Secure Inter-Domain Routing (sidr) Kong, D. Internet Draft Seo, K. Expires:May 2009October 2010 Kent, S. Intended Status:InformationalBCP BBN TechnologiesNovember 2008March 8, 2010 Template for an Internet Registry's Certification Practice Statement (CPS) for the Resource PKI (RPKI)draft-ietf-sidr-cps-irs-04.txtdraft-ietf-sidr-cps-irs-05.txt Status of this MemoBy submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or sheThis Internet-Draft isaware have been or will be disclosed, and any of which he or she becomes aware will be disclosed,submitted inaccordancefull conformance withSection 6the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire onMayOctober 31,2009.2010. Abstract This document contains a template to be used for creating a Certification Practice Statement (CPS) for an Internet Registry (e.g., NIR or RIR) that is part of the Resource Public Key Infrastructure (RPKI). Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [RFC2119]. Table of ContentsPreface...........................................................8Preface...........................................................7 1.Introduction...................................................9Introduction...................................................8 1.1.Overview.................................................10Overview..................................................8 1.2. Document name andidentification.........................11identification..........................9 1.3. PKIparticipants.........................................11participants..........................................9 1.3.1. Certificationauthorities...........................11authorities............................9 1.3.2. Registrationauthorities............................11authorities.............................9 1.3.3.Subscribers.........................................12Subscribers.........................................10 1.3.4. Relyingparties.....................................12parties.....................................10 1.3.5. Otherparticipants..................................12participants..................................10 1.4. Certificateusage........................................12usage........................................10 1.4.1. Appropriate certificateuses........................12uses........................10 1.4.2. Prohibited certificateuses.........................13uses.........................10 1.5. Policyadministration....................................13administration....................................11 1.5.1. Organization administering thedocument.............13document.............11 1.5.2. Contactperson......................................13person......................................11 1.5.3. Person determining CPS suitability for thepolicy...13policy...11 1.5.4. CPS approvalprocedures.............................13procedures.............................11 1.6. Definitions andacronyms.................................13acronyms.................................11 2. Publication And RepositoryResponsibilities...................15Responsibilities...................13 2.1.Repositories.............................................15Repositories.............................................13 2.2. Publication of certificationinformation.................15information.................13 2.3. Time or Frequency ofPublication.........................15Publication.........................13 2.4. Access controls onrepositories..........................15repositories..........................13 3. Identification AndAuthentication.............................16Authentication.............................15 3.1.Naming...................................................16Naming...................................................15 3.1.1. Types ofnames......................................16names......................................15 3.1.2. Need for names to bemeaningful.....................16meaningful.....................15 3.1.3. Anonymity or pseudonymity ofsubscribers............16subscribers............15 3.1.4. Rules for interpreting various nameforms...........16forms...........15 3.1.5. Uniqueness ofnames.................................16names.................................15 3.1.6. Recognition, authentication, and role oftrademarks.17trademarks.16 3.2. Initial identityvalidation..............................17validation..............................16 3.2.1. Method to prove possession of privatekey...........17key...........16 3.2.2. Authentication of organizationidentity.............17identity.............16 3.2.3. Authentication of individualidentity...............17identity...............16 3.2.4. Non-verified subscriber information.................17 3.2.5. Validation ofauthority.............................18authority.............................17 3.2.6. Criteria forinteroperation.........................18interoperation.........................17 3.3. Identification and authentication for re-keyrequests....18requests....17 3.3.1. Identification and authentication for routinere-key18re-key17 3.3.2. Identification and authentication for re-key after revocation.................................................18 3.4. Identification and authentication for revocation request.18 4. Certificate Life-Cycle Operational Requirements...............19 4.1. Certificate Application..................................19 4.1.1. Who can submit a certificate application............19 4.1.2. Enrollment process and responsibilities.............19 4.2. Certificate application processing.......................19 4.2.1. Performing identification and authentication functions ...........................................................19 4.2.2. Approval or rejection of certificate applications...19 4.2.3. Time to process certificate applications............20 4.3. Certificate issuance.....................................20 4.3.1. CA actions during certificate issuance..............20 4.3.2. Notification to subscriber by the CA of issuance of certificate................................................20 4.3.3. Notification of certificate issuance by the CA to other entities...................................................20 4.4. Certificate acceptance...................................20 4.4.1. Conduct constituting certificate acceptance.........20 4.4.2. Publication of the certificate by the CA............20 4.5. Key pair and certificateusage...........................21usage...........................20 4.5.1. Subscriber private key and certificate usage........21 4.5.2. Relying party public key and certificate usage......21 4.6. Certificate renewal......................................21 4.6.1. Circumstance for certificate renewal................21 4.6.2. Who may requestrenewal.............................22renewal.............................21 4.6.3. Processing certificate renewal requests.............22 4.6.4. Notification of new certificate issuance to subscriber ...........................................................22 4.6.5. Conduct constituting acceptance of a renewal certificate................................................22 4.6.6. Publication of the renewal certificate by the CA....22 4.6.7. Notification of certificate issuance by the CA to otherentities [OMITTED].........................................22entities...................................................22 4.7. Certificate re-key.......................................22 4.7.1. Circumstance for certificate re-key.................22 4.7.2. Who may request certification of a new public key...23 4.7.3. Processing certificate re-keying requests...........23 4.7.4. Notification of new certificate issuance to subscriber ...........................................................23 4.7.5. Conduct constituting acceptance of a re-keyed certificate................................................23 4.7.6. Publication of the re-keyed certificate by the CA...24 4.7.7. Notification of certificate issuance by the CA to otherentities [OMITTED].........................................24entities...................................................24 4.8. Certificate modification.................................24 4.8.1. Circumstance for certificate modification...........24 4.8.2. Who may request certificate modification............24 4.8.3. Processing certificate modificationrequests........25requests........24 4.8.4. Notification of modified certificate issuance to subscriber.................................................25 4.8.5. Conduct constituting acceptance of modified certificate ...........................................................25 4.8.6. Publication of the modified certificate by the CA...25 4.8.7. Notification of certificate issuance by the CA to otherentities [OMITTED].........................................25entities...................................................25 4.9. Certificate revocation and suspension....................25 4.9.1. Circumstances for revocation........................25 4.9.2. Who can requestrevocation..........................26revocation..........................25 4.9.3. Procedure for revocation request....................26 4.9.4. Revocation request grace period.....................26 4.9.5. Time within which CA must process the revocation request....................................................26 4.9.6. Revocation checking requirement for relying parties.26 4.9.7. CRL issuance frequency..............................26 4.9.8. Maximum latency for CRLs............................264.9.9. On-line revocation/status checking availability [OMITTED]..................................................27 4.9.10. On-line revocation checking requirements [OMITTED].27 4.9.11. Other forms of revocation advertisements available [OMITTED]..................................................27 4.9.12. Special requirements re key compromise [OMITTED]...27 4.9.13. Circumstances for suspension [OMITTED].............27 4.9.14. Who can request suspension [OMITTED]...............27 4.9.15. Procedure for suspension request [OMITTED].........27 4.9.16. Limits on suspension period [OMITTED]..............274.10. Certificate statusservices.............................27 4.10.1. Operational characteristics [OMITTED]..............27 4.10.2. Service availability [OMITTED].....................27 4.10.3. Optional features [OMITTED]........................27 4.11. End of subscription [OMITTED]...........................27 4.12. Key escrow and recovery [OMITTED].......................27 4.12.1. Key escrow and recovery policy and practices [OMITTED] ...........................................................27 4.12.2. Session key encapsulation and recovery policy and practices [OMITTED]........................................27services.............................26 5. Facility, Management,Andand OperationalControls................28Controls................27 5.1. Physicalcontrols........................................28controls........................................27 5.1.1. Site location andconstruction......................28construction......................27 5.1.2. Physicalaccess.....................................28access.....................................27 5.1.3. Power and airconditioning..........................28conditioning..........................27 5.1.4. Waterexposures.....................................28exposures.....................................27 5.1.5. Fire prevention andprotection......................28protection......................27 5.1.6. Mediastorage.......................................28storage.......................................27 5.1.7. Wastedisposal......................................28disposal......................................27 5.1.8. Off-sitebackup.....................................28backup.....................................27 5.2. Proceduralcontrols......................................28controls......................................27 5.2.1. Trustedroles.......................................28roles.......................................27 5.2.2. Number of persons required pertask.................28task.................27 5.2.3. Identification and authentication for eachrole.....28role.....27 5.2.4. Roles requiring separation ofduties................28duties................27 5.3. Personnelcontrols.......................................28controls.......................................27 5.3.1. Qualifications, experience, and clearance requirements...........................................................29...........................................................28 