<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-documentsigning-eku-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="EKU for Document Signing">General Purpose Extended Key Usage (EKU) for Document Signing X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-documentsigning-eku-04"/>
    <author initials="T." surname="Ito" fullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="26"/>
    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>RFC5280 specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. This document defines a general
purpose document signing KeyPurposeId for inclusion in the Extended Key
Usage (EKU) extension of X.509 public key certificates.
Document Signing applications may require that the EKU extension
be present and that a document signing KeyPurposeId be indicated
in order for the certificate to be acceptable
to that Document Signing application.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-documentsigning-eku/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME (LAMPS) Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/documentsigning-eku"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC5280"/> specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. In addition, several
KeyPurposeIds have been added under the IANA repository "SMI
Security for PKIX Extended Key Purpose" <xref target="RFC7299"/>. While usage of the
"anyExtendedKeyUsage" KeyPurposeId is bad practice for publicly trusted
certificates, there is no public and general KeyPurposeId explicitly
assigned for Document Signing. The current practice is to
use id-kp-emailProtection, id-kp-codeSigning or a vendor-defined
KeyPurposeId for general document signing purposes.</t>
      <t>In circumstances where code signing and S/MIME certificates are also
used for document signing, technical or policy changes made to the
code signing and S/MIME ecosystem may cause unexpected behaviors or
have an adverse impact such as decreased cryptographic
agility on the document signing ecosystem and vice versa.</t>
      <t>There is no issue if the vendor-defined KeyPurposeIds are used in a PKI
governed by the vendor or a set of specific group of vendors. However, if the
KeyPurposeId is used outside of vendor governance, the usage can easily
become out of control.
For instance, when the end user encounters certificates with
vendor-defined KeyPurposeIds, they might want to ask that vendor about
use of the certificate.
However, if those certificates were not governed by the KeyPurposeIds owner
but by another vendor, the vender who own the KeyPurposeIds
may not able to control use, or even do not know about the use. - If the issuance of the cert is not under the control
of the KeyPurposeIds owner, it is hard to estimate the impact of change
to made on the KeyPurposeId. Changes related to KeyPurposeIds possibly
make negative impacts that some group of people do not tolerate, and it could become a migration agility issue.</t>
      <t>Therefore, it is not favorable to use a vendor-defined KeyPurposeId for
signing a document that is not governed by the vendor.</t>
      <t>This document defines an extended key purpose identifier for Document
Signing.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="extended-key-purpose-for-document-signing">
      <name>Extended Key Purpose for Document Signing</name>
      <t>This specification defines the KeyPurposeId id-kp-documentSigning.</t>
      <t>As described in <xref target="RFC5280"/>, "[i]f the [Extended Key Usage] extension is present,
then the certificate MUST only be used for one of the purposes indicated."
<xref target="RFC5280"/> also describes that "[i]f multiple [key] purposes are indicated
the application need not recognize all purposes indicated,
as long as the intended purpose is present."</t>
      <t>Document Signing applications MAY require that the Extended Key Usage extension be present
and that the id-kp-documentSigning be indicated in order for the certificate to be acceptable
to that Document Signing application.</t>
      <t>The term "Document Signing" in this document refers to digitally signing
contents that are consumed by people. To be more precise, contents are
intended to be shown to a person with printable or displayable form by
means of services or software, rather than processed by machines.</t>
      <section anchor="ext">
        <name>Including the Extended Key Purpose for Document Signing in Certificates</name>
        <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on the
Internet. The extension indicates one or more purposes for which the
certified public key is valid. The EKU extension can be used in
conjunction with the key usage extension, which indicates the set of
basic cryptographic operations for which the certified key may be used.</t>
        <t>The EKU extension syntax is repeated here for convenience:</t>
        <artwork><![CDATA[
  ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId
  KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
        <t>As described in <xref target="RFC5280"/>, EKU extension may,
at the option of the certificate issuer, be either critical or non-critical.</t>
        <t>This specification defines the KeyPurposeId id-kp-documentSigning.
Inclusion of this KeyPurposeId in a certificate indicates that the
public key encoded in the certificate has been certified to be used for
cryptographic operations on contents that are consumed by people.</t>
        <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) 3 }
  id-kp-documentSigning  OBJECT IDENTIFIER  ::=  { id-kp XX }
]]></artwork>
      </section>
    </section>
    <section anchor="using-the-extended-key-purpose-for-document-signing-in-a-certificate">
      <name>Using the Extended Key Purpose for Document Signing in a Certificate</name>
      <t>The signed contents of Internet-Drafts are primarily intended to be
consumed by people. To be more precise, contents are intended to be
shown to a person in a printable or displayable form by means of services
or software, rather than processed by machines. The digital signature on
the contents is to indicate to the recipient of the contents that the
content has not changed since it was signed by the identity indicated as
