Home | Aktuelles | Amateurfunk | Chaoswelle | DARC-OV | Afu-Lexikon | Service | Datenschutz | Impressum | Anmelden
(certification process)
Zeile 26: Zeile 26:
* Operator Idenfitication Process
* Operator Idenfitication Process
** Match "real identity" (person's name) with "amateur identity" (callsign) and "online identity" (email address / browser / app / certificate request)
** Match "real identity" (person's name) with "amateur identity" (callsign) and "online identity" (email address / browser / app / certificate request)
-
** Automation as far as possible (i.e. PostCard with ID code to official address)
+
** Automation as far as possible
* Certificate Issuing Process
* Certificate Issuing Process
* Revocation Process
* Revocation Process
Zeile 41: Zeile 41:
* CA implementation
* CA implementation
* validation volunteers
* validation volunteers
 +
 +
=== Certification Process ===
 +
 +
Possible automatic process:
 +
 +
# User fills in callsign + certificate request
 +
# Automatic system sends registration-code postcard to address registered in country's official database
 +
# User enters registration-code, can download certificate
 +
 +
Problem: somebody needs to pay for postage & logistics.
 +
 +
 +
Possible manual process:
 +
 +
# User fills in a form with:
 +
** Full Name (required)
 +
** Callsign (required)
 +
** E-Mail address (to send back the certificate)
 +
** Scan/Photo of Callsign assigment (to verify that name and callsign belong to the requester)
 +
** Certificate Request file
 +
# Admin performs tedious manual check of callsign document, approves or demands more documents
 +
# Certificate/notification is sent to user via email
 +
 +
Problem: manual labor is manual.
 +
 +
Possible automation: make smartphone app/app plugin that:
 +
 +
# Lets user enter his personal data
 +
# Makes a photo of required documents
 +
# Creates a key pair and CSR
 +
# Uploads to CA
 +
# Downloads and integrates certificate once issued

Version vom 17:51, 22. Okt. 2014

Inhaltsverzeichnis

HAM PKI: Igniting Amateur Radio over Internet Applications

This is work-in-progress. Join our discussion on #ham-pki on the IRCnet.

ChaosWelle Amateur Radio Certificate Authority

Problem

Access to some systems or services (for example APRS or the hamnet) over the Internet should only be provided to authorized and licensed amateur radio operators.

APRS currently uses a passcode, which is just some kind of checksum of the callsign. There are many freely available tools, which you can use to generate your own APRS passcode for every string you can imagine. Based on that information an APRS passcode is not a secure way of authenticating an amateur radio operator.


Solution

Some services started to use certificates to identify amateur radio operators. These certificates are issued by a CA which will check the operator's identity and callsign before issuing the certificate. Faking such a certificate is cryptographically impossible.

Currently there is only one CA, use by the ARRL to issue Logbook-of-the-World certificates. Despite the fact that this is a single point of failure, many hams may have problems with sending personal documents around the globe. This lead to the idea, that another CA could be created and that the formal rules for this CA need to be defined and documented. This would make the whole process of issuing and revoking certificates transparent to the amateur who is requesting a certificate, and to server operators who need to decide which CAs they want to trust.

One of the first ideas was to put this CA service into the local amateur radio operators group (for example ARRL in the US, DARC in Germany) but not every amateur radio operator is a member of such a group. Also, integrating such a service in a local group has to tackle many political and bureaucratic hurdles, making it impossible in the short term.

Another - better idea - is to let volunteers provide this CA within an organization which is known for its privacy and IT knowledge and where every amateur radio operator can request a certificate. The CCC shall be this organization in our case.

Requirements


TODO

Certification Process

Possible automatic process:

  1. User fills in callsign + certificate request
  2. Automatic system sends registration-code postcard to address registered in country's official database
  3. User enters registration-code, can download certificate

Problem: somebody needs to pay for postage & logistics.


Possible manual process:

  1. User fills in a form with:
  1. Admin performs tedious manual check of callsign document, approves or demands more documents
  2. Certificate/notification is sent to user via email

Problem: manual labor is manual.

Possible automation: make smartphone app/app plugin that:

  1. Lets user enter his personal data
  2. Makes a photo of required documents
  3. Creates a key pair and CSR
  4. Uploads to CA
  5. Downloads and integrates certificate once issued


Long Term Tasks

Root CA Bundle

Management of a list of Root CAs is non trivial, as can be seen from the different browser developers, OS vendors etc, especially in the context of the CACert inclusion.

To make life for service administrators easier, we should maintain and provide a Root CA bundle" - a package containing a set of Root CAs that we deem as trusted, according to a documented set of rules.

Alternatively, this could be achieved by creating Sub-CA certificates for the existing ham radio CAs, making one effective Root CA that only delegates signing of individual amateurs.

EchoLink

EchoLink is using a manual verification process of users prior to allowing them on the EchoLink Internet backbone. We need to get in touch with the responsible people at EchoLink, so we can achieve two synergy effects:


More Online Services

Document existing amateur radio online services, contact the operators.