<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-documentsigning-eku-03" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="EKU for Document Signing">General Purpose Extended Key Usage (EKU) for Document Signing X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-documentsigning-eku-03"/>
    <author initials="T." surname="Ito" fullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="April" day="01"/>
    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>RFC5280 specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. This document defines a general
purpose document signing KeyPurposeId for inclusion in the Extended Key
Usage (EKU) extension of X.509 public key certificates. 
Document Signing applications may require that the EKU extension 
be present and that a document signing KeyPurposeId be indicated 
in order for the certificate to be acceptable 
to that Document Signing application.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-documentsigning-eku/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME (LAMPS) Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/documentsigning-eku"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC5280"/> specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. In addition, several
KeyPurposeIds have been added <xref target="RFC7299"/> under the IANA repository "SMI
Security for PKIX Extended Key Purpose". While usage of the
"anyExtendedKeyUsage" KeyPurposeId is bad practice for publicly trusted
certificates, there is no public and general KeyPurposeId explicitly
assigned for Document Signing. The current practice is to
use id-kp-emailProtection, id-kp-codeSigning or a vendor-defined
KeyPurposeId for general document signing purposes.</t>
      <t>In circumstances where code signing and S/MIME certificates are also
widely used for document signing, the technical or policy changes that
are made to code signing and S/MIME certificates may cause unexpected
behaviors or have an adverse impact such as decreased cryptographic
agility on the document signing ecosystem and vice versa.</t>
      <t>There is no issue if the vendor-defined KeyPurposeIds are used in a PKI
(or a trust program) governed by the vendor. However, if the
KeyPurposeId is used outside of vendor governance, the usage can easily
become out of control (e.g. - When the end user encounters
vendor-defined KeyPurposeIds, they might want to ask that vendor about
use of the certificate, however, the vendor may not know about the
particular use. - If the issuance of the cert is not under the control
of the KeyPurposeId owner, there is no way for the KeyPurposeId owner to
know what the impact will be if any change is made to the KeyPurposeId
in question, and it would restrict vendor's choice of OID management.
etc.).</t>
      <t>Therefore, it is not favorable to use a vendor-defined KeyPurposeId for
signing a document that is not governed by the vendor.</t>
      <t>This document defines a extended key purpose identifier for Document
Signing.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="extended-key-purpose-for-document-signing">
      <name>Extended Key Purpose for Document Signing</name>
      <t>This specification defines the KeyPurposeId id-kp-documentSigning.</t>
      <t>As described in <xref target="RFC5280"/>, If the Extended Key Usage extension is present, 
then the certificate MUST only be used for one of the purposes indicated.
<xref target="RFC5280"/> also describes that If multiple key purposes are
indicated the application need not recognize all purposes indicated,
as long as the intended purpose is present.</t>
      <t>Document Signing applications MAY require that the Extended Key Usage extension be present 
and that the id-kp-documentSigning be indicated in order for the certificate to be acceptable 
to that Document Signing application.</t>
      <t>The term "Document Signing" in this document refers to digitally signing
contents that are consumed by people. To be more precise, contents are
intended to be shown to a person with printable or displayable form by
means of services or software, rather than processed by machines.</t>
      <section anchor="ext">
        <name>Including the Extended Key Purpose for Document Signing in Certificates</name>
        <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on the
Internet. The extension indicates one or more purposes for which the
certified public key is valid. The EKU extension can be used in
conjunction with the key usage extension, which indicates the set of
basic cryptographic operations for which the certified key may be used.</t>
        <t>The EKU extension syntax is repeated here for convenience:</t>
        <artwork><![CDATA[
  ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId
  KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
        <t>As described in <xref target="RFC5280"/>, EKU extension may, 
at the option of the certificate issuer, be either critical or non-critical.</t>
        <t>This specification defines the KeyPurposeId id-kp-documentSigning.
Inclusion of this KeyPurposeId in a certificate indicates that the
public key encoded in the certificate has been certified to be used for
cryptographic operations on contents that are consumed by people.</t>
        <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) 3 }
  id-kp-documentSigning  OBJECT IDENTIFIER  ::=  { id-kp XX }
]]></artwork>
      </section>
    </section>
    <section anchor="using-the-extended-key-purpose-for-document-signing-in-a-certificate">
      <name>Using the Extended Key Purpose for Document Signing in a Certificate</name>
      <t><xref target="RFC8358"/> specifies the conventions for digital signatures on
Internet-Drafts. This is one of the intended use cases for the general
document signing key purpose described in this document.
<xref target="RFC8358"/> uses CMS to digitally sign a wide array of files such as
ASCII, PDF, EPUB, HTML etc. Currently, there are no specification
regarding key purposes for certificates signing those files
except those which are defined by the software vendor.</t>
      <t>The signed contents of Internet-Drafts are primarily intended to be
consumed by people. To be more precise, contents are intended to be
shown to a person in a printable or displayable form by means of services
or software, rather than processed by machines. The digital signature on
the contents is to indicate to the recipient of the contents that the
content has not changed since it was signed by the identity indicated as
the subject of the certificate. To validate the digital signature which
is signed on contents intended to be consumed by people, implementations
MAY perform the steps below during certificate validation:</t>
      <t>The implementation MAY examine the KeyPurposeId(s) included in the
Extended Key Usage extension as follows:
A Restriction on Extended Key Usage is derived and implemented from 
(or configured with) the policy to which the implementation conforms.</t>
      <ol spacing="normal" type="1"><li>If there are no restrictions set for the relying party and the
relying party software, the certificate is acceptable.</li>
        <li>
          <t>If there are restrictions set for the relying party and relying
party software, then process the KeyPurposeId(s) as described below.  </t>
          <t>
Each restriction on "Excluded KeyPurposeId" or "Permitted
KeyPurposeId" is handled as described below.  </t>
          <t>
This procedure is intended to permit or prohibit presence of a
certain KeyPurposeId or complete absence of KeyPurposeIds. It is
outside the scope of this document, but the relying party can permit
or prohibit combinations of KeyPurposeIds. A consideration on
prohibiting combinations of KeyPurposeIds is described in the
Security Considerations section of this document.  </t>
          <dl>
            <dt>Excluded KeyPurposeId procedure:</dt>
            <dd>
              <t>"Excluded KeyPurposeId" is a
KeyPurposeId which the relying party or the relying party software
prohibits. Examples of "Excluded KeyPurposeId" are, presence of the
anyExtendedKeyUsage KeyPurposeId or complete absence of the EKU
extension in a certificate. If a KeyPurposeId of the certificate
meets the conditions set by the "Excluded KeyPurposeId" restriction,
the relying party or the relying party software rejects the
certificate.</t>
            </dd>
            <dt>Permitted KeyPurposeId procedure:</dt>
            <dd>
              <t>"Permitted KeyPurposeId" is a KeyPurposeId which the relying party or
the relying party software accepts. Examples of "Permitted
KeyPurposeId" are, presence of this general document signing
KeyPurposeId and/or protocol specific document signing-type
KeyPurposeIds. If a KeyPurposeId of the certificate meets the
condition set by a "Permitted KeyPurposeId" restriction, the
certificate is acceptable. Otherwise, relying party or the relying
party software rejects the certificate.</t>
            </dd>
          </dl>
        </li>
      </ol>
      <t>When a single application has the capability to process various data
formats, the software may choose to make the excluded and permitted
decisions separately in accordance with the format it is handling (e.g.
text, pdf, etc).</t>
    </section>
    <section anchor="implications-for-a-certification-authority">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority MUST
ensure that the correct values for the EKU extension are inserted in
each certificate that is issued. Unless certificates are governed by a
vendor specific PKI (or trust program), certificates that indicate usage
for document signing MAY include the id-kp-documentSigning KeyPurposeId.
The inclusion of the id-kp-documentSigning KeyPurposeId does not
preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The usage of id-kp-documentSigning KeyPurposeId is to provide an
alternative to id-kp-emailProtection being used for non-email purposes
and id-kp-codeSigning being used to sign objects other than binary code.
This extended key purpose does not introduce new security risks but
instead reduces existing security risks by providing means to separate
other extended key purposes used for communication protocols namely, TLS
or S/MIME etc. in order to minimize the risk of cross-protocol attacks.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party
or relying party software may additionally prohibit use of specific
combinations of KeyPurposeIds.</t>
      <t>While a specific protocol or signing scheme may choose to come up with
their own KeyPurposeIds, some may not have significant motive or
resources to set up and manage their own KeyPurposeIds. This general
document signing KeyPurposeId may be used as a stop-gap for those that
intend to define their own KeyPurposeId or those who do not intend to
set up a KeyPurposeId but still would like to distinguish document
signing from other usages.</t>
      <t>Introduction of this id-kp-documentSigning KeyPurposeId does not
introduce any new security or privacy concerns.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests that IANA make two assignments. One assignment is
for the addition of the id-kp-documentSigning object identifier (OID),
as defined in <xref target="ext"/>, to the "SMI Security for PKIX Extended Key
Purpose" (1.3.6.1.5.5.7.3) registry. The other assignment is for the
addition of the id-mod-docsign-eku ASN.1 module <xref target="X.680"/> object
identifier (OID), as defined in Appendix A, to the "SMI Security for
PKIX Module Identifier" (1.3.6.1.5.5.7.0) registry.  No further action
is necessary by IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2015" month="November"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8824-1:2015"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8358">
          <front>
            <title>Update to Digital Signatures on Internet-Draft Documents</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>RFC 5485 specifies the conventions for digital signatures on Internet-Drafts.  The Cryptographic Message Syntax (CMS) is used to create a detached signature, which is stored in a separate companion file so that no existing utilities are impacted by the addition of the digital signature.</t>
              <t>The RFC Editor recently published the first RFC that includes non- ASCII characters in a text file.  The conventions specified in RFC 7997 were followed.  We assume that non-ASCII characters will soon start appearing in Internet-Drafts as well.  This document updates the handling of digital signatures on Internet-Drafts that contain non-ASCII characters in a text file.</t>
              <t>This document updates RFC 5485.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8358"/>
          <seriesInfo name="DOI" value="10.17487/RFC8358"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="appendix-a-asn1-module">
      <name>Appendix A. ASN.1 Module</name>
      <t>The following ASN.1 module provides the complete definition of the
Document Signing KeyPurposeId.</t>
      <artwork><![CDATA[
  DocSignEKU { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-docsign-eku(TBD1) }

  DEFINITIONS EXPLICIT TAGS ::=

  BEGIN

  -- EXPORTS ALL --

  -- IMPORTS NOTHING --

  -- OID Arc --

  id-kp  OBJECT IDENTIFIER  ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

  -- Document Signing Extended Key Usage --

  id-kp-documentSigning OBJECT IDENTIFIER ::= { id-kp TBD2 }

  END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Russ Housley for verifying the ASN.1 module.
Additionally, we would like to thank Corey Bonnell, Wendy Brown, Russ
Housley, Prachi Jain, and Stefan Santesson for their comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
