Academia Sinica Grid Computing
Certification Authority (ASGCCA) Certificate Policy and Certification Practice
Statement
version 1.5
1
Introduction
This is a document
based on the structure suggested by the ``Internet X.509 Public Key
Infrastructure Certificate Policy and Certification Practices Framework'' [RFC 2527]. Sections that are not included have a
default value of "No stipulation". This document describes the set of
rules and procedures established by the Academia Sinica Grid Computing
Certification Authority (ASGCCA), the Certification Authority for the Academia
Sinica Grid Computing Service.
(http://grid.sinica.edu.tw).
The document makes
use of the following terms.
Academia Sinica Grid Computing Directory Service keeps the user's
information. For example, name, e-mail, phone numbers, office, institute, work
groups, working projects, who is the superior, etc. The information is not
published.
Data values, other than keys, that are required to operate cryptographic
modules and that need to be protected (e.g., a PIN, a pass phrase, or a
manually-held key share).
The abbreviation of Academia Sinica Grid Computing Certification
Authority.
A named set of rules that indicates the applicability of a certificate to
a particular community and/or class of application with common security
requirements. For example, a particular certificate policy might indicate
applicability of a type of certificate to the authentication of electronic data
interchange transactions for the trading of goods within a given price range.
A statement of the practices, which a certification authority employs in
issuing certificates.
In the context of a particular certificate, the issuing CA is the CA that
issued the certificate (see also Subject certification authority).
Policy-dependent information that accompanies a certificate policy
identifier in an X.509 certificate.
An entity that is responsible for identification and authentication of
certificate subjects, but that does not sign or issue certificates (i.e. an RA
is delegated certain tasks on behalf of a CA).
A recipient of a certificate who acts in reliance on that certificate
and/or digital signatures verified using that certificate.
A collection of practice and/or policy statements, spanning a range of
standard topics, for use in expressing a certificate policy definition or CPS
employing the approach described in this framework.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Certificate
Policy and Certification Practice Statement
1.5
The following ASN.1 Object Identifier (OID) has been assigned to this
document:
IANA |
|
Academia Sinica Computing Centre |
.5935 |
ASGCCA |
.10 |
CP/CPS |
.1 |
Major Version |
.1 |
Minor Version |
.5 |
August 2005
1.3
Community and Applicability
ASGCCA is managed
by Academia Sinica Computing Centre.
Academia Sinica
Computing Centre manages the functions of the ASGCCA Registration Authority
under the rule of this CP-CPS.
ASGCCA issues
certificates for the following subjects:
The certificates
issued by ASGCCA must not be used for financial transaction.
The authorized uses
of certificate issued by ASGCCA are:
The ASGCCA is
managed by Academia Sinica Computing Centre (http://www.ascc.net). Contact
person for questions related to this document or the ASGCCA in general:
Yen, Eric
Address: 128, Sec.
2,
Phone:
+886-2-2789-9494
Fax:
+886-2-2783-6444
email:
asgcca@grid.sinica.edu.tw
Subscribers must:
Relying parties
must:
ASGCCA will publish
certificates and CRLs as soon as issued.
ASGCCA only guarantees
to control the identity of the subjects requesting a certificate according to
the practices described in this document. No other liability, implicit or
explicit, is accepted.
ASGCCA will not
give any guarantees about the security or suitability of the service that is
identified by a ASGCCA certificate. The certification service is run with a
reasonable level of security, but it is provided on a best effort only basis.
It does not warrant its procedures and it will take no responsibility for problems
arising from its operation, or for the use made of the certificates it
provides.
ASGCCA denies any
financial or any other kind of responsibility for damages or impairments
resulting from its operation.
No Financial responsibility
is accepted.
2.4
Interpretation and Enforcement
Interpretation of
this policy is according to R.O.C. laws.
No fees are charged
for ASGCCA Certificates.
2.6
Publication and Repositories
ASGCCA will operate
a secure online repository that contains:
The online
repository is available on a substantially 24 hours per day, 7 days per week
basis, subject to reasonable scheduled maintenance.
ASGCCA doesn't
impose any access control on its Policy, its Certificate and issued
certificates and CRLs.
The CRL list is
signed by ASGCCA private key.
Repository of
certificates is at http://ca.grid.sinica.edu.tw/ and CRLs is at http://ca.grid.sinica.edu.tw/CRL/
.
ASGCCA may be
audited by other trusted CAs to verify its compliance with the rules and
procedures specified in this document.
2.7.1 Frequency of
Entity Compliance Audit
The ASGCCA will accept at least one external Compliance Audit per year. In
addition, the ASGCCA performs operational self-assessment of CA/RA staff at
least once per year.
2.7.2 Identity/Qualifications
of Auditor
The
CA will be audited by the other cross-certifying CAs.
2.7.3 Auditor' Relationship to Audited Party
It
is desirable that the auditor is a third-party to this PKI system
2.7.4 Topics Covered by Audit
Audit items will be selected based on
the WebTrust criteria and minimum CA requirements enacted by the APPMA and
EUPAM. The Audit must cover both compliance audit and operational audit.
