<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc6712bis-06" category="std" consensus="true" submissionType="IETF" xml:lang="en" obsoletes="6712 9480" tocDepth="4" tocInclude="true" sortRefs="false" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="RFC6712bis">Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management Protocol (CMP)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc6712bis-06"/>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="D." surname="von Oheimb" fullname="David von Oheimb">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>david.von.oheimb@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust</organization>
      <address>
        <postal>
          <street>1187 Park Place</street>
          <city>Minneapolis</city>
          <region>MN</region>
          <code>55379</code>
          <country>United States of America</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
        <uri>https://www.entrust.com</uri>
      </address>
    </author>
    <author initials="J." surname="Gray" fullname="John Gray">
      <organization abbrev="Entrust">Entrust</organization>
      <address>
        <postal>
          <street>1187 Park Place</street>
          <city>Minneapolis</city>
          <region>MN</region>
          <code>55379</code>
          <country>United States of America</country>
        </postal>
        <email>john.gray@entrust.com</email>
        <uri>https://www.entrust.com</uri>
      </address>
    </author>
    <date year="2024"/>
    <workgroup>LAMPS Working Group</workgroup>
    <abstract>
      <?line 77?>

<t>This document describes how to layer the Certificate Management Protocol
(CMP) over HTTP.</t>
      <t>It includes the updates on RFC 6712 specified in CMP Updates RFC 9480 Section
3 and obsoleted both documents.  These updates introduce CMP URIs using a
Well-known prefix.</t>
    </abstract>
  </front>
  <middle>
    <?line 87?>

<section anchor="sect-1">
      <name>Introduction</name>
      <t>[RFC Editor: please delete:</t>
      <t>During IESG telechat the CMP Updates document was approved on condition that
LAMPS provides a RFC6712bis document.  Version -00 of this document shall
be identical to RFC 6712 and version -01 incorporates the changes specified
in CMP Updates Section 3.</t>
      <t>A history of changes is available in Appendix A of this document.</t>
      <t>The authors of this document wish to thank Tomi Kause and Martin Peylo, the
original authors of RFC 6712, for their work and invite them, next to further
volunteers, to join the -bis activity as co-authors.</t>
      <t>]</t>
      <t>[RFC Editor:</t>
      <t>Please perform the following substitution.</t>
      <ul spacing="normal">
        <li>
          <t>RFCXXXX ---&gt; the assigned numerical RFC value for this draft</t>
        </li>
        <li>
          <t>RFCCCCC ---&gt; the assigned numerical RFC value for <xref target="I-D.ietf-lamps-rfc4210bis"/></t>
        </li>
      </ul>
      <t>]</t>
      <t>The Certificate Management Protocol (CMP) [RFCCCCC] requires a well-defined
transfer mechanism to enable End Entities (EEs), Registration
Authorities (RAs), and Certification Authorities (CAs) to pass
PKIMessage sequences between them.</t>
      <t>The first version of the CMP specification <xref target="RFC2510"/> included a brief
description of a simple transfer protocol layer on top of TCP.  Its
features were simple transfer-level error handling and a mechanism to
poll for outstanding PKI messages.  Additionally, it was mentioned
that PKI messages could also be conveyed using file-, E-mail-, and
HTTP-based transfer, but those were not specified in detail.</t>
      <t>The second version of the CMP specification <xref target="RFC4210"/> incorporated
its own polling mechanism and thus the need for a transfer protocol
providing this functionality vanished.  The remaining features CMP
requires from its transfer protocols are connection and error
handling.</t>
      <t>CMP can benefit from utilizing a reliable transport and it requires connection and error handling
from the transfer protocol, which is all covered by HTTP.  Additionally,
delayed delivery of CMP response messages may be handled at transfer level,
regardless of the message contents.  Since <xref target="RFC9480"/> extends the polling
