ImageVerifierCode 换一换
格式:PDF , 页数:23 ,大小:993.42KB ,
资源ID:541489      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-541489.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ATIS 1000084-2018 Technical Report on Operational and Management Considerations for SHAKEN STI Certification Authorities and Policy Administrators.pdf)为本站会员(confusegate185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ATIS 1000084-2018 Technical Report on Operational and Management Considerations for SHAKEN STI Certification Authorities and Policy Administrators.pdf

1、 JOINT STANDARD ATIS-1000084 Technical Report on Operational and Management Considerations for SHAKEN STI Certification Authorities and Policy Administrators As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings together

2、the top global ICT companies to advance the industrys most pressing business priorities. ATIS nearly 200 member companies are currently working to address the All-IP transition, 5G, network functions virtualization, big data analytics, cloud services, device solutions, emergency services, M2M, cyber

3、 security, network evolution, quality of service, billing support, operations, and much more. These priorities follow a fast-track development lifecycle from design and innovation through standards, specifications, requirements, business use cases, software toolkits, open source solutions, and inter

4、operability testing. ATIS is accredited by the American National Standards Institute (ANSI). The organization is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of the oneM2M global initiative, a member of the International Telecommunic

5、ation Union (ITU), as well as a member of the Inter-American Telecommunication Commission (CITEL). For more information, visit www.atis.org. The SIP Forum is a leading IP communications industry association that engages in numerous activities that promote and advance SIP-based technology, such as th

6、e development of industry recommendations; interoperability testing events and special workshops, educational activities, and general promotion of IP communications standards, services, and technology for service provider, enterprise, and governmental applications. The SIP Forum is also the producer

7、 of the annual SIPNOC conferences (for SIP Network Operators Conference), focused on the technical requirements of the service provider community. One of the Forums technical activities is the development of the SIPconnect Technical Recommendation a standards-based SIP trunking recommendation that p

8、rovides detailed guidelines for direct IP peering and interoperability between IP PBXs and SIP-based service provider networks, and the SIPconnect Certification Testing Program, a unique certification testing program that includes a certification test suite and test platform, and an associated “SIPc

9、onnect Certified” logo program that provides an official “seal of certification” for companies products and services that have officially achieved conformance with the SIPconnect specification. Other important Forum initiatives include work in security, SIP and IPv6, and IP-based Network-to-Network

10、Interconnection (IP-NNI). For more information about all SIP Forum initiatives, please visit: Notice of Disclaimer (b) ensuring the administration of those policies; and (c) approving any cross-certification or interoperability agreements with CAs external to the PKI and any related policy mappings.

11、 The PMA may also be the accreditor for the PKI as a whole or for some of its components or applications. Private Key: In asymmetric cryptography, the private key is kept secret by the end-entity. The private key can be used for both encryption and decryption. RFC 4949 Public Key: The publicly discl

12、osable component of a pair of cryptographic keys used for asymmetric cryptography. RFC 4949 Public Key Infrastructure (PKI): The set of hardware, software, personnel, policy, and procedures used by a CA to issue and manage certificates. RFC 4949 Relying party: A system entity that depends on the val

13、idity of information (such as another entitys public key value) provided by a certificate. RFC 5217 Root CA: A CA that is directly trusted by an end-entity. See also Trust Anchor CA and Trusted CA. RFC 4949 ATIS-1000084 4 Service Provider Code: In the context of this document, this term refers to an

14、y unique identifier that is allocated by a Regulatory and/or administrative entity to a service provider. In the US and Canada this would be a Company Code as defined in ATIS-0300251.2007. Signature: Created by signing the message using the private key. It ensures the identity of the sender and the

15、integrity of the data. RFC 4949 Subscriber: A user that is registered in a PKI and, therefore, can be named in the “subject“ field of a certificate issued by a CA in that PKI. RFC 4949 Telephone Identity: An identifier associated with an originator of a telephone call. In the context of the SHAKEN f

16、ramework, this is a SIP identity (e.g., a SIP URI or a TEL URI) from which a telephone number can be derived. Trust Anchor: An established point of trust (usually based on the authority of some person, office, or organization) from which a certificate user begins the validation of a certification pa

17、th. The combination of a trusted public key and the name of the entity to which the corresponding private key belongs. RFC 4949 Trust Anchor CA: A CA that is the subject of a trust anchor certificate or otherwise establishes a trust anchor key. See also Root CA and Trusted CA. RFC 4949 Trust Authori

