Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nitpicks #586

Merged
merged 35 commits into from
Mar 28, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
35 commits
Select commit Hold shift + click to select a range
c37f9bf
Update certificate-policy.md
Mar 26, 2019
0b4e396
Update certificate-policy.md
Mar 26, 2019
e9c4794
Update certificate-policy.md
Mar 26, 2019
c60af71
Update certificate-policy.md
Mar 26, 2019
786da48
Update certificate-policy.md
Mar 26, 2019
d312dd0
Update certificate-policy.md
Mar 26, 2019
3296b0a
Update certificate-policy.md
Mar 26, 2019
595afe7
Update certificate-policy.md
Mar 27, 2019
f6fc071
Update certificate-policy.md
Mar 27, 2019
ad15b40
Update certificate-policy.md
Mar 27, 2019
2481721
Update certificate-policy.md
Mar 27, 2019
14da78d
Update certificate-policy.md
Mar 27, 2019
5ebb2f0
Update certificate-policy.md
Mar 27, 2019
37090cd
Update certificate-policy.md
Mar 27, 2019
8677808
Update certificate-policy.md
Mar 27, 2019
308d0ac
Update certificate-policy.md
Mar 27, 2019
ce2d7b7
Update certificate-policy.md
Mar 27, 2019
ea63328
Update certificate-policy.md
Mar 27, 2019
978b33c
Update certificate-policy.md
Mar 27, 2019
f913811
Update certificate-policy.md
Mar 27, 2019
029aa3e
Update certificate-policy.md
Mar 27, 2019
709780d
Update certificate-policy.md
Mar 27, 2019
48f9c01
Update certificate-policy.md
Mar 27, 2019
dc0f2b2
Add files via upload
Mar 28, 2019
c10657f
Delete U.S. Federal Public Trust TLS Certificate Policy_version_1_0_d…
Mar 28, 2019
01c49a1
Add files via upload
Mar 28, 2019
0875d7a
Update certificate-policy.md
Mar 28, 2019
9da4847
Update certificate-profile-OCSP-responder.md
Mar 28, 2019
0dc34c7
Update certificate-profile-root-CA.md
Mar 28, 2019
bcca6f3
Update certificate-profile-server-authentication.md
Mar 28, 2019
896728c
Update certificate-profile-subordinate-CA.md
Mar 28, 2019
bd7c640
Update crl-profile.md
Mar 28, 2019
aebb2bc
Add files via upload
Mar 28, 2019
8e047ec
Update certificate-policy.md
Mar 28, 2019
b3980e2
Add files via upload
Mar 28, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file not shown.
168 changes: 84 additions & 84 deletions certificate-policy.md

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion certificate-profile-OCSP-responder.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,4 +21,4 @@
| id-pkix-ocsp-nocheck {1.3.6.1.5.5.7.48.1.5} | Mandatory | False | Null |
| Extended Key Usage | Mandatory | True | **Required Extended Key Usage:** <br> id-kp-OCSPSigning {1.3.6.1.5.5.7.3.9} <br><br> **Prohibited Extended Key Usage:** <br> All others, including anyEKU EKU {2.5.29.37.0} |
| Certificate Policies | Mandatory | False | **Required Certificate Policy Fields:** <br>See Section 7.1.6.4. The certificate shall include all the certificate policy OIDs for all certificates issued by the CA and covered by the OCSP responses. <br><br>**Optional Certificate Policy Fields:** <br> certificatePolicies:policyQualifiers <br> policyQualifierId id-qt 1 <br> qualifier:cPSuri |
| Authority Information Access | Optional | False | **Required AIA Fields:** <br><br> **Id-ad-caIssuers** <br> Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} <br> All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC5272].
| Authority Information Access | Optional | False | **Required AIA Fields:** <br><br> **Id-ad-caIssuers** <br> Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} <br> All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC 5272].
2 changes: 1 addition & 1 deletion certificate-profile-root-CA.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@