mechanism specified in the second version of <xref target="RFC4210">CMP</xref> to cover
all types of PKI management transactions, delays detected at application
level may also be handled within CMP, using pollReq and pollRep messages.</t>
      <t>The usage of HTTP for transferring CMP messages exclusively uses the
POST method for requests, effectively tunneling CMP over HTTP.  While
this is generally considered bad practice and should not be emulated,
there are good reasons to do so for transferring CMP.  HTTP is used
as it is generally easy to implement and it is able to traverse
network borders utilizing ubiquitous proxies.  Most importantly, HTTP
is already commonly used in existing CMP implementations.  Other HTTP
request methods, such as GET, are not used because PKI management
operations can only be triggered using CMP's PKI messages, which need
to be transferred using a POST request.</t>
      <t>With its status codes, HTTP provides needed error reporting
capabilities.  General problems on the server side, as well as those
directly caused by the respective request, can be reported to the
client.</t>
      <t>As CMP implements a transaction ID, identifying transactions spanning
over more than just a single request/response pair, the statelessness
of HTTP is not blocking its usage as the transfer protocol for CMP
messages.</t>
      <section anchor="sect-1.1">
        <name>Changes Since RFC 6712</name>
        <t>CMP Updates <xref target="RFC9480"/> updated <xref target="RFC6712"/>, supporting the PKI
management operations specified in the Lightweight CMP
Profile <xref target="RFC9483"/>, in the following areas:</t>
        <ul spacing="normal">
          <li>
            <t>Introduce the HTTP URI path prefix '/.well-known/cmp'.</t>
          </li>
          <li>
            <t>Add options for extending the URI structure with further segments and to
this end define a new protocol registry group.</t>
          </li>
        </ul>
      </section>
      <section anchor="sect-1.2">
        <name>Changes Made by This Document</name>
        <t>This document obsoletes <xref target="RFC6712">RFC 6712</xref>.
It includes the changes specified by CMP Updates <xref target="RFC9480"/> Section 3 as
described in <xref target="sect-1.1"/>.</t>
      </section>
    </section>
    <section anchor="sect-2">
      <name>Conventions Used in This Document</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="sect-3">
      <name>HTTP-Based Protocol</name>
      <t>For direct interaction between two entities, where a reliable
transport protocol like TCP is available, HTTP <bcp14>SHOULD</bcp14> be utilized for
conveying CMP messages.</t>
      <section anchor="sect-3.1">
        <name>HTTP Versions</name>
        <t>Implementations <bcp14>MUST</bcp14> support HTTP/1.0 <xref target="RFC1945"/> and <bcp14>SHOULD</bcp14> support
HTTP/1.1 <xref target="RFC9112"/>.</t>
      </section>
      <section anchor="sect-3.2">
        <name>Persistent Connections</name>
        <t>HTTP persistent connections <xref target="RFC9112"/> allow multiple interactions to
take place on the same HTTP connection.  However, neither HTTP nor
the protocol specified in this document are designed to correlate
messages on the same connection in any meaningful way; persistent
connections are only a performance optimization.  In particular,
intermediaries can do things like mix connections from different
clients into one "upstream" connection, terminate persistent
connections, and forward requests as non-persistent requests, etc.
As such, implementations <bcp14>MUST NOT</bcp14> infer that requests on the same
connection come from the same client (e.g., for correlating PKI
messages with ongoing transactions); every message is to be evaluated
in isolation.</t>
      </section>
      <section anchor="sect-3.3">
        <name>General Form</name>
        <t>A DER-encoded <xref target="ITU.X690.1994"/> PKIMessage [RFCCCCC] is sent as the
entity-body of an HTTP POST request.  If this HTTP request is
successful, the server returns the CMP response in the body of the
HTTP response.  The HTTP response status code in this case <bcp14>MUST</bcp14> be
200; other "Successful 2xx" codes <bcp14>MUST NOT</bcp14> be used for this purpose.
