Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

It is crucial to have a trust anchor for all issued client certificates which is stable on the long-term. To that end, an offline hardware-backed CA is provisioned and kept in a physically safe position in GEANT property (TBD: where exactly is it stored, access controls to physical location). The CA itself is created with the CA generation script publicly available on GitHub.

...

The result of this set of commands are the files needed for CA operation:

TechnologyCertificateContains Private Key?CRLOCSPNeeded where?
RSAROOT-RSA/cacert.pem
ROOT-RSA/crl.der // ROOT-RSA/crl.pemROOT-RSA/OCSP/<serial>.response.derRADIUS servers: trust root for chain validation

ROOT-RSA/certs/N.N./cert-rsa.pemX

RADIUS servers: trust chain building (certificate only)

web interface: certificate and OCSP issuance (certificate + private key)

ECDSAROOT-ECDSA/cacert.pem
ROOT-ECDSA/crl.der // ROOT-ECDSA/crl.pemROOT-RSA/OCSP/<serial>.response.derRADIUS servers: trust root for chain validation

ROOT-ECDSA/certs/N.N./cert-ecdsa.pemX

RADIUS servers: trust chain building (certificate only)

web interface: certificate and OCSP issuance (certificate + private key)

All of these files, but no others, are copied out of the CA environment for further use in operations (e.g. onto a USB stick).

...