European Federated Validation Service Study Solution Profile – BBS Global Validation Authority Service July 2009 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 This report / paper was prepared for the IDABC programme by: Author’s name: Indicated in the solution profile below, under ‘contact information’ Coordinated by: Hans Graux (time.lex), Christian Staffe (Siemens), Eric Meyvis (Siemens) Contract No. 1, Framework contract ENTR/05/58-SECURITY, Specific contract N°14 Disclaimer The views expressed in this document are purely those of the writer and may not, in any circumstances, be interpreted as stating an official position of the European Commission. The European Commission does not guarantee the accuracy of the information included in this study, nor does it accept any responsibility for any use thereof. Reference herein to any specific products, specifications, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favouring by the European Commission. All care has been taken by the author to ensure that s/he has obtained, where necessary, permission to use any parts of manuscripts including illustrations, maps, and graphs, on which intellectual property rights already exist from the titular holder(s) of such rights or from her/his or their legal representative. This paper can be downloaded from the IDABC website: http://europa.eu.int/idabc/ http://ec.europa.eu/idabc/en/document/7764 © European Communities, 2009 Reproduction is authorised, except for commercial purposes, provided the source is acknowledged. 2 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Executive summary The European Federated Validation Service (EFVS) Study was initiated by IDABC in order to assess the feasibility of specific measures to ensure the availability of a European scale federated electronic signature verification functionality. As a first step in the EFVS Study, information has been collected on twenty existing solutions that already provide all or some of the functionalities associated with European signature verification functionality, or that could provide valuable insights on how such an EFVS could be organised. This has been done by drafting standardised profiles of the identified solutions, focusing specifically on how each of these solutions (a) determine the validity of signature certificates; (b) verify electronic signatures created using these certificates; and (c) provide specific guarantees to their customers on the outcomes of these processes. The present document contains the solution profile for: BBS Global Validation Authority Service. 3 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Table of Contents EXECUTIVE SUMMARY 3 1 5 DOCUMENTS 1.1 APPLICABLE DOCUMENTS 5 1.2 REFERENCE DOCUMENTS 5 2 GLOSSARY 6 2.1 DEFINITIONS 6 2.2 ACRONYMS 8 3 SOLUTION PROFILE – BBS GLOBAL VALIDATION AUTHORITY SERVICE 4 9 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 1 Documents 1.1 Applicable Documents [AD1] Framework Contract ENTR/05/58-SECURITY 1.2 Reference Documents [RD1] Project Management and Quality Plan (EFVS SC14 PMQP) [RD2] DIRECTIVE 1999/93/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures http://europa.eu/information_society/eeurope/i2010/docs/esignatures/esignatures_e n.pdf [RD3] Preliminary Study on Mutual Recognition of eSignatures for eGovernment applications http://ec.europa.eu/idabc/en/document/6485/5938 5 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 2 Glossary 2.1 Definitions In the course of this report, a number of key notions are frequently referred to. To avoid any ambiguity, the following definitions apply to these notions and should also be used by the correspondents. o Entity: anyone or anything that is characterised through the measurement of its attributes in an eIDM system. This includes natural persons, legal persons and associations without legal personality; it includes both nationals and non-nationals of any given country. o eIDM system: the organisational and technical infrastructure used for the definition, designation and administration of identity attributes of entities. This Profile will only elaborate on eIDM systems that are considered a key part of the national eIDM strategy. Decentralised solutions (state/region/province/commune…) can be included in the scope of this Profile if they are considered a key part of the national eIDM strategy. o eIDM token (or ‘token’): any hardware or software or combination thereof that contains credentials, i.e. information attesting to the integrity of identity attributes. Examples include smart cards/USB sticks/cell phones containing PKI certificates, … o Authentication1: the corroboration of the claimed identity of an entity and a set of its observed attributes. (i.e. the notion is used as a synonym of “entity authentication”). o Authorisation: the process of determining, by evaluation of applicable permissions, whether an authenticated entity is allowed to have access to a particular resource. o Unique identifiers: an attribute or a set of attributes of an entity which uniquely identifies the entity within a certain context. Examples may include national numbers, certificate numbers, etc. o Official registers: data collections held and maintained by public authorities, in which the identity attributes of a clearly defined subset of entities is managed, and to which a particular legal of factual trust is attached (i.e. which are generally assumed to be correct). This includes National Registers, tax registers, company registers, etc. o eGovernment application: any interactive public service using electronic means which is offered entirely or partially by or on the authority of a public administration, for the mutual 1 For the purposes of this Profile, the notion of authentication is considered to be synonymous with ‘entity authentication’, as opposed to ‘data authentication’. The notion of ‘identification should be avoided to avoid confusion. 