<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.4.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5274bis-02" category="std" consensus="true" submissionType="IETF" obsoletes="5274, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Compliance">Certificate Management Messages over CMS (CMC): Compliance Requirements</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="03"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Compliance</keyword>

    <abstract>


<?line 70?>

<t>This document provides a set of compliance statements about the CMC
(Certificate Management over CMS) enrollment protocol.  The ASN.1
structures and the transport mechanisms for the CMC enrollment
protocol are covered in other documents.  This document provides the
information needed to make a compliant version of CMC.</t>

<t>This document obsoletes RFCs 5274 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/TBD"/>.</t>
    </note>


  </front>

  <middle>


<?line 80?>

<section anchor="introduction"><name>Introduction</name>

<t>The CMC (Certificate Management over CMS) protocol is designed in
terms of a client/server relationship.  In the simplest case, the
client is the requestor of the certificate (i.e., the End Entity
(EE)) and the server is the issuer of the certificate (i.e., the
Certification Authority (CA)).  The introduction of a Registration
Authority (RA) into the set of agents complicates the picture only
slightly.  The RA becomes the server with respect to the certificate
requestor, and it becomes the client with respect to the certificate
issuer.  Any number of RAs can be inserted into the picture in this
manner.</t>

<t>The RAs may serve specialized purposes that are not currently covered
by this document.  One such purpose would be a Key Escrow agent.  As
such, all certificate requests for encryption keys would be directed
through this RA and it would take appropriate action to do the key
archival.  Key recovery requests could be defined in the CMC
methodology allowing for the Key Escrow agent to perform that
operation acting as the final server in the chain of agents.</t>

<t>If there are multiple RAs in the system, it is considered normal that
not all RAs will see all certificate requests.  The routing between
the RAs may be dependent on the content of the certificate requests
involved.</t>

<t>This document is divided into six sections, each section specifying
the requirements that are specific to a class of agents in the CMC
model.  These are 1) all Entities, 2) all Servers, 3) all Clients, 4)
all End-Entities, 5) all Registration Authorities, 6) all Certification
Authorities.</t>

<t>This document obsoletes <xref target="CMC-COMPv1"/> and <xref target="CMC-Updates"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>There are several different terms, abbreviations, and acronyms used
in this document that we define here for convenience and consistency
of usage:</t>

<dl>
  <dt>End-Entity (EE):</dt>
  <dd>
    <t>Refers to the entity that owns a key pair and for
whom a certificate is issued.</t>
  </dd>
  <dt>Registration Authority (RA) or Local RA (LRA):</dt>
  <dd>
    <t>Refers to an entity
that acts as an intermediary between the EE and the CA.  Multiple
RAs can exist between the End-Entity and the Certification
Authority.  RAs may perform additional services such as key
generation or key archival.  This document uses the term RA for
both RA and LRA.</t>
  </dd>
  <dt>Certification Authority (CA):</dt>
  <dd>
    <t>Refers to the entity that issues
certificates.</t>
  </dd>
  <dt>Client:</dt>
  <dd>
    <t>Refers to an entity that creates a PKI Request.  In this
document, both RAs and EEs can be clients.</t>
  </dd>
  <dt>Server:</dt>
  <dd>
    <t>Refers to the entities that process PKI Requests and create
PKI Responses.  In this document both CAs and RAs can be servers.</t>
  </dd>
  <dt>PKCS #10:</dt>
  <dd>
    <t>Refers to the Public Key Cryptography Standard #10
<xref target="PKCS10"/>, which defines a certification request syntax.</t>
  </dd>
  <dt>CRMF:</dt>
  <dd>
    <t>Refers to the Certificate Request Message Format RFC <xref target="CRMF"/>.
CMC uses this certification request syntax defined in this
document as part of the protocol.</t>
  </dd>
  <dt>CMS:</dt>
  <dd>
    <t>Refers to the Cryptographic Message Syntax RFC <xref target="CMS"/>.  This
document provides for basic cryptographic services including
encryption and signing with and without key management.</t>
  </dd>
  <dt>PKI Request/Response:</dt>
  <dd>
    <t>Refers to the requests/responses described in
this document.  PKI Requests include certification requests,
revocation requests, etc.  PKI Responses include certs-only
messages, failure messages, etc.</t>
  </dd>
  <dt>Proof-of-Identity:</dt>
  <dd>
    <t>Refers to the client proving they are who they say
that they are to the server.</t>
  </dd>
  <dt>Proof-of-Possession (POP):</dt>
  <dd>
    <t>Refers to a value that can be used to
prove that the private key corresponding to a public key is in the
possession and can be used by an end-entity.</t>
  </dd>
  <dt>Transport wrapper:</dt>
  <dd>
    <t>Refers to the outermost CMS wrapping layer.</t>
  </dd>
</dl>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-rfc-5274-and-6402"><name>Changes since RFC 5274 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -03 WG version:</t>