2.7.5 Actions Taken as a Result of Deficiency
The ASGCCA has the responsibility for
the action to be taken as a result of deficiency when the ASGCCA receives an
audit report from the auditor, it will send a report on actions to the auditor
within two weeks. The report must describe actions taken as a result of
deficiency and their timetable.
2.7.6 Communications of Results Frequency of Entity
Compliance
The
result of the audit will be made available to members of any policy management
authorities in which ASGCCA participates. It may make the results of the audit
publicly available. The decision will be made by the ASGCCA in case-by-case
basis.
ASGCCA collects
subscribers' full names, organization and e-mail addresses. Some of this
information is used to construct unique, meaningful subject names in the issued
certificates.
Information
included in issued certificates and CRLs is not considered confidential.
ASGCCA does not
collect any kind of confidential information.
Under no
circumstances ASGCCA will have access to the private keys of any subscriber to
whom it issues a certificate.
2.9
Intellectual Property Rights
Parts of this
document are inspired by [CERN CA], [DOE Grid PKI], [DATAGRID-ES CA].
3
Identification and Authentication
Name components
vary depending on the type of certificate. Names will be consistent with the
name requirements specified in ``Internet X.509 Public Key Infrastructure
Certificate and CRL profile'' [RFC 2459].
The Subject Name in
a certificate must have a reasonable association with the authenticate name of
the entity.
The Distinguished
Name must be unique for each subject name certified by ASGCCA.
The public and
private keys are generated on the user station when he/her fills the
certificate request form with Netscape or Internet Explorer browser.
If the name of an
organization is requested to be part of subject name, ASGCCA may take steps to
ascertain that the organization consent to such use. The information of
authenticated organization is published on
http://ca.grid.sinica.edu.tw/general/auth_organization.html .
Procedures differ
if the subject is a user or a server/service:
For Academia Sinica
Staffs:
Subscriber must be
already registered at the Academia Sinica Grid Computing Directory Service as a
user defined in end entities.
RA staff will check
account registered on ASGCDS and contact subscriber personally. If the
subscriber belongs to a distant organization that make personal contact
unreasonable, the RA staff will calls the subscriber, using the indicated
telephone number (it must belong to the organization and must not be a private
number of the individual). During the call, personal information can be
checked.
For LCG/EGEE
researchers and collaborators:
The RA cross-check
the subscriber identity with reliable and secure information coming from
official administrative managers recognized by ASCC.
ASGCCA will only
authenticate subscribers and issue certificate without namespace clash with
other CAs in APPMA, EUPMA and American Grid PMA.
Requests must be signed with a valid personal ASGCCA user certificate.
Rekeying of
certificates can be requested by an online procedure, which checks the validity
of certificates.
Rekey after
revocation follows the same rules as an initial registration.
Certificate
revocation request must be sent in the following ways:
Procedures are
different if the subject is a person or a server. In every case the subject has
to generate his/her own key pair. Minimum key length is 1024 bits.
ASGCCA issues the
certificate if, and only if, the authentication of the subject is successful.
If the subject is a
person, a message is sent to his/her e-mail address with the instructions on
how to download it from the ASGCCA web server. In the other case, the
certificate itself is sent to the address specified in the request.
If the
authentication is unsuccessful, the certificate is not issued and e-mail with
the reason is sent to the subject.
No Stipulation.
4.4
Certificate Suspension and Revocation
A certificate will
be revoked in the following circumstances:
The revocation of
the certificate can be requested by:
The person
requesting the revocation of certificate must authenticate himself in one of
the following ways:
In both case above, the requesting entity must specify the reason for the
revocation request and provide evidence of circumstances as described in
section
The ASGCCA does not
support Certificate Suspension.
The lifetime of the CRL is 30 days.
The CRL is updated immediately after every revocation.
CRL is reissued 7 days before expiration even if there have been no
revocations.
No stipulation
No stipulation.
No stipulation.
4.5
Security Audit Procedures Security
No Stipulation.
Logs will be kept
for a minimum of 3 years.
The following event
are stored and backed-up in safekeeping:
4.6.2
Retention Period for Archives
The minimum
retention period is three years.
No stipulation.
4.8
Compromise and Disaster Recovery
If the CA's private
key is (or suspected to be) compromised, the CA will:
Before ASGCCA
terminates its services, it will:
5
Physical, Procedural and Personnel Security Controls
5.1
Physical Security Controls
The ASGCCA is
located safely at Academia Sinica Computing Centre facilities in
Physical access to
the ASGCCA is restricted to authorized personnel. The access key is controlled
by one of the ASGCCA staff who is assigned to secure the facilities safety. All
access to the facilities needs to be scheduled and the facilities security
staff needs to be presented at all time.
The CA signing
machine and the CA web server are both protected by uninterruptible power
supplies. Environment temperature in rooms containing CA related equipment is
maintained at appropriate levels by suitable air conditioning systems.
Due to the location
of the ASGCCA facilities floods are not expected.
ASGCCA facilities
obey to the R.O.C. law regarding fire prevention and protection in buildings.