6 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 benefit of the end user (which may include citizens, legal persons and/or other administrations) and the public administration. Any form of electronic service (including stand-alone software, web applications, and proprietary interfaces offered locally (e.g. at a local office counter using an electronic device)) can be considered an eGovernment application, provided that a certain degree of interactivity is included. Interactivity requires that a transaction between the parties must be involved; one-way communication by a public administration (such as the publication of standardised forms on a website) does not suffice. o eSignature: data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication with regard to this data. Note that this also includes non-PKI solutions. o Advanced electronic signature: an electronic signature which meets the following requirements: (a) it is uniquely linked to the signatory; (b) it is capable of identifying the signatory; (c) it is created using means that the signatory can maintain under his sole control; and (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable; Again, this definition may cover non-PKI solutions. 2 o Qualified electronic signature: advanced electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creation device, as defined in the 2 eSignatures Directive . o Validation: the corroboration of whether an eSignature was valid at the time of signing. See http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31999L0093:EN:HTML 7 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 2.2 Acronyms A2A.................................................Administration to Administration A2B.................................................Administration to Businesses A2C.................................................Administration to Citizens CA...................................................Certification Authority CRL ................................................Certificate Revocation Lists CSP ................................................Certificate Service Provider eID ..................................................Electronic Identity eIDM ...............................................Electronic Identity Management IAM .................................................Identity and Authentication Management IDM .................................................Identity Management OCSP .............................................Online Certificate Status Protocol OTP ................................................One-Time Password PKCS..............................................Public-Key Cryptography Standards PKI..................................................Public Key Infrastructure SA...................................................Supervision Authority SOAP..............................................Simple Object Access Protocol SCVP ..............................................Server-based Certificate Validation Protocol SSCD..............................................Secure Signature Creation Device USB ................................................Universal Serial Bus TTP.................................................Trusted Third Party XAdES............................................XML Advanced Electronic Signature XML ................................................eXtensible Markup Language XML-DSIG ......................................XML Digital Signature 8 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 3 Solution Profile – BBS Global Validation Authority Service Name and organisation The Validation Authority Service is operated Bankenes Betalingssentral AS (BBS) The service is referred to below as the ‘validation authority’ or ‘VA’. Det Norske Veritas AS (DNV) provides independent quality assessment. Reference (on-line source) http://www.bbs-nordic.com http://www.bbs-nordic.com/en/Solutions-and-Services/eSecurity/Global-Validation-Service/ http://va.dnv.com Contact information Bishwajit Choudhary FA BBS eSecurity Haavard Martinsensvei 54 N-0045 Oslo Norway Tel: +47 22898098 Email: Bishwajit.choudhary@bbs.com 9 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Scope of the solution Services offered (What services does the solution offer to a relying party? This should include most notably the three basic services above – validation of certificates, verification of the signature, and ensuring trustworthiness and legal liability – but may also cover additional services – e.g. semantic services, archiving of documents/signatures, maintenance, time stamping, security/reliability metrics for the security level of the signature and the certificate,…Services that are not currently available but which are planned for the future may also be indicated. ) BBS provides a neutral validation authority offering validation of certificates for electronic identity (eID) and verification of digital signatures as a third party service. This is a continuation of the VA service originally developed by DNV. For additional information, see: http://www.dnv.com/binaries/DNV_VA_Service_Description_RP_v1%200_s_tcm4279045.pdf Basic services: The validation authority (VA) provides two basic service interfaces as web services: • • Certificate validation (one certificate, possibly with chain of CA certificates, multiple certificates in one request may be a future option) Signature verification (all signatures on one document and the accompanying certificates) These are “rich” interfaces that can provide a service offering flexibility to customers (see below). The VA covers all three basic services cited above due to: • The VA is defined as a separate trust anchor taking on legal liability for the validation responses The VA will independently sign each validation response. Liabilities and conditions are further described in the customer contracts. Further, the following must be regarded as basic services of the VA as the information is always returned (refer security/reliability metrics above): • • Quality classification of certificates (both interfaces) Quality classification of signatures (signature verification interface) BBS uses DNV (http://www.dnv.com) as subcontractor for independent quality assessment. The certificate products of all supported CAs are classified according to quality and national approval status (e.g. qualified). For signatures, the cryptographic quality is additionally asserted. 