<t><list style="symbols">
  <t>Add cryptographic algorithm requirements</t>
</list></t>

<t>-02 WG version changes:</t>

<t><list style="symbols">
  <t>Reformat cryptographic algorithm section</t>
</list></t>

<t>-01 WG version changes:</t>

<t><list style="symbols">
  <t>Updated references</t>
</list></t>

<t>-00 WG version changes:</t>

<t><list style="symbols">
  <t>Added pre-5378 boilerplate</t>
</list></t>

<t>-02 individual version changes:</t>

<t><list style="symbols">
  <t>Updated text in intro</t>
  <t>Changed "all agents" to "all entities" in overview</t>
  <t>Updated section header numbering</t>
</list></t>

<t>-01 individual version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Changed RFC 5273 references to draft-mandel-lamps-rfc5273bis</t>
</list></t>

<t>-00 individual version changes:</t>

<t><list style="symbols">
  <t>Added "Changes Since 5274 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="requirements-for-all-entities"><name>Requirements for All Entities</name>

<t>All <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> compliance statements <bcp14>MUST</bcp14> be
adhered to unless specifically stated otherwise in this document.</t>

<t>All entities <bcp14>MUST</bcp14> support Full PKI Requests, Simple PKI Responses,
and Full PKI Responses.  Servers <bcp14>SHOULD</bcp14> support Simple PKI Requests.</t>

<t>All entities <bcp14>MUST</bcp14> support the use of the CRMF syntax for
certification requests.  Support for the PKCS #10 syntax for
certification requests <bcp14>SHOULD</bcp14> be implemented by servers.</t>

<t>The extendedFailInfo field <bcp14>SHOULD NOT</bcp14> be populated in the
CMCStatusInfoV2 object; the failInfo field <bcp14>SHOULD</bcp14> be used to relay
this information.  If the extendedFailInfo field is used, it is
suggested that an additional CMCStatusInfoV2 item exist for the same
body part with a failInfo field.</t>

<t>All entities <bcp14>MUST</bcp14> implement the HTTP transport mechanism as defined
in <xref target="CMC-TRANS"/>.  Other transport mechanisms <bcp14>MAY</bcp14> be implemented.</t>

<section anchor="cryptographic-algorithm-requirements"><name>Cryptographic Algorithm Requirements</name>

<t>The following table shows the algorithm requirements that must be used for SignedData and AuthenticatedData.</t>

<t>Description of the columns in the table:</t>

<t>Use: Description of the key usage
Mandatory: Algorithms that <bcp14>MUST</bcp14> be supported by conforming implementations
Recommend: Algorithms that <bcp14>SHOULD</bcp14> be supported
Optional: Algorithms that <bcp14>MAY</bcp14> be supported</t>

<texttable title="Algorithm Requirements for SignedData and AuthenticatedData" anchor="AlgReq-SD-and-AD">
      <ttcol align='left'>Use</ttcol>
      <ttcol align='left'>Mandatory</ttcol>
      <ttcol align='left'>Recommend</ttcol>
      <ttcol align='left'>Optional</ttcol>
      <c>Verify signature in SignedData</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>other algorithms</c>
      <c>Generate signature for SignedData</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>other algorithms</c>
      <c>Content encryption for EnvelopedData</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>other algorithms</c>
      <c>Key transport for EnvelopedData</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>other algorithms</c>
</texttable>

