Add proposed files
This commit is contained in:
parent
55a8ccbaca
commit
a3aa9b1c70
3 changed files with 604 additions and 0 deletions
30
CAcert-CPS-Pojmy.txt
Normal file
30
CAcert-CPS-Pojmy.txt
Normal file
|
@ -0,0 +1,30 @@
|
|||
Assured member - a member of the CAcert community who has 50+ APs (COD13 Assurance Policy #2.3)
|
||||
(AP: Prospective Member with created account + Member)
|
||||
Unassured member - a member of the CAcert community who has <50 APs (COD13 Assurance Policy #2.3)
|
||||
(AP: Assured Member + Prospective Assurer + Assurer)
|
||||
Root CA certificate - the main certificate of a CA (Main Root)
|
||||
Subordinate CA certificate (Subroot, intermediate CA certificate)
|
||||
Issuer DN - Distinguished Name of the issuer authority
|
||||
Subject DN - Distinguished Name of the subject, for which the certificate is issued
|
||||
...
|
||||
and 1.3 from CPS COD6
|
||||
Certification Authority
|
||||
Registration Authority
|
||||
Subscriber
|
||||
Relying Party
|
||||
Member
|
||||
Arbitrator
|
||||
Vendor
|
||||
Non-Related Person
|
||||
...
|
||||
abbrev.
|
||||
CA (Certification Authority)
|
||||
OCSP (On-line Certificate Status Protocol) - the protocol and server giving the quick informaton about revoked certificates based on their serial numbers
|
||||
CSR (Certificate Signing Request) - user's utilities, as OpenSSL, XCA, and others, generate pairs of keys; one key of each pair is claimed as the private key and saved on user's machine; the other key with some added information about the user is usually given the PEM (Base64 coded) format and serves as the requeat to issue a certificate
|
||||
WoT (Web of Trust) -
|
||||
CRL (Certificate Revoke List) - the list of revoked certificates
|
||||
AP (Assurance Points) - points a member can collect by means of assurance appointments
|
||||
RSA: Rivest–Shamir–Adleman cryptography, developed 1978
|
||||
ECC: Elliptic Curve Cryptography - gives greater cryptographic strength then RSA at equivalent key size, developed 1985
|
||||
DN Distinguished Name
|
||||
X.509v3
|
|
@ -0,0 +1,574 @@
|
|||
# 00. X.509 certificates and their properties
|
||||
|
||||
## 01. The directives for certificates
|
||||
|
||||
are given by the CA/Browser Forum (CAB). The following text reflects their
|
||||
conclusion concerning certificates valid for the year 2024.
|
||||
|
||||
## 02. Tree types (types of ciphering)
|
||||
|
||||
* RSA: Rivest–Shamir–Adleman cryptography, developed 1978
|
||||
* ECC: Elliptic Curve Cryptography - gives greater cryptographic strength then RSA at equivalent key size, developed 1985
|
||||
|
||||
The RSA type tree is the subject of the following text.
|
||||
|
||||
## 03. Tree structure (see Fig. 1)
|
||||
|
||||
* Root CA certificate (Root CA certificate) (06.)
|
||||
* Subordinate CA certificates (Subroots, intermediate certs, 08.-10.) for issuing end certificates of different types of purposes e.g. Email, Server, Personal Signing, login to various servers and/or applications, and more; issued only by the Root CA certificate; every Subordinate CA certificate has its own Certificate Revoke List (CRL)
|
||||
* End Certificates issued only by corresponding Subordinate CA certificates (12.-17.), for use with e.g. Email, Server, Personal Signing, login to various servers and/or applications, and more.
|
||||
|
||||
So the certificate chain has its length of 3: Root CA certificate -> Subordinate CA certificate -> End certificate.
