<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mandel-lamps-rfc5273bis-00" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2023" month="October" day="13"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 67?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFCs 5273 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mandel-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/TBD"/>.</t>
    </note>


  </front>

  <middle>


<?line 77?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -01:</t>

<t><list style="symbols">
  <t>Update TLS 1.0 text.</t>
  <t>Consider AuthEnvelopedData.</t>
</list></t>

<t>-00 version changes:</t>

<t><list style="symbols">
  <t>Moved 2119-text to its own section</t>
  <t>Added "Changes Since 5273 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Merged <xref target="erratum3593"/></t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file.  The following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="TLS"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.0 <xref target="TLS"/> or
later, although servers are not required to support TLS.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="CMC-STRUCT">
  <front>
    <title>Certificate Management over CMS (CMC)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
      <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
      <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
      <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5272"/>
  <seriesInfo name="DOI" value="10.17487/RFC5272"/>
</reference>

<reference anchor="HTTP">
  <front>
    <title>HTTP Caching</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
      <t>This document obsoletes RFC 7234.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="98"/>
  <seriesInfo name="RFC" value="9111"/>
  <seriesInfo name="DOI" value="10.17487/RFC9111"/>
</reference>

<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="TLS">
   <front>
      <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
      <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
         <organization>Windy Hill Systems, LLC</organization>
      </author>
      <date day="7" month="July" year="2023"/>
      <abstract>
	 <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-09"/>
   
</reference>

<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 311?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

