Internet & Intranet Security

Team-Fly

19.4 IETF PKIX WG

In 1995, the IETF recognized the importance of public key certificates, and chartered an IETF Public-Key Infrastructure X.509 (PKIX[6]) WG with the intent of developing Internet Standards needed to support an X.509-based PKI for the Internet community. In the past, the PKIX WG has initiated and stimulated a lot of standardization and profiling activities within the IETF. It is closely aligned with the activities within the ITU-T.

The operational model of the IETF PKIX WG consists of subjects and end entities,[7] CAs, and registration authorities (RAs).[8] The functions that the RA may carry out will vary from case to case but may include personal authentication, token distribution, certificate revocation reporting, name assignment, key generation, and key archival. In any PKI architecture, RAs are optional components that are transparent to the end entities (when they are not present, the CA is assumed to be able to carry out the RAs' functions so that the PKI management protocols are the same from the end entities' point of view). Finally, the certificates generated by the CAs may be made publicly available in certificate repositories (e.g., network services that are available on-line).

According to this operational model, several informational, experimental, and standards track RFC documents in support of the original goals of the IETF PKIX WG have been approved by the IESG:

In summary, the RFC documents itemized above specify an X.509-based PKI for the Internet community. This evolving PKI is sometimes also referred to as Internet X.509 public key infrastructure (IPKI). As of this writing, the RFC documents that specify the IPKI refer to Proposed Standards.

The number of RFC documents that specify various aspects of the IPKI will certainly grow in the future, since a lot of work is done to further refine the IPKI and its operational protocols and procedures. In fact, the number of RFC documents specifying the IPKI will certainly have increased by the time you read this book. Refer to the IETF PKIX WG home page to get a complete and more comprehensive overview about the RFC and Internet-Draft documents that are currently available. The current trend in industry is to make commercial PKI products "PKIX compliant," and this trend is likely to continue in the future.

[6]http://www.ietf.org/html.charters/pkix-charter.html

[7]In the specifications of the IETF PKIX WG, the term end entity is used rather than the term subject to avoid confusion with the X.509v3 certificate field of the same name.

[8]Other terms are used elsewhere for the functionality of an RA. For example, the term local registration agent (LRA) is used in ANSI X9 standards, local registration authority (also with the acronym LRA) is used in [3], organizational registration agent (ORA) is used in certain U.S. government specifications, and registration agent (RA) has also been used elsewhere.

[9]The notion of a CRL will be introduced and discussed in Section 19.5.1.

[10]The KEA is a key exchange algorithm that was originally proposed by NIST for use together with the Skipjack encryption algorithm in Clipper and Fortezza chips. Refer to http://csrc.nist.gov/encryption/skipjack-kea.htm for a specification of the Skipjack and KEA algorithms.

[11]This behavior is needed for such operations as creating the signature of a PKCS #10 certification request. These algorithms are designed to provide a proof of possession rather than general-purpose signing.

[12]The term qualified certificate is used to describe a certificate with a certain qualified status within applicable governing law.


Team-Fly

Категории