<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.4.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-03" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="20"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 68?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFCs 5273 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 78?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -02 WG version:</t>

<t><list style="symbols">
  <t>Consider adding AuthEnvelopedData to Security Considerations.</t>
</list></t>

<t>-01 WG version changes:</t>

<t><list style="symbols">
  <t>Added requirement that TLS 1.2 implementations follow <xref target="BCP195"/></t>
</list></t>

<t>-00 WG version changes:</t>

<t><list style="symbols">
  <t>Added pre-5378 boilerplate</t>
</list></t>

<t>-02 individual version changes:</t>

<t><list style="symbols">
  <t>Replaced TLS 1.0 with TLS 1.2 or later</t>
</list></t>

<t>-01 individual version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Merged <xref target="erratum3593"/></t>
</list></t>

<t>-00 individual version changes:</t>

<t><list style="symbols">
  <t>Moved 2119-text to its own section</t>
  <t>Added "Changes Since 5273 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file.  The following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS 1.2 <xref target="TLS"/> (or later) is used then implementations <bcp14>MUST</bcp14> follow
the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="19" month="March" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-03"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>

<reference anchor="CMC-TRANSv1">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="3" month="March" year="2025"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFCs 5273 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5273bis-02"/>
   
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>



    </references>

</references>


<?line 328?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

