Hi Martin:

On Thursday 23 November 2006 16:46, Martín Coco wrote:
> Hi,
>
> We're in the process of designing a PKI infrastracture for our company,
> and I have a couple of design questions about it. I know this is an
> OpenSSL mailing list, but it seems a right place to discuss this. If
> it's not, I'll appreciate if you can hand me some links to a more proper
> place.
>
> I've been reading the man for OpenSSL, this mailing list, and also
> acquired the book "Planning for PKI".
>
> My main goal is to design a PKI for our server infrastructure (ldaps,
> https, mail, vpn, etc.) The problem is that, for example, when reading
> the mentioned book, all the examples are based on people, but not on

Ok - when you are designing the infrastructure, the question to ask is what 
are you putting in place strong authentication for? 

The reason that the books tend to focus on people, is that the usual business 
problem that companies have is identifying an individual via a strong 
mechanism. This means that they want the credential tied strongly to the 
individual. So, they write their Certificate Policy to indicate what hoops 
people have to go through to get a certificate. This means that and when a 
user presents this certificate, either to another user, or to a service such 
as a portal, or use it to set up a VPN, then it is possible to say with a 
high level of certainty, that it really is that user that is signing that 
document, accessing that portal, or establishing the VPN. 

The same is principle is true of servers - so when you are issuing 
certificates to servers, it is because you don't trust that your DNS records 
cannot be corrupted (for instance), and so you need another mechanism so that 
users know that it is really a given server that they are accessing.

I personally have never seen a structure that was broken down by type. I have 
seen structures that were broken down by country (since jurisdictions have 
different rules for how PKI works), by assurance level (so, a High assurance 
level had a CA and repository that were in a cage guarded by guys with guns 
etc., and a rudimentary level had a CA that was shoved under someone's desk). 
I have also seen them broken down by "partner facing" - i.e. this CA is going 
to be cross certified with someone else, and "internal only". 

Usually, the best advice we give clients is keep the numbers of CA down to the 
absolute minimum that will satisfy your legal and audit requirements. So, if 
you have a single assurance level, a single jurisdiction, and a single 
customer base, then probably a root and a single subordinate could do. 
However, it will all depend on the legal, jurisdictional, and security 
environment in which you are operating.

<snip>
> Also, if a person connecting to one of these servers were to
> authenticate it, it should have the subCA's certificate and the root CA
> certificate to validate the certification path, right? That would mean
> that every person should have a certificate for each subCA or service
> they want to check, and the root CA. Is this correct?
>
Actually, since the Root CA is your ultimate "Trust Anchor", it is probably 
sufficient for users and servers to have that trust anchor in their trusted 
path.

> How does all this sound to you? Whenever I try to look for examples, all
> I find is based on people, or very specific examples.
>
> I'll appreciate any comments on this.
>
> Thanks,
> Martín.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]

-- 
Patrick Patterson
President and Chief PKI Architect
Carillon Information Security Inc.
http://www.carillon.ca
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to