10 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Responses from the VA will be related to the appropriate quality level profile. (For example, if a signature is verified as valid but with parameters below the appropriate quality level profile, the VA will return a response stating “not trusted”.) In special cases the customer may override the quality level profile by specifying desired Certificate Quality Level and/or Signature Quality Level in the request. Existing additional services: Due to the flexibility of the interfaces, several options are supported as indicated by the customer in the request: • Additional information derived from certificates or signatures (content, algorithms, CRL/OCSP information, etc.) Note also the following: • Trusted archival (not yet integrated with the VA) Trusted archival is at the core of BBS’ service offering, including existing archival services for signed documents. Automated integration with the VA is not yet implemented. Improved signature maintenance functionality is under implementation. Future additional services: The two following service options are not yet available to customers but are supported by interfaces and by the service software through an archive of CRLs from the CAs supported: • • Historical validation of certificates (validity at time instant specified in request) Historical verification of signatures (validity at time instant specified in request or given by time stamp in the signed data object) The following are fairly straightforward extensions that can be implemented given customer demand: • • • Auxiliary information from other sources than the certificate itself (e.g. business or other public registers) Semantic interpretation of certificate attributes (returning information in a normalized form, mapping individual certificate profiles to this form) Time-stamping (would be a separate service interface) or integration towards external time-stamping service 11 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Application domain (e.g. sector or application types) (Is the solution usable in any sector or application field (i.e. is it generic in scope), or is it currently limited to a specific sector, application or domain? If it is currently restricted, would it be possible to extend the solution to other sectors, applications or domains? What would need to be changed?) BBS can offer its solution in any sector or application field. 12 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 CAs covered by the solution (How many CAs are presently covered by the solution, and which ones? Do they include CAs established in multiple countries or states?) The following Certificate Authorities are supported by the VA service in production: • Actalis S.p.A (Italy - www.actalis.it) • Buypass AS (Norway – www.buypass.no) • Commfides Norge AS (Norway – www.commfides.com) • GlobalSign Ltd (Global – www.globalsign.com) • InfoCert (Italy – http://www.infocert.it) • Population Register Center (Finland – www.vrk.fi/vrk/home.nsf/pages/index_eng) • AS Sertifitseermiskeskos (Estonia – www.sk.ee) • Skaitmeninio Sertifikavimo Centras (Lithuania – www.ssc.lt) • TDC AS (Denmark – http://tdc.dk) • TeliaSonera AB (Sweden- www.telia.se) • ZebSign AS (Norway – http://www.zebsign.no) Note that BBS requires a signed agreement with a CA before installing the CA in the production environment. In the staging area for the VA, about 45 CAs are technically supported. When agreements are obtained, these may immediately be installed in the production environment. Some of the CAs may possibly be moved to production even without an agreement. Extensibility of the solution (Can additional CAs be integrated into the solution? If so, are there restrictions? Have such extensions been done in the past yet, or are any extensions currently planned?) Additional CAs can be integrated into the VA. In this case, BBS will normally enter an agreement with a CA before including it in the list of CAs handled. As a minimum, BBS needs to ensure that handling the CA is not a violation of the CA’s policies. If a customer of the VA requires a specific CA to be included, the customer is encouraged to notify BBS. BBS will then attempt to support the CA as soon as possible. Business model/cost model of the solution 13 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 (How is the solution funded? Is it envisaged as a for-profit model? Who pays contributions, and for what type of services? What profits (if any) are made with the services provided by the solution? Upon request of the correspondent, any communicated price information or other commercially sensitive information will not be disclosed.) For-profit model Currently, BBS relies on business agreements with its customers (the users of the VA, the relying parties of the certificates and signed documents to be validated) to finance its operation, including to cover its responsibilities and liabilities. If payment could be secured, some basic VA services could be provided openly. VA services to the general public are possible, and even desired, but this is not the first market segment targeted by BBS. As regards the cost model, a suitable agreement is put in place with each customer of the VA on a case by case basis (transaction based, volume based or fixed). The VA in turn pays the CAs and other information providers. CAs are paid a fraction of the income for certificate validation and signature verification, proportionate to their share of the number of certificates validated. 