<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-mandel-lamps-rfc5274bis-00" category="std" consensus="true" submissionType="IETF" obsoletes="5274, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Compliance">Certificate Management Messages over CMS (CMC): Compliance Requirements</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akyala.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2023" month="October" day="13"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Compliance</keyword>

    <abstract>


<?line 70?>

<t>This document provides a set of compliance statements about the CMC
(Certificate Management over CMS) enrollment protocol.  The ASN.1
structures and the transport mechanisms for the CMC enrollment
protocol are covered in other documents.  This document provides the
information needed to make a compliant version of CMC.</t>

<t>This document obsoletes RFCs 5274 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mandel-lamps-rfc5274bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/TBD"/>.</t>
    </note>


  </front>

  <middle>


<?line 80?>

<section anchor="introduction"><name>Introduction</name>

<t>The CMC (Certificate Management over CMS) protocol is designed in
terms of a client/server relationship.  In the simplest case, the
client is the requestor of the certificate (i.e., the End Entity
(EE)) and the server is the issuer of the certificate (i.e., the
Certification Authority (CA)).  The introduction of a Registration
Authority (RA) into the set of agents complicates the picture only
slightly.  The RA becomes the server with respect to the certificate
requestor, and it becomes the client with respect to the certificate
issuer.  Any number of RAs can be inserted into the picture in this
manner.</t>

<t>The RAs may serve specialized purposes that are not currently covered
by this document.  One such purpose would be a Key Escrow agent.  As
such, all certificate requests for encryption keys would be directed
through this RA and it would take appropriate action to do the key
archival.  Key recovery requests could be defined in the CMC
methodology allowing for the Key Escrow agent to perform that
operation acting as the final server in the chain of agents.</t>

<t>If there are multiple RAs in the system, it is considered normal that
not all RAs will see all certificate requests.  The routing between
the RAs may be dependent on the content of the certificate requests
involved.</t>

<t>This document is divided into six sections, each section specifying
the requirements that are specific to a class of agents in the CMC
model.  These are 1) All agents, 2) all servers, 3) all clients, 4)
all End-Entities, 5) all Registration Entities, 6) all Certificate
Authorities.</t>

<t>This document obsoletes <xref target="CMC-COMPv1"/> and <xref target="CMC-Updates"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>There are several different terms, abbreviations, and acronyms used
in this document that we define here for convenience and consistency
of usage:</t>

<dl>
  <dt>End-Entity (EE):</dt>
  <dd>
    <t>Refers to the entity that owns a key pair and for
whom a certificate is issued.</t>
  </dd>
  <dt>Registration Authority (RA) or Local RA (LRA):</dt>
  <dd>
    <t>Refers to an entity
that acts as an intermediary between the EE and the CA.  Multiple
RAs can exist between the End-Entity and the Certification
Authority.  RAs may perform additional services such as key
generation or key archival.  This document uses the term RA for
both RA and LRA.</t>
  </dd>
  <dt>Certification Authority (CA):</dt>
  <dd>
    <t>Refers to the entity that issues
certificates.</t>
  </dd>
  <dt>Client:</dt>
  <dd>
    <t>Refers to an entity that creates a PKI Request.  In this
document, both RAs and EEs can be clients.</t>
  </dd>
  <dt>Server:</dt>
  <dd>
    <t>Refers to the entities that process PKI Requests and create
PKI Responses.  In this document both CAs and RAs can be servers.</t>
  </dd>
  <dt>PKCS #10:</dt>
  <dd>
    <t>Refers to the Public Key Cryptography Standard #10
<xref target="PKCS10"/>, which defines a certification request syntax.</t>
  </dd>
  <dt>CRMF:</dt>
  <dd>
    <t>Refers to the Certificate Request Message Format RFC <xref target="CRMF"/>.
CMC uses this certification request syntax defined in this
document as part of the protocol.</t>
  </dd>
  <dt>CMS:</dt>
  <dd>
    <t>Refers to the Cryptographic Message Syntax RFC <xref target="CMS"/>.  This
document provides for basic cryptographic services including
encryption and signing with and without key management.</t>
  </dd>
  <dt>PKI Request/Response:</dt>
  <dd>
    <t>Refers to the requests/responses described in
this document.  PKI Requests include certification requests,
revocation requests, etc.  PKI Responses include certs-only
messages, failure messages, etc.</t>
  </dd>
  <dt>Proof-of-Identity:</dt>
  <dd>
    <t>Refers to the client proving they are who they say
that they are to the server.</t>
  </dd>
  <dt>Proof-of-Possession (POP):</dt>
  <dd>
    <t>Refers to a value that can be used to
prove that the private key corresponding to a public key is in the
possession and can be used by an end-entity.</t>
  </dd>
  <dt>Transport wrapper:</dt>
  <dd>
    <t>Refers to the outermost CMS wrapping layer.</t>
  </dd>
</dl>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-rfc-5274-and-6402"><name>Changes since RFC 5274 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -01:</t>