HTTP responses to pushed CMP Announcement messages (i.e., CA
Certificate Announcement, Certificate Announcement, Revocation
Announcement, and Certificate Revocation List (CRL) Announcement)
utilize the status codes 201 and 202 to identify whether the received
information was processed.</t>
        <t>While "Redirection 3xx" status codes <bcp14>MAY</bcp14> be supported by
implementations, clients should only be enabled to automatically
follow them after careful consideration of possible security
implications.  As described in <xref target="sect-5"/>, "301 Moved Permanently"
could be misused for permanent denial of service.</t>
        <t>All applicable "Client Error 4xx" or "Server Error 5xx" status codes
<bcp14>MAY</bcp14> be used to inform the client about errors.</t>
      </section>
      <section anchor="sect-3.4">
        <name>Header Fields</name>
        <t>The Internet Media Type "application/pkixcmp" <bcp14>MUST</bcp14> be set in the HTTP
Content-Type header field when conveying a PKIMessage.</t>
        <t>The Content-Length header field <bcp14>SHOULD</bcp14> be provided, giving the length of
the ASN.1-encoded PKIMessages.</t>
      </section>
      <section anchor="sect-3.5">
        <name>Communication Workflow</name>
        <t>In CMP, most communication is initiated by the EEs where every CMP
request triggers a CMP response message from the CA or RA.</t>
        <t>The CMP Announcement messages described in <xref target="sect-3.7"/> are an
exception.  Their creation may be triggered by certain events or done
on a regular basis by a CA.  The recipient of the Announcement only
replies with an HTTP status code acknowledging the receipt or
indicating an error, but not with a CMP response.</t>
        <t>If the receipt of an HTTP request is not confirmed by receiving an
HTTP response, it <bcp14>MUST</bcp14> be assumed that the transferred CMP message
was not successfully delivered to its destination.</t>
      </section>
      <section anchor="sect-3.6">
        <name>HTTP Request-URI</name>
        <t>Each CMP server on a PKI management entity supporting HTTP or HTTPS transfer
<bcp14>MUST</bcp14> support the use of the path prefix '/.well-known/' as defined in
<xref target="RFC8615"/> and the registered name 'cmp' to ease interworking
in a multi-vendor environment.</t>
        <t>The CMP client needs to be configured with sufficient information to form
the CMP server URI.  This is at least the authority portion of the URI, e.g.,
'www.example.com:80', or the full operation path segment of the PKI management
entity. Additionally, <bcp14>OPTIONAL</bcp14> path segments <bcp14>MAY</bcp14> be added after the registered
application name as part of the full operation path to provide further distinction.
The path segment 'p' followed by an arbitraryLabel &lt;name&gt; could, for example,
support the differentiation of specific CAs or certificate profiles. Further
path segments, e.g., as specified in the Lightweight CMP Profile <xref target="RFC9483"/>,
could indicate PKI management operations using an operationLabel &lt;operation&gt;.
A valid, full CMP URI can look like this:</t>
        <ul empty="true">
          <li>
            <t>http://www.example.com/.well-known/cmp</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>http://www.example.com/.well-known/cmp/&lt;operation&gt;</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>http://www.example.com/.well-known/cmp/p/&lt;name&gt;</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>http://www.example.com/.well-known/cmp/p/&lt;name&gt;/&lt;operation&gt;</t>
          </li>
        </ul>
      </section>
      <section anchor="sect-3.7">
        <name>Pushing of Announcements</name>
        <t>A CMP server may create event-triggered announcements or generate
them on a regular basis.  It <bcp14>MAY</bcp14> utilize HTTP transfer to convey them
to a suitable recipient.  In this use case, the CMP server acts as an
HTTP client, and the recipient needs to utilize an HTTP server.  As
no request messages are specified for those announcements, they can
only be pushed to the recipient.</t>
        <t>If an EE wants to poll for a potential CA Key Update Announcement or
the current CRL, a PKI Information Request using a General Message as
described in Appendix E.5 of [RFCCCCC] can be used.</t>
        <t>When pushing Announcement messages, PKIMessage structures are sent as
the entity-body of an HTTP POST request.</t>
        <t>Suitable recipients for CMP announcements might, for example, be
repositories storing the announced information, such as directory