14 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Technical approach Validation approach (Does the solution validate signature certificates, electronic signatures based on a hash value of the signed document(s), or signed documents with embedded signatures?) The service encompasses verification of digital signatures and validation of accompanying signing certificates. Multiple signatures of types A (independent signatures) and C (overall countersignatures) are handled – see below. Enveloping, enveloped and detached signatures are supported. Web Services The VA services are implemented as Web Services, meaning: • Requests and responses are defined as XML structures with defined content. • Communication is based on the SOAP protocol. • Underlying SOAP is the HTTP protocol – in the VA case HTTPS (HTTP secured by the SSL/TLS protocol). A customer builds a request containing the desired parameters and sends this to the VA. The response returned by the VA must be interpreted and used as basis for further processing (or displayed to a human user). Requests and responses consist of some mandatory and some optional elements, notably a set of optional “respond with” parameters that can be populated. The XML and the definitions for the elements of the XML structures are available from the DNV VA web site. Future development of the interfaces are likely to follow the specifications from the PEPPOL project (http://www.peppol.eu) Deliverable D1.1, using a profile of the XKISS part of XKMS v2 for certificate validation and a profile of OASIS DSS for signature verification. A customer will typically implement work flows for specific business processes and integrate calls to the VA services at defined steps or events of these processes. 15 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Typical steps/events are reception of a (signed) document or an eID certificate used for other purposes than signing (e.g. authentication). The Signature Verification or Certificate Validation service is then called to address the request. Security and Access Control The VA services are available only to registered customers. The customers are authenticated by SSL client authentication. The SSL protocol by default also authenticates the server side, i.e. the VA itself. Optionally, customers may also sign requests. The VA signs all responses (detached XML DSIG). All communication is encrypted and integrity protected by means of SSL. All certificates, for customers as well as for the VA itself, are issued by a dedicated CA in conjunction with the VA services. This is to pinpoint the VA’s position as an independent trust anchor, not relying on any CA with respect to trust. Customers must obtain and install client certificate(s) issued by this CA and must install the certificate of the CA. If a VA Gateway is used, installation in the Gateway is sufficient. Test and Staging Environment BBS operates a test and staging infrastructure for the VA services. On integrating VA access in a customer system, an acceptance test has to be successfully completed using this environment before access to the operational environment is granted to the VA customer. Quality Parameters In the present version of the VA, certificate quality is indicated as a number from 0-6 with 6 as the best quality, as will be further commented below. Signature quality is computed based on fixed parameters related to certificate quality and cryptographic quality. The present quality levels are applicable in Europe, as they refer to the EU Directive on electronic signatures and other EU regulation for qualified certificates and qualified signatures. A more comprehensive quality classification system is developed in the PEPPOL project (Deliverable D1.1), and for future development the VA is likely to adopt this scheme. 16 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Adaptation according to customer demands is possible, subject to agreements between BBS and the customer. More information on certificate quality is given in the document “DNV Validation Authority - Quality Parameters, Certificate and Signature Quality” available from the DNV VA web site (see http://www.dnv.com/binaries/VA-quality-parametersv2.0_tcm4-222724.pdf) With regard to certificates (How does the validation of certificates work – based on OCSP, CRLs, or both? What certificate profiles are supported by the solution?) For a certificate validation request, the certificate is a parameter of the request. For signature verification, either the entire signed document or pairs of hash values and signature fields are parameters of the request; certificates have to be present in the signature fields (use of certificate referencing and directory lookup is for further study). The overall status of a certificate validation is trusted, not trusted, indeterminate (meaning that the VA lacks information), or an error message, e.g. in case of a malformed request. For signature verification, an overall assertion covering all signatures is returned (trusted, not trusted, indeterminate) as well as individual assertions for each signature and certificate, possible values being valid, invalid, indeterminate, insufficient quality. Note that insufficient quality (meaning valid but quality below the level specified) will yield an overall “not trusted” answer. Due to its position as a separate trust anchor with individual agreements with the CAs, the VA trusts each CA individually by having the CA’s root certificate(s) configured into the VA. Certificate chains (and in the future Trust Status Lists) may be used for internal processing. As a rule, chain validation is not performed but this may be added in the future since it may emerge as a customer requirement. Access to revocation information from CAs is configurable, the preferred mode being OCSP with fallback to CRL if OCSP is unavailable. For historical validation, CRLs are regularly downloaded from all CAs that issue CRLs into an archive in the VA. All CAs are contractually obliged to inform the VA about changes in operation or other status changes. 17 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Quality of Certificate The quality of the certificate (currently expressed in a rating from 0 to 6) is assessed by DNV as subcontractor based on the applicable certificate policy and the CA’s national accreditation/supervision status. The quality is assigned to the combination of CA and policy meaning that two CAs with the same policy may obtain different ratings if they differ in other aspects. Note that in most legislations only certificates issued to natural persons may be marked as qualified. Thus certificates issued to legal entities usually cannot be assigned level 5 or 6 (the qualified levels), no matter their inherent quality. The following values are assigned: 0. Inadequate or non-determined level: Very low confidence or assessment not possible, usually because a certificate policy does not exist. Many corporate PKIs will be placed in this category. 