Folks,

We just submitted a new draft of the RPKI Certificate policy that has the changes listed below. Thanks go to Tomofumi Okubo for his careful review and feedback.

Karen

1.2. Overview

Deleted:
        "In the future, the PKI also may include end entity certificates
        in support of access control for the repository system as
        described in 2.4."


2.2. Publication of certification information

Added:
        "The CP will be published as an IETF RFC and will be available
        from the IETF RFC repository."


2.4. Access controls on repositories -- first sentence

Changed:

  From: "Each CA or repository operator SHOULD implement access
        controls to prevent unauthorized persons from adding,
        modifying or deleting repository entries."

  To:   "Each CA or repository operator MUST implement access
        controls to prevent unauthorized persons from adding,
        modifying or deleting repository entries."

2.4. Access controls on repositories -- 2nd sentence

Added:
        This data is supposed to be accessible to the public.

4.7.1. Circumstance for certificate re-key -- last paragraph

Changed:

  From: Section 5.6 below notes that when a CA signs a certificate,
        the signing key SHOULD have a validity period that exceeds the
        validity period of the certificate. This places additional
        constraints on when a CA SHOULD request a re-key.

  To:   Section 5.6 below notes that when a CA signs a certificate,
        its certificate SHOULD have a validity interval that is at
        least as long as the validity period of the certificate
        being signed. This places additional constraints on when a
        CA SHOULD request a re-key.

5.6 Key change over

Changed:

  From: When a CA wishes to change keys, it MUST acquire a new
        certificate containing the public key of its new key pair, well
        in advance of the scheduled change of the current signature key
        pair. The private key that a CA uses to sign a certificate or CRL
        SHOULD have a validity period that is at least as long as that of
        any certificate being issued under that certificate.

  To:   When a CA wishes to change keys, it MUST acquire a new
        certificate containing its new public key, well in advance of
        the scheduled change. This certificate SHOULD have a validity
        period that is at least as long as that of any certificate
        being issued under that certificate.


Added the following sections:

6.2.5. Private key archival
        The details of the process and procedures used to archive the
        CA's private key MUST be described in the CPS issued by the CA.

6.2.6. Private key transfer into or from a cryptographic module
        The details of the process and procedures used to transfer the
        CA's private key into or from a cryptographic module MUST be
        described in the CPS issued by the CA.

6.2.7. Private key storage on cryptographic module
        The details of the process and procedures used to store the CA's
        private key on a cryptographic module and protect it from
        unauthorized use MUST be described in the CPS issued by the CA.

6.2.8. Method of activating private key
        The details of the process and procedures used to activate the
        CA's private key MUST be described in the CPS issued by the CA.

6.2.9. Method of deactivating private key
        The details of the process and procedures used to deactivate
        the CA's private key MUST be described in the CPS issued by
        the CA.

6.2.10. Method of destroying private key
        The details of the process and procedures used to destroy the
        CA's private key MUST be described in the CPS issued by the CA.

6.2.11. Cryptographic Module Rating
        The security rating of the cryptographic module MUST be described
        in the CPS issued by the CA.

6.4 Activation data
        Each CA MUST document in its CPS how it will generate, install,
        and protect its activation data.

6.5. Computer security controls

Changed

  From: Each CA MUST document the technical security requirements it employs
        for CA computer operation in its CPS.

  To    Each CA MUST document the technical security measures it employs
        for CA computer operation in its CPS.

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to