<t><list style="symbols">
  <t>Update TLS text</t>
  <t>Update SHA-1 text</t>
  <t>Merge requirements terminology and terminology sections</t>
  <t>Make sure section count in s1 is correct</t>
  <t>Update references to 5272bis and 5273bis</t>
</list></t>

<t>-00 version changes:</t>

<t><list style="symbols">
  <t>Added "Changes Since 5274 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="requirements-for-all-entities"><name>Requirements for All Entities</name>

<t>All <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> compliance statements <bcp14>MUST</bcp14> be
adhered to unless specifically stated otherwise in this document.</t>

<t>All entities <bcp14>MUST</bcp14> support Full PKI Requests, Simple PKI Responses,
and Full PKI Responses.  Servers <bcp14>SHOULD</bcp14> support Simple PKI Requests.</t>

<t>All entities <bcp14>MUST</bcp14> support the use of the CRMF syntax for
certification requests.  Support for the PKCS #10 syntax for
certification requests <bcp14>SHOULD</bcp14> be implemented by servers.</t>

<t>The extendedFailInfo field <bcp14>SHOULD NOT</bcp14> be populated in the
CMCStatusInfoV2 object; the failInfo field <bcp14>SHOULD</bcp14> be used to relay
this information.  If the extendedFailInfo field is used, it is
suggested that an additional CMCStatusInfoV2 item exist for the same
body part with a failInfo field.</t>

<t>All entities <bcp14>MUST</bcp14> implement the HTTP transport mechanism as defined
in <xref target="CMC-TRANS"/>.  Other transport mechanisms <bcp14>MAY</bcp14> be implemented.</t>

<section anchor="cryptographic-algorithm-requirements"><name>Cryptographic Algorithm Requirements</name>

<t>All entities <bcp14>MUST</bcp14> verify DSA-SHA1 and RSA-SHA1 signatures in
SignedData (see <xref target="CMS-ALG"/>).  Entities <bcp14>MAY</bcp14> verify other signature
algorithms.  It is strongly suggested that RSA-PSS with SHA-1 be
verified (see <xref target="CMS-RSA-PSS"/>).  It is strongly suggested that SHA-256
using RSA and RSA-PSS be verified (see <xref target="RSA-256"/>).</t>

<t>All entities <bcp14>MUST</bcp14> generate either DSA-SHA1 or RSA-SHA1 signatures for
SignedData (see <xref target="CMS-ALG"/>).  Other signatures algorithms <bcp14>MAY</bcp14> be used
for generation.</t>

<t>All entities <bcp14>MUST</bcp14> support Advanced Encryption Standard (AES) as the
content encryption algorithm for EnvelopedData (see <xref target="CMS-AES"/>).
Other content encryption algorithms <bcp14>MAY</bcp14> be implemented.</t>

<t>All entities <bcp14>MUST</bcp14> support RSA as a key transport algorithm for
EnvelopedData (see <xref target="CMS-ALG"/>).  All entities <bcp14>SHOULD</bcp14> support RSA-OAEP
(see <xref target="CMS-RSA-OAEP"/>) as a key transport algorithm.  Other key
transport algorithms <bcp14>MAY</bcp14> be implemented.</t>

<t>If an entity supports key agreement for EnvelopedData, it <bcp14>MUST</bcp14>
support Diffie-Hellman (see <xref target="CMS-DH"/>).</t>

<t>If an entity supports PasswordRecipientInfo for EnvelopedData or
AuthenticatedData, it <bcp14>MUST</bcp14> support PBKDF2 <xref target="PBKDF2"/> for key derivation
algorithms.  It <bcp14>MUST</bcp14> support AES key wrap (see <xref target="AES-WRAP"/> as the key
encryption algorithm.</t>

<t>If AuthenticatedData is supported, PasswordRecipientInfo <bcp14>MUST</bcp14> be
supported.</t>

<t>Algorithm requirements for the Identity Proof Version 2 control
<xref section="6.2.1" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented for
hashAlgId.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for hashAlgId.  HMAC-SHA1
<bcp14>MUST</bcp14> be implemented for macAlgId.  HMAC-SHA256 <bcp14>SHOULD</bcp14> be implemented
for macAlgId.</t>

