2018-06-06 11:57:25 +00:00
.. highlight :: kotlin
.. raw :: html
<script type="text/javascript" src="_static/jquery.js"></script>
<script type="text/javascript" src="_static/codesets.js"></script>
2018-11-05 15:51:42 +00:00
Network certificates
====================
2016-11-24 16:38:40 +00:00
2017-11-24 18:06:01 +00:00
.. contents ::
2016-11-24 16:38:40 +00:00
2018-02-28 18:04:08 +00:00
Certificate hierarchy
---------------------
2017-11-27 13:36:52 +00:00
2018-06-06 11:57:25 +00:00
A Corda network has three types of certificate authorities (CAs):
2017-12-14 12:30:07 +00:00
2018-09-27 08:16:17 +00:00
* The **root network CA** that defines the extent of a compatibility zone
* The **doorman CA** that is used instead of the root network CA for day-to-day key signing to reduce the risk of the root
network CA's private key being compromised. This is equivalent to an intermediate certificate in the web PKI
* Each node also serves as its own CA, issuing the child certificates that it uses to sign its identity keys and TLS
certificates
2018-02-28 18:04:08 +00:00
2018-09-27 08:16:17 +00:00
Each certificate contains an X.509 extension that defines the certificate/key's role in the system (see below for details).
It also uses X.509 name constraints to ensure that the X.500 names that encode human meaningful identities are propagated
2018-06-06 11:57:25 +00:00
to all the child certificates properly. The following constraints are imposed:
2018-02-28 18:04:08 +00:00
2018-09-27 08:16:17 +00:00
* Doorman certificates are issued by a network root. Network root certs do not contain a role extension
* Node certificates are signed by a doorman certificate (as defined by the extension)
* Legal identity/TLS certificates are issued by a certificate marked as node CA
* Confidential identity certificates are issued by a certificate marked as well known legal identity
* Party certificates are marked as either a well known identity or a confidential identity
2018-02-28 18:04:08 +00:00
2018-09-27 08:16:17 +00:00
The structure of certificates above the doorman/network map is intentionally left untouched, as they are not relevant to
2018-06-06 11:57:25 +00:00
the identity service and therefore there is no advantage in enforcing a specific structure on those certificates. The
certificate hierarchy consistency checks are required because nodes can issue their own certificates and can set
their own role flags on certificates, and it's important to verify that these are set consistently with the
certificate hierarchy design. As a side-effect this also acts as a secondary depth restriction on issued
certificates.
2018-02-28 18:04:08 +00:00
2017-12-14 12:30:07 +00:00
We can visualise the permissioning structure as follows:
.. image :: resources/certificate_structure.png
:scale: 55%
:align: center
2017-11-27 13:36:52 +00:00
2018-09-27 08:16:17 +00:00
Key pair and certificate formats
--------------------------------
The required key pairs and certificates take the form of the following Java-style keystores (this may change in future to
support PKCS#12 keystores) in the node's `` <workspace>/certificates/ `` folder:
2018-06-06 11:57:25 +00:00
2018-09-27 08:16:17 +00:00
* `` network-root-truststore.jks `` , the network/zone operator's root certificate as provided by them with a standard password. Can be deleted after initial registration
* `` truststore.jks `` , the network/zone operator's root certificate in keystore with a locally configurable password as protection against certain attacks
* `` nodekeystore.jks `` , which stores the node’ s identity key pairs and certificates
* `` sslkeystore.jks `` , which stores the node’ s TLS key pair and certificate
The key pairs and certificates must obey the following restrictions:
2016-11-24 16:38:40 +00:00
2018-06-06 11:57:25 +00:00
1. The certificates must follow the `X.509v3 standard <https://tools.ietf.org/html/rfc5280> `__
2. The TLS certificates must follow the `TLS v1.2 standard <https://tools.ietf.org/html/rfc5246> `__
3. The root network CA, doorman CA, and node CA keys, as well as the node TLS keys, must follow one of the following schemes:
2018-09-27 08:16:17 +00:00
2017-12-14 12:30:07 +00:00
* ECDSA using the NIST P-256 curve (secp256r1)
2018-05-30 16:38:33 +00:00
* ECDSA using the Koblitz k1 curve (secp256k1)
2018-09-27 08:16:17 +00:00
* RSA with 3072-bit key size or higher
2018-05-30 16:38:33 +00:00
2018-09-27 08:16:17 +00:00
4. The node CA certificates must have the basic constraints extension set to true
5. The TLS certificates must have the basic constraints extension set to false
2018-04-04 14:45:49 +00:00
2018-02-28 18:04:08 +00:00
Certificate role extension
--------------------------
2018-06-06 11:57:25 +00:00
Corda certificates have a custom X.509v3 extension that specifies the role the certificate relates to. This extension
2018-03-07 10:39:03 +00:00
has the OID `` 1.3.6.1.4.1.50530.1.1 `` and is non-critical, so implementations outside of Corda nodes can safely ignore it.
2018-02-28 18:04:08 +00:00
The extension contains a single ASN.1 integer identifying the identity type the certificate is for:
1. Doorman
2. Network map
2018-03-07 10:39:03 +00:00
3. Service identity (currently only used as the shared identity in distributed notaries)
4. Node certificate authority (from which the TLS and well-known identity certificates are issued)
5. Transport layer security
6. Well-known legal identity
7. Confidential legal identity
2018-02-28 18:04:08 +00:00
2018-06-06 11:57:25 +00:00
In a typical installation, node administrators need not be aware of these. However, if node certificates are to be
managed by external tools, such as those provided as part of an existing PKI solution deployed within an organisation,
it is important to recognise these extensions and the constraints noted above.
2018-02-28 18:04:08 +00:00
Certificate path validation is extended so that a certificate must contain the extension if the extension was present
in the certificate of the issuer.