diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc1113.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc1113.txt')
-rw-r--r-- | doc/rfc/rfc1113.txt | 1907 |
1 files changed, 1907 insertions, 0 deletions
diff --git a/doc/rfc/rfc1113.txt b/doc/rfc/rfc1113.txt new file mode 100644 index 0000000..b4301cc --- /dev/null +++ b/doc/rfc/rfc1113.txt @@ -0,0 +1,1907 @@ + + + + + + +Network Working Group J. Linn +Request for Comments: 1113 DEC +Obsoletes RFCs: 989, 1040 IAB Privacy Task Force + August 1989 + + + Privacy Enhancement for Internet Electronic Mail: + Part I -- Message Encipherment and Authentication Procedures + +STATUS OF THIS MEMO + + This RFC suggests a draft standard elective protocol for the Internet + community, and requests discussion and suggestions for improvements. + Distribution of this memo is unlimited. + +ACKNOWLEDGMENT + + This RFC is the outgrowth of a series of IAB Privacy Task Force + meetings and of internal working papers distributed for those + meetings. I would like to thank the following Privacy Task Force + members and meeting guests for their comments and contributions at + the meetings which led to the preparation of this RFC: David + Balenson, Curt Barker, Jim Bidzos, Matt Bishop, Danny Cohen, Tom + Daniel, Charles Fox, Morrie Gasser, Russ Housley, Steve Kent + (chairman), John Laws, Steve Lipner, Dan Nessett, Mike Padlipsky, Rob + Shirey, Miles Smid, Steve Walker, and Steve Wilbur. + +Table of Contents + + 1. Executive Summary 2 + 2. Terminology 3 + 3. Services, Constraints, and Implications 3 + 4. Processing of Messages 7 + 4.1 Message Processing Overview 7 + 4.1.1 Types of Keys 7 + 4.1.2 Processing Procedures 8 + 4.2 Encryption Algorithms and Modes 9 + 4.3 Privacy Enhancement Message Transformations 10 + 4.3.1 Constraints 10 + 4.3.2 Approach 11 + 4.3.2.1 Step 1: Local Form 12 + 4.3.2.2 Step 2: Canonical Form 12 + 4.3.2.3 Step 3: Authentication and Encipherment 12 + 4.3.2.4 Step 4: Printable Encoding 13 + 4.3.2.5 Summary of Transformations 15 + 4.4 Encapsulation Mechanism 15 + 4.5 Mail for Mailing Lists 17 + 4.6 Summary of Encapsulated Header Fields 18 + + + +Linn [Page 1] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + 4.6.1 Per-Message Encapsulated Header Fields 20 + 4.6.1.1 X-Proc-Type Field 20 + 4.6.1.2 X-DEK-Info Field 21 + 4.6.2 Encapsulated Header Fields Normally Per-Message 21 + 4.6.2.1 X-Sender-ID Field 22 + 4.6.2.2 X-Certificate Field 22 + 4.6.2.3 X-MIC-Info Field 23 + 4.6.3 Encapsulated Header Fields with Variable Occurrences 23 + 4.6.3.1 X-Issuer-Certificate Field 23 + 4.6.4 Per-Recipient Encapsulated Header Fields 24 + 4.6.4.1 X-Recipient-ID Field 24 + 4.6.4.2 X-Key-Info Field 24 + 4.6.4.2.1 Symmetric Key Management 24 + 4.6.4.2.2 Asymmetric Key Management 25 + 5. Key Management 26 + 5.1 Data Encrypting Keys (DEKs) 26 + 5.2 Interchange Keys (IKs) 26 + 5.2.1 Subfield Definitions 28 + 5.2.1.1 Entity Identifier Subfield 28 + 5.2.1.2 Issuing Authority Subfield 29 + 5.2.1.3 Version/Expiration Subfield 29 + 5.2.2 IK Cryptoperiod Issues 29 + 6. User Naming 29 + 6.1 Current Approach 29 + 6.2 Issues for Consideration 30 + 7. Example User Interface and Implementation 30 + 8. Areas For Further Study 31 + 9. References 32 + NOTES 32 + +1. Executive Summary + + This RFC defines message encipherment and authentication procedures, + in order to provide privacy enhancement services for electronic mail + transfer in the Internet. It is one member of a related set of four + RFCs. The procedures defined in the current RFC are intended to be + compatible with a wide range of key management approaches, including + both symmetric (secret-key) and asymmetric (public-key) approaches + for encryption of data encrypting keys. Use of symmetric + cryptography for message text encryption and/or integrity check + computation is anticipated. RFC-1114 specifies supporting key + management mechanisms based on the use of public-key certificates. + RFC-1115 specifies algorithm and related information relevant to the + current RFC and to RFC-1114. A subsequent RFC will provide details + of paper and electronic formats and procedures for the key management + infrastructure being established in support of these services. + + Privacy enhancement services (confidentiality, authentication, and + + + +Linn [Page 2] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + message integrity assurance) are offered through the use of end-to- + end cryptography between originator and recipient User Agent + processes, with no special processing requirements imposed on the + Message Transfer System at endpoints or at intermediate relay sites. + This approach allows privacy enhancement facilities to be + incorporated on a site-by-site or user-by-user basis without impact + on other Internet entities. Interoperability among heterogeneous + components and mail transport facilities is supported. + +2. Terminology + + For descriptive purposes, this RFC uses some terms defined in the OSI + X.400 Message Handling System Model per the 1984 CCITT + Recommendations. This section replicates a portion of X.400's + Section 2.2.1, "Description of the MHS Model: Overview" in order to + make the terminology clear to readers who may not be familiar with + the OSI MHS Model. + + In the MHS model, a user is a person or a computer application. A + user is referred to as either an originator (when sending a message) + or a recipient (when receiving one). MH Service elements define the + set of message types and the capabilities that enable an originator + to transfer messages of those types to one or more recipients. + + An originator prepares messages with the assistance of his or her + User Agent (UA). A UA is an application process that interacts with + the Message Transfer System (MTS) to submit messages. The MTS + delivers to one or more recipient UAs the messages submitted to it. + Functions performed solely by the UA and not standardized as part of + the MH Service elements are called local UA functions. + + The MTS is composed of a number of Message Transfer Agents (MTAs). + Operating together, the MTAs relay messages