<?xml version="1.0" encoding="utf-8"?>
<?xml-model href="rfc7991bis.rnc"?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>

<rfc
  xmlns:xi="http://www.w3.org/2001/XInclude"
  category="info"
  docName="draft-jenkins-cnsa2-pkix-profile-01"
  ipr="trust200902"
  updates=""
  submissionType="independent"
  xml:lang="en"
  version="3">
<!--  obsoletes="8603"  -->


  <front>
    <title abbrev="CNSA2 Cert and CRL Profile">Commercial National Security Algorithm Suite Certificate and Certificate Revocation List Profile</title>

    <seriesInfo name="Internet-Draft" value="draft-jenkins-cnsa2-pkix-profile-01"/>
   
    <author fullname="Michael Jenkins" initials="M" surname="Jenkins">
      <organization abbrev="NSA-CCSS" showOnFrontPage="true">NSA Center for Cybersecurity Standards</organization>
      <address>
        <email>mjjenki@cyber.nsa.gov</email>  
      </address>
    </author>
     <author fullname="Alison Becker" initials="A" surname="Becker">
      <organization abbrev="NSA-CCSS" showOnFrontPage="true">NSA Center for Cybersecurity Standards</organization>
      <address>
        <email>aebecke@uwe.nsa.gov</email>
      </address>
    </author>

    <date year="2024"/>

    <area>Security</area>
    <workgroup>Network Working Group</workgroup>

    <keyword>CNSA</keyword>
    <keyword>NSS</keyword>
    <keyword>certificate</keyword>
    <keyword>crl</keyword>

    <abstract>
      <t>This document specifies a profile of X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for applications that use Commercial National Security Algorithm (CNSA) Suite published by the United States Government.
</t>
      <t>The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates.  US National Security Systems are described in NIST Special Publication 800-59. It is also appropriate for all other US Government systems that process high-value information.
</t>
      <t>The profile is made publicly available for use by developers and operators of these and any other system deployments. <!-- This document obsoletes RFC 8603, the CNSA 1.0 guidance. -->
</t>
    </abstract>
 
  </front>


  <middle>
    
     <section anchor="intro">
        <name>Introduction</name>

        <t>This document specifies a base profile for X.509 v3 Certificates and X.509 v2 Certificate Revocation Lists (CRLs) for use by applications that support the United States National Security Agency's Commercial National Security Algorithm (CNSA) Suite <xref target="annccnsa"/>. The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that employ such X.509 certificates. US National Security Systems are described in NIST Special Publication 800-59 <xref target="SP80059"/>. The profile is also appropriate for all other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.</t>

        <t>This document does not define any cryptographic algorithm; instead, it defines a CNSA-compliant profile of "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile" <xref target="RFC5280"/>. It applies to all CNSA Suite solutions that make use of X.509 v3 Certificates or X.509 v2 CRLs. The reader is assumed to have familiarity with RFC 5280.  All MUST-level requirements of RFC 5280 apply throughout this profile and are generally not repeated here. In cases where a MUST-level requirement is repeated for emphasis, the text notes the requirement is "in adherence with RFC 5280".  This profile contains changes that elevate some SHOULD-level options in RFC 5280 to MUST-level and also contains changes that elevate some MAY-level options in RFC 5280 to SHOULD-level or MUST-level. All options from RFC 5280 that are not listed in this profile remain at the requirement level of RFC 5280.</t>

        <t>[EDNOTE: Need to address how prior CNSA guidance will be superseded.]</t>
<!--        <t>This document obsoletes the CSNA 1.0 guidance in RFC 8603 <xref target="RFC8603"/>.</t>  -->

     </section>   <!-- Introduction -->

       <section anchor="terms">   
         <name>Terminology</name>

         <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

       </section>   <!-- Terminology -->

       <section anchor="cnsa">
         <name>The Commercial National Security Algorithm Suite</name>

         <t>The National Security Agency (NSA) profiles commercial cryptographic algorithms and protocols as part of its mission to support secure, interoperable communications for US Government National Security Systems.  To this end, it publishes guidance both to assist with transitioning the United States Government to new algorithms and to provide vendors, and the Internet community in general, with information concerning their proper use and configuration within the scope of US Government National Security Systems.</t>