<t>Algorithm requirements for the Pop Link Witness Version 2 control
<xref section="6.3.1" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented for
keyGenAlgorithm.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for keyGenAlgorithm.
PBKDF2 <xref target="PBKDF2"/> <bcp14>MAY</bcp14> be implemented for keyGenAlgorithm.  HMAC-SHA1
<bcp14>MUST</bcp14> be implemented for macAlgorithm.  HMAC-SHA256 <bcp14>SHOULD</bcp14> be
implemented for macAlgorithm.</t>

<t>Algorithm requirements for the Encrypted POP and Decrypted POP
controls <xref section="6.7" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented
for witnessAlgID.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for witnessAlgID.
HMAC-SHA1 <bcp14>MUST</bcp14> be implemented for thePOPAlgID.  HMAC-SHA256 <bcp14>SHOULD</bcp14> be
implemented for thePOPAlgID.</t>

<t>Algorithm requirements for Publish Trust Anchors control <xref section="6.15" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented for
hashAlgorithm.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for hashAlgorithm.</t>

<t>If an EE generates DH keys for certification, it <bcp14>MUST</bcp14> support <xref section="4" sectionFormat="of" target="DH-POP"/>.  EEs <bcp14>MAY</bcp14> support <xref section="3" sectionFormat="of" target="DH-POP"/>.  CAs and RAs
that do POP verification <bcp14>MUST</bcp14> support <xref section="4" sectionFormat="of" target="DH-POP"/> and
<bcp14>SHOULD</bcp14> support <xref section="3" sectionFormat="of" target="DH-POP"/>.</t>

<t>EEs that need to use a signature algorithm for keys that cannot
produce a signature <bcp14>MUST</bcp14> support Appendix C of <xref target="CMC-STRUCT"/> and <bcp14>MUST</bcp14>
support the Encrypted/Decrypted POP controls.  CAs and RAs that do
POP verification <bcp14>MUST</bcp14> support this signature algorithm and <bcp14>MUST</bcp14>
support the Encrypted/Decrypted POP controls.</t>

</section>
<section anchor="controls"><name>Controls</name>

<t>The following table lists the name and level of support required for
each control.</t>

<texttable title="CMC Control Attributes" anchor="cmc-controls">
      <ttcol align='left'>Control</ttcol>
      <ttcol align='left'>EE</ttcol>
      <ttcol align='left'>RA</ttcol>
      <ttcol align='left'>CA</ttcol>
      <c>Extended CMC Status Info</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>CMC Status Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identity Proof Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Identity Proof</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identification</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Random</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Data Return</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Modify Cert Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Add Extensions</c>
      <c>N/A</c>
      <c><bcp14>MAY</bcp14></c>
      <c>(1)</c>
      <c>Transaction ID</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Sender Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Recipient Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Encrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Decrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>RA POP Witness</c>
      <c>N/A</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>(1)</c>
      <c>Get Certificate</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Get CRL</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Revocation Request</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Registration Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Response Information</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Query Pending</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Confirm Cert.  Acceptance</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Publish Trust Anchors</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Authenticate Data</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Batch Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Batch Responses</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Publication Information</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Control Processed</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>RA Identity Proof Witness</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Response Body</c>
      <c>(6)</c>
      <c>(6)</c>
      <c>N/A.</c>
</texttable>

<t>Notes:</t>

<t><list style="numbers">
  <t>CAs <bcp14>SHOULD</bcp14> implement this control if designed to work with RAs.</t>
  <t>CAs <bcp14>MUST</bcp14> implement this control if designed to work with RAs.</t>
  <t>Implementation is optional for these controls.  We strongly
suggest that they be implemented in order to populate client
trust anchors.</t>
  <t>EEs only need to implement this if (a) they support key agreement
algorithms or (b) they need to operate in environments where the
hardware keys cannot provide POP.</t>
  <t>RAs <bcp14>SHOULD</bcp14> implement this if they implement RA POP Witness.</t>
  <t>EE's <bcp14>SHOULD</bcp14> implement if designed to work with RAs and <bcp14>MUST</bcp14>
implement if intended to be used in environments where RAs are
used for identity validation or key generation.  RAs <bcp14>SHOULD</bcp14>
implement and validate responses for consistency.</t>
</list></t>

<t>Strong consideration should be given to implementing the Authenticate
Data and Publish Trust Anchors controls as this gives a simple method
for distributing trust anchors into clients without user
intervention.</t>

</section>
<section anchor="crmf-feature-requirements"><name>CRMF Feature Requirements</name>

