IT Certifying Authority Regulations 2001
IT Certifying Authority Regulations 2001
JULY 2001
lR;eso t;rs
(i) The Certifying Authority shall use methods, which are approved by the
Controller, to verify the identity of a subscriber before issuing or renewing
any Public Key Certificate.
(j) The Certifying Authority shall publish a notice of suspension or revocation
of any certificate in the Certificate Revocation List in its repository
immediately after receiving an authorised request of such suspension or
revocation.
(k) The Certifying Authority shall always assure the confidentiality of subscriber
information.
(l) All changes in Certificate Policy and certification practice statement shall be
published on the web site of the Certifying Authority and brought to the
notice of the Controller well in advance of such publication. However any
change shall not contravene any provision of the Act, rule or regulation or
made there under.
(m) The Certifying Authority shall comply with every order or direction issued by
the Controller within the stipulated period.
(ii) Overall Management and Obligations-
(a) The Certifying Authority shall manage its functions in accordance with the
levels of integrity and security approved by the Controller from time to time.
(b) The Certifying Authority shall disclose information on the assurance levels
of the certificates that it issues and the limitations of its liabilities to each
of its subscribers and relying parties.
(c) The Certifying Authority shall as approved, in respect of security and risk
management controls continuously ensure that security policies and
safeguards are in place. Such controls include personnel security and incident
handling measures to prevent fraud and security breaches.
(iii) Certificate and Key Management-
(a) To ensure the integrity of its digital certificates, the Certifying Authority shall
ensure the use of approved security controls in the certificate management
processes, i.e. certificate registration, generation, issuance, publication,
renewal, suspension, revocation and archival.
(b) The method of verification of the identity of the applicant of a Public Key
Certificates shall be commensurate with the level of assurance accorded to
the certificate.
(c) The Certifying Authority shall ensure the continued accessibility and
availability of its Public Key Certificates and Certificate Revocation Lists in
its repository to its subscribers and relying parties.
166
(d) In the event of a compromise of the private key the Certifying Authority shall
follow the established procedures for immediate revocation of the affected
subscribers’ certificates.
(e) The Certifying Authority shall make available the information relating to
certificates issued and/or revoked by it to the Controller for inclusion in the
National Repository.
(f) The private key of the Certifying Authority shall be adequately secured at
each phase of its life cycle, i.e. key generation, distribution, storage, usage,
backup, archival and destruction.
(g) The private key of the Certifying Authority shall be stored in high security
module in accordance with FIPS 140-1 level 3 recommendations for
Cryptographic Modules Validation List.
(h) Continued availability of the private key be ensured through approved backup
measures in the event of loss or corruption of its private key.
(i) All submissions of Public Key Certificates and Certificate Revocation Lists
to the National Repository of the Controller must ensure that subscribers and
relying parties are able to access the National Repository using LDAP ver
3 for X.500 Directories.
(j) The Certifying Authority shall ensure that the subscriber can verify the
Certifying Authority’s Public Key Certificate, if he chooses to do so, by having
access to the Public Key Certificate of the Controller.
(iv) Systems and Operations-
(a) The Certifying Authority shall prepare detailed manuals for performing all its
activities and shall scrupulously adhere to them.
(b) Approved access and integrity controls such as intrusion detection, virus
scanning, prevention of denial-of service attacks and physical security
measures shall be followed by the Certifying Authority for all its systems that
store and process the subscribers’ information and certificates.
(c) The Certifying Authority shall maintain records of all activities and review
them regularly to detect any anomaly in the system.
(v) Physical, procedural and personnel security-
(a) Every Certifying Authority shall get an independent periodic audit done
through an approved auditor. Such periodic audits shall focus on the following
issues among others :-
167
Policy Mappings
{
Issuer Domain Policy
Subject Domain Policy
}
Subject Alternative Name
{
General Name
{
Other Name
{
type-id
value
}
Rfc822Name
DNS Name
X400 Address
Directory Name
edi Party Name
{
Name Assigner optional,
Party Name
}
Uniform Resource Identifier
IP Address
Registered ID
}
}
Issuer Alternative Names
Subject Directory Attributes
Basic Constraints
{
cA
path Len Constraint optional
}
Name Constraints
{
Permitted Subtrees optional
173
Cessation Of Operation
Certificate Hold
}
cRL Issuer optional
}
Authority Information Access
{
Authority Information Access Syntax
Access Description
{
Access Method
Access Location
}
}
Signature Algorithm
Signature Value
}
(i) Certificate
TBSCertificate is certificate “to be signed”. The field contains the names of the
subject and issuer, a public key associated with the subject, a validity period, and other
associated information. The fields are described in detail.
(ii) Version
This field describes the version of the encoded certificate. When extensions are
used, as expected in this profile, use X.509 version 3(value is 2). If no extensions are
present, but a Unique Identifier is present, use version 2 (value is 1). If only basic fields
are present, use version 1 (the value is omitted from the certificate as the default value).