         <t>The Commercial National Security Algorithm (CNSA) Suite is the set of approved commercial algorithms that can be used by vendors and IT users to meet cybersecurity and interoperability requirements for NSS.  The first suite of CNSA Suite algorithms, “Suite B”, established a baseline for use of commercial algorithms to protect classified information. The next suite, “CNSA 1.0”, served as a bridge between the original set and a fully post-quantum cryptographic capability. The current suite, “CNSA 2.0”, establishes fully PQ protection <xref target="annccnsa"/>.</t>

         <t>Pursuant to the “National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems” <xref target="NSM-10"/>, the National Institute for Standards and Technology (NIST) has standardized several post-quantum asymmetric algorithms. From these, NSA has selected two: ML-DSA-87 <xref target="FIPS204"/>, a standardized version of CRYSTALS-Dilithium, for signing; and ML-KEM-1024 <xref target="FIPS203"/>, a standardized version of CRYSTALS-Kyber, for key management. With SHA384 (or SHA512), AES-256, and LMS/XMSS, these comprise the CNSA Suite 2.0.</t>

         <t>The NSA is authoring a set of RFCs, including this one, to provide updated guidance for using CNSA 2.0 algorithms in certain IETF protocols.  These RFCs can be used in conjunction with other RFCs and cryptographic guidance (e.g., NIST Special Publications) to properly protect Internet traffic and data-at-rest for US Government National Security Systems.</t>

      </section>   <!-- The Commercial National Security Algorithm Suite -->


      <section anchor="genreq">
         <name>General Requirements</name>

         <t>The goal of this document is to define a base set of requirements for certificates and CRLs to support interoperability among CNSA Suite solutions.  Specific communities, such as those associated with US National Security Systems, may define community profiles that further restrict certificate and CRL contents by mandating the presence of extensions that are optional in this base profile, defining new optional or critical extension types, or restricting the values and/or presence of fields within existing extensions.  However, communications between distinct communities MUST conform with the requirements specified in this document when interoperability is desired.  Applications may add requirements for additional non-critical extensions, but they MUST NOT assume that a remote peer will be able to process them.</t>

         <t>Every CNSA Suite certificate MUST use the X.509 v3 format and contain one of the following:</t>

         <ul>
            <li>A ML-DSA-87 signature verification key.</li>
            <li>A ML-KEM-1024 public encapsulation key.</li>
         </ul>

         <t>The signature applied to all CNSA Suite certificates and CRLs MUST be made with a ML-DSA-87 signing key. The ML-DSA algorithm incorporates an internal hashing function, so there is no need to apply hashing algorithm before signing (aka "pre-hashing"). Where an application or implementation make it more efficient to pre-hash, then the SHA-384 algorithm SHOULD be used, or the SHA-512 algorithm MAY be used. No other hashing algorithms comply with CNSA 2.0.</t>

        <t>The reader is also assumed to have familiarity with these documents:</t>

        <ul>

           <li>draft-ietf-lamps-dilithium-certificates <xref target="I-D.ietf-lamps-dilithium-certificates"/> for the algorithm identifier, and the syntax and semantics for the Subject Public Key Information field in certificates that support ML-DSA-87 and</li>

           <li>draft-ietf-lamps-kyber-certificates <xref target="I-D.ietf-lamps-kyber-certificates"/> for the algorithm identifier, and the syntax and semantics for the Subject Public Key Information field in certificates that support ML-KEM-1024.</li>

        </ul>

      </section>   <!-- General Requirements and Assumptions -->

      <section anchor="oids">
         <name>CNSA Suite Object Identifiers</name>

         <t>The object identifiers for use of CNSA 2.0 Suite in certificates and crls are defined in [list of RFCs including draft-ietf-lamps-dilithium-certificates, draft-ietf-lamps-kyber-certificates]. These OIDs are used to identify both the algorithm associated with the public key (as part of the Subject Public Key Info field), and the signature on a certificate or crl (as part of the signatureAlgorithm field in a Certificate or CertificateList and part of the signature field in a TBSCertificate and TBSCertList). They are repeated here for convenience:</t>

         <sourcecode>
            <![CDATA[
   id-ML-DSA-87 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) 
      country(16) us(840) organization(1) gov(101) csor(3) 
      nistAlgorithm(4) sigAlgs(3) 19 }

   id-alg-ml-kem-1024 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) 
      country(16) us(840) organization(1) gov(101) csor(3) 
      nistAlgorithm(4) kems(4) 3 }
            ]]>
         </sourcecode>
      </section>   <!-- CNSA Suite Object Identifiers -->

