Secure Inter-Domain Routing (sidr) Kong, D. Internet Draft Seo, K. Expires:May 2009October 2010 Kent, S. Intended Status:InformationalBCP BBN TechnologiesNovember 2008March 8, 2010 Template for an Internet Service Provider's Certification Practice Statement (CPS) for the Resource PKI (RPKI)draft-ietf-sidr-cps-isp-03.txtdraft-ietf-sidr-cps-isp-04.txt Status of this MemoBy submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or sheThis Internet-Draft isaware have been or will be disclosed, and any of which he or she becomes aware will be disclosed,submitted to IETF inaccordancefull conformance withSection 6the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire onMayOctober 31,2009.Abstract2010. Abstract This document contains a template to be used for creating a Certification Practice Statement (CPS) fora Local Internet Registry (LIR) oran Internet Service Provider (ISP) that is part of the Resource Public Key Infrastructure(PKI).(RPKI). Conventions used in this document The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [RFC2119]. Table of ContentsPreface...........................................................8Preface...........................................................7 1.Introduction...................................................9Introduction...................................................8 1.1.Overview.................................................10Overview..................................................8 1.2. Document name andidentification.........................11identification..........................9 1.3. PKIparticipants.........................................11participants..........................................9 1.3.1. Certificationauthorities...........................12authorities............................9 1.3.2. Registrationauthorities............................12authorities.............................9 1.3.3.Subscribers.........................................12Subscribers.........................................10 1.3.4. Relyingparties.....................................12parties.....................................10 1.3.5. Otherparticipants [OMITTED]........................12participants..................................10 1.4. Certificateusage........................................13usage........................................10 1.4.1. Appropriate certificateuses........................13uses........................10 1.4.2. Prohibited certificateuses.........................13uses.........................10 1.5. Policyadministration....................................13administration....................................11 1.5.1. Organization administering thedocument.............13document.............11 1.5.2. Contactperson......................................13person......................................11 1.5.3. Person determining CPS suitability for thepolicy...13policy...11 1.5.4. CPS approvalprocedures.............................13procedures.............................11 1.6. Definitions andacronyms.................................14acronyms.................................11 2. Publication And RepositoryResponsibilities...................15Responsibilities...................13 2.1.Repositories.............................................15Repositories.............................................13 2.2. Publication of certificationinformation.................15information.................13 2.3. Time or Frequency ofPublication.........................15Publication.........................13 2.4. Access controls onrepositories..........................15repositories..........................13 3. Identification AndAuthentication.............................17Authentication.............................15 3.1.Naming...................................................17Naming...................................................15 3.1.1. Types ofnames......................................17names......................................15 3.1.2. Need for names to bemeaningful.....................17meaningful.....................15 3.1.3. Anonymity or pseudonymity ofsubscribers............17subscribers............15 3.1.4. Rules for interpreting various nameforms...........17forms...........15 3.1.5. Uniqueness ofnames.................................17names.................................15 3.1.6. Recognition, authentication, and role oftrademarks.................................................18trademarks.16 3.2. Initial identityvalidation..............................18validation..............................16 3.2.1. Method to prove possession of privatekey...........18key...........16 3.2.2. Authentication of organizationidentity.............18identity.............16 3.2.3. Authentication of individualidentity...............18identity...............16 3.2.4. Non-verified subscriberinformation.................19information.................17 3.2.5. Validation ofauthority.............................19authority.............................17 3.2.6. Criteria forinteroperation.........................19interoperation.........................17 3.3. Identification and authentication for re-keyrequests....19requests....17 3.3.1. Identification and authentication for routinere- key........................................................19re-key17 3.3.2. Identification and authentication for re-key afterrevocation.................................................19revocation.................................................18 3.4. Identification and authentication for revocationrequest.20request.18 4. Certificate Life-Cycle OperationalRequirements...............21Requirements...............19 4.1. CertificateApplication..................................21Application..................................19 4.1.1. Who can submit a certificateapplication............21application............19 4.1.2. Enrollment process andresponsibilities.............21responsibilities.............19 4.2. Certificate applicationprocessing.......................21processing.......................19 4.2.1. Performing identification and authenticationfunctions..................................................21functions19 4.2.2. Approval or rejection of certificateapplications...21applications...19 4.2.3. Time to process certificateapplications............22applications............20 4.3. Certificateissuance.....................................22issuance.....................................20 4.3.1. CA actions during certificateissuance..............22issuance..............20 4.3.2. Notification to subscriber by the CA of issuance ofcertificate.............................................22certificate................................................20 4.3.3. Notification of certificate issuance by the CA to otherentities [OMITTED]...................................22entities...................................................20 4.4. Certificateacceptance...................................22acceptance...................................20 4.4.1. Conduct constituting certificateacceptance.........22acceptance.........20 4.4.2. Publication of the certificate by theCA............22CA............20 4.5. Key pair and certificateusage...........................22usage...........................20 4.5.1. Subscriber private key and certificateusage........22usage........21 4.5.2. Relying party public key and certificateusage......23usage......21 4.6. Certificaterenewal......................................23renewal......................................21 4.6.1. Circumstance for certificaterenewal................23renewal................21 4.6.2. Who may requestrenewal.............................23renewal.............................21 4.6.3. Processing certificate renewalrequests.............24requests.............22 4.6.4. Notification of new certificate issuance tosubscriber.................................................24subscriber22 4.6.5. Conduct constituting acceptance of a renewalcertificate................................................24certificate ...........................................................22 4.6.6. Publication of the renewal certificate by theCA....24CA....22 4.6.7. Notification of certificate issuance by the CA to otherentities [OMITTED]...................................24entities...................................................22 4.7. Certificatere-key.......................................24re-key.......................................22 4.7.1. Circumstance for certificatere-key.................24re-key.................22 4.7.2. Who may request certification of a new publickey...25key...23 4.7.3. Processing certificate re-keyingrequests...........25requests...........23 4.7.4. Notification of new certificate issuance tosubscriber.................................................25subscriber23 4.7.5. Conduct constituting acceptance of a re-keyedcertificate................................................25certificate................................................23 4.7.6. Publication of the re-keyed certificate by theCA...25CA...24 4.7.7. Notification of certificate issuance by the CA to otherentities [OMITTED]...................................25entities...................................................24 4.8. Certificatemodification.................................25modification.................................24 4.8.1. Circumstance for certificatemodification...........25modification...........24 4.8.2. Who may request certificatemodification............26modification............24 4.8.3. Processing certificate modificationrequests........26requests........24 4.8.4. Notification of modified certificate issuance tosubscriber.................................................26subscriber.................................................25 4.8.5. Conduct constituting acceptance of modifiedcertificate................................................26certificate ...........................................................25 4.8.6. Publication of the modified certificate by theCA...26CA...25 4.8.7. Notification of certificate issuance by the CA to otherentities [OMITTED]...................................27entities...................................................25 4.9. Certificate revocation andsuspension....................27suspension....................25 4.9.1. Circumstances forrevocation........................27revocation........................25 4.9.2. Who can requestrevocation..........................27revocation..........................25 4.9.3. Procedure for revocationrequest....................27request....................26 4.9.4. Revocation request graceperiod.....................27period.....................26 4.9.5. Time within which CA must process the revocationrequest....................................................27request ...........................................................26 4.9.6. Revocation checking requirement for relyingparties....................................................28parties.26 4.9.7. CRL issuancefrequency..............................28frequency..............................26 4.9.8. Maximum latency forCRLs............................28 4.9.9. On-line revocation/status checking availability [OMITTED]..................................................28 4.9.10. On-line revocation checking requirements [OMITTED]..................................................28 4.9.11. Other forms of revocation advertisements available [OMITTED]........................................28 4.9.12. Special requirements re key compromise [OMITTED]...28 4.9.13. Circumstances for suspension [OMITTED].............28 4.9.14. Who can request suspension [OMITTED]...............28 4.9.15. Procedure for suspension request [OMITTED].........28 4.9.16. Limits on suspension period [OMITTED]..............28CRLs............................26 4.10. Certificate statusservices.............................28 4.10.1. Operational characteristics [OMITTED}..............29 4.10.2. Service availability [OMITTED].....................29 4.10.3. Optional features [OMITTED]........................29 4.11. End of subscription [OMITTED]...........................29 4.12. Key escrow