5.3.2. Background checkprocedures.........................29procedures.........................28 5.3.3. Trainingrequirements...............................29requirements...............................28 5.3.4. Retraining frequency andrequirements...............29requirements...............28 5.3.5. Job rotation frequency andsequence.................29sequence.................28 5.3.6. Sanctions for unauthorizedactions..................29actions..................28 5.3.7. Independent contractorrequirements.................29requirements.................28 5.3.8. Documentation supplied topersonnel.................29personnel.................28 5.4. Audit loggingprocedures.................................29procedures.................................28 5.4.1. Types of eventsrecorded............................29recorded............................28 5.4.2. Frequency of processinglog.........................29log.........................28 5.4.3. Retention period for auditlog......................29log......................28 5.4.4. Protection of auditlog.............................30log.............................29 5.4.5. Audit log backupprocedures.........................30procedures.........................29 5.4.6. Audit collection system (internal vs. external)[OMITTED]..................................................30[OMITTED]..................................................29 5.4.7. Notification to event-causing subject[OMITTED].....30[OMITTED].....29 5.4.8. Vulnerabilityassessments...........................30assessments...........................29 5.5. Records archival[OMITTED]...............................30 5.5.1. Types of records archived [OMITTED].................30 5.5.2. Retention period for archive [OMITTED]..............30 5.5.3. Protection of archive [OMITTED].....................30 5.5.4. Archive backup procedures [OMITTED].................30 5.5.5. Requirements for time-stamping of records [OMITTED].30 5.5.6. Archive collection system (internal or external) [OMITTED]..................................................30 5.5.7. Procedures to obtain and verify archive information [OMITTED]..................................................30[OMITTED]...............................29 5.6. Keychangeover...........................................30changeover...........................................29 5.7. Compromise and disaster recovery[OMITTED]...............31 5.7.1. Incident and compromise handling procedures [OMITTED]31 5.7.2. Computing resources, software, and/or data are corrupted [OMITTED]........................................31 5.7.3. Entity private key compromise procedures [OMITTED]..31 5.7.4. Business continuity capabilities after a disaster [OMITTED]..................................................31[OMITTED]...............29 5.8. CA or RAtermination.....................................31termination.....................................29 6. Technical SecurityControls...................................32Controls...................................30 6.1. Key pair generation andinstallation.....................32installation.....................30 6.1.1. Key pairgeneration.................................32generation.................................30 6.1.2. Private key delivery tosubscriber..................32subscriber..................30 6.1.3. Public key delivery to certificateissuer...........32issuer...........30 6.1.4. CA public key delivery to relyingparties...........32parties...........30 6.1.5. Keysizes...........................................33sizes...........................................31 6.1.6. Public key parameters generation and qualitychecking33checking31 6.1.7. Key usage purposes (as per X.509 v3 key usagefield)33field)31 6.2. Private Key Protection and Cryptographic Module EngineeringControls......................................................33Controls......................................................31 6.2.1. Cryptographic module standards andcontrols.........33controls.........31 6.2.2. Private key (n out of m) multi-personcontrol.......33control.......31 6.2.3. Private keyescrow..................................33escrow..................................31 6.2.4. Private keybackup..................................34backup..................................32 6.2.5. Private keyarchival................................34archival................................32 6.2.6. Private key transfer into or from a cryptographicmodule.....................................................34module.....................................................32 6.2.7. Private key storage on cryptographicmodule.........34module.........32 6.2.8. Method of activating privatekey....................34key....................32 6.2.9. Method of deactivating privatekey..................34key..................32 6.2.10. Method of destroying privatekey...................34key...................32 6.2.11. Cryptographic ModuleRating........................34Rating........................33 6.3. Other aspects of key pairmanagement.....................35management.....................33 6.3.1. Public keyarchival.................................35archival.................................33 6.3.2. Certificate operational periods and key pair usageperiods....................................................35periods....................................................33 6.4. Activationdata..........................................35data..........................................33 6.4.1. Activation data generation andinstallation.........35installation.........33 6.4.2. Activation dataprotection..........................35protection..........................33 6.4.3. Other aspects of activationdata....................35data....................33 6.5. Computer securitycontrols...............................35controls...............................33 6.5.1. Specific computer security technicalrequirement....35 6.5.2. Computer security rating [OMITTED]..................36requirement....33 6.6. Life cycle technicalcontrols............................36controls............................34 6.6.1. System developmentcontrols.........................36controls.........................34 6.6.2. Security managementcontrols........................36controls........................34 6.6.3. Life cycle securitycontrols........................36controls........................34 6.7. Network securitycontrols................................36controls................................34 6.8.Time-stamping............................................36Time-stamping............................................34 7. Certificate and CRLProfiles..................................37Profiles..................................34 8. Please refer to the Certificate and CRL Profile[draft-ietf-sidr- res-certs-01].................................................37 7.1. Certificate profile [OMITTED]............................37 7.1.1. Version number(s) [OMITTED].........................37 7.1.2. Certificate extensions [OMITTED]....................37 7.1.3. Algorithm object identifiers [OMITTED]..............37 7.1.4. Name forms [OMITTED]................................37 7.1.5. Name constraints [OMITTED]..........................37 7.1.6. Certificate policy object identifier [OMITTED]......37 7.1.7. Usage of Policy Constraints extension [OMITTED].....37 7.1.8. Policy qualifiers syntax and semantics [OMITTED]....37 7.1.9. Processing semantics for the critical Certificate Policies extension [OMITTED]...............................37 7.2. CRL profile [OMITTED]....................................37 7.2.1. Version number(s) [OMITTED].........................37 7.2.2. CRL and CRL entry extensions [OMITTED]..............37 7.3. OCSP profile [OMITTED]...................................37 7.3.1. Version number(s) [OMITTED].........................37 7.3.2. OCSP extensions [OMITTED]...........................37[RFCyyyy].....34 8. Compliance Audit and OtherAssessments........................38Assessments........................35 8.1. Frequency or circumstances ofassessment.................38assessment.................35 8.2. Identity/qualifications ofassessor......................38assessor......................35 8.3. Assessor's relationship to assessedentity...............38entity...............35 8.4. Topics covered byassessment.............................38assessment.............................35 8.5. Actions taken as a result ofdeficiency..................38deficiency..................35 8.6. Communication ofresults.................................38results.................................35 9. Other Business And LegalMatters..............................39Matters..............................36 9.1.Fees.....................................................39Fees.....................................................36 9.1.1. Certificate issuance or renewalfees................39fees................36 9.1.2. Fees for other services (ifapplicable).............39applicable).............36 9.1.3. Refundpolicy.......................................39policy.......................................36 9.2. Financialresponsibility.................................39responsibility.................................36 9.2.1. Insurancecoverage..................................39coverage..................................36 9.2.2. Otherassets........................................39assets........................................36 9.2.3. Insurance or warranty coverage forend-entities.....39end-entities.....36 9.3. Confidentiality of businessinformation..................39information..................36 9.3.1. Scope of confidentialinformation...................39information...................36 9.3.2. Information not within the scope of confidentialinformation................................................39information................................................36 9.3.3. Responsibility to protect confidentialinformation..39information..36 9.4. Privacy of personalinformation..........................39information..........................36 9.4.1. Privacyplan........................................39plan........................................36 9.4.2. Information treated asprivate......................39private......................36 9.4.3. Information not deemedprivate......................39private......................36 9.4.4. Responsibility to protect privateinformation.......39information.......36 9.4.5. Notice and consent to use privateinformation.......39information.......36 9.4.6. Disclosure pursuant to judicial or administrativeprocess....................................................40process....................................................36 9.4.7. Other information disclosurecircumstances..........40circumstances..........37 9.5. Intellectual property rights (ifapplicable).............40applicable).............37 9.6. Representations andwarranties...........................40warranties...........................37 9.6.1. CA representations andwarranties...................40warranties...................37 9.6.2. Subscriber representations andwarranties...........40warranties...........37 9.6.3. Relying party representations andwarranties........40 9.6.4. Representations and warranties of other participants [OMITTED]..................................................40warranties........37 9.7. Disclaimers ofwarranties................................40warranties................................37 9.8. Limitations ofliability.................................40liability.................................37 9.9.Indemnities..............................................40Indemnities..............................................37 9.10. Term andtermination....................................40termination....................................37 9.10.1.Term...............................................40Term...............................................37 9.10.2.Termination........................................40Termination........................................37 9.10.3. Effect of termination andsurvival.................40survival.................37 9.11. Individual notices and communications withparticipants.40participants.37 9.12.Amendments..............................................40Amendments..............................................37 9.12.1. Procedure foramendment............................40amendment............................37 9.12.2. Notification mechanism andperiod..................40 9.12.3. Circumstances under which OID must be changed [OMITTED]..................................................40period..................37 9.13. Dispute resolutionprovisions...........................40provisions...........................37 9.14. Governinglaw...........................................40law...........................................37 9.15. Compliance with applicablelaw..........................40law..........................37 9.16. Miscellaneousprovisions................................40provisions................................37 9.16.1. Entireagreement...................................41agreement...................................37 9.16.2.Assignment.........................................41Assignment.........................................37 9.16.3.Severability.......................................41Severability.......................................37 9.16.4. Enforcement (attorneys' fees and waiver ofrights).41rights).38 9.16.5. ForceMajeure......................................41 9.17. Other provisions [OMITTED]..............................41Majeure......................................38 10. SecurityConsiderations......................................42Considerations......................................39 11. IANAConsiderations..........................................42Considerations..........................................39 12.Acknowledgments..............................................42Acknowledgments..............................................39 13.References...................................................42References...................................................39 13.1. NormativeReferences....................................42References....................................39 13.2. InformativeReferences..................................43References..................................40 Author'sAddresses...............................................43 Intellectual Property Statement..................................44 Disclaimer of Validity...........................................45Addresses...............................................40 Pre-5378 Material Disclaimer.....................................41 CopyrightStatement..............................................45Statement..............................................41 Preface This document contains a template to be used for creating a Certification Practice Statement (CPS) for an Internet Registry (e.g., an NIR or RIR) that is part of the Resource Public Key Infrastructure (RPKI). The user of this document should 1. substitute a title page for page 1 saying, e.g.,"<Name''<Name of Registry> Certification Practice Statement for the Resource Public Key Infrastructure(RPKI)"(RPKI)'' with date, author, etc. 2. delete this Preface 3. fill in the information indicated below by <text in angle brackets> 4. delete sections 10, 11, 12, 13.1, Acknowledgments, Author's Addresses, Intellectual Property Statement, Disclaimer of Validity, Copyright Statement, Acknowledgments; leaving a reference section with just the references in 13.2 5. update the table of contents to reflect the deletions and additions above. Note: This CPS is based on the template specified in RFC 3647. A number of sections contained in the template were omitted from this CPS because they did not apply to this PKI. However, we have retainedsection heading "place holders" for these omitted sections, in order to facilitate comparison withthe section numbering scheme employed inthat RFC, i.e., the relevant section headings are included and marked [OMITTED]. In the Table of Contentstherelevant sections are also marked [OMITTED]. There is a noteRFC tothis effect infacilitate comparison with theIntroduction below. This information should be leftoutline in theCPS as an explanationRFC. [There are 4 sub- sections that I haven't removed yet due tothe user.Word problems.) 1. Introduction This document is the Certification Practice Statement (CPS) of <Name of Registry>. It describes the practices employed by the <Name of Registry> Certification Authority (CA) in theInternet IP Address and Autonomous System (AS) Number PKI.Resource Public Key Infrastructure (RPKI). These practices are defined in accordance with the requirements of the Certificate Policy (CP, [RFCxxxx]) of this PKI. TheResource PKI is aimed at supporting verifiable attestations about resource controls, e.g., for improved routing security. The goalRPKI isthat each entity that allocates IP addresses or AS numbersdesigned toan entity will, in parallel, issue a certificate reflecting this allocation. These certificates will enable verification that the holdersupport validation ofthe associated private key has been allocated the resources indicated in the certificate, and is the current, unique holderclaims by current holders ofthese resources. The certificates and CRLs,Internet Number Resources (INRs, see definition inconjunction1.7) in accordance withancillary digitally signed data structures, will provide critical inputs for routing security mechanisms, e.g., generation of route filters by ISPs. The most important and distinguishing aspectthe records of thePKI for which this CPS was created isorganizations thatit does not purport to identify an address space holder or AS number holder via the subject name containedact as CAs inthe certificate issued to that entity. Rather, each certificate issued underthispolicy is intended to enable an entityPKI. The ability toassert in a verifiable fashion, that itverify such claims is essential to ensuring thecurrent holder of an address block or an AS number, based on the current recordsunique, unambiguous distribution ofthe entity responsible for thethese resourcesin question. Verification of the assertion is based on two criteria:This PKI parallels theability ofexisting INR distribution hierarchy. These resources are distributed by theentityInternet Assigned Numbers Authority (IANA) todigitally sign data producingthe Regional Internet Registries. In some regions, National Internet Registries (NIRs) form asignature that is verifiable usingtier of thepublic key contained inhierarchy below thecorresponding certificate,RIRs for internet number resource (INR) distribution. ISPs andvalidation of that certificate in the context of this PKI.network subscribers form additional tiers below registries. 1.1. Overview ThisPKI is designed exclusively for use in support of validation of claims related to address space and AS number holdings, with emphasis on support of routing security mechanisms. Use of the certificates and CRLs managed under this PKI for any other purpose is a violation of this PKI's CP, and relying parties should reject such uses. Note: This CPS is based on the template specified in RFC 3647. A number of sections contained in the template were omitted from this CPS because they did not apply to this PKI. However, we have retained section heading "place holders" for these omitted sections, in order to facilitate comparison with the section numbering scheme employed in that RFC, i.e., the relevant section headings are included and marked [OMITTED]. In the Table of Contents the relevant sections are also marked [OMITTED]. 1.1. Overview This CPS describes: . Participants . DistributionCPS describes: . Participants . Publication of the certificates and CRLs . How certificates are issued, managed, and revoked . Facility management (physical security, personnel, audit, etc.) . Key management . Audit procedures . Business and legal issuesTheThis PKI encompasses several types ofcertificates:certificates (see IETF document draft-ietf-sidr-arch-xx [ARCH] for more details): . CA certificates for each organizationallocating address blocks and/or AS numbers,distributing INRs and for eachaddress space (AS number) holdersubscriber (INR holder) . End entity (EE) certificates for organizations to usein verifyingto validate digital signaturesof Route Origination Authorizations (ROAs) and other (non-certificate/CRL) signedon RPKI-signed objects (see definition in 1.7). . In the future, the PKI also may include end entity certificates in support of access control for the repository system as described in 2.4. 1.2. Document name and identification The name of this document is"<Name''<Name of Registry>'s Certification Practice Statement for the Resource Public Key Infrastructure(RPKI)".(RPKI)''. 1.3. PKI participants Note: In a PKI, the term"subscriber"''subscriber'' refers to an individual or organization that is a Subject of a certificate issued by a CA. The term is used in this fashion throughout this document, without qualification, and should not be confused with the networking use of the term to refer to an individual or organization that receives service from anLIR/ISP. Thus, in this PKI,ISP. In such cases the term"subscriber" can refer both to LIRs/ISPs, which can''network subscriber'' will besubscribers of RIRs, NIRs, and other LIRs, and also to organizations that are not ISPs, but which are subscribers of ISPs in the networking sense of the term.used. Also note that, for brevity, this document always refers tosubscribersPKI participants asorganizations,organizations or entities, even though somesubscribersof them are individuals.When necessary, the phrase "network subscriber" is used to refer to an organization that receives network services from an LIR/ISP.1.3.1. Certification authorities<Name of Registry><Describe the CAs that you will operatetwo CAsfor theRPKI: oneRPKI. One approach is to operate two CAs: one designated"offline"''offline'' and the otherisdesignated"production."''production.'' The offline CA is the top level CA for the <Name of Registry> portion of the RPKI. It provides a secure revocation and recovery capability in case the production CA is compromised or becomes unavailable. Thusthisthe offline CA issues certificates only to instances of the productionCACA; and the CRLs it issues are used to revoke onlya certificatecertificates issued tothatthe production CA. The production CA is used to issue RPKI certificates to <Name of Registry> members, towhich address space or AS numberswhom INRs have beenallocated.distributed. > 1.3.2. Registration authoritiesThere is no<Describe how the registration authority(RA)function is handled foreither the offline ortheproduction CA operating under this CPS.CA(s) that you operate. Theformer needs no RA capability because it issues certificates only toRPKI does not require establishment or use of a separate registration authority (RA) in conjunction with theproduction CA. The productionCArelies upon certificates issuedfunction. The RA function will be provided by the<Name of Registry> Business PKI (BPKI) (seesame entity operating as a CA, e.g., entities listed in Section3.2.6) to identify individuals authorized to requests certificates under the RPKI. <Name of Registry>1.3.1. An entity acting as a CA in this PKI alreadyestablisheshas abusinessformal relationship with eachsubscriber (<Name of Registry> member) and assumes responsibility for allocating and tracking the current allocation of address space and AS numbers. Since <Name of Registry> operatesorganization to which it distributes INRs. These organizations already perform theBPKI CA, there is no distinctRA function implicitly since they already assume responsibility forthe RPKI.distributing INRs.> 1.3.3. Subscribers Two types of organizations receiveallocationsdistributions ofIP addresses and AS numbersINRs from this CA and thus are subscribers in the PKI sense: network subscribers and Internet Service Providers (ISPs). <Additionally, this CA issues certificates to<Local/National> Registries (choose the right term for this RIR, if either applies)<National> Registries, who, in turn, issue certificates to network subscribers orLIRs/ISPs.>ISPs.> 1.3.4. Relying parties Entities or individuals thatneed to validate claims of address space and/or AS number current holdings are relying parties. Thus, for example, entities that make use of address and AS number allocation certificatesact insupport of improved routing securityreliance on certificates or RPKI-signed objects issued under this PKI are relying parties.Registries are relyingRelying partiesbecause they transfer resources between one another and thus will need to verify (cross) certificates issued in conjunction with such transfers. This includes LIRs/ISPs, multi-homed organizations exchanging BGP [BGP4] traffic with LIRs/ISPs, and subscribers who have received an allocation of address space from one ISPmay orfrom a registry, but want to authorize an (or another) LIR/ISP to originate routes tomay not be subscribers within thisspace. ToPKI. (See section 1.7 for theextent that repositories make usedefinition ofcertificates for access control - checking for authorization to upload certificate, CRL, and ROA update packages -- they too act as relying parties.an RPKI-signed object.) 