interfaces allow deployments to cost-effectively dovetail
digital signature capabilities into pre-existing as well as new
applications, and identity-management infrastructures. Another
advantage of standard interfaces is allowing for one vendor's
solution to be replaced by a solution from another vendor with less
disruption, eliminating vendor lock.
The deployment also considers what is familiar to end-users in
terms of visual indication of a signature. Therefore, there is
consideration for a one-time capture and centrally stored
handwritten graphical signature image (e.g., from an electronic-
signature-pad or ePen interface, or by loading the image from
a .jpg or .bmp file) for placement with every digital signature.
This approach provides an added visual convenience to end users, and
encourages user adoption and routine use of standard digital
signatures.
Marchioni & Itzhaki Informational [Page 7]
Internet-Draft Digital Signature System Deployment 30 September 2008
When needed, middleware with standard and application-compatible
APIs and Web services can provide the following functions for
customized signature-enabled application development:
o Sign/validate signatures in application-specific document
types;
o Sign/validate a single file or data buffer;
o Check certificate validity;
o Enumerate/manage certificates;
o Manage graphical electronic signatures;
o Manage users.
3. Security Considerations.
The overall risk to a business process must be assessed and balanced
with scalability objectives before defining procedures or choosing
security-technology mechanisms. The goal is to deliver the needed
level of security from a business-needs perspective, but not less
(i.e., lowering security), or more (i.e., driving up costs),
resulting in a deployment that matches what is required.
The trust or security of any deployment is based first and foremost
on a documented operating procedure for user enrollment, identity,
and authentication management. An equally important security
consideration is the proper training of the stakeholders (e.g.,
systems administrators, security officers, and users). If a
stakeholder deviates from established procedure either because
he/she is poorly trained or does so intentionally, they may defeat
many security-technology countermeasures.
Time sources for document and certificate signing are provided
by the internal domain or an external source. Some external time
sources provide a higher reliability and level of trust, however,
they carry a cost overhead that may not be tolerable for all
businesses. Trust in internal-domain time sources can be increased
through management policy and security mechanisms. Policy and
security mechanisms can prohibit the use of PCs as time sources,
and prevent tampering with clocks. An effective option for raising
confidence in internal-domain time source is the clock of a FIPS-
evaluated secure key server. Since keys are securely accessed for
signature operations, time stamps can be provided from this
protected source from within the domain.
Concerning user authentication, simple user name and password
schemes provide less security than two-factor schemes like one-time
password tokens, identity smart cards, or biometrics. Furthermore,
server-based user authentication is generally viewed as more secure
because servers can be less vulnerable to trojan-horse or virus
software than the typical user's PC.
Marchioni & Itzhaki Informational [Page 8]
Internet-Draft Digital Signature System Deployment 30 September 2008
Hardware protection for keys can be provided at various levels
depending on the requirements of the business or the value of its
transactions. For example, key servers that have been evaluated for
FIPS 140-2 level 3 and smart cards provide hardware protection
for keys. The designers of such hardware consider such scenarios
in which hardware might fall into the hands of an attacker, or user
keys might be exposed to a systems administrator. As a precaution
countermeasures are built into their respective key-protection
hardware.
4. Conclusion.
Affordable and scalable PKI deployment strategies are needed. This
alternative approach emphasizes consideration for pre-existing user-
management, authentication, and application infrastructures and
offers more access to PKI than conventional methods.
Informative References.
[AES] National Institute of Standards and Technology (NIST), "FIPS
Publication 197: Advanced Encryption Standard",
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2001
November 26.
[ASSP] "Adobe Signature Services Protocol" (ASSP), 2007, Available only
from Adobe Systems, Inc. See Adobe http://www.adobe.com.
[CAPI] R. Coleridge, "The Cryptography API, or How to Keep a Secret",
http://msdn2.microsoft.com/en-us/library/ms867086.aspx, August 1996.
[CMS] R. Housley, "Cryptographic Message Syntax", IETF RFC 3852,
http://www.ietf.org/rfc/rfc3852.txt, July 2004.
[DIAMETER] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko,
"Diameter Base Protocol", http://www.rfc-editor.org/rfc/rfc3588.txt,
September 2003.
[Ellison] C. Ellison, "Improvements on Conventional PKI Wisdom",
Proceedings of the 1st Annual PKI Research Workshop, pp. 165-176,
August 2002.
[FIPS140] National Institute of Standards and Technology (NIST), "FIPS
Publication 140-2: Security Requirements for Cryptographic Modules",
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, May 2001.
[Gupta] S. Gupta, "Security Characteristics of Cryptographic Mobility
Solutions", Proceedings of the 1st Annual PKI Research Workshop, pp.
117-126, August 2002.
Marchioni & Itzhaki Informational [Page 9]
Internet-Draft Digital Signature System Deployment 30 September 2008
[Gutmann] P. Gutmann, "Plug-and-Play PKI: A PKI your Mother can Use",
Proceedings of the 12th USENIX Security Symposium, pp. 45-58, August
2003.
[IPSEC] S. Kent and R. Atkinson, "Security Architecture for the
Internet Protocol", IETF RFC 2401, http://www.ietf.org/rfc/rfc2401.txt,
November 1998.
[JCA] Sun Microsystems, Inc., "Java Cryptography Architecture, API
Specification & Reference", http://java.sun.com/j2se/1.4.2/docs/guide/
security/CryptoSpec.html, August 2002.
[Kerberos] Microsoft Corp., "Windows 2000 Kerberos Authentication",
http://www.microsoft.com/technet/prodtechnol/windows2000serv/deploy/con
feat/kerberos.mspx
[LDAP] K. Zeilenga, "Lightweight Directory Access Protocol", IETF RFC
4510, http://www.ietf.org/rfc/rfc4510.txt, June 2006.
