<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-documentsigning-eku-05" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.0 -->
  <front>
    <title abbrev="EKU for Document Signing">General Purpose Extended Key Usage (EKU) for Document Signing X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-documentsigning-eku-05"/>
    <author initials="T." surname="Ito" fullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="August" day="22"/>
    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>RFC5280 specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. This document defines a general
purpose document signing KeyPurposeId for inclusion in the Extended Key
Usage (EKU) extension of X.509 public key certificates.
Document Signing applications may require that the EKU extension
be present and that a document signing KeyPurposeId be indicated
in order for the certificate to be acceptable
to that Document Signing application.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-documentsigning-eku/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME (LAMPS) Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/lamps-wg/documentsigning-eku"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC5280"/> specifies several extended key purpose identifiers
(KeyPurposeIds) for X.509 certificates. In addition, several
KeyPurposeIds have been added under the IANA repository "SMI
Security for PKIX Extended Key Purpose" <xref target="RFC7299"/>. While usage of the
"anyExtendedKeyUsage" KeyPurposeId is bad practice for publicly trusted
certificates, there is no public and general KeyPurposeId explicitly
assigned for Document Signing. The current practice is to
use id-kp-emailProtection, id-kp-codeSigning or a vendor-defined
KeyPurposeId for general document signing purposes.</t>
      <t>In circumstances where code signing and S/MIME certificates are also
used for document signing, technical or policy changes made to the
code signing and S/MIME ecosystem may cause unexpected behaviors or
have an adverse impact such as decreased cryptographic
agility on the document signing ecosystem and vice versa.</t>
      <t>There is no issue if the vendor-defined KeyPurposeIds are used in a PKI
governed by the vendor or a set of specific group of vendors. However, if the
KeyPurposeId is used outside of vendor governance, the usage can easily
become out of control.
For instance, when the end user encounters certificates with
vendor-defined KeyPurposeIds, they might want to ask that vendor about
use of the certificate.
However, if those certificates were not governed by the KeyPurposeIds owner
but by another vendor, the vender who own the KeyPurposeIds
may not able to control use, or even do not know about the use. - If the issuance of the cert is not under the control
of the KeyPurposeIds owner, it is hard to estimate the impact of change
to made on the KeyPurposeId. Changes related to KeyPurposeIds possibly
make negative impacts that some group of people do not tolerate, and it could become a migration agility issue.</t>
      <t>Therefore, it is not favorable to use a vendor-defined KeyPurposeId for
signing a document that is not governed by the vendor.</t>
      <t>This document defines an extended key purpose identifier for Document
Signing.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="extended-key-purpose-for-document-signing">
      <name>Extended Key Purpose for Document Signing</name>
      <t>This specification defines the KeyPurposeId id-kp-documentSigning.</t>
      <t>As described in <xref target="RFC5280"/>, "[i]f the [Extended Key Usage] extension is present,
then the certificate MUST only be used for one of the purposes indicated."
<xref target="RFC5280"/> also describes that "[i]f multiple [key] purposes are indicated
the application need not recognize all purposes indicated,
as long as the intended purpose is present."</t>
      <t>Document Signing applications MAY require that the Extended Key Usage extension be present
and that the id-kp-documentSigning be indicated in order for the certificate to be acceptable
to that Document Signing application.</t>
      <t>The term "Document Signing" in this document refers to digitally signing
contents that are consumed by people. To be more precise, contents are
intended to be shown to a person with printable or displayable form by
means of services or software, rather than processed by machines.</t>
      <section anchor="ext">
        <name>Including the Extended Key Purpose for Document Signing in Certificates</name>
        <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on the
Internet. The extension indicates one or more purposes for which the
certified public key is valid. The EKU extension can be used in
conjunction with the key usage extension, which indicates the set of
basic cryptographic operations for which the certified key may be used.</t>
        <t>The EKU extension syntax is repeated here for convenience:</t>
        <artwork><![CDATA[
  ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId
  KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
        <t>As described in <xref target="RFC5280"/>, EKU extension may,
at the option of the certificate issuer, be either critical or non-critical.</t>
        <t>This specification defines the KeyPurposeId id-kp-documentSigning.
Inclusion of this KeyPurposeId in a certificate indicates that the
public key encoded in the certificate has been certified to be used for
cryptographic operations on contents that are consumed by people.</t>
        <artwork><![CDATA[
  id-kp  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) 3 }
  id-kp-documentSigning  OBJECT IDENTIFIER  ::=  { id-kp TBD2 }
]]></artwork>
      </section>
    </section>
    <section anchor="using-the-extended-key-purpose-for-document-signing-in-a-certificate">
      <name>Using the Extended Key Purpose for Document Signing in a Certificate</name>
      <t>The signed contents of Internet-Drafts are primarily intended to be
consumed by people. To be more precise, contents are intended to be
shown to a person in a printable or displayable form by means of services
or software, rather than processed by machines. The digital signature on
the contents is to indicate to the recipient of the contents that the
content has not changed since it was signed by the identity indicated as
the subject of the certificate. To validate the digital signature which
