<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-automation-keyusages-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocDepth="3" tocInclude="true" sortRefs="false" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="EKU for Automation">X.509 Certificate Extended Key Usage (EKU) for Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-automation-keyusages-01"/>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="D." surname="Goltzsche" fullname="David Goltzsche">
      <organization>Siemens Mobility</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>david.goltzsche@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <date year="2024"/>
    <area>sec</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Industrial Automation</keyword>
    <keyword>ERJU</keyword>
    <keyword>extended key usage</keyword>
    <keyword>extension</keyword>
    <keyword>PKI</keyword>
    <abstract>
      <?line 146?>

<t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines KeyPurposeIds for general-purpose and trust anchor configuration files, for software and firmware update packages, and for safety-critical communication to be included in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by industrial automation and the ERJU System Pillar.</t>
    </abstract>
  </front>
  <middle>
    <?line 151?>

<section anchor="Intro">
      <name>Introduction</name>
      <t>Automation hardware and software products will strategically be more safe and secure by fulfilling mandatory, generic system requirements related to cyber security driven by federal offices like the <xref target="EU-CRA">European Union Cyber Resilience Act</xref> governed by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy.
Automation products connected to the internet would bear the CE marking to indicate they comply.
Such regulation was announced in the <xref target="EU-STRATEGY">2020 EU Cybersecurity Strategy</xref>, and complements other legislation in this area, specifically the NIS2 Framework, <xref target="NIS2">Directive on measures for a high common level of cybersecurity across the Union</xref>.
2020 EU Cybersecurity Strategy suggests to implement and extend international standards such as the <xref target="IEC.62443-4-2">Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</xref> and the <xref target="IEC.62443-3-3">Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</xref>. Automation hardware and software products of diverse vendors that are connected on automation networks and the internet build a typical automation solution. Harmonized attributes would allow transparency of security properties and interoperability for vendors in context of secure software and firmware updates, general-purpose configuration, trust anchor configuration, and secure safety communication.</t>
      <t>A concrete example for Automation is a Rail Automation system. The <xref target="ERJU">Europe's Rail Joint Undertaking System Pillar</xref> will deliver a unified operational concept and a functional, safe, and secure system architecture alongside with system requirements for Rail Automation. The deliverables include due consideration of cyber security aspects based on the IEC 62443 series of standards, focused on the European railway network to which <xref target="Directive-2016_797">Directive 2016/797 - Interoperability of the rail system within the EU</xref> applies.</t>
      <t>The ERJU System Pillar Cyber Security Working Group makes use of PKIs to generate X.509 PKI certificates. The certificates are used for the following purposes, among others:</t>
      <ul spacing="normal">
        <li>
          <t>Validating signatures of general-purpose software configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of trust anchor configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of software and firmware update packages.</t>
        </li>
        <li>
          <t>Authenticating communication endpoints authorized for safety-critical communication.</t>
        </li>
      </ul>
      <t><xref target="RFC5280"/> specifies several key usage extensions, defined via KeyPurposeIds, for X.509 certificates. Key usage extensions added to a certificate are meant to express intent as to the purpose of the named usage, for humans and for complying libraries. In addition, the IANA registry "SMI Security for PKIX Extended Key Purpose" <xref target="RFC7299"/> contains additional KeyPurposeIds. The use of the anyExtendedKeyUsage KeyPurposeId, as defined in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, is generally considered a poor practice. This is especially true for certificates, whether they are multi-purpose or single-purpose, within the context of ERJU System Pillar.</t>
      <t>If the purpose of the issued certificates is not restricted, i.e., the type of operations for which a public key contained in the certificate can be used are not specified, those certificates could be used for another purpose than intended, increasing the risk of cross-protocol attacks. Failure to ensure proper segregation of duties means that an application or system that generates the public/private keys and applies for a certificate to the operator certification authority could obtain a certificate that can be misused for tasks that this application or system is not entitled to perform. For example, management of trust anchor is a particularly critical task. A device could potentially accept a trust anchor configuration file signed by a service that uses a certificate with no EKU or with the KeyPurposeId id-kp-codeSigning (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) or id-kp-documentSigning <xref target="RFC9336"/>. A device should only accept trust anchor configuration files if the file is signed with a certificate that has been explicitly issued for this purpose.</t>
      <t>The KeyPurposeId id-kp-serverAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS WWW server, and the KeyPurposeId id-kp-clientAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS WWW client. However, there are currently no KeyPurposeIds for usage with X.509 certificates for safety-critical communication.</t>
      <t>This document addresses the above problems by defining keyPurposeIds for the EKU extension of X.509 public key certificates. These certificates are either used for signing files (general-purpose configuration and trust anchor configuration files, software and firmware update packages) or are used for safety-critical communication.</t>
      <t>Vendor-defined KeyPurposeIds used within a PKI governed by the vendor or a group of vendors typically do not pose interoperability concerns, as non-critical extensions can be safely ignored if unrecognized. However, using or misusing KeyPurposeIds outside of their intended vendor-controlled environment can lead to interoperability issues. Therefore, it is advisable not to rely on vendor-defined KeyPurposeIds. Instead, the specification defines standard KeyPurposeIds to ensure interoperability across various vendors and industries.</t>
      <t>Although the specification focuses on use in industrial automation, the definitions are intentionally broad to allow the use of the KeyPurposeIds defined in this document in other deployments as well. Whether and how any of the KeyPurpose OIDs defined in this document must be described in more detail in the technical standards and certificate policies relevant to the application domain.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="EKU">
      <name>Extended Key Purpose for Automation</name>
      <t>This specification defines the KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication and uses these, respectively, for: signing general-purpose or trust anchor configuration files, signing software or firmware update packages, or authenticating communication peers for safety-critical communication. As described in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, "[i]f the [extended key usage] extension is present, then the certificate <bcp14>MUST</bcp14> only be used for one of the purposes indicated" and "[i]f multiple [key] purposes are indicated the application need not recognize all purposes indicated, as long as the intended purpose is present".</t>
      <t>Systems or applications that verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication <bcp14>SHOULD</bcp14> require that corresponding KeyPurposeIds be specified by the EKU extension. If the certificate requester knows the certificate users are mandated to use these KeyPurposeIds, it <bcp14>MUST</bcp14> enforce their inclusion. Additionally, such a certificate requester <bcp14>MUST</bcp14> ensure that the KeyUsage extension be set to digitalSignature or nonRepudiation (also designated as contentCommitment) for signature verification and if needed to keyEncipherment for secret key encryption and/or keyAgreement for key agreement.</t>
    </section>
    <section anchor="include-EKU">
      <name>Including the Extended Key Purpose in Certificates</name>
      <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. The EKU extension syntax is repeated here for convenience:</t>
      <artwork><![CDATA[
   ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId

   KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
      <t>As described in <xref target="RFC5280"/>, the EKU extension may, at the option of the certificate issuer, be either critical or non-critical. The inclusion of KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication in a certificate indicates that the public key encoded in the certificate has been certified for the following usages:</t>
      <ul spacing="normal">
        <li>
          <t>id-kp-configSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-configSigning may be used for verifying signatures of general-purpose configuration files of various formats (for example XML, YAML, or JSON). Configuration files are used to configure hardware or software.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-trustanchorSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-trustanchorSigning may be used for verifying signatures of trust anchor configuration files of various formats (for example XML, YAML, or JSON).
Trust anchor configuration files are used to add or remove trust anchors to the trust store of a device.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-updateSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-updateSigning may be used for verifying signatures of secure software or firmware update packages. Update packages are used to install software (including bootloader, firmware, safety-related applications, and others) on systems.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-safetyCommunication</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-safetyCommunication may be used to authenticate a communication peer for safety-critical communication based on TLS or other protocols.</t>
        </li>
      </ul>
      <artwork><![CDATA[
   id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) 3 }

   id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
   id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
   id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
   id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }
]]></artwork>
    </section>
    <section anchor="ca-implication">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority <bcp14>MUST</bcp14> ensure that the correct values for the EKU extension as well as the KU extension are inserted in each certificate that is issued. The inclusion of the id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds does not preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document. These extended key usage key purposes do not introduce new security risks but instead reduces existing security risks by providing the means to identify if the certificate is generated to verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party or the relying party software may additionally prohibit use of specific combinations of KeyPurposeIds. The procedure for allowing or disallowing combinations of KeyPurposeIds using Excluded KeyPurposeId and Permitted KeyPurposeId, as carried out by a relying party, is defined in <xref section="4" sectionFormat="of" target="RFC9336"/>. Examples of Excluded KeyPurposeIds include the presence of the anyExtendedKeyUsage KeyPurposeId or the complete absence of the EKU extension in a certificate. Examples of Permitted KeyPurposeIds include the presence of id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds.</t>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>In some security protocols, such as <xref target="RFC5246">TLS 1.2</xref>, certificates are exchanged in the clear. In other security protocols, such as <xref target="RFC8446">TLS 1.3</xref>, the certificates are encrypted. The inclusion of the EKU extension can help an observer determine the purpose of the certificate. In addition, if the certificate is issued by a public certification authority, the inclusion of an EKU extension can help an attacker to monitor the Certificate Transparency logs <xref target="RFC9162"/> to identify the purpose of the certificate.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following ASN.1 <xref target="X.680"/> module OID in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">id-mod-automation-eku</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is also requested to register the following OIDs in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).  These OIDs are defined in <xref target="include-EKU"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">id-kp-configSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">id-kp-trustanchorSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">id-kp-updateSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">id-kp-safetyCommunication</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknow">
      <name>Acknowledgments</name>
      <t>We would like to thank the authors of <xref target="RFC9336"/> and <xref target="RFC9509"/> for  their excellent template.</t>
      <t>We also thank all reviewers of this document for their valuable feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC.X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC.X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9336">
          <front>
            <title>X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing</title>
            <author fullname="T. Ito" initials="T." surname="Ito"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines a general-purpose Document-Signing KeyPurposeId for inclusion in the Extended Key Usage (EKU) extension of X.509 public key certificates. Document-Signing applications may require that the EKU extension be present and that a Document-Signing KeyPurposeId be indicated in order for the certificate to be acceptable to that Document-Signing application.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9336"/>