      <section anchor="reqval">
         <name>CNSA Suite Base Certificate Required Values</name>

         <t>This section specifies changes to the basic requirements in [RFC5280] for applications that create or use CNSA Suite certificates. Note that RFC 5280 has varying mandates for marking extensions as critical or non-critical. This profile changes some of those mandates for extensions that are included in CNSA Suite certificates.</t>

         <section anchor="sigalg">
            <name>signature and signatureAlgorithm</name>

            <t>ML-DSA-87 is indicated by the id-ML-DSA-87 OID in the AlgorithmIdentifier of the signature field in a TBSCertificate and TBSCertList, and of the signatureAlgorithm field in a Certificate and CertificateList.</t>
      
            <t>The parameters MUST be absent in all AlgorithmIdentifiers.</t>
         </section>   <!-- signatureAlgorithm -->

         <section anchor="sigval">
            <name>signatureValue</name>

            <t>ML-DSA digital signature generation is described in <xref target="FIPS204"/>. It is converted from a byte string to a DER encoded BIT STRING in the signatureValue field of a Certificate or CertificateList.</t>
         </section>   <!-- signatureValue -->

         <section anchor="ver">
            <name>version</name>

            <t>For this profile, version MUST be 'v3', with INTEGER value 2.</t>
         </section>   <!-- version -->

         <section anchor="spki">
            <name>subjectPublicKeyInfo</name>
            <t>For ML-DSA-87 signature verification keys, the algorithm ID id-ML-DSA-87 MUST be used.</t>
            <t>For ML-KEM-1024 key management keys, the algorithm ID id-alg-ml-kem-1024 MUST be used.</t>
            <t>In either case, the parameters of the AlgorithmIdentifier in this field MUST be absent.</t>
         </section>   <!-- subjectPublicKeyInfo -->

      </section>   <!-- CNSA Suite Base Certificate Required Values -->

      <section anchor="cexttypes">
         <name>Certificate Extensions for Particular Types of Certificates</name>

         <t>Different types of certificates in this profile have different required and recommended extensions.  Those are listed in this section. Those extensions from RFC 5280 not explicitly listed in this profile remain at the requirement levels of RFC 5280.</t>

         <section anchor="ssCA">
            <name>CNSA Suite Self-Signed CA Certificates</name>

            <t>In adherence with [RFC5280], self-signed CA certificates in this profile MUST contain the subjectKeyIdentifier, keyUsage, and basicConstraints extensions.</t>

            <t>The keyUsage extension MUST be marked as critical. The keyCertSign and cRLSign bits MUST be set.  The digitalSignature and nonRepudiation bits MAY be set. All other bits MUST NOT be set.</t>

            <t>In adherence with [RFC5280], the basicConstraints extension MUST be marked as critical. The cA boolean MUST be set to indicate that the subject is a CA, and the pathLenConstraint MUST NOT be present.</t>

         </section>   <!-- CNSA Suite Self-Signed CA Certificates -->

         <section anchor="nonssCA">
            <name>CNSA Suite Non-Self-Signed CA Certificates</name>

            <t>Non-self-signed CA Certificates in this profile MUST contain the authorityKeyIdentifier, keyUsage, and basicConstraints extensions. If there is a policy to be asserted, then the certificatePolicies extension MUST be included.</t>

            <t>The keyUsage extension MUST be marked as critical.  The keyCertSign and CRLSign bits MUST be set.  The digitalSignature and nonRepudiation bits MAY be set.  All other bits MUST NOT be set.</t>

            <t>In adherence with [RFC5280], the basicConstraints extension MUST be marked as critical.  The cA boolean MUST be set to indicate that the subject is a CA, and the pathLenConstraint subfield is OPTIONAL.</t>

            <t>If a policy is asserted, the certificatePolicies extension MUST be marked as non-critical, MUST contain the OIDs for the applicable certificate policies, and SHOULD NOT use the policyQualifiers option. If a policy is not asserted, the certificatePolicies extension MUST be omitted.</t>

            <t>Relying party applications conforming to this profile MUST be prepared to process the policyMappings, policyConstraints, and inhibitAnyPolicy extensions, regardless of criticality, following the  guidance in [RFC5280] when they appear in non-self-signed CA certificates.</t>

         </section>   <!-- CNSA Suite Non-Self-Signed CA Certificates -->

         <section anchor="eecert">
            <name>CNSA Suite End-Entity Signature and Key Establishment Certificates</name>

