Non-profit, member-based IT support for research & educational institutions


Scenario for Certificate Authority Infrastructure & Policy

Georgia Institute of Technology


June 8, 2001 (Version 3.1)

By: John Douglass SSS III, O&E Campus Services
(john.douglass@oit.gatech.edu)

Herbert Baines, Director Information Security
(herbert.baines@oit.gatech.edu)

Ron Hutchins, Director OIT Engineering
(ron.hutchins@oit.gatech.edu) <

Institution: Georgia Institute of Technology

The purpose of this document is to inform other CREN institutions of the progress of Georgia Tech's Certificate Authority Pilot Project. The Georgia Tech CA project is constantly evolving as research into this complex technology continues.

Georgia Tech has decided to begin service development with this technology utilizing a self-signed certificate as it's Root. This allows us the maximum flexibility in experimentation while still retaining the ability to use this technology to solve some of our more pressing problems like remote access and secured authentication. The CREN based chain of trust will be incorporated in future phases of the CA project once we get some hard "lessons learned" through experimentation in our pilot phases.

Certificates can facilitate S/MIME encryption, digital signatures, non-repudiation, authorization, authentication, and session encryption. However, with the abilities of S/MIME encryption, digital signatures, and non-repudiation come problems related to private key escrow for individuals due to requirements of federal and state laws, as well as institution policies.

Without those abilities, you are left with three very valuable immediate capabilities of certificates: authentication, authorization, and session encryption. With the increase in today's mobile population and the need to protect and access information, the solution around many of our necessary host-based security restrictions will be the use of certificates.

Our Phase II CA model is based on the development of two types of personal certificates: Affiliate and Identity certificates. No CRL will be published as we feel the certificates' limited lifetimes will be adequate in protecting our resources.

Affiliate certificates will be used to access web sites and services that do not care who you are, but that you are a student, faculty, or staff of Georgia Tech. They are considered to be "anonymous" certificates to the outside world. If necessary, the CA will have the ability to determine certificate ownership in the event of abuse. Identity certificates will be used to access web sites and services that do care who you are. These certificates are encoded with information that allows the web server to authenticate you based upon your name, department, userid, etc.

The Institute is also in need of a way to generate our own server certificates as cost (as always) is a factor for educational institutions. This capability will be included in this phase of our CA Pilot Project.

The CA services are being developed in house utilizing open source resources (OpenSSL, ModSSL, PERL) and will be initially geared torward the Netscape browser as it's certificate processing is more robust than MS Internet Explorer. IE will be developed at a later date.

The first projects slated for certificate usage includes web related authorization (such as JSTOR and current GT web sites protected via host-based methods) and future phases of our LAWN (Local Area Wireless Network) pilot project. VPN solutions requiring certificates are also under investigation now that we have a viable pilot.