and deliver them to the + intended recipient UAs, which then make the messages available to the + intended recipients. + + The collection of UAs and MTAs is called the Message Handling System + (MHS). The MHS and all of its users are collectively referred to as + the Message Handling Environment. + +3. Services, Constraints, and Implications + + This RFC defines mechanisms to enhance privacy for electronic mail + transferred in the Internet. The facilities discussed in this RFC + provide privacy enhancement services on an end-to-end basis between + sender and recipient UAs. No privacy enhancements are offered for + message fields which are added or transformed by intermediate relay + points. + + + +Linn [Page 3] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + Authentication and integrity facilities are always applied to the + entirety of a message's text. No facility for confidentiality + without authentication is provided. Encryption facilities may be + applied selectively to portions of a message's contents; this allows + less sensitive portions of messages (e.g., descriptive fields) to be + processed by a recipient's delegate in the absence of the recipient's + personal cryptographic keys. In the limiting case, where the + entirety of message text is excluded from encryption, this feature + can be used to yield the effective combination of authentication and + integrity services without confidentiality. + + In keeping with the Internet's heterogeneous constituencies and usage + modes, the measures defined here are applicable to a broad range of + Internet hosts and usage paradigms. In particular, it is worth + noting the following attributes: + + 1. The mechanisms defined in this RFC are not restricted to a + particular host or operating system, but rather allow + interoperability among a broad range of systems. All + privacy enhancements are implemented at the application + layer, and are not dependent on any privacy features at + lower protocol layers. + + 2. The defined mechanisms are compatible with non-enhanced + Internet components. Privacy enhancements are implemented + in an end-to-end fashion which does not impact mail + processing by intermediate relay hosts which do not + incorporate privacy enhancement facilities. It is + necessary, however, for a message's sender to be cognizant + of whether a message's intended recipient implements privacy + enhancements, in order that encoding and possible + encipherment will not be performed on a message whose + destination is not equipped to perform corresponding inverse + transformations. + + 3. The defined mechanisms are compatible with a range of mail + transport facilities (MTAs). Within the Internet, + electronic mail transport is effected by a variety of SMTP + implementations. Certain sites, accessible via SMTP, + forward mail into other mail processing environments (e.g., + USENET, CSNET, BITNET). The privacy enhancements must be + able to operate across the SMTP realm; it is desirable that + they also be compatible with protection of electronic mail + sent between the SMTP environment and other connected + environments. + + 4. The defined mechanisms are compatible with a broad range of + electronic mail user agents (UAs). A large variety of + + + +Linn [Page 4] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + electronic mail user agent programs, with a corresponding + broad range of user interface paradigms, is used in the + Internet. In order that electronic mail privacy + enhancements be available to the broadest possible user + community, selected mechanisms should be usable with the + widest possible variety of existing UA programs. For + purposes of pilot implementation, it is desirable that + privacy enhancement processing be incorporable into a + separate program, applicable to a range of UAs, rather than + requiring internal modifications to each UA with which + privacy-enhanced services are to be provided. + + 5. The defined mechanisms allow electronic mail privacy + enhancement processing to be performed on personal computers + (PCs) separate from the systems on which UA functions are + implemented. Given the expanding use of PCs and the limited + degree of trust which can be placed in UA implementations on + many multi-user systems, this attribute can allow many users + to process privacy-enhanced mail with a higher assurance + level than a strictly UA-based approach would allow. + + 6. The defined mechanisms support privacy protection of + electronic mail addressed to mailing lists (distribution + lists, in ISO parlance). + + 7. The mechanisms defined within this RFC are compatible with a + variety of supporting key management approaches, including + (but not limited to) manual pre-distribution, centralized + key distribution based on symmetric cryptography, and the + use of public-key certificates. Different key management + mechanisms may be used for different recipients of a + multicast message. While support for a particular key + management mechanism is not a minimum essential requirement + for compatibility with this RFC, adoption of the public-key + certificate approach defined in companion RFC-1114 is + strongly recommended. + + In order to achieve applicability to the broadest possible range of + Internet hosts and mail systems, and to facilitate pilot + implementation and testing without the need for prior modifications + throughout the Internet, three basic restrictions are imposed on the + set of measures to be considered in this RFC: + + 1. Measures will be restricted to implementation at endpoints + and will be amenable to integration at the user agent (UA) + level or above, rather than necessitating integration into + the message transport system (e.g., SMTP servers). + + + + +Linn [Page 5] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + 2. The set of supported measures enhances rather than restricts + user capabilities. Trusted implementations, incorporating + integrity features protecting software from subversion by + local users, cannot be assumed in general. In the absence + of such features, it appears more