<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-10" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="06"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 83?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 93?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 <xref target="CMC-TRANSv1"/> and RFC 6402 <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>IANA assigned TCP port 5318 for the use of CMC.</t>

<t>Clarified the file extensions for Full PKI Requests and Responses.</t>

<t>Replaced TLS 1.0 with TLS 1.2 or later, and added that implemetations are
required to follow the recommendations in <xref target="BCP195"/>.</t>

<t>Addressed <xref target="erratum3593"/>.</t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file and the file <bcp14>MUST</bcp14> be binary encoded. The abbreviations crq
and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>What follows is a set of Simple PKI Request and Response messages and a
set of Full PKI Request and Response messages. The headers discussed
below appear in the top-level content of the messagea and the messages'
contents are the entire messages' bodies.</t>

<aside>  <t>The examples that follow are purposely truncated for brevity.</t>
</aside>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type <xref target="RFC5967"/>.  A file name <bcp14>MUST</bcp14> be included either in a
Content-Type or a Content-Disposition header in the name or filename
parameter, respectively. The extension for the file <bcp14>MUST</bcp14> be ".p10”.  An
example similar to that from <xref target="RFC5967"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-client@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7A@example.com>
To: cmc-server@example.com
Subject: Simple Enrollment Request
Date: Tue, 3 Feb 2026 16:08:28 -0500
MIME-Version: 1.0
Content-Type: application/pkcs10; name=smime.p10
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p10

< message contents >
]]></artwork></figure>

<t>Simple PKI Response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  A smime-type parameter <bcp14>MUST</bcp14> be on the
Content-Type header with a value of "certs-only".  A file name with
the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the Content-Type or
Content-Disposition header in the name or filename parameter,
respectively. An example similar to that from <xref target="SMIMEV4"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-server@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7B@example.com>
To: cmc-client@example.com
Subject: Re: Simple Enrollment Request
Date: Tue, 3 Feb 2026 16:09:28 -0500
MIME-Version: 1.0
References: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7A@example.com>
In-Reply-To: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7A@example.com>
Content-Type: application/pkcs7-mime; smime-type=certs-only;
  name=smime.p7c
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p7c

< message contents >
]]></artwork></figure>

<t>Full PKI Request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the Content-Type or Content-Disposition
header in the name or filename parameter, respectively. An example
similar to that from <xref target="SMIMEV4"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-client@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7C@example.com>
To: cmc-server@example.com
Subject: Full Enrollment Request
Date: Tue, 3 Feb 2026 16:10:28 -0500
MIME-Version: 1.0
Content-Type: application/pkcs7-mime; smime-type=CMC-Request;
  name=smime.p7c
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p7m

< message contents >
]]></artwork></figure>

<t>Full PKI Response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Response".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the Content-Type or Content-Disposition
statement.  An example similar to that from <xref target="SMIMEV4"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-server@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7D@example.com>
To: cmc-client@example.com
Subject: Re: Full Enrollment Request
Date: Tue, 3 Feb 2026 16:11:28 -0500
MIME-Version: 1.0
References: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7C@example.com>
In-Reply-To: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7C@example.com>
Content-Type: application/pkcs7-mime; smime-type=CMC-Response;
  name=smime.p7m
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p7m

< message contents >
]]></artwork></figure>

<t>For file names present in the name or filename parameters, non-ASCII
text is prohibited.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-Request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-Response</c>
</texttable>

</section>
<section anchor="http-based-protocol"><name>HTTP-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
data transfer protocol.  Consult <xref target="HTTP-IMP"/> for additional information.
The use of HTTPS <xref target="HTTP"/> provides any necessary
content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients are configured with sufficient information to form the server URI <xref target="RFC3986"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Client requests are submitted by use of the POST method.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 2XX response codes for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send certification requests using HTTPS <xref target="HTTP"/>,
although servers are not required to support TLS/QUIC but a secure channel
might be available regardless depending on the HTTP version implemented
<xref target="HTTP/1.0"/>, <xref target="HTTP/1.1"/>, <xref target="HTTP/2"/>, <xref target="HTTP/3"/>, or later. If TLS is used by the HTTP version, then the
implementation <bcp14>MUST</bcp14> follow the recommendations in <xref target="BCP195"/>. CMC implementations
that support TLS 1.3 or QUIC <bcp14>MUST NOT</bcp14> use early data (i.e., 0-RTT) because POST is
not idempotent.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients are not required to support any type of HTTP
authentication (<xref section="11" sectionFormat="of" target="HTTP"/>) nor Cookies <xref target="COOKIES"/>. Thus, servers
can not rely on these features to be available.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type field <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type field for a request:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-Request; name=request.p7m</t>
</li></ul>

<t>The content of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>The content of an HTTP-based PKI Response is
the binary value of the BER (Basic Encoding
Rules) encoding <xref target="X690"/> of either a Simple or Full PKI Response.</t>

<t>The Content-Type field <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type field for a response:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-Response; name=response.p7m</t>
</li></ul>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.
The client <bcp14>MUST</bcp14> wait for the full response before making another request
on the same connection. A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The Service Name is "pkix-cmc".
The TCP port number is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> continue to use a port chosen from the
Private Port range.  A TCP Server <bcp14>SHOULD</bcp14> use port 5318 assigned to the CMC service.
It is expected that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: [RFC-to-be]
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