<t>The following additional restrictions are placed on CRMF features:</t>

<t>The registration control tokens id-regCtrl-regToken and id-regCtrl-
authToken <bcp14>MUST NOT</bcp14> be used.  No specific CMC feature is used to
replace these items, but generally the CMC controls identification
and identityProof will perform the same service and are more
specifically defined.</t>

<t>The control token id-regCtrl-pkiArchiveOptions <bcp14>SHOULD NOT</bcp14> be
supported.  An alternative method is under development to provide
this functionality.</t>

<t>The behavior of id-regCtrl-oldCertID is not presently used.  It is
replaced by issuing the new certificate and using the id-cmc-
publishCert to remove the old certificate from publication.  This
operation would not normally be accompanied by an immediate
revocation of the old certificate; however, that can be accomplished
by the id-cmc-revokeRequest control.</t>

<t>The id-regCtrl-protocolEncrKey is not used.</t>

</section>
<section anchor="requirements-for-clients"><name>Requirements for Clients</name>

<t>There are no additional requirements.</t>

</section>
</section>
<section anchor="requirements-for-servers"><name>Requirements for Servers</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-ees"><name>Requirements for EEs</name>

<t>If an entity implements Diffie-Hellman, it <bcp14>MUST</bcp14> implement either the
DH-POP Proof-of-Possession as defined in <xref section="4" sectionFormat="of" target="DH-POP"/> or the
challenge-response POP controls id-cmc-encryptedPOP and id-cmc-
decryptedPOP.</t>

</section>
<section anchor="requirements-for-ras"><name>Requirements for RAs</name>

<t>RAs <bcp14>SHOULD</bcp14> be able to do delegated POP.  RAs implementing this
feature <bcp14>MUST</bcp14> implement the id-cmc-lraPOPWitness control.</t>

<t>All RAs <bcp14>MUST</bcp14> implement the promotion of the id-aa-cmc-unsignedData as
covered in <xref section="3.2.3" sectionFormat="of" target="CMC-STRUCT"/>.</t>

</section>
<section anchor="requirements-for-cas"><name>Requirements for CAs</name>

<t>Providing for CAs to work in an environment with RAs is strongly
suggested.  Implementation of such support is strongly suggested as
this permits the delegation of substantial administrative interaction
onto an RA rather than at the CA.</t>

<t>CAs <bcp14>MUST</bcp14> perform at least minimal checks on all public keys before
issuing a certificate.  At a minimum, a check for syntax would occur
with the POP operation.  Additionally, CAs <bcp14>SHOULD</bcp14> perform simple
checks for known bad keys such as small subgroups for DSA-SHA1 and DH
keys <xref target="SMALL-SUB-GROUP"/> or known bad exponents for RSA keys.</t>

<t>CAs <bcp14>MUST</bcp14> enforce POP checking before issuing any certificate.  CAs
<bcp14>MAY</bcp14> delegate the POP operation to an RA for those cases where 1) a
challenge/response message pair must be used, 2) an RA performs
escrow of a key and checks for POP in that manner, or 3) an unusual
algorithm is used and that validation is done at the RA.</t>

<t>CAs <bcp14>SHOULD</bcp14> implement both the DH-POP Proof-of-Possession as defined
in <xref section="4" sectionFormat="of" target="DH-POP"/> and the challenge-response POP controls id-
cmc-encryptedPOP and id-cmc-decryptedPOP.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document uses <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> as building blocks to
this document.  The security sections of those two documents are
included by reference.</t>

<t>Knowledge of how an entity is expected to operate is vital in
determining which sections of requirements are applicable to that
entity.  Care needs to be taken in determining which sections apply
and fully implementing the necessary code.</t>

<t>Cryptographic algorithms have and will be broken or weakened.
Implementers and users need to check that the cryptographic
algorithms listed in this document make sense from a security level.
The IETF from time to time may issue documents dealing with the
current state of the art.  Two examples of such documents are
<xref target="SMALL-SUB-GROUP"/> and <xref target="HASH-ATTACKS"/>.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="CMC-STRUCT">
  <front>
    <title>Certificate Management over CMS (CMC)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
      <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
      <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
      <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5272"/>
  <seriesInfo name="DOI" value="10.17487/RFC5272"/>
</reference>

<reference anchor="CMC-TRANS">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>

<reference anchor="CMS">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>

<reference anchor="CMS-AES">
  <front>
    <title>Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document specifies the conventions for using the Advanced Encryption Standard (AES) algorithm for encryption with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3565"/>
  <seriesInfo name="DOI" value="10.17487/RFC3565"/>
</reference>

<reference anchor="CMS-ALG">
  <front>
    <title>Cryptographic Message Syntax (CMS) Algorithms</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3370"/>
  <seriesInfo name="DOI" value="10.17487/RFC3370"/>
</reference>