|
||||
|
||||
## 04. The Subjects for CAcert should contain
|
||||
|
||||
L=Genève PostalCode=1208 STREET=Clos Belmont 2 (Location)
|
||||
O=CAcert Inc. (Organization)
|
||||
C=CH (Country)
|
||||
CN=CAcert {Root|PersonA|PersonU|ClientA|ClientU|ServerA|ServerU} CA <year> (Common Name)
|
||||
OU=http://www.cacert.org (Org.Unit)
|
||||
(Note: OU for CAcert was used in old certs, but it is considered as deprecated now.)
|
||||
|
||||
The Issuer Distinguished Name item in Subordinate CA certificates (Subroots) is equal to Subject Distinguished Name (Subject DN) and Issuer Distinguished Name (Issuer DN) of the Root CA certificate (Main Root).
|
||||
|
||||
The Issuer DN item in Patterns (see below) is equal to Subject DN in the respective Subordinate CA cert.
|
||||
|
||||
## 05. RSA types - X.509v3; all texts are coded UTF-8
|
||||
|
||||
There are 2 sets suggested per 3 Subordinate CA certificates each. The 1st set is used for CAcert *assured* members, the 2nd set is used for CAcert members who are *unassured* yet.
|
||||
A Member status is classified as follows (APs, see COD13 - Assurance Policy #2.3):
|
||||
* Status *unassured*: 0 to 49 Assurance Points (APs).
|
||||
* Status *assured*: 50 to 100+ APs.
|
||||
* Status *Assurer*: 100+ APs and the *Assurer Challenge* test passed.
|
||||
|
||||
(Some differences can also be done for an user having the Assurer status.)
|
||||
|
||||
Set #1: 3 subordinate CA certificates for issuing certs for assured members:
|
||||
(1) Person-assured; (2) Client-assured; (3) Server-assured
|
||||
Set #1a: 3 subordinate CA certificates for issuing certs for organizations:
|
||||
These are basically identical to the set #1, only differ in their Subject DN
|
||||
there are parameters L=, O=, C=, CN=, and OU= concerning the organization
|
||||
which the subordinate CA certificate is issued for.
|
||||
Set #2: 3 subordinate CA certificates for issuing certs for unassured members:
|
||||
(1) Person-unassured; (2) Client-unassured; (3) Server-unassured
|
||||
|
||||
Every set consists of 3 Subordinate CA certs: Person, Client, and Server.
|
||||
|
||||
"Person" is designed for real people. It provides person name, Email
|
||||
address(es) as SAN, and possibly the document/code signing ability.
|
||||
|
||||
"Client" is designed to be used for machines that act as a client and needs to authenticate to other systems, client certificates contain SAN DNS names and may contain a single host name in the Subject DN Common Name (CN) field. SAN are possible.
|
||||
|
||||
"Server" is designed to be used for machines that need to authenticate to relying parties, server certificates contain SAN DNS names and may contain a single host name in the Subject DN Common Name (CN) field. SAN are possible.
|
||||
|
||||
## 06. Properties of the Root CA certificate
|
||||
|
||||
* Cert version: 3 (X.509v3)
|
||||
* Serial number: random number, length is 16 Bytes (CAB recommendation)
|
||||
* Signature Algorithm: sha256WithRSAEncryption
|
||||
* Signature Algorithm Hash: (sha256) implied by the signature algorithm
|
||||
* Issuer DN: C=<country>,L=<Location>,O=<organization>,CN=<Common_Name>
|
||||
* Validity (Not Before & Not After), Duration = 20 years (CAB recommendation)
|
||||
* Subject DN: as this is the Root CA, this item is equal to the Issuer DN item
|
||||
* Subject Public Key Info
|
||||
* Public Key Algorithm: RSAEncryption *(implied by the public key)*
|
||||
* RSA Public-Key: (4096 bit), then the Modulus value, Exponent 65537 (0x10001)
|
||||
* Public Key Parameters: 05 00
|
||||
* X509v3 Extensions
|
||||
* X509v3 Key Usage (critical)
|
||||
* Certificate (only subordinate CA certificates) Signing, CRL Signing; Offline CRL Signing
|
||||
* X509v3 Basic Constraints (critical)
|
||||
* Certificate of a CA: true
|
||||
* Path length restriction: none
|
||||
* X509v3 Subject Key Identifier (20 Byte ID)
