next_inactiveupprevious



Academia Sinica Grid Computing Certification Authority (ASGCCA) Certificate Policy and Certification Practice Statement

version 1.5

September 16, 2005

 

Contents

 

 

1 Introduction

1.1 Overview

This is a document based on the structure suggested by the ``Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework'' [RFC 2527]. Sections that are not included have a default value of "No stipulation". This document describes the set of rules and procedures established by the Academia Sinica Grid Computing Certification Authority (ASGCCA), the Certification Authority for the Academia Sinica Grid Computing Service.
(http://grid.sinica.edu.tw).

1.1.1 General Definitions

The document makes use of the following terms.

  • Academia Sinica Grid Computing Directory Service (ASGCDS)

Academia Sinica Grid Computing Directory Service keeps the user's information. For example, name, e-mail, phone numbers, office, institute, work groups, working projects, who is the superior, etc. The information is not published.

  • Activation data

Data values, other than keys, that are required to operate cryptographic modules and that need to be protected (e.g., a PIN, a pass phrase, or a manually-held key share).

  • ASGCCA

The abbreviation of Academia Sinica Grid Computing Certification Authority.

  • Certificate Policy (CP)

A named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. For example, a particular certificate policy might indicate applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range.

  • Certification Practice Statement (CPS)

A statement of the practices, which a certification authority employs in issuing certificates.

  • Issuing certification authority (issuing CA)

In the context of a particular certificate, the issuing CA is the CA that issued the certificate (see also Subject certification authority).

  • Policy qualifier

Policy-dependent information that accompanies a certificate policy identifier in an X.509 certificate.

  • Registration authority (RA)

An entity that is responsible for identification and authentication of certificate subjects, but that does not sign or issue certificates (i.e. an RA is delegated certain tasks on behalf of a CA).

  • Relying party

A recipient of a certificate who acts in reliance on that certificate and/or digital signatures verified using that certificate.

  • Set of provisions

A collection of practice and/or policy statements, spanning a range of standard topics, for use in expressing a certificate policy definition or CPS employing the approach described in this framework.

1.2 Identification

  • Document title:

Academia Sinica Grid Computing Certification Authority (ASGCCA) Certificate Policy and Certification Practice Statement

 

  • Document version:

1.5

  • OID:

The following ASN.1 Object Identifier (OID) has been assigned to this document: 1.3.6.1.4.1.5935.10.1.1.3. This OID is constructed as shown in the table below

IANA

1.3.6.1.4.1

Academia Sinica Computing Centre

.5935

ASGCCA

.10

CP/CPS

.1

Major Version

.1

Minor Version

.5

  • Document date:

August 2005

1.3 Community and Applicability

1.3.1 Certification Authorities

ASGCCA is managed by Academia Sinica Computing Centre.

1.3.2 Registration Authorities

Academia Sinica Computing Centre manages the functions of the ASGCCA Registration Authority under the rule of this CP-CPS.

1.3.3 End Entities

ASGCCA issues certificates for the following subjects:

  • Users of Academia Sinica.
  • Users of domestic Grid-based Application/Projects.
  • Collaborators related to Academia Sinica Grid Computing research.
  • User or service involved in LCG/EGEE Project without CA support in Asia.

1.3.4 Applicability

The certificates issued by ASGCCA must not be used for financial transaction.

The authorized uses of certificate issued by ASGCCA are:

  • e-mail signing and encryption (S/MIME)
  • authentication and encryption of communication (SSL/TLS)
  • object-signing

1.4 Contact Details

The ASGCCA is managed by Academia Sinica Computing Centre (http://www.ascc.net). Contact person for questions related to this document or the ASGCCA in general:

Yen, Eric

Address: 128, Sec. 2, Academia Road, Nankang, Taipei, Taiwan 11529

Phone: +886-2-2789-9494

Mobile: +886-922-959211

Fax: +886-2-2783-6444

email: asgcca@grid.sinica.edu.tw


2 General Provisions

2.1 Obligations

2.1.1 CA and RA Obligations

  • Accept certificate signing request from acceptable entities (see section 1.3.3);
  • Authenticate entities according to procedures outlined in this document;
  • Issue certificates based on the requests from authenticated entities;
  • Notify the subscriber about the certificate issuance;
  • Publish the issued certificates;
  • Accept certificate revocation requests from entities;
  • Authenticate entities requesting the revocation of certificate;
  • Issue CRLs according with the rules described in this document;
  • Publish the issued CRLs;
  • Follow the policies and procedures described in this document.

