<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-housley-lamps-3g-nftypes-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="5G NFType in X.509 Certificates">X.509 Certificate Extension for 5G Network Function Types</title>
    <seriesInfo name="Internet-Draft" value="draft-housley-lamps-3g-nftypes-00"/>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <city>Herndon, VA</city>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <postal>
          <city>Washington, DC</city>
          <country>US</country>
        </postal>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <city>Kista</city>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="D." surname="Migault" fullname="Daniel Migault">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <city>Saint Laurent, QC</city>
          <country>Canada</country>
        </postal>
        <email>daniel.migault@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="23"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies the certificate extension for including
Network Function Typess (NFTypes) for the 5G System in X.509v3 public
key certificates as profiled in RFC 5280.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>The 3rd Generation Partnership Project (3GPP) has specified several
Network Functions (NFs) as part of the service-based architecture within
the 5G System.  The 49 NF types that are defined for 3GPP Release 17 listed
in Table 6.1.6.3.3-1 of <xref target="TS29.510"/>, and each NF type is identified
by as short ASCII string.</t>
      <t>X.509v3 public key certificates <xref target="RFC5280"/> are used to identify
interface instances in the NFs in a 5G system.  The primary function of a
certificate is to bind a public key to the identity of an entity that
holds the corresponding private key, known as the certificate subject.
The certificate subject and the subjectAltName certificate extension can
be used to support identity-based access control decisions.</t>
      <t>This document specifies the NFTypes certificate extension, which provides
a list of NF Types associated with the certificate subject.  The NFTypes
certificate extension can be used to support role-based access control
decisions.</t>
    </section>
    <section anchor="terms">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="cert-ident">
      <name>Certificate Subject Identification</name>
      <t>The Network Domain Security (NDS) Authentication Framework (AF) for 3GPP
Release 17 <xref target="TS33.310"/> provides several patterns for certificate subject
names.  For example, the certificate subject name for an NF instance
follows one of these patterns:</t>
      <artwork><![CDATA[
  (c=<country>), o=<Organization Name>, cn=<Some distinguishing name>

  cn=<hostname>, (ou=<servers>), dc=<domain>, dc=<domain>
]]></artwork>
      <t>When either pattern is used, the cn= portion is a DirectoryString;
however, <xref section="4.1.2.6" sectionFormat="of" target="RFC5280"/>, limits the character set to
either PrintableString or UTF8String.  Note that the PrintableString
has a much more limited set of characters that can be represented.</t>
      <t>When the first pattern is used, the o= portion of the name contains
the home domain as specified in <xref target="TS23.003"/> to identify the public
land mobile network, and it takes the following form:</t>
      <artwork><![CDATA[
  5gc.mnc<MNC>.mcc<MCC>.3gppnetwork.org
]]></artwork>
      <t>where MNC designates the Mobile Network Code, and MCC designates the
Mobile Country Code.</t>
      <t>The certificates are expected to include the SubjectAltName certificate
extension that contains a fully qualified domain name (FQDN), where
the FQDN designates the NF as defined in <xref target="TS23.003"/>.  For example, the
SubjectAltName certificate extension for an NF instance implementing
the AMF might include these FQDNs:</t>
      <artwork><![CDATA[
  amf1.cluster1.net2.amf.5gc.mnc012.mcc345.3gppnetwork.org

  amf1.callback.cluster1.net2.amf.5gc.mnc012.mcc345.3gppnetwork.org
]]></artwork>
      <t>The certificates for entities that can act as TLS clients or servers are
also expected to include a uniformResourceIdentifier in the SubjectAltName
certificate extension that contains the NF Instance ID as specified in
Clause 5.3.2 of <xref target="TS29.571"/>.  For example, the SubjectAltName certificate
extension for an NF Instance ID might be:</t>
      <artwork><![CDATA[
  urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6
]]></artwork>
      <t>Following these patterns facilitates the use of the certificate subject
and the subjectAltName certificate extension to support identity-based
access control decisions.</t>
      <t>When the second pattern is used, the dc= portion of the name contains
a single domain component.  For example, hostname.example.net would
appear in the certificate subject as:</t>
      <artwork><![CDATA[
  cn=hostname, dc=example, dc=net
]]></artwork>
    </section>
    <section anchor="extn">
      <name>Network Functions Certificate Extension</name>
      <t>This section specifies the NFTypes certificate extension, which provides
a list of NF Types associated with the certificate subject.</t>
      <t>The NFTypes certificate extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/>.  The NFTypes extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
      <artwork><![CDATA[
  id-pe-nftypes  OBJECT IDENTIFIER  ::=
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-pe(1) TBD1 }
]]></artwork>
      <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
      <t>The NFTypes extension <bcp14>MUST</bcp14> have the following syntax:</t>
      <artwork><![CDATA[
  NFTypes ::= SEQUENCE SIZE (1..MAX) OF NFType

