One document matched: draft-krishnan-cgaext-send-cert-eku-01.txt
Differences from draft-krishnan-cgaext-send-cert-eku-00.txt
Network Working Group S. Krishnan
Internet-Draft Ericsson
Intended status: Standards Track A. Kukec
Expires: January 15, 2009 University of Zagreb
K. Ahmed
Microsoft
July 14, 2008
Certificate Profile for SEND
draft-krishnan-cgaext-send-cert-eku-01
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 15, 2009.
Krishnan, et al. Expires January 15, 2009 [Page 1]
Internet-Draft SEND Certificate Profile July 2008
Abstract
Secure Neighbor Discovery (SEND) Utilizes X.509v3 certificates for
performing router authorization. This document specifies a
certificate profile for SEND including extended key usage values,
revocation details and supported extensions.
Table of Contents
1. Requirements notation . . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Extended Key Usage Values . . . . . . . . . . . . . . . . . . 5
4. Certificate Revocation . . . . . . . . . . . . . . . . . . . . 7
5. Certificate Extensions . . . . . . . . . . . . . . . . . . . . 9
6. Security Considerations . . . . . . . . . . . . . . . . . . . 10
7. Normative References . . . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12
Intellectual Property and Copyright Statements . . . . . . . . . . 13
Krishnan, et al. Expires January 15, 2009 [Page 2]
Internet-Draft SEND Certificate Profile July 2008
1. Requirements notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Krishnan, et al. Expires January 15, 2009 [Page 3]
Internet-Draft SEND Certificate Profile July 2008
2. Introduction
Secure Neighbor Discovery [RFC3971] Utilizes X.509v3 certificates for
performing router authorization. It uses the X.509 extension for IP
addresses to verify whether the router is authorized to advertise the
mentioned IP addresses.
Since the IP addresses extension does not mention what functions the
node can perform for the IP addresses it becomes impossible to know
the reason for which the certificate was issued. In order to
facilitate issuance of certificates for specific functions, it is
necessary to utilize the ExtKeyUsageSyntax field of the X.509
certificate to mention the purpose for which the certificate was
issued. This document specifies three extended key usage values, one
for routers, one for proxies, and one for address owners, for use
with SEND.
The SEND specification does not describe a revocation mechanism for
SEND certifications. This document describes a revocation mechanism
for SEND certificates that uses OCSP [RFC2560]
Finally, this document defines the set of certificate extensions that
a SEND capable node needs to support in addition to what has been
defined in [RFC3280].
Krishnan, et al. Expires January 15, 2009 [Page 4]
Internet-Draft SEND Certificate Profile July 2008
3. Extended Key Usage Values
The Internet PKI document [RFC3280] specifies the extended key usage
X.509 certificate extension. The extension indicates one or more
purposes for which the certified public key may be used. The
extended key usage extension can be used in conjunction with key
usage extension, which indicates the intended purpose of the
certified public key.
The extended key usage extension syntax is repeated here for
convenience:
ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId
KeyPurposeId ::= OBJECT IDENTIFIER
This specification defines three KeyPurposeId values: one for
authorizing routers, one for authorizing proxies, and one for address
owners.
The inclusion of the router authorization value indicates that the
certificate has been issued for allowing the router to advertise
prefix(es) that are mentioned using the X.509 extensions for IP
addresses and AS identifiers [RFC3779]
The inclusion of the proxy authorization value indicates that the
certificate has been issued for allowing the proxy to perform
proxying of neighbor discovery messages for the prefix(es) that are
mentioned using the X.509 extensions for IP addresses and AS
identifiers [RFC3779]
The inclusion of the owner authorization value indicates that the
certificate has been issued for allowing the node to use the
address(es) or prefix(es) that are mentioned using the X.509
extensions for IP addresses and AS identifiers [RFC3779]
Inclusion of multiple values indicates that the certified public key
is appropriate for use by a node performing more than one of these
functions.
send-kp OBJECT IDENTIFIER ::=
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) TBA1 }
id-kp-sendRouter OBJECT IDENTIFIER ::= { send-kp 1 }
id-kp-sendProxy OBJECT IDENTIFIER ::= { send-kp 2 }
Krishnan, et al. Expires January 15, 2009 [Page 5]
Internet-Draft SEND Certificate Profile July 2008
id-kp-sendOwner OBJECT IDENTIFIER ::= { send-kp 3 }
The extended key usage extension MAY, at the option of the
certificate issuer, be either critical or non-critical.
Certificate-using applications MAY require the extended key usage
extension to be present in a certificate, and they MAY require a
particular KeyPurposeId value to be present (such as id-kp-sendRouter
or id-kp-sendProxy) within the extended key usage extension. If
multiple KeyPurposeId values are included, the certificate-using
application need not recognize all of them, as long as the required
KeyPurposeId value is present.
Krishnan, et al. Expires January 15, 2009 [Page 6]
Internet-Draft SEND Certificate Profile July 2008
4. Certificate Revocation
Contrary to unbounded CRL sizes, OCSP response is bounded and small,
and OCSP statements can be bounded with the certificate itself in the
Certification Path messages eliminating the need for the relying
party at one end to have a network connection. Thus, SEND should use
inband revocation checking supported by the OCSP [RFC2560].
In order to support OCSP in SEND, this document defines new options
in the Certification Path Solicitation message, as well as in
Certification Path Advertisement message.
The Certification Path Solicitation message would then have the
following options.
o Trust Anchor: TA which the client is willing to accept
o OCSP Responder: The hash of the OCSP Responders public key trusted
by the client, or the concatenated list of hashes of more OCSP
Responders' public keys.