|
||||
* Signature Algorithm: sha256WithRSAEncryption
|
||||
* Fingerprint: 20 Bytes *(fingerprint is dependent on the used hash algorithm,
|
||||
a certificate's TBSCertificate structure can be hashed/fingerprinted using
|
||||
any hash algorithm. 20 Bytes is what a SHA1 hash produces, it can be longer
|
||||
or shorter for other algorithms and is not directly included in the
|
||||
certificate)*
|
||||
|
||||
## 07. (removed, merged with 05.))
|
||||
|
||||
## 08. Properties of the "Person-assured" & "Person-unassured Subordinate CA certificates (Subroots, Intermediate Roots)
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: C=<Country>,L=<Location>,O=<Organization>,CN=<Common_Name>; if org., OU=<Org.Unit>
|
||||
Validity (Not Before & Not After), Duration = 5 years
|
||||
Subject DN (if the Organization Assurer, see the comment to the 05., Set #1a):
|
||||
C= (see 04. above)
|
||||
L= (see 04. above)
|
||||
O= (see 04. above)
|
||||
for "Person-assured": CN=CAcert Person-assured CA <year>
|
||||
for "Person-unassured": CN=CAcert Person-unassured CA <year>
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001)
|
||||
Public Key Parameters: 05 00 (i.e. NULL, see RFC 4055 # 1.2)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical)
|
||||
General Subordinate CA certificate purposes:
|
||||
Digital Signature, Certificate Signing, CRL Signing
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication (1.3.6.1.5.5.7.3.2)
|
||||
Code signing (1.3.6.1.5.5.7.3.3) (for "Person-assured" only)
|
||||
Email protection (1.3.6.1.5.5.7.3.4)
|
||||
OCSP signing (1.3.6.1.5.5.7.3.9)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:0
|
||||
X509v3 Subject Key Identifier: (20 Byte ID)
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the Root CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
URI:http://www.cacert.org/certs/rsa_root_<year>.crt (Root CA cert. file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/<CRL_file>:
|
||||
for "Person-assured": rsa_personA_<year>.crl
|
||||
for "Person-unassured": rsa_personU_<year>.crl
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
|
||||
## 09. Properties of the "Client-assured" & "Client-unassured" Subordinate CA certificates
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: C=<country>,L=<Location>,O=<Organization>,CN=<Common_Name>,OU=<Org.Unit>
|
||||
Validity (Not Before & Not After), Duration = 5 years
|
||||
Subject DN (if the Organization Assurer, see the comment to the 05., Set #1a):
|
||||
C= (see 04. above)
|
||||
L= (see 04. above)
|
||||
O= (see 04. above)
|
||||
for "Client-assured": CN=CAcert Client-assured CA <year>
|
||||
for "Client-unassured": CN=CAcert Client-unassured CA <year>
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001)
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical)
|
||||
General Subordinate CA certificate purposes:
|
||||
Digital Signature, Certificate Signig, CRL Signing
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Client Authentication (1.3.6.1.5.5.7.3.2)
|
||||
OCSP Signing (1.3.6.1.5.5.7.3.9)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:0
|
||||
X509v3 Subject Key Identifier: (20 Byte ID)
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the Root CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
URI:http://www.cacert.org/certs/rsa_root_<year>.crt (Root CA cert. file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/<CRL_file>:
|
||||
for "Client-assured": rsa_clientA_<year>.crl
|
||||
for "Client-unassured": rsa_clientU_<year>.crl
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
|
||||
## 10. Properties of the "Server-assured" & "Server-unassured" Subordinate CA certificates
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: C=<Country>,L=<Location>,O=<Organization>,CN=<Common_Name>,OU=<Org.Unit>
|
||||
Validity (Not Before & Not After), Duration = 5 years
|
||||
Subject DN (derived from Issuer, varies in Subject: CN=name-reflecting-purpose)
|
||||
(if the Organization Assurer, see the comment to the 05., Set #1a)
|
||||
C= (see 04. above)
|
||||
L= (see 04. above)
|
||||
O= (see 04. above)
|
||||
for "Server-assured": CN=CAcert Server-assured CA <year>
|
||||
for "Server-unassured": CN=CAcert Server-unassured CA <year>
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001)
|
||||
Public Key Parameters: 05 00 (= NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical)
|
||||
General Subroot purposes:
|
||||
Digital Signature, Certificate Signing, CRL Signing
|
||||
X509v3 Extended Key Usage:
|
||||
TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
|
||||
OCSP Signing (1.3.6.1.5.5.7.3.9)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:TRUE, pathlen:0
|
||||
X509v3 Subject Key Identifier: (20 Byte ID)
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the Root CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_root_<year>.crt (Root CA cert. file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/<CRL_file>:
|
||||
for "Server-assured": rsa_serverA_<year>.crl
|
||||
for "Server-unassured": rsa_serverU_<year>.crl
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
|
||||
## 11. Users' (end) certificates
|
||||
|
||||
These are issued by (signed with) Subordinate CA certificates only. Some properties are constant for those certs, some differ according to the respective Subordinate CA certificate only, and some depends on the user's data. That's why it seems to be a good idea to
|
||||
design the patterns for certs issued.
|
||||
|
||||
## 12. The proposal of the pattern "Person-assured"
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes; source: Signer
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: equal to the "Person-assured" Subordinate CA certificate's Subject; source: "Person-assured" Subordinate CA certificate Validity (Not Before & Not After), Duration = 1 year (CAB recommandation)
|
||||
Subject DN: CN = real_name of the user, E = Email address(es); source: user's account
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001); source: CSR
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical):
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage: (source: "Person-assured" Subordinate CA certificate, and the user's account)
|
||||
TLS Web Client Authentication (1.3.6.1.5.5.7.3.2)
|
||||
Code signing (1.3.6.1.5.5.7.3.3); TRUE/FALSE, source: user's account
|
||||
Email protection (1.3.6.1.5.5.7.3.4)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier: (20 Byte ID); source: CSR
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the "Person-assured" Subordinate CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_personA_<year>.crt ("Person-assured" Subordinate CA certificate file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/rsa_personA_<year>.crl ("Person-assured" Subordinate CA certificate CRL file)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
For 1 or more verified (and selected by the user) Email address(es) a SAN string will be added; (source: user's account & user's selection).
|
||||
|
||||
## 13. The proposal of the pattern "Person-unassured"
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes; source: Signer
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: equal to the "Person-unassured" Subordinate CA certificate's Subject; source: "Person-unassured" Subordinate CA certificate
|
||||
Validity (Not Before & Not After), Duration = 6 months
|
||||
Subject DN: CN = "CAcert WoT User" OR "<user's name> (unassured)", E = Email address(es); source: user's account
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001); source: CSR
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical):
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage: (source: "Person-unassured" Subordinate CA certificate)
|
||||
TLS Web Client Authentication (1.3.6.1.5.5.7.3.2)
|
||||
Email protection (1.3.6.1.5.5.7.3.4)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier: (20 Byte ID); source: CSR
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the "Person-unassured" Subordinate CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_personU_<year>.crt ("Person-unassured" Subordinate CA certificate file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/rsa_personU_<year>.crl ("Person-unassured" Subordinate CA certificate CRL file)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
For 1 or more verified (and selected by the user) Email address(es) a SAN string will be added; (source: user's account & user's selection).
|
||||
|
||||
## 14. The proposal of the pattern "Client-assured"
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes; source: Signer
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: equal to the "Client-assured" Subordinate CA certificate's Subject; source: "Client-assured" Subordinate CA certificate
|
||||
Validity (Not Before & Not After), Duration = 1 year (CAB recommandation)
|
||||
Subject DN: CN = client's FQDN; source: user's account
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001); source: CSR
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical):
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage: (source: "Client-assured" Subordinate CA certificate)
|
||||
TLS Web Client Authentication (1.3.6.1.5.5.7.3.2)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier: (20 Byte ID); source: CSR
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the "Client-assured" Subordinate CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_clientA_<year>.crt ("Client-assured" Subordinate CA certificate file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/rsa_clientA_<year>.crl ("Client-assured" Subordinate CA certificate CRL file)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
For 1 or more verified (and selected by the user) domains -> FQDNs a SAN string will be added; (source: user's account & user's selection).