18、ty: An entity that manages a Trust List for use by one or more relying parties. RFC 5217 Trusted CA: A CA upon which a certificate user relies on for issuing valid certificates; especially a CA that is used as a trust anchor CA. RFC 4949 Trust List: A set of one or more trust anchors used by a relyi

19、ng party to explicitly trust one or more PKIs. RFC 5217 Trust Model: Describes how trust is distributed from Trust Anchors. 3.2 Acronyms & Abbreviations ACME Automated Certificate Management Environment (Protocol) ATIS Alliance for Telecommunications Industry Solutions CA Certification Authority CRL

20、 Certificate Revocation List CP Certificate Policy CPS Certification Practice Statement CSR Certificate Signing Request HTTPS Hypertext Transfer Protocol Secure IETF Internet Engineering Task Force JSON JavaScript Object Notation JWT JSON Web Token NNI Network-to-Network Interface NRRA National/Regi

21、onal Regulatory Authority NRRO National/Regional Regulatory Oversight OCSP Online Certificate Status Protocol PKI Public Key Infrastructure PKIX Public Key Infrastructure for X.509 Certificates PMA Policy Management Authority PTSC ATIS Packet Technologies and Systems Committee SHAKEN Signature-based

22、 Handling of Asserted information using toKENs SIP Session Initiation Protocol ATIS-1000084 5 SKS Secure Key Store SP Service Provider SP-KMS SP Key Management Server STI Secure Telephone Identity STI-AS Secure Telephone Identity Authentication Service STI-CA Secure Telephone Identity Certification

23、Authority STI-CR Secure Telephone Identity Certificate Repository STI-GA Secure Telephone Identity Governance Authority STI-PA Secure Telephone Identity Policy Administrator STI-VS Secure Telephone Identity Verification Service STIR Secure Telephone Identity Revisited TN Telephone Number URI Uniform

24、 Resource Identifier VoIP Voice over Internet Protocol 4 Overview The governance model in ATIS-1000080 introduces an STI-Policy Administrator that bridges the governance aspects of STI with the protocol requirements to support digital certificates RFC 5280 which are used by the SHAKEN framework ATIS

25、-1000074 to authenticate and verify telephone identities. Per the governance model and certificate management framework, the STI-PA maintains a list of trusted STI-CAs to be provided to the Authentication and Verification services. The STI-PA also provides for management of the Service Providers aut

26、horized to obtain certificates and provide STI functionality within the VoIP network. This document effectively extends the roles and functions of the STI-PA beyond those defined in ATIS-1000080 per the following diagram: ATIS-1000084 6 Figure 4.1 Governance Model for Certificate Management Clause 5

27、 of this document describes a Trust Authority Policy that establishes the relationship between the STI Governance Authority (STI-GA) and the STI-PAs operational responsibilities. In the context of SHAKEN, the approval of STI-CAs follows standard PKI practices, as outlined in RFC 3647, including the

28、definition of Certificate Policies as described in clause 6. The STI-PA defines a CP and the STI-CAs provide a CPS describing their adherence to the CP during the approval process. Details on the management of the list of STI-CAs are provided in clause 7 and the management of the authorized Service

29、Providers in clause 8. 5 STI-PA as Trust Authority As described in ATIS-1000080, the STI-GA is responsible for: Establishing policies governing which entities can manage the PKI and issue STI certificates. Defining the policies and procedures governing which entities can acquire STI certificates. AT

30、IS-1000084 7 The STI-PA applies and enforces any policies established by the STI-GA in its role as the Trust Authority. In this role, the STI-PA serves as the Trust Authority to the relying parties in the PKI. The STI-PA maintains the Trust List of authorized STI-CAs which each establish their own P

31、KI for issuing certificates, per the following diagram: Figure 5.1 Trust Model Each of the STI-CAs operates its own Root CA and PKI infrastructure similar to following diagram: Figure 5.2 PKI Model In a multi-stakeholder PKI model, typically a Policy Management Authority (PMA) is established, compri

32、sing a set of people responsible for ensuring that the established policies are being adhered to. The set is typically comprised of the stakeholders (e.g., service providers in the case of SHAKEN). The PMA defines a CP to be supported by the approved STI-CAs. The STI-CAs provide a CPS describing the

33、ir adherence to the CP during the approval process. An outline of the CP to be supported by the STI-CAs is provided in clause 6.1. ATIS-1000084 8 The STI-PA defines a Trust Authority Policy, including the following: STI-CAs shall not inherit trust from other STI-CAs in the deployment of the SHAKEN f

