<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-09" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="October" day="20"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 83?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 93?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 <xref target="CMC-TRANSv1"/> and RFC 6402 <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>IANA assigned TCP port 5318 for the use of CMC.</t>

<t>Clarified the file extensions for Full PKI Requests and Responses.</t>

<t>Replaced TLS 1.0 with TLS 1.2 or later, and added that implemetations are
required to follow the recommendations in <xref target="BCP195"/>.</t>

<t>Addressed <xref target="erratum3593"/>.</t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file and the file <bcp14>MUST</bcp14> be binary encoded. The abbreviations crq
and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a Content-Type
or a Content-Disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  A smime-type parameter <bcp14>MUST</bcp14> be on the
Content-Type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the
Content-Type or Content-Disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the Content-Type or Content-Disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the Content-Type or
Content-Disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-Request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-Response</c>
</texttable>

</section>
<section anchor="http-based-protocol"><name>HTTP-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
data transfer protocol.  Consult <xref target="HTTP-IMP"/> for additional information.
The use of HTTPS <xref target="HTTP"/> provides any necessary
content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients are configured with sufficient information to form the server URI <xref target="RFC3986"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Client requests are submitted by use of the POST method.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 2XX response codes for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send certification requests using HTTPS <xref target="HTTP"/>,
although servers are not required to support TLS/QUIC but a secure channel
might be available regardless depending on the HTTP version implemented
<xref target="HTTP/1.0"/>, <xref target="HTTP/1.1"/>, <xref target="HTTP/2"/>, <xref target="HTTP/3"/>, or later. If TLS is used by the HTTP version, then the
implementation <bcp14>MUST</bcp14> follow the recommendations in <xref target="BCP195"/>. CMC implementations
that support TLS 1.3 or QUIC <bcp14>MUST NOT</bcp14> use early data (i.e., 0-RTT) because POST is
not idempotent.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients are not required to support any type of HTTP
authentication (<xref section="11" sectionFormat="of" target="HTTP"/>) nor Cookies <xref target="COOKIES"/>. Thus, servers
can not rely on these features to be available.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type field <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type field for a request:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-Request; name=request.p7m</t>
</li></ul>

<t>The content of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>The content of an HTTP-based PKI Response is
the binary value of the BER (Basic Encoding
Rules) encoding <xref target="X690"/> of either a Simple or Full PKI Response.</t>

<t>The Content-Type field <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type field for a response:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-Response; name=response.p7m</t>
</li></ul>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.
The client <bcp14>MUST</bcp14> wait for the full response before making another request
on the same connection. A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The Service Name is "pkix-cmc".
The TCP port number is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> continue to use a port chosen from the
Private Port range.  A TCP Server <bcp14>SHOULD</bcp14> use port 5318 assigned to the CMC service.
It is expected that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: [RFC-to-be]
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

<t>IANA is requested to update the existing references to <xref target="CMC-TRANSv1"/> in the
Media Type Sub-Parameter Registries for CMC-Request and CMC-Response to [ RFC-to-be ].</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the (optional) CMC nonce mechanisms.
[Implementers/Designers] of this protocol need to carefully consider
environmental conditions before choosing whether or not to [implement/use]
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
provides the same shrouding that TLS would have provided.</t>

<t>For the mail-based protocol, the Enveloped Data content type can
also be used to apply confidentiality protection (content shrouding)
to the conveyed messages. SMTP-over-TLS <xref target="RFC3207"/> does
provide hop-by-hop security, but cannot guarantee that all hops
are actually protected.</t>

<t>For the file-based protocol, an additional method of applying
confidentiality protection (content shrouding) to the conveyed messages
is usually availablle in the form of filesystem permissions.  The local
system may allow for read access to be limited to just a single user or
group that corresponds to the entity authorized to read the request or
response, respectively, and diligent use of these filesystem permissions
can be a useful mechanism in multi-user environments.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-09"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="HTTP-IMP">
  <front>
    <title>Building Protocols with HTTP</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
      <t>This document obsoletes RFC 3205.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="56"/>
  <seriesInfo name="RFC" value="9205"/>
  <seriesInfo name="DOI" value="10.17487/RFC9205"/>
</reference>

<reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
  <front>
    <title>Information Technology -- Abstract Syntax Notation One (ASN.1): ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="ITU-T Recommendation" value="X.690"/>
  <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
</reference>


<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>
<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="HTTP_1.0">
  <front>
    <title>Hypertext Transfer Protocol -- HTTP/1.0</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="H. Frystyk" initials="H." surname="Frystyk"/>
    <date month="May" year="1996"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1945"/>
  <seriesInfo name="DOI" value="10.17487/RFC1945"/>
</reference>
<reference anchor="HTTP_1.1">
  <front>
    <title>HTTP/1.1</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
      <t>This document obsoletes portions of RFC 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="99"/>
  <seriesInfo name="RFC" value="9112"/>
  <seriesInfo name="DOI" value="10.17487/RFC9112"/>
</reference>
<reference anchor="HTTP_2">
  <front>
    <title>HTTP/2</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
      <t>This document obsoletes RFCs 7540 and 8740.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9113"/>
  <seriesInfo name="DOI" value="10.17487/RFC9113"/>
</reference>
<reference anchor="HTTP_3">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>
<reference anchor="COOKIES">
  <front>
    <title>HTTP State Management Mechanism</title>
    <author fullname="A. Barth" initials="A." surname="Barth"/>
    <date month="April" year="2011"/>
    <abstract>
      <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6265"/>
  <seriesInfo name="DOI" value="10.17487/RFC6265"/>
</reference>

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="RFC3207">
  <front>
    <title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2002"/>
    <abstract>
      <t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet. This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3207"/>
  <seriesInfo name="DOI" value="10.17487/RFC3207"/>
</reference>



    </references>

</references>


<?line 352?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgement from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

