PKIX-1 new draft/Last Call?
Tim Polk <wpolk@nist.gov> Wed, 30 July 1997 20:24 UTC
Received: by suntan.tandem.com (8.6.12/suntan5.970212) for ietf-pkix-relay id NAA05607; Wed, 30 Jul 1997 13:24:37 -0700
Received: from csmes.ncsl.nist.gov by suntan.tandem.com (8.6.12/suntan5.970212) for <ietf-pkix@tandem.com> id NAA05599; Wed, 30 Jul 1997 13:24:34 -0700
Received: from st12.ncsl.nist.gov (st12.ncsl.nist.gov [129.6.54.66]) by csmes.ncsl.nist.gov (8.6.12/8.6.4jck0) with SMTP id QAA04124 for <ietf-pkix@tandem.com>; Wed, 30 Jul 1997 16:24:29 -0400
Message-Id: <3.0.2.32.19970730162601.006d4e58@csmes.ncsl.nist.gov>
X-Sender: polk@csmes.ncsl.nist.gov
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.2 (32)
Date: Wed, 30 Jul 1997 16:26:01 -0400
To: ietf-pkix@tandem.com
From: Tim Polk <wpolk@nist.gov>
Subject: PKIX-1 new draft/Last Call?
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
I have submitted a new draft of PKIX Part 1. I will attempt to summarize the changes in the document. 1. It's bigger. (Are you sitting down?) We're up to 107 pages - 45 of which are appendices. The main culprit is the two ASN.1 modules - one in 1988 syntax, the other 1993. 2. We have an RSA patent statement! 3. We have two example certificates and one CRL. (Together, they comprise a certificate path of length two.) Thanks to David Kemp and Michael Quinn from NSA for putting this together on *extremely* short notice. 4. There were a handful of unaddressed comments from Peter Williams and Charlie Gardiner as of Memphis. They are all taken care. (Well, I think they are taken care of. I should wait to hear from Peter and Charlie.) 5. KEA was removed and I have submitted a separate I-D profiling KEA certificates with respect to Part 1. The goal is an Informational RFC. (Part 1 could not be considered for standard status if it included a classified algorithm.) That takes care of the "old business". There were a number of new issues that arose on the list since the Memphis meeting. I never seemed to catch up before the threads died down, so I just read each thread and did my best to accomodate the "sense of the group." Here is an overview: 6. Key Usage - ISO added two new values: encipherOnly and decipherOnly. They are only defined if the keyAgreement value is asserted. Part 1 now includes these values as well. In addition, there was an extended discussion regarding which combinations of keyUsage values "make sense." The Part 1 text makes no general statements, but it does explicitly specify which combinations are appropriate when the subjectPublicKeyInfo field contains a key for algorithm X for any algorithm in section 7 (DSA, RSA, D-H). 7. ASN.1 tweaks. There are a couple. Thanks to Dean Povey and John Pawling in particular. One should be highlighted. Charlie Gardiner noticed an ambiguity in the encoding of a certificate without extensions. It could be encoded as version 3 with an empty SEQUENCE of extensions instead of version 1 or 2. The ASN.1 for Extensions Extension ::= SEQUENCE of Extension hads been modified to state Extension ::= SEQUENCE SIZE (1..MAX) of Extension This prevents a CA from issuing a version 3 certificate without extensions. In this case, the certificate should be version 1 or 2. 8. Path Validation Check this one closely! I re-wrote the path validation section, describing a path that begins with a self-signed certificate (containing the public key of your most trusted CA, for example). I believe this text explicitly addresses comments on the list (from Denis, Peter, and others) about use of local certificates to impose security policy, and it also describes extending the algorithm for multiple trusted certificates. (I believe this text will be more helpful for readers who are not path validation experts than repeating the X.509 text. However, I worry that some error crept in, making it incompatible with the X.509 text.) 9. Year 2000/Certificate validity A thread on year 2000 evolved into the differences between the latest ISO and PKIX-1 texts on validity dates. ISO was clearer and more acceptable to the group. I made the appropriate changes. 10. Subject Names The text now states that the subject and issuer distinguished name fields (where they are used) are X.500 Distinguished Names, not just some sequence of RDNs. I also added text from Warwick stating "The DN, when non-null, must be unique for each subject entity certified by the one CA. A CA may issue more than one certificate with the same DN to the same subject entity." 11. The Certificate Issuer CRL entry was added. Now - on to the "stuff we didn't do" A. unique ids There is no change here. The draft states that conforming CAs shall NOT populate this field; clients are required to process this field or reject certificates that include it. A vocal minority would like unique ids *required*. There is good reason the CA vendors are against unique ids. No one wants to use them, since we have no idea how to use or manage them. In addition, everything the minority wanted to do with the unique id could be done with the distinguished name or an alternative name. As you can tell, I am against unique ids and in the absence of a clear majority for using them, the text was not changed. B. ECDSA There seems to be support for a profile of ECDSA for PKIX. I would prefer a new document, though, instead of adding to Part 1. I am volunteering to work with Don Johnson from Certicom to prepare an I-D (like the KEA document) before the December meeting. (Note: there were several mildly negative comments on ECDSA regarding exclusion of Weil Theorem and complex multiplication methods for random number generation. These limitations were removed in the last ANSI X9.62 draft.) C. The SET Root CA extension There was thread of 16 messages regarding this extension. The group was pretty divided on this one. Since it is a critical extension, all PKIX-1 conforming clients would be required to implement it. I'm inclined to exclude it on that basis, but we should probably examine it a little more closely. D. Combination certificates There has been a recent thread on certificates containing both signature and confidentiality keys. Part 1 doesn't preclude this. The only recognized OIDs for subjectPublicKeyInfo fields correspond to one key (one RSA key, one DSA key OR one Diffie-Hellman key). I believe this is an acceptable compromise, especially since the biggest consumer of combination certificates (MISSI) is transitioning to separate certificates. Finally, I believe the document is ready for WG Last Call. I will make that request of the chairs. So, if you've been waiting to read this whale, now is the time! Regards, Tim Polk
- PKIX-1 new draft/Last Call? Tim Polk
- Re: PKIX-1 new draft/Last Call? Tim Polk