feasible to provide + facilities which enhance user services (e.g., by protecting + and authenticating inter-user traffic) than to enforce + restrictions (e.g., inter-user access control) on user + actions. + + 3. The set of supported measures focuses on a set of functional + capabilities selected to provide significant and tangible + benefits to a broad user community. By concentrating on the + most critical set of services, we aim to maximize the added + privacy value that can be provided with a modest level of + implementation effort. + + As a result of these restrictions, the following facilities can be + provided: + + 1. disclosure protection, + + 2. sender authenticity, + + 3. message integrity measures, and + + 4. (if asymmetric key management is used) non-repudiation of + origin, + + but the following privacy-relevant concerns are not addressed: + + 1. access control, + + 2. traffic flow confidentiality, + + 3. address list accuracy, + + 4. routing control, + + 5. issues relating to the casual serial reuse of PCs by + multiple users, + + 6. assurance of message receipt and non-deniability of receipt, + + 7. automatic association of acknowledgments with the messages + to which they refer, and + + 8. message duplicate detection, replay prevention, or other + + + +Linn [Page 6] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + stream-oriented services. + + A message's sender will determine whether privacy enhancements are to + be performed on a particular message. Therefore, a sender must be + able to determine whether particular recipients are equipped to + process privacy-enhanced mail. In a general architecture, these + mechanisms will be based on server queries; thus, the query function + could be integrated into a UA to avoid imposing burdens or + inconvenience on electronic mail users. + +4. Processing of Messages + +4.1 Message Processing Overview + + This subsection provides a high-level overview of the components and + processing steps involved in electronic mail privacy enhancement + processing. Subsequent subsections will define the procedures in + more detail. + +4.1.1 Types of Keys + + A two-level keying hierarchy is used to support privacy-enhanced + message transmission: + + 1. Data Encrypting Keys (DEKs) are used for encryption of + message text and (with certain choices among a set of + alternative algorithms) for computation of message integrity + check (MIC) quantities. DEKs are generated individually for + each transmitted message; no predistribution of DEKs is + needed to support privacy-enhanced message transmission. + + 2. Interchange Keys (IKs) are used to encrypt DEKs for + transmission within messages. Ordinarily, the same IK will + be used for all messages sent from a given originator to a + given recipient over a period of time. Each transmitted + message includes a representation of the DEK(s) used for + message encryption and/or MIC computation, encrypted under + an individual IK per named recipient. The representation is + associated with "X-Sender-ID:" and "X-Recipient-ID:" fields, + which allow each individual recipient to identify the IK + used to encrypt DEKs and/or MICs for that recipient's use. + Given an appropriate IK, a recipient can decrypt the + corresponding transmitted DEK representation, yielding the + DEK required for message text decryption and/or MIC + verification. The definition of an IK differs depending on + whether symmetric or asymmetric cryptography is used for DEK + encryption: + + + + +Linn [Page 7] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + 2a. When symmetric cryptography is used for DEK + encryption, an IK is a single symmetric key shared + between an originator and a recipient. In this + case, the same IK is used to encrypt MICs as well + as DEKs for transmission. Version/expiration + information and IA identification associated with + the originator and with the recipient must be + concatenated in order to fully qualify a symmetric + IK. + + 2b. When asymmetric cryptography is used, the IK + component used for DEK encryption is the public + component of the recipient. The IK component used + for MIC encryption is the private component of the + originator, and therefore only one encrypted MIC + representation need be included per message, rather than + one per recipient. Each of these IK + components can be fully qualified in an + "X-Recipient-ID:" or "X-Sender-ID:" field, + respectively. + +4.1.2 Processing Procedures + + When privacy enhancement processing is to be performed on an outgoing + message, a DEK is generated [1] for use in message encryption and (if + a chosen MIC algorithm requires a key) a variant of the DEK is formed + for use in MIC computation. DEK generation can be omitted for the + case of a message in which all contents are excluded from encryption, + unless a chosen MIC computation algorithm requires a DEK. + + An "X-Sender-ID:" field is included in the header to provide one + identification component for the IK(s) used for message processing. + IK components are selected for each individually named recipient; a + corresponding "X-Recipient-ID:" field, interpreted in the context of + a prior "X-Sender-ID:" field, serves to identify each IK. Each "X- + Recipient-ID:" field is followed by an "X-Key-Info:" field, which + transfers a DEK encrypted under the IK appropriate for the specified + recipient. When symmetric key management is used for a given + recipient, the "X-Key-Info:" field also transfers the message's + computed MIC, encrypted under the recipient's IK. When asymmetric + key management is used, a prior "X-MIC-Info:" field carries the + message's MIC encrypted under the private component of the sender. + + A four-phase transformation procedure is employed in order to + represent encrypted message text in a universally transmissible form + and to enable messages encrypted on one type of host computer to be + decrypted on a different type of host computer. A plaintext message + is accepted in local form, using the host's native character set and + + + +Linn [Page 8] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + line representation. The local form is converted to a canonical + message text representation, defined as equivalent to the inter-SMTP + representation of message text. This canonical representation forms + the input to the MIC computation and encryption processes. + + For encryption purposes, the canonical representation is padded as + required by the encryption algorithm. The padded canonical + representation is encrypted (except for any regions which are + explicitly excluded from encryption). The encrypted text (along with + the canonical representation of regions which were excluded from + encryption) is encoded into a printable form. The printable form is + composed of a restricted character set which is chosen to be + universally representable across sites, and which will not be + disrupted by processing within and between MTS entities. + + The output of the encoding procedure is combined with a set of header + fields carrying cryptographic control information. The result is + passed to the electronic mail system to be encapsulated as the text + portion of a transmitted message. + + When a privacy-enhanced message is received, the cryptographic + control fields within its text portion provide the information + required for the authorized recipient to perform MIC verification and + decryption of the received message text. First, the printable + encoding is converted to a bitstring. Encrypted portions of the + transmitted message are decrypted. The MIC is verified. The + canonical representation is converted to the recipient's local form, + which need not be the same as the sender's local form. + +4.2 Encryption Algorithms and Modes + + For purposes of this RFC, the Block Cipher Algorithm DEA-1, defined + in ANSI X3.92-1981 [2] shall be used for encryption of message text. + The DEA-1 is equivalent to the Data Encryption Standard (DES), as + defined in FIPS PUB 46 [3]. When used for encryption of text, the + DEA-1 shall be used in the Cipher Block Chaining (CBC) mode, as + defined in ISO IS 8372 [4]. The identifier string "DES-CBC", defined + in RFC-1115, signifies this algorithm/mode combination. The CBC mode + definition in IS 8372 is equivalent to that provided in FIPS PUB 81 + [5] and in ANSI X3.106-1983 [16]. Use of other algorithms and/or + modes for message text processing will require case-by-case study to + determine applicability and constraints. Additional algorithms and + modes approved for use in this context will be specified in + successors to RFC-1115. + + It is an originator's responsibility to generate a new pseudorandom + initializing vector (IV) for each privacy-enhanced electronic mail + message unless the entirety of the message is excluded from + + + +Linn [Page 9] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + encryption. Section 4.3.1 of [17] provides rationale for this + requirement, even in a context where individual DEKs are generated + for individual messages. The IV will be transmitted with the + message. + + Certain operations require that one key be encrypted under an + interchange key (IK) for purposes of transmission. A header facility + indicates the mode in which the IK is used for encryption. RFC-1115 + specifies encryption algorithm/mode identifiers, including DES-ECB, + DES-EDE, and RSA. All implementations using symmetric key management + should support DES-ECB IK use, and all implementations using + asymmetric key management should support RSA IK use. + + RFC-1114, released concurrently with this RFC, specifies asymmetric, + certificate-based key management procedures to support the message + processing procedures defined in this document. The message + processing procedures can also be used with symmetric key management, + given prior distribution of suitable symmetric IKs through out-of- + band means. Support for the asymmetric approach defined in RFC-1114 + is strongly recommended. + +4.3 Privacy Enhancement Message Transformations + +4.3.1 Constraints + + An electronic mail encryption mechanism must be compatible with the + transparency constraints of its underlying electronic mail + facilities. These constraints are generally established based on + expected user requirements and on the characteristics of anticipated + endpoint and transport facilities. An encryption mechanism must also + be compatible with the local conventions of the computer systems + which it interconnects. In our approach, a canonicalization step is + performed to abstract out local conventions and a subsequent encoding + step is performed to conform to the characteristics of the underlying + mail transport medium (SMTP). The encoding conforms to SMTP + constraints, established to support interpersonal messaging. SMTP's + rules are also used independently in the canonicalization process. + RFC-821's [7] Section 4.5 details SMTP's transparency constraints. + + To prepare a message for SMTP transmission, the following + requirements must be met: + + 1. All characters must be members of the 7-bit ASCII character + set. + + 2. Text lines, delimited by the character pair <CR><LF>, must + be no more than 1000 characters long. + + + + +Linn [Page 10] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + 3. Since the string <CR><LF>.