1. Low level: Low confidence in certificate but certificate policy exists or quality assessment is possible by other means. 2. Medium non-approved level: Medium confidence certificates with no formal registration/ approval status. 3. High non-approved level: Certificate quality is at or very close to qualified level but certificate issuer is not registered/approved by assigned inspectorate/authority according to applicable law to the issuer. 4. Non-qualified approved level: Certificate is not marked as qualified but certificate issuer is registered/approved by assigned inspectorate/authority according to applicable law to the issuer (according to a registration/approval scheme for issuers of non-qualified certificates). 5. Qualified approved level: Certificates are marked as qualified and the issuer is registered/ approved by assigned inspectorate/authority according to applicable law to the issuer. Private key environment is not certified as SSCD (Secure Signature Creation Device) according to CEN CWA 14169. 18 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 6. Qualified signature level: Certificates are marked and registered as for level 5, and use of a certified SSCD according to CEN CWA 14169 is mandated. Thus, this level supports qualified signatures according to the EU Directive on electronic signatures. The quality classification system developed by the PEPPOL project in Deliverable D1.1 is likely to replace this system in the future. BBS and DNV monitor the quality of the hash algorithm and size of the key pair used by the CA to sign certificates and reserve the right to suspend or degrade a CA whose certificates must be considered unreliable due to weaknesses in these cryptographic parameters. With regard to signatures (What signature formats are supported by the solution - PKCS #7, CMS, XML signatures, PDF signatures, XAdES, CAdES, or others?) When using the VA Web Service, one signed document is taken as input, returning the status of all signatures on the document, their quality, and the status and quality of the eIDs used. As for certificate validation, the overall answer is trusted, not trusted, indeterminate, or an error message. Answers are also provided for each individual signature, values being valid, invalid, indeterminate, insufficient quality, and for each eID with values valid, invalid, indeterminate, insufficient quality. Insufficient quality yields a not trusted overall status. The quality of a signature is computed based on the eID quality (i.e. the certificate quality as commented above) and the cryptographic quality as described in “DNV Validation Authority - Quality Parameters, Certificate and Signature Quality” available from the DNV VA web site. (see http://www.dnv.com/binaries/VA-qualityparameters-v2.0_tcm4-222724.pdf) Alternatively, when using the VA Gateway (see below) instead of the web services, only signatures and corresponding hash values computed on the document can be sent instead of the entire document. Thus, the document itself is removed from the request, while only signatures and hashes are forwarded from the Gateway to the VA. The DNV validation authority service supports the following signature types: • PKCS #7 19 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 • CMS • XML Signatures • PDF signatures • XAdES and CAdES signatures Quality of Signature A signature is verified by the signer’s certificate. The certificate policy for this certificate is assumed to capture most aspects of a signature quality, including use of smart card or other hardware token and legal standing such as qualified level. The remaining signature quality issues are related to cryptographic algorithms: • • Hash algorithm used for the signature (i.e. by the signer). This depends on the signer’s software and cannot in general be controlled by the CA. The quality of the signer’s public key algorithm and key. This is in most cases controlled by the CA, which must accept to issue a certificate for the public key even when the signer has generated the key pair. Only key length is considered with issues such as quality of random number generator being for further study. For high quality certificates (level 3 and up), the CA must be expected to take action in case key lengths (and algorithm) in issued certificates are deemed to be unacceptable, i.e. revoke and issue new certificates. However, for historical validation, a certificate for a public key of inadequate size must still be checked. Cryptographic algorithms are identified by OIDs (Object Identifier). OIDs are defined both for individual algorithms and for combinations of hash and public key algorithm. Both types of OIDs are used for signatures. Notably, PKCS#7 usually includes separate OIDs for hash and public key algorithm, while a signature in CMS typically uses one OID for the combination. The latter, one OID, is also normally used for a CA’s signature on a certificate or CRL. Further quality parameters for signatures may be the application of the algorithms, such as PKCS#1 for RSA, and the encoding of the signed content, such as PKCS#7 or CMS. These algorithms may have different quality aspects and potential weaknesses, more or less independent from the cryptographic algorithms as such. At present, such quality issues are not considered by the VA, e.g. in the sense that RSA with a certain key size has the same strength for use with PKCS#7 and, say, a PDF signature. Multi-signatures 20 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 (Is the solution capable of validating multiple signatures on a document?) Yes, validation of multiple signatures of types A (independent signatures) and C (wrapping signatures) is supported. There is some but not full support for type B (countersignatures, signing signature elements only). Type A Type B Doc Doc Type C Doc Sig3 Sig1 Sig1 Sig1 Sig2 Sig2 Sig2 Sig3 A B means A signs B Sig3 Logging and auditing (Is the use of the solution logged, and if so, to what extent? Do users of the solution have the possibility to perform audits or to gain access to independent auditing reports?) All requests and responses are logged as well as supporting actions such as the download of a CRL or an OCSP request to a CA and all configuration actions (e.g. adding a CA). There is at present no independent auditing of the VA. BBS is aware that requirements for auditing may come from authorities or customers. Note that BBS is certified according to ISO 9001 and ISO 27001. At present, customers do not have on-line access to logs. Information must be provided by operators of the VA. On-line access is anticipated in future versions. 