<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-moasgroup-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="rpki-moasgroup">A Profile for Signed Group of Multiple-Origin Autonomous Systems for Use in the Resource Public Key Infrastructure (RPKI)</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-moasgroup-02"/>
    <author fullname="Qi Li">
      <organization>Beijing Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>li-q25@mails.tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="December" day="09"/>
    <area>Operations and Management</area>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 60?>

<t>This document defines a "Signed MOAS Group", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to authenticate the collective announcement of IP prefixes by Multiple Origin Autonomous System (MOAS). The Signed MOAS Group mainly includes two parts: an IP prefix and a list of Autonomous Systems (ASes) authorized to announce the prefix. At least one of these ASes <bcp14>SHOULD</bcp14> be authorized to announce the prefix by the prefix owner through a Route Origin Authorization (ROA). The validation of a Signed MOAS Group confirms that the authorized ASes and other listed ASes have collectively agreed to announce the prefix, ensuring that the announcement is legitimate, accurate, and mutually authorized.</t>
    </abstract>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a "Signed MOAS Group", a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> protected content type to carry an IP prefix and a list of Autonomous Systems (ASes) authorized to announce this prefix. The Signed MOAS Group allows multiple ASes to collaboratively and securely announce an IP prefix, supporting scenarios such as business partnerships, traffic engineering, and DDoS protection services.</t>
      <t>A Signed MOAS Group object mainly consists of two components: an IP prefix and a list of Autonomous Systems (ASes) intended to announce the prefix collaboratively, which allows other RPKI-validating routing entities to audit the collection of announcements from multiple originating AS. At least one AS in the AS list <bcp14>SHOULD</bcp14> be authorized to announce the prefix by the prefix owner through an ROA, which means the IP prefix in the ROA <bcp14>SHOULD</bcp14> match the IP prefix in the Signed MOAS Group and the AS number in the ROA <bcp14>SHOULD</bcp14> appear in the AS list. The object is collectively signed by the listed ASes using a multi-signature technique, and the aggregated global signature is attached to the Signed MOAS Group object, ensuring that the announcement could be legitimately proposed by all participating ASes and is verifiable by any RPKI-validating remote routing entities.</t>
      <t>When validating a Signed MoasGroup, a relying party (RP) aggregates the public keys of all ASes in the AS list into a single global public key. This global key is then used to verify the multi-signature of the Signed MoasGroup. There are three possible validation outcomes. First, if the Signed MoasGroup is verified and at least one corresponding ROA is found, it is considered valid. Second, if the Signed MoasGroup is verified but no corresponding ROA is found, it is deemed suspicious. Finally, if the Signed MoasGroup fails verification, it is considered invalid.</t>
      <t>The Signed MOAS Group provides a technical way for securely managing multi-origin AS announcements, offering a robust and flexible solution to handle modern routing requirements. Any prefixes announced by ASes that are not included in an ROA or a validated Signed MOAS Group <bcp14>SHOULD</bcp14> be regarded as invalid, though their handling is subject to local routing policies. The intent is to offer a secure and authenticated method for managing MOAS scenarios, enhancing the overall security and integrity of the routing system.</t>
      <t>Signed MOAS Group objects follow the Signed Object Template for the RPKI <xref target="RFC6488"/>.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="signed-moasgroup-econtenttype">
      <name>Signed MoasGroup eContentType</name>
      <t>The eContentType for a MoasGroup is defined as id-ct-rpkiSignedMoasGroup, with Object Identifier (OID) 1.2.840.113549.1.9.16.1.TBD. It is encoded using the Cryptographic Message Syntax (CMS).  The ASN.1 structures and encoding rules follow the updated CMS modules defined in <xref target="RFC5911"/>, consistent with other RPKI signed object profiles.</t>
      <t>This OID <bcp14>MUST</bcp14> appear within both the eContentType in the encapContentInfo object and the ContentType signed attribute in the signerInfo object (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="sec_econtent">
      <name>Signed MoasGroup eContent</name>
      <t>A MoasGroup is formally defined as follows:</t>
      <artwork><![CDATA[
RpkiSignedMoasGroup-2024
  { iso(1) member-body(2) us(840) rsadsi(113549)
   pkcs(1) pkcs9(9) smime(16) mod(0)
   id-mod-rpkiSignedMoasGroup-2024(TBD) }

   DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE, DigestAlgorithmIdentifier, Digest
  FROM CryptographicMessageSyntax-2009 -- in [RFC5911]
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
   pkcs-9(9) smime(16) modules(0) id-mod-cms-2004-02(41) }

  ASId, IPAddressFamily
  FROM IPAddrAndASCertExtn -- in [RFC3779]
  { iso(1) identified-organization(3) dod(6) internet(1)
   security(5) mechanisms(5) pkix(7) mod(0)
   id-mod-ip-addr-and-as-ident(30) }
                
        
  ct-rpkiSignedMoasGroup CONTENT-TYPE ::=
  { TYPE RpkiSignedMoasGroup
   IDENTIFIED BY id-ct-rpkiSignedMoasGroup }

  id-ct-rpkiSignedMoasGroup OBJECT IDENTIFIER ::=
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
   pkcs-9(9) id-smime(16) id-ct(1) TBD }