2.1.2 Subscriber Obligations

Subscribers must:

  • Read and adhere to the procedures published in this document;
  • Generate a key pair using a trustworthy method;
  • Take reasonable precautions to prevent any loss, disclosure or unauthorized use of the private key associated with the certificate, including:
    • Selecting a pass phrase of at minimum 12 characters
    • Protecting the pass phrase from others
  • Provide correct personal information and authorize the publication of the certificate.
  • Notify immediately ASGCCA in case of private key loss or compromise.
  • User must not share certificate.
  • Each host certificate is issued to the host with FQDN (Fully Qualified Domain Name).

 

2.1.3 Relying Party Obligations

Relying parties must:

  • Read the procedures published in this document.
  • Verify the certificate by checking whether the validity period has expired and whether the certificate is on the latest CRL.
  • Use the certificates for the permitted uses only.

2.1.4 Repository Obligations

ASGCCA will publish certificates and CRLs as soon as issued.

2.2 Liability

ASGCCA only guarantees to control the identity of the subjects requesting a certificate according to the practices described in this document. No other liability, implicit or explicit, is accepted.

ASGCCA will not give any guarantees about the security or suitability of the service that is identified by a ASGCCA certificate. The certification service is run with a reasonable level of security, but it is provided on a best effort only basis. It does not warrant its procedures and it will take no responsibility for problems arising from its operation, or for the use made of the certificates it provides.

ASGCCA denies any financial or any other kind of responsibility for damages or impairments resulting from its operation.

2.3 Financial Responsibility

No Financial responsibility is accepted.

2.4 Interpretation and Enforcement

2.4.1 Governing Law

Interpretation of this policy is according to R.O.C. laws.

2.5 Fees

No fees are charged for ASGCCA Certificates.

2.6 Publication and Repositories

2.6.1 Publication of CA information

ASGCCA will operate a secure online repository that contains:

  • ASGCCA's certificate;
  • Certificates issued by ASGCCA;
  • A Certificate Revocation List;
  • A copy of this policy;
  • Other information relevant to the ASGCCA.

2.6.2 Frequency of Publication

  1. Certificates will be published as soon as issued.
  2. The frequency of CRL publication is specified in subsection 4.4.5.
  3. New version of CP/CPSs are published as soon as they have been approved.

2.6.3 Access Controls

The online repository is available on a substantially 24 hours per day, 7 days per week basis, subject to reasonable scheduled maintenance.

ASGCCA doesn't impose any access control on its Policy, its Certificate and issued certificates and CRLs.

The CRL list is signed by ASGCCA private key.

2.6.4 Repositories

Repository of certificates is at http://ca.grid.sinica.edu.tw/ and CRLs is at http://ca.grid.sinica.edu.tw/CRL/ .

2.7 Compliance audit

ASGCCA may be audited by other trusted CAs to verify its compliance with the rules and procedures specified in this document.

2.7.1 Frequency of Entity Compliance Audit

The ASGCCA will accept at least one external Compliance Audit per year. In addition, the ASGCCA performs operational self-assessment of CA/RA staff at least once per year.

2.7.2 Identity/Qualifications of Auditor

        The CA will be audited by the other cross-certifying CAs.

2.7.3 Auditor' Relationship to Audited Party

        It is desirable that the auditor is a third-party to this PKI system

2.7.4 Topics Covered by Audit

Audit items will be selected based on the WebTrust criteria and minimum CA requirements enacted by the APPMA and EUPAM. The Audit must cover both compliance audit and operational audit.