21 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Restrictions imposed on CAs (What technical requirements are imposed on CAs, e.g. with regard to standards, formats or certificate profiles that they need to adopt? This includes e.g. the inclusion of certain information in signature certificates that is necessary in specific sectors.) Only X.509 certificates are handled. Apart from this, no specific requirements are imposed. Key usage settings are checked and can be returned to the customer. Sector specific information is not treated. The VA does not rely on extensions such as QC statement, CRL distribution point, and authority information. Rather, the information is configured in the VA. Usage of the solution by relying parties (How do relying parties use the solution? Are there software components which they need to integrate into their own systems, is it a web service, etc.) The VA provides the VA services as web services or optionally as a VA Gateway to be installed in the customer’s network as illustrated in the figure below. The VA Gateway is a software component that may be installed on a dedicated or shared computer. The purposes of the Gateway are threefold: request signature verification without sending the document to the VA (only pairs of document hash values and signature elements are sent), reduce need for bandwidth and response time since documents do not have to be transmitted, provide a single point for authentication towards the VA Services and for enforcement of (some) customer specific policies. If a VA Gateway is used, this is the only customer-side component that needs SSL client and/or request signing certificates and corresponding key pairs. The VA Gateway is allowed to alter requests (for example to enforce common values for minimum quality levels) before forwarding them to the VA, although limited functionality is present to this effect at present. The VA Gateway also contains an e-mail front-end, allowing a user to send an email containing a signed document to the Gateway for signature verification. Response from the VA service will be provided to the user by e-mail. An experimental web GUI interface also exists for upload of signed documents or certificates but the program code for this interface is not provided to customers at present. Note that the VA Gateway deliberately does very limited logging, and notably that it deletes documents as soon as the request to the VA has been created. 22 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 The VA Gateway is currently supported on the following operating systems (OS): • • Windows Server 2003 Suse Linux 9.2 Enterprise If desired, a customer may obtain administrator access rights to the VA Gateway. Technical flexibility (Given the technical characteristics outlined above, could the technical requirements of the solution be changed to increase its flexibility (e.g. by supporting other signature standards, validation methods, certificate profiles, etc.). The approach and model applied by the VA is sufficiently generic to be able to integrate most if not all existing approaches and standards for electronic signatures. Status of the project/Actual usage of the solution (What is the status of the project (e.g. in development, prototyped, in production, etc.). What is the actual usage of the solution (e.g. in terms of relying parties adopting the solution to validate electronic signatures) and what are the impacts of its use? How many transactions, how many certificates does it handle?) 23 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 The VA is currently operational and in active use by pilot customers. The volume of use is however limited at present. Legal approach 3 Relationship with the CAs (What requirements does a CA need to meet before being able to accede to the solution? Specifically, which processes and procedures have been foreseen to ‘vet’ CAs? What kind of agreements are put in place with the CAs, and what are the main issues addressed in these agreements?) CAs need to conclude an agreement with BBS before they can be integrated into the VA. As a minimum, BBS needs to ensure that handling the CA is not a violation of the CA’s policies, and a compensation model is put in place in which BBS compensates the CA for the use of its validation facilities, if required. Relationship with the relying parties (How does a relying party get the right to use the solution? What kind of agreements are put in place in relation with the relying parties, and which services can be offered to the relying parties via these agreements?) Relying parties (i.e. BBS’s customers) must conclude agreements with BBS to address mainly the following points: • • • The services to be offered by the VA (including the integration of specific CAs if needed). Quality requirements with regard to certificates and electronic signatures (i.e. the requirements the VA should apply to determine whether or not a signature should be considered valid for the customer’s purposes). The customer can override these requirements by specifying alternative requirements in requests. BBS’s liability for its services; exact levels of liability vary from agreement to agreement, depending on the levels of services and needs of the customer, 3 Within the EU, the term ‘CA’ should be taken to mean a certification service provider as defined in article 2.11 of the eSignatures Directive (Directive 1999/93/EC) and outside the EU, this means a Certification Authority in the technical sense, i.e. an entity issuing signature certificates to third parties. 