  RpkiSignedMoasGroup ::= SEQUENCE {
   smgo SignedMoasGroupObject,
   digestAlgorithm DigestAlgorithmIdentifier,
   objectDigest Digest
  }

  SignedMoasGroupObject ::= SEQUENCE {
   version [0]          INTEGER DEFAULT 0,
   ipAddressPrefix      IPAddressFamily,
   asList               SEQUENCE (SIZE(0..MAX)) OF ASId,
  }

END
]]></artwork>
      <section anchor="version">
        <name>version</name>
        <t>The version number of the RpkiSignedMoasGroup <bcp14>MUST</bcp14> be 0.</t>
      </section>
      <section anchor="ipaddressprefix">
        <name>ipAddressPrefix</name>
        <t>The ipAddressPrefix field follows the IP address and Autonomous System Identifier extension semantics defined in <xref target="RFC3779"/>. This field contains an IPAddressFamily which contains one instance of addressFamily and one instance of prefix.</t>
      </section>
      <section anchor="aslist">
        <name>asList</name>
        <t>This field contains the AS numbers that are intended to originate routes to the given IP address prefixes. The AS numbers that are authorized by ROA <bcp14>SHOULD</bcp14> be put in front of other AS numbers. The AS numbers <bcp14>MUST NOT</bcp14> duplicate.</t>
      </section>
      <section anchor="digestalgorithm">
        <name>digestAlgorithm</name>
        <t>The digest algorithm used to create the message digest of the attested digital object.  This algorithm <bcp14>MUST</bcp14> be a hashing algorithm defined in <xref target="RFC7935"/>.</t>
      </section>
      <section anchor="messagedigest">
        <name>messageDigest</name>
        <t>The message digest of the SignedMoasGroupObject using the algorithm specified in the digestAlgorithm field.</t>
      </section>
      <section anchor="attestation">
        <name>attestation</name>
        <t>The attestation is a CMS detached signature in the SignedData format as defined in <xref target="RFC5485"/>. Each AS listed in the asList signs an individual digital signature of the message digest, and one AS aggregates all individual signatures into a global signature, referred to as the attestation.</t>
      </section>
    </section>
    <section anchor="issuance-of-signed-moasgroup">
      <name>Issuance of Signed MoasGroup</name>
      <t>It is highly <bcp14>RECOMMENDED</bcp14> that the AS initiating the Signed MOAS Group object be authorized by the prefix owner via an ROA. This AS, referred to as the authorized AS, then initiates the creation of the Signed MOAS Group object, selects a digest algorithm, and calculates the digest of the Signed MOAS Group object. The authorized AS shares this Signed MOAS Group object with other ASes listed in the object. Each listed AS (including the authorized AS) signs the digest using its private key and returns the signature to the authorized AS. Upon receiving and verifying all individual signatures, the authorized AS aggregates them into a global signature, i.e. the attestation, and attaches it to the Signed MOAS Group object. After that, the prefix owner <bcp14>MAY</bcp14> verify the Signed MOAS Group. Finally, the prefix owner or the authorized AS uploads the Signed MOAS Group to the RPKI repositories for validation and distribution.</t>
    </section>
    <section anchor="validation-of-signed-moasgroup">
      <name>Validation of Signed MoasGroup</name>
      <t>To validate a Signed MoasGroup, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/>. In addition, the RP <bcp14>MUST</bcp14> perform the following validation steps:</t>
      <ol spacing="normal" type="1"><li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> conform to all of the constraints described in <xref target="sec_econtent"/>.</t>
        </li>
        <li>
          <t>The RP <bcp14>MUST</bcp14> verify the attestation of the Signed MOAS Group. This process involves two steps: first, aggregating the public keys of all ASes listed in the AS list to form a global public key; second, using this aggregated global public key to verify the attestation attached to the Signed MOAS Group object.</t>
        </li>
        <li>
          <t>The RP <bcp14>MUST</bcp14> check for the existence of a corresponding ROA for the IP prefix in the Signed MOAS Group. The IP prefix in the ROA <bcp14>MUST</bcp14> match the IP prefix in the Signed MOAS Group, and the AS number in the ROA <bcp14>MUST</bcp14> appear in the AS list.</t>
        </li>
      </ol>
      <t>A Signed MOAS Group has three possible validation results. (1) Valid: If the Signed MOAS Group is verified and at least one corresponding ROA is found, it is considered valid. (2) Suspicious: If the Signed MOAS Group is verified but no corresponding ROA is found, the Signed MOAS Group is considered suspicious. (3) Invalid: If the Signed MOAS Group cannot be verified, it is considered invalid.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>To aggregate the signatures efficiently, the Signed MOAS Group <bcp14>SHOULD</bcp14> use BLS Signatures with BLS12-381 elliptic curve <xref target="I-D.draft-ietf-cose-bls-key-representations-05"/>.</t>
      <t>ROA-authorized ASes <bcp14>SHOULD</bcp14> be placed at the beginning of the AS list to improve RP validation efficiency. It is highly <bcp14>RECOMMENDED</bcp14> that the RP only verifies the first AS and the prefix against the ROA.</t>
