<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-keyusage-crl-validation-02" category="std" consensus="true" submissionType="IETF" updates="5280" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="CRL validation clarification">Clarification to processing Key Usage values during CRL validation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-keyusage-crl-validation-02"/>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="大久保 智史" asciiFullname="Tomofumi Okubo">
      <organization>Penguin Securities Pte. Ltd.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="01"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 50?>

<t>RFC 5280 defines the profile of X.509 certificates and certificate
revocation lists (CRLs) for use in the Internet. This profile requires
that certificates which certify keys for signing CRLs contain the key
usage extension with the <tt>cRLSign</tt> bit asserted. Additionally, RFC 5280
defines steps for the validation of CRLs. While there is a requirement
for CRL validators to verify that the <tt>cRLSign</tt> bit is asserted in the
<tt>keyUsage</tt> extension of the CRL issuer's certificate, this document
clarifies the requirement for relying parties to also verify the
presence of the <tt>keyUsage</tt> extension in the CRL issuer's certificate.
This check remediates a potential security issue that arises when
relying parties accept a CRL which is signed by a certificate with no
<tt>keyUsage</tt> extension, and therefore does not explicitly have the
<tt>cRLSign</tt> bit asserted.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CBonnell.github.io/ietf-lamps-keyusage-crl-validation-clarification/draft-ietf-lamps-keyusage-crl-validation.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-keyusage-crl-validation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CBonnell/lamps-keyusage-crl-validation-clarification"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC5280"/> defines the profile of X.509 certificates and certificate
revocation lists (CRLs) for use in the Internet. Section 4.2.1.3 of
<xref target="RFC5280"/> requires CRL issuer certificates to contain the <tt>keyUsage</tt>
extension with the <tt>cRLSign</tt> bit asserted. However, the CRL validation
algorithm specified in Section 6.3 of <xref target="RFC5280"/> does not explicitly
include a corresponding check for the presence of the <tt>keyUsage</tt>
certificate extension. This document updates <xref target="RFC5280"/> to require
that check.</t>
      <t><xref target="the-issue"/> describes the security concern that motivates this update.</t>
      <t><xref target="crl-validation-algo-amendment"/> updates the CRL validation algorithm
to resolve this concern.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-issue">
      <name>The risk of trusting CRLs signed with non-certified keys</name>
      <t>In some Public Key Infrastructures, entities are delegated by
Certification Authorities to sign CRLs. CRLs whose scope encompasses
certificates that have not been signed by the CRL issuer are known as
"indirect CRLs".</t>
      <t>Certification Authorities delegate the issuance of CRLs
to other entities by issuing to the entity a certificate that asserts
the <tt>cRLSign</tt> bit in the <tt>keyUsage</tt> extension. The Certification
Authority will then sign certificates that fall within the scope of the
indirect CRL by including the <tt>crlDistributionPoints</tt> extension and
specifying the distinguished name ("DN") of the CRL issuer in the
<tt>cRLIssuer</tt> field of the corresponding distribution point.</t>
      <t>The CRL issuer signs CRLs that assert the <tt>indirectCRL</tt> boolean within
the <tt>issuingDistributionPoint</tt> extension.</t>
      <t>Applications which consume CRLs follow the validation algorithm as
specified in Section 6.3 of <xref target="RFC5280"/>. In particular, Section 6.3.3
contains the following step for CRL validation:</t>
      <ul empty="true">
        <li>
          <t>(f) Obtain and validate the certification path for the issuer of
    the complete CRL.  The trust anchor for the certification
    path <bcp14>MUST</bcp14> be the same as the trust anchor used to validate
    the target certificate.  If a <tt>keyUsage</tt> extension is present
    in the CRL issuer's certificate, verify that the <tt>cRLSign</tt> bit
    is set.</t>
        </li>
      </ul>
      <t>This step does not explicitly specify a check for the presence of the
<tt>keyUsage</tt> extension itself.</t>
      <t>Additionally, the certificate profile in <xref target="RFC5280"/> does not require
the inclusion of the <tt>keyUsage</tt> extension in a certificate if the
certified public key is not used for verifying the signatures of other
certificates or CRLs. Section 4.2.1.3 of <xref target="RFC5280"/> says:</t>
      <ul empty="true">
        <li>
          <t>Conforming CAs <bcp14>MUST</bcp14> include this extension in certificates that
   contain public keys that are used to validate digital signatures on
   other public key certificates or CRLs.</t>
        </li>
      </ul>