and recovery [OMITTED].......................29 4.12.1. Key escrow and recovery policy and practices [OMITTED]..................................................29 4.12.2. Session key encapsulation and recovery policy and practices [OMITTED]........................................29services.............................26 5. Facility, Management, and OperationalControls................30Controls................27 5.1. Physicalcontrols........................................30controls........................................27 5.1.1. Site location andconstruction......................30construction......................27 5.1.2. Physicalaccess.....................................30access.....................................27 5.1.3. Power and airconditioning..........................30conditioning..........................27 5.1.4. Waterexposures.....................................30exposures.....................................27 5.1.5. Fire prevention andprotection......................30protection......................27 5.1.6. Mediastorage.......................................30storage.......................................27 5.1.7. Wastedisposal......................................30disposal......................................27 5.1.8. Off-sitebackup.....................................30backup.....................................27 5.2. Proceduralcontrols......................................30controls......................................27 5.2.1. Trustedroles.......................................30roles.......................................27 5.2.2. Number of persons required pertask.................30task.................27 5.2.3. Identification and authentication for eachrole.....30role.....27 5.2.4. Roles requiring separation ofduties................30duties................27 5.3. Personnelcontrols.......................................30controls.......................................27 5.3.1. Qualifications, experience, and clearancerequirements...............................................31requirements28 5.3.2. Background checkprocedures.........................31procedures.........................28 5.3.3. Trainingrequirements...............................31requirements...............................28 5.3.4. Retraining frequency andrequirements...............31requirements...............28 5.3.5. Job rotation frequency andsequence.................31sequence.................28 5.3.6. Sanctions for unauthorizedactions..................31actions..................28 5.3.7. Independent contractorrequirements.................31requirements.................28 5.3.8. Documentation supplied topersonnel.................31personnel.................28 5.4. Audit loggingprocedures.................................31procedures.................................28 5.4.1. Types of eventsrecorded............................31recorded............................28 5.4.2. Frequency of processinglog.........................31log.........................28 5.4.3. Retention period for auditlog......................32log......................29 5.4.4. Protection of auditlog.............................32log.............................29 5.4.5. Audit log backupprocedures.........................32procedures.........................29 5.4.6. Audit collection system (internal vs. external)[OMITTED]..................................................32[OMITTED]..................................................29 5.4.7. Notification to event-causing subject[OMITTED].....32[OMITTED].....29 5.4.8. Vulnerabilityassessments...........................32assessments...........................29 5.5. Records archival[OMITTED]...............................32 5.5.1. Types of records archived [OMITTED].................32 5.5.2. Retention period for archive [OMITTED]..............32 5.5.3. Protection of archive [OMITTED].....................32 5.5.4. Archive backup procedures [OMITTED].................32 5.5.5. Requirements for time-stamping of records [OMITTED]..................................................32 5.5.6. Archive collection system (internal or external) [OMITTED]..................................................32 5.5.7. Procedures to obtain and verify archive information [OMITTED]......................................32[OMITTED]...............................29 5.6. Keychangeover...........................................32changeover...........................................29 5.7. Compromise and disaster recovery[OMITTED]...............33 5.7.1. Incident and compromise handling procedures [OMITTED]..................................................33 5.7.2. Computing resources, software, and/or data are corrupted [OMITTED]........................................33 5.7.3. Entity private key compromise procedures [OMITTED]..33 5.7.4. Business continuity capabilities after a disaster [OMITTED]..................................................33[OMITTED]...............29 5.8. CA or RAtermination.....................................33termination.....................................29 6. Technical SecurityControls...................................34Controls...................................30 6.1. Key pair generation andinstallation.....................34installation.....................30 6.1.1. Key pairgeneration.................................34generation.................................30 6.1.2. Private key delivery tosubscriber..................34subscriber..................30 6.1.3. Public key delivery to certificateissuer...........34issuer...........30 6.1.4. CA public key delivery to relyingparties...........34parties...........30 6.1.5. Keysizes...........................................35sizes...........................................31 6.1.6. Public key parameters generation and qualitychecking...................................................35checking31 6.1.7. Key usage purposes (as per X.509 v3 key usagefield).....................................................35field)31 6.2. Private Key Protection and Cryptographic Module EngineeringControls......................................................35Controls......................................................31 6.2.1. Cryptographic module standards andcontrols.........35controls.........31 6.2.2. Private key (n out of m) multi-personcontrol.......35control.......31 6.2.3. Private keyescrow..................................36escrow..................................31 6.2.4. Private keybackup..................................36backup..................................32 6.2.5. Private keyarchival................................36archival................................32 6.2.6. Private key transfer into or from a cryptographicmodule.....................................................36module ...........................................................32 6.2.7. Private key storage on cryptographicmodule.........36module.........32 6.2.8. Method of activating privatekey....................36key....................32 6.2.9. Method of deactivating privatekey..................36key..................32 6.2.10. Method of destroying privatekey...................36key...................32 6.2.11. Cryptographic ModuleRating........................37Rating........................33 6.3. Other aspects of key pairmanagement.....................37management.....................33 6.3.1. Public keyarchival.................................37archival.................................33 6.3.2. Certificate operational periods and key pair usageperiods....................................................37periods....................................................33 6.4. Activationdata..........................................37data..........................................33 6.4.1. Activation data generation andinstallation.........37installation.........33 6.4.2. Activation dataprotection..........................37protection..........................33 6.4.3. Other aspects of activationdata....................37data....................33 6.5. Computer securitycontrols...............................37controls...............................33 6.5.1. Specific computer security technicalrequirement....37 6.5.2. Computer security rating [OMITTED]..................38requirement....33 6.6. Life cycle technicalcontrols............................38controls............................34 6.6.1. System developmentcontrols.........................38controls.........................34 6.6.2. Security managementcontrols........................38controls........................34 6.6.3. Life cycle securitycontrols........................38controls........................34 6.7. Network securitycontrols................................38controls................................34 6.8.Time-stamping............................................38Time-stamping............................................34 7. Certificate and CRLProfiles..................................39 7.1. Certificate profile [OMITTED]............................39 7.1.1. Version number(s) [OMITTED].........................39 7.1.2. Certificate extensions [OMITTED]....................39 7.1.3. Algorithm object identifiers [OMITTED]..............39 7.1.4. Name forms [OMITTED]................................39 7.1.5. Name constraints [OMITTED]..........................39 7.1.6. Certificate policy object identifier [OMITTED]......39 7.1.7. Usage of Policy Constraints extension [OMITTED].....39 7.1.8. Policy qualifiers syntax and semantics [OMITTED]....39 7.1.9. Processing semantics for the critical Certificate Policies extension [OMITTED]...............................39 7.2. CRL profile [OMITTED]....................................39 7.2.1. Version number(s) [OMITTED].........................39 7.2.2. CRL and CRL entry extensions [OMITTED]..............39 7.3. OCSP profile [OMITTED]...................................40 7.3.1. Version number(s) [OMITTED].........................40 7.3.2. OCSP extensions [OMITTED]...........................40Profiles..................................35 8. Compliance AuditAndand OtherAssessments........................41Assessments........................36 8.1. Frequency or circumstances ofassessment.................41assessment.................36 8.2. Identity/qualifications ofassessor......................41assessor......................36 8.3. Assessor's relationship to assessedentity...............41entity...............36 8.4. Topics covered byassessment.............................41assessment.............................36 8.5. Actions taken as a result ofdeficiency..................41deficiency..................36 8.6. Communication ofresults.................................41results.................................36 9. Other Business And LegalMatters..............................42Matters..............................37 9.1.Fees.....................................................43Fees.....................................................38 9.1.1. Certificate issuance or renewalfees................43fees................38 9.1.2. Fees for other services (ifapplicable).............43applicable).............38 9.1.3. Refundpolicy.......................................43policy.......................................38 9.2. Financialresponsibility.................................43responsibility.................................38 9.2.1. Insurancecoverage..................................43coverage..................................38 9.2.2. Otherassets........................................43assets........................................38 9.2.3. Insurance or warranty coverage forend-entities.....43end-entities.....38 9.3. Confidentiality of businessinformation..................43information..................38 9.3.1. Scope of confidentialinformation...................43information...................38 9.3.2. Information not within the scope of confidentialinformation................................................43information................................................38 9.3.3. Responsibility to protect confidentialinformation..43information..38 9.4. Privacy of personalinformation..........................43information..........................38 