            <t>In adherence with [RFC5280], end-entity certificates in this profile MUST contain the authorityKeyIdentifier and keyUsage extensions.  If there is a policy to be asserted, then the certificatePolicies extension MUST be included.  End-entity certificates SHOULD contain the subjectKeyIdentifier extension.</t>

            <t>The keyUsage extension MUST be marked as critical.</t>

            <t>For end-entity digital signature certificates, the keyUsage extension MUST be set for digitalSignature.  The nonRepudiation bit MAY be set. All other bits in the keyUsage extension MUST NOT be set.</t>

            <t>For end-entity key establishment certificates, the keyUsage extension MUST be set for keyEncipherment. The encipherOnly or decipherOnly bit MAY be set.  All other bits in the keyUsage extension MUST NOT be set.</t>

            <t>If a policy is asserted, the certificatePolicies extension MUST be marked as non-critical, MUST contain the OIDs for the applicable certificate policies, and SHOULD NOT use the policyQualifiers option. If a policy is not asserted, the certificatePolicies extension MUST be omitted.</t>

         </section>   <!-- CNSA Suite End-Entity Signature and Key Establishment Certificates -->

      </section>   <!-- Certificate Extensions for Particular Types of Certificates -->

      <section anchor="crlreq">
         <name>CNSA Suite CRL Requirements</name>

         <t>This CNSA Suite CRL profile is a profile of [RFC5280].  There are changes in the requirements from [RFC5280] for the signatures on CRLs of this profile.</t>

         <t>The signatures on CRLs in this profile MUST follow the same rules from this profile that apply to signatures in the certificates. See <xref target="genreq"/>.</t>

      </section>   <!-- CNSA Suite CRL Requirements -->

      <section anchor="ocspreq">
         <name>Requirements for Other Revocation Notification Methods</name>

         <t>Revocation notification methods of any type must enable authentication of the issuing CA as the source of the revocation information. Specifically, an OCSP response MUST be signed conformant with <xref target="genreq"/>, and with a key that binds the response to the issuing CA.</t>

      </section>   <!-- Requirements for Other Revocation Notification Methods -->

      <section anchor="seccons">
         <name>Security Considerations</name>

         <t>This document introduces no security considerations beyond those in [RFC5280], of which it is a profile.</t>

      </section>   <!-- Security Considerations -->

      <section anchor="ianacons">
         <name>IANA Considerations</name>

         <t>This document has no IANA actions.</t>

      </section>   <!-- IANA Considerations -->

  </middle>

  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        
        <reference anchor="annccnsa" target="https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF">
          <front>
            <title>Announcing the Commercial National Security Algorithm Suite 2.0</title>
            <author>
              <organization>National Security Agency</organization>
            </author>
            <date year="1984" month="September"/>
          </front>
        </reference>

        <reference anchor="FIPS203" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf">
          <front>
            <title>Module-Lattice-Based Key Establishment Mechanism Standard</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="Federal Information Processing Standard" value="203"/>
          <seriesInfo name="DOI" value="10.6028/NIST.FIPS.203.ipd"/>
        </reference>       

        <reference anchor="FIPS204" target="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.ipd.pdf">
          <front>
            <title>Module-Lattice-Based Digital Signature Standard</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2023" month="August"/>
          </front>
          <seriesInfo name="Federal Information Processing Standard" value="204"/>
          <seriesInfo name="DOI" value="10.6028/NIST.FIPS.204.ipd"/>
        </reference>       


        <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lamps-dilithium-certificates"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-lamps-kyber-certificates"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
        <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8603.xml"/>

      </references>
 
      <references>
        <name>Informative References</name>
       
        <reference anchor="NSM-10" target="https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems/">
          <front>
            <title>National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems</title>
            <author>
              <organization>United States, The White House</organization>
            </author>
            <date year="2022" month="May"/>
          </front>
          <seriesInfo name="NSM" value="10"/>
        </reference>

        <reference anchor="SP80059" target="https://csrc.nist.gov/publications/detail/sp/800-59/final">
          <front>
            <title>Guideline for Identifying an Information System as a National Security System</title>
            <author>
              <organization>National Institute of Standards and Technology</organization>
            </author>
            <date year="2003" month="August"/>
          </front>
          <seriesInfo name="Special Publication" value="59"/>
          <seriesInfo name="DOI" value="10.6028/NIST.SP.800-59"/>
        </reference>       
      
      </references>
    </references>
    
 </back>
</rfc>