<CR><LF> indicates the end of a + message, it must not occur in text prior to the end of a + message. + + Although SMTP specifies a standard representation for line delimiters + (ASCII <CR><LF>), numerous systems use a different native + representation to delimit lines. For example, the <CR><LF> sequences + delimiting lines in mail inbound to UNIX systems are transformed to + single <LF>s as mail is written into local mailbox files. Lines in + mail incoming to record-oriented systems (such as VAX VMS) may be + converted to appropriate records by the destination SMTP [8] server. + As a result, if the encryption process generated <CR>s or <LF>s, + those characters might not be accessible to a recipient UA program at + a destination which uses different line delimiting conventions. It + is also possible that conversion between tabs and spaces may be + performed in the course of mapping between inter-SMTP and local + format; this is a matter of local option. If such transformations + changed the form of transmitted ciphertext, decryption would fail to + regenerate the transmitted plaintext, and a transmitted MIC would + fail to compare with that computed at the destination. + + The conversion performed by an SMTP server at a system with EBCDIC as + a native character set has even more severe impact, since the + conversion from EBCDIC into ASCII is an information-losing + transformation. In principle, the transformation function mapping + between inter-SMTP canonical ASCII message representation and local + format could be moved from the SMTP server up to the UA, given a + means to direct that the SMTP server should no longer perform that + transformation. This approach has a major disadvantage: internal + file (e.g., mailbox) formats would be incompatible with the native + forms used on the systems where they reside. Further, it would + require modification to SMTP servers, as mail would be passed to SMTP + in a different representation than it is passed at present. + +4.3.2 Approach + + Our approach to supporting privacy-enhanced mail across an + environment in which intermediate conversions may occur encodes mail + in a fashion which is uniformly representable across the set of + privacy-enhanced UAs regardless of their systems' native character + sets. This encoded form is used to represent mail text from sender + to recipient, but the encoding is not applied to enclosing mail + transport headers or to encapsulated headers inserted to carry + control information between privacy-enhanced UAs. The encoding's + characteristics are such that the transformations anticipated between + sender and recipient UAs will not prevent an encoded message from + being decoded properly at its destination. + + + + +Linn [Page 11] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + A sender may exclude one or more portions of a message from + encryption processing, but authentication processing is always + applied to the entirety of message text. Explicit action is required + to exclude a portion of a message from encryption processing; by + default, encryption is applied to the entirety of message text. The + user-level delimiter which specifies such exclusion is a local + matter, and hence may vary between sender and recipient, but all + systems should provide a means for unambiguous identification of + areas excluded from encryption processing. + + An outbound privacy-enhanced message undergoes four transformation + steps, described in the following four subsections. + +4.3.2.1 Step 1: Local Form + + The message text is created in the system's native character set, + with lines delimited in accordance with local convention. + +4.3.2.2 Step 2: Canonical Form + + The entire message text, including both those portions subject to + encipherment processing and those portions excluded from such + processing, is converted to a universal canonical form, analogous to + the inter-SMTP representation [9] as defined in RFC-821 and RFC-822 + [10] (ASCII character set, <CR><LF> line delimiters). The processing + required to perform this conversion is minimal on systems whose + native character set is ASCII. (Note: Since the output of the + canonical encoding process will never be submitted directly to SMTP, + but only to subsequent steps of the privacy enhancement encoding + process, the dot-stuffing transformation discussed in RFC-821, + section 4.5.2, is not required.) Since a message is converted to a + standard character set and representation before encryption, it can + be decrypted and its MIC can be verified at any type of destination + host computer. The decryption and MIC verification is performed + before any conversions which may be necessary to transform the + message into a destination-specific local form. + +4.3.2.3 Step 3: Authentication and Encipherment + + The canonical form is input to the selected MIC computation algorithm + in order to compute an integrity check quantity for the message. No + padding is added to the canonical form before submission to the MIC + computation algorithm, although certain MIC algorithms will apply + their own padding in the course of computing a MIC. + + Padding is applied to the canonical form as needed to perform + encryption in the DEA-1 CBC mode, as follows: The number of octets to + be encrypted is determined by subtracting the number of octets + + + +Linn [Page 12] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + excluded from encryption from the total length of the canonically + encoded text. Octets with the hexadecimal value FF (all ones) are + appended to the canonical form as needed so that the text octets to + be encrypted, along with the added padding octets, fill an integral + number of 8-octet encryption quanta. No padding is applied if the + number of octets to be encrypted is already an integral multiple of + 8. The use of hexadecimal FF (a value outside the 7-bit ASCII set) + as a padding value allows padding octets to be distinguished from + valid data without inclusion of an explicit padding count indicator. + + The regions of the message which have not been excluded from + encryption are encrypted. To support selective encipherment + processing, an implementation must retain internal indications of the + positions of excluded areas excluded from encryption with relation to + non-excluded areas, so that those areas can be properly delimited in + the encoding procedure defined in step 4. If a region excluded from + encryption intervenes between encrypted regions, cryptographic state + (e.g., IVs and accumulation of octets into encryption quanta) is + preserved and continued after the excluded region. + +4.3.2.4 Step 4: Printable Encoding + + Proceeding from left to right, the bit string resulting from step 3 + is encoded into characters which are universally representable at all + sites, though not necessarily with the same bit patterns (e.g., + although the character "E" is represented in an ASCII-based system as + hexadecimal 