      <t>The allowance for the issuance of certificates without the <tt>keyUsage</tt>
extension and the lack of a check for the inclusion of the <tt>keyUsage</tt>
extension during CRL verification can manifest in a security issue. A
concrete example is described below.</t>
      <ol spacing="normal" type="1"><li>
          <t>The Certification Authority signs an end-entity CRL issuer
certificate to subject <tt>X</tt> that certifies key <tt>A</tt> for signing CRLs by
explicitly including the <tt>keyUsage</tt> extension and asserting the
<tt>cRLSign</tt> bit in accordance with Section 4.2.1.3 of <xref target="RFC5280"/>.</t>
        </li>
        <li>
          <t>The Certification Authority signs one or more certificates that
include the crlDistributionPoints extension with the DN for subject
<tt>X</tt> included in the <tt>cRLIssuer</tt> field. This indicates that the
CRL-based revocation information for these certificates will be
provided by subject <tt>X</tt>.</t>
        </li>
        <li>
          <t>The Certification Authority signs an end-entity certificate to
subject <tt>X</tt> that certifies key <tt>B</tt>. This certificate contains no key
usage extension, as the certified key is not intended to be used for
signing CRLs and could be a “mundane” certificate of any type (e.g.,
S/MIME, document signing certificate where the corresponding private
key is stored on the filesystem of the secretary's laptop, etc.).</t>
        </li>
        <li>
          <t>Subject <tt>X</tt> signs a CRL using key <tt>B</tt> and publishes the CRL at the
<tt>distributionPoint</tt> specified in the <tt>crlDistributionPoints</tt>
extension of the certificates signed in step 2.</t>
        </li>
        <li>
          <t>Relying parties download the CRL published in step 4. The CRL
validates successfully according to Section 6.3.3 of <xref target="RFC5280"/>,
as the CRL issuer DN matches, and the check for the presence of the
<tt>cRLSign</tt> bit in the <tt>keyUsage</tt> extension is skipped because the
<tt>keyUsage</tt> extension is absent.</t>
        </li>
      </ol>
    </section>
    <section anchor="crl-validation-algo-amendment">
      <name>Checking the presence of the <tt>keyUsage</tt> extension</name>
      <t>To remediate the security issue described in <xref target="the-issue"/>, this
document specifies the following amendment to step (f) of the CRL
algorithm as found in Section 6.3.3 of <xref target="RFC5280"/>.</t>
      <t><em>OLD:</em></t>
      <ul empty="true">
        <li>
          <t>(f) Obtain and validate the certification path for the issuer of
    the complete CRL.  The trust anchor for the certification
    path <bcp14>MUST</bcp14> be the same as the trust anchor used to validate
    the target certificate.  If a <tt>keyUsage</tt> extension is present
    in the CRL issuer's certificate, verify that the <tt>cRLSign</tt> bit
    is set.</t>
        </li>
      </ul>
      <t><em>NEW:</em></t>
      <ul empty="true">
        <li>
          <t>(f) Obtain and validate the certification path for the issuer of
    the complete CRL.  The trust anchor for the certification
    path <bcp14>MUST</bcp14> be the same as the trust anchor used to validate
    the target certificate.  If the version of the CRL issuer’s
    certificate is version 3 (v3), then verify that the keyUsage
    extension is present and verify that the cRLSign bit is set.</t>
        </li>
      </ul>
      <t>This change ensures that the CRL issuer's key is certified for
CRL signing. However, this check is not performed if the CRL
issuer's key is certified using a version 1 (v1) or version 2 (v2) X.509
certificate, as these versions do not have an <tt>extensions</tt> field where
the key usage extension can be included.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If a Certification Authority has signed certificates to be used for
CRL verification but do not include the <tt>keyUsage</tt> extension in
accordance with Section 4.2.1.3 of <xref target="RFC5280"/>, then relying party
applications that have implemented the modified verification algorithm
as specified in this document will be unable to verify CRLs signed by
the CRL issuer in question.</t>
      <t>It is strongly <bcp14>RECOMMENDED</bcp14> that Certification Authorities include the
<tt>keyUsage</tt> extension in certificates to be used for CRL verification to
ensure that there are no interoperability issues where updated
applications are unable to verify CRLs.</t>
      <t>If it is not possible to update the profile of CRL issuer certificates,
then the policy management authority of the affected Public Key
Infrastructure <bcp14>SHOULD</bcp14> update the subject naming requirements to ensure
that certificates to be used for different purposes contain unique DNs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 230?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the participants on the LAMPS Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to Carl Wallace, David Hook, John Gray, Michael St. Johns, Mike Ounsworth, Russ Housley, Serge Mister, and Tomas Gustavsson for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