2.7.5 Actions Taken as a Result of Deficiency

The ASGCCA has the responsibility for the action to be taken as a result of deficiency when the ASGCCA receives an audit report from the auditor, it will send a report on actions to the auditor within two weeks. The report must describe actions taken as a result of deficiency and their timetable.

2.7.6 Communications of Results Frequency of Entity Compliance

        The result of the audit will be made available to members of any policy management authorities in which ASGCCA participates. It may make the results of the audit publicly available. The decision will be made by the ASGCCA in case-by-case basis.

2.8 Confidentiality

ASGCCA collects subscribers' full names, organization and e-mail addresses. Some of this information is used to construct unique, meaningful subject names in the issued certificates.

Information included in issued certificates and CRLs is not considered confidential.

ASGCCA does not collect any kind of confidential information.

Under no circumstances ASGCCA will have access to the private keys of any subscriber to whom it issues a certificate.

2.9 Intellectual Property Rights

Parts of this document are inspired by [CERN CA], [DOE Grid PKI], [DATAGRID-ES CA].


 

3 Identification and Authentication

3.1 Initial Registration

3.1.1 Types of Names

Name components vary depending on the type of certificate. Names will be consistent with the name requirements specified in ``Internet X.509 Public Key Infrastructure Certificate and CRL profile'' [RFC 2459].

3.1.2 Name Meanings

The Subject Name in a certificate must have a reasonable association with the authenticate name of the entity.

3.1.3 Uniqueness of Names

The Distinguished Name must be unique for each subject name certified by ASGCCA.

3.1.4 Method to Prove Possession of Private Key

The public and private keys are generated on the user station when he/her fills the certificate request form with Netscape or Internet Explorer browser.

3.1.5 Authentication of Organization Identity

If the name of an organization is requested to be part of subject name, ASGCCA may take steps to ascertain that the organization consent to such use. The information of authenticated organization is published on
http://ca.grid.sinica.edu.tw/general/auth_organization.html .

3.1.6 Authentication of Individual Identity

Procedures differ if the subject is a user or a server/service:

  • User :

 

For Academia Sinica Staffs:

Subscriber must be already registered at the Academia Sinica Grid Computing Directory Service as a user defined in end entities.

RA staff will check account registered on ASGCDS and contact subscriber personally. If the subscriber belongs to a distant organization that make personal contact unreasonable, the RA staff will calls the subscriber, using the indicated telephone number (it must belong to the organization and must not be a private number of the individual). During the call, personal information can be checked.

For LCG/EGEE researchers and collaborators:

The RA cross-check the subscriber identity with reliable and secure information coming from official administrative managers recognized by ASCC.

ASGCCA will only authenticate subscribers and issue certificate without namespace clash with other CAs in APPMA, EUPMA and American Grid PMA.

  • Host or Service certificate:

Requests must be signed with a valid personal ASGCCA user certificate.

3.2 Routine Rekey

Rekeying of certificates can be requested by an online procedure, which checks the validity of certificates.

3.3 Rekey After Revocation

Rekey after revocation follows the same rules as an initial registration.

3.4 Revocation Request

Certificate revocation request must be sent in the following ways:

  • Send e-mail to asgcca@grid.sinica.edu.tw signed with a valid and trusted certificate;
  • Contact personally the CA/RA staff in order to verify his/her identity and the validity of the request.

 

4 Operational Requirements

4.1 Certificate Application

Procedures are different if the subject is a person or a server. In every case the subject has to generate his/her own key pair. Minimum key length is 1024 bits.

  • User: Certificate requests are submitted by an online procedure, using a Netscape, Mozilla or Internet Explorer browser.
  • Host/Service: Certificate requests are submitted by an online procedure, using a Netscape, Mozilla or Internet Explorer browser with a valid personal ASGCCA user certificate.

4.2 Certificate Issuance

ASGCCA issues the certificate if, and only if, the authentication of the subject is successful.