<t>The following table shows the algorithm requirements for EnvelopedData and AuthenticatedData if supported by the entity.</t>

<t>Description of the columns in the table:</t>

<t>Use: Description of key usage
Mandatory: Algorithms that <bcp14>MUST</bcp14> be supported by conforming implementations
Recommend: Algorithms that <bcp14>SHOULD</bcp14> be supported
Optional: Algorithms that <bcp14>MAY</bcp14> be supported</t>

<texttable title="Algorithm Requirements for EnvelopedData and AuthenticatedData" anchor="AlgReq-ED-and-AD">
      <ttcol align='left'>Use</ttcol>
      <ttcol align='left'>Mandatory</ttcol>
      <ttcol align='left'>Recommend</ttcol>
      <ttcol align='left'>Optional</ttcol>
      <c>key agreement for EnvelopedData</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>PasswordRecipientInfo for EnvelopedData or AuthenticatedData</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>AuthenticatedData</c>
      <c>PasswordRecipientInfo</c>
      <c>TBD</c>
      <c>TBD</c>
</texttable>

<t>The following table shows the algorithm requirements for Controls.</t>

<t>Description of the columns in the table:</t>

<t>Control: Control carried as part of Full PKI Requests and Responses
AlgId: Notes the algorithm identifier which is used
Mandatory: Algorithms that <bcp14>MUST</bcp14> be supported by conforming implementations
Recommend: Algorithms that <bcp14>SHOULD</bcp14> be supported
Optional: Algorithms that <bcp14>MAY</bcp14> be supported</t>

<texttable title="Algorithm Requirements for Controls" anchor="AlgReq-Controls">
      <ttcol align='left'>Control</ttcol>
      <ttcol align='left'>AlgId</ttcol>
      <ttcol align='left'>Mandatory</ttcol>
      <ttcol align='left'>Recommend</ttcol>
      <ttcol align='left'>Optional</ttcol>
      <c>Identity Proof Version 2 control</c>
      <c>hashAlgId</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>Identity Proof Version 2 control</c>
      <c>macAlgId</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>Pop Link Witness Version 2 control</c>
      <c>keyGenAlgorithm</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>Pop Link Witness Version 2 control</c>
      <c>macAlgorithm</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>Encrypted POP and Decrypted POP controls</c>
      <c>witnessAlgID</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>Encrypted POP and Decrypted POP controls</c>
      <c>thePOPAlgID</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>Publish Trust Anchors control</c>
      <c>hashAlgorithm</c>
      <c>TBD</c>
      <c>TBD</c>
      <c>TBD</c>
</texttable>

<t>The following table shows the algorithm requirements for Proof of Possession (POP) of DH Certification Requests and the No-Signature mechanism.</t>

<t>Description of the columns in the table:</t>

<t>Use: Request type from Appendix C of <xref target="CMC-STRUCT"/>
Mandatory: Algorithms that <bcp14>MUST</bcp14> be supported by conforming implementations
Recommend: Algorithms that <bcp14>SHOULD</bcp14> be supported
Optional: Algorithms that <bcp14>MAY</bcp14> be supported</t>

<texttable title="Algorithm Requirements for DH Certification Requests and the No-Signature mechanism" anchor="AlgReq-DH-and-NS">
      <ttcol align='left'>Use</ttcol>
      <ttcol align='left'>Mandatory</ttcol>
      <ttcol align='left'>Recommend</ttcol>
      <ttcol align='left'>Optional</ttcol>
      <c>EE generates DH keys for certification</c>
      <c>EE and CA/RA <xref section="4" sectionFormat="of" target="DH-POP"/></c>
      <c>{TBD}</c>
      <c>EE and CA/RA <xref section="3" sectionFormat="of" target="DH-POP"/></c>
      <c>No-Signature Signature Mechanism</c>
      <c>Appendix C of <xref target="CMC-STRUCT"/></c>
      <c>{TBD}</c>
      <c>{TBD}</c>
</texttable>