1.3.5. Other participants <Name of Registry> will operate a repository that holds certificates, CRLs, and otherRPKI signed objects, e.g., ROAs.RPKI-signed objects. 1.4. Certificate usage 1.4.1. Appropriate certificate uses The certificates issued under this hierarchy are for authorization in support of validation of claims of current holdings ofaddress space and/or AS numbers, e.g., for routing security. With regard to routing security, an initial goal of this PKI is to allow the holder of a set of address blocks to be able to declare, in a secure fashion, the AS number of each entity that is authorized to originate a route to these addresses, including the context of ISP proxy aggregation.INRs. Additional uses of thePKI,certificates, consistent with the basic goal cited above, are also permitted underthisthe RPKI certificate policy. Some of the certificates that may be issued under thishierarchyPKI could be used to support operation of this infrastructure, e.g., access control for the repositorysystem.system as described in 2.4. Such uses also are permitted underthisthe RPKI certificate policy. 1.4.2. Prohibited certificate uses Any uses other than those described in Section 1.4.1 are prohibited. 1.5. Policy administration 1.5.1. Organization administering the document This CPS is administered by <Name ofRegistry>Registry>. 1.5.2. Contact person <Insert Registry contact info here> 1.5.3. Person determining CPS suitability for the policy Not applicable. Each organization issuing a certificate in this PKI is attesting to theallocationdistribution ofresources (IP addresses, AS numbers)INRs to the holder of the private key corresponding to the public key in the certificate. The issuing organizations are the same organizations as the ones that perform theallocationdistribution hence they are authoritative with respect to the accuracy of this binding. 1.5.4. CPS approval procedures Not applicable. Each organization issuing a certificate in this PKI is attesting to theallocationdistribution ofresources (IP addresses, AS numbers)INRs to the holder of the private key corresponding to the public key in the certificate. The issuing organizations are the same organizations as the ones that perform theallocationdistribution hence they are authoritative with respect to the accuracy of this binding. 1.6. Definitions and acronyms BPKI - BusinessPKI:PKI. A BPKI is an optional additional PKI used by an RIR to identify members to whom RPKI certificates can be issued. CP - Certificate Policy. A CP is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of applications with common security requirements. CPS - Certification Practice Statement. A CPS is a document that specifies the practices that a Certification Authority employs in issuing certificates. Distribution of INRs - - A process of distribution of the INRs along the respective number hierarchy. IANA distributes blocks of IP addresses and Autonomous System Numbers to the five Regional Internet Registries (RIRs). RIRs distribute smaller address blocks and Autonomous System Numbers to organizations within their service regions, who in turn distribute IP addresses to their customers. IANA - Internet Assigned Numbers Authority. IANA is responsible for global coordination of the Internet Protocol addressing systems and Autonomous System (AS) numbers used for routing internet traffic. IANA distributes INRs to Regional Internet Registries (RIRs). INRs - Internet Number Resources. INRs are number values for three protocol parameter sets, namely: . IP Version 4 addresses, . IP version 6 addresses, and . Identifiers used in Internet inter-domain routing, currently Border Gateway Protocol-4 Autonomous System numbers. ISP - - Internet Service Provider. An ISP is an organization managing and selling Internet services to other organizations.LIR - Local Internet Registry. This is an organization, typically a network service provider, that sub-allocates the assignment of IP addresses for a portion of the area covered by a Regional (or National) Registry.NIR - - National Internet Registry. An NIR is an organization that manages theassignmentdistribution ofIP address and AS numbersINRS for a portion of the geopolitical area covered by a Regional Registry.TheseNIRs form an optional second tier in the tree scheme used to manageIP address and AS number allocation.INR distribution. RIR - Regional Internet Registry. An RIR is an organization that manages theassignmentdistribution ofIP address and AS numbersINRs for aspecifiedgeopolitical area.At present, there are five RIRs: ARIN (North America), RIPE NCC (Europe), APNIC (AsiaRPKI-signed object -Pacific), LACNIC (Latin America and Caribbean), and AfriNIC (Africa). ROA-Route Origination Authorization. ThisAn RPKI-signed object is a digitally signed data objectthat identifies(other than anetwork operator, identified by an AS, that is authorized to originate routescertificate or CRL) declared to be such by aspecified set of address blocks. 2. Publication And Repository Responsibilities 2.1. Repositories As per the CP, certificatesstandards track RFC, andCRLs, willthat can be validated using certificates issued under this PKI. The content and format of these data constructs depend on the context in which validation of claims of current holdings of INRs takes place. Examples of these objects are repository manifests and CRLs. 2. Publication And Repository Responsibilities 2.1. Repositories As per the CP, certificates, CRLs and RPKI-signed objects MUST be made available for downloading by allnetwork operators,relying parties to enable them to validate thisdata for use in support of routing security.data. The <Name of Registry> RPKI CA will publish certificates, CRLs, andother signedRPKI-signed objects via a repository that is accessible via RSYNC at rpki.<Name of Registry>.net. 2.2. Publication of certification information <Name of Registry>will upload certificatesMUST publish certificates, CRLs, andCRLsRPKI-signed objects issued by it to a local repository system that it operates as part of a world-wide distributed system of repositories. 2.3. Time or Frequency of Publication <Describe here your procedures for publication (via the repository) of thecertificates andcertificates, CRLs and RPKI-signed objects that you issue. If you choose to outsource publication of PKI data, you still need to provide this information for relyingparties.>parties. This should include the period of time within which a certificate will be published after he CA issues the certificate and the period of time within which a CA will publish a CRL with an entry for a revoked certificate after it revokes that certificate. > As per the CP, the followingstandards existstandard exists for publication times and frequency:A certificate will be published within 24 hours after issuance.The <Name of Registry> RPKI CAwillMUST publish its CRL prior to the nextScheduledUpdate value in the scheduled CRL previously issued by the CA.Within 24 hours of effecting revocation, the CA will publish a CRL with an entry for the revoked certificate.2.4. Access controls on repositories Access to the repository system, for modification of entries, must be controlled to prevent denial of service attacks. All data (certificates, CRLs andROAs) uploadedRPKI-signed objects) published to a repository are digitally signed.UpdatesRPKI items that <Name of Registry> issues MUST be published to the repositorysystem must be validated to ensurethatthe data being added or replaced is authorized. This document doesit runs by means notdefineaccessible to themeans by which updates are verified, but useoutside world. <If <Name ofthe PKI itselfRegistry> offers repository services tovalidate updates is anticipated.its subscribers, then <describe here the protocol(s) that you support for their publishing of signed objects.> 3. Identification And Authentication 3.1. Naming 3.1.1. Types of names The Subject of each certificate issued by this Registry is identified by an X.500 Distinguished Name (DN).For certificates issued to LIRs/ISPs and subscribers, the SubjectThe distinguished name will consist of a singleCNCommon Name (CN) attribute with a value generated by <Name of Registry>. Optionally, theissuer. For certificates issued to an NIR, the Subject willserialNumber attribute may be included along with the common name (to form a terminal relative distinguished name set), to distinguish among successive instances of certificates associated with theNIR.same entity. 3.1.2. Need for names to be meaningful The Subject name in each subscriber certificate will be unique relative to all certificates issued by <Name ofLIR/ISP> RPKI CA.Registry>. However, there is no guarantee that the subject name will be globally unique in this PKI.Note: TheAlso, the name of theholder of an address block or AS numbersubscriber need not to be"meaningful"''meaningful'' in the conventional, human-readablesense, sincesense. The certificates issued under this PKI are used for authorization in support ofrouting security,applications that make use of attestations of Internet resource holding, not for identification 3.1.3. Anonymity or pseudonymity of subscribers Although Subject names in certificates issued by this registry need not be meaningful, and may appear"random,"''random,'' anonymity is not a function of this PKI, and thus no explicit support for this feature is provided. 3.1.4. Rules for interpreting various name forms None 3.1.5. Uniqueness of names <Name of Registry> certifies Subject names that are unique among the certificates that it issues. Although it is desirable that these Subject names be unique throughout the PKI, to facilitate certificate path discovery, such uniqueness is neither mandated nor enforced through technical means. 3.1.6. Recognition, authentication, and role of trademarks Because the Subject names are not intended to be meaningful, there is no provision to recognizenoror authenticate trademarks, service marks, etc. 3.2. Initial identity validation 3.2.1. Method to prove possession of private key<Name<Describe the method whereby each subscriber will be required to demonstrate proof-of-possession (PoP) ofRegistry> accepts certificate requests viatheprotocol describedprivate key corresponding to the public key in[up/down]. This protocolthe certificate, prior to <Name of Registry's> issuing the certificate. One possible approach makes use of the PKCS #10 format, as profiled in [RFCyyyy]. This request format requires that the PKCS #10 request be signed using the (RSA) private key corresponding to the public key in the certificate request. This mechanism provides proof of possession by therequester.requester.> 3.2.2. Authentication of organization identity Certificates issued under this PKI do not attest to the organizational identity ofresource holders,subscribers, with the exception of registries. However, certificates are issued toresource holderssubscribers in a fashion that preserves the accuracy ofallocationsdistributions as represented in <Name of Registry> records.Specifically,<Describe the method whereby this is accomplished. For example, a BPKI certificate could be used to authenticate a certificate request that serves as a link to the <Name of Registry>membersubscriber database that maintains theresource allocationINR distribution records. The certificate requestiscould be matched against the database record for themembersubscriber in question, and an RPKI certificateiswould be issued only if theresourcesINRs requestedarewere a subset of those held by themember.subscriber.> 3.2.3. Authentication of individual identity Certificates issued under this PKI do not attest to the individual identity of aresource holder.subscriber. However, <Name of Registry> maintains contact information for eachresource holdersubscriber in support of certificate renewal, re-key, orrevocation, viarevocation. < Describe theBPKI. Theprocedures that MUST be used to identify at least one individual as a representative of each subscriber. This is done in support of issuance, renewal, and revocation of the certificate issued to the organization. For example, one might say ''The <Name of Registry> BPKI (see Section 3.2.6) issues certificates thatareMUST be used to identify individuals who represent <Name of Registry>memberssubscribers.'' The procedures should be commensurate with those you already employ in authenticating individuals as representatives for INR holders. Note thatare address spacethis authentication is solely for use by you in dealing with the organizations to which you distribute (orAS number) holders.sub- distribute) INRs, and thus must not be relied upon outside of this CA-subscriber relationship> 3.2.4. Non-verified subscriber information No non-verified subscriber data is included in certificates issued under this certificatepolicy.policy except for SIA/AIA extensions. 