PKI for Network Engineers (9/?): Elliptic Curve Setup

Greetings fellow networkers,

In this installment of PKI for network engineers, we’re going to build up our two tier Elliptic Curve PKI hierarchy in one shot.  There are a lot of tasks, but only a few of them differ from our RSA setup.  I’ll highlight those below.

  1. Cryptographic service provider and Hash algorithm.
    1. I’m using ECDSA 384 and SHA384
      1. Although the Microsoft CA supports 521 bit EC Keys, Cisco IOS maxes at 384
  2. No NDES/SCEP.  NDES supports RSA only for in-band device enrollment
    1. There is a new standard called EST (enrollment over secure transport)
      1. IOS and IOS-XE support EST as clients
      2. There’s an open source project called libEST you can use to test.
      3. Cisco ISE as of version 2.2 supports EST
  3. Web enrollment doesn’t support version 3 or 4 templates
    1. When duplicating templates, be aware of this fact
  4. Mind your signatures and public key algorithms.
    1. RSA public keys can be signed by a EC CA and vice versa.  Keep this in mind when creating your templates and take care to test them and inspect your certificates to make sure you’re getting what you think you’re getting

 

 

Resources:

Settings, scriptlets, helpful text blocks:

 

One thought on “PKI for Network Engineers (9/?): Elliptic Curve Setup

  1. Hi Mr. Densmode 😉
    thanks for that great introduction!
    May I ask you about the CRL procedure on a client?
    Lets say I have a CDP configuration like this:
    http://crl.test-server-1.domain/crld/%3CCAName%3E+.crl
    http://crl.test.server-2.domain/crld/%3CCAName%3E+.crl
    http://ocsp-test-server

    My questions:
    1) must the a Client proceed/check all 3 Links?
    2) has oscp a higher priority? and CRLs can be skipped?
    3) What happens if one of the CRLs is not online?

    Thanks in advanced,
    Thomas

Leave a Reply