</section>
<section anchor="controls"><name>Controls</name>

<t>The following table lists the name and level of support required for
each control.</t>

<texttable title="CMC Control Attributes" anchor="cmc-controls">
      <ttcol align='left'>Control</ttcol>
      <ttcol align='left'>EE</ttcol>
      <ttcol align='left'>RA</ttcol>
      <ttcol align='left'>CA</ttcol>
      <c>Extended CMC Status Info</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>CMC Status Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identity Proof Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Identity Proof</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identification</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Random</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Data Return</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Modify Cert Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Add Extensions</c>
      <c>N/A</c>
      <c><bcp14>MAY</bcp14></c>
      <c>(1)</c>
      <c>Transaction ID</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Sender Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Recipient Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Encrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Decrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>RA POP Witness</c>
      <c>N/A</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>(1)</c>
      <c>Get Certificate</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Get CRL</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Revocation Request</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Registration Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Response Information</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Query Pending</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Confirm Cert.  Acceptance</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Publish Trust Anchors</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Authenticate Data</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Batch Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Batch Responses</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Publication Information</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Control Processed</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>RA Identity Proof Witness</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Response Body</c>
      <c>(6)</c>
      <c>(6)</c>
      <c>N/A.</c>
</texttable>

<t>Notes:</t>

<t><list style="numbers" type="1">
  <t>CAs <bcp14>SHOULD</bcp14> implement this control if designed to work with RAs.</t>
  <t>CAs <bcp14>MUST</bcp14> implement this control if designed to work with RAs.</t>
  <t>Implementation is optional for these controls.  We strongly
suggest that they be implemented in order to populate client
trust anchors.</t>
  <t>EEs only need to implement this if (a) they support key agreement
algorithms or (b) they need to operate in environments where the
hardware keys cannot provide POP.</t>
  <t>RAs <bcp14>SHOULD</bcp14> implement this if they implement RA POP Witness.</t>
  <t>EE's <bcp14>SHOULD</bcp14> implement if designed to work with RAs and <bcp14>MUST</bcp14>
implement if intended to be used in environments where RAs are
used for identity validation or key generation.  RAs <bcp14>SHOULD</bcp14>
implement and validate responses for consistency.</t>
</list></t>

<t>Strong consideration should be given to implementing the Authenticate
Data and Publish Trust Anchors controls as this gives a simple method
for distributing trust anchors into clients without user
intervention.</t>

</section>
<section anchor="crmf-feature-requirements"><name>CRMF Feature Requirements</name>

<t>The following additional restrictions are placed on CRMF features:</t>

<t>The registration control tokens id-regCtrl-regToken and id-regCtrl-
authToken <bcp14>MUST NOT</bcp14> be used.  No specific CMC feature is used to
replace these items, but generally the CMC controls identification
and identityProof will perform the same service and are more
specifically defined.</t>

<t>The control token id-regCtrl-pkiArchiveOptions <bcp14>SHOULD NOT</bcp14> be
supported.  An alternative method is under development to provide
this functionality.</t>

<t>The behavior of id-regCtrl-oldCertID is not presently used.  It is
replaced by issuing the new certificate and using the id-cmc-
publishCert to remove the old certificate from publication.  This
operation would not normally be accompanied by an immediate
revocation of the old certificate; however, that can be accomplished
by the id-cmc-revokeRequest control.</t>

<t>The id-regCtrl-protocolEncrKey is not used.</t>

</section>
</section>
<section anchor="requirements-for-clients"><name>Requirements for Clients</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-servers"><name>Requirements for Servers</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-ees"><name>Requirements for EEs</name>

<t>If an entity implements Diffie-Hellman, it <bcp14>MUST</bcp14> implement either the
DH-POP Proof-of-Possession as defined in <xref section="4" sectionFormat="of" target="DH-POP"/> or the
challenge-response POP controls id-cmc-encryptedPOP and id-cmc-
decryptedPOP.</t>