          <seriesInfo name="DOI" value="10.17487/RFC9336"/>
        </reference>
        <reference anchor="RFC9509">
          <front>
            <title>X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Ekman" initials="J." surname="Ekman"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines encrypting JSON objects in HTTP messages, using JSON Web Tokens (JWTs), and signing the OAuth 2.0 access tokens KeyPurposeIds for inclusion in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by Network Functions (NFs) for the 5G System.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9509"/>
          <seriesInfo name="DOI" value="10.17487/RFC9509"/>
        </reference>
        <reference anchor="Directive-2016_797" target="https://eur-lex.europa.eu/eli/dir/2016/797/2020-05-28">
          <front>
            <title>Directive 2016/797 - Interoperability of the rail system within the EU</title>
            <author>
              <organization>European Parliament, Council of the European Union</organization>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="ERJU" target="https://rail-research.europa.eu/wp-content/uploads/2023/10/ERJU_SP_CyberSecurity_Review3_Files.zip">
          <front>
            <title>SP-Cybersecurity-SharedCybersecurityServices - Review 3 Final Draft Specs (V0.90)</title>
            <author>
              <organization>Europe's Rail Joint Undertaking</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-CRA" target="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act">
          <front>
            <title>Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUCIL on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-STRATEGY" target="https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0">
          <front>
            <title>The EU's Cybersecurity Strategy for the Digital Decade</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="NIS2" target="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive">
          <front>
            <title>Directive (EU) 2022/2555 of the European Parliament and of the Council</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="IEC.62443-4-2" target="https://webstore.iec.ch/publication/34421">
          <front>
            <title>Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
          <seriesInfo name="IEC 62443-4-2:2019" value=""/>
        </reference>
        <reference anchor="IEC.62443-3-3" target="https://webstore.iec.ch/publication/7033">
          <front>
            <title>Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2013" month="August"/>
          </front>
          <seriesInfo name="IEC 62443-3-3:2013" value=""/>
        </reference>
      </references>
    </references>
    <?line 299?>

<section anchor="asn1">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and
<xref target="X.690"/>.</t>
      <sourcecode type="asn1"><![CDATA[
<CODE BEGINS>

Automation-EKU
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-eu-automation-eku (TBD1) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- OID Arc

id-kp OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

-- Extended Key Usage Values

id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }

END


<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="history">
      <name>History of Changes</name>
      <t>[RFC Editor: Please remove this appendix in the release version of the document.]</t>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed some minor nids and wording issues</t>
        </li>
      </ul>
      <t>draft-ietf-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Updated document and filename after WG adoption</t>
        </li>
      </ul>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Updated last paragraph of Section 1 addressing WG adoption comments by Rich and Russ</t>
        </li>
        <li>
          <t>Updated name and OID of ASN.1 module</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Broadened the scope to general automation use case and use ERJU as an example.</t>
        </li>
        <li>
          <t>Fixed some nits reported.</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-eu-rail-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Initial version of the document following best practices from RFC 9336 and RFC 9509</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Fazekas-Zisch" fullname="Szofia Fazekas-Zisch">
        <organization abbrev="Siemens">Siemens AG Digital Industries Factory Automation</organization>
        <address>
          <postal>
            <street>Breslauer Str. 5</street>
            <city>Fuerth</city>
            <code>90766</code>
            <country>Germany</country>
          </postal>
          <email>szofia.fazekas-zisch@siemens.com</email>
          <uri>https://www.siemens.com</uri>
        </address>
      </contact>
      <contact initials="B." surname="Fouques" fullname="Baptiste Fouques">
        <organization>Alstom</organization>
        <address>
          <email>baptiste.fouques@alstomgroup.com</email>
        </address>
      </contact>
      <contact initials="D. G." surname="Orta" fullname="Daniel Gutierrez Orta">
        <organization>CAF Signalling</organization>
        <address>
          <email>daniel.gutierrez@cafsignalling.com</email>
        </address>
      </contact>
      <contact initials="M." surname="Weller" fullname="Martin Weller">
        <organization>Hitachi Rail</organization>
        <address>
          <email>martin.weller@urbanandmainlines.com</email>
        </address>
      </contact>
      <contact initials="N." surname="Poyet" fullname="Nicolas Poyet">
        <organization>SNCF</organization>
        <address>
          <email>nicolas.poyet@sncf.fr</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