9.4.1. Privacyplan........................................43plan........................................38 9.4.2. Information treated asprivate......................43private......................38 9.4.3. Information not deemedprivate......................43private......................38 9.4.4. Responsibility to protect privateinformation.......43information.......38 9.4.5. Notice and consent to use privateinformation.......43information.......38 9.4.6. Disclosure pursuant to judicial or administrativeprocess....................................................43process....................................................38 9.4.7. Other information disclosurecircumstances..........43circumstances..........38 9.5. Intellectual property rights (ifapplicable).............43applicable).............38 9.6. Representations andwarranties...........................43warranties...........................38 9.6.1. CA representations andwarranties...................43warranties...................38 9.6.2. Subscriber representations andwarranties...........43warranties...........39 9.6.3. Relying party representations andwarranties........44 9.6.4. Representations and warranties of other participants [OMITTED].....................................44warranties........39 9.7. Disclaimers ofwarranties................................44warranties................................39 9.8. Limitations ofliability.................................44liability.................................39 9.9.Indemnities..............................................44Indemnities..............................................39 9.10. Term andtermination....................................44termination....................................39 9.10.1.Term...............................................44Term...............................................39 9.10.2.Termination........................................44Termination........................................39 9.10.3. Effect of termination andsurvival.................44survival.................39 9.11. Individual notices and communications withparticipants.44participants.39 9.12.Amendments..............................................44Amendments..............................................39 9.12.1. Procedure foramendment............................44amendment............................39 9.12.2. Notification mechanism andperiod..................44 9.12.3. Circumstances under which OID must be changed [OMITTED]..................................................44period..................39 9.13. Dispute resolutionprovisions...........................44provisions...........................39 9.14. Governinglaw...........................................44law...........................................39 9.15. Compliance with applicablelaw..........................44law..........................39 9.16. Miscellaneousprovisions................................44provisions................................39 9.16.1. Entireagreement...................................44agreement...................................39 9.16.2.Assignment.........................................44Assignment.........................................39 9.16.3.Severability.......................................44Severability.......................................39 9.16.4. Enforcement (attorneys' fees and waiver ofrights)....................................................44rights).39 9.16.5. ForceMajeure......................................44 9.17. Other provisions [OMITTED]..............................44Majeure......................................39 10. SecurityConsiderations......................................45Considerations......................................39 11. IANAConsiderations..........................................45Considerations..........................................40 12.Acknowledgments..............................................45Acknowledgments..............................................40 13.References...................................................46References...................................................41 13.1. NormativeReferences....................................46References....................................41 13.2. InformativeReferences..................................46References..................................41 Author'sAddresses...............................................46 Intellectual Property Statement..................................47 Disclaimer of Validity...........................................48Addresses...............................................42 Pre-5378 Material Disclaimer.....................................42 CopyrightStatement..............................................48Statement..............................................43 Preface This document contains a template to be used for creating a Certification Practice Statement (CPS) fora Local Internet Registry oran Internet Service Provider that is part of the Resource Public Key Infrastructure (RPKI). The user of this document should 1. substitute a title page for page 1 saying, e.g., ''<Name ofLIR/ISP>ISP> Certification Practice Statement for the Resource Public Key Infrastructure (RPKI)'' with date, author, etc. 2. leave the table of contents 3. delete this Preface 4. fill in the information indicated below by <text in angle brackets> 5. delete sections 10, 11, 12, 13.1, Acknowledgments, Author's Addresses, Intellectual Property Statement, Disclaimer of Validity, Copyright Statement, Acknowledgments; leaving a reference section with just the references in 13.2 6. update the table of contents to reflect the changes required by steps 4 and 5 above . Note: This CPS is based on the template specified in RFC 3647. A number of sections contained in the template were omitted from this CPS because they did not apply to this PKI. However, we have retained the sectionheading ''place holders'' for these omitted sections,numbering scheme employed inorderthe RFC to facilitate comparison with the section numbering scheme employed in thatRFC, i.e., the relevant section headings are included and marked [OMITTED]. In the Table of Contents the relevant sectionsRFC. [There arealso marked [OMITTED]. There is a note4 sub-sections that I haven't removed yet due tothis effect in theWord problems.) 1. Introductionbelow.Thisinformation should be left in the CPS as an explanation to the user. 1. Introduction This document isdocument is the Certification Practice Statement (CPS) of <Name ofLIR/ISP>.ISP>. It describes the practices employed by the <Name ofLIR/ISP>ISP> Certification Authority (CA) in the ResourcePKI.Public Key Infrastructure (RPKI). These practices are defined in accordance with the requirements of the Certificate Policy (CP, [RFCxxxx]) of this PKI. TheResource PKI is aimed at supporting improved routing security. The goalRPKI isthat each entity that allocates IP addresses or AS numbersdesigned toan entity will, in parallel, issue a certificate reflecting this allocation. These certificates will enable verification that the holdersupport validation ofthe associated private key has been allocated the resources indicated in the certificate, and is the current, unique holderclaims by current holders ofthese resources. The certificates and CRLs,Internet Number Resources (INRs, see definition inconjunction1.7) in accordance withancillary digitally signed data structures, will provide critical inputs for routing security mechanisms, e.g., generation of route filters by LIRs/ISPs. The most important and distinguishing aspectthe records of thePKI for which this CPS was created isorganizations thatit does not purport to identify an address space holder or AS number holder via the subject name containedact as CAs inthe certificate issued to that entity. Rather, each certificate issued underthispolicy is intended to enable an entityPKI. The ability toassert in a verifiable fashion, that itverify such claims is essential to ensuring thecurrent holder of an address block or an AS number, based on the current recordsunique, unambiguous distribution ofthe entity responsible for thethese resourcesin question. Verification of the assertion is based on two criteria:This PKI parallels theability ofexisting INR distribution hierarchy. These resources are distributed by theentityInternet Assigned Numbers Authority (IANA) todigitally sign data producingthe Regional Internet Registries. In some regions, National Internet Registries (NIRs) form asignature that is verifiable usingtier of thepublic key contained inhierarchy below thecorresponding certificate,RIRs for internet number resource (INR) distribution. ISPs andvalidation of that certificate in the context of this PKI.network subscribers form additional tiers below registries. 1.1. Overview ThisPKI is designed exclusively for use in support of validationCPS describes: . Participants . Publication ofclaims related to address space and AS number holdings, with emphasis on support of routing security mechanisms. Use of the certificates and CRLs managed under this PKI for any other purpose is a violation of this PKI's CP, and relying parties should reject such uses. For this particular CPS, it should be noted that LIRs/ISPs do not allocate AS numbers to their subscribers; instead subscribers receive AS numbers from the RIR for their region. Thus, the certificates issued by <Name of LIR/ISP> cover only IP address allocations. However, in places in this document, text applying to the overall PKI may refer to both IP address space and AS numbers. Note: This CPS is based on the template specified in RFC 3647. A number of sections contained in the template were omitted from this CPS because they did not apply to this PKI. However, we have retained section heading ''place holders'' for these omitted sections, in order to facilitate comparison with the section numbering scheme employed in that RFC, i.e., the relevant section headings are included and marked [OMITTED]. In the Table of Contents the relevant sections are also marked [OMITTED]. 1.1. Overview This CPS describes: . Participants . Distribution of the certificatesthe certificates and CRLs . How certificates are issued, managed, and revoked . Facility management (physical security, personnel, audit, etc.) . Key management . Audit procedures . Business and legal issuesTheThis PKI encompasses several types of certificates (seeappendix in the CPIETF document draft-ietf-sidr-arch-xx [ARCH] for more details): . CA certificates for each organizationallocating address blocks and/or AS numbers,distributing INRs and for eachaddress space (AS number) holdersubscriber . End entity (EE) certificates for organizations to usein verifying Route Origination Authorizations (ROAs) and other (non- certificate/CRL) signedto validate digital signatures on RPKI-signed objects (see definition in 1.7). . In the future, the PKI also may include end entity certificates in support of access control for the repository system as described in 2.4. 1.2. Document name and identification The name of this document is ''<Name ofLIR/ISP>'sISP>'s Certification Practice Statement for the Resource Public Key Infrastructure (RPKI)''. 