+ | implemented by all PKI products (unless purely manual) |
+ | scalability |
+ | flexibility (integration possibility to other systems, automatic public key retrieval possibility) |
− | complexity |
+ | simple |
− | not supported by all PKI products (although widely supported) |
Issue | A) Cross-certificates are stored into SEGs: | B) Cross-certificates are stored into CRs: | C) Cross-certificates are stored into CRs and cached in SEGs upon usage: |
---|---|---|---|
1) Initialization issues: storing the cross-certificate during the cross-certification |
The cross-certificate is initially stored in several places, that is, into all SEGs (estimated number is between 2 and 10).
Pros:
-
Cons:
Certificate is initially copied in several places. SEGs from different manufacturers may have other O&M interfaces to handle the certificates.
|
The cross-certificate is initially stored in CR.
Pros:
The handling is fully standardized. Certificate is initially copied in one place only. The operator should have the repository anyway (due to CRL handling).
Cons:
-
|
The cross-certificate is initially stored in CR.
Pros and cons:
as in B).
|
2) Usage issues: latency during the IKE Phase 1 |
Pros:
No extra latency
Cons:
-
|
Pros:
-
Cons:
More latency caused by extra LDAP query (the cross-certificate is queried)
|
Pros & cons:
as in B) at the first time, and as in A) at subsequent times
|
3) Cleanup issues: removing the cross-certificate |
Pros:
-
Cons:
The cross-certificate is removed from several places, that is, from all SEGs
|
Pros:
The cross-certificate is removed from one single place only
Cons:
-
|
Pros:
-
Cons:
The cross-certificate is removed from both CR and each SEG.
|
NOTE:
this functionality is needed only to be able to revoke cross-certificates before the next CRL gets published.
|
|||
4) Security issues |
Pros:
No single point of failure exists.
Cons:
-
|
Pros:
-
Cons:
CR represents a single point of failure suitable for an attacker, e.g. to submit a denial of service attack by breaking the communication at the CR.
|
Pros:
Single point of failure partly mitigated
Cons:
-
|