is signed on contents intended to be consumed by people, implementations
MAY perform the steps below during certificate validation:</t>
      <t>The following procedure is used to examine the KeyPurposeId(s) included in the
Extended Key Usage extension.
Restrictions on Extended Key Usage is derived and implemented from
(or configured with) the policy to which the implementation conforms.</t>
      <ul spacing="normal">
        <li>If there are no restrictions set for the relying party and the
relying party software, the certificate is acceptable.</li>
        <li>
          <t>If there are restrictions set for the relying party and relying
party software, then process the KeyPurposeId(s) as described below.  </t>
          <t>
This procedure is intended to permit or prohibit presence of a
certain KeyPurposeId or complete absence of KeyPurposeIds. It is
outside the scope of this document, but the relying party can permit
or prohibit combinations of KeyPurposeIds, instead of single KeyPurposeId.
A consideration on
prohibiting combinations of KeyPurposeIds is described in the
Security Considerations section of this document.
If both "Excluded KeyPurposeId" and "Permitted KeyPurposeId" exists,
the relying party or the relying party software proresses each restriction
on "Excluded KeyPurposeId" first, and then processes each restriction on
"Permitted KeyPurposeId".  </t>
          <dl>
            <dt>Excluded KeyPurposeId procedure:</dt>
            <dd>
              <t>"Excluded KeyPurposeId" is a
KeyPurposeId which the relying party or the relying party software
prohibits. Examples of "Excluded KeyPurposeId" are, presence of the
anyExtendedKeyUsage KeyPurposeId or complete absence of the EKU
extension in a certificate. If a KeyPurposeId of the certificate
meets the conditions set by the "Excluded KeyPurposeId" restriction,
the relying party or the relying party software rejects the
certificate.</t>
            </dd>
            <dt>Permitted KeyPurposeId procedure:</dt>
            <dd>
              <t>"Permitted KeyPurposeId" is a KeyPurposeId which the relying party or
the relying party software accepts. Examples of "Permitted
KeyPurposeId" are, presence of this general document signing
KeyPurposeId and/or protocol specific document signing-type
KeyPurposeIds. If a KeyPurposeId of the certificate meets the
condition set by a "Permitted KeyPurposeId" restriction, the
certificate is acceptable. Otherwise, relying party or the relying
party software rejects the certificate.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>When a single application has the capability to process various data
formats, the software may choose to make the excluded and permitted
decisions separately in accordance with the format it is handling (e.g.
text, pdf, etc).</t>
    </section>
    <section anchor="implications-for-a-certification-authority">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority MUST
ensure that the correct values for the EKU extension are inserted in
each certificate that is issued. Unless certificates are governed by a
vendor(s) specific PKI, certificates that indicate usage
for document signing MAY include the id-kp-documentSigning KeyPurposeId.
The inclusion of the id-kp-documentSigning KeyPurposeId does not
preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The usage of id-kp-documentSigning KeyPurposeId is to provide an
alternative to id-kp-emailProtection being used for non-email purposes
and id-kp-codeSigning being used to sign objects other than binary code.
This extended key purpose does not introduce new security risks but
instead reduces existing security risks by providing means to separate
other extended key purposes used for communication protocols namely,
TLS (id-kp-clientAuth) or S/MIME (id-kp-emailProtection) etc.
in order to minimize the risk of cross-protocol attacks.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party
or relying party software may additionally prohibit use of specific
combinations of KeyPurposeIds.</t>
      <t>While a specific protocol or signing scheme may choose to come up with
their own KeyPurposeIds, some may not have significant motive or
resources to set up and manage their own KeyPurposeIds. This general
document signing KeyPurposeId may be used as a stop-gap for those that
intend to define their own KeyPurposeId or those who do not intend to
set up a KeyPurposeId but still would like to distinguish document
signing from other usages.</t>
      <t>Introduction of this id-kp-documentSigning KeyPurposeId does not
introduce any new security or privacy concerns.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to make one assignment for the TBD2 in the id-kp-
documentSigning object identifier (OID), as defined in Section 3.1, in the "SMI
Security for PKIX Extended Key Purpose" (1.3.6.1.5.5.7.3) registry. The other
assignment for the TBD1 in Appendix A for the id-mod-docsign-eku ASN.1
module <xref target="X.680"/> object identifier (OID), as defined in Appendix A, in the "SMI
Security for PKIX Module Identifier" (1.3.6.1.5.5.7.0) registry.</t>
      <t>NOTE to the RFC Editor: After the assignment is made, the "for the TBD*"
phrase can be dropped prior to publication as an RFC.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="X.680">
          <front>
            <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2015" month="November"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8824-1:2015"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="appendix-a-asn1-module">
      <name>Appendix A. ASN.1 Module</name>
      <t>The following ASN.1 module provides the complete definition of the
Document Signing KeyPurposeId.</t>
      <artwork><![CDATA[
  DocSignEKU { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-docsign-eku(TBD1) }

  DEFINITIONS EXPLICIT TAGS ::=

  BEGIN

  -- EXPORTS ALL --

  -- IMPORTS NOTHING --

  -- OID Arc --

  id-kp  OBJECT IDENTIFIER  ::= {
    iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

  -- Document Signing Extended Key Usage --

  id-kp-documentSigning OBJECT IDENTIFIER ::= { id-kp TBD2 }

  END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank Russ Housley for verifying the ASN.1 module.
Additionally, we would like to thank Corey Bonnell, Wendy Brown, Russ
Housley, Prachi Jain, and Stefan Santesson for their comments.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