24 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 • but the liability provisions of the eSignatures Directive are always respected in cases where qualified certificates are concerned. Use of the staging and test environment is not covered by any liability. The cost model/business model (i.e. costs per transaction, volume based or fixed price), which vary from customer to customer. Reliability of the signature certificates (What procedures does the solution put in place to determine the reliability of signature certificates? Are certificate policies checked? Are supervision/accreditation schemes considered? Have specific security criteria been defined, and does the solution support multiple levels of reliability? If so, can the solution distinguish between qualified and nonqualified signature certificates?) As noted above, a system of six levels of reliability have been defined, which are assessed per CA depending on the applicable certificate policy, and assigned to the combination of CA and policy. A particular element is assessment of compliance with national or international legislation, e.g. that requirements for qualified certificates/ signatures are met. Additional elements which could be considered (but currently are not) may be an assessment of the actor running the CA, e.g. to confirm that the CA is able to fulfil its liability in case of errors, and the CA’s market share and reputation, e.g. as an indicator of its chances of survival over time. Other documentation may also be of relevance, such as certification practice statements and agreements with certificate holders and other actors (including membership in hierarchies and crosscertification regimes). It should be noted that the current system is mainly based on assurances provided by the CA together with assessment of accreditation/surveillance status provided by national authorities. More advanced approaches, such as the one proposed by the PEPPOL project, may include an “assurance level” to indicate to what degree an assessment of actual operation has been done. Supervision and accreditation schemes are considered, since these are required for certificates to reach level 4 or above. The VA has two quality levels for qualified certificates, level 5 and 6, respectively without and with use of SSCD. A signature produced by use of a certificate at level 6 will be identified as a qualified signature, provided also that the cryptographic quality fulfils the requirements of the customer in case. BBS reserves the right to suspend or degrade a CA whose certificates must be 25 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 considered unreliable due to weaknesses in the quality of the hash algorithm and size of the key pair used by the CA to sign certificates; thus, the policy of the CA is not the only deciding factor. Legal value of the signatures (Can the solution make a statement on the legal value of signatures? If so, what factors are taken into account? If multiple degrees of validity are supported by the system (i.e. a statement on the reliability of the signature as a whole is provided), then how are these ‘reliability levels’ defined and communicated to the relying party? Can the solution identify if a signature can be considered a qualified signature (i.e. if it is an advanced electronic signature based on a qualified certificate created by using a secure signature creation device, as defined in the eSignatures Directive)? Finally, if the certificate policies contain restrictions on the use of the signatures (e.g. limitation to transactions of a certain amount or exclusion of certain sectors), then are these restrictions taken into account when communicating the legal value of the signature?) As noted above, based on the quality of the certificate, the VA can identify qualified/ nonqualified signatures as well as mediate other reliability levels. Current version of signature quality calculation is as follows below – presumably this scheme will in the future be replaced by the scheme devised by PEPPOL D1.1. Based on certificate quality, hash algorithm quality, and public key algorithm / key size, the signature quality level is calculated as follows: Signature quality = certificate quality + hash algo. quality + public key algo. and key size quality This algorithm is amended as follows: • If any quality parameter is 0, signature quality is set to 0 regardless of the values of the other two quality parameters. The signature is considered too weak to be trusted. • If certificate quality level is 6, and both other quality parameters have value 1 or higher, the signature quality shall be set to 20. This value thus indicates a qualified signature according to the EU Directive. The acceptance of cryptographic quality 1 for a qualified signature may be questioned, however the case today is that most qualified certificates use RSA with 1024 bit key size for the end user certificate and most cryptographic toolkits will use SHA-1 as default hash algorithm. As these algorithms are neither insecure today nor in the short term, this cryptographic quality is accepted. NIST’s advise on terminating use of these algorithms by end of 2010 must be interpreted as an advise to stop using them before they become insecure, i.e. there is a margin with respect to security. In the case of the VA, certificate policy limitations on transaction values are 26 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 considered to be overridden by the agreements customer – VA and VA – CA. These agreements will contain explicit liability caps. At present the VA does not support limitations regarding applicable community for certificates. Future development may add support for customer specific exclusion/inclusion rules (accept or reject certificates from particular CAs regardless of fulfillment of the general quality requirements), and for CA specific exclusion rules that can prohibit certain VA customers from being allowed to accep a particular CA’s certificates. Liability of the solution provider (What liability (if any) does the solution provider accept with regard to its services? Specifically, if the signatures rely on qualified certificates as defined under the European