</section>
<section anchor="requirements-for-ras"><name>Requirements for RAs</name>

<t>RAs <bcp14>SHOULD</bcp14> be able to do delegated POP.  RAs implementing this
feature <bcp14>MUST</bcp14> implement the id-cmc-lraPOPWitness control.</t>

<t>All RAs <bcp14>MUST</bcp14> implement the promotion of the id-aa-cmc-unsignedData as
covered in <xref section="3.2.3" sectionFormat="of" target="CMC-STRUCT"/>.</t>

</section>
<section anchor="requirements-for-cas"><name>Requirements for CAs</name>

<t>Providing for CAs to work in an environment with RAs is strongly
suggested.  Implementation of such support is strongly suggested as
this permits the delegation of substantial administrative interaction
onto an RA rather than at the CA.</t>

<t>CAs <bcp14>MUST</bcp14> perform at least minimal checks on all public keys before
issuing a certificate.  At a minimum, a check for syntax would occur
with the POP operation.  Additionally, CAs <bcp14>SHOULD</bcp14> perform simple
checks for known bad keys such as small subgroups for DSA-SHA1 and DH
keys <xref target="SMALL-SUB-GROUP"/> or known bad exponents for RSA keys.</t>

<t>CAs <bcp14>MUST</bcp14> enforce POP checking before issuing any certificate.  CAs
<bcp14>MAY</bcp14> delegate the POP operation to an RA for those cases where 1) a
challenge/response message pair must be used, 2) an RA performs
escrow of a key and checks for POP in that manner, or 3) an unusual
algorithm is used and that validation is done at the RA.</t>

<t>CAs <bcp14>SHOULD</bcp14> implement both the DH-POP Proof-of-Possession as defined
in <xref section="4" sectionFormat="of" target="DH-POP"/> and the challenge-response POP controls id-
cmc-encryptedPOP and id-cmc-decryptedPOP.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document uses <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> as building blocks to
this document.  The security sections of those two documents are
included by reference.</t>

<t>Knowledge of how an entity is expected to operate is vital in
determining which sections of requirements are applicable to that
entity.  Care needs to be taken in determining which sections apply
and fully implementing the necessary code.</t>

<t>Cryptographic algorithms have and will be broken or weakened.
Implementers and users need to check that the cryptographic
algorithms listed in this document make sense from a security level.
The IETF from time to time may issue documents dealing with the
current state of the art.  Two examples of such documents are
<xref target="SMALL-SUB-GROUP"/> and <xref target="HASH-ATTACKS"/>.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="3" month="March" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-02"/>
   
</reference>

<reference anchor="CMC-TRANS">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="29" month="September" year="2024"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFCs 5273 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5273bis-01"/>
   
</reference>
<reference anchor="CMS">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>
<reference anchor="CMS-AES">
  <front>
    <title>Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document specifies the conventions for using the Advanced Encryption Standard (AES) algorithm for encryption with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3565"/>
  <seriesInfo name="DOI" value="10.17487/RFC3565"/>
</reference>
<reference anchor="CMS-ALG">
  <front>
    <title>Cryptographic Message Syntax (CMS) Algorithms</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3370"/>
  <seriesInfo name="DOI" value="10.17487/RFC3370"/>
</reference>
<reference anchor="CMS-DH">
  <front>
    <title>Diffie-Hellman Key Agreement Method</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="June" year="1999"/>
    <abstract>
      <t>This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1 working group. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2631"/>
  <seriesInfo name="DOI" value="10.17487/RFC2631"/>
</reference>
<reference anchor="CRMF">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="September" year="2005"/>
    <abstract>
      <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4211"/>
  <seriesInfo name="DOI" value="10.17487/RFC4211"/>
</reference>
<reference anchor="CMS-RSA-OAEP">
  <front>
    <title>Use of the RSAES-OAEP Key Transport Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document describes the conventions for using the RSAES-OAEP key transport algorithm with the Cryptographic Message Syntax (CMS). The CMS specifies the enveloped-data content type, which consists of an encrypted content and encrypted content-encryption keys for one or more recipients. The RSAES-OAEP key transport algorithm can be used to encrypt content-encryption keys for intended recipients. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3560"/>
  <seriesInfo name="DOI" value="10.17487/RFC3560"/>
</reference>
<reference anchor="CMS-RSA-PSS">
  <front>
    <title>Use of the RSASSA-PSS Signature Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document specifies the conventions for using the RSASSA-PSS (RSA Probabilistic Signature Scheme) digital signature algorithm with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4056"/>
  <seriesInfo name="DOI" value="10.17487/RFC4056"/>
</reference>
<reference anchor="DH-POP">
  <front>
    <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
    <date month="May" year="2013"/>
    <abstract>
      <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
      <t>This document obsoletes RFC 2875.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6955"/>
  <seriesInfo name="DOI" value="10.17487/RFC6955"/>
</reference>
<reference anchor="RSA-256">
  <front>
    <title>Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document supplements RFC 3279. It describes the conventions for using the RSA Probabilistic Signature Scheme (RSASSA-PSS) signature algorithm, the RSA Encryption Scheme - Optimal Asymmetric Encryption Padding (RSAES-OAEP) key transport algorithm and additional one-way hash functions with the Public-Key Cryptography Standards (PKCS) #1 version 1.5 signature algorithm in the Internet X.509 Public Key Infrastructure (PKI). Encoding formats, algorithm identifiers, and parameter formats are specified. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4055"/>
  <seriesInfo name="DOI" value="10.17487/RFC4055"/>
</reference>
<reference anchor="PBKDF2">
  <front>
    <title>PKCS #5: Password-Based Cryptography Specification Version 2.0</title>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="September" year="2000"/>
    <abstract>
      <t>This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message-authentication schemes, and ASN.1 syntax identifying the techniques. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2898"/>
  <seriesInfo name="DOI" value="10.17487/RFC2898"/>
</reference>
<reference anchor="AES-WRAP">
  <front>
    <title>Advanced Encryption Standard (AES) Key Wrap Algorithm</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3394"/>
  <seriesInfo name="DOI" value="10.17487/RFC3394"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="PKCS10">
  <front>
    <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
    <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="November" year="2000"/>
    <abstract>
      <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2986"/>
  <seriesInfo name="DOI" value="10.17487/RFC2986"/>
</reference>
<reference anchor="SMALL-SUB-GROUP">
  <front>
    <title>Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME</title>
    <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
    <date month="March" year="2000"/>
    <abstract>
      <t>This document will describe the situations relevant to implementations of S/MIME version 3 in which protection is necessary and the methods that can be used to prevent these attacks. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2785"/>
  <seriesInfo name="DOI" value="10.17487/RFC2785"/>
</reference>
<reference anchor="HASH-ATTACKS">
  <front>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="B. Schneier" initials="B." surname="Schneier"/>
    <date month="November" year="2005"/>
    <abstract>
      <t>Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols need to be changed, and if so, how. This document summarizes the use of hashes in many protocols, discusses how the collision attacks affect and do not affect the protocols, shows how to thwart known attacks on digital certificates, and discusses future directions for protocol designers. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4270"/>
  <seriesInfo name="DOI" value="10.17487/RFC4270"/>
</reference>

<reference anchor="CMC-COMPv1">
   <front>
      <title>Certificate Management Messages over CMS (CMC): Compliance Requirements</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="29" month="September" year="2024"/>
      <abstract>
	 <t>   This document provides a set of compliance statements about the CMC
   (Certificate Management over CMS) enrollment protocol.  The ASN.1
   structures and the transport mechanisms for the CMC enrollment
   protocol are covered in other documents.  This document provides the
   information needed to make a compliant version of CMC.

   This document obsoletes RFCs 5274 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5274bis-01"/>
   
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>



    </references>

</references>


<?line 508?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

