Profiling Use of PKI in IPSEC (pki4ipsec) ----------------------------------------- Charter Last Modified: 2007-03-22 Current Status: Active Working Group Chair(s): Paul Knight Gregory Lebovitz Security Area Director(s): William Polk Sam Hartman Security Area Advisor: TBD Mailing Lists: General Discussion:pki4ipsec@icsalabs.com To Subscribe: http://honor.icsalabs.com/mailman/listinfo/pki4ipsec In Body: (un)subscribe Archive: http://honor.icsalabs.com/mailman/listinfo/pki4ipsec Description of Working Group: IPsec has been standardized for over 5 years, and the use of X.509 certificates have been specified within the IPsec standards for the same time. However, very few IPsec deployments use certificates. One reason is the lack of a clear description of how X.509 certificates should be used with IPsec. Another is the lack of a simple, scalable, and clearly specified way for IPsec systems to obtain certificates and perform other certificate lifecycle operations with PKI systems. THE WG WILL DELIVER: 1) A standards-track document that gives specific instructions on how X.509 certificates should be handled with respect to the IKEv1 and IKEv2 protocols. This document will include a certificate profile, addressing which fields in the certificate should have which values and how those values should be handled. This effort is the WG's primary priority. 2) An informational document identifying and describing requirements for a profile of a certificate management protocol to handle PKI enrolment as well as certificate lifecycle interactions between IPsec VPN systems and PKI systems. Enrolment is defined as certificate request and retrieval. Certificate lifecycle interactions is defined as certificate renewals/changes, evocation, validation, and repository lookups. These requirements will be designed so that they meet the needs of enterprise scale IPsec VPN deployments. Once the above to items enter WG last call, we will begin work on: 3) A standards-track document describing a detailed profile of the CMC (Certificate Management Messages over CMS protocol, RFC 2797 at this writing) that meets the requirements laid out in the requirements document. Profile documents for other enrolment and/or management protocols may also be created. SCOPE The working group will focus on the needs of enterprise scale IPsec VPN deployments. Gateway-to-gateway access (tunnel and transport mode) and end-user remote access to a gateway (either tunnel or transport mode) are both in scope. NON-GOALS User-to-user IPsec connections will be considered, but are not explicitly in scope. We will consider the requirements for this scenario only until doing so significantly slows the progress of the explicitly scoped items, at which point it will be dropped. Specification of communications between an IPsec administrative function and IPsec systems is explicitly out of scope. Purely PKI to PKI issues will not be addressed. Cross-certification will not be addressed. Long term non-repudiation will also not be addressed. Goals and Milestones: Done Post Certificate Profile and Use in IKE as an Internet Draft Done Post Management Protocol Profile Requirements as I-D Done Rev Requirements for management protocol profile as needed Done Submit Certificate Profile and Use in IKE as WG last call Done Submit Requirements for Management protocol Profile to IESG, Informational Done Submit Certificate Profile and Use to IESG, Proposed Standard Done Submit Requirements for Management Protocol Profile as WG last call Apr 2007 Close WG Internet-Drafts: Posted Revised I-D Title ------ ------- -------------------------------------------- Jun 2004 Feb 2007 The Internet IP Security PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX Request For Comments: None to date.