[Lorch] M. Lorch, J. Basney and D. Kafura, "A Hardware-secured
Credential Repository for Grid PKIs", 4th IEEE/ACM International
Symposium on Cluster Computing and the Grid, pp. 640-647, April 2004.
[Marchesini] J. Marchesini, S.W. Smith, M. Zhao, "Keyjacking: Risks of
the Current Client-side Infrastructure", Proceedings of the 2nd Annual
PKI Research Workshop, pp. 128-144, April 2003.
[NAMU] S. Turner and R. Housley, "Implementing Email Security and
Tokens: Current Standards, Tools, and Practices" pp.159-160, Wiley
Publishing, 2008.
[Nielsen] R. Nielsen, "Observations from the Deployment of a Large
Scale PKI", Proceedings of the 4th Annual PKI Research Workshop, pp.
159-165, August 2005.
[NTP] D. L. Mills, "Network Time Protocol", IETF RFC 1305,
http://www.ietf.org/rfc/rfc1305.txt, March 1992.
[OASIS] S. Drees et al, "Digital Signature Service Core Protocols,
Elements, and Bindings", OASIS Digital Signature Services Technical
Committee Draft, http://docs.oasis-open.org/dss/v1.0/oasis-dss-1.0-
core-spec-cd-r5.pdf, August 2006.
[PKCS1] RSA Laboratories, "PKCS #1 v.21: RSA Cryptography Standard",
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf, June 2002.
[PKCS7] RSA Laboratories, "PKCS #7 v.1.6: "Cryptographic Message
Syntax Standard", ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-7/pkcs-
7v16.pdf, May 1997.
Marchioni & Itzhaki Informational [Page 10]
Internet-Draft Digital Signature System Deployment 30 September 2008
[PKCS10] RSA Laboratories, "PKCS #10 v.1.7: "Certification Request
Syntax Standard", ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-10/pkcs-
10v1_7d1.pdf, March, 2000
[PKCS11] RSA Laboratories, "PKCS #11 v2.20: Cryptographic Token
Interface Standard", ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-
20/pkcs-11v2-20.pdf, June 2004.
[Perrin] T. Perrin, L. Bruns, J. Moreh and T. Olkin, "Delegated
Cryptography, Online Trusted Third Parties, and PKI", Proceedings of
the 1st Annual PKI Research Workshop, pp. 97-116, August 2002.
[Pope] N. Pope, J. C. Cruellas, "Oasis Digital Signature Services:
Digital Signing without the Headaches," IEEE Internet Computing, vol.
10, no. 5, pp. 81-84, September/October 2006.
[RADIUS] C. Rigney et al, "Remote Authentication Dial In User Service",
IETF RFC 2865, http://www.ietf.org/rfc/rfc2865.txt, June 2000.
[Resnitzky] U. Resnitzky, "The Directory-Enabled PKI Appliance: Digital
Signatures Made Simple, Approach and Real World Experience" Feb 2007.
[RSA] R.L. Rivest, A. Shamir and L. Adleman, "A method for obtaining
digital signatures and public-key cryptosystems", Communications of the
ACM, vol. 21, no. 2, pp. 120-126, February 1978.
[RSA] [ECDSA] National Institute of Standards and Technology (NIST),
"FIPS Publication 186-2: Digital Signature Standard (DSS)",
http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf,
January 2007
[SAPI] ARX, "SAPI(r) Signature API Programmer's Guide Version 4.1", Pub.
No. CSN.SAPI.V32.1206, Available on request from info@arx.com, December
2006.
[Sandhu] R. Sandhu, M Bellare and R. Ganesan, "Password-Enabled PKI:
Virtual Smartcards versus Virtual Soft Tokens", Proceedings of the 1st
Annual PKI Research Workshop, pp. 89-96, August 2002.
[Schneier] B. Schneier, "Security Risks of Centralization", Crypto-Gram,
http://www.schneier.com/crypto-gram-0403.html#11, March 2004.
[SHS] National Institute of Standards and Technology (NIST), "FIPS
Publication 180-2: Secure Hash Standard",
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf, August
2002.
Marchioni & Itzhaki Informational [Page 11]
Internet-Draft Digital Signature System Deployment 30 September 2008
[TLS] T. Dierks and E. Rescorla, "The Transport Layer Security (TLS)
Protocol", IETF RFC 4346, http://www.ietf.org/rfc/rfc4346.txt, April
2006.
[Whitten] A. Whitten and J.D. Tygar, "Why Johnny Can't Encrypt: A
Usability Evaluation of PGP 5.0", Proceedings of the 8th USENIX
Security Symposium, pp. 169-184, August 1999.
Intellectual Property.
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology described
in this document or the extent to which any license under such
rights might or might not be available; nor does it represent that
it has made any independent effort to identify any such rights.
Information on the procedures with respect to rights in RFC
documents can be found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use
of such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository
at http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement.
Development of this informational RFC was sponsored by ARX, Inc. and
Algorithmic Research, Ltd.
Marchioni & Itzhaki Informational [Page 12]
Internet-Draft Digital Signature System Deployment 30 September 2008
Authors' Addresses
John Marchioni
ARX, Inc.
855 Folsom Street Suite 939
San Francisco, CA 94107 USA
EMail: johnmarc@arx.com
Yair Itzhaki
Tal Yas'ur
Algorithmic Research, Ltd.
10 Nevatim Street
Petach Tikva, 49561 Israel
EMail: yair@arx.com
EMail: tal@arx.com
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
| PAFTECH AB 2003-2026 | 2026-04-24 10:32:00 |