<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/css" href="https://chaoswelle.de/skins/common/feed.css?97"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
		<id>https://chaoswelle.de/index.php?action=history&amp;feed=atom&amp;title=HAM-PKI%2FPolicy</id>
		<title>HAM-PKI/Policy - Versionsgeschichte</title>
		<link rel="self" type="application/atom+xml" href="https://chaoswelle.de/index.php?action=history&amp;feed=atom&amp;title=HAM-PKI%2FPolicy"/>
		<link rel="alternate" type="text/html" href="https://chaoswelle.de/index.php?title=HAM-PKI/Policy&amp;action=history"/>
		<updated>2026-04-18T03:41:03Z</updated>
		<subtitle>Versionsgeschichte für diese Seite in Chaoswelle</subtitle>
		<generator>MediaWiki 1.11.2</generator>

	<entry>
		<id>https://chaoswelle.de/index.php?title=HAM-PKI/Policy&amp;diff=10529&amp;oldid=prev</id>
		<title>DO1GL: HAM-PKI policy work in progress</title>
		<link rel="alternate" type="text/html" href="https://chaoswelle.de/index.php?title=HAM-PKI/Policy&amp;diff=10529&amp;oldid=prev"/>
				<updated>2014-12-27T18:27:35Z</updated>
		
		<summary type="html">&lt;p&gt;HAM-PKI policy work in progress&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= ChaosWelle PKI Certification And Revocation Policy =&lt;br /&gt;
&lt;br /&gt;
This document is a WIP draft policy listing the conditions required to issue HAM-PKI certificates by Chaoswelle CA, as well as the conditions for revocation of such certificates.&lt;br /&gt;
&lt;br /&gt;
== Certificate Issuance ==&lt;br /&gt;
&lt;br /&gt;
The Chaoswelle CA will issue HAM-PKI Certificates ('''Certs''') to '''Applicants''' that have been successfully '''Authorized'''.&lt;br /&gt;
&lt;br /&gt;
=== Certs ===&lt;br /&gt;
&lt;br /&gt;
A HAM-PKI '''Cert''' created by Chaoswelle CA must contain the following information in its distinguished name (DN):&lt;br /&gt;
&lt;br /&gt;
* Full Name (&amp;lt;code&amp;gt;CN&amp;lt;/code&amp;gt;)&lt;br /&gt;
* E-Mail (&amp;lt;code&amp;gt;OID.1.2.840.113549.1.9.1&amp;lt;/code&amp;gt;)&lt;br /&gt;
* Callsign (&amp;lt;code&amp;gt;OID.1.3.6.1.4.1.12348.1.1&amp;lt;/code&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
TODO: Are additional fields needed / allowed?&lt;br /&gt;
&lt;br /&gt;
An audit record is created for every issued '''Cert''' containing the following data:&lt;br /&gt;
&lt;br /&gt;
* Full Name&lt;br /&gt;
* Postal Address&lt;br /&gt;
* E-Mail&lt;br /&gt;
* Callsign&lt;br /&gt;
* HAM-PKI user who approved the request&lt;br /&gt;
* Date and Time of approval&lt;br /&gt;
* Certificate&lt;br /&gt;
&lt;br /&gt;
=== Applicants ===&lt;br /&gt;
&lt;br /&gt;
'''Certs''' are issued to the following entities:&lt;br /&gt;
&lt;br /&gt;
* Natural persons (the Callsign must be assigned to that person and the assignment must be valid)&lt;br /&gt;
* TODO: Training callsigns&lt;br /&gt;
* TODO: Club stations (have a separate field in the DN for club vs. natural person assignee?)&lt;br /&gt;
* TODO: Other Kinds Of Applicants?&lt;br /&gt;
&lt;br /&gt;
=== Authorization ===&lt;br /&gt;
&lt;br /&gt;
==== Natural Person ====&lt;br /&gt;
&lt;br /&gt;
A natural person needs to provide the following documents to be entitled for a '''Cert''':&lt;br /&gt;
&lt;br /&gt;
* Callsign assignment document scan(must show the person's full name and be valid)&lt;br /&gt;
* A recent utility bill scan (not older than 31 days, must show the person's full name and address)&lt;br /&gt;
&lt;br /&gt;
== Certificate Revocation ==&lt;br /&gt;
&lt;br /&gt;
Chaoswelle CA will be operating a [http://en.wikipedia.org/wiki/Revocation_list CRL] and indicate that CRL in the issued '''Certs'''. To put a given '''Cert''' on the CRL, proof is needed that the '''Cert''' was issued to an incorrect '''Applicant''', i.e. the Callsign, Full Name or E-Mail Address values of the '''Cert''' do not belong to the person using the '''Cert'''.&lt;br /&gt;
&lt;br /&gt;
This proof must be presented by the actual owner of the Callsign or E-Mail Address, or by a third party that can believably show that the '''Cert''' was issued wrongly.&lt;br /&gt;
&lt;br /&gt;
'''Certs''' will only be revoked if they were issued to the wrong person, or used by a different person. Technical abuse of Internet services by the official owner of a '''Cert''' does not qualify for revocation. Instead, technical measures must be taken at the abused system.&lt;/div&gt;</summary>
		<author><name>DO1GL</name></author>	</entry>

	</feed>