If the subject is a person, a message is sent to his/her e-mail address with the instructions on how to download it from the ASGCCA web server. In the other case, the certificate itself is sent to the address specified in the request.

If the authentication is unsuccessful, the certificate is not issued and e-mail with the reason is sent to the subject.

4.3 Certificate Acceptance

No Stipulation.

4.4 Certificate Suspension and Revocation

4.4.1 Circumstances for Revocation

A certificate will be revoked in the following circumstances:

  • the entity's private key is lost or suspected to be compromised;
  • the information in the entity's certificate is suspected to be inaccurate;
  • the entity requests for revocation;
  • the entity violates its obligations.
  • The entity leaves the organization
  • RA can also request revocation with any reasons describe above.
  • Name space conflict ¡V Since ASGCCA supports CA service in Asia region, therefore people in Asia countries and organizations such as China, Singapore and etc could apply for ASGCCA. If new CA service started up in their own country or their organization, ASGCCA would actively revoke their certificate to avoid name space conflict.  Also, ASGC would inform the users/hosts admin to apply certificates from applicable CA organization.

4.4.2 Who Can Request Revocation

The revocation of the certificate can be requested by:

  • The certificate subscriber;
  • Any other entity presenting proof of knowledge of the private key compromise or of the modification of the subscriber's data or relation with ASGCCA.

4.4.3 Procedure for Revocation Request

The person requesting the revocation of certificate must authenticate himself in one of the following ways:

  • Sending an email, signed by a valid and trusted certificate, to asgcca@grid.sinica.edu.tw, RA will contact subscriber for confirmation.
  • In the other cases, authentication is performed with the same procedure used to authenticate the identity of person.

In both case above, the requesting entity must specify the reason for the revocation request and provide evidence of circumstances as described in section 4.4.1.

4.4.4 Circumstances for Suspension

The ASGCCA does not support Certificate Suspension.

4.4.5 CRL Issuance Frequency

The lifetime of the CRL is 30 days.

The CRL is updated immediately after every revocation.

CRL is reissued 7 days before expiration even if there have been no revocations.

4.4.6 Online Revocation/status checking availability

No stipulation

4.4.7 Online Revocation checking requirements

No stipulation.

4.4.8 Other forms of revocation advertisement available

No stipulation.

4.5 Security Audit Procedures Security

4.5.1 Types of Events Recorded

  • Certification requests;
  • Revocation requests;
  • Issued certificates;
  • Issued CRLs.

4.5.2 Processing Frequency of Audit Logs

No Stipulation.

4.5.3 Retention Period for Audit Logs

Logs will be kept for a minimum of 3 years.

4.6 Records Archival

4.6.1 Types of Event Recorded

The following event are stored and backed-up in safekeeping:

  • certification requests
  • issued certificates
  • revocation request
  • issued CRLs
  • all e-mail messages sent to ASGCCA
  • all e-mail messages sent by ASGCCA
  • CA system logs will be recorded and archived, including
    • boot / shutdown system log
    • system message log
    • secure message log

4.6.2 Retention Period for Archives

The minimum retention period is three years.

4.7 Key Changeover

No stipulation.

4.8 Compromise and Disaster Recovery

If the CA's private key is (or suspected to be) compromised, the CA will:

  • Inform subscribers and subordinate RAs;
  • Terminate the certificates and CRL distribution services for certificates and CRLs issued using the compromised key.

4.9 CA Termination

Before ASGCCA terminates its services, it will:

  • Inform subscribers, subordinate CAs and cross-certifying CAs;
  • Make widely available information of its termination;
  • Stop issuing certificates and CRLs.
  • Destroy its private key's and all copies.

 

5 Physical, Procedural and Personnel Security Controls

5.1 Physical Security Controls

5.1.1 Site Location

The ASGCCA is located safely at Academia Sinica Computing Centre facilities in Taiwan.

5.1.2 Physical access

Physical access to the ASGCCA is restricted to authorized personnel. The access key is controlled by one of the ASGCCA staff who is assigned to secure the facilities safety. All access to the facilities needs to be scheduled and the facilities security staff needs to be presented at all time.