(iii) Serial number
The serial number is an integer assigned by the Certifying Authority to each
certificate. It shall be unique for each certificate issued by a given Certifying Authority
(i.e., the issuer name and serial number identify a unique certificate).
(iv) Signature
This field contains the algorithm identifier for the algorithm used by the Certifying
Authority to sign the certificate.
175
(v) Issuer
The issuer field identifies the entity who has signed and issued the certificate. The
issuer field shall contain a non-empty distinguished name.
(vi) Validity
The certificate validity period is the time interval during which the Certifying
Authority warrants that it will maintain information about the status of the certificate.
(vii) Subject
The subject field identifies the entity associated with the public key stored in the
subject public key field. The subject name may be carried in the subject field and/or the
subjectAltName extension. If the subject is a Certifying Authority (e.g., the basic
constraints extension, is present and the value of cA is TRUE,) then the subject field
shall be populated with a non-empty distinguished name matching the contents of the
issuer field in all certificates issued by the subject Certifying Authority.
(viii) Subject Public Key Information
This field is used to carry the public key and identify the algorithm with which the
key is used.
(ix) Unique Identifiers
These fields may only appear if the version is 2 or 3. The subject and issuer
unique identifiers are present in the certificate to handle the possibility of reuse of subject
and/or issuer names over time.
(x) Extensions
This field may only appear if the version is 3. The extensions defined for X.509
v3 certificates provide methods for associating additional attributes with users or public
keys and for managing the certification hierarchy. The X.509 v3 certificate format also
allows communities to define private extensions to carry information unique to those
communities. If present, this field is a sequence of one or more certificate extensions.
The content of certificate extensions in the Internet Public Key Infrastructure is defined
as follows, namely:-.
(a) Authority Key Identifier
The authority key identifier extension provides a means of identifying the
public key corresponding to the private key used to sign a certificate. This
extension is used where an issuer has multiple signing keys (either due to
multiple concurrent key pairs or due to changeover). The identification may
176
be based on either the key identifier (the subject key identifier in the issuer’s
certificate) or on the issuer name and serial number.
(b) Subject Key Identifier
The subject key identifier extension provides a means of identifying
certificates that contain a particular public key.
(c) Key Usage
The key usage extension defines the purpose (e.g., encipherment, signature,
certificate signing) of the key contained in the certificate. The usage restriction
might be employed when a key that could be used for more than one
operation is to be restricted. For example, when an RSA key should be used
only for signing, the digital Signature and/or non-Repudiation bits would be
asserted. Likewise, when an RSA key should be used only for key
management, the key Encipherment bit would be asserted.
(d) Private Key Usage Period
The private key usage period extension allows the certificate issuer to specify
a different validity period for the private key than the certificate. This
extension is intended for use with digital signature keys. This extension
consists of two optional components, not Before and not After. (This profile
recommends against the use of this extension. Certifying Authorities
conforming to this profile MUST NOT generate certificates with critical private
key usage period extensions.)
(e) Certificate Policies
The certificate policies extension contains a sequence of one or more policy
information terms, each of which consists of an object identifier and optional
qualifiers. These policy information terms indicate the policy under which the
certificate has been issued and the purposes for which the certificate may
be used. Optional qualifiers, which may be present, are not expected to
change the definition of the policy.
(f) Policy Mappings
This extension is used in Certifying Authority certificates. It lists one or more
pairs of object identifiers; each pair includes an issuer Domain Policy and
a subject Domain Policy. The pairing indicates the issuing Certifying Authority
considers its issuer Domain Policy equivalent to the subject Certifying
Authority’s subject Domain Policy.
177
User Certificate
Revocation Date
Certificate Revocation List Entry Extensions
{
Reason Code
{
Unspecified
Key Compromise
CA Compromise
Affiliation Changed
Superseded
Cessation Of Operation
Certificate Hold
Remove From Certificate Revocation List
}
Hold Instruction Code
Invalidity Date
Certificate Issuer
} optional
Certificate Revocation List Extensions
{
Authority Key Identifier
Issuer Alternative Name
Certificate Revocation List Number
Delta Certificate Revocation List Indicator
Issuing Distribution Point
{
Distribution Point
Only Contains User Certs
Only Contains CA Certs
Only Some Reasons
Indirect Certificate Revocation List
}
} optional
Signature Algorithm
Signature Value
}
180
(i) tbsCertList
The certificate list to be signed, or TBSCertList, is a sequence of required and
optional fields. The required fields identify the Certificate Revocation List issuer, the
algorithm used to sign the Certificate Revocation List, the date and time the Certificate
Revocation List was issued, and the date and time by which the Certifying Authority will
issue the next Certificate Revocation List.
Optional fields include lists of revoked certificates and Certificate Revocation List
extensions. The Revoked Certificate List is optional to support the case where a
Certifying Authority has not revoked any unexpired certificates that it has issued. The
profile requires conforming Certifying Authorities to use the Certificate Revocation List
extension cRLNumber in all Certificate Revocation Lists issued.