<reference anchor="CMS-DH">
  <front>
    <title>Diffie-Hellman Key Agreement Method</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="June" year="1999"/>
    <abstract>
      <t>This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1 working group. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2631"/>
  <seriesInfo name="DOI" value="10.17487/RFC2631"/>
</reference>

<reference anchor="CRMF">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="September" year="2005"/>
    <abstract>
      <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4211"/>
  <seriesInfo name="DOI" value="10.17487/RFC4211"/>
</reference>

<reference anchor="CMS-RSA-OAEP">
  <front>
    <title>Use of the RSAES-OAEP Key Transport Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document describes the conventions for using the RSAES-OAEP key transport algorithm with the Cryptographic Message Syntax (CMS). The CMS specifies the enveloped-data content type, which consists of an encrypted content and encrypted content-encryption keys for one or more recipients. The RSAES-OAEP key transport algorithm can be used to encrypt content-encryption keys for intended recipients. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3560"/>
  <seriesInfo name="DOI" value="10.17487/RFC3560"/>
</reference>

<reference anchor="CMS-RSA-PSS">
  <front>
    <title>Use of the RSASSA-PSS Signature Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document specifies the conventions for using the RSASSA-PSS (RSA Probabilistic Signature Scheme) digital signature algorithm with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4056"/>
  <seriesInfo name="DOI" value="10.17487/RFC4056"/>
</reference>

<reference anchor="DH-POP">
  <front>
    <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
    <date month="May" year="2013"/>
    <abstract>
      <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
      <t>This document obsoletes RFC 2875.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6955"/>
  <seriesInfo name="DOI" value="10.17487/RFC6955"/>
</reference>

<reference anchor="RSA-256">
  <front>
    <title>Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document supplements RFC 3279. It describes the conventions for using the RSA Probabilistic Signature Scheme (RSASSA-PSS) signature algorithm, the RSA Encryption Scheme - Optimal Asymmetric Encryption Padding (RSAES-OAEP) key transport algorithm and additional one-way hash functions with the Public-Key Cryptography Standards (PKCS) #1 version 1.5 signature algorithm in the Internet X.509 Public Key Infrastructure (PKI). Encoding formats, algorithm identifiers, and parameter formats are specified. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4055"/>
  <seriesInfo name="DOI" value="10.17487/RFC4055"/>
</reference>

<reference anchor="PBKDF2">
  <front>
    <title>PKCS #5: Password-Based Cryptography Specification Version 2.0</title>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="September" year="2000"/>
    <abstract>
      <t>This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message-authentication schemes, and ASN.1 syntax identifying the techniques. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2898"/>
  <seriesInfo name="DOI" value="10.17487/RFC2898"/>
</reference>

<reference anchor="AES-WRAP">
  <front>
    <title>Advanced Encryption Standard (AES) Key Wrap Algorithm</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3394"/>
  <seriesInfo name="DOI" value="10.17487/RFC3394"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="PKCS10">
  <front>
    <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
    <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="November" year="2000"/>
    <abstract>
      <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2986"/>
  <seriesInfo name="DOI" value="10.17487/RFC2986"/>
</reference>

<reference anchor="SMALL-SUB-GROUP">
  <front>
    <title>Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME</title>
    <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
    <date month="March" year="2000"/>
    <abstract>
      <t>This document will describe the situations relevant to implementations of S/MIME version 3 in which protection is necessary and the methods that can be used to prevent these attacks. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2785"/>
  <seriesInfo name="DOI" value="10.17487/RFC2785"/>
</reference>

<reference anchor="HASH-ATTACKS">
  <front>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="B. Schneier" initials="B." surname="Schneier"/>
    <date month="November" year="2005"/>
    <abstract>
      <t>Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols need to be changed, and if so, how. This document summarizes the use of hashes in many protocols, discusses how the collision attacks affect and do not affect the protocols, shows how to thwart known attacks on digital certificates, and discusses future directions for protocol designers. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4270"/>
  <seriesInfo name="DOI" value="10.17487/RFC4270"/>
</reference>

<reference anchor="CMC-COMPv1">
  <front>
    <title>Certificate Management Messages over CMS (CMC): Compliance Requirements</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document provides a set of compliance statements about the CMC (Certificate Management over CMS) enrollment protocol. The ASN.1 structures and the transport mechanisms for the CMC enrollment protocol are covered in other documents. This document provides the information needed to make a compliant version of CMC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5274"/>
  <seriesInfo name="DOI" value="10.17487/RFC5274"/>
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 480?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