The client could define only one OCSP Responder by each CPS message,
to ensure easier matching of OCSP request and response, based on
Identifier field in Certification Path Advertisement. However, it is
more appropriate to send more OCSP responders in one CPS message,
since it is possible to match certificate and corresponding OCSP
response by matching the target certificate identifier from the OCSP
response to the corresponding certificate.
The Certification Path Advertisement message would have the following
options.
o Certificate
o Trust Anchor: to help the client to find out which advertisement
is useful
o OCSP response: A definitive OCSP response message containing the
response for each of the certificates from the request as
specified in Section 2.2 of [RFC2560].
o OCSP responder: to help the client to find out which advertisement
is useful.
The problem for the client is that when it is in the process of
forming the CPS message, it does not have certificates for which it
is sending the OCSP request. Thus, it can not form the OCSP request
as described in [RFC2560]. However, the client can work around this
Krishnan, et al. Expires January 15, 2009 [Page 7]
Internet-Draft SEND Certificate Profile July 2008
problem using the hashes of OCSP responders. This problem is also
described in Section 5.1 of [RFC4806].
After the receipt of Solicitation Path Advertisement with OCSP
response, the client can start with the OCSP response path validation
logic defined in [RFC3280]. Before the end of this validation
procedure, all certificates MUST be considered as provisional, and
the client must perform this validation as soon as it connects to
Internet, as described in [RFC3971].
Krishnan, et al. Expires January 15, 2009 [Page 8]
Internet-Draft SEND Certificate Profile July 2008
5. Certificate Extensions
This paragraph describes certificate extensions that a compliant SEND
implementation MUST support and set the criticality bit: Subject
Alternative Name, Extended Key Usage, Key Usage, Basic Constraints
and Authority Information Access. Each compliant implementation
SHOULD mark the following extensions as critical: Key Usage, Extended
Key Usage, Subject Alternative Name and Basic Constraints. The
Authority Information Extension MUST NOT be marked as critical. An
implementation MUST reject all unrecognized critical extensions and
MUST ignore all unrecognized non-critical extensions, as described in
[RFC3280].
The Subject Alternative Name extension (type iPAddress) contains the
subnet prefix that the router is authorized to advertize. It is
described in [RFC3971]. It SHOULD be marked as critical, as it is
possible that some certificates in the beginning does not contain
this extension. In such scenarios the validation of subjectAltName
iPAddress delegation extension MAY be relaxed.
The Extended Key Usage extension defines the application or protocol
specific purposes for which the certificate key pair may be used. It
is described in Section 3. It MUST be marked as critical.
The Key Usage extension defines the basic purposes for which the key
pair may be used. The Router Authorization Certificate MUST have at
least the digitalSignature and nonRepudiation bits set, since it's
key pair is used for the CGA generation and Router Advertisement
signing. Other certificates would usually have set the keyCertSign
bit set. This extension MUST be marked as critical and MUST be
processed independently of the Extended Key Usage extension. The
certificate purpose must be consistent with both the Extended Key
Usage extension and the Key Usage extension.
The Basic Constraints extension defines specifies whether the subject
of the certificates is a CA or an end entity, as well as the maximum
depth of valid certification path. In accordance with [RFC3280], it
MUST be marked as critical.
The Authority Information Access extension specifies how to retrieve
additional CA information, e.g. the information about the OCSP
responder. It MUST be marked as non-critical and usually the host
will learn the OCSP responder from the configuration file.
Krishnan, et al. Expires January 15, 2009 [Page 9]
Internet-Draft SEND Certificate Profile July 2008
6. Security Considerations
The certification authority needs to ensure that the correct values
for the extended key usage are inserted in each certificate that is
issued. Relying parties may accept or reject a particular
certificate for an intended use based on the information provided in
these extensions. Incorrect representation of the information in the
extended key usage field can cause the relying party to reject an
otherwise appropriate certificate or accept a certificate that ought
to be rejected.
Krishnan, et al. Expires January 15, 2009 [Page 10]
Internet-Draft SEND Certificate Profile July 2008
7. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2560] Myers, M., Ankney, R., Malpani, A., Galperin, S., and C.
Adams, "X.509 Internet Public Key Infrastructure Online
Certificate Status Protocol - OCSP", RFC 2560, June 1999.
[RFC3280] Housley, R., Polk, W., Ford, W., and D. Solo, "Internet
X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile", RFC 3280,
April 2002.
[RFC3779] Lynn, C., Kent, S., and K. Seo, "X.509 Extensions for IP
Addresses and AS Identifiers", RFC 3779, June 2004.
[RFC3971] Arkko, J., Kempf, J., Zill, B., and P. Nikander, "SEcure
Neighbor Discovery (SEND)", RFC 3971, March 2005.
[RFC4806] Myers, M. and H. Tschofenig, "Online Certificate Status
Protocol (OCSP) Extensions to IKEv2", RFC 4806,
February 2007.
Krishnan, et al. Expires January 15, 2009 [Page 11]
Internet-Draft SEND Certificate Profile July 2008
Authors' Addresses
Suresh Krishnan
Ericsson
8400 Decarie Blvd.
Town of Mount Royal, QC
Canada
Phone: +1 514 345 7900 x42871
Email: suresh.krishnan@ericsson.com
Ana Kukec
University of Zagreb
Unska 3
Zagreb
Croatia
Email: ana.kukec@fer.hr
Khaja Ahmed
Microsoft
Email: khaja@windows.microsoft.com
Krishnan, et al. Expires January 15, 2009 [Page 12]
Internet-Draft SEND Certificate Profile July 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Krishnan, et al. Expires January 15, 2009 [Page 13]
| PAFTECH AB 2003-2026 | 2026-04-24 05:27:37 |