the subject of the certificate. To validate the digital signature which
is signed on contents intended to be consumed by people, implementations
MAY perform the steps below during certificate validation:</t>
      <t>The following procedure is used to examine the KeyPurposeId(s) included in the
Extended Key Usage extension.
Restrictions on Extended Key Usage is derived and implemented from
(or configured with) the policy to which the implementation conforms.</t>
      <ul spacing="normal">
        <li>If there are no restrictions set for the relying party and the
relying party software, the certificate is acceptable.</li>
        <li>
          <t>If there are restrictions set for the relying party and relying
party software, then process the KeyPurposeId(s) as described below.  </t>
          <t>
This procedure is intended to permit or prohibit presence of a
certain KeyPurposeId or complete absence of KeyPurposeIds. It is
outside the scope of this document, but the relying party can permit
or prohibit combinations of KeyPurposeIds, instead of single KeyPurposeId.
A consideration on
prohibiting combinations of KeyPurposeIds is described in the
Security Considerations section of this document.
If both "Excluded KeyPurposeId" and "Permitted KeyPurposeId" exists,
the relying party or the relying party software proresses each restriction
on "Excluded KeyPurposeId" first, and then processes each restriction on
"Permitted KeyPurposeId".  </t>
          <dl>
            <dt>Excluded KeyPurposeId procedure:</dt>
            <dd>
              <t>"Excluded KeyPurposeId" is a
KeyPurposeId which the relying party or the relying party software
prohibits. Examples of "Excluded KeyPurposeId" are, presence of the
anyExtendedKeyUsage KeyPurposeId or complete absence of the EKU
extension in a certificate. If a KeyPurposeId of the certificate
meets the conditions set by the "Excluded KeyPurposeId" restriction,
the relying party or the relying party software rejects the
certificate.</t>
            </dd>
            <dt>Permitted KeyPurposeId procedure:</dt>
            <dd>
              <t>"Permitted KeyPurposeId" is a KeyPurposeId which the relying party or
the relying party software accepts. Examples of "Permitted
KeyPurposeId" are, presence of this general document signing
KeyPurposeId and/or protocol specific document signing-type
KeyPurposeIds. If a KeyPurposeId of the certificate meets the
condition set by a "Permitted KeyPurposeId" restriction, the
certificate is acceptable. Otherwise, relying party or the relying
party software rejects the certificate.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>When a single application has the capability to process various data
formats, the software may choose to make the excluded and permitted
decisions separately in accordance with the format it is handling (e.g.
text, pdf, etc).</t>
    </section>
    <section anchor="implications-for-a-certification-authority">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority MUST
ensure that the correct values for the EKU extension are inserted in
each certificate that is issued. Unless certificates are governed by a
vendor(s) specific PKI, certificates that indicate usage
for document signing MAY include the id-kp-documentSigning KeyPurposeId.
The inclusion of the id-kp-documentSigning KeyPurposeId does not
preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The usage of id-kp-documentSigning KeyPurposeId is to provide an
alternative to id-kp-emailProtection being used for non-email purposes
and id-kp-codeSigning being used to sign objects other than binary code.
This extended key purpose does not introduce new security risks but
instead reduces existing security risks by providing means to separate
other extended key purposes used for communication protocols namely,
TLS (id-kp-clientAuth) or S/MIME (id-kp-emailProtection) etc.
in order to minimize the risk of cross-protocol attacks.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party
or relying party software may additionally prohibit use of specific
combinations of KeyPurposeIds.</t>
      <t>While a specific protocol or signing scheme may choose to come up with
their own KeyPurposeIds, some may not have significant motive or
resources to set up and manage their own KeyPurposeIds. This general
document signing KeyPurposeId may be used as a stop-gap for those that
intend to define their own KeyPurposeId or those who do not intend to
set up a KeyPurposeId but still would like to distinguish document
signing from other usages.</t>
      <t>Introduction of this id-kp-documentSigning KeyPurposeId does not
introduce any new security or privacy concerns.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests that IANA make two assignments. One assignment is
for the addition of the id-kp-documentSigning object identifier (OID),
as defined in <xref target="ext"/>, to the "SMI Security for PKIX Extended Key
Purpose" (1.3.6.1.5.5.7.3) registry. The other assignment is for the
addition of the id-mod-docsign-eku ASN.1 module <xref target="X.680"/> object
identifier (OID), as defined in Appendix A, to the "SMI Security for
PKIX Module Identifier" (1.3.6.1.5.5.7.0) registry.  No further action
is necessary by IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2015" month="November"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8824-1:2015"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="appendix-a-asn1-module">
      <name>Appendix A. ASN.1 Module</name>
      <t>The following ASN.1 module provides the complete definition of the
Document Signing KeyPurposeId.</t>
      <artwork><![CDATA[
  DocSignEKU { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-docsign-eku(TBD1) }

  DEFINITIONS EXPLICIT TAGS ::=

  BEGIN

  -- EXPORTS ALL --

  -- IMPORTS NOTHING --

  -- OID Arc --

  id-kp  OBJECT IDENTIFIER  ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

  -- Document Signing Extended Key Usage --

  id-kp-documentSigning OBJECT IDENTIFIER ::= { id-kp TBD2 }

  END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Russ Housley for verifying the ASN.1 module.
Additionally, we would like to thank Corey Bonnell, Wendy Brown, Russ
Housley, Prachi Jain, and Stefan Santesson for their comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