3.2.5. Validation of authorityOnly<Describe what procedures that MUST be used to verify that an individual claiming to represent a subscriber, is authorized to represent that subscriber in this context. For example, one could say, ''Only an individual to whom a BPKI certificate (see Section 3.2.6) has been issued may request issuance of an RPKI certificate. Each certificate issuance request is verified using theBPKI.BPKI.'' The procedures should be commensurate with those you already employ as a registry in authenticating individuals as representatives of subscribers.> 3.2.6. Criteria for interoperation The RPKI is neither intended nor designed to interoperate with any other PKI.However, <Name of Registry> operates<If you operate a separate, additional PKI for business purposes (BPKI), then describe (or reference) how the BPKI[cps- business-pki] thatis used to authenticatememberssubscribers and to enable them to manage their resourceallocations. The Resource PKI relies on this BPKI to authenticate Subscribers who make certificate requests, revocation requests, etc.distributions.> 3.3. Identification and authentication for re-key requests 3.3.1. Identification and authentication for routine re-keyRoutine<Describe the conditions under which routine re-key iseffected via a Certificate Issuance Request message as described in [up/down]. This digitally signed CMS messagerequired and the manner by which it isauthenticated usingrequested. Describe the procedures that MUST be used to ensure that aBPKIsubscriber requesting routine re-key is the legitimate holder of the certificateassociated withto be re-keyed. State the approach for establishing PoP of the private key corresponding to therequester.new public key. If you operate a BPKI, describe how that BPKI is used to authenticate routine re-key requests.> 3.3.2. Identification and authentication for re-key after revocationRe-key<Describe the procedures that MUST be used to ensure that an organization requesting a re-key after revocation iseffected via a Certificate Issuance Request message as describedthe legitimate holder of the INRs in[up/down].the certificate being re-keyed. Thisdigitally signed CMS message is authenticated usingshould also include the method employed for verifying PoP of the private key corresponding to the new public key. If you operate a business- based PKI, describe how that BPKIcertificate associatedis used to authenticate re-key requests and refer to 3.2.6. With respect to authentication of the subscriber, the procedures should be commensurate with those you already employ in therequester.maintenance of INR distribution records.> 3.4. Identification and authentication for revocation requestAn RPKI Subscriber makes an explicit revocation request using the protocol defined in [up/down]. Revocation requests in this protocol are digitally signed CMS messages, and are verified using a public key bound to an authorized representative via<Describe the<Name of Registry> BPKI. When a Subscriber requests an new resource allocation,procedures that MUST be used by anexisting resource certificate issuedRPKI subscriber to make a revocation request. Describe the manner by which it is ensured that the subscriber requesting revocation isNOT revoked, so long asthesetsubject ofresources allocated totheSubscriber didcertificate (or an authorized representative thereof) to be revoked. Note that there may be different procedures for the case where the legitimate subject still possesses the original private key as opposed to the case when it no longer has access to that key. These procedures should be commensurate with those you already employ in the maintenance of subscriber records.> Note that if a Subscriber requests a new INR distribution, an existing RPKI certificate issued to the subscriber is NOT revoked, so long as the set of INRs distributed to the subscriber did not"shrink,"''shrink,'' i.e., the newresourcesINRs are a superset of the oldresourceINR set. However, if a newresource allocationINR distribution results in"shrinkage"''shrinkage'' of the set ofresources allocatedINRs distributed to aSubscriber,subscriber, this triggers an implicit revocation of the oldresourceRPKI certificate(s) associated with thatSubscriber.subscriber. 4. Certificate Life-Cycle Operational Requirements 4.1. Certificate Application 4.1.1. Who can submit a certificate applicationThe following entitiesAny subscriber who holds INRs distributed by this registry may submit a certificate application to thisCA: o <Insert if appropriate: "Any NIR or LIR/ISP operating in the geopolitical region served by this registry"> o Any entity that holds AS numbers or address space assigned by this registryCA. 4.1.2. Enrollment process and responsibilities<Name<Describe your enrollment process for issuing certificates both for initial deployment ofRegistry> members who are resource holders are enrolled inthe<NamePKI and as an ongoing process. Note that most ofRegistry> BPKI viatheprocess describedcertificates in[operations-business-pki]. Onlythis PKI are issued as part of your normal business practices, as an adjunct to INR distribution, and thus amember who holdsseparate application to request a certificateissued under the BPKI is eligiblemay not be necessary. If so, reference should be made tomake an RPKI certificate request.where these practices are documented.> 4.2. Certificate application processing<A/An Name of Registry> resource holder requests a certificate via a Certificate Issuance Request message [up/down], which is authenticated via the digital signature on<Describe theCMS envelope. Thecertificateused to authenticate the message is issued under the <Name of Registry> BPKI. <Namerequest/response processing that you will employ. You should make use ofRegistry> processes the resource request as described in [up/down]. The Certificate Issuance Response message [up/down] either provides theexisting standards for certificateto the Subscriber, or provides a response indicating why the request was not fulfilled.application processing. Relevant standards include RFC 4210, Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP), RFC 2797, Certificate Management Messages over CMS, and RSA Labs standards PKCS #7 and PKCS #10. > 4.2.1. Performing identification and authentication functionsThe <Name<Describe your practices for identification and authentication ofRegistry> BPKI is usedcertificate applicants. Often, existing practices employed by you to identify<A/An Name of Registry> member representative applyingand authenticate organizations can be used as the basis fora certificate via a certificateissuancerequest in the up/down protocol. See the <NameofRegistry> BPKI CPS for additional details [cp-business-pki].certificates to these subscribers. Reference can be made to documentation of such existing practices.> 4.2.2. Approval or rejection of certificate applicationsThe Certificate Issuance Response message [up/down] either provides the certificate to the Subscriber, or provides a response indicating why the request was not fulfilled.<Describe your practices for approval or rejection of applications and refer to documentation of existing business practices relevant to this process. Note that according to the CP, certificate applications will be approved based on the normal business practices of the entity operating the CA, based on the CA's records ofaddress space and AS number holders. Also,subscribers. The CP also says that each CA will follow the procedures specified in 3.2.1 to verify that the requester holds thecorrespondingprivate keyforcorresponding to the public key that will be bound to the certificate the CA issues to the requester.> 4.2.3. Time to process certificate applications<You may declare<Specify here your expected time frame for processing certificate applications.> 4.3. Certificate issuance 4.3.1. CA actions during certificate issuanceA Subscriber generates a draft certificate using the PKCS #10 format, as profiled in [RFCyyyy]. This draft certificate is encapsulated in a CMS message, signed by the requester, and submitted as a Certificate Issuance Request as described in [up/down]. The CA verifies the request message as described<Describe in[up/down]this section your procedures for issuance andgenerates a Certificate Issuance Response message. That message either contains the requested certificate, or providespublication of aresponse indicating why the request was not fulfilled.certificate.> 4.3.2. Notification to subscriber by the CA of issuance of certificateA Subscriber is notified<Name of registry> MUST notify theissuance ofsubscriber when the certificate is published. <Describe here any other entities that will be notified when a new certificateby the Certificate Issuance Response message.is published.> 4.3.3. Notification of certificate issuance by the CA to other entities[OMITTED]<Describe here any other entities that will be notified when a new certificate is published.> 4.4. Certificate acceptance 4.4.1. Conduct constituting certificate acceptance When a certificate is issued, theRPKICAwill placeMUST publish itin the repository. A subject is deemedtohave accepted a certificate issued by this CA unless the subject explicitly requests revocation ofthecertificate after publication inrepository and notify the<Name of Registry> RPKI repository system, as described in Section 4.9.3subscriber. This will be done without subscriber review and acceptance. 4.4.2. Publication of the certificate by the CA CertificateswillMUST be published in theRepositoryRPKI distributed repository system via publication of the certificate at <name of Registry>'s repository publication. This will be done within1 business day<specify the timeframe within which the certificate will be placed in the repository and the subscriber will be notified>. <Describe your procedures for publication ofbeing issued by this CA.the certificate.> 4.5. Key pair and certificate usage A summary of the use model for the RPKI is provided below. 4.5.1. Subscriber private key and certificate usage The certificates issued bythis registry<name of registry> toresource holderssubscribers are CA certificates. The private key associated with each of these certificates is used to sign subordinate (CA or EE) certificates and CRLs. A subscriberwillmay in turn issue certificates to any organizations to which itallocates resourcesdistributes INRs and may issue one or more EE certificates for use in verifying signatures onROAsRPKI-signed objects signed by the subscriber.<If appropriate, add "Subscribers that are NIRs issue certificates to organizations to which they have allocated address space or AS numbers. Subscribers that are LIRs issue certificates to organizations to which they have allocated address space.">Subscribers also will issue certificates to operators in support of repository access control. 4.5.2. Relying party public key and certificate usage The primary relying parties in this PKI areLIRs/ISPs,organizations who will use RPKI EE certificates to verifyROAs and other signed objects, e.g.,RPKI-signed objects. Repositories will use operator certificates to verify the authorization of entities to engage insupportrepository maintenance activities, and thus repositories represent a secondary type ofgenerating route filters.relying party. 4.6. Certificate renewal 4.6.1. Circumstance for certificate renewal As per the CP, a certificatewillMUST be processed for renewal based on its expiration date or a renewal request from the certificate Subject. The request may be implicit, a side effect of renewing its resource holding agreement, or may be explicit. If <Name of Registry> initiates the renewal process based on the certificate expiration date, then <Name of Registry> will notify theresource holdersubscriber <insert the period of advance warning, e.g.,"2''2 weeks in advance of the expirationdate",date'', or the general policy, e.g.,"in''in conjunction with notification of serviceexpiration".