|
||||
|
||||
## 15. The proposal of the pattern "Client-unassured"
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes; source: Signer
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: equal to the "Client-unassured" Subordinate CA certificate's Subject; source: "Client-unassured" Subordinate CA certificate
|
||||
Validity (Not Before & Not After), Duration = 6 months
|
||||
Subject DN: CN = client's FQDN; source: user's account
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001); source: CSR
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical):
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage: (source: "Client-unassured" Subordinate CA certificate)
|
||||
TLS Web Client Authentication (1.3.6.1.5.5.7.3.2)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier: (20 Byte ID); source: CSR
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the "Client-unassured" Subordinate CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_clientU_<year>.crt ("Client-unassured" Subordinate CA certificate file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/rsa_clientU_<year>.crl ("Client-unassured" Subordinate CA certificate CRL file)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
For 1 or more verified (and selected by the user) domains -> FQDNs a SAN string will be added; (source: user's account & user's selection).
|
||||
|
||||
# 16. The proposal of the pattern "Server-assured"
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes; source: Signer
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: equal to the "Server-Assurer" Subordinate CA certificate's Subject; source: "Server-Assurer" Subordinate CA certificate
|
||||
Validity (Not Before & Not After), Duration = 1 year (CAB recommandation)
|
||||
Subject DN: CN = server's FQDN; source: user's account
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001); source: CSR
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical):
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage: (source: "Server-Assurer" Subordinate CA certificate)
|
||||
TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier: (20 Byte ID); source: CSR
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the "Server-assured" Subordinate CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_serverA_<year>.crt ("Server-assured" Subordinate CA certificate file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/rsa_serverA_<year>.crl ("Server-Assurer" Subordinate CA certificate CRL file)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
For 1 or more verified (and selected by the user) domains -> FQDNs a SAN string will be added; (source: user's account & user's selection).
|
||||
|
||||
## 17. The proposal of the pattern "Server-unassured"
|
||||
|
||||
Cert version: 3 (X.509v3)
|
||||
Serial number: random number, length is 16 Bytes; source: Signer
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Signature Algorithm Hash: sha256
|
||||
Issuer DN: equal to the "Server-nonAssurer" Subordinate CA certificate's Subject; source: "Server-nonAssurer" Subordinate CA certificate
|
||||
Validity (Not Before & Not After), Duration = 6 months
|
||||
Subject DN: CN = server's FQDN; source: user's account
|
||||
Subject Public Key Info
|
||||
Public Key Algorithm: RSAEncryption
|
||||
RSA Public-Key: (3072 bit), then the Modulus value, Exponent 65537 (0x10001); source: CSR
|
||||
Public Key Parameters: 05 00 (NULL)
|
||||
X509v3 Extensions
|
||||
X509v3 Key Usage (critical):
|
||||
Digital Signature, Key Encipherment, Key Agreement
|
||||
X509v3 Extended Key Usage: (source: "Server-unassured" Subordinate CA certificate)
|
||||
TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)
|
||||
X509v3 Basic Constraints: critical
|
||||
CA:FALSE
|
||||
X509v3 Subject Key Identifier: (20 Byte ID); source: CSR
|
||||
Authority Key ID (20 Bytes ID, equal to the Subject Key ID of the "Server-unassured" Subordinate CA certificate)
|
||||
Authority Information Access (AIA):
|
||||
OCSP (1.3.6.1.5.5.7.48.1) - URI:http://ocsp.cacert.org/
|
||||
CA Issuer (1.3.6.1.5.5.7.48.2)
|
||||
- URI:http://www.cacert.org/certs/rsa_serverU_<year>.crt ("Server-nonAssurer" Subordinate CA certificate file)
|
||||
X509v3 Certificate Policies:
|
||||
Policy: 1.3.6.1.4.1.18506.2.3.1 (18506 = org. number, here: CAcert; 2.3.1 = CPS)
|
||||
X509v3 CRL Distribution Points:
|
||||
Full Name:
|
||||
URI:http://crl.cacert.org/rsa_serverU_<year>.crl ("Server-nonAssurer" Subordinate CA certificate CRL file)
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Fingerprint: 20 Bytes
|
||||
For 1 or more verified (and selected by the user) domains -> FQDNs a SAN string will be added; (source: user's account & user's selection).