1.3. PKI participants Note: In a PKI, the term ''subscriber'' refers to an individual or organization that is a Subject of a certificate issued by a CA. The term is used in this fashion throughout this document, without qualification, and should not be confused with the networking use of the term to refer to an individual or organization that receives service from an ISP.Thus, in this PKI,In such cases the term''subscriber'' can refer both to ISPs, which can''network subscriber'' will besubscribers of RIRs, NIRs, and LIRs, and also to organizations that are not ISPs, but which are subscribers of LIRs/ISPs in the networking sense of the term.used. Also note that, for brevity, this document always refers tosubscribersPKI participants asorganizations,organizations or entities, even though somesubscribersof them are individuals.When necessary, the phrase ''network subscriber'' is used to refer to an organization that receives network services from an LIR/ISP.1.3.1. Certification authorities<Name of LIR/ISP><Describe the CAs that you will operatea CA,for theprimary function of whichRPKI. One approach isthe issuance of certificatestoorganizations to which address spaceoperate two CAs: one designated ''offline'' and the other designated ''production.'' The offline CA isallocated bythe top level CA for the <Name ofLIR/ISP>. ThisISP> portion of the RPKI. It provides a secure revocation and recovery capability in case the production CAwill also issue end entity (EE)is compromised or becomes unavailable. Thus the offline CA issues certificatesfor use in verifying signaturesonly to instances ofROAs. Inthefuture, thisproduction CA; and the CRLs it issues are used to revoke only certificates issued to the production CA. The production CAmay alsois used to issueother types of end entity (EE) certificates, e.g., EERPKI certificates tooperations personnel in support<Name ofrepository maintenance.ISP> members, to whom INRs have been distributed.> 1.3.2. Registration authoritiesFor<Describe how thecertificates issued by this LIR/ISP under this PKI, thisregistration authority function is handled for the CA(s) that you operate. The RPKI does not require establishment or use of a separate registration authority (RA) in conjunction with the CA function. The RA function will be provided by theLIR/ISP per se. The LIR/ISP already performssame entity operating as a CA, e.g., entities listed in Section 1.3.1. An entity acting as a CA in thisfunction -- establishingPKI already has a formal relationship with eachsubscriber and assumingorganization to which it distributes INRs. These organizations already perform the RA function implicitly since they already assume responsibility forallocating and tracking the current allocation of address space. Since the LIR/ISP operates the CA, there is no distinct RA.distributing INRs.> 1.3.3. Subscribers The primary types of organizations that receiveallocationsdistributions ofIP addressesINRs from this CA and thus are subscribers in the PKI sense are network subscribers.<If appropriate, add ''Additionally, this LIR issues address space to ISPs, who are thus also subscribers.''>1.3.4. Relying parties Entities or individuals thatneed to validate claims of address space current holdingsact in reliance on certificates or RPKI- signed objects issued under this PKI are relying parties.Thus,Relying parties may or may not be subscribers within this PKI. (See section 1.7 forexample, entities that make usethe definition ofaddress certificates in support of improved routing security are relying parties. This includes LIRs/ISPs, multi-homed organizations exchanging BGP [BGP4] traffic with LIRs/ISPs, and subscribers who have receivedanallocationRPKI-signed object.) 1.3.5. Other participants <If <Name ofaddress space from one ISP or fromISP> operates aregistry, but want to authorize an (or another) LIR/ISP to originate routes to this space. To the extentrepository thatrepositories make use of certificates for access control - - checking for authorization to upload certificate, CRL,holds certificates, CRLs, andROA updates -- they too act as relying parties. 1.3.5. Other participants [OMITTED]other RPKI-signed objects, then indicate this here.> 1.4. Certificate usage 1.4.1. Appropriate certificate uses The certificates issued under this hierarchy are for authorization in support of validation of claims of current holdings ofaddress space and/or AS numbers, e.g., for routing security. With regard to routing security, an initial goal of this PKI is to allow the holder of a set of address blocks to be able to declare, in a secure fashion, the AS number of each entity that is authorized to originate a route to these addresses, including the context of ISP proxy aggregation.INRs. Additional uses of thePKI,certificates, consistent with the basic goal cited above, are also permitted underthisthe RPKI certificate policy. Some of the certificates that may be issued under thishierarchyPKI could be used to support operation of this infrastructure, e.g., access control for the repositorysystem.system as described in 2.4. Such uses also are permitted underthisthe RPKI certificate policy. 1.4.2. Prohibited certificate uses Any uses other than those described in Section 1.4.1 are prohibited. 1.5. Policy administration 1.5.1. Organization administering the document This CPS is administered by <Name ofLIR/ISP>ISP> 1.5.2. Contact person <Insert ISP contact info here> 1.5.3. Person determining CPS suitability for the policy Not applicable. Each organization issuing a certificate in this PKI is attesting to theallocationdistribution ofresources (IP addresses, AS numbers)INRs to the holder of the private key corresponding to the public key in the certificate. The issuing organizations are the same organizations as the ones that perform theallocationdistribution hence they are authoritative with respect to the accuracy of this binding. 1.5.4. CPS approval procedures Not applicable. Each organization issuing a certificate in this PKI is attesting to theallocationdistribution ofresources (IP addresses, AS numbers)INRs to the holder of the private key corresponding to the public key in the certificate. The issuing organizations are the same organizations as the ones that perform theallocationdistribution hence they are authoritative with respect to the accuracy of this binding. 1.6. Definitions and acronyms BPKI - Business PKI: A BPKI is an optional additional PKI used to identify members to whom RPKI certificates can be issued. CP- Certificate Policy. A CP is a named set of rules that indicates the applicability of a certificate to a particular community and/or class of applications with common security requirements. CPS - Certification Practice Statement. A CPS is a document that specifies the practices that a Certification Authority employs in issuing certificates. Distribution of INRs - - A process of distribution of the INRs along the respective number hierarchy. IANA distributes blocks of IP addresses and Autonomous System Numbers to the five Regional Internet Registries (RIRs). RIRs distribute smaller address blocks and Autonomous System Numbers to organizations within their service regions, who in turn distribute IP addresses to their customers. IANA - Internet Assigned Numbers Authority. IANA is responsible for global coordination of the Internet Protocol addressing systems and Autonomous System (AS) numbers used for routing internet traffic. IANA distributes INRs to Regional Internet Registries (RIRs). INRs - Internet Number Resources. INRs are number values for three protocol parameter sets, namely: . IP Version 4 addresses, . IP version 6 addresses, and . Identifiers used in Internet inter-domain routing, currently Border Gateway Protocol-4 Autonomous System numbers. ISP - - Internet Service Provider. An ISP is an organization managing and selling Internet services to other organizations.LIRNIR - -LocalNational Internet Registry.This is an organization, typically a network service provider, that sub allocates the assignment of IP addresses for a portion of the area covered by a Regional (or National) Registry. NIR - National Internet Registry. An NIRAn NIR is an organization that manages theassignmentdistribution ofIP address and AS numbersINRs for a portion of the geopolitical area covered by a Regional Registry.TheseNIRs form an optional second tier in the tree scheme used to manageIP address and AS number allocation.INR distribution. RIR - Regional Internet Registry. An RIR is an organization that manages theassignmentdistribution ofIP address and AS numbersINRs for aspecifiedgeopolitical area.At present, there are five RIRs: ARIN (North America), RIPE NCC (Europe), APNIC (Asia -Pacific), LACNIC (Latin America and Caribbean), and AFRINIC (Africa). ROARPKI-signed object -Route Origination Authorization. This- An RPKI-signed object is a digitally signed data objectthat identifies(other than anetwork operator, identified by an AS, that is authorized to originate routescertificate or CRL) declared to be such by aspecified setstandards track RFC, and that can be validated using certificates issued under this PKI. The content and format ofaddress blocks.these data constructs depend on the context in which validation of claims of current holdings of INRs takes place. Examples of these objects are repository manifests and CRLs. 2. Publication And Repository Responsibilities 2.1. Repositories As per the CP,certificates andcertificates, CRLswilland RPKI-signed objects MUST be made available for downloading by allnetwork operators,relying parties, to enable them to validate thisdata for use in support of routing security.data. <If you maintain a local repository system, describe here its basic setup.>up. For example, ''The <Name of ISP> RPKI CA will publish certificates, CRLs, and RPKI-signed objects via a repository that is accessible via RSYNC at rpki.<Name of ISP>.net.''> 2.2. Publication of certification information <Name ofLIR/ISP> will upload certificates andISP> MUST publish certificates, CRLs and RPKI-signed objects issued by it to a repository that operates as part of a world-wide distributed system of repositories. <Name ofLIR/ISP>ISP> will alsouploadpublish to this repository system anyROAsRPKI-signed objects that it creates. 2.3. Time or Frequency of Publication <Describe here your procedures for publication (to the global repository system) of thecertificates andcertificates, CRLs and RPKI-signed objects that you issue. If you choose to outsource publication of PKI data, you still need to provide this information for relyingparties.>parties. This should include the period of time within which a certificate will be published after the CA issues the certificate and the period of time within which a CA will publish a CRL with an entry for a revoked certificate after it revokes that certificate.> As per the CP, the followingstandards existstandard exists for publication times and frequency:A certificate will be published within 24 hours after issuance.The <Name ofLIR/ISP>ISP> CAwillMUST publish its CRL prior to the nextScheduledUpdate value in the scheduled CRL previously issued by the CA.Within 12 hours of effecting revocation,2.4. Access controls on repositories Access to theCA will publish a CRL with an entryrepository system, forthe revoked certificate. A new ROA will be published before a predecessor ROA has expired, or within 24 hours after an address space holder has changed the set of ASes that is authorized to advertise the address blocks it holds. 2.4. Access controls on repositories Access to the repository system, for modification of entries,mustmodification of entries, must be controlled to prevent denial of service attacks. All data (certificates, CRLs andROAs) uploadedRPKI-signed objects) published to a repository are digitallysigned. Updatessigned RPKI items that <Name of Registry> issues MUST be published to the repositorysystem must be validated to ensurethatthe data being added or replaced is authorized. This document doesit runs by means notdefineaccessible to themeans by which updates are verified, but useoutside world. <If <Name ofthe PKI itselfRegistry> offers repository services tovalidate updates is anticipated.its subscribers, then <describe here the protocol(s) that you support for their publishing of signed objects.> 3. Identification And Authentication 3.1. Naming 3.1.1. Types of names The Subject of each certificate issued by thisLIR/ISPISP is identified by an X.500DisinguishedDistinguished Name (DN).ItThe distinguished name will consist of a singleCNCommon Name (CN) attribute with a value generated by <Name of ISP>. Optionally, the serialNumber attribute may be included along with the common name (to form a terminal relative distinguished name set), to distinguish among successive instances of certificates associated with theissuer.same entity. 