45 and as hexadecimal C5 in an EBCDIC-based system, the + local significance of the two representations is equivalent). This + encoding step is performed for all privacy-enhanced messages, even if + an entire message is excluded from encryption. + + A 64-character subset of International Alphabet IA5 is used, enabling + 6 bits to be represented per printable character. (The proposed + subset of characters is represented identically in IA5 and ASCII.) + Two additional characters, "=" and "*", are used to signify special + processing functions. The character "=" is used for padding within + the printable encoding procedure. The character "*" is used to + delimit the beginning and end of a region which has been excluded + from encipherment processing. The encoding function's output is + delimited into text lines (using local conventions), with each line + except the last containing exactly 64 printable characters and the + final line containing 64 or fewer printable characters. (This line + length is easily printable and is guaranteed to satisfy SMTP's 1000- + character transmitted line length limit.) + + The encoding process represents 24-bit groups of input bits as output + strings of 4 encoded characters. Proceeding from left to right across + a 24-bit input group extracted from the output of step 3, each 6-bit + + + +Linn [Page 13] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + group is used as an index into an array of 64 printable characters. + The character referenced by the index is placed in the output string. + These characters, identified in Table 0, are selected so as to be + universally representable, and the set excludes characters with + particular significance to SMTP (e.g., ".", "<CR>", "<LF>"). + + Special processing is performed if fewer than 24 bits are available + in an input group, either at the end of a message or (when the + selective encryption facility is invoked) at the end of an encrypted + region or an excluded region. A full encoding quantum is always + completed at the end of a message and before the delimiter "*" is + output to initiate or terminate the representation of a block + excluded from encryption. When fewer than 24 input bits are + available in an input group, zero bits are added (on the right) to + form an integral number of 6-bit groups. Output character positions + which are not required to represent actual input data are set to the + character "=". Since all canonically encoded output is an integral + number of octets, only the following cases can arise: (1) the final + quantum of encoding input is an integral multiple of 24 bits; here, + the final unit of encoded output will be an integral multiple of 4 + characters with no "=" padding, (2) the final quantum of encoding + input is exactly 8 bits; here, the final unit of encoded output will + be two characters followed by two "=" padding characters, or (3) the + final quantum of encoding input is exactly 16 bits; here, the final + unit of encoded output will be three characters followed by one "=" + padding character. + + + + + + + + + + + + + + + + + + + + + + + + + +Linn [Page 14] + +RFC 1113 Mail Privacy: Procedures August 1989 + + +4.3.2.5 Summary of Transformations + + In summary, the outbound message is subjected to the following + composition of transformations: + + Transmit_Form = Encode(Encipher(Canonicalize(Local_Form))) + + The inverse transformations are performed, in reverse order, to + process inbound privacy-enhanced mail: + + + Local_Form = DeCanonicalize(Decipher(Decode(Transmit_Form))) + + Value Encoding Value Encoding Value Encoding Value Encoding + 0 A 17 R 34 i 51 z + 1 B 18 S 35 j 52 0 + 2 C 19 T 36 k 53 1 + 3 D 20 U 37 l 54 2 + 4 E 21 V 38 m 55 3 + 5 F 22 W 39 n 56 4 + 6 G 23 X 40 o 57 5 + 7 H 24 Y 41 p 58 6 + 8 I 25 Z 42 q 59 7 + 9 J 26 a 43 r 60 8 + 10 K 27 b 44 s 61 9 + 11 L 28 c 45 t 62 + + 12 M 29 d 46 u 63 / + 13 N 30 e 47 v + 14 O 31 f 48 w (pad) = + 15 P 32 g 49 x + 16 Q 33 h 50 y (1) * + + (1) The character "*" is used to enclose portions of an + encoded message to which encryption processing has not + been applied. + + + Printable Encoding Characters + Table 1 + + + Note that the local form and the functions to transform messages to + and from canonical form may vary between the sender and recipient + systems without loss of information. + +4.4 Encapsulation Mechanism + + Encapsulation of privacy-enhanced messages within an enclosing layer + + + +Linn [Page 15] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + of headers interpreted by the electronic mail transport system offers + a number of advantages in comparison to a flat approach in which + certain fields within a single header are encrypted and/or carry + cryptographic control information. Encapsulation provides generality + and segregates fields with user-to-user significance from those + transformed in transit. All fields inserted in the course of + encryption/authentication processing are placed in the encapsulated + header. This facilitates compatibility with mail handling programs + which accept only text, not header fields, from input files or from + other programs. Further, privacy enhancement processing can be + applied recursively. As far as the MTS is concerned, information + incorporated into cryptographic authentication or encryption + processing will reside in a message's text portion, not its header + portion. + + The encapsulation mechanism to be used for privacy-enhanced mail is + derived from that described in RFC-934 [11] which is, in turn, based + on precedents in the processing of message digests in the Internet + community. To prepare a user message for encrypted or authenticated + transmission, it will be transformed into the representation shown in + Figure 1. + + As a general design principle, sensitive data is protected by + incorporating the data within the encapsulated text rather than by + applying measures selectively to fields in the enclosing header. + Examples of potentially sensitive header information may include + fields such as "Subject:", with contents which are significant on an + end-to-end, inter-user basis. The (possibly empty) set of headers to + which protection is to be applied is a user option. It is strongly + recommended, however, that all implementations should replicate + copies of "X-Sender-ID:" and "X-Recipient-ID:" fields within the + encapsulated text. + + If a user wishes disclosure protection for header fields, they must + occur only in the encapsulated text and not in the enclosing or + encapsulated header. If disclosure protection is desired for a + message's subject indication, it is recommended that the enclosing + header contain a "Subject:" field indicating that "Encrypted Mail + Follows". + + If an authenticated version of header information is desired, that + data can be replicated within the encapsulated text portion in + addition to its inclusion in the enclosing header. For example, a + sender wishing to provide recipients with a protected indication of a + message's position in a series of messages could include a copy of a + timestamp or message counter field within the encapsulated text. + + A specific point regarding the integration of privacy-enhanced mail + + + +Linn [Page 16] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + facilities with the message encapsulation mechanism is worthy of + note. The subset of IA5 selected for transmission encoding + intentionally excludes the character "-", so encapsulated text can be + distinguished unambiguously from a message's closing encapsulation + boundary (Post-EB) without recourse to character stuffing. + + Enclosing Header Portion + (Contains header fields per RFC-822) + + Blank Line + (Separates Enclosing Header from Encapsulated Message) + + Encapsulated Message + + Pre-Encapsulation Boundary (Pre-EB) + -----PRIVACY-ENHANCED MESSAGE BOUNDARY----- + + Encapsulated Header Portion + (Contains encryption control fields inserted in plaintext. + Examples include "X-DEK-Info:", "X-Sender-ID:", and + "X-Key-Info:". + Note that, although these control fields have line-oriented + representations similar to RFC-822 header fields, the set + of fields valid in this context is disjoint from those used + in RFC-822 processing.) + + Blank Line + (Separates Encapsulated Header from subsequent encoded + Encapsulated Text Portion) + + Encapsulated Text Portion + (Contains message data encoded as specified in Section 4.3; + may incorporate protected copies of enclosing and + encapsulated header fields such as "Subject:", etc.) + + Post-Encapsulation Boundary (Post-EB) + -----PRIVACY-ENHANCED MESSAGE BOUNDARY----- + + + Message Encapsulation + Figure 1 + + +4.5 Mail for Mailing Lists + + When mail is addressed to mailing lists, two different methods of + processing can be applicable: the IK-per-list method and the IK-per- + recipient method. The choice depends on the information available to + + + +Linn [Page 17] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + the sender and on the sender's preference. + + If a message's sender addresses a message to a list name or alias, + use of an IK associated with that name or alias as a entity (IK-per- + list), rather than resolution of the name or alias to its constituent + destinations, is implied. Such an IK must, therefore, be available + to all list members. For the case of asymmetric key management, the + list's private component must be available to all list members. This + alternative will be the normal case for messages sent via remote + exploder sites, as a sender to such lists may not be cognizant of the + set of individual recipients. Unfortunately, it implies an + undesirable level of exposure for the shared IK, and makes its + revocation difficult. Moreover, use of the IK-per-list method allows + any holder of the list's IK to masquerade as another sender to the + list for authentication purposes. + + If, in contrast, a message's sender is equipped to expand the + destination mailing list into its individual constituents and elects + to do so (IK-per-recipient), the message's DEK (and, in the symmetric + key management case, MIC) will be encrypted under each per-recipient + IK and all such encrypted representations will be incorporated into + the transmitted message. Note that per-recipient encryption is + required only for the relatively small DEK and MIC quantities carried + in the "X-Key-Info:" field, not for the message text which is, in + general, much larger. Although more IKs are involved in processing + under the IK-per-recipient method, the pairwise IKs can be + individually revoked and possession of one IK does not enable a + successful masquerade of another user on the list. + +4.6 Summary of Encapsulated Header Fields + + This section summarizes the syntax and semantics of the encapsulated + header fields to be added to messages in the course of privacy + enhancement processing. The fields are presented in three groups. + Normally, the groups will appear in encapsulated headers in the order + in which they are shown, though not all fields in each group will + appear in all messages. In certain indicated cases, it is recommended + that the fields be replicated within the encapsulated text portion as + well as being included within the encapsulated header. Figures 2 and + 3 show the appearance of small example encapsulated messages. Figure + 2 assumes the use of symmetric cryptography for key management. + Figure 3 illustrates an example encapsulated message in which + asymmetric key management is used. + + Unless otherwise specified, all field arguments are processed in a + case-sensitive fashion. In most cases, numeric quantities are + represented in header fields as contiguous strings of hexadecimal + digits, where each digit is represented by a character from the + + + +Linn [Page 18] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + ranges "0"-"9" or upper case "A"-"F". Since public-key certificates + and quantities encrypted using asymmetric algorithms are large in + size, use of a more space-efficient encoding technique is appropriate + for such quantities, and the encoding mechanism defined in Section + 4.3.2.4 of this RFC, representing 6 bits per