Abstract
An enterprise (such as an institute of higher education) wishing to deploy a PKI must choose between several options, all expensive and awkward. It might outsource certification to a third-party company; it might purchase CA software and appliances from a third-party company; it might try to build and maintain its own CA. In the latter two options, the enterprise faces the additional challenge of showing sufficiently safe practices to have its CA certified or cross-certified, for broader inter-operability.
This paper presents our research and development effort to address this problem. We use OpenCA to provide the basic functionality; we package it on a Linux installation on a bootable CD; we use the 1.1b TCG trusted platform module (standard on many desktop and laptop machines) to hold the private key; we also use the TPM to add assurance that the key can only be used when the system is correctly configured as the CA. This tool enables an enterprise to operate a CA possessing a degree of physical security and the ability to attest proper configuration to a remote certifier simply by booting a CD in a commodity machine. The code (and CD image) are all open-source, and will be available for free.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Covell, C., Bell, M.: OpenCA Guides for 0.9.2+, http://www.openca.org/openca/docs/online/
Douglass, J.: The Papyrus Project, Version 4 (2005), http://www.cren.net/crenca/crencapages/papyrus.html
Higher Education Bridge Certification Authority, http://www.educause.edu/hebca/
Hohnstadt, C.: XCA (2003), http://xca.sourceforge.net/
Chandra, P., Viega, J., Messier, M.: Network Security with OpenSSL. O’Reilly & Associates, Sebastopol (2002)
Knoppix linux, http://www.knoppix.net/
Marchesini, J., Smith, S.W., Wild, O., Barsamian, A., Stabiner, J.: Open-Source Applications of TCPA Hardware. In: 20th Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos (2004)
OpenCA PKI Development Project, http://www.openca.org/openca/
OpenSSL: the Open Source toolkit for SSL/TLS, http://www.openssl.org/
Personal communication
pyCA–X.509 CA (2003), http://www.pyca.de/
Ribbeck, B.R.: The PKI Working Group End User Deployment Matrix (2004), https://webspace.uth.tmc.edu/bribbeck/public/PKIWMATRIX.html
Trusted Computing Platform Alliance. Main Specification, Version 1.1b (February 2002), http://www.trustedcomputinggroup.org
Yi, S., Kravets, R.: MOCA:Mobile Certificate Authority for Wireless Ad Hoc Networks. In: 2nd Annual PKI Research Workshop (2002)
Zhou, L., Schneider, F.B., Van Renesse, R.: COCA: A Secure Distributed Online Certification Authority. ACM Transactions on Computer Systems 20(4), 329–368 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Franklin, M., Mitcham, K., Smith, S., Stabiner, J., Wild, O. (2005). CA-in-a-Box. In: Chadwick, D., Zhao, G. (eds) Public Key Infrastructure. EuroPKI 2005. Lecture Notes in Computer Science, vol 3545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11533733_12
Download citation
DOI: https://doi.org/10.1007/11533733_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28062-0
Online ISBN: 978-3-540-31585-8
eBook Packages: Computer ScienceComputer Science (R0)