3.1.2. Need for names to be meaningful The Subject name in each subscriber certificate will be unique relative to all certificates issued by <Name ofLIR/ISP>.ISP>. However, there is no guarantee that the subject name will be globally unique in this PKI.Note:Also, the name of the subscriber need not to be ''meaningful'' in the conventional, human-readable sense. The certificates issued under this PKI are used for authorization in support ofrouting security, not for identification. The nameapplications that make use ofthe holderattestations ofan address block needInternet resource holding, notbe ''meaningful'' in the conventional, human-readable sense.for identification 3.1.3. Anonymity or pseudonymity of subscribers Although Subject names in certificates issued by thisLIR/ISPISP need not be meaningful, and may appear ''random,'' anonymity is not a function of this PKI, and thus no explicit support for this feature is provided. 3.1.4. Rules for interpreting various name forms None 3.1.5. Uniqueness of names <Name ofLIR/ISP>ISP> certifies Subject names that are unique among the certificates that it issues. Although it is desirable that these Subject names be unique throughout the PKI, to facilitate certificate path discovery, such uniqueness is neither mandated nor enforced through technical means. 3.1.6. Recognition, authentication, and role of trademarks Because the Subject names are not intended to be meaningful, there is no provision to either recognize or authenticate trademarks, service marks, etc. 3.2. Initial identity validation 3.2.1. Method to prove possession of private key <Describe the method whereby each subscriber will be required to demonstrate proof-of-possession (PoP) of the private key corresponding to the public key in the certificate, prior to <Name of ISP's> issuing the certificate.Standard methods are describedOne possible approach makes use of the PKCS #10 format, as profiled in [RFCyyyy]. This request format requires that theCertificate Management Protocol (CMP) (RFC 2510) andPKCS #10 request be signed using theCertificate Management Messages over CMS protocol (CMC), RFC 2797.>(RSA) private key corresponding to the public key in the certificate request. This mechanism provides proof of possession by the requester.> 3.2.2. Authentication of organization identity Certificates issued under this PKI do not attest to the organizational identity ofresource holders,subscribers, with the exception of registries. However, certificates are issued toresource holderssubscribers in a fashion that preserves the accuracy ofbindingsdistributions of INRs in thisISP's<Name of ISP's> records. <Describe the procedures that will be used to ensure that each certificate that isissuedissued, accurately reflects your records with regard to the organization to which you haveallocateddistributed (or sub-allocated)distributed) theaddress spaceINRs identified in the certificate.The specific procedures employed for this purpose shouldFor example, a BPKI certificate could becommensurate with those you already employused to authenticate a certificate request that serves asan ISP ina link to themaintenance of address allocation.> 3.2.3. Authentication<Name ofindividual identity Certificates issuedISP's> subscriber database that maintains the resource distribution records. The certificate request could be matched against the database record for the subscriber in question, and an RPKI certificate would be issued only if the resources requested were a subset of those held by the subscriber. The specific procedures employed for this purpose should be commensurate with those you already employ as an ISP in the maintenance of INR distribution.> 3.2.3. Authentication of individual identity Certificates issued under this PKI do not attest to the individual identity of aresource holder.subscriber. However,this ISP<Name of ISP> maintains contact information for eachresource holdersubscriber in support of certificate renewal, rekey, or revocation. <Describe the procedures thatwillMUST be used to identify at least one individual as a representative of eachorganization that is an address space holder.subscriber. This is done in support of issuance, renewal, and revocation of the certificate issued to the organization. For example, one might say ''The <Name of ISP> BPKI (see Section 3.2.6) issues certificates that MUST be used to identify individuals who represent <Name of ISP> subscribers.'' The procedures should be commensurate with those you already employ in authenticating individuals as representatives foraddress spaceINR holders. Note that this authentication is solely for use by you in dealing with the organizations to which youallocatedistribute (orsub- allocate) address space,sub-distribute) INRs, and thus must not be relied upon outside of this CA-subscriber relationship.> 3.2.4. Non-verified subscriber information No non-verified subscriber data is included in certificates issued under this certificatepolicy.policy except for SIA/AIA extensions. 3.2.5. Validation of authority <Describe the procedures thatwillMUST be used to verify that an individual claiming to representa resource holder to which a certificate is issued,subscriber, is authorized to represent thatresource holdersubscriber in this context. For example, one could say, ''Only an individual to whom a BPKI certificate (see Section 3.2.6) has been issued may request issuance of an RPKI certificate. Each certificate issuance request is verified using the BPKI.'' The procedures should be commensurate with those you already employ as anLIR/ISPISP in authenticating individuals as representatives ofresource holders.>subscribers.> 3.2.6. Criteria for interoperationThis PKIThe RPKI is neither intended nor designed to interoperate with any other PKI. <If you operate a separate, additional PKI for business purposes (BPKI), then describe (or reference) how the BPKI is used to authenticate subscribers and to enable them to manage their resource distributions.> 3.3. Identification and authentication for re-key requests 3.3.1. Identification and authentication for routine re-key <Describe the conditions under which routine re-key is required and the manner by which it is requested. Describe the procedures thatwillMUST be used to ensure thatan organization requestinga subscriber requesting routine re-key is the legitimate holder of the certificate(and associated address space)to be re-keyed.This should also includeState themethod employedapproach forverifyingestablishing PoP of the private key corresponding to the new public key.With respectIf you operate a BPKI, describe how that BPKI is used to authenticate routine re-key requests.> 3.3.2. Identification and authenticationof the holder of the address space,for re-key after revocation <Describe the proceduresshould be commensurate with those you already employ in the maintenance of address allocation. Note that your organization can choose to require periodic re-keying consistent with contractual agreements with the recipient.> 3.3.2. Identification and authentication for re-key after revocation <Describe the procedures that willthat MUST be used to ensure that an organization requesting a re-key after revocation is the legitimate holder of theaddress spaceINRs in the certificate being re-keyed. This should also include the method employed for verifying PoP of the private key corresponding to the new public key. If you operate a BPKI, describe how that BPKI is used to authenticate re-key requests. With respect to authentication of theresource holder,subscriber, the procedures should be commensurate with those you already employ in the maintenance ofresource allocationINR distribution records.> 3.4. Identification and authentication for revocation request <Describe the procedures thatwillMUST be used by an RPKI subscriber toensuremake a revocation request. Describe the manner by which it is ensured that theresource holdersubscriber requesting revocation is the subject of the certificate (or an authorized representative thereof) to be revoked. Note that there may be different procedures for the case where the legitimate subject still possesses the original private key as opposed to the case when it no longer has access to thatkey.Thesekey. These procedures should be commensurate with those you already employ in the maintenance ofresource holdersubscriber records.>Note: If additional IP addresses are being added to an organization's existing allocation, the old certificate is not revoked. Instead,Note that if a subscriber requests a new INR distribution, an existing RPKI certificateisissuedwith bothto theold andsubscriber is NOT revoked, so long as thenew resources andset of INRs distributed to theold key. If IP addresses or AS numberssubscriber did not ''shrink,'' i.e., the new INRs arebeing removed or if there has beenakey compromise, thensuperset of the oldcertificate will be revoked (andINR set. However, if are-key will be performednew INR distribution results in ''shrinkage'' of theeventset of INRs distributed to akey compromise). A subscriber may request that its resource holdings be spread over a setsubscriber, this triggers an implicit revocation ofcertificates, rather than consolidating all resources in one certificate. This may be appropriate ifthesubscriber wants to manage his resource allocations as distinct allocations within his organization.old RPKI certificate(s) associated with that subscriber. 4. Certificate Life-Cycle Operational Requirements 4.1. Certificate Application 4.1.1. Who can submit a certificate applicationThe following entitiesAny subscriber who holds INRs distributed by this ISP may submit a certificate application to thisCA: . <Insert if appropriate: "Any ISP subordinate to this LIR."> . Any entity that holds address space assigned by this LIR/ISPCA. 4.1.2. Enrollment process and responsibilities <Describe your enrollment process for issuing certificates both for initial deployment of the PKI and as an ongoing process. Note that most of the certificates in this PKI are issued as part ofISPyour normal business practices, as an adjunct toaddress space allocation,INR distribution, and thus a separate application to request a certificate may not be necessary. If so, reference should be made to where these practices are documented.> 4.2. Certificate application processing <Describe the certificate request/responsestandardsprocessing that you will employ. You should make use of existing standards for certificate application processing. Relevant standards include RFC 4210, Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP), RFC 2797, Certificate Management Messages over CMS, and RSA Labs standards PKCS #7 and PKCS #10. > 4.2.1. Performing identification and authentication functions <Describe your practices for identification and authentication of certificate applicants. Often, existing practices employed by you to identify and authenticate organizationsformcan be used as the basis for issuance of certificates to these subscribers. Reference can be made to documentation of such existing practices.> 4.2.2. Approval or rejection of certificate applications <Describe your practices for approval or rejection of applications and refer to documentation of existing business practices relevant to this process. Note that according to the CP, certificate applications will be approved based on the normal business practices of the entity operating the CA, based on the CA's records ofaddress space holders. Also,subscribers. The CP also says that each CA will follow the procedures specified in 3.2.1 to verify that the requester holds thecorrespondingprivate keyforcorresponding to the public key that will be bound to the certificate the CA issues to the requester.> 4.2.3. Time to process certificate applications<You may declare<Specify here your expected time frame for processing certificate applications.> 4.3. Certificate issuance 4.3.1. CA actions during certificate issuance <Describe in this section your procedures for issuance and publication of a certificate.> 4.3.2. Notification to subscriber by the CA of issuance of certificate <Name of ISP> MUST notify the subscriber when the certificate is published. <Describe in this section your procedures for notification of a subscriber when a certificate has beenissued.>published.