<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-08" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="August" day="29"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 67?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 77?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 <xref target="CMC-TRANSv1"/> and RFC 6402 <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>IANA assigned TCP port 5318 for the use of CMC.</t>

<t>Clarified the file extensions for Full PKI Requests and Responses.</t>

<t>Replaced TLS 1.0 for TLS 1.2 or later, and added that implemetations are
required to follow the recommendations in <xref target="BCP195"/>.</t>

<t>Addressed <xref target="erratum3593"/>.</t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file. crq and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS is supported by an implementation, then the implementation <bcp14>MUST</bcp14>
folow the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type header for a request:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-request; name=request.p7m</t>
</li></ul>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type header for a response:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-response; name=response.p7m</t>
</li></ul>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The Service Name is "pkix-cmc".
The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: [RFC-to-be]
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

<t>IANA is requested to update the existing references to <xref target="CMC-TRANSv1"/> in the
Media Type Sub-Parameter Registries for CMC-Request and CMC-Response to [ RFC-to-be ].</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="29" month="August" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-07"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>
<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>



    </references>

</references>


<?line 314?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

