Navigation and service

Profiles of the certificates used

In the public administration PKI (Public Key Infrastructure), certificates in the X.509v3 (international standard for public key certificates, version 3) format following the MTTv2 (Mail Trust, version 2) specification are used: these hold data about the validity period, the signature algorithm used, the key length, the certificate holder and the issuer. With the certificate extensions defined in X.509, the informational content of the certificate can be extended to include other details. A distinction is made between extensions (which among other things permit statements to be made about intended use or validation options) that need to be interpreted by Sphinx-compliant components and those that do not. This interpretation is mandatory for the 'KeyUsage' and 'BasicConstraints' extensions, assuming that they are included in the certificate. They are therefore marked as 'critical' in the certificate.

The 'BasicConstraints' extension permits the definition of restrictions within the PKI and ensures that only certificate authorities can create certificates -- but subscribers cannot. The length of the certificate path can also be limited.

The usage properties of the public keys are defined by using the 'KeyUsage' extension. Within CA (Certificate Authority) and PCA (Policy Certificate Authority) certificates, options are restricted to the attributes 'keyCertSign' (signature of public keys) and 'cRLSign' (signature of revocation lists). In contrast, end-user certificates use the attributes 'digitalSignature' for authentication, 'nonRepudation' for the electronic signature and 'keyEncipherment' for encryption.

The 'CertificatePolicies' extension is used to assign the certificate to the Certificate Policy: this policy sets out the requirements that need to be met as well as the purposes for which certificates can be created and used within this PKI.

The 'CRLDistributionPoint' extension defines the location at which revocation lists will be provided for verifying certificate validity.

At any one time, certificate authorities can have multiple keys in use with which certificates and revocation lists can be signed. The 'AuthorityKeyIdentifier' extension can be used to distinguish these keys from one another and to ensure that the certificate path is unambiguous. To this end, the certificate issuer and serial number particulars of the CA certificate are used.

The 'SubjectKeyIdentifier' extension enables the identification of a specific public key held by the certificate owner. This corresponds to the information in the 'AuthorityKeyIdentifier' extension and simplifies the correct construction of the certificate path.

The 'SubjectAltName' extension can be used to assign the certificate owner additional alternatives names, such as an e-mail address (rfc822 (Request for Comments #822)). Where necessary, this allows the e-mail client to verify that the sender address of the mail received matches one of the e-mail addresses that are specified in the sender's certificate.

PCA certificate profile

PCA certificate
Certificate fieldContent
VersionV 3
Serial number01
Signature algorithmSHA-1/RSA
Key length2048 bits
Issuer
Common nameCN = PCA-1-Verwaltung
Organisational unit name
Organisational nameO = PKI-1-Verwaltung
Country nameC = DE
Validity
Not beforeTuesday, 9 December 2003 10:09:58
Not afterTuesday, 8 December 2009 10:06:39
Subject
Common nameCN = PCA-1-Verwaltung-03
Organisational unit name
Organisational nameO = PKI-1-Verwaltung
Country nameC = DE
Extensions
Certificate policiesNon-critical1.3.6.1.4.1.7924.1.1
CRLDistributionPointNon-criticalURL=ldap://x500.bund.de/cn=PCA-1-Verwaltung-03,o=PKI-1-Verwaltung,c=de?certificateRevocationListURL=ldap://x500.bund.de/cgi-bin/show_attr?cn=PCA-1-Verwaltung-03&attr=crl
Authority Key IdentifierNon-criticaln/a; ROOT certificate
Subject Key IdentifierNon-criticalE40E D411 81CF 376E 3C28 913D 341A B417 4083 4CCA
Basic ConstraintsCriticalCertificate Authority
Path length = none
Key UsageCriticalCertSign, CRLSign
Certificate fingerprintSHA13411 770A 73A6 5C24 28AC BC72 7580 1C3E 6A95 4E6E

CA certificate profile

CA certificate
Certificate fieldContent
VersionV 3
Serial number196C
Signature algorithmSHA-1/RSA
Key length2048 bits
Issuer
Common nameCN = PCA-1-Verwaltung-03
Organisational unit name
Organisational nameO = PKI-1-Verwaltung
Country nameC = DE
Validity
Not beforeTuesday, 16 March 2004 15:16:52
Not afterThursday, 10 April 2008 15:15:49
Subject
Common nameCN = CA IVBB Deutsche Telekom AG 04
Organisational unit nameOU = Bund
Organisational nameO = PKI-1-Verwaltung
Country nameC = DE
Extensions
Certificate policiesNon-criticalPolicy ID: 1.3.6.1.4.1.7924.1.1
CRLDistributionPointNon-criticalURL=ldap://x500.bund.de/cn=PCA-1-Verwaltung-03,o=PKI-1-Verwaltung,c=de?certificateRevocationListURL=ldap://x500.bund.de/cgi-bin/show_attr?cn=PCA-1-Verwaltung&attr=crl
Authority Key IdentifierNon-criticalCN=PCA-1-Verwaltung-03, O=PKI-1-Verwaltung, C=de, Certificate serial number: 1
Subject Key IdentifierNon-critical6A5E 8BEE DAD4 F135 F6CE 0823 623E 5E1D A2B3 2934
Basic ConstraintsCriticalCertificate Authority
Path length = 3
Key UsageCriticalCertSign, CRLSign
Certificate fingerprintSHA15D2B 70DD 1AB2 CD69 6B4B 1581 5D5D 1318 7289 1FA0

Subscriber certificate profile

Participation certificate
Certificate fieldContent
VersionV 3
Serial number112B
Signature algorithmSHA-1/RSA
Key length1024 bits
Issuer
Common nameCN = CA IVBB Deutsche Telekom AG 03
Organisational unit nameOU = Bund
Organisational nameO = PKI-1-Verwaltung
Country nameC = DE
Validity
Not before Thursday, 11 September 2003 11:25:37
Not afterFriday, 12 September 2003 01:59:00
Subject
Common nameCN = Jane Doe
E-mailE = Jane.Doe@bsi.bund.de
Organisational unit nameOU = BSI
Organisational nameO = Bund
Country nameC = DE
Extensions
Certificate policiesNon-critical1.3.6.1.4.1.7924.1.1
CRLDistributionPointNon-criticalURL=ldap://x500.bund.de/cn=CA IVBB Deutsche Telekom AG 03,ou=Bund,o=PKI-1-Verwaltung,c=de?certificateRevocationList
Authority Key IdentifierNon-criticalCN=PCA-1-Verwaltung-02, O=PKI-1-Verwaltung, C=de, Certificate serial number: 3E45 D1C3
Basic ConstraintsCriticalNone
Key UsageCriticalNonRepudiation, DigitalSignature, KeyEncipherment
Certificate fingerprintSHA12C2A 83D3 BEE9 790D A1B0 FF28 F134 B5B4 6364 9DFF
SubjectAltName RFC822-Name = Jane.Doe@bsi.bund.de