> 4.3.3. Notification of certificate issuance by the CA to other entities[OMITTED]<Describe here any other entities that MUST be notified when a new certificate is published.> 4.4. Certificate acceptance 4.4.1. Conduct constituting certificate acceptance When a certificate is issued, the CAwill placeMUST publish itinto the repository and notify the subscriber. This will be done without subscriber review and acceptance. 4.4.2. Publication of the certificate by the CA CertificateswillMUST be published in theRepositoryRPKI distributed repository system once issued following the conduct described in 4.4.1.<DescribeThis will be done within <specify the timeframe within which the certificate will be placed in the repository and the subscriber will be notified>.<Describe your procedures for publication of theapprovedcertificate.> 4.5. Key pair and certificate usage A summary of the use model for theResource PKIRPKI is provided below. 4.5.1. Subscriber private key and certificate usage The certificates issued bythis LIR/ISP<Name of ISP> toresource holderssubscribers are CA certificates. The private key associated with each of these certificates is used to sign subordinate (CA or EE) certificates and CRLs.Resource holdersSubscribers who areLIRs/ISPsISPs will issue CA certificates to any organizations to which theyallocate IP address space,in turn distribute INRs, one or more end entity (EE) certificates for use in verifying signatures onROAs,RPKI- signed objects signed by the suscriber, and end entity certificates to operators in support of repository access control.Non-LIR/ISP resourceNon-ISP INR holders will issue just the latter two kinds of certificates since they will not beallocating address spacedistributing INRs to other organizations. 4.5.2. Relying party public key and certificate usage The primary relying parties in this PKI areLIRs/ISPs,organizations who will use EE certificates to verifyROAs, e.g., in support of generating route filters.RPKI-signed objects. Repositories will use operator certificates to verify the authorization of entities to engage in repository maintenance activities, and thus repositories represent a secondary type of relying party. 4.6. Certificate renewal 4.6.1. Circumstance for certificate renewal As per the CP, a certificate will be processed for renewal based on its expiration date or a renewal request from the certificate Subject. If <Name ofLIR/ISP>ISP> initiates the renewal process based on the certificate expiration date, then <Name ofLIR/ISP>ISP> will notify theresource holdersubscriber <insert the period of advance warning, e.g., ''2 weeks in advance of the expiration date'', or the general policy, e.g., ''in conjunction with notification of service expiration''.> The validity interval of the new (renewed) certificate will overlap that of the previous certificate by <insert length of overlap period, e.g., 1 week>, to ensure uninterrupted coverage. Certificate renewal will incorporate the same public key as the previous certificate, unless the private key has been reported as compromised. If a new key pair is being used, the stipulations of Section 4.7 will apply. 4.6.2. Who may request renewal Thecertificate holdersubscriber or <Name ofLIR/ISP>ISP> may initiate the renewal process. <For the case of thecertificate holder,subscriber, describewhat stepsthe procedures that will betakenused toverifyensure that theidentity and authorizationrequester is the legitimate holder of theentity requestingINRs in the certificate being renewed. This should also include the method employed for verifying PoP of the private key corresponding to the public key in the certificate being renewed or the new public key if the public key is being changed. With respect to authentication of the subscriber, the procedures should be commensurate with those you already employ in therenewal.>maintenance of INR distribution records. If you operate a BPKI for this, describe how that business-based PKI is used to authenticate re-newal requests and refer to 3.2.6.> 4.6.3. Processing certificate renewal requests <Describe your procedures for handling certificate renewal requests. This must include verification that the requester is the subscriber or is authorized by the subscriber and that the certificate in question has not been revoked.> 4.6.4. Notification of new certificate issuance to subscriber <Name of ISP> MUST notify the subscriber when the certificate is published <Describe your procedure for notification of new certificate issuance to the subscriber. This should be consistent with 4.3.2.> 4.6.5. Conduct constituting acceptance of a renewal certificate When a renewal certificate is issued, the <name of ISP> CAwill placeMUST publish itinto the repository and notify the subscriber. This will be done without subscriber review and acceptance. 4.6.6. Publication of the renewal certificate by the CA <Describe your policy and procedures for publication of arenewedrenewal certificate. This should be consistent with 4.4.2.> 4.6.7. Notification of certificate issuance by the CA to other entities[OMITTED]<List here any other entities (besides the subscriber) who will be notified when a renewed certificate is issued.> 4.7. Certificate re-key 4.7.1. Circumstance for certificate re-key As per the CP, re-key of a certificate will be performed only when required, based on: 1. knowledge or suspicion of compromise or loss of the associated private key, or 2. the expiration of the cryptographic lifetime of the associated key pair If a certificate is revoked to replace the RFC 3779 extensions, the replacement certificate will incorporate the same public key, not a new key, unless the subscriber requests a re-key at the same time. If the re-key is based on a suspected compromise, then the previous certificate will be revoked. Section 5.6 of the Certificate Policy notes that when a CA signs a certificate, the signing key should have a validity period that exceeds the validity period of the certificate. This places additional constraints on when a CA should request a re-key. 4.7.2. Who may request certification of a new public keyThe holder ofOnly thecertificatesubscriber may request a re-key. In addition, <Name ofLIR/ISP>ISP> may initiate a re-key based on a verified compromise report.<Describe what steps will be taken to verify<If theidentity and authorization of asubscriberto request a re-key when(certificate Subject) requests theprivate key has been reported as compromised. Alsorekey, describe how authentication is effected, e.g., using the <Name of Registry> BPKI. Describe how a compromise report received from other than a subscriber is verified.> 4.7.3. Processing certificate re-keying requests <Describe your process for handling re-keying requests. As per the CP, this should be consistent with the process described in Section 4.3. So reference can be made to that section.> 4.7.4. Notification of new certificate issuance to subscriber <Describe your policy regarding notifying the subscriber re: availability of the new re-keyed certificate. This should be consistent with the notification process for any new certificate issuance (see section 4.3.2).> 4.7.5. Conduct constituting acceptance of a re-keyed certificate When a re-keyed certificate is issued, the CA willplacepublish it in the repository and notify the subscriber. This will be done without subscriber review and acceptance. 4.7.6. Publication of the re-keyed certificate by the CA <Describe your policy regarding publication of the new certificate. This should be consistent with the publication process for any new certificate (see section 4.4.2).> 4.7.7. Notification of certificate issuance by the CA to other entities[OMITTED]<List here any entities (other than the subscriber) who will be notified when a re-keyed certificate is issued.> 4.8. Certificate modification 4.8.1. Circumstance for certificate modification As per the CP, modification of a certificate occurs to implement changes to the RFC 3779 extension values in a certificate. A subscriber can request a certificate modification when this information in a currently valid certificate has changed, as a result of changes in theresourceINR holdings of the subscriber. If a subscriber is tobe allocated address spacereceive a distribution of INRs in addition to a currentallocation,distribution, and if the subscriber does not request that a new certificate be issued containing only these additional INRs, then this is accomplished through a certificate modification. When a certificate modification is approved, a new certificate is issued. The new certificate will contain the same public key and the same expiration date as the original certificate, but with the incidental information corrected and/or theaddress space and AS allocationsINR distribution expanded. When previouslyallocated address space isdistributed INRs are to be removed from a certificate, then the old certificate MUST be revoked and a new certificate (reflecting the newallocation)distribution) issued. 4.8.2. Who may request certificate modification Thecertificate holdersubscriber or <Name ofLIR/ISP>ISP> may initiate the certificate modification process. <For the case of thecertificate holder,subscriber, state here what steps will be taken to verify the identity and authorization of the entity requesting the modification.> 4.8.3. Processing certificate modification requests <Describe your procedures for verification of the modification request and procedures for the issuance of a new certificate. These should be consistent with the processes described in Sections 4.2 and 4.3.1.> 4.8.4. Notification of modified certificate issuance to subscriber <Describe your procedure fornotification ofnotifying the subscriber about the issuance of a modified certificate. This should be consistent with the notification process for any new certificate (see section 4.3.2).> 4.8.5. Conduct constituting acceptance of modified certificate When a modified certificate is issued, the CA willplacepublish itinto the repository and notify the subscriber. This will be done without subscriber review and acceptance. 4.8.6. Publication of the modified certificate by the CA <Describe your procedure for publication of a modified certificate. This should be consistent with the publication process for any new certificate (see section 4.4.2).> 4.8.7. Notification of certificate issuance by the CA to other entities[OMITTED]<List here any entities (other than the subscriber) who will be notified when a modified certificate is issued. 4.9. Certificate revocation and suspension 4.9.1. Circumstances for revocation As per the CP, certificates can be revoked for several reasons. Either <Name of ISP> or the subject may choose to end the relationship expressed in the certificate, thus creating cause to revoke the certificate. If one or more of the INRs bound to the public key in the certificate are no longer associated with the subject, that too constitutes a basis for revocation. A certificate also may be revoked due to loss or compromise of the private key corresponding to the public key in the certificate. Finally, a certificate may be revoked in order to invalidate data signed by the private key associated with that certificate. 4.9.2. Who can request revocation Thecertificate holdersubscriber or <Name ofLIR/ISP>ISP> may request a revocation. <For the case of thecertificate holder,subscriber, describe what steps will be taken to verify the identity and authorization of the entity requesting the revocation.> 4.9.3. Procedure for revocation request <Describe your process for handling a certificate revocation request. This should include:.o Procedure to be used by thecertificate holdersubscriber to request a revocation.o Procedure for notification of thecertificate holdersubscriber when the revocation is initiated by <Name ofLIR/ISP>.>ISP>.> 4.9.4. Revocation request grace period A subscriber should request revocation as soon as possible after the need for revocation has been identified. 4.9.5. Time within which CA must process the revocation request <Describe your policy on the time period within which you will process a revocation request.