>expiration''.> The validity interval of the new (renewed) certificate will overlap that of the previous certificate by <insert length of overlap period, e.g., 1 week>, to ensure uninterrupted coverage. Certificate renewal will incorporate the same public key as the previous certificate, unless the private key has been reported as compromised. If a new key pair is being used, the stipulations of Section 4.7 will apply. 4.6.2. Who may request renewal Thecertificate holdersubscriber or <Name of Registry> may initiate the renewal process.For<For the case of thecertificate holder, only an individual to whom a BPKI certificate (see Section 3.2.6) has been issued may request renewal of an RPKI certificate. Each certificate issuance request is verified usingsubscriber, describe theBPKI. 4.6.3. Processing certificate renewal requests A Subscriber requests certificate renewal by sending a Certificate Issuance Request message [up/down]. 4.6.4. Notification of new certificate issuanceprocedures that will be used tosubscriber A Subscriberensure that the requester isnotified oftheissuancelegitimate holder ofa new certificate viatheCertificate Issuance Response message, ifINRs in theSubscriber initiatedcertificate being renewed. This should also include therenewal. If <Namemethod employed for verifying PoP ofRegistry> initiated the renewal process, the Subscriber is notified bytheposting ofprivate key corresponding to therenewed certificatepublic key in the<Name of Registry> repository. A Subscriber can discover acertificate being renewed or the new public key if the public key is being changed. With respect to authentication of the subscriber, the procedures should be commensurate with those you already employ in the maintenance of INR distribution records. If you operate a BPKI for this, describe how that business-based PKI is used to authenticate re-newal requests and refer to 3.2.6.> 4.6.3. Processing certificate renewal requests <Describe your procedures for handling certificate renewal requests. This must include verification that the requester is the subscriber or is authorized by the subscriber and that the certificate in question has not been revoked.> 4.6.4. Notification of new certificate issuance to subscriber <Name of Registry>through useMUST notify the subscriber when the certificate is published. <Describe your procedure for notification of new certificate issuance to theList message [up/down].subscriber. This should be consistent with 4.3.2.> 4.6.5. Conduct constituting acceptance of a renewal certificate When a renewal certificate is issued,the CA will place it in the repository. A Subscriber is deemed to have accepted a certificate unless the subscriber explicitly requests revocation of the certificate after publication in the<Name of Registry>RPKIMUST publish it to the repositorysystem, as described in Section 4.9.3.and notify the subscriber. This will be done without subscriber review and acceptance. 4.6.6. Publication of the renewal certificate by the CA<Name<Describe your policy and procedures for publication ofRegistry> will publisha renewalcertificate in the <Name of Registry> RPKI repository within 1 business day after issuance of the renewedcertificate. This should be consistent with 4.4.2.> 4.6.7. Notification of certificate issuance by the CA to other entities[OMITTED]<List here any other entities (besides the subscriber) who will be notified when a renewed certificate is issued.> 4.7. Certificate re-key 4.7.1. Circumstance for certificate re-key As per the CP, re-key of a certificate will be performed only whenrequested,required, based on: (1) knowledge or suspicion of compromise or loss of the associated private key, or (2) the expiration of the cryptographic lifetime of the associated key pair If a certificate is revoked to replace the RFC 3779 extensions, the replacement certificate will incorporate the same public key, not a new key, unless the subscriber requests a re-key at the same time. If the re-key is based on a suspected compromise, then the previous certificate will be revoked. Section 5.6 of the Certificate Policy notes that when a CA signs a certificate, the signing key should have a validity period that exceeds the validity period of the certificate. This places additional constraints on when a CA should request a re-key. 4.7.2. Who may request certification of a new public keyThe holder ofOnly thecertificatesubscriber may request a re-key. In addition, <Name of Registry> may initiate a re-key based on a verified compromise report.If<If theSubscribersubscriber (certificate Subject) requests the rekey, describe how authentication iseffectedeffected, e.g., using the <Name of Registry> BPKI.<DescribeDescribe how a compromise report received from other than a subscriber is verified.> 4.7.3. Processing certificate re-keying requestsA Subscriber requests a re-key of a certificate by issuing a Certificate Issuance Request message in which the resources are ones that the Subscriber already holds, but a new public key is provided in<Describe your process for handling re-keying requests. As per thePKCS #10 portion ofCP, this should be consistent with therequest.process described in Section 4.3. So reference can be made to that section.> 4.7.4. Notification of new certificate issuance to subscriberA Subscriber is notified of<Describe your policy regarding notifying theissuancesubscriber re: availability ofathe new re-keyedcertificate viacertificate. This should be consistent with theCertificate Issuance Response message.notification process for any new certificate issuance (see section 4.3.2).> 4.7.5. Conduct constituting acceptance of a re-keyed certificate When a re-keyed certificate is issued, the CA willplacepublish it in therepository. A subject is deemed to have accepted a certificate issued by this CA unless the subject explicitly requests revocation of the certificate after publication in the <Name of Registry> RPKIrepositorysystem, as described in Section 4.9.3.and notify the subscriber. This will be done without subscriber review and acceptance. 4.7.6. Publication of the re-keyed certificate by the CAA re-keyed certificate will<Describe your policy regarding publication of the new certificate. This should bepublished inconsistent with theRepository system within 1 business day of being issued by this CA.publication process for any new certificate (see section 4.4.2).> 4.7.7. Notification of certificate issuance by the CA to other entities[OMITTED]<List here any entities (other than the subscriber) who will be notified when a re-keyed certificate is issued.> 4.8. Certificate modification 4.8.1. Circumstance for certificate modification As per the CP, modification of a certificate occurs to implement changes to the RFC 3779 extension values in a certificate. A subscriber can request a certificate modification when this information in a currently valid certificate haschanged,changed as a result of changes in theresourceINR holdings of the subscriber.The request mayIf INRs are to beimplicit,distributed to aside effect of the allocation of additional resources, or may be explicit. Asubscriberalso may request that its existing set of resources be redistributed among multiple certificates. This example of certificate modification is effected through issuance of new certificates,andrevocation oftheprevious certificates. If a subscriber is to be allocated address space or AS numbersINRs are in addition to a currentallocation,distribution, and if the subscriber does not request that a new certificate be issued containing only these additional resources, then this is accomplished through a certificate modification. When a certificate modification is approved, a new certificate is issued. The new certificate will contain the same public key and the same expiration date as the original certificate, but with the incidental information corrected and/or theaddress space and AS allocationsINR distribution expanded. When previouslyallocated address space or AS numbersdistributed INRs are to be removed from a certificate, then the old certificate MUST be revoked and a new certificate (reflecting the newallocation)distribution) issued. 4.8.2. Who may request certificate modification Thecertificate holdersubscriber or <Name of Registry> may initiate the certificate modification process.If a certificate holder requests<For themodification,case of therequest is authenticated using the <Name of Registry> BPKI, as described in [up/down]. <Name of Registry>subscriber, state here what steps willmodify a certificate,be taken to verify the identity andrevokeauthorization of theold certificate, if, for example, a Subscriber fails to renew membership in a timely fashion.entity requesting the modification.> 4.8.3. Processing certificate modification requestsA certificate can be modified (other than<Describe your procedures forre-key) only byverification of theaddition or removal or resources. A Subscriber requests certificatemodificationby submitting a Certificate Issuance Request. If therequestcontains valuesand procedures forAS and/or (IPv4 or IPv6) address resource sets that the Subscriber already holds, but which are different from those in the currently issued certificates,therequest is interpreted asissuance of arequest for certificate modification.new certificate. These should be consistent with the processes described in Sections 4.2 and 4.3.1.> 4.8.4. Notification of modified certificate issuance to subscriberA Subscriber is notified of<Describe your procedure for notifying the subscriber about the issuance of a modifiedcertificate by the publication ofcertificate. This should be consistent with the notification process for any new certificatein the <Name of Registry> RPKI repository system.(see section 4.3.2).> 4.8.5. Conduct constituting acceptance of modified certificate When a modified certificate is issued, theCA<Name of Registry> willplace itpublish in the repository and notify the subscriber.A subject is deemed to have accepted the modified certificate unless the subject explicitly requests revocation of the certificate after publication in the <Name of Registry> RPKI repository system, as described in Section 4.9.3.This will be done without subscriber review and acceptance. 4.8.6. Publication of the modified certificate by the CAA<Describe your procedure for publication of a modifiedcertificate willcertificate. This should bepublished inconsistent with the<Name of Registry> RPKI Repository system within 1 business day of being issued by this CA.publication process for any new certificate (see section 4.4.2).> 4.8.7. Notification of certificate issuance by the CA to other entities[OMITTED]<List here any entities (other than the subscriber) who will be notified when a modified certificate is issued.> 4.9. Certificate revocation and suspension 4.9.1. Circumstances for revocation As per the CP, certificates can be revoked for several reasons. Either <Name of Registry> or the subject may choose to end the relationship expressed in the certificate, thus creating cause to revoke the certificate. If one or more of theresourcesINRs bound to the public key in the certificate are no longer associated with the subject, that too constitutes a basis for revocation. A certificate also may be revoked due to loss or compromise of the private key corresponding to the public key in the certificate. Finally, a certificate may be revoked in order to invalidate data signed bythat certificate. 4.9.2.the private key associated with that certificate. 4.9.2. Who can request revocation Thecertificate holdersubscriber or <Name of Registry> may request a revocation.A Subscriber requests certificate revocation using<For theCertificate Revocation Request message described in [up/down].case of the subscriber, describe what steps will be taken to verify the identity and authorization of the entity requesting the revocation.> 4.9.3. Procedure for revocation requestA Subscriber requests<Describe your process for handling a certificate revocationusingrequest. This should include: o Procedure to be used by theCertificate Revocation Request message described in [up/down]. The Certificate Revocation Response message confirms receiptsubscriber to request a revocation o Procedure for notification of the subscriber when the revocationrequestis initiated by <Name ofRegistry>, and indicates that <Name of Registry> will include the revoked certificate in a CRL.ISP>.> 4.9.4. Revocation request grace period ASubscribersubscriber should request revocation as soon as possible after the need for revocation has been identified. 