printed character, is + adopted. The example shown in Figure 3 shows asymmetrically + encrypted quantities (e.g., "X-MIC-Info:", "X-Key-Info:") with 64- + character printed representations, corresponding to 384 bits. The + fields carrying asymmetrically encrypted quantities also illustrate + the use of folding as defined in RFC-822, section 3.1.1. + + -----PRIVACY-ENHANCED MESSAGE BOUNDARY----- + X-Proc-Type: 3,ENCRYPTED + X-DEK-Info: DES-CBC,F8143EDE5960C597 + X-Sender-ID: linn@ccy.bbn.com:: + X-Recipient-ID: linn@ccy.bbn.com:ptf-kmc:3 + X-Key-Info: DES-ECB,RSA-MD2,9FD3AAD2F2691B9A,B70665BB9BF7CBCD, + A60195DB94F727D3 + X-Recipient-ID: privacy-tf@venera.isi.edu:ptf-kmc:4 + X-Key-Info: DES-ECB,RSA-MD2,161A3F75DC82EF26,E2EF532C65CBCFF7, + 9F83A2658132DB47 + + LLrHB0eJzyhP+/fSStdW8okeEnv47jxe7SJ/iN72ohNcUk2jHEUSoH1nvNSIWL9M + 8tEjmF/zxB+bATMtPjCUWbz8Lr9wloXIkjHUlBLpvXR0UrUzYbkNpk0agV2IzUpk + J6UiRRGcDSvzrsoK+oNvqu6z7Xs5Xfz5rDqUcMlK1Z6720dcBWGGsDLpTpSCnpot + dXd/H5LMDWnonNvPCwQUHt== + -----PRIVACY-ENHANCED MESSAGE BOUNDARY----- + + + Example Encapsulated Message (Symmetric Case) + Figure 2 + + + -----PRIVACY-ENHANCED MESSAGE BOUNDARY----- + X-Proc-Type: 3,ENCRYPTED + X-DEK-Info: DES-CBC,F8143EDE5960C597 + X-Sender-ID: linn@ccy.bbn.com:: + X-Certificate: + jHUlBLpvXR0UrUzYbkNpk0agV2IzUpk8tEjmF/zxB+bATMtPjCUWbz8Lr9wloXIk + YbkNpk0agV2IzUpk8tEjmF/zxB+bATMtPjCUWbz8Lr9wloXIkjHUlBLpvXR0UrUz + agV2IzUpk8tEjmFjHUlBLpvXR0UrUz/zxB+bATMtPjCUWbz8Lr9wloXIkYbkNpk0 + X-Issuer-Certificate: + TMtPjCUWbz8Lr9wloXIkYbkNpk0agV2IzUpk8tEjmFjHUlBLpvXR0UrUz/zxB+bA + IkjHUlBLpvXR0UrUzYbkNpk0agV2IzUpk8tEjmF/zxB+bATMtPjCUWbz8Lr9wloX + vXR0UrUzYbkNpk0agV2IzUpk8tEjmF/zxB+bATMtPjCUWbz8Lr9wloXIkjHUlBLp + X-MIC-Info: RSA-MD2,RSA, + 5rDqUcMlK1Z6720dcBWGGsDLpTpSCnpotJ6UiRRGcDSvzrsoK+oNvqu6z7Xs5Xfz + X-Recipient-ID: linn@ccy.bbn.com:RSADSI:3 + + + +Linn [Page 19] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + X-Key-Info: RSA, + lBLpvXR0UrUzYbkNpk0agV2IzUpk8tEjmF/zxB+bATMtPjCUWbz8Lr9wloXIkjHU + X-Recipient-ID: privacy-tf@venera.isi.edu:RSADSI:4 + X-Key-Info: RSA, + NcUk2jHEUSoH1nvNSIWL9MLLrHB0eJzyhP+/fSStdW8okeEnv47jxe7SJ/iN72oh + + LLrHB0eJzyhP+/fSStdW8okeEnv47jxe7SJ/iN72ohNcUk2jHEUSoH1nvNSIWL9M + 8tEjmF/zxB+bATMtPjCUWbz8Lr9wloXIkjHUlBLpvXR0UrUzYbkNpk0agV2IzUpk + J6UiRRGcDSvzrsoK+oNvqu6z7Xs5Xfz5rDqUcMlK1Z6720dcBWGGsDLpTpSCnpot + dXd/H5LMDWnonNvPCwQUHt== + -----PRIVACY-ENHANCED MESSAGE BOUNDARY----- + + Example Encapsulated Message (Asymmetric Case) + Figure 3 + + + Although the encapsulated header fields resemble RFC-822 header + fields, they are a disjoint set and will not in general be processed + by the same parser which operates on enclosing header fields. The + complexity of lexical analysis needed and appropriate for + encapsulated header field processing is significantly less than that + appropriate to RFC-822 header processing. For example, many + characters with special significance to RFC-822 at the syntactic + level have no such significance within encapsulated header fields. + + When the length of an encapsulated header field is longer than the + size conveniently printable on a line, whitespace may be used to fold + the field in the manner of RFC-822, section 3.1.1. Any such inserted + whitespace is not to be interpreted as a part of a subfield. As a + particular example, due to the length of public-key certificates and + of quantities encrypted using asymmetric algorithms, such quantities + may often need to be folded across multiple printed lines. In order + to facilitate such folding in a uniform manner, the bits representing + such a quantity are to be divided into an ordered set (with leftmost + bits first) of zero or more 384-bit groups (corresponding to 64- + character printed representations), followed by a final group of bits + which may be any length up to 384 bits. + +4.6.1 Per-Message Encapsulated Header Fields + + This group of encapsulated header fields contains fields which occur + no more than once in a privacy-enhanced message, generally preceding + all other encapsulated header fields. + +4.6.1.1 X-Proc-Type Field + + The "X-Proc-Type:" encapsulated header field, required for all + privacy-enhanced messages, identifies the type of processing + + + +Linn [Page 20] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + performed on the transmitted message. Only one "X-Proc-Type:" field + occurs in a message; the "X-Proc-Type:" field must be the first + encapsulated header field in the message. + + The "X-Proc-Type:" field has two subfields, separated by a comma. + The first subfield is a decimal number which is used to distinguish + among incompatible encapsulated header field interpretations which + may arise as changes are made to this standard. Messages processed + according to this RFC will carry the subfield value "3" to + distinguish them from messages processed in accordance with prior + RFCs 989 and 1040. + + The second subfield may assume one of two string values: "ENCRYPTED" + or "MIC-ONLY". Unless all of a message's encapsulated text is + excluded from encryption, the "X-Proc-Type:" field's second subfield + must specify "ENCRYPTED". Specification of "MIC-ONLY", when applied + in conjunction with certain combinations of key management and MIC + algorithm options, permits certain fields which are superfluous in + the absence of encryption to be omitted from the encapsulated header. + In particular, "X-Recipient-ID:" and "X-Key-Info:" fields can be + omitted for recipients for whom asymmetric cryptography is used, + assuming concurrent use of a keyless MIC computation algorithm. The + "X-DEK-Info:" field can be omitted for all "MIC-ONLY" messages. + +4.6.1.2 X-DEK-Info Field + + The "X-DEK-Info:" encapsulated header field identifies the message + text encryption algorithm and mode, and also carries the Initializing + Vector used for message encryption. No more than one "X-DEK-Info:" + field occurs in a message; the field is required except for messages + specified as "MIC-ONLY" in the "X-Proc-Type:" field. + + The "X-DEK-Info:" field carries two arguments, separated by a comma. + For purposes of this RFC, the