At 2:59 PM +1000 4/4/07, Geoff Huston wrote:
...
3.In 4, last paragraph: "... Where two or more CRLs issued by a single CA are present in a certificate repository, the CRL with the highest value of the "CRL Number" field supersedes all other CRLs issued by this CA."

When doing a rekey, a CA may have more than one key pair working in parallel, therefore must issue more than one CRL. In this case, the highest CRL number does not supersede all CRLs by that CA.

I've consulted section 5.2.3 of RFC 3280 and the text is that a CRL Number "conveys a monotonically increasing sequence number for a given CRL scope and CRL issuer. This extension allows users to easily determine when a particular CRL supersedes another CRL."

Section 4 of this draft already defines the scope as "all certificates issued by this CA" and the "The CRL Issuer is the CA"

So even when re-keying in the CA, RFC3280 appears to indicate that the highest CRL supersedes all other CRL.

When a CA is re-keyed, that establishes a new scope, so there will be two CRL sequences, one for the old key and one for the new key. I realized this last year when Robert and I were discussing this topic and I sent a message trying to clarify the conclusion we reached back then. Both the old and new CRLs need to be present in parallel, until all the old certs expire or until the old CA cert expires, whichever comes first. The sequences for both sets of CRLs are numbered independently.

4. In 4.5, Signature can be RSA-SHA-256 only. Looking back at 3.3, I miss RSA-SHA-384 and RSA-SHA-512 from here.

There is no a priori requirement that the same algorithms options be present for CRLs. and yes, the profile says only SHA-256. Do you see merit in adding RSA-SHA-384 and RSA-SHA-512 for CRLs?

all of the text that talks about multiple hash algorithms has a problem, i.e., it does not establish what a CA and an RP MUST support. We need to be more explicit here. We cannot allow a CA to use algorithms that we do not require ALL RPs to support.


12. In 6.1 we see "The only exception to the "no loop" condition would be where a putative trust anchor may issue a self-signed root certificate." This is confusing: "a self-signed certificate" by definition cannot be issued by anyone else but itself. The may be signed by the trust anchor key though.

Its probably better to remove this sentence, and add the following

The trust anchor information, describing a CA that serves as a trust anchor, includes the following:
  (1) the trusted issuer name,
  (2) the trusted public key algorithm,
  (3)the trusted public key,
(4)optionally, the trusted public key parameters associated with the public key, and (5) a resource set, consisting of a set of IPv4 resources, IPv6 resources and AS number resources.

The trust anchor information may be provided to the path processing procedure in the form of a self-signed certificate.

I agree with this TA description, although I would delete the word "trusted" from the items, because its redundant. 1-4 are defined in 3280 and 5 is defined as the additional set of parameters needed by 3779, so this is correct.

Steve

_______________________________________________
Sidr mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/sidr

Reply via email to