<t>IANA is requested to update the existing references to <xref target="CMC-TRANSv1"/> in the
Media Type Sub-Parameter Registries for CMC-Request and CMC-Response to [ RFC-to-be ].</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the (optional) CMC nonce mechanisms.
Implementers and Designers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement or use
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
or Authenticated Enveloped Data content type <xref section="3.2.1.3.5" sectionFormat="of" target="CMC-STRUCT"/>
provides the same shrouding that TLS would have provided.</t>

<t>For the mail-based protocol, the Enveloped Data or Authenticated
Enveloped Data content types can also be used to apply confidentiality
protection (content shrouding) to the conveyed messages.
Note that even if the application uses SMTP-over-TLS <xref target="RFC3207"/>
with its preferred Message Submission Agent (MSA)
for initial submission of the message for delivery, SMTP
in subsequent relay hops may not be either authenticated or encrypted.
For some combinations of initial MSA and destination domains it may be
possible to request use of authenticated TLS at every relay "hop" of
message delivery via the mechanism specified in <xref target="RFC8689"/>. This <bcp14>MAY</bcp14>
be used, when supported, and expected to work, but risks non-delivery
if some of the SMTP servers along the relay chain do not support the
REQUIRETLS ESMTP extension.</t>

<t>For the file-based protocol, an additional method of applying
confidentiality protection (content shrouding) to the conveyed messages
is usually available in the form of filesystem permissions.  The local
system may allow for read access to be limited to just a single user or
group that corresponds to the entity authorized to read the request or
response, respectively, and diligent use of these filesystem permissions
can be a useful mechanism in multi-user environments.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-09"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="HTTP-IMP">
  <front>
    <title>Building Protocols with HTTP</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
      <t>This document obsoletes RFC 3205.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="56"/>
  <seriesInfo name="RFC" value="9205"/>
  <seriesInfo name="DOI" value="10.17487/RFC9205"/>
</reference>

<reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
  <front>
    <title>Information Technology -- Abstract Syntax Notation One (ASN.1): ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="ITU-T Recommendation" value="X.690"/>
  <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
</reference>


<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC5967">
  <front>
    <title>The application/pkcs10 Media Type</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="August" year="2010"/>
    <abstract>
      <t>This document specifies a media type used to carry PKCS #10 certification requests as defined in RFC 2986. It carries over the original specification from RFC 2311, which recently has been moved to Historic status, and properly links it to RFC 2986. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5967"/>
  <seriesInfo name="DOI" value="10.17487/RFC5967"/>
</reference>
<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>
<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="HTTP_1.0">
  <front>
    <title>Hypertext Transfer Protocol -- HTTP/1.0</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="H. Frystyk" initials="H." surname="Frystyk"/>
    <date month="May" year="1996"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1945"/>
  <seriesInfo name="DOI" value="10.17487/RFC1945"/>
</reference>
<reference anchor="HTTP_1.1">
  <front>
    <title>HTTP/1.1</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
      <t>This document obsoletes portions of RFC 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="99"/>
  <seriesInfo name="RFC" value="9112"/>
  <seriesInfo name="DOI" value="10.17487/RFC9112"/>
</reference>
<reference anchor="HTTP_2">
  <front>
    <title>HTTP/2</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
      <t>This document obsoletes RFCs 7540 and 8740.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9113"/>
  <seriesInfo name="DOI" value="10.17487/RFC9113"/>
</reference>
<reference anchor="HTTP_3">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>
<reference anchor="COOKIES">
  <front>
    <title>HTTP State Management Mechanism</title>
    <author fullname="A. Barth" initials="A." surname="Barth"/>
    <date month="April" year="2011"/>
    <abstract>
      <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6265"/>
  <seriesInfo name="DOI" value="10.17487/RFC6265"/>
</reference>

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="RFC3207">
  <front>
    <title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2002"/>
    <abstract>
      <t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet. This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3207"/>
  <seriesInfo name="DOI" value="10.17487/RFC3207"/>
</reference>
<reference anchor="RFC8689">
  <front>
    <title>SMTP Require TLS Option</title>
    <author fullname="J. Fenton" initials="J." surname="Fenton"/>
    <date month="November" year="2019"/>
    <abstract>
      <t>The SMTP STARTTLS option, used in negotiating transport-level encryption of SMTP connections, is not as useful from a security standpoint as it might be because of its opportunistic nature; message delivery is, by default, prioritized over security. This document describes an SMTP service extension, REQUIRETLS, and a message header field, TLS-Required. If the REQUIRETLS option or TLS-Required message header field is used when sending a message, it asserts a request on the part of the message sender to override the default negotiation of TLS, either by requiring that TLS be negotiated when the message is relayed or by requesting that recipient-side policy mechanisms such as MTA-STS and DNS-Based Authentication of Named Entities (DANE) be ignored when relaying a message for which security is unimportant.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8689"/>
  <seriesInfo name="DOI" value="10.17487/RFC8689"/>
</reference>



    </references>

</references>


<?line 441?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgement from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