|
||||
|
||||
# Jan's comments:
|
||||
|
||||
The Subroot "Person" should be used for identifying real people. Certificates
|
||||
issued by that Subordinat CA can be used to digitaly sign emails and documents
|
||||
and for identifying as that person in Web applications (i.e. for our OpenID
|
||||
Connect implementation or other applications that support client certificates
|
||||
for user authentication).
|
||||
|
||||
For Person certificates the CN (Common Name) of the Subject DN should contain
|
||||
the Name as assured by CAcert. The person certificates should contain a user
|
||||
selected list of email addresses as RFC822 Subject Alternative Name extensions.
|
||||
We might still include emailAdress parts in the Subject DN, but this is
|
||||
deprecated. There are still some applications that expect email addresses
|
||||
there.
|
||||
|
||||
The Subroot "Client" should be used for client certificate authentication, but
|
||||
more for machine-to-machine communication scenarios. From my point of view the
|
||||
SubjectDN should have a Common Name identifying a machine name or some
|
||||
arbitrary application identifier. An example could be "CAcert Assurer Training
|
||||
System" for our CATS system. The Subject Alternative Name might contain DNS
|
||||
names from domains that are assigned to a user or organisation. It may also
|
||||
contain RFC822 Subject Alternative Names (in case of some functional address
|
||||
that corresponds to an application, like "cats@cacert.org").
|
||||
|
||||
The Subroot "Server" should be used for TLS server certificates. The CN of the
|
||||
SubjectDN could contain a hostname. These certificates must contain DNS Name
|
||||
Subject Alternative Names (at least one for the primary hostname, could be
|
||||
more). The hostnames should be from a verified domain of a user or
|
||||
organisation.
|
||||
|
||||
I think it would be a good idea to have separate Sub CA certificates for users
|
||||
that have not been assured yet, to make it visible that these have been issued
|
||||
according to different rules (currently we use "WoT user" in their Subject DNs
|
||||
CN field). I think this separation would make it much clearer and would allow
|
||||
relying parties to only accept certificates that correspond to assured users
|
||||
without making assumptions on specific attributes of certificates.
|
||||
|
||||
That would mean that we have at least 1 root CA certificate (maybe 2 if we
|
||||
would like to provide EC in addition to RSA). And 6 Sub CA certificates (3 for
|
||||
assured users, 3 for non-assured users).
|
||||
|
||||
# Jan's remarks to ver. 2:
|
||||
|
||||
ad # 04
|
||||
*Remark:* OU does not make a lot of sense here. There is no specific
|
||||
"Organizational Unit". The Critical team might be such a unit, but I would not include that in the Subject DNs of CA certificates.
