<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-documentsigning-eku-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="EKU for Document Signing">General Purpose Extended Key Usage (EKU) for Document Signing X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-documentsigning-eku-02"/>
    <author initials="T." surname="Ito" fullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>RFC5280 specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. This document defines a general
purpose document signing KeyPurposeId for inclusion in the Extended Key
Usage (EKU) extension of X.509 public key certificates. 
Document Signing applications may require that the EKU extension 
be present and that a document signing KeyPurposeId be indicated 
in order for the certificate to be acceptable 
to that Document Signing application.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-documentsigning-eku/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME (LAMPS) Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/documentsigning-eku"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC5280"/> specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. In addition, several
KeyPurposeIds have been added <xref target="RFC7299"/> under the IANA repository "SMI
Security for PKIX Extended Key Purpose". While usage of the
"anyExtendedKeyUsage" KeyPurposeId is bad practice for publicly trusted
certificates, there is no public and general KeyPurposeId explicitly
assigned for Document Signing. The current practice is to
use id-kp-emailProtection, id-kp-codeSigning or a vendor-defined
KeyPurposeId for general document signing purposes.</t>
      <t>In circumstances where code signing and S/MIME certificates are also
widely used for document signing, the technical or policy changes that
are made to code signing and S/MIME certificates may cause unexpected
behaviors or have an adverse impact such as decreased cryptographic
agility on the document signing ecosystem and vice versa.</t>
      <t>There is no issue if the vendor-defined KeyPurposeIds are used in a PKI
(or a trust program) governed by the vendor. However, if the
KeyPurposeId is used outside of vendor governance, the usage can easily
become out of control (e.g. - When the end user encounters
vendor-defined KeyPurposeIds, they might want to ask that vendor about
use of the certificate, however, the vendor may not know about the
particular use. - If the issuance of the cert is not under the control
of the KeyPurposeId owner, there is no way for the KeyPurposeId owner to
know what the impact will be if any change is made to the KeyPurposeId
in question, and it would restrict vendor's choice of OID management.
etc.).</t>
      <t>Therefore, it is not favorable to use a vendor-defined KeyPurposeId for
signing a document that is not governed by the vendor.</t>
      <t>This document defines a extended key purpose identifier for Document
Signing.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="extended-key-purpose-for-document-signing">
      <name>Extended Key Purpose for Document Signing</name>
      <t>This specification defines the KeyPurposeId id-kp-documentSigning.</t>
      <t>As described in <xref target="RFC5280"/>, If the Extended Key Usage extension is present, 
then the certificate MUST only be used for one of the purposes indicated.
<xref target="RFC5280"/> also describes that If multiple key purposes are
indicated the application need not recognize all purposes indicated,
as long as the intended purpose is present.</t>
      <t>Document Signing applications MAY require that the Extended Key Usage extension be present 
and that a id-kp-documentSigning be indicated in order for the certificate to be acceptable 
to that Document Signing application.</t>
      <t>The term "Document Signing" in this document refers to digitally signing
contents that are consumed by people. To be more precise, contents are
intended to be shown to a person with printable or displayable form by
means of services or software, rather than processed by machines.</t>
      <section anchor="ext">
        <name>Including the Extended Key Purpose for Document Signing in Certificates</name>
        <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on the
Internet. The extension indicates one or more purposes for which the
certified public key is valid. The EKU extension can be used in
conjunction with the key usage extension, which indicates the set of
basic cryptographic operations for which the certified key may be used.</t>
        <t>The EKU extension syntax is repeated here for convenience:</t>
        <artwork><![CDATA[
  ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId
  KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
        <t>This specification defines the KeyPurposeId id-kp-documentSigning.
Inclusion of this KeyPurposeId in a certificate indicates that the
public key encoded in the certificate has been certified to be used for
cryptographic operations on contents that are consumed by people.</t>
        <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) 3 }
  id-kp-documentSigning  OBJECT IDENTIFIER  ::=  { id-kp XX }
]]></artwork>
      </section>
    </section>
    <section anchor="using-the-extended-key-purpose-for-document-signing-in-a-certificate">
      <name>Using the Extended Key Purpose for Document Signing in a Certificate</name>
      <t><xref target="RFC8358"/> specifies the conventions for digital signatures on
Internet-Drafts. This is one of the intended use cases for the general
document signing key purpose described in this document.
<xref target="RFC8358"/> uses CMS to digitally sign a wide array of files such as
ASCII, PDF, EPUB, HTML etc. Currently, there are no specification
regarding key purposes for certificates signing those files
except those which are defined by the software vendor.</t>
      <t>The signed contents of Internet-Drafts are primarily intended to be
consumed by people. To be more precise, contents are intended to be
shown to a person in a printable or displayable form by means of services
or software, rather than processed by machines. The digital signature on
the contents is to indicate to the recipient of the contents that the
content has not changed since it was signed by the identity indicated as
the subject of the certificate. To validate the digital signature which
is signed on contents intended to be consumed by people, implementations
MAY perform the steps below during certificate validation:</t>
      <t>The implementation MAY examine the KeyPurposeId(s) included in the
Extended Key Usage extension as follows:
A Restriction on Extended Key Usage is derived and implemented from 