eSignatures Directive (if this is applicable to the solution), then how does the solution address its liability for providing guarantees to the public in relation to such certificates?) Provisions with regard to the liability of the VA are addressed both in the agreements with the CAs and with the customers. In the relation with CAs, specific provisions are needed as final liability lies with them (i.e. the VA assumes interim liability towards its customers insofar as this is legally required and contractually agreed with the customers, but it should be able to obtain compensation from the CAs if there was no material error on the VA’s part). In this way, the VA transfers final liability to the CAs (or other information providers) if an erroneous answer from the VA is caused by erroneous information from such actors. To accomplish this, the VA will in most cases need agreements with the CAs and other information providers, as relying on general statements in a CA’s policy is too ambiguous and too risky. In relation with the customers, the VA assumes responsibility insofar as legally required and insofar as this is demanded by the customer. The VA should ideally provide a one-stop shopping service, where all relevant liabilities related to certificate/signature validation are taken on by the VA. However, the VA’s liabilities must be clearly stated and accepted by its customers, and the cost to a customer may depend on the level of risk that the VA takes with respect to the customer. Thus, liability towards the customer can be customized, depending on the requirements and willingness to compensate for this necessity on the customer’s side. Quality of service and availability 27 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 (Does the solution provide any guarantees with regard to the quality of its service (i.e. the reliability of the information it provides) and its availability to relying parties, other than already mentioned above?) As was also the case in relation to liability in general, this can be determined in the specific agreements with the customers, depending on the requirements and willingness to compensate for this necessity on the customer’s side. Independence of the solution (Is the solution fully unaffiliated (legally unrelated) with all of the CAs that are integrated into the solution? If not, then how is trust created towards the relying party for affiliated CAs?) The BBS Validation Authority is fully independent. However, it should be noted that BBS owns the ZebSign CA, which is supported by the VA. BBS also provides the operational infrastructure for the Norwegian BankID (at present not supported by the VA), which is owned by Norwegian banks. To ensure a neutral quality classification, DNV is used as subcontractor for quality classification of CAs and their certificates, ensuring equal treatment of ZebSign, BankID and other CAs. Compliance with the provisions of the eSignatures Directive (Does the solution support signatures from CAs established in countries that are not subjected to the provisions of the eSignatures Directive (Directive1999/93/EC)? If so, how are they integrated and how does the solution address their legal value?) As noted above, the provisions of the Directive are applied to define and apply the certificate quality classification system, and thus also to determine the signature quality. The quality classification system devised by the PEPOL project in Deliverable D1.1 is able to accommodate CAs in other countries such as the US or Asian countries. 28 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Suitability of the solution at the European level Assessment of the solution owner (Does the solution owner feel that the solution could be adapted to operate at the European level – not applicable if the solution already functions at the European level?) The VA already functions at the European level. Issues to be addressed (Which issues does the solution owner feel would still need to be addressed before the solution could be made to operate at the European level?) Actors in the public sector may in many European countries not be allowed to buy validation services from a commercial provider. While national validation solutions is clearly an alternative, one should also explore supervision/accreditation schemes for VAs, such as used for qualified CAs in Europe. Integration with other validation solutions (Is there any strategy to allow the solution to interoperate with other validation solutions, i.e. can the solution connect to other ‘islands of trust’?) The first strategy is to devise a distribution architecture for the BBS VA itself, where BBS can have multiple instances of the VA according to customer requirements for localization. These instances should co-operate rather than being merely clones. Interoperability with other validation solutions, such as the Spanish national validation service, may be technically straightforward but may be complicated by legal and commercial issues. BBS (and DNV at earlier stages) has maintained a good dialogue with other actors on the validation scene and is in principle interested in co-operation and interoperability. The XKMS v2 interface specified by PEPPOL D1.1 may provide a standard for cross-validation interoperability. 29 EFVS Study Framework contract ENTR/05/58-SECURITY, SC N°14 - SOLUTION PROFILE July 2009 Market Impacts (How could the solution impact or influence the European market?) The main business case for the VA is assumed to be in cross-border B2B scenarios. While governmental services seem to be much in focus at present, such services are only to a limited extent cross-border, and the volume of use is less than for B2B. (Note that public procurement, such as addressed by PEPPOL, is really B2B with the public sector in a ‘B’ – buying – role.) Enabling e-signatures for B2B transactions across Europe is a bold vision for the VA. VA services to the general public is an interesting case, e.g. if signed email becomes widely used. This is not particularly addressed at present. Any other comments? (The solution owner can provide any other comments that (s)he feels were not adequately covered elsewhere) 30