Challenge PKI 2002 IETF PKI

Similar documents
untitled

第3 章 電子認証技術に関する国際動向

untitled

<4D F736F F F696E74202D B F8089BB82CC88EA91A496CA C982A882AF82E9504B4982CC8FF38BB52E707074>

はじめに

Katsuhito Asano Fujitsu LTD /Apr/2002 1

PKIの標準化動向と リソースPKI

/07/ /10/12 I

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

XMLを基盤とするビジネスプロトコルの動向

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A


YMS-VPN1_User_Manual

untitled

untitled

電子メールのセキュリティ

sp c-final

LAN LAN LAN LAN LAN LAN,, i

Testing XML Performance

untitled

, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

IC API

T - Telecommunication and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Part 1: Overview and Intro

untitled

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

Microsoft PowerPoint - T9-inada-IW2002.ppt

JP1/Integrated Management - Service Support 操作ガイド


★保健医療科学_第67巻第2号.indb


楕円曲線暗号の整備動向 +楕円暗号の実装状況

幅広い業種や業務に適応可能なRFIDソリューション

untitled

untitled

GPGPU

( )

"CAS を利用した Single Sign On 環境の構築"

ENUM

マイナンバーカードによる認証と署名

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド


AirMac ネットワーク for Windows


Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

AirMac ネットワーク構成の手引き

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

XJTAG

情報セキュリティの現状と課題

大学における原価計算教育の現状と課題

LC304_manual.ai

untitled

JOURNAL OF THE JAPANESE ASSOCIATION FOR PETROLEUM TECHNOLOGY VOL. 66, NO. 6 (Nov., 2001) (Received August 10, 2001; accepted November 9, 2001) Alterna

Juniper Networks Corporate PowerPoint Template

署名ツール検証報告書

untitled

JR4 JR 3 JR4 KUSUKI, Yukio JR 4 JR JR JR JR JR JR JR , ,530/90 17/ JR

untitled

Agenda IPv4 over IPv6 MAP MAP IPv4 over IPv6 MAP packet MAP Protocol MAP domain MAP domain ASAMAP ASAMAP 2

untitled

Google Social Influences and Legal Issues of Google Street View Hiroshi Takada

IPv6 IPv IETF IPv6 2

集中講義 インターネットテクノロジー 第5回

untitled

Microsoft Intune MDM ソリューション向けDigiCert® 統合ガイド

<95DB8C9288E397C389C88A E696E6462>

Microsoft Word - PCM TL-Ed.4.4(特定電気用品適合性検査申込のご案内)

"CAS を利用した Single Sign On 環境の構築"

e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto

Encryption Security

untitled

,,,,., C Java,,.,,.,., ,,.,, i


untitled

インターネットレジストリにおける レジストリデータの保護と応用

rzat10pdf.ps

RPKIとインターネットルーティングセキュリティ

untitled

内閣官房情報セキュリティセンター(NISC)

証明書検証サーバ

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1

1 1 tf-idf tf-idf i

2011 NTT Information Sharing Platform Laboratories

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval


Trial Study to Aggregate the Flow of Relief Funds for the Great East Japan Earthquake: Matrix of Relief Fund Inflow and Outflow Abstract The 2011 Grea

資料1-3

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

2

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

2 33,**. + : +/* /++** +/* /++** +/* /++** /** /** F+ +*** F+ +*** / 1*42.,43 /14+,*42 /, , 134,.,43 / 0-41,*42.4, -/41,*43,34,,+4. +

wide97.dvi

JPGRID-GGF0205 第 5 回 GGF 調査会 globusworld 参加報告 株式会社 SRA グローバルITサービスカンパニー開発部産業第 4グループ 平野基孝 Programs 8 Tutorial 2: Grid Services and Web Services 8 Track

3. /dev/urandom 1024 ~CA0/private/cakey.pem $ openssl genrsa -rand /dev/urandom -out \ private/cakey.pem 1024 Generating RSA private key

Oracle Identity Managementの概要およびアーキテクチャ

RTM RTM Risk terrain terrain RTM RTM 48

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

橡C12電子メール最新技術動向revisd.PDF

Transcription:

Challenge PKI 2002 IETF PKI <Ryu.Inada@fujixerox.co.jp> 2003 64

Agenda IETF? IETF PKI JNSAIETF Copyright (c) 2003 NPO Page 2

IETF? RFC www.ietf.org 8 WG Applications, General, Internet, Operations and Management, Routing, Security, Sub-IP, Transport8 3 (2 1 ) 7 (Vienna) Copyright (c) 2003 NPO Page 3

IETF ( 2) Copyright (c) 2003 NPO Page 4

IETF IPv6 / / IP IP (SIP) IPsec/SSH/PKI Copyright (c) 2003 NPO Page 5

IETF Internet / Internet-Drafts IESG IT Copyright (c) 2003 NPO Page 6

56 th IETF 2003316 321 San Francisco Hilton 34 325 1640( ) Copyright (c) 2003 NPO Page 7

IETF PKI Security Area PKIX-WG Security Area S/MIME TLS IP Area IPsec Operation AAA IETF PKI Copyright (c) 2003 NPO Page 8

IETF PKI S/MIME, TLS, IPsec, SIP, Diameter S/MIME, TLS, IPsec, SIP, Diameter S/MIME, IPsec, SIP, Diameter / PKIX PKI BOF/WG? Copyright (c) 2003 NPO Page 9

PKIX-WG RFC 337: DPD(Delegated Path Discovery)/DPV(Delegated Path Verification) EE 56 th IETF PKIX-WGSCVP Proxy Certificate / Qualified Certificate? PKI TAP OASIS/W3C/EESSI/JNSA Copyright (c) 2003 NPO Page 10

JNSAIETF 54@ PKIX-WGChallenge PKI 2001 55@Atlanta PKIX-WGChallenge PKI 2002 56@San Francisco PKIX-WGChallenge PKI 2002 Copyright (c) 2003 NPO Page 11

56 th IETF Security Area Director MITJeffrey I. Schiller Russell Housley Virgil Security RSA Laboratories. RFC2459/3280 S/MIME WG Copyright (c) 2003 NPO Page 12

56 th IETF PKIX-WG : 76 Chairs: Stephen Kent(BBN), Tim Polk(NIST) 19 Internet-Drafts(I-Ds) Last Call SCVP, Proxy Cert Expire Draft Area Director Repository Locator Service Copyright (c) 2003 NPO Page 13

Copyright (c) 2003 NPO Page 14

Agenda DPD/DPV standard selection process SCVP Discussion Proxy Certificates Signature Algorithms & Key Usage Trusted Archive Protocol Qualified Certificates Profile LDAP/X.500 alignment Subject Identification Method EESSI JNSA ChallengePKI 2002 LDAP PKI Issues Liaison Copyright (c) 2003 NPO Page 15

DPV/DPD Strawpoll Tim Polk(NIST) RFC3379 SCVP, CVP, DVCS, OCSPv2 Matrix Matrix ML Matrix PKIXML SCVP RFC3379 Copyright (c) 2003 NPO Page 16

SCVP - Trevor Freemen (Microsoft) 5 57 th @Vienna LastCall MAC RFC3379? ValidationPolicy S/MIME, IPsec, TLS Copyright (c) 2003 NPO Page 17

Proxy Cert - Von Welch (Argonne Labs) EE ( )EE issueree ProxyCertificate critical ProxyCert ProxyCert WGLast Call Copyright (c) 2003 NPO Page 18

Copyright (c) 2003 NPO Page 19

Signature Algorithms & Key Usage Jim Schaad (Soaring Hawk Consulting) PKCS#1PSS/OAEPDH/DSA keyusage algorythmid Russ, Steve Kent, Tim Copyright (c) 2003 NPO Page 20

Copyright (c) 2003 NPO Page 21

Trusted Archive Protocol Carl Wallace (Cygnacom) ( ) Data Validation: Evidence verification Path Processing: Evidence Collection TSP message CMS www.openevidence.org DVCS? WG Draft MLTAP DVCS Peter Sylvester PKIXEXT PKIXAPPS WG Copyright (c) 2003 NPO Page 22

Copyright (c) 2003 NPO Page 23

QC Profile - Stefan Santesson (RetroSpekt) Scope For identify certs issued to physical persons # Legal Regurations? DN issuer RFC3280 keyusage nonrepudiation Copyright (c) 2003 NPO Page 24

