Support for Open Standards
21
three times as long as the key for standard DES. Because the key size is so large, there are
approximately 3.7 * 10^50 possible keys. This cipher suite is FIPS-compliant.
•
RC4 and RC2 and MD5 Message Authentication
. The RC4 and RC2 ciphers have 128-bit
encryption, which permits approximately 3.4 * 10^38 possible keys. This makes RC4 or RC2 keys
very difficult to crack. RC4 ciphers are faster than RC2 ciphers.
RC4 can use SHA-1 message authentication as well as MD5 message authentication.
•
DES and SHA-1 Message Authentication
. DES 56-bit encryption permits approximately 7.2
* 10^16 possible keys. This cipher suite is no longer FIPS-compliant because it is too weak
cryptographically.
1.5. Support for Open Standards
This section lists the standard message formats and protocols supported by the Certificate System.
1.5.1. Certificate Management Formats and Protocols
The Certificate System supports the following certificate management formats and protocols. For more
details about the proposed PKIX standards listed here, see
http://www.ietf.org/html.charters/pkix-
charter.html
under
Internet Drafts
.
•
Certificate Request Message Format (CRMF).
A message format to send a certificate request to a
CA. A standard from the Internet Engineering Task Force (IETF) PKIX working group.
•
Certificate Management Message Formats (CMMF).
Message formats to send certificate requests
and revocation requests from end entities to a CA and to return information to end entities. A
proposed standard from the IETF PKIX working group. CMMF has been subsumed by another
standard, CMC.
•
Certificate Management Messages over CS (CMC).
A general interface to public-key certification
products based on CS and PKCS #10, including a certificate enrollment protocol for RSA-signed
certificates with Diffie-Hellman public-keys. A standard from the IETF PKIX working group. CMC
incorporates CRMF and CMMF.
•
Cryptographic Message Syntax (CS).
A superset of PKCS #7 syntax used for digital signatures and
encryption. A proposed standard from the IETF PKIX working group.
•
PKIX Certificate and CRL Profile (PKIX Part 1).
The first part of the four-part standard under
development by the IETF for a public-key infrastructure for the Internet. Part 1 specified standards
for certificates and CRLs. Certificate System will support the other PKIX parts as they are finalized.
For more information about PKIX Part 1, see
ftp://ftp.isi.edu/in-notes/rfc2459.txt
.
1.5.2. Security and Directory Protocols
The Certificate System supports the following security and directory protocols:
•
FIPS PUBS 140-1.
Federal Information Standards Publications (FIPS PUBS) 140-1 is a US
government standard for implementing cryptographic modules such as hardware or software
Содержание CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 7 3 Administration Guide Publication date May 2007 updated March 25 2010 ...
Страница 15: ...xv Index 525 ...
Страница 16: ...xvi ...
Страница 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Страница 154: ...132 ...
Страница 194: ...172 ...
Страница 238: ...216 ...
Страница 244: ...222 ...
Страница 246: ...224 ...
Страница 286: ...264 ...
Страница 292: ...270 ...
Страница 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Страница 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Страница 371: ...Configuring Mappers 349 Figure 15 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 398: ...376 ...
Страница 412: ...390 ...
Страница 472: ...450 ...
Страница 500: ...Appendix A Certificate and CRL Extensions 478 Parameter namen Table A 8 IssuerAlternativeName Configuration Parameters ...
Страница 506: ...484 ...
Страница 528: ...506 ...
Страница 546: ...524 ...