services.  Those services listen for incoming messages, utilizing the
same HTTP Request-URI scheme as defined in <xref target="sect-3.6"/>.</t>
        <t>The following PKIMessages are announcements that may be pushed by a
CA.  The prefixed numbers reflect ASN.1 numbering of the respective
element.</t>
        <artwork><![CDATA[
   [15] CA Key Update Announcement
   [16] Certificate Announcement
   [17] Revocation Announcement
   [18] CRL Announcement
]]></artwork>
        <t>CMP Announcement messages do not require any CMP response.  However,
the recipient <bcp14>MUST</bcp14> acknowledge receipt with an HTTP response having
an appropriate status code and an empty body.  When not receiving
such a response, it <bcp14>MUST</bcp14> be assumed that the delivery was not
successful.  If applicable, the sending side <bcp14>MAY</bcp14> try sending the
Announcement again after waiting for an appropriate time span.</t>
        <t>If the announced issue was successfully stored in a database or was
already present, the answer <bcp14>MUST</bcp14> be an HTTP response with a "201 Created"
status code and an empty message body.</t>
        <t>In case the announced information was only accepted for further
processing, the status code of the returned HTTP response <bcp14>MAY</bcp14> also be
"202 Accepted".  After an appropriate delay, the sender may then try
to send the Announcement again and may repeat this until it receives
a confirmation that it has been successfully processed.  The
appropriate duration of the delay and the option to increase it
between consecutive attempts should be carefully considered.</t>
        <t>A receiver <bcp14>MUST</bcp14> answer with a suitable 4xx or 5xx HTTP error code
when a problem occurs.</t>
      </section>
      <section anchor="sect-3.8">
        <name>HTTP Considerations</name>
        <t>While all defined features of the HTTP protocol are available to
implementations, they <bcp14>SHOULD</bcp14> keep the protocol utilization as simple
as possible.  For example, there is no benefit in using chunked
Transfer-Encoding, as the length of an ASN.1 sequence is known when
starting to send it.</t>
        <t>There is no need for the clients to send an "Expect" request-header
field with the "100-continue" expectation and wait for a "100 Continue" status
as described in Section 8.2.3 of <xref target="RFC9112"/>.  The CMP
payload sent by a client is relatively small, so having extra
messages exchanged is inefficient, as the server will only seldom
reject a message without evaluating the body.</t>
      </section>
    </section>
    <section anchor="sect-4">
      <name>Implementation Considerations</name>
      <t>Implementors should be aware that implementations might exist that
use a different approach for transferring CMP over HTTP, because
<xref target="RFC6712">RFC 6712</xref> has been under development for more than a decade.
Further, implementations based on earlier drafts of
<xref target="RFC6712">RFC 6712</xref> might use an unregistered
"application/pkixcmp-poll" MIME type.</t>
    </section>
    <section anchor="sect-5">
      <name>Security Considerations</name>
      <t>The following aspects need to be considered by implementers and
users:</t>
      <ol spacing="normal" type="1"><li>
          <t>There is the risk for denial-of-service attacks through resource
  consumption by opening many connections to an HTTP server.
  Therefore, idle connections should be terminated after an
  appropriate timeout; this may also depend on the available free
  resources.  After sending a CMP Error Message, the server should
  close the connection, even if the CMP transaction is not yet
  fully completed.</t>
        </li>
        <li>
          <t>Without being encapsulated in effective security protocols, such
  as Transport Layer Security (TLS) <xref target="RFC5246"/> or <xref target="RFC8446"/>, there is no
  integrity protection at the HTTP protocol level.  Therefore,
  information from the HTTP protocol should not be used to change
  state of the transaction.</t>
        </li>
        <li>
          <t>Client users should be aware that storing the target location of
  an HTTP response with the "301 Moved Permanently" status code
  could be exploited by a man-in-the-middle attacker trying to
  block them permanently from contacting the correct server.</t>
        </li>
        <li>
          <t>If no measures to authenticate and protect the HTTP responses to
  pushed Announcement messages are in place, their information
  regarding the Announcement's processing state may not be trusted.