5.1.3 Power and air conditioning

The CA signing machine and the CA web server are both protected by uninterruptible power supplies. Environment temperature in rooms containing CA related equipment is maintained at appropriate levels by suitable air conditioning systems.

5.1.4 Water exposures

Due to the location of the ASGCCA facilities floods are not expected.

5.1.5 Fire prevention and protection

ASGCCA facilities obey to the R.O.C. law regarding fire prevention and protection in buildings.

5.1.6 Media storage

The ASGCCA key is kept in several removable storages. Backup copies of CA related information are kept in removable media.

5.1.7 Waste disposal

Wastes carrying potential confidential information such as old floppy disks are physically destroyed before being trashed.

5.1.8 Off-site backup

No off-site backups are currently performed.

5.1.9 CA pass phrase and application documents safety

The CA pass phrase and documents will be stored safely in a safety box. Only the CA administrator has the access right to the safety box.

5.2 Procedural Controls

No Stipulations.

5.3 Personnel Security Controls

All access to the servers and applications that compromise the Academia Sinica Computing Centre.

5.3.1 Background Checks and Clearance Procedures for CA Personnel

CA personnel are recruited from the Academia Sinica Computing Centre.

5.3.2 Background Checks and Security Procedures for Other Personnel

No other personnel are authorized to access ASGCCA facilities without the physical presence of CA personnel.

5.3.3 Training Requirements and Procedures

Internal training is given to CA operators.

5.3.4 Training Period and Retraining Procedures

No Stipulation

5.3.5 Frequency and Sequence of Job Rotation

Job rotation is not performed.

5.3.6 Sanctions Against Personnel

No Stipulation.

5.3.7 Controls on Contracting Personnel

No Stipulation

5.3.8 Documentation Supplied to Personnel

  • Copies of this document;
  • ASGCCA Operations Manual.

 

6 Technical Security Controls

6.1 Key Pair Generation and Installation

6.1.1 Key Pair Generation

A CA key pair is generated using Hardware Security Module by the Security Officer. Each subscriber must generate its own key pair. The ASGCCA does not generate private keys for subjects.  An end entity key pair is generated using a software tool in his/her/its personal/server hardware.

6.1.2 Private Key Delivery to Entity

The ASGCCA does not generate private keys hence does not deliver private keys.

User's private key will be generated by browser application in personal computer.

6.1.3 Public Key Delivery to Certificate Issuer

Entities' public keys are delivered to issuing CA in a secure and trustworthy manner.

6.1.4 CA Public Key Delivery to Users

CA certificate can be downloaded from the ASGCCA secure web site.

6.1.5 Key Sizes

  • The minimum key length for user or host/service certificate is 1024 bits
  • The CA key length is 2048 bits.

6.1.6 Public Key Parameters Generation

No Stipulation.

6.1.7 Parameter Quality Checking

No Stipulation.

6.1.8 Hardware/software key generation

It is defined in this document [6.1.1 key pair generation].

6.1.9 Key Usage Purposes

ASGCCA private key is the only key used for signing CRLs and Certificates for person, server and service.

The Certificate key Usage field must be used in accordance with the ``Internet X.509 Public Key Infrastructure Certificate and CRL profile'' [RFC 2459].

6.2 Private Key Protection

6.2.1 Private Key (n out of m) Multi-person Control

The CA's private key is not under (n out of m) multi-person control. But the ASGCCA implements multi-person control for the access to the CA server as described in this document [5.1 Physical Access]. Backup Copy of the CA's private key is under (2 out of 5) multi-person control.

6.2.2 Private Key Escrow

ASGCCA keys are not given in escrow. ASGCCA is not available for accepting escrow copies of keys of other parties.

6.2.3 Private Key Archival and Backup

The ASGCCA's private key is kept encrypted in multiple copies in floppy disks and CDROMs in safe places. For emergencies, the passphrase is in a sealed envelope kept in a safe.