Copyright (c) 2003 NPO Page 25

LDAP/X.500 alignment Skip Slone (Lockheed-Martin) X.500 5 th 2005 ;binary enhanced Matching nonrepudiation contentcommitment Copyright (c) 2003 NPO Page 26

Subject Identification Method - Park Jong-Wook (KISA) non-public peronsl ID sensitive ID: national Id protection ID: national Id 3 revise Copyright (c) 2003 NPO Page 27

Copyright (c) 2003 NPO Page 28

EESSI Riccardo Genghini European Electronic Signature Standardization Initiative EU 57 th Vienna PKIX/EESSI Copyright (c) 2003 NPO Page 29

Copyright (c) 2003 NPO Page 30

JNSA ChallengePKI2002 JNSA Challenge PKI 2002 Copyright (c) 2003 NPO Page 31

Copyright (c) 2003 NPO Page 32

Copyright (c) 2003 NPO Page 33

LDAP PKI Issues David Chadwick (Univ of Salford) subjectdn CRL component matching Attribute Extraction CA/RA LDAP LDAP ComponentMatching Copyright (c) 2003 NPO Page 34

Copyright (c) 2003 NPO Page 35

Copyright (c) 2003 NPO Page 36

Copyright (c) 2003 NPO Page 37

Multi Domain PKI Test Suite -- Result of JNSA Challenge PKI 2002 -- Ryu Inada <Ryu.Inada@fujixerox.co.jp> As representative of NPO Japan Network Security Association Sponsored by IT Promotion Agency, Japan

JNSA Challenge PKI 2002 As we reported on 11-Nov-2002/56 th IETF, we, JNSA, make a Multi Domain PKI Test Suite. We finished work at 28-Feb-2003, and prepare to open it public and translation to English. Estimated date of open to public: End of June 2003 Estimated date of translation to English : End of June 2003 20-Mar-2003 56th IETF PKIX-WG 2

20-Mar-2003 56th IETF PKIX-WG 3

PKI interoperability test suite 20-Mar-2003 56th IETF PKIX-WG 4

Challenge PKI 2002 - Test Cases 20-Mar-2003 56th IETF PKIX-WG 5

Sample implementations In Java Worked on JDK 1.4 Based on Path Discovery/Path Validation API which provided from reference implementation. And additional Path Discovery/Path Validation logic which concerned multi domain PKI environment. In C++ Worked on Microsoft Crypto API. Using Windows original Revocation Service Provider and additional Path Discovery/Path Validation logic which concerned multi domain PKI environment. 20-Mar-2003 56th IETF PKIX-WG 6

Requirement of GPKI and implementations Requirement Impl. of GPKI *1 CRL IDP ( issuing distribution point ) 20-Mar-2003 56th IETF PKIX-WG 7

Sample implementation for 20-Mar-2003 56th IETF PKIX-WG 8

Sample implementation for JAVA GPKICertPathBuilderSpi GPKICertPathChecker GPKICertPathValidatorSpi java.security.cert.* We extend original JDK s path builder/path checker interface. 20-Mar-2003 56th IETF PKIX-WG 9

To achieve more Applicable Test Suite... Provide Framework more applicable & reusable Easy to extract minimal test case There are too many test cases about 256 cases. For easily modified to you purpose: PKIX, GPKI, and other frameworks Ready for Multi-domain PKI Re-usable for others No depend on environment Run on your local environment maybe linux or cygwin? We need two Reference!! Define multi-domain PKI PKI Define DB DB Schema to to re-use 20-Mar-2003 56th IETF PKIX-WG 10

Related Links NPO JNSA http://www.jnsa.org/english/e_index.html IPA Security Center http://www.ipa.go.jp/security/index-e.html JNSA Challenge PKI 2002 http://www.jnsa.org/english/e_active2_10.html Implementation Problems on PKI ( JNSA Challenge PKI 2001 ) http://www.ipa.go.jp/security/fy13/report/pki_interop/chala nge2001.html The report of Challenge PKI in IETF Atlanta http://www.ietf.org/proceedings/02nov/slides/pkix-5.pdf 20-Mar-2003 56th IETF PKIX-WG 11

Demonstration 20-Mar-2003 56th IETF PKIX-WG 12