  In that case, the overall design of the PKI system must not
  depend on the Announcements being reliably received and processed
  by their destination.</t>
        </li>
        <li>
          <t>CMP provides inbuilt integrity protection and authentication.
  The information communicated unencrypted in CMP messages does not
  contain sensitive information endangering the security of the PKI
  when intercepted.  However, it might be possible for an
  eavesdropper to utilize the available information to gather
  confidential technical or business critical information.
  Therefore, users of the HTTP transfer for CMP might want to
  consider using HTTP over TLS according to <xref target="RFC9110"/> or virtual
  private networks created, for example, by utilizing Internet
  Protocol Security according to <xref target="RFC4301"/>.  Compliant
  implementations <bcp14>MUST</bcp14> support TLS with the option to authenticate
  both server and client.</t>
        </li>
      </ol>
    </section>
    <section anchor="sect-6">
      <name>IANA Considerations</name>
      <t>The reference to <xref target="RFC2510"/> at https://www.iana.org/assignments/media-types/media-types.xhtml should be replaced with a reference to this document.</t>
      <t>The reference to <xref target="RFC4210"/> at https://www.iana.org/assignments/core-parameters/core-parameters.xhtml should be replaced with a reference to this document.</t>
      <t>The reference to <xref target="RFC9480"/> at https://www.iana.org/assignments/well-known-uris/well-known-uris.xhtml and https://www.iana.org/assignments/cmp/cmp.xhtmlshould should be replaced with a reference to this document.</t>
      <t>No further action by the IANA is necessary for this document or any anticipated
updates.</t>
    </section>
    <section anchor="sect-7">
      <name>Acknowledgments</name>
      <t>The authors of this document wish to thank Tomi Kause and Martin Peylo, the
original authors of <xref target="RFC6712"/>, for their work.</t>
      <t>We also thank all reviewers of this document for their valuable feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1945">
          <front>
            <title>Hypertext Transfer Protocol -- HTTP/1.0</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="H. Frystyk" initials="H." surname="Frystyk"/>
            <date month="May" year="1996"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1945"/>
          <seriesInfo name="DOI" value="10.17487/RFC1945"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="RFC9112">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-rfc4210bis">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)</title>
            <author fullname="Hendrik Brockhaus" initials="H." surname="Brockhaus">
              <organization>Siemens</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens</organization>
            </author>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document describes the Internet X.509 Public Key Infrastructure
   (PKI) Certificate Management Protocol (CMP).  Protocol messages are
   defined for X.509v3 certificate creation and management.  CMP
   provides interactions between client systems and PKI components such
   as a Registration Authority (RA) and a Certification Authority (CA).

   This document obsoletes RFC 4210 by including the updates specified
   by CMP Updates RFC 9480 Section 2 and Appendix A.2 maintaining
   backward compatibility with CMP version 2 wherever possible and
   obsoletes both documents.  Updates to CMP version 2 are: improving
   crypto agility, extending the polling mechanism, adding new general
   message types, and adding extended key usages to identify special CMP
   server authorizations.  Introducing CMP version 3 to be used only for
   changes to the ASN.1 syntax, which are: support of EnvelopedData
   instead of EncryptedValue, hashAlg for indicating a hash
   AlgorithmIdentifier in certConf messages, and RootCaKeyUpdateContent
   in ckuann messages.