  NFType ::= IA5String (SIZE (1..32))
]]></artwork>
      <t>The NFTypes <bcp14>MUST</bcp14> contain only the ASCII strings.</t>
      <t>The NFTypes <bcp14>MUST</bcp14> contain at least one NFType.</t>
      <t>The NFTypes <bcp14>MUST NOT</bcp14> contain the same NFType more than once.</t>
      <t>Each NFType <bcp14>MUST</bcp14> contain at least one ASCII character, and each NFType
<bcp14>MUST NOT</bcp14> contain more than 32 ASCII characters.</t>
      <t>The NFType is of type IA5String to permit inclusion of the character
underscore character ('_'), which is not part of the PrintableString
character set.</t>
    </section>
    <section anchor="asn1-mod">
      <name>ASN.1 Module</name>
      <t>This appendix provides an ASN.1 module <xref target="X.680"/> for the NFTypes
certificate extension, and it follows the conventions established
in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
      <sourcecode type="asn.1" markers="true"><![CDATA[
  NFTypeCertExtn
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-nftype(TBD2) }

  DEFINITIONS IMPLICIT TAGS ::=
  BEGIN

  IMPORTS
    EXTENSION
    FROM PKIX-CommonTypes-2009  -- RFC 5912
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-mod(0)
        id-mod-pkixCommon-02(57) } ;


  -- NFTypes Certificate Extension

  ext-NFType EXTENSION ::= {
    SYNTAX NFTypes
    IDENTIFIED BY id-pe-nftype }

  -- NFTypes Certificate Extension OID

  id-pe-nftype  OBJECT IDENTIFIER  ::=
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-pe(1) TBD1 }

  -- NFTypes Certificate Extension Syntax

  NFTypes ::= SEQUENCE SIZE (1..MAX) OF NFType

  NFType ::= IA5String (SIZE (1..32))
 
  END
]]></sourcecode>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document.</t>
      <t>The ASCII strings that specify the NF Types are not standard; an operator
<bcp14>MAY</bcp14> build its own NF Type.  Since the NF Type is used for role-based access
control decisions, the operator that specifies their own ASCII string for an
NF Type <bcp14>MUST</bcp14> ensure that the new NF Type does not match an existing one.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the NFType certificate extension in <xref target="extn"/>, IANA is requested
to assign an object identifier (OID) for the certificate extension.  The
OID for the certificate extension should be allocated in the "SMI Security
for PKIX Certificate Extension" registry (1.3.6.1.5.5.7.1).</t>
      <t>For the ASN.1 Module in <xref target="asn1-mod"/>, IANA is requested to assign an
object identifier (OID) for the module identifier. The OID for the module
should be allocated in the "SMI Security for PKIX Module Identifier"
registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Many thanks to Ben Smeets and Michael Li for their review and comments.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="TS29.510" target="https://www.3gpp.org/ftp/Specs/archive/29_series/29.510/29510-h50.zip">
          <front>
            <title>5G System; Network Function Repository Services; Stage 3 (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:29.510 V17.5.0" value=""/>
        </reference>
        <reference anchor="TS33.310" target="https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-h20.zip">
          <front>
            <title>Network Domain Security (NDS); Authentication Framework (AF) (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:33.310 V17.2.0" value=""/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="TS29.571" target="https://www.3gpp.org/ftp/Specs/archive/29_series/29.571/29571-h50.zip">
          <front>
            <title>5G System; Common Data Types for Service Based Interfaces; Stage 3 (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:29.571 V17.5.0" value=""/>
        </reference>
        <reference anchor="TS23.003" target="https://www.3gpp.org/ftp/Specs/archive/23_series/23.003/23003-h50.zip">
          <front>
            <title>Technical Specification Group Core Network and Terminals; Numbering, addressing and identification (Release 17)</title>
            <author>
              <organization>3rd Generation Partnership Project</organization>
            </author>
            <date year="2022" month="March"/>
          </front>
          <seriesInfo name="3GPP TS:23.003 V17.5.0" value=""/>
        </reference>
      </references>
    </references>
    <section anchor="nftypes">
      <name>Appendix A. NFType Strings</name>
      <t>Each NFType is identified by an ASCII string. Table 6.1.6.3.3-1 of <xref target="TS29.510"/>
defines the ASCII strings for the NF Types specified in 3GPP documents,
which are listed below in alphabetical order.  This list is not exhaustive.</t>
      <artwork><![CDATA[
    "5G_DDNMF"        "ICSCF"           "SCEF"
    "5G_EIR"          "IMS_AS"          "SCP"
    "AANF"            "LMF"             "SCSAS"
    "ADRF"            "MB-SMF"          "SCSCF"
    "AF"              "MB-UPF"          "SEPP"
    "AMF"             "MFAF"            "SMF"
    "AUSF"            "MME"             "SMSF"
    "BSF"             "N3IWF"           "SOR_AF"
    "CBCF"            "NEF"             "SPAF"
    "CEF"             "NRF"             "TSCTSF"
    "CHF"             "NSACF"           "UCMF"
    "DCCF"            "NSSAAF"          "UDM"
    "DRA"             "NSSF"            "UDR"
    "EASDF"           "NSWOF"           "UDSF"
    "GBA_BSF"         "NWDAF"           "UPF"
    "GMLC"            "PCF"
    "HSS"             "PCSCF"
]]></artwork>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