| **Extension** | **Required** | **Critical** | **Value and Requirements** |
| :-------- | :----------------|:----------------|:----------------|
| subjectInfoAccess | Mandatory | False | id-ad-caRepository (1.3.6.1.5.5.7.48.5):<br>At least one instance of this access method shall be included. All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing a BER or DER encoded “certs-only” CMS message as specified in [RFC5272]. |
| subjectInfoAccess | Mandatory | False | id-ad-caRepository (1.3.6.1.5.5.7.48.5):<br>At least one instance of this access method shall be included. All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing a BER or DER encoded “certs-only” CMS message as specified in [RFC 5272]. |
| basicConstraints | Mandatory | True | cA=True <br> The pathLenConstraint field shall not be present. |
| subjectKeyIdentifier | Mandatory | False | Octet String <br> Derived using SHA-1 hash of the public key |
| keyUsage | Mandatory | True | Bit positions for keyCertSign and cRLSign shall be set. <br> If the Root CA Private Key is used for signing OCSP responses, then the digitalSignature bit shall also be set.|
4 changes: 2 additions & 2 deletions certificate-profile-server-authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ There are two (2) differences in the certificate profile implementations between
| **Field or Extension** | **Domain Validation** | **Organization Validation** |
| :-------- | :---: | :---: |
| Subject Identity Information | cn=\<one domain name>,c=US | cn=\<one domain name>,S=District of Columbia,O=U.S.Government,c=US |
| Certificate Policies | Asserts both the US Government and CAB Forum policy OIDs for Domain Validation | Asserts both the US Government and CAB Forum policy OIDs for Organization Validation |
| Certificate Policies | Asserts both the U.S. Government and CAB Forum policy OIDs for Domain Validation | Asserts both the U.S. Government and CAB Forum policy OIDs for Organization Validation |

Below is the full server authentication certificate profile with _all_ fields and extensions.