      <t>Multiple valid Signed MOAS Group objects may exist for the same IP prefix. However, it is highly <bcp14>RECOMMENDED</bcp14> that an AS participate in only one Signed MOAS Group for a given IP prefix. If changes to the AS list are needed, it is highly <bcp14>RECOMMENDED</bcp14> to revoke the existing Signed MOAS Group and issue a new one.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Although it is highly <bcp14>RECOMMENDED</bcp14> that a Signed MOAS Group <bcp14>SHOULD</bcp14> be validated by at least one ROA, the data contained in a Signed MOAS Group is still self-asserted by the group of AS holders. This means that the presence of an AS in the Signed MOAS Group does not inherently imply any authority from the IP prefix holder for the AS to originate a route for any prefixes. Such authority is separately conveyed in the RPKI through an ROA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="smi-security-for-smime-cms-content-type-1284011354919161">
        <name>SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">Id-ct-rpkiSignedMoasGroup</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpki-signed-objects">
        <name>RPKI Signed Objects</name>
        <t>IANA is requested to register two OIDs in the "RPKI Signed Objects" registry <xref target="RFC6488"/> as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">OID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signed MoasGroup</td>
              <td align="left">1.2.840.113549.1.9.16.1.TBD</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpki-repository-name-schemes">
        <name>RPKI Repository Name Schemes</name>
        <t>IANA is requested to add the Signed MoasGroup file extension to the "RPKI Repository Name Schemes" registry <xref target="RFC6481"/> as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Filename Extension</th>
              <th align="left">RPKI Object</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">.smg</td>
              <td align="left">Signed MoasGroup</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="smi-security-for-smime-module-identifier-1284011354919160">
        <name>SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">.TBD</td>
              <td align="left">id-mod-rpkiSignedMoasGroup-2024</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6488">
          <front>
            <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="A. Chi" initials="A." surname="Chi"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6488"/>
          <seriesInfo name="DOI" value="10.17487/RFC6488"/>
        </reference>
        <reference anchor="RFC3779">
          <front>
            <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
            <author fullname="C. Lynn" initials="C." surname="Lynn"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <author fullname="K. Seo" initials="K." surname="Seo"/>
            <date month="June" year="2004"/>
            <abstract>
              <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3779"/>
          <seriesInfo name="DOI" value="10.17487/RFC3779"/>
        </reference>
        <reference anchor="RFC6481">
          <front>
            <title>A Profile for Resource Certificate Repository Structure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="R. Loomans" initials="R." surname="Loomans"/>
            <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6481"/>
          <seriesInfo name="DOI" value="10.17487/RFC6481"/>
        </reference>
        <reference anchor="RFC7935">
          <front>
            <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure</title>
            <author fullname="G. Huston" initials="G." surname="Huston"/>
            <author fullname="G. Michaelson" initials="G." role="editor" surname="Michaelson"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7935"/>
          <seriesInfo name="DOI" value="10.17487/RFC7935"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cose-bls-key-representations-05">
          <front>
            <title>Barreto-Lynn-Scott Elliptic Curve Key Representations for JOSE and COSE</title>
            <author fullname="Tobias Looker" initials="T." surname="Looker">
              <organization>Mattr</organization>
            </author>
            <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
              <organization>Self-Issued Consulting</organization>
            </author>
            <date day="17" month="March" year="2024"/>
            <abstract>
              <t>   This specification defines how to represent cryptographic keys for
   the pairing-friendly elliptic curves known as Barreto-Lynn-Scott
   (BLS), for use with the key representation formats of JSON Web Key
   (JWK) and COSE (COSE_Key).

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tplooker/draft-ietf-cose-bls-key-representations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-bls-key-representations-05"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5485">
          <front>
            <title>Digital Signatures on Internet-Draft Documents</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document specifies the conventions for digital signatures on Internet-Drafts. The Cryptographic Message Syntax (CMS) is used to create a detached signature, which is stored in a separate companion file so that no existing utilities are impacted by the addition of the digital signature. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5485"/>
          <seriesInfo name="DOI" value="10.17487/RFC5485"/>
        </reference>
        <reference anchor="RFC5911">
          <front>
            <title>New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5911"/>
          <seriesInfo name="DOI" value="10.17487/RFC5911"/>
        </reference>
      </references>
    </references>
    <?line 242?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Shenglin Jiang, Yangfei Guo, Xingang Shi, Shuhe Wang, Xiaoliang Wang, Hui Wang, and Di Ma.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