> 4.9.6. Revocation checking requirement for relying parties As per the CP, a relying party is responsible for acquiring and checking the most recent, scheduled CRL from the issuer of the certificate, whenever the relying party validates a certificate. 4.9.7. CRL issuance frequency<Name of LIR/ISP> will publish<State the CRL issuance frequency for the CRLsapproximately every 24 hours.that you publish.> < Each CRL will carry a nextScheduledUpdate value and a new CRL will be published at or before that time. <Name ofLIR/ISP>ISP> will set the nextScheduledUpdate value when it issues a CRL, to signal when the next scheduled CRL will be issued. 4.9.8. Maximum latency for CRLs A CRL will bepostedpublished to the repository systemwith minimal delaywithin <state the maximum latency> after generation.4.9.9. On-line revocation/status checking availability [OMITTED] 4.9.10. On-line revocation checking requirements [OMITTED] 4.9.11. Other forms of revocation advertisements available [OMITTED] 4.9.12. Special requirements re key compromise [OMITTED] 4.9.13. Circumstances for suspension [OMITTED] 4.9.14. Who can request suspension [OMITTED] 4.9.15. Procedure for suspension request [OMITTED] 4.9.16. Limits on suspension period [OMITTED]4.10. Certificate status services <Name ofLIR/ISP>ISP> does not support OCSP or SCVP.4.10.1. Operational characteristics [OMITTED} 4.10.2. Service availability [OMITTED] 4.10.3. Optional features [OMITTED] 4.11. End<Name ofsubscription [OMITTED] 4.12. Key escrow and recovery [OMITTED] 4.12.1. Key escrow and recovery policy and practices [OMITTED] 4.12.2. Session key encapsulation and recovery policy and practices [OMITTED]ISP> issues CRLs. 5. Facility, Management, and Operational Controls 5.1. Physical controls <As per the CP, describe the physical controls that you employ for certificate management. These should be commensurate to those used in the management ofaddress space allocation.>INR distribution.> 5.1.1. Site location and construction 5.1.2. Physical access 5.1.3. Power and air conditioning 5.1.4. Water exposures 5.1.5. Fire prevention and protection 5.1.6. Media storage 5.1.7. Waste disposal 5.1.8. Off-site backup 5.2. Procedural controls <As per the CP, describe the procedural security controls that you employ for certificate management. These should be commensurate to those used in the management ofaddress space allocation.>INR distribution.> 5.2.1. Trusted roles 5.2.2. Number of persons required per task 5.2.3. Identification and authentication for each role 5.2.4. Roles requiring separation of duties 5.3. Personnel controls <As per the CP, describe the personnel security controls that you employ for individuals associated with certificate management. These should be commensurate to those used in the management ofaddress space allocation.>INR distribution.> 5.3.1. Qualifications, experience, and clearance requirements 5.3.2. Background check procedures 5.3.3. Training requirements 5.3.4. Retraining frequency and requirements 5.3.5. Job rotation frequency and sequence 5.3.6. Sanctions for unauthorized actions 5.3.7. Independent contractor requirements 5.3.8. Documentation supplied to personnel 5.4. Audit logging procedures5.4.1. Types of<As per the CP, describe in the following sections the details of how you implement audit logging.> 5.4.1. Types of events recorded Audit records will be generated for the basic operations of the certification authority computing equipment. Audit records will include the date, time, responsible user or process, and summary content data relating to the event. Auditable events include: . Access to CA computing equipment (e.g., logon, logout) . Messages received requesting CA actions (e.g., certificate requests, certificate revocation requests, compromise notifications) . Certificate creation, modification, revocation, or renewal actions . Posting of any material to a repository . Any attempts to change or delete audit data <List here any additional types of events that will be audited.> 5.4.2. Frequency of processing log <Describe your procedures for review of audit logs.> 5.4.3. Retention period for audit log <Describe your policies for retention of audit logs.> 5.4.4. Protection of audit log <Describe your policies for protection of the audit logs.> 5.4.5. Audit log backup procedures <Describe your policies for backup of the audit logs.> 5.4.6. Audit collection system (internal vs. external) [OMITTED] 5.4.7. Notification to event-causing subject [OMITTED] 5.4.8. Vulnerability assessments <Describe any vulnerability assessments that you will apply (or have already applied) to the PKI subsystems. This should include whether such assessments have taken place and any procedures or plans to perform or repeat/reassess vulnerabilities in the future.> 5.5. Records archival [OMITTED]5.5.1. Types of records archived [OMITTED] 5.5.2. Retention period for archive [OMITTED] 5.5.3. Protection of archive [OMITTED] 5.5.4. Archive backup procedures [OMITTED] 5.5.5. Requirements for time-stamping of records [OMITTED] 5.5.6. Archive collection system (internal or external) [OMITTED] 5.5.7. Procedures to obtain and verify archive information [OMITTED]5.6. Key changeover The <Name ofLIR/ISP>ISP> CA certificate will contain a validity period thatencompassesis at least as long as that ofall certificates verifiable using this CAany certificate being issued under that certificate.To support this,When <Name of ISP> CA wishes to change keys, <Name ofLIR/ISP>ISP> will create a new signature key pair, and acquire and publish a new certificate containing the public key of the pair, <specify here the minimum amount of lead time, e.g., ''a minimum of 6 months''> in advance of the scheduled change of the current signature key pair. 5.7. Compromise and disaster recovery [OMITTED]5.7.1. Incident and compromise handling procedures [OMITTED] 5.7.2. Computing resources, software, and/or data are corrupted [OMITTED] 5.7.3. Entity private key compromise procedures [OMITTED] 5.7.4. Business continuity capabilities after a disaster [OMITTED]5.8. CA or RA termination <Describethe fallbackyour policy for management of your CA'sIP address space allocationsINR distributions in case of its own termination.> 6. Technical Security Controls This section describes the security controls used by <Name ofLIR/ISP>.ISP>. 6.1. Key pair generation and installation 6.1.1. Key pair generation <Describe the procedures that will be used to generate the CA key pair, and, if applicable, key pairs fornetworksubscribers. In most instances, public-key pairs will be generated by the subscriber, i.e., the organization receiving theallocationdistribution ofaddress space.INRs. However, your procedures may include one for generating key pairs on behalf of your subscribers if they so request. (This might be done for subscribers who do not have the ability to perform key generation in a secure fashion or who want a registry to provide backup for the subscriber private key.) Since the keys used in this PKI are not for non-repudiation purposes, generation of key pairs by CAs does not inherently undermine the security of the PKI.> 6.1.2. Private key delivery to subscriber <If the procedures in 6.1.1 include providing key pair generation services for subscribers, describe the means by which private keys are delivered to subscribers in a secure fashion. Otherwise say this is not applicable.> 6.1.3. Public key delivery to certificate issuer <Describe themeans by which theprocedures that will be used to deliver a subscriber's public keysare deliveredtoyou, e.g., electronic submission using a PKCS#10 Certificate Signing Request (CSR). This descriptionthe <Name of ISP> RPKI CA. These procedures shouldexplain how thisensure that the public keydelivery fits in with the process wherebyhas not been altered during transit and that the subscriberrequests IP address space, authenticates itself, pays for the resources, etc. The security ofpossesses theprocedures used by a subscriber to deliver its publicprivate key corresponding toyou need only be commensurate with the security of the procedures already employed for management oftheIP address space.>transferred public key. > 6.1.4. CA public key delivery to relying partiesExcept for the Root CA, allCA public keysused in this PKIfor all entities (other than trust anchors) are contained in certificates issued by other CAs andwillMUST be publishedvia ato the RPKI repository system. Relying partieswillMUST download these certificates from this system. Public key values and associated data forthe default(putative) trust anchors(RIRs) willMUST be distributed out ofband,band and accepted by relying parties on the basis of locally-defined criteria, e.g., embedded in path validation software that will be made available to the Internet community. 6.1.5. Key sizesFor the <Name of LIR/ISP> CA's certificate, the RSA key size will be <insertThe keysize -- e.g., 2048 or 1024 bits.>sizes used in this PKI are as specified in RFC ZZZZ [RFCzzzz]. <Describe any deviations from this statement.> 6.1.6. Public key parameters generation and quality checking TheRSA algorithm [RSA] ispublic key algorithms and parameters used in this PKIwith the public exponent (e) F4 (65,537).are as specified in RFC ZZZZ [RFCzzzz]. <Describe any deviations from this statement.> <If the procedures in 6.1.1 include subscriber key pair generation, EITHER insert here text specifyingEITHERthat the subscriber is responsible for performing checks on the quality of its key pair and saying that <Name of ISP> is not responsible for performing such checks for subscribers OR describe the procedures used by the CA for checking the quality of these subscriber key pairs.> 6.1.7. Key usage purposes (as per X.509 v3 key usage field) The Key usage extension bit values will be consistent with RFC3280.5280. For <Name ofLIR/ISP>'sISP>'s CA certificates, the keyCertSign and cRLSign bits will be set TRUE. All other bits (including digitalSignature) will be set FALSE, and the extension will be marked critical. <Specify whether end entity certificates(issued(e.g., issued by the CA for its operators) will include this extension and if so, the appropriate bit values as per RFC3280.>5280.> 6.2. Private Key Protection and Cryptographic Module Engineering Controls 6.2.1. Cryptographic module standards and controls The <Name ofLIR/ISP>ISP> CA employs a cryptographic module evaluated under FIPS140-2,140-2/3, at level42 or 3 [FIPS]. 6.2.2. Private key (n out of m) multi-person control <If you choose to use multi-person controls to constrain access tothisyour CA's private keys, then insert the following text. ''There will be private key <insert here n> out of <insert here m> multi-person control.''> 6.2.3. Private key escrow No private key escrow procedures are required for this PKI. 6.2.4. Private key backup <Describe the procedures used for backing up your CA's private key. The following aspects should be included. (1) The copying should be done under the same multi-party control as is used for controlling the original private key. (2) At least one copy should be kept at an off-site location for disaster recovery purposes.> 6.2.5. Private key archival See sections 6.2.3 and 6.2.4 6.2.6. Private key transfer into or from a cryptographic module The private key for <Name ofLIR/ISP>'sISP>'s production CAwill<if appropriate, change ''production CA'' to ''production and offline CAs''> MUST be generated by the cryptographic module specified in 6.2.1. The private keys will never leave the module except in encrypted form for backup and/or transfer to a new module. 6.2.7. Private key storage on cryptographic module The privatekeyskey for <Name ofLIR/ISP>'sISP>'s production CAwill<if appropriate, change ''production CA'' to ''production and offline CAs''> MUST be stored in the cryptographic module and will be protected from unauthorized use in accordance with the FIPS140-2140-2/3 requirements applicable to the module. (See [FIPS]) 6.2.8. Method of activating private key <Describe the mechanisms and data used to activate your CA's private key.