6.3 Other Aspects of Key Pair Management

  • The lifetime of ASGCCA certificate is five years.
  • The lifetime of user certificate is one year.
  • The lifetime of host certificate is one year.
  • The lifetime of service certificate is one year.

6.4 Activation Data

The ASGCCA's private key is protected by a 15 characters passphrase.

6.5 Computer Security Controls

6.5.1 Specific Security Technical Requirements

  • The operating systems of CA/RA computers are maintained at a high level of security by applying all the relevant patches;
  • Monitoring is performed to detect unauthorized software changes;
  • CA systems configuration is reduced to the base minimum.

6.5.2 Computer Security Rating

No Stipulation.

6.6 Life Cycle Security Controls

No Stipulation.

6.7 Network Security Controls

  • The CA signing machine is kept off-line;
  • RA machines other than the signing machine are protected by a firewall.

6.8 Cryptographic Module Engineering Controls

No Stipulation.


7 Certificate and CRL Profile

7.1 Certificate Profile

Certificate profile is described in a separate document, ¡§ASGCCA certificate and CRL profile version 1.5¡¨. The document is available on the http://ca.grid.sinica.edu.tw

7.1.1 Version Number

X.509 v3.

7.1.2 Certificate Extensions

Basic constraints:

Not a CA.

Key usage:

Digital signature, non-repudiation, key encipherment, data encipherment.

Subject key identifier
Authority key identifier
Subject alternative name
Issuer alternative name
CRL distribution points
Certificate policies

7.1.3 Algorithm Object Identifiers

No Stipulation.

7.1.4 Name Forms

Issuer:

l            C=TW, O=AS, CN=Academia Sinica Grid Computing Certification Authority

Person DN:

l            C=Country, O=Organization, OU=Unite, CN=First Name Last Name/Email=email

Server name DN:

l            C=Country, O=Organization, OU=Unite, CN=DNS server name(FQDN)

Service DN:

l            C=Country, O=Organization-Name, OU=OrganizationUnit-Name, CN=Service-Name/Domain-Name  

7.1.5 Name Constraints

Subject attribute constrains:

l            Country Name: must be ¡§TW¡¨or countries abbreviated name in Asia.

Example:

/C=TW
/C=CN
/C=SG.

7.1.6 Certificate Policy Object Identifier

See section 1.2.

7.1.7 Usage of Policy Constraints Extensions

No Stipulation.

7.1.8 Policy Qualifier Syntax and Semantics

 

No Stipulation.

7.2 CRL Profile

7.2.1 Version

x.509 v1.

7.2.2 CRL and CRL Entry Extensions

No Stipulation.


8 Specification Administration

8.1 Specification Change Procedures

Users will not be warned in advance of changes to ASGCCA's policy and CPS. Revision is made and approved by the APPMA and EUPMA. Minor editorial changes to this document can be made without approval by the APPMA and EUPMA. New OID will not be assigned to the revised document when minor changes would be made. Major changes such as changes in policy or technical security controls need to be approved by the AIST GRID PMA. New OID will be assigned to the revised document for such major changes would be made.

8.2 Publication and Notification Procedures

Both minor and major changes of this document will be announced at the news section at: http://ca.grid.sinica.edu.tw/ .

8.2.1 CPS Approval Procedures

All major changes must be approved by the AIST GRID PMA.

Bibliography

CERN CA

CERN CA Certificate Policy and Certification Practice Statement. http://home.cern.ch/globus/ca/CPS.pdf

DATAGRID-ES CA

DATAGRID-ES CA Certificate Policy and Certification Practice Statement. http://www.ifca.unican.es/datagrid/ca/datagrid-ca-policy.doc

DOE Grid PKI

DOE Science Grid PKI Certificate Policy and Certification Practice Statement Version 2.1. http://www.doegrids.org/Docs/CP-CPS.pdf

RFC 2459

Internet X.509 Public Key Infrastructure Certificate and CRL Profile. http://www.ietf.org/rfc/rfc2459.txt

RFC 2527

Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. http://www.ietf.org/rfc/rfc2527.txt