34、ramework (i.e., the STI-PA is the only trust authority). To preclude this, policy mapping shall be inhibited. An STI-PA may remove an STI-CA from the list of trusted STI-CAs based on specific criteria such as a failure to comply with the CP established by the STI-PA or other criteria as defined by t

35、he STI-GA. Typically, compliance is audited by the PMA and thus guidelines must be established for the timeframe in which an identified problem must be resolved. Other policies established by the STI-GA for operation of the STI-PA. Beyond the role of managing the list of trusted STI-CAs, the STI-PA

36、also serves as a Trust Anchor to the relying parties in the PKI by providing service providers with the Service Provider Code Token that is used by the STI-CA in determining whether the Service Provider requesting issuance of certificates is authorized. In the context of SHAKEN, whether an entity is

37、 authorized to acquire STI certificates is based on the Service Provider being assigned a service provider code by a Regulatory and/or administrative entity. Per ATIS-1000080, the STI-GA can define other policies and procedures governing which entities can acquire STI Certificates. The following dia

38、gram summarizes the roles and responsibilities associated with the STI-PA, including the interfaces to other functional elements: Figure 5.3 STI-PA Roles and Functional Interfaces 6 Certificate Policy & Certification Practice Statements The STI-PA defines a CP that prescribes the policies to be foll

39、owed by an STI-CA within the SHAKEN framework. Within the SHAKEN framework, the STI-PA imposes some of these policies based on its role as the Trust Authority. The STI-CAs shall produce Certification Practice Statements defining the manner in which they abide by the Certificate Policy, aligning with

40、 their role as a CA issuing STI certificates. ATIS-1000084 9 6.1 Certificate Policy A CP provides a set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements RFC 3647. It contains the business, legal, and te

41、chnical requirements for certificate approval, management, use, revocation, and renewal. The following reference documents provide additional information about writing the CP and CPS: NIST SP 800-57, Recommendation for Key Management3 o Part 1 Revision 4: General o Part 2: Best Practices for Key Man

42、agement Organization o Part 3 Revision 1: Application-Specific Key Management Guidance, section 2 on PKI. FIPS PUB 140-2, Security Requirements for Cryptographic Modules3. The CP contains policies for the STI-PA, STI-CA, STI-CR, subscribers, and relying parties. RFC 3647 contains the following outli

43、ne for the contents of the Certificate Policy. The STI-PA shall address the following 9 topics: 1. Introduction 2. Publication and Repository 3. Identification and Authentication 4. Certificate Life-Cycle Operational Requirements 5. Facilities, Management, and Operational Controls 6. Technical Secur

44、ity Controls 7. Certificate, CRL, and OCSP Profile 8. Compliance audit 9. Other Business and Legal Matters. 6.1.1 Introduction This component of the CP provides the set of provisions, and the entities and application (SHAKEN) for which the CP is targeted. 6.1.1.1 Overview The CP shall provide an ove

45、rview of the relationship between the CP and CPS, and the target audience. This section shall include the following statement: “This CP conforms to Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework Internet Engineering Task Force (IETF) RFC 3647.” 6.1.

46、1.2 Document Name and Identification The CP shall provide an official title. The CP shall identify certificate policies, levels of assurance, and object identifier (OID) values that will be included in certificates issued by the STI-CAs. The CP shall contain the TNAuthList OID as defined in RFC 8226

47、. 6.1.1.3 PKI Participants The CP provides information on the PKI participants. This shall include Certification Authorities, Registration Authorities, Subscribers, and Relying Parties. The Root CA is recommended to be an offline CA that only issues 3 This document is available from the National Ins

48、titute of Standards and Technology (NIST). . ATIS-1000084 10 certificates to intermediate CAs. In the context of SHAKEN, service providers are the subscribers and relying parties. 6.1.1.4 Certificate Usage The CP shall include the appropriate certificate uses and prohibited certificate uses. The CP

49、shall specify that the certificates are used for SHAKEN. 6.1.1.5 Policy Administration The STI-PA administers the CP. The CP shall provide contact information for STI-CAs writing their CPSs. The CP shall include additional information for reviewing the CPS compliance with the CP. The CP shall document the CP approval procedures. 6.1.1.6 Definitions and Acronyms The CP shall include the definitions and acronyms used in the CP. This section can also reference an appendix with the information. 6.1.2 Publication

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1