|
||||
|
||||
*Remark:* we should use the terms Issuer Distinguished Name (Issuer DN),
|
||||
Subject Distinguished Name (Subject DN), Root CA certificate and Subordinate CA certificate consistently
|
||||
|
||||
ad # 05
|
||||
*Remark:* I think the first set is not for assurers but for assured members, the other set is for unassured members. Assurers are special in that they have enough assurance points and passed the required CATS exam to assure other members
|
||||
|
||||
*Remark:* It may be a good idea to have a separate third set of Subordinate CA certificates to be used for organization certificates. In addition to the properties defined for personal certificates they could contain Organization (O) and optional Organizational Unit (OU) fields in the Subject DN field. ***
|
||||
|
||||
ad # 06
|
||||
* Public Key Algorithm: RSAEncryption *(implied by the public key)*
|
||||
|
||||
* Fingerprint: 20 Bytes *(fingerprint is dependent on the used hash algorithm,
|
||||
a certificate's TBSCertificate structure can be hashed/fingerprinted using
|
||||
any hash algorithm. 20 Bytes is what a SHA1 hash produces, it can be longer
|
||||
or shorter for other algorithms and is not directly included in the
|
||||
certificate)*
|
||||
|
||||
ad # 07
|
||||
Remark*: Is there any new information to part 05 above? I would suggest to
|
||||
avoid duplication
|
||||
|
||||
ad # 08
|
||||
*See remarks for Root CA and for the differentiation between assured-members
|
||||
and unassured-members above. I suggest to use Person (assured) vs. Person
|
||||
(unassured) or something similar in the Subordinate CA's Subject DN Common
|
||||
Name (CN) field*
|
||||
|
||||
ad # 09
|
||||
*Same remarks as for the Root CA certificate and the Person CA certificates*
|
||||
|
||||
ad # 10
|
||||
*Same remarks as for the Root CA certificate and the Person CA certificates*
|
||||
|
||||
ad # 11
|
||||
*Remarks* we should use the standard term end-entity certificate
|
||||
|
||||
ad # 12
|
||||
*Remarks*:
|
||||
* same remarks as for Root CA certificate and Subordinate CA certificates
|
||||
* for unassured person certificates I suggest to add a "(unassured)"
|
||||
suffix to the CN part of the Subject DN to make this fact explicit
|
||||
* OCSP signing EKU MUST NOT be included in end-entity certificates for users
|
||||
|
||||
ad # 13
|
||||
*Remarks:*
|
||||
* same remarks as for "Person-assured"
|
||||
* as an alternative to "CAcert WoT User" we might use the member's real name
|
||||
with a suffix just as "(unassured)"
|
||||
|
||||
ad # 14
|
||||
*Remarks:*
|
||||
* same as for CA and Person end-entity certificates
|
||||
* client certificates MUST NOT contain the OCSP Signing EKU
|
||||
* there might be client certificates for email addresses that belong to
|
||||
organizations (i.e. functional mailboxes), that is one of the reasons I
|
||||
recommend to create a set of organization Subordinate CA certificates in
|
||||
addition to the 2 proposed sets, such client certificates may need
|
||||
digitalSignature and emailProtections EKU in addition to client
|
||||
authentication
|
||||
|
||||
ad # 15
|
||||
Remarks:*
|
||||
* same remarks as for "Person unassured"
|
||||
* OCSP signing EKU MUST NOT be included
|
||||
* SANs can only be DNS names (FQDNs) from domains that have been verified to
|
||||
be under control of the member
|
||||
|
||||
ad # 16
|
||||
*Remarks:*
|
||||
* same remarks as for "Person assured"
|
||||
* OCSP signing EKU MUST NOT be included in general. OCSP signing may only be
|
||||
included in certificates that are issued for CAcert critical-team members.
|
||||
The web application needs an option to issue such certificates for CAcert
|
||||
critical admin team personal
|
||||
* SANs can only be DNS names (FQDNs) from domains that have been verified to
|
||||
be under control of the member
|
||||
* issuing of OCSP certificates is a very special case. Critical team members
|
||||
must be able to create OCSP signing certificates for each Subordinate CA.
|
||||
The EKU MUST NOT be added to any end-entity certificate for regular members
|
||||
|
||||
ad # 17
|
||||
*Remarks:*
|
||||
* same remarks as for "Person unassured"
|
||||
* SANs can only be DNS names (FQDNs) from domains that have been verified to
|
||||
be under control of the member
|
||||
|
BIN
RSA-tree.jpg
Normal file
BIN
RSA-tree.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 220 KiB |
Loading…
Reference in a new issue