1. Trang chủ >
  2. Công Nghệ Thông Tin >
  3. An ninh - Bảo mật >

Appendix E. Certificate import/export interoperability tests

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (9.81 MB, 506 trang )


• S/390 V2R10 GSKYMAN->OS/400 DCM V5R1

We exported a certificate signed by a well-known CA as a PKCS12 file.

We moved the file via FTP with binary format. Once imported, the

certificate kept its original label.

• PCOM 4.3 or CA express IKEYMAN->OS/400 DCM V4R5

We exported a certificate signed by a well-known CA as a PKCS12 file.

We moved the file via FTP with binary format. Once imported, the

certificate kept its original label.

• PCOM 4.3 or CA express IKEYMAN->AS/400 DCM V5R1

We exported a certificate signed by a well-known CA as a PKCS12 file.

We moved the file via FTP with binary format. Once imported, the

certificate kept its original label.

• PCOM 5.0 or CA express V5R1 IKEYMAN->AS/400 DCM V4R5

We had to transport the whole key database file (file.kdb) via FTP in binary

format, and then open it with the DCM. We were then able to manage the

certificate and eventually export it to a file and import it into the *SYSTEM

certificate store.

• PCOM 5.0 or CA express V5R1 IKEYMAN->AS/400 DCM V5R1

We exported a certificate signed by a well-known CA as a PKCS12 file

and chose the weak encryption. We moved the file via FTP with binary

format. Once imported, the certificate kept its original label.



E.2 Export interoperability test results

The following list shows the results when we exported certificates from the

OS/400 DCM *SYSTEM certificate store and imported them on another

platform:

• AS/400 DCM V5R1->AIX 4.33 SNAKEYMAN

We had to transport the whole key database file (file.kdb) via FTP in binary

format, and then open it with the SNAKEYMAN. We were then able to

manage the certificate.

• AS/400 DCM V5R1->S/390 V2R1 GSKYMAN

We had to create the certificate without extensions (subject alternative

names) and export it by selecting V4R5 or V4R4 as the target release.

That means that the GSKYMAN V2R1 supports PKCS#12 V1.



448



iSeries Wired Network Security



• AS/400 DCM V5R1->S/390 V2R1 RACDCERT

We had to export the certificate by selecting V5R1 as the target release.

That means that the RACF Digital Certificate V2R1 supports PKCS#12

V3. We were able to import the certificate with the subject alternative

names, but we could not display them.

• AS/400 DCM V5R1->PCOM 4.3 or CA express

We had to export the certificate by selecting V4R5 or V4R4 as the target

release. That meant that its IKEYMAN product supported PKCS#12 V1.

• AS/400 DCM V5R1->PCOM 5.0 or CA V5R1

We had to export the certificate by selecting V4R5 or V4R4 as the target

release. That meant that its IKEYMAN product supported PKCS#12 V1.

The import operation was successfully completed, but we were not able to

display or manage the certificate under the list of personal certificates.



Appendix E. Certificate import/export interoperability tests



449



450



iSeries Wired Network Security



Appendix F. Publishing a CRL to an OS/400 LDAP server

In OS/400 V5R1, the Certificate Revocation List (CRL) support provides

certificate validation by accessing a CRL located on a Certificate Authority’s

Lightweight Directory Access Protocol (LDAP) server. For fast connections

from your iSeries or AS/400 server to the CA’s server, the CRL checking

usually does not have a large impact on performance, for example, during the

SSL handshake. But when using slow connections or when network

congestions occur, the CRL checking via the CA’s LDAP server can introduce

delays. For this reason you may want to replicate the CA’s CRL to a local

LDAP server hosted on the iSeries or AS/400 server. This appendix describes

the necessary steps to set up the LDAP server environment on the iSeries or

AS/400 server. It also contains the required steps to publish a CRL to a local

LDAP server. OS/400 operating system, DCM, and basic LDAP knowledge is

assumed.



F.1 Planning

Before you start with the actual implementation, you need to gather certain

information. First, you need to find out how your CA publishes CRLs. This

varies depending on the CA. Some CAs make the CRLs available for

download on their Web sites. For example, VeriSign CRLs can be

downloaded from http://crl.verisign.com. Some other CAs will allow you to

transfer CRLs using FTP. Once you know how to obtain the CRL, you need to

find out how often the CRL will be updated by the CA. Even if a CRL contains

information when the next CRL will be published, you have no easy access to

this information without writing your own applications. Note that the CRL has

to be in binary format (Distinguished Encoding Rule or DER format).

In the second step you need to find out whether the certificates issued by this

CA contain CRL Distribution Point extensions. CRL Distribution Points define

the search path within the LDAP directory for finding the CRL. If the CA does

not support CRL Distribution Points, the default search path is the certificate

issuer’s distinguished name (DN). To find out what the issuer’s DN is, you can

use the Digital Certificate Manager (DCM) and display, for example, a server

certificate as shown in Figure 332 on page 452.



© Copyright IBM Corp. 2001



451



Figure 332. Issuer’s DN



In this example, the issuer’s DN information in X.509 format would be:

CN=ITSO Raleigh Root CA, OU=iSeries ITSO (T.Barlen), O=IBM, C=US



Later in this appendix, when setting up the LDAP server, you need this

information. Remember, when CRL Distribution Points are used, you have to

use the information that they provide.



F.2 Configuration summary

The following list summarizes the steps required to use a local LDAP server

for CRL checking:

1. Perform the basic configuration of the LDAP server.

2. Add the DN attributes for the CRL directory path to the LDAP directory and

change the attribute settings to allow anonymous access to the CRL data.

3. Obtain the CRL from the CA.

4. Publish the CRL to the local LDAP server.

5. Define a CRL location in DCM.

6. Assign the CRL location to the CA certificate.

7. Change the DCM application definitions to perform CRL checking.

8. Update the CRLs regularly.



F.3 Configuring the LDAP server

The LDAP server configuration is performed by using the Operations

Navigator. In this scenario we used the wizard to perform the basic setup.



452



iSeries Wired Network Security



Xem Thêm
Tải bản đầy đủ (.pdf) (506 trang)

×