(or configured with) the policy to which the implementation conforms.</t>
      <ol spacing="normal" type="1"><li>If there are no restrictions set for the relying party and the
relying party software, the certificate is acceptable.</li>
        <li>
          <t>If there are restrictions set for the replying party and relying
party software, then process the KeyPurposeId(s) as described below.  </t>
          <t>
Each restriction on "Excluded KeyPurposeId" or "Permitted
KeyPurposeId" is handled as described below.  </t>
          <t>
This procedure is intended to permit or prohibit presence of a
certain KeyPurposeId or complete absence of KeyPurposeIds. It is
outside the scope of this document, but the relying party can permit
or prohibit combinations of KeyPurposeIds. A consideration on
prohibiting combinations of KeyPurposeIds is described in the
Security Considerations section of this document.  </t>
          <dl>
            <dt>Excluded KeyPurposeId procedure:</dt>
            <dd>
              <t>"Excluded KeyPurposeId" is a
KeyPurposeId which the relying party or the relying party software
prohibits. Examples of "Excluded KeyPurposeId" are, presence of the
anyExtendedKeyUsage KeyPurposeId or complete absence of the EKU
extension in a certificate. If a KeyPurposeId of the certificate
meets the conditions set by the "Excluded KeyPurposeId" restriction,
the relying party or the relying party software rejects the
certificate.</t>
            </dd>
          </dl>
          <t>
Permitted KeyPurposeId procedure:  </t>
          <t>
: "Permitted KeyPurposeId" is a KeyPurposeId which the relying party or
the relying party software accepts. Examples of "Permitted
KeyPurposeId" are, presence of this general document signing
KeyPurposeId and/or protocol specific document signing-type
KeyPurposeIds. If a KeyPurposeId of the certificate meets the
condition set by a "Permitted KeyPurposeId" restriction, the
certificate is acceptable. Otherwise, relying party or the relying
party software rejects the certificate.</t>
        </li>
      </ol>
      <t>When a single application has the capability to process various data
formats, the software may choose to make the excluded and permitted
decisions separately in accordance with the format it is handling (e.g.
text, pdf, etc).</t>
    </section>
    <section anchor="implications-for-a-certification-authority">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority MUST
ensure that the correct values for the EKU extension are inserted in
each certificate that is issued. Unless certificates are governed by a
vendor specific PKI (or trust program), certificates that indicate usage
for document signing MAY include the id-kp-documentSigning KeyPurposeId.
The inclusion of the id-kp-documentSigning KeyPurposeId does not
preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The usage of id-kp-documentSigning KeyPurposeId is to provide an
alternative to id-kp-emailProtection being used for non-email purposes
and id-kp-codeSigning being used to sign objects other than binary code.
This extended key purpose does not introduce new security risks but
instead reduces existing security risks by providing means to separate
other extended key purposes used for communication protocols namely, TLS
or S/MIME etc. in order to minimize the risk of cross-protocol attacks.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party
or relying party software may additionally prohibit use of specific
combinations of KeyPurposeIds.</t>
      <t>While a specific protocol or signing scheme may choose to come up with
their own KeyPurposeIds, some may not have significant motive or
resources to set up and manage their own KeyPurposeIds. This general
document signing KeyPurposeId may be used as a stop-gap for those that
intend to define their own KeyPurposeId or those who do not intend to
set up an KeyPurposeId but still would like to distinguish document
signing from other usages.</t>
      <t>Introduction of this id-kp-documentSigning KeyPurposeId does not
introduce any new security or privacy concerns.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests that IANA make two assignments. One assignment is
for the addition of the id-kp-documentSigning object identifier (OID),
as defined in <xref target="ext"/>, to the "SMI Security for PKIX Extended Key
Purpose" (1.3.6.1.5.5.7.3) registry. The other assignment is for the
addition of the id-mod-docsign-eku ASN.1 module <xref target="X.680"/> object
identifier (OID), as defined in Appendix A, to the "SMI Security for
PKIX Module Identifier" (1.3.6.1.5.5.7.0) registry.  No further action
is necessary by IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2015" month="November"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8824-1:2015"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8358">
          <front>
            <title>Update to Digital Signatures on Internet-Draft Documents</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>RFC 5485 specifies the conventions for digital signatures on Internet-Drafts.  The Cryptographic Message Syntax (CMS) is used to create a detached signature, which is stored in a separate companion file so that no existing utilities are impacted by the addition of the digital signature.</t>
              <t>The RFC Editor recently published the first RFC that includes non- ASCII characters in a text file.  The conventions specified in RFC 7997 were followed.  We assume that non-ASCII characters will soon start appearing in Internet-Drafts as well.  This document updates the handling of digital signatures on Internet-Drafts that contain non-ASCII characters in a text file.</t>
              <t>This document updates RFC 5485.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8358"/>
          <seriesInfo name="DOI" value="10.17487/RFC8358"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="appendix-a-asn1-module">
      <name>Appendix A. ASN.1 Module</name>
      <t>The following ASN.1 module provides the complete definition of the
Document Signing KeyPurposeId.</t>
      <artwork><![CDATA[
  DocSignEKU { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-docsign-eku(TBD1) }

  DEFINITIONS EXPLICIT TAGS ::=

  BEGIN

  -- EXPORTS ALL --

  -- IMPORTS NOTHING --

  -- OID Arc --

  id-kp  OBJECT IDENTIFIER  ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

  -- Document Signing Extended Key Usage --

  id-kp-documentSigning OBJECT IDENTIFIER ::= { id-kp TBD2 }

  END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Russ Housley for verifying the ASN.1 module.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
