Security Technologies for the World Wide Web, Second Edition

7.3    IETF PKIX WG

In 1995, the IETF recognized the importance of public key certificates, and chartered an IETF Public-Key Infrastructure X.509 (PKIX [9] ) WG with the intent of developing Internet Standards needed to support an X.509-based PKI for the Internet community. [10] In the past, the IETF PKIX WG has initiated and stimulated a lot of standardization and profiling activities within the IETF. It is closely aligned with the activities within the ITU-T.

The operational model of the IETF PKIX WG consists of end entities, [11] CAs, and registration authorities (RAs). [12] The functions that the RA may carry out will vary from case to case but may include personal authentication, token distribution, certificate revocation reporting, name assignment, key generation, and key archival. In fact, a CA can delegate some of its authorities (apart from certificate signing) to an RA. Consequently, RAs are optional components that are transparent to the end entities. Finally, the certificates generated by the CAs may be made available in on-line directories and certificate repositories. [13]

According to this operational model, several informational, experimental, and standards track RFC documents in support of the original goals of the IETF PKIX WG have been approved by the IESG:

In summary, the RFC documents itemized above specify an X.509-based PKI for the Internet community. This evolving PKI is sometimes also referred to as Internet X.509 Public Key Infrastructure (IPKI). As of this writing, the RFC documents that specify the IPKI refer to Proposed Standards.

The number of RFC documents that specify various aspects of the IPKI will certainly grow in the future, since a lot of work is done to further refine the IPKI and its operational protocols and procedures. In fact, the number of RFC documents specifying the IPKI will certainly have increased by the time you read this book. Refer to the IETF PKIXWG home page to get a complete and more comprehensive overview about the RFC and Internet-Draft documents that are currently available. The current trend in the industry is to make commercial PKI products ˜ ˜PKIX compliant, and this trend is likely to continue in the future.

[9] Note, however, that ITU-T X.509 does not embody a hierarchic trust model. The existence of cross-certificates, as well as forward and reverse certificates, makes the X.509 model a mesh, analogous in some ways to PGP s web of trust. The X.509 model is often erroneously characterized as a hierarchic trust model because it is usually mapped to the directory information tree (DIT), which is hierarchic , more like name schemes.

[10] http://www.ietf.org/html. charters /pkix-charter.html

[11] In addition to the PKIX WG, the IETF also chartered another WG to address PKI issues. As mentioned above, this WG was called IETF Simple Public Key Infrastructure (SPKI) WG and was abandoned in 2001.

[12] In the specifications of the IETF PKIX WG, the term end entity is used rather than the term subject to avoid confusion with the X.509v3 certificate field of the same name.

[13] Other terms are used elsewhere for the functionality of an RA. For example, the term local registration agent (LRA) is used in ANSI X9 standards, local registration authority (also with the acronym LRA) is used in [3], organizational registration agent (ORA) is used in certain U.S. government specifications, and registration agent (RA) has also been used elsewhere.

[14] The term certificate repositories is often used in the RFC documents of the IETF PKIX WG. Therefore, it is also used in this book.

[15] The notion of a CRL will be introduced and discussed in Section 7.4.1.

[16] The KEA is a key exchange algorithm that was originally proposed by NIST for use together with the Skipjack encryption algorithm in Clipper and Fortezza chips. Refer to http://csrc.nist.gov/encryption/skipjackkea.html for specification of the Skipjack and KEA algorithms.

[17] This behavior is needed for such operations as creating the signature of a PKCS #10 certification request. These algorithms are designed to provide proof of possession rather than general-purpose signing.

Категории