4.9.5. Time within which CA must process the revocation request <Describe your policy on the time period within which you will process a revocation request.> 4.9.6. Revocation checking requirement for relying parties As per the CP, a relying party is responsible for acquiring and checking the most recent, scheduled CRL from the issuer of the certificate, whenever the relying party validates a certificate. 4.9.7. CRL issuance frequencyThe <Name of Registry> RPKI production CA will publish CRLs approximately every 24 hours. The <Name of Registry> RPKI offline CA will publish<State the CRL issuance frequency for the CRLson a monthly basis.that you publish.> Each CRL will carry a nextScheduledUpdatevaluevalue; and a new CRL will be published at or before that time. <Name of Registry> will set the nextScheduledUpdate value when it issues a CRL, to signal when the next scheduled CRL will be issued. 4.9.8. Maximum latency for CRLs A CRL will bepostedpublished to the repository systemwith minimal delaywithin <state the maximum latency> after generation.4.9.9. On-line revocation/status checking availability [OMITTED] 4.9.10. On-line revocation checking requirements [OMITTED] 4.9.11. Other forms of revocation advertisements available [OMITTED] 4.9.12. Special requirements re key compromise [OMITTED] 4.9.13. Circumstances for suspension [OMITTED] 4.9.14. Who can request suspension [OMITTED] 4.9.15. Procedure for suspension request [OMITTED] 4.9.16. Limits on suspension period [OMITTED]4.10. Certificate status services <Name of Registry> does not supportOCSP.OCSP or SCVP. <Name of Registry> issues CRLs.4.10.1. Operational characteristics [OMITTED] 4.10.2. Service availability [OMITTED] 4.10.3. Optional features [OMITTED] 4.11. End of subscription [OMITTED] 4.12. Key escrow and recovery [OMITTED] 4.12.1. Key escrow and recovery policy and practices [OMITTED] 4.12.2. Session key encapsulation and recovery policy and practices [OMITTED]5. Facility, Management,Andand Operational Controls 5.1. Physical controls <As per the CP, describe the physical controls that you employ for certificate management. These should be commensurate to those used in the management ofaddress space and AS number allocation.>INR distribution.> 5.1.1. Site location and construction 5.1.2. Physical access 5.1.3. Power and air conditioning 5.1.4. Water exposures 5.1.5. Fire prevention and protection 5.1.6. Media storage 5.1.7. Waste disposal 5.1.8. Off-site backup 5.2. Procedural controls <As per the CP, describe the procedural security controls that you employ for certificate management. These should be commensurate to those used in the management ofaddress space and AS number allocation.>INR distribution.> 5.2.1. Trusted roles 5.2.2. Number of persons required per task 5.2.3. Identification and authentication for each role 5.2.4. Roles requiring separation of duties 5.3. Personnel controls <As per the CP, describe the personnel security controls that you employ for individuals associated with certificate management. These should be commensurate to those used in the management ofaddress space and AS number allocation.>INR distribution.> 5.3.1. Qualifications, experience, and clearance requirements 5.3.2. Background check procedures 5.3.3. Training requirements 5.3.4. Retraining frequency and requirements 5.3.5. Job rotation frequency and sequence 5.3.6. Sanctions for unauthorized actions 5.3.7. Independent contractor requirements 5.3.8. Documentation supplied to personnel 5.4. Audit logging procedures <As per the CP, describe in the following sections the details of how you implement audit logging.> 5.4.1. Types of events recorded Audit records will be generated for the basic operations of the certification authority computing equipment. Audit records will include the date, time, responsible user or process, and summary content data relating to the event. Auditable events include: Access to CA computing equipment (e.g., logon, logout) Messages received requesting CA actions (e.g., certificate requests, certificate revocation requests, compromise notifications) Certificate creation, modification, revocation, or renewal actions Posting of any material to a repository Any attempts to change or delete audit data <List here any additional types of events that will be audited.> 5.4.2. Frequency of processing log <Describe your procedures for review of audit logs.> 5.4.3. Retention period for audit log <Describe yourpolicespolicies for retention of audit logs.> 5.4.4. Protection of audit log <Describe your policies for protection of the audit logs.> 5.4.5. Audit log backup procedures <Describe your policies for backup of the audit logs.> 5.4.6. Audit collection system (internal vs. external) [OMITTED] 5.4.7. Notification to event-causing subject [OMITTED] 5.4.8. Vulnerability assessments <Describe any vulnerability assessments that you will apply (or have already applied) to the PKI subsystems. This should include whether such assessments have taken place and any procedures or plans to perform or repeat/reassess vulnerabilities in the future.> 5.5. Records archival [OMITTED]5.5.1. Types5.6. Key changeover The <Name ofrecords archived [OMITTED] 5.5.2. RetentionRegistry> CA certificate will contain a validity periodfor archive [OMITTED] 5.5.3. Protectionthat is at least as long as that ofarchive [OMITTED] 5.5.4. Archive backup procedures [OMITTED] 5.5.5. Requirements for time-stamping of records [OMITTED] 5.5.6. Archive collection system (internal or external) [OMITTED] 5.5.7. Procedures to obtain and verify archive information [OMITTED] 5.6. Key changeover The <Name of Registry> CAany certificatewill contain a validity period that encompassesbeing issued under that certificate. When <Name ofall certificates verifiable using thisRegistry> CAcertificate. To support this,wishes to change keys, <Name of Registry> will create a new signature key pair, and acquire and publish a new certificate containing the public key of the pair, <specify here the minimum amount of lead time, e.g.,"a''a minimum of 6months">months''> in advance of the scheduled change of the current signature key pair. 5.7. Compromise and disaster recovery [OMITTED]5.7.1. Incident and compromise handling procedures [OMITTED] 5.7.2. Computing resources, software, and/or data are corrupted [OMITTED] 5.7.3. Entity private key compromise procedures [OMITTED] 5.7.4. Business continuity capabilities after a disaster [OMITTED]5.8. CA or RA termination <Describethe fallbackyour policy for management of your CA'sIP address space and AS number allocationsINR distributions in case of its own termination.> 6. Technical Security Controls This section describes the security controls used by <Name of Registry>. 6.1. Key pair generation and installation 6.1.1. Key pair generation <Describe the procedures that will be used to generate the CA key pair, and, if applicable, key pairs fornetworksubscribers. In most instances, public-key pairs will be generated by the subscriber, i.e., the organization receiving theallocationdistribution ofaddress space or AS numbers.INRs. However, your procedures may include one for generating key pairs on behalf of your subscribers if they so request. (This might be done for subscribers who do not have the ability to perform key generation in a secure fashion or who want a registry to provide backup for the subscriber private key.) Since the keys used in this PKI are not for non-repudiation purposes, generation of key pairs by CAs does not inherently undermine the security of thePKI. >PKI.> 6.1.2. Private key delivery to subscriber <If the procedures in 6.1.1 include providing key pair generation services for subscribers, describe the means by which private keys are delivered to subscribers in a secure fashion. Otherwise say this is not applicable.> 6.1.3. Public key delivery to certificate issuerSubscribers<Describe the procedures that will be used to deliver a subscriber's public keys to the <Name of Registry> RPKICA by use ofCA. These procedures should ensure that theup/down protocol as described in [up/down].public key has not been altered during transit and that the subscriber possesses the private key corresponding to the transferred public key. > 6.1.4. CA public key delivery to relying parties CA public keys for all entitiesother(other thanRIRstrust anchors) are contained in certificates issued by otherCAs. These certificates plus certificates used to represent inter-RIR transfers of address space or AS numbers willCAs and MUST be publishedvia ato the RPKI repository system. Relying partieswillMUST download these certificates from this system. Public key values and associated data forthe(putative) trust anchors(RIRs) willMUST be distributed out ofband,band and accepted by relying parties on the basis of locally-defined criteria, e.g., embedded in path validation software that will be made available to the Internet community. 6.1.5. Key sizesFor the <Name of Registry> offline CA'sand production CA's certificates, the RSA key size will be 2048 bits. For subscriber certificates, the RSA keys will be <insert key size -- e.g., 2048 or 1024 bits. If NIR key size is larger than LIR/ISP/subscriberThe keysize, describe each independently.>sizes used in this PKI are as specified in RFC ZZZZ [RFCzzzz]. <Describe any deviations from this statement.> 6.1.6. Public key parameters generation and quality checking TheRSA algorithm [RSA] ispublic key algorithms and parameters used in this PKIwith the public exponent (e) F4 (65,537).are as specified in RFC ZZZZ [RFCzzzz]. <Describe any deviations from this statement.> <If the procedures in 6.1.1 include subscriber key pair generation, EITHER insert here text specifying that the subscriber is responsible for performing checks on the quality of its key pair and saying that <Name of Registry> is not responsible for performing such checks for subscribers OR describe the procedures used by the CA for checking the quality of these subscriber key pairs.> 6.1.7. Key usage purposes (as per X.509 v3 key usage field) The Key usage extension bit values will be consistent with RFC3280.5280. For <Name of Registry>'s CA certificates, the keyCertSign and cRLSign bits will be set TRUE. All other bits (including digitalSignature) will be set FALSE, and the extension will be marked critical.6.2. Private Key Protection<Specify whether end entity certificates (e.g., issued by the CA for its operators) will include this extension andCryptographic Module Engineering Controlsif so, the appropriate bit values as per RFC 5280.> 6.2. Private Key Protection and Cryptographic Module Engineering Controls 6.2.1. Cryptographic module standards and controls The <Name of Registry>RPKICA employs a cryptographic module evaluated under FIPS140-2,140-2/3, at level 3 [FIPS]. 6.2.2. Private key (n out of m) multi-person controlThere<If you choose to use multi-person controls to constrain access to your CA's private keys, then insert the following text. ''There will be private key <insert here n> out of <insert here m> multi-personcontrol.control.''> 6.2.3. Private key escrow No private key escrow procedures are required for this PKI. 6.2.4. Private key backup <Describe the procedures used for backing up your CA's private key. The following aspects should be included. (1) The copying should be done under the same multi-party control as is used for controlling the original private key. (2) At least one copy should be kept at an off-site location for disaster recovery purposes.> 6.2.5. Private key archival See sections 6.2.3 and 6.2.4 6.2.6. Private key transfer into or from a cryptographic module The private keys for <Name of Registry>'soffline CA andproduction CAwill< if appropriate, change ''production CA'' to ''production and offline CAs''> MUST be generated by the cryptographic module specified in 6.2.1. The private keys will never leave the module except in encrypted form for backup and/or transfer to a new module. 6.2.7. Private key storage on cryptographic module The privatekeyskey for <Name of Registry>'s production CAwill<if appropriate, change ''production CA'' to ''production and offline CAs''> MUST be stored in the cryptographic module and will be protected from unauthorized use in accordance with the FIPS140-2140-2/3 requirements applicable to the module. (See [FIPS]) 6.2.8. Method of activating private key <Describe the mechanisms and data used to activate your CA's private key.