At 10:46 AM +1000 6/26/10, Robert Loomans wrote:
...

The provisioning protocol uses PKCS #10 certificate requests, and doesn't currently have any provision for PoP.

PKCS #10 includes provision for POP for keys/algs that support signatures, e.g., RSA. RFC 5272 section 6.3 says:

Proof-of-possession information for key pairs, however, is carried separately for each PKCS #10 or CRMF certification request. (For keys capable of generating a digital signature, the POP is provided by the signature on the PKCS #10 or CRMF request. ...)

Section 3.4.1 of the provisioning protocol says:

[Certificate request]
value is the certificate request. This is a Base-64 encoded DER version of a request formatted using PKCS#10.

If one follows the usual PKCS #10 convention of signing the request with the private key corresponding to the public key in the request, we have PoP. I had assumed (perhaps erroneously) that the CMS envelope would be signed using a BPKI key, for authorization purposes.

But, the nesting of all of this, including the XML, is complex, so ...

A diagram might help :-).

...

The key and algorithm info are in the certificate request. Is that enough?

In PKCS #10 these would refer to the key being certified by the Issuer. What we need here is the ability to specify which of two algs are to be used by the issuer. Again, I have never looked closely at this document and thus I'm not sure to which specific fields you are referring.

Steve
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to