Expand All @@ -33,7 +33,7 @@ Below is the full server authentication certificate profile with _all_ fields an
| Extended Key Usage | Mandatory | False | **Required Extended Key Usage:** <br> Server Authentication id-kp-serverAuth {1.3.6.1.5.5.7.3.1} <br><br> **Optional Extended Key Usage:** <br> Client Authentication id-kp-clientAuth {1.3.6.1.5.5.7.3.2} <br> <br>**Prohibited Extended Key Usage:** <br> anyEKU EKU {2.5.29.37.0} <br> all others |
| Certificate Policies | Mandatory | False | **Required Certificate Policy Fields:** <br>See Section 7.1.6.4. One US Government certificate policy OID listed in Section 7.1.6.1 asserting compliance with this CP, and one CAB Forum certificate policy OID listed in Section 7.1.6.1 asserting compliance with the CAB Forum Baseline Requirements. <br><br>**Optional Certificate Policy Fields:** <br> certificatePolicies:policyQualifiers <br> policyQualifierId id-qt 1 <br> qualifier:cPSuri |
| Subject Alternative Name | Mandatory | False | This extension shall contain at least one entry. Each entry shall be a dNSName containing the Fully-Qualified Domain Name of a server. This extension shall not include any Internal Name values. <br> All entries shall be validated in accordance with Section 3.2.2.4. <br>Underscore characters (“_”) shall not be present in dNSName entries. |
| Authority Information Access | Mandatory | False | **Required AIA Fields:** <br> **OCSP** <br> Publicly accessible URI of Issuing CA's OCSP responder accessMethod = {1.3.6.1.5.5.7.48.1} <br><br> **Id-ad-caIssuers** <br> Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} <br> All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC5272]. |
| Authority Information Access | Mandatory | False | **Required AIA Fields:** <br> **OCSP** <br> Publicly accessible URI of Issuing CA's OCSP responder accessMethod = {1.3.6.1.5.5.7.48.1} <br><br> **Id-ad-caIssuers** <br> Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} <br> All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC 5272]. |
| CRL Distribution Points | Optional | False | If included, shall include at least one HTTP URI to the location of a publicly accessible, full and complete CRL. The reasons and cRLIssuer fields shall be omitted. |
| Private Extensions | Optional | False | Only extensions that have context for use on the public Internet are allowed. Private extensions must not cause interoperability issues. CA shall be aware of and defend reason for including in the certificate, and use of Private Extensions shall be approved by the FPKI Policy Authority. |
| Transparency Information | Optional | False | If included, shall include two or more SCTs or inclusion proofs. <br> From RFC 6962, contains one or more "TransItem" structures in a "TransItemList".|
4 changes: 2 additions & 2 deletions certificate-profile-subordinate-CA.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
| subjectKeyIdentifier | Mandatory | False | Octet String <br> Derived using SHA-1 hash of the public key |
| keyUsage | Mandatory | True | Bit positions for keyCertSign and cRLSign shall be set. <br> If the Subordinate CA Private Key is used for signing OCSP responses, then the digitalSignature bit shall also be set. |
| extkeyUsage | Mandatory | False | This extension is required for Technically Constrained Subordinate CAs per Section 7.1.5. <br> Required Extended Key Usage: <br> Server Authentication id-kp-serverAuth {1.3.6.1.5.5.7.3.1} <br><br> Optional Extended Key Usage: <br> Client Authentication id-kp-clientAuth {1.3.6.1.5.5.7.3.2} <br>id-kp-OCSPSigning {1.3.6.1.5.5.7.3.9} <br> Other values may be present consistent with use for server authentication, with approval by the FPKIPA. |
| certificatePolicies | Mandatory | False | See Section 7.1.6.3. At least one US Government certificate policy OID listed in Section 7.1.6.1 asserting compliance with this CP, and one CAB Forum certificate policy OID listed in Section 7.1.6.1 asserting compliance with the CAB Forum Baseline Requirements. The certificate shall include all the certificate policy OIDs for all certificates issued by the CA. |
| authorityInformationAccess | Mandatory | False | OCSP: <br> Publicly accessible URI of Issuing CA's OCSP responder accessMethod = {1.3.6.1.5.5.7.48.1} <br>At least one instance of the OCSP responder access method shall be included. All instances of this access method shall include the HTTP URI name form.<br><br> id-ad-caIssuers: <br> Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} <br> All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC5272]. |
| certificatePolicies | Mandatory | False | See Section 7.1.6.3. At least one U.S. Government certificate policy OID listed in Section 7.1.6.1 asserting compliance with this CP, and one CAB Forum certificate policy OID listed in Section 7.1.6.1 asserting compliance with the CAB Forum Baseline Requirements. The certificate shall include all the certificate policy OIDs for all certificates issued by the CA. |
| authorityInformationAccess | Mandatory | False | OCSP: <br> Publicly accessible URI of Issuing CA's OCSP responder accessMethod = {1.3.6.1.5.5.7.48.1} <br>At least one instance of the OCSP responder access method shall be included. All instances of this access method shall include the HTTP URI name form.<br><br> id-ad-caIssuers: <br> Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} <br> All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC 5272]. |
| cRLDistributionPoints | Mandatory | False | At least one instance shall be included and shall specify a HTTP URI to the location of a publicly accessible CRL. All URIs included shall be publicly accessible and shall specify the HTTP protocol only. The reasons and cRLIssuer fields shall be omitted. |
| nameConstraints | Mandatory | True | See Section 7.1.5. |
2 changes: 1 addition & 1 deletion crl-profile.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
| Issuer Distinguished Name | Distinguished Name of the CA Issuer |
| thisUpdate | Encoded as UTCTime for dates through 2049 and GeneralizedTime for dates thereafter <br> See Section 4.9.7 for publishing intervals. |
| nextUpdate | Encoded as UTCTime for dates through 2049 and GeneralizedTime for dates thereafter <br> See Section 4.9.7 for validity period intervals. |
| Revoked Certificates List | 0 or more 2-tuple of certificate serial number and revocation date (Expressed in UTCTime for dates until end of 2049 and GeneralizedTime for dates thereafter ) |
| Revoked Certificates List | 0 or more 2-tuple of certificate serial number and revocation date (Expressed in UTCTime for dates until end of 2049 and GeneralizedTime for dates thereafter) |
| Issuer Signature | sha256 WithRSAEncryption {1 2 840 113549 1 1 11} |


Expand Down