> 6.2.9. Method of deactivating private key The cryptographic module, when activated, will not be left unattended. After use, it will be deactivated by <Describe the procedure for deactivation of your CA's private key.> The module will be stored securely when not in use. 6.2.10. Method of destroying private key <Describe the method used for destroying your CA's private key, e.g., when it is superseded. This will depend on the particular module.> 6.2.11. Cryptographic Module Rating The cryptographic module used by the <Name of Registry> production CA will be certified FIPS140-2,140-2/3, at level 3 [FIPS]. 6.3. Other aspects of key pair management 6.3.1. Public key archival Because this PKI does not support non-repudiation, there is no need to archive public keys. 6.3.2. Certificate operational periods and key pair usage periods The <Name of Registry> CA's key pair will have a validity interval of <insert number of years - - Registry key pairs and certificates should have long validity intervals, e.g., 10 years, to minimize the disruption caused by key changeover for top tier CAs.> 6.4. Activation data 6.4.1. Activation data generation and installation <Describe how activation data for your CA will be generated.> 6.4.2. Activation data protection Activation data for the CA private key will be protected by <Describe your procedures here>. 6.4.3. Other aspects of activation data <Add here any details you wish to provide with regard to the activation data for your CA. If there are none, say"None.">''None.''> 6.5. Computer security controls 6.5.1. Specific computer security technical requirement <Describe your security requirements for the computers used to support this PKI, e.g., requirements for authenticated logins, audit capabilities, etc. These requirements should be commensurate with those used for the computers used for managingallocationdistribution ofIP addresses and AS numbers.> 6.5.2. Computer security rating [OMITTED]INRs.> 6.6. Life cycle technical controls 6.6.1. System development controls <Describe any system development controls that you will apply to the PKI systems, e.g., use of Trusted System Development Methodology (TSDM) Level 2.> 6.6.2. Security management controls <Describe the security management controls that will be used for the RPKI software and equipment employed by the CA. These security measures should be commensurate with those used for the systems used by the CAs for managing andallocating RPKI resources.>distributing INRs.> 6.6.3. Life cycle security controls <Describe how the equipment (hardware and software) used forPKIRPKI functions will be procured, installed, maintained, and updated. This should be done in a fashion commensurate with the way in which equipment for the management andallocationdistribution ofIP address space and AS numbersINRs is handled. > 6.7. Network security controls <Describe the network security controls that will be used for CA operation. These should be commensurate with the network security controls employed for the computers used for managingallocationdistribution ofIP addresses and AS numbers.>INRs.> 6.8. Time-stamping ThePKI in questionRPKI does not make use of time stamping. 7. Certificate and CRL Profiles 8. Please refer to the Certificate and CRL Profile [RFCyyyy].7.1. Certificate profile [OMITTED] 7.1.1. Version number(s) [OMITTED] 7.1.2. Certificate extensions [OMITTED] 7.1.2.1. Required certificate extensions [OMITTED] 7.1.2.2. Deprecated certificate extensions [OMITTED] 7.1.2.3. Optional certificate extensions [OMITTED] 7.1.3. Algorithm object identifiers [OMITTED] 7.1.4. Name forms [OMITTED] 7.1.5. Name constraints [OMITTED] 7.1.6. Certificate policy object identifier [OMITTED] 7.1.7. Usage of Policy Constraints extension [OMITTED] 7.1.8. Policy qualifiers syntax and semantics [OMITTED] 7.1.9. Processing semantics for the critical Certificate Policies extension [OMITTED] 7.2. CRL profile [OMITTED] 7.2.1. Version number(s) [OMITTED] 7.2.2. CRL and CRL entry extensions [OMITTED] 7.2.2.1. Required CRL extensions [OMITTED] 7.2.2.2. Deprecated CRL extensions [OMITTED] 7.2.2.3. Optional CRL extensions [OMITTED] 7.3. OCSP profile [OMITTED] 7.3.1. Version number(s) [OMITTED] 7.3.2. OCSP extensions [OMITTED] 8.Compliance Audit and Other Assessments <List here any audit and other assessments used to ensure the security of the administration ofIP addresses and AS numbers.INRs. These are sufficient for thePKIRPKI systems.> 8.1. Frequency or circumstances of assessment 8.2. Identity/qualifications of assessor 8.3. Assessor's relationship to assessed entity 8.4. Topics covered by assessment 8.5. Actions taken as a result of deficiency 8.6. Communication of results 9. Other Business And Legal Matters <The sections below are optional. Fill them in as appropriate for your organization. The CP says that CAs should cover 9.1 to 9.11 and 9.13 to 9.17 although not every CA will choose to do so. Note that the manner in which you manage your business and legal matters for this PKI should be commensurate with the way in which you manage business and legal matters for theallocationdistribution ofRPKI resources.>INRs.> 9.1. Fees 9.1.1. Certificate issuance or renewal fees 9.1.2. Fees for other services (if applicable) 9.1.3. Refund policy 9.2. Financial responsibility 9.2.1. Insurance coverage 9.2.2. Other assets 9.2.3. Insurance or warranty coverage for end-entities 9.3. Confidentiality of business information 9.3.1. Scope of confidential information 9.3.2. Information not within the scope of confidential information 9.3.3. Responsibility to protect confidential information 9.4. Privacy of personal information 9.4.1. Privacy plan 9.4.2. Information treated as private 9.4.3. Information not deemed private 9.4.4. Responsibility to protect private information 9.4.5. Notice and consent to use private information 9.4.6. Disclosure pursuant to judicial or administrative process 9.4.7. Other information disclosure circumstances 9.5. Intellectual property rights (if applicable) 9.6. Representations and warranties 9.6.1. CA representations and warranties 9.6.2. Subscriber representations and warranties 9.6.3. Relying party representations and warranties9.6.4. Representations and warranties of other participants [OMITTED]9.7. Disclaimers of warranties 9.8. Limitations of liability 9.9. Indemnities 9.10. Term and termination 9.10.1. Term 9.10.2. Termination 9.10.3. Effect of termination and survival 9.11. Individual notices and communications with participants 9.12. Amendments 9.12.1. Procedure for amendment 9.12.2. Notification mechanism and period9.12.3. Circumstances under which OID must be changed [OMITTED]9.13. Dispute resolution provisions 9.14. Governing law 9.15. Compliance with applicable law 9.16. Miscellaneous provisions 9.16.1. Entire agreement 9.16.2. Assignment 9.16.3. Severability 9.16.4. Enforcement (attorneys' fees and waiver of rights) 9.16.5. Force Majeure9.17. Other provisions [OMITTED]10. Security Considerations The degree to which a relying party can trust the binding embodied in a certificate depends on several factors. These factors can include the practices followed by the certification authority (CA) in authenticating the subject; the CA's operating policy, procedures, and technical security controls, including the scope of the subscriber's responsibilities (for example, in protecting the private key), and the stated responsibilities and liability terms and conditions of the CA (for example, warranties, disclaimers of warranties, and limitations of liability). This document provides a framework to address the technical, procedural, personnel, and physical security aspects of Certification Authorities, Registration Authorities, repositories, subscribers, and relying party cryptographic modules, in order to ensure that the certificate generation, publication, renewal, re-key, usage, and revocation is done in a secure manner. Specifically, Section 3 Identification and Authentication (I&A); Section 4 Certificate Life-Cycle Operational Requirements; Section 5 Facility Management, and Operational Controls; Section 6 Technical Security Controls; Section 7 Certificate and CRL Profiles; and Section 8 Compliance Audit and Other Assessments are oriented towards ensuring secure operation of the PKI entities such as CA, RA, repository, subscriber systems, and relying party systems. 11. IANA Considerations None. 12. Acknowledgments The authors would like to thank Geoff Huston for reviewing thisdocument anddocument, Matt Lepinski for his help with theformatting.formatting, and Ron Watro for assistance with editing. 13. References 13.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC3280] Housley, R., Polk, W. Ford, W., Solo, D.,"Internet''Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL)Profile",Profile,'' BCP 14, RFC 2119, March 1997. [RFCxxxx] Seo, K., Watro, R., Kong, D., and Kent, S.,"Certificate''Certificate Policy for the Resource PKI(RPKI)",(RPKI),'' work in progress. [RFCyyyy] Huston, G.,Loomans, R.,Michaelson, G.,"ALoomans, R., ''A Profile for X.509 PKIX ResourceCertificates",Certificates,'' work in progress.[up/down] Houston,[RFCzzzz] Huston, G.,Loomis, R., Ellacott, B., Austein, R., "A Protocol''A Profile forProvisioningAlgorithms and Key Sizes for use in the ResourceCertificates",Public Key Infrastructure,'' work in progress. 13.2. Informative References [BGP4] Y. Rekhter, T. Li (editors), A Border Gateway Protocol 4 (BGP-4). IETF RFC 1771, March 1995.[cps-business-pki] <Certification Practice Statement (CPS) for this registry's business PKI -- to be filled in>[FIPS] Federal Information Processing Standards Publication140-2 (FIPS PUB 140-2),140-3 (FIPS-140-3), "Security Requirements for Cryptographic Modules", Information Technology Laboratory, National Institute of Standards and Technology,May 25, 2001. [operations-business-pki] <Document or pointer to document describing the operations of this registry's business PKI -- to be filled in>work in progress. [RSA] Rivest, R., Shamir, A., and Adelman, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126. Author's Addresses Stephen Kent BBN Technologies 10 Moulton Street Cambridge MA 02138 USA Phone: +1 (617) 873-3988 Email: skent@bbn.com Derrick Kong BBN Technologies 10 Moulton Street Cambridge MA 02138 USA Phone: +1 (617) 873-1951 Email: dkong@bbn.com Karen Seo BBN Technologies 10 Moulton Street Cambridge MA 02138 USA Phone: +1 (617) 873-3152 Email: kseo@bbn.comIntellectual Property Statement ThePre-5378 Material Disclaimer This document may contain material from IETFtakes no position regarding the validity or scope of any Intellectual Property RightsDocuments orother rights that might be claimed to pertain to the implementationIETF Contributions published oruse ofmade publicly available before November 10, 2008. The person(s) controlling thetechnology describedcopyright in some of thisdocument or the extent to which any license under such rights might or mightmaterial may notbe available; nor does it represent that it has made any independent effort to identify any such rights. Information onhave granted theprocedures with respectIETF Trust the right torights in RFC documents can be found in BCP 78 and BCP 79. Copiesallow modifications ofIPR disclosures made tosuch material outside the IETFSecretariat and any assurances of licenses to be made available, or the result ofStandards Process. Without obtaining anattempt made to obtain a generaladequate licenseor permission forfrom theuse ofperson(s) controlling the copyright in suchproprietary rights by implementers or users ofmaterials, thisspecification candocument may not beobtained frommodified outside the IETFon-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology thatStandards Process, and derivative works of it may not berequired to implement this standard. Please address the information tocreated outside the IETFat ietf- ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided onStandards Process, except to format it for publication as an"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.RFC or to translate it into languages other than English. Copyright Statement Copyright(C) The(c) 2010 IETF Trust(2008).and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and therights, licensesIETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictionscontainedwith respect to this document. Code Components extracted from this document must include Simplified BSD License text as described inBCP 78,Section 4.e of the Trust Legal Provisions andexceptare provided without warranty asset forth therein,described in theauthors retain all their rights.Simplified BSD License.