> 6.2.9. Method of deactivating private key The cryptographic module, when activated, will not be left unattended. After use, it will be deactivated by <Describe the procedure for deactivation of your CA's private key.> The module will be stored securely when not in use. 6.2.10. Method of destroying private key <Describe the method used for destroying your CA's private key, e.g., when it is superseded. This will depend on the particular module.> 6.2.11. Cryptographic Module Rating The cryptographic module will be certified FIPS140-2,140-2/3, at level 2 or 3 [FIPS]. 6.3. Other aspects of key pair management 6.3.1. Public key archival Because this PKI does not support non-repudiation, there is no need to archive public keys. 6.3.2. Certificate operational periods and key pair usage periods The <Name ofLIR/ISP>ISP> CA's key pair will have a validity interval of <insert number of years - -LIR/ISPISP key pairs and certificates should have reasonably long validity intervals, e.g., 10 years, to minimize the disruption caused by key changeover.> 6.4. Activation data 6.4.1. Activation data generation and installation <Describe how activation data for your CA will be generated.> 6.4.2. Activation data protection Activation data for the CA private key will be protected by <Describe your procedures here>. 6.4.3. Other aspects of activation data <Add here any details you wish to provide with regard to the activation data for your CA. If there are none, say ''None.''> 6.5. Computer security controls 6.5.1. Specific computer security technical requirement <Describe your security requirements for the computers used to support this PKI, e.g., requirements for authenticated logins, audit capabilities, etc. These requirements should be commensurate with those used for the computers used for managingallocationdistribution ofIP addresses.> 6.5.2. Computer security rating [OMITTED]INRs.> 6.6. Life cycle technical controls 6.6.1. System development controls <Describe any system development controls that you will apply to the PKI systems, e.g., use of Trusted System Development Methodology (TSDM) Level 2.> 6.6.2. Security management controls <Describe the security management controls that will be used for the RPKI software and equipment employed by the CA. These security measures should be commensurate with those used for the systems used by the CAs for managing andallocating IP addresses.>distributing INRs.> 6.6.3. Life cycle security controls <Describe how the equipment (hardware and software) used forPKIRPKI functions will be procured, installed, maintained, and updated. This should be done in a fashion commensurate with the way in which equipment for the management andallocationdistribution ofIP address spaceINRs is handled. > 6.7. Network security controls <Describe the network security controls that will be used for CA operation. These should be commensurate with the network security controls employed for the computers used for managingallocationdistribution ofIP addresses.>INRs.> 6.8. Time-stamping ThePKI in questionRPKI does not make use of time stamping. 7. Certificate and CRL Profiles Please refer to the Certificate and CRL Profile [RFCyyyy].7.1. Certificate profile [OMITTED] 7.1.1. Version number(s) [OMITTED] 7.1.2. Certificate extensions [OMITTED] 7.1.2.1. Required certificate extensions [OMITTED] 7.1.2.2. Deprecated certificate extensions [OMITTED] 7.1.2.3. Optional certificate extensions [OMITTED] 7.1.3. Algorithm object identifiers [OMITTED] 7.1.4. Name forms [OMITTED] 7.1.5. Name constraints [OMITTED] 7.1.6. Certificate policy object identifier [OMITTED] 7.1.7. Usage of Policy Constraints extension [OMITTED] 7.1.8. Policy qualifiers syntax and semantics [OMITTED] 7.1.9. Processing semantics for the critical Certificate Policies extension [OMITTED] 7.2. CRL profile [OMITTED] 7.2.1. Version number(s) [OMITTED] 7.2.2. CRL and CRL entry extensions [OMITTED] 7.2.2.1. Required CRL extensions [OMITTED] 7.2.2.2. Deprecated CRL extensions [OMITTED] 7.2.2.3. Optional CRL extensions [OMITTED] 7.3. OCSP profile [OMITTED] 7.3.1. Version number(s) [OMITTED] 7.3.2. OCSP extensions [OMITTED]8. Compliance AuditAndand Other Assessments <List here any audit and other assessments used to ensure the security of the administration ofIP addresses.INRs. These are sufficient for thePKIRPKI systems.> 8.1. Frequency or circumstances of assessment 8.2. Identity/qualifications of assessor 8.3. Assessor's relationship to assessed entity 8.4. Topics covered by assessment 8.5. Actions taken as a result of deficiency 8.6. Communication of results 9. Other Business And Legal Matters <The sections below are optional. Fill them in as appropriate for your organization. The CP says that CAs should cover 9.1 to 9.11 and 9.13 to 9.17 although not every CA will choose to do so. Note that the manner in which you manage your business and legal matters for this PKI should be commensurate with the way in which you manage business and legal matters for theallocationdistribution ofIP addresses.>INRs.> 9.1. Fees 9.1.1. Certificate issuance or renewal fees 9.1.2. Fees for other services (if applicable) 9.1.3. Refund policy 9.2. Financial responsibility 9.2.1. Insurance coverage 9.2.2. Other assets 9.2.3. Insurance or warranty coverage for end-entities 9.3. Confidentiality of business information 9.3.1. Scope of confidential information 9.3.2. Information not within the scope of confidential information 9.3.3. Responsibility to protect confidential information 9.4. Privacy of personal information 9.4.1. Privacy plan 9.4.2. Information treated as private 9.4.3. Information not deemed private 9.4.4. Responsibility to protect private information 9.4.5. Notice and consent to use private information 9.4.6. Disclosure pursuant to judicial or administrative process 9.4.7. Other information disclosure circumstances 9.5. Intellectual property rights (if applicable) 9.6. Representations and warranties 9.6.1. CA representations and warranties 9.6.2. Subscriber representations and warranties 9.6.3. Relying party representations and warranties9.6.4. Representations and warranties of other participants [OMITTED]9.7. Disclaimers of warranties 9.8. Limitations of liability 9.9. Indemnities 9.10. Term and termination 9.10.1. Term 9.10.2. Termination 9.10.3. Effect of termination and survival 9.11. Individual notices and communications with participants 9.12. Amendments 9.12.1. Procedure for amendment 9.12.2. Notification mechanism and period9.12.3. Circumstances under which OID must be changed [OMITTED]9.13. Dispute resolution provisions 9.14. Governing law 9.15. Compliance with applicable law 9.16. Miscellaneous provisions 9.16.1. Entire agreement 9.16.2. Assignment 9.16.3. Severability 9.16.4. Enforcement (attorneys' fees and waiver of rights) 9.16.5. Force Majeure9.17. Other provisions [OMITTED]10. Security Considerations The degree to which a relying party can trust the binding embodied in a certificate depends on several factors. These factors can include the practices followed by the certification authority (CA) in authenticating the subject; the CA's operating policy, procedures, and technical security controls, including the scope of the subscriber's responsibilities (for example, in protecting the private key), and the stated responsibilities and liability terms and conditions of the CA (for example, warranties, disclaimers of warranties, and limitations of liability). This document provides a framework to address the technical, procedural, personnel, and physical security aspects of Certification Authorities, Registration Authorities, repositories, subscribers, and relying party cryptographic modules, in order to ensure that the certificate generation, publication, renewal, re-key, usage, and revocation is done in a secure manner. Specifically, Section 3 Identification and Authentication (I&A); Section 4 Certificate Life-Cycle Operational Requirements; Section 5 Facility Management, and Operational Controls; Section 6 Technical Security Controls; Section 7 Certificate and CRL Profiles; and Section 8 Compliance Audit and Other Assessments are oriented towards ensuring secure operation of the PKI entities such as CA, RA, repository, subscriber systems, and relying party systems. 11. IANA Considerations None. 12. Acknowledgments The authors would like to thank Matt Lepinski for his help with the formatting and Ron Watro for assistance with the editing of this document. 13. References 13.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC3280] Housley, R., Polk, W. Ford, W., Solo, D., "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", BCP 14, RFC 2119, March 1997. [RFCxxxx] Seo, K., Watro, R., Kong, D., and Kent, S., "Certificate Policy for the Resource PKI (RPKI)", work in progress. [RFCyyyy] Huston, G.,Loomans, R.,Michaelson, G., and Loomans, R., ''A Profile for X.509 PKIX Resource Certificates'', work in progress. [RFCzzzz] Huston, G., ''A Profile for Algorithms and Key Sizes for use in the Resource Public Key Infrastructure,'' work in progress. 13.2. Informative References [BGP4] Y. Rekhter, T. Li (editors), A Border Gateway Protocol 4 (BGP-4). IETF RFC 1771, March 1995. [FIPS] Federal Information Processing Standards Publication140-2 (FIPS PUB 140-2),140-3 (FIPS-140-3), "Security Requirements for Cryptographic Modules", Information Technology Laboratory, National Institute of Standards and Technology,May 25, 2001.work in progress. [RSA] Rivest, R., Shamir, A., and Adelman, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126. Author's Addresses Stephen Kent BBN Technologies 10 Moulton Street Cambridge MA 02138 USA Phone: +1 (617) 873-3988 Email: skent@bbn.com Derrick Kong BBN Technologies 10 Moulton Street Cambridge MA 02138 USA Phone: +1 (617) 873-1951 Email: dkong@bbn.com Karen Seo BBN Technologies 10 Moulton Street Cambridge MA 02138 USA Phone: +1 (617) 873-3152 Email: kseo@bbn.comIntellectual Property Statement ThePre-5378 Material Disclaimer This document may contain material from IETFtakes no position regarding the validity or scope of any Intellectual Property RightsDocuments orother rights that might be claimed to pertain to the implementationIETF Contributions published oruse ofmade publicly available before November 10, 2008. The person(s) controlling thetechnology describedcopyright in some of thisdocument or the extent to which any license under such rights might or mightmaterial may notbe available; nor does it represent that it has made any independent effort to identify any such rights. Information onhave granted theprocedures with respectIETF Trust the right torights in RFC documents can be found in BCP 78 and BCP 79. Copiesallow modifications ofIPR disclosures made tosuch material outside the IETFSecretariat and any assurances of licenses to be made available, or the result ofStandards Process. Without obtaining anattempt made to obtain a generaladequate licenseor permission forfrom theuse ofperson(s) controlling the copyright in suchproprietary rights by implementers or users ofmaterials, thisspecification candocument may not beobtained frommodified outside the IETFon-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology thatStandards Process, and derivative works of it may not berequired to implement this standard. Please address the information tocreated outside the IETFat ietf-ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided onStandards Process, except to format it for publication as an"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.RFC or to translate it into languages other than English. Copyright Statement Copyright(C) The(c) 2010 IETF Trust(2008).and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on therights, licensesdate of publication of this document. Please review these documents carefully, as they describe your rights and restrictionscontainedwith respect to this document. Code Components extracted from this document must include Simplified BSD License text as described inBCP 78,Section 4.e of the Trust Legal Provisions andexceptare provided without warranty asset forth therein,described in theauthors retain all their rights.Simplified BSD License.