This Certification Practice Statement (CPS) describes the practices, procedures, and controls used by ChanakanLabs in operating its private Public Key Infrastructure (PKI). This CPS applies to all certificates issued by the ChanakanLabs Certification Authority (CA), including document-signing certificates, OCSP responder certificates, and Timestamp Authority (TSA) certificates.
This PKI is operated for private, non-public trust use cases, including internal, academic, and organizational document signing. Certificates issued under this CPS are not intended to be equivalent to nationally qualified or legally regulated trust services.
Document-signing certificates are issued to identified natural persons and are intended for:
These certificates include:
digitalSignature, nonRepudiationemailProtection, codeSigningThey must not be used for TLS, authentication, or encryption unless explicitly stated.
OCSP responder certificates are issued to the OCSP service operated by ChanakanLabs and are used exclusively to sign OCSP responses.
OCSPSigningdigitalSignatureid-pkix-ocsp-nocheck extension presentOCSP responder certificates are not subject to revocation checking.
TSA certificates are issued for the sole purpose of issuing RFC 3161 timestamp tokens.
timeStampingdigitalSignature, nonRepudiationid-pkix-ocsp-nocheck extension presentTSA certificates are long-lived and not revoked during normal operation.
Applicants for document-signing certificates must provide identifying information including:
A pseudonymous internal identifier is used in the serialNumber subject attribute. National identification
numbers are not stored in certificates to preserve privacy.
Identity verification is performed using methods appropriate to the intended trust context (e.g., organizational records, academic affiliation, or direct operator verification).
Service certificates are issued to systems controlled by ChanakanLabs. No personal identity verification is applicable.
Certificates are issued only after:
All certificates are generated using cryptographic keys of at least 2048-bit RSA.
Revocation information is provided via:
ChanakanLabs supports long-term validation through RFC 3161 timestamping, OCSP-based revocation checking, and embedding of validation data in signed documents when supported by client software.
Automatic LTV recognition depends on the trust policies of the validating application.
| Key Type | Typical Lifetime |
|---|---|
| Root CA | 10–20 years |
| Intermediate CA | 5–10 years |
| TSA | 5–10 years |
| Document Signing | 1 year or less |
The following events are logged:
Certificates issued under this CPS are provided without warranty. ChanakanLabs shall not be liable for damages arising from misuse, misinterpretation, or reliance beyond the intended scope of this PKI.
This CPS documents internal practices and does not claim compliance with eIDAS, Adobe AATL, or other regulated trust frameworks unless explicitly stated.
This CPS may be updated at any time. Updated versions will be published at:
https://pki.chanakanlabs.com/cps.html
ChanakanLabs PKI Operations
Email: [email protected]