The first field in the sequence is the tbsCertList. This field is itself a sequence
containing the name of the issuer, issue date, issue date of the next list, the list of
revoked certificates, and optional Certificate Revocation List extensions. Further, each
entry on the revoked certificate list is defined by a sequence of user certificate serial
number, revocation date, and optional Certificate Revocation List entry extensions. The
fields are described in detail, as follows namely:-
(ii) Version
This optional field describes the version of the encoded Certificate Revocation List.
When extensions are used, as required by this profile, this field MUST be present and
MUST specify version 2 (the integer value is 1).
(iii) Signature
This field contains the algorithm identifier for the algorithm used to sign the
Certificate Revocation List. This field shall contain the same algorithm identifier as the
signature Algorithm field in the sequence Certificate List.
(iv) Issuer Name
The issuer name identifies the entity who has signed and issued the Certificate
Revocation List. The issuer identity is carried in the issuer name field. Alternative name
forms may also appear in the issuer Alternate Name extension. The issuer name field
MUST contain an X.500 distinguished name (DN). The issuer name field is defined as
the X.501 type Name, and MUST follow the encoding rules for the issuer name field in
the certificate.
(v) This Update
This field indicates the issue date of this Certificate Revocation List. This Update
may be encoded as UTC Time or Generalized Time. Certifying Authorities conforming
181
to this profile that issue Certificate Revocation Lists MUST encode This Update as
UTCTime for dates through the year 2049. Certifying Authorities conforming to this profile
that issue Certificate Revocation Lists MUST encode This Update as Generalized Time
for dates in the year 2050 or later.
(vi) Next Update
This field indicates the date by which the next Certificate Revocation List will be
issued. The next Certificate Revocation List could be issued before the indicated date,
but it will not be issued any later than the indicated date. Certifying Authorities should
issue Certificate Revocation Lists with a Next Update time equal to or later than all
previous Certificate Revocation Lists. Next Update may be encoded as UTCTime or
GeneralizedTime.
(vii) Revoked Certificates
Revoked certificates are listed. The revoked certificates are named by their serial
numbers. Certificates revoked by the Certifying Authority are uniquely identified by the
certificate serial number. The date on which the revocation occurred is specified.
Additional information may be supplied in Certificate Revocation List entry extensions;
(viii) CRL Entry Extensions
The Certificate Revocation List entry extensions already defined by American
National Standards Institute X9 and International Standards Organisation /IEC /
International Telecommunication Union for X.509 v2 Certificate Revocation Lists provide
methods for associating additional attributes with Certificate Revocation List entries
[X.509] [X9.55]. The X.509 v2 Certificate Revocation List format also allows communities
to define private Certificate Revocation List entry extensions to carry information unique
to those communities. All Certificate Revocation List entry extensions used in this
specification are non-critical.
(a) Reason Code
The reason Code is a non-critical Certificate Revocation List entry extension
that identifies the reason for the certificate revocation. Certifying Authorities
are strongly encouraged to include meaningful reason codes in Certificate
Revocation List entries; however, the reason code Certificate Revocation List
entry extension should be absent instead of using the unspecified (0) Reason
Code value.
(b) Hold Instruction Code
The hold instruction code is a non-critical Certificate Revocation List entry
extension that provides a registered instruction identifier, which indicates the
182
(2) The list of standards specified in sub-regulation (1) shall be updated at least once
a year to include new standards that may emerge from the international bodies.
In addition, if any Certifying Authority or a group of Certifying Authorities brings
a set of standards to the Controller for a specific user community, the Controller
shall examine the same and respond to them within ninety days.
5. (1) Every Certifying Authority shall disclose :-
(a) its Digital Signature Certificate which contains the public key
corresponding to the private key used by that Certifying Authority to
digitally sign another Digital Signature Certificate;
(b) any Certification Practice Statement relevant thereto;
(c) notice of the revocation or suspension of its Certifying Authority
Certificate, if any; and
(d) any other fact that materially or adversely affect either the reliability of
a Digital Signature Certificate, which that Authority has issued by it or
the Authority’s ability to perform its services
(2) The above disclosure shall be made available to the Controller through filling
up of online forms on the Web site of the Controller on the date and time
the information is made public. The Certifying Authority shall digitally sign the
information.
6. Communication of compromise of Private Key.-
(1) Where the private key corresponding to the public key listed in the Digital
Signature Certificate has been compromised, the subscriber shall
communicate the same without any delay to the Certifying Authority.
(2) An application for revocation of the key pair shall made in Form online on
the web site of the concerned Certifying Authority to enable revocation and
publication in the Certificate Revocation List. The Subscriber shall encrypt this
transaction by using the public key of the Certifying Authority. The transaction
shall be further authenticated with the private key of the subscriber even
though it may have already been compromised.
FORM
[See Regulation 6]
Communication of compromise of Private Key
___________________________________________