Skip to content

Commit

Permalink
[2024-07-10 13:56:48] Ashley Setter: Certificate Lifecycle
Browse files Browse the repository at this point in the history
[2024-07-10 13:56:48] Ashley Setter: Certificate Lifecycle
[2024-07-10 13:56:48] Ashley Setter: Certificate Lifecycle
[2024-07-10 13:56:48] Ashley Setter: Certificate Lifecycle
  • Loading branch information
anthonymccaigue committed Jul 10, 2024
1 parent 7cc8cd4 commit 99545cb
Showing 1 changed file with 25 additions and 24 deletions.
49 changes: 25 additions & 24 deletions packages/docusaurus/docs/build5-docs/22-certificates.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,25 +97,24 @@ According to the specification, the registrar

> is element of the network domain that it will belong to and that will perform its bootstrap
It is best to conceive of it as the part of the network (domain) which provides a method the device of logically joining the network (domain)

The `registrar` is signed by the `domain`



**Creation**

Practically, for this build, the domain and registrar are co-located, so the creation process can be simplified.

1. [@ REGISTRAR] create a public private keIn a real deployment, where the registrar and domain are not in a 1:1 relationship, we need to consider how the registrars certificates are deployed.
It is best to conceive of it as the part of the network (domain) which provides a method **Creation**
Practically, for this build, the domain and registrar are co-located, so the creation process can be simplified.
1. [@ REGISTRAR] create a public private key pair
2. [@ REGISTRAR] create CSR
3. [@ DOMAIN] sign CSR with domain private key and create registrar X509
In a real deployment, where the registrar and domain are not in a 1:1 relationship, we need to consider how the registrars certificates are deployed.

This could end up looking very like the BRSKI provisioning process

The process should be in infrequent setup process

This could| X509 Attribute | Description/use |
| X509 Attribute | Description/use |
| -------------------------- | ------------------------------ |
| `Subject` | C = IE, CN = registrar-tls-meta |
| `Subject Key Identifier` | Public key of the `registrar+` |
| `Issuer` | C = IE, CN = registrar-tls-ca |
| `Authority Key Identifier` | Public key of the `domain+` |
| (signed by) | Private key of the `domain-` |entifier` | Public key of the `domain+` |
| (signed by) | Private key of the `domain-` |` |entifier` | Public key of the `domain+` |
| (signed by) | Private key of the `domain-` |


Expand Down Expand Up @@ -206,14 +205,16 @@ Simplified

4. [@ REGISTRAR] add the SSID identifier to the CSR

5. [@ REGISTRAR] signs the LDevID with the registrar- private key (where in turn the registrar has been signed with the domain-)

6. [-> DEVICE] send certificate back to device

7. [@ DEVICE] install LDevID





| X509 Attribute | Description/use
5. [@ REGISTRAR] si
| X509 Attribute | Description/use |
| -------------------------- | ------------------------------------------------------------ |
| `Subject` | Name of connection (optional)<br />CN="SSID of network"<br />OU="model name" |
| `Subject Key Identifier` | Public key of the `iDevID+` |
| `Issuer` | Name of the registrar??<br /> |
| `Authority Key Identifier` | Public key of the `registrar+` |
| (signed by) | Private key of the `registrar-` |
### Use of LDevID certificate
LDevID is created in the EST enrol stage of the BRSKI flow
LDevID is signed by registrar

LDeviD is presented by the device as its EAP-TLS certificate when attempting to connect to the operational network.

0 comments on commit 99545cb

Please sign in to comment.