The ASGCCA key is
kept in several removable storages. Backup copies of CA related information are
kept in removable media.
Wastes carrying
potential confidential information such as old floppy disks are physically
destroyed before being trashed.
No off-site backups
are currently performed.
5.1.9 CA pass
phrase and application documents safety
The CA pass phrase
and documents will be stored safely in a safety box. Only the CA administrator
has the access right to the safety box.
No Stipulations.
5.3
Personnel Security Controls
All access to the
servers and applications that compromise the Academia Sinica Computing Centre.
CA personnel are
recruited from the Academia Sinica Computing Centre.
No other personnel are
authorized to access ASGCCA facilities without the physical presence of CA
personnel.
Internal training
is given to CA operators.
No Stipulation
Job rotation is not
performed.
No Stipulation.
No Stipulation
6.1
Key Pair Generation and Installation
A CA key pair is
generated using Hardware Security Module by the Security Officer. Each
subscriber must generate its own key pair. The ASGCCA does not generate private
keys for subjects. An end entity
key pair is generated using a software tool in his/her/its personal/server
hardware.
The ASGCCA does not
generate private keys hence does not deliver private keys.
User's private key
will be generated by browser application in personal computer.
Entities' public
keys are delivered to issuing CA in a secure and trustworthy manner.
CA certificate can
be downloaded from the ASGCCA secure web site.
No Stipulation.
No Stipulation.
It is defined in
this document [6.1.1 key pair generation].
ASGCCA private key
is the only key used for signing CRLs and Certificates for person, server and
service.
The Certificate key
Usage field must be used in accordance with the ``Internet X.509 Public Key
Infrastructure Certificate and CRL profile'' [RFC 2459].
The CA's private key is not under (n out of m) multi-person control. But
the ASGCCA implements multi-person control for the access to the CA server as
described in this document [5.1 Physical Access]. Backup Copy of the CA's
private key is under (2 out of 5) multi-person control.
ASGCCA keys are not
given in escrow. ASGCCA is not available for accepting escrow copies of keys of
other parties.
The ASGCCA's
private key is kept encrypted in multiple copies in floppy disks and CDROMs in
safe places. For emergencies, the passphrase is in a sealed envelope kept in a
safe.
6.3
Other Aspects of Key Pair Management
The ASGCCA's
private key is protected by a 15 characters passphrase.
6.5
Computer Security Controls
No Stipulation.
6.6
Life Cycle Security Controls
No Stipulation.
6.8
Cryptographic Module Engineering Controls
No Stipulation.
Certificate profile is described in a separate
document, ¡§ASGCCA certificate and CRL profile version 1.5¡¨. The document is available
on the http://ca.grid.sinica.edu.tw
X.509 v3.
Basic constraints:
Not a CA.
Key usage:
Digital signature, non-repudiation, key encipherment, data encipherment.
Subject key identifier
Authority key identifier
Subject alternative name
Issuer alternative name
CRL distribution points
Certificate policies
No Stipulation.
Issuer:
l
C=TW, O=AS,
CN=Academia Sinica Grid Computing Certification Authority
Person DN:
l
C=Country, O=Organization, OU=Unite,
CN=First Name Last Name/Email=email
Server name DN:
l
C=Country, O=Organization, OU=Unite,
CN=DNS server name(FQDN)
Service DN:
l
C=Country, O=Organization-Name, OU=OrganizationUnit-Name,
CN=Service-Name/Domain-Name
Subject attribute constrains:
l
Country
Name: must be ¡§TW¡¨or countries abbreviated name in
Example:
/C=TW
/C=CN
/C=SG.
See section 1.2.
No Stipulation.
No Stipulation.
x.509 v1.
No Stipulation.
8
Specification Administration
8.1
Specification Change Procedures
Users will not be
warned in advance of changes to ASGCCA's policy and CPS. Revision is made and
approved by the APPMA and EUPMA. Minor editorial changes to this document can
be made without approval by the APPMA and EUPMA. New OID will not be assigned
to the revised document when minor changes would be made. Major changes such as
changes in policy or technical security controls need to be approved by the
AIST GRID PMA. New OID will be assigned to the revised document for such major
changes would be made.
8.2
Publication and Notification Procedures
Both minor and
major changes of this document will be announced at the news section at: http://ca.grid.sinica.edu.tw/
.
All major changes
must be approved by the AIST GRID PMA.
CERN CA Certificate Policy and Certification Practice
Statement. http://home.cern.ch/globus/ca/CPS.pdf
DATAGRID-ES CA Certificate Policy and Certification
Practice Statement.
http://www.ifca.unican.es/datagrid/ca/datagrid-ca-policy.doc
DOE Science Grid PKI Certificate Policy and Certification
Practice Statement Version 2.1. http://www.doegrids.org/Docs/CP-CPS.pdf
Internet X.509 Public Key Infrastructure Certificate and
CRL Profile. http://www.ietf.org/rfc/rfc2459.txt
Internet X.509 Public Key Infrastructure Certificate
Policy and Certification Practices Framework. http://www.ietf.org/rfc/rfc2527.txt