   In addition to the changes specified in CMP Updates RFC 9480 this
   document adds support for management of KEM certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc4210bis-12"/>
        </reference>
        <reference anchor="ITU.X690.1994">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunications Union</organization>
            </author>
            <date year="1994"/>
          </front>
          <seriesInfo name="ITU-T" value="Recommendation X.690"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9480">
          <front>
            <title>Certificate Management Protocol (CMP) Updates</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document contains a set of updates to the syntax of Certificate Management Protocol (CMP) version 2 and its HTTP transfer mechanism. This document updates RFCs 4210, 5912, and 6712.</t>
              <t>The aspects of CMP updated in this document are using EnvelopedData instead of EncryptedValue, clarifying the handling of p10cr messages, improving the crypto agility, as well as adding new general message types, extended key usages to identify certificates for use with CMP, and well-known URI path segments.</t>
              <t>CMP version 3 is introduced to enable signaling support of EnvelopedData instead of EncryptedValue and signal the use of an explicit hash AlgorithmIdentifier in certConf messages, as far as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9480"/>
          <seriesInfo name="DOI" value="10.17487/RFC9480"/>
        </reference>
        <reference anchor="RFC9483">
          <front>
            <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="S. Fries" initials="S." surname="Fries"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document aims at simple, interoperable, and automated PKI management operations covering typical use cases of industrial and Internet of Things (IoT) scenarios. This is achieved by profiling the Certificate Management Protocol (CMP), the related Certificate Request Message Format (CRMF), and transfer based on HTTP or Constrained Application Protocol (CoAP) in a succinct but sufficiently detailed and self-contained way. To make secure certificate management for simple scenarios and constrained devices as lightweight as possible, only the most crucial types of operations and options are specified as mandatory. More specialized or complex use cases are supported with optional features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9483"/>
          <seriesInfo name="DOI" value="10.17487/RFC9483"/>
        </reference>
        <reference anchor="RFC2510">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocols</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="1999"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocols. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2510"/>
          <seriesInfo name="DOI" value="10.17487/RFC2510"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="T. Mononen" initials="T." surname="Mononen"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC4301">
          <front>
            <title>Security Architecture for the Internet Protocol</title>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4301"/>
          <seriesInfo name="DOI" value="10.17487/RFC4301"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC6712">
          <front>
            <title>Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management Protocol (CMP)</title>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="M. Peylo" initials="M." surname="Peylo"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document describes how to layer the Certificate Management Protocol (CMP) over HTTP. It is the "CMPtrans" document referenced in RFC 4210; therefore, this document updates the reference given therein. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6712"/>
          <seriesInfo name="DOI" value="10.17487/RFC6712"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
    </references>
    <?line 472?>

<section anchor="History">
      <name>History of Changes</name>
      <t>Note: This appendix will be deleted in the final version of the document.</t>
      <t>From version 05 -&gt; 06:</t>
      <ul spacing="normal">
        <li>
          <t>Updates IANA considerations addressing IANA early review (see thread "[IANA #1368693] Early review: draft-ietf-lamps-rfc4210bis-12 (IETF 120)").</t>
        </li>
      </ul>
      <t>From version 04 -&gt; 05:</t>
      <ul spacing="normal">
        <li>
          <t>Added IANA considerations addressing IANA early review.</t>
        </li>
      </ul>
      <t>From version 03 -&gt; 04:</t>
      <ul spacing="normal">
        <li>
          <t>Aligned with released RFC 9480 - RFC 9483.</t>
        </li>
      </ul>
      <t>From version 02 -&gt; 03:</t>
      <ul spacing="normal">
        <li>
          <t>Fixing one formatting nit.</t>
        </li>
      </ul>
      <t>From version 01 -&gt; 02:</t>
      <ul spacing="normal">
        <li>
          <t>Updated Section 3.4 including the requirement to add the content-length filed
into the HTTP header.</t>
        </li>
        <li>
          <t>Added a reference to TLS 1.3.</t>
        </li>
        <li>
          <t>Addressed idnits feedback, specifically changing the following RFC references:
RFC2616 -&gt; RFC9112; RFC2818 -&gt; RFC9110, and RFC5246 -&gt; RFC8446</t>
        </li>
      </ul>
      <t>From version 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Performed all updates specified in CMP Updates Section 3.</t>
        </li>
      </ul>
      <t>Version 00:</t>
      <t>This version consists of the text of RFC6712 with the following changes:</t>
      <ul spacing="normal">
        <li>
          <t>Introduced the authors of this document and thanked the authors of RFC6712
for their work.</t>
        </li>
        <li>
          <t>Added a paragraph to the introduction explaining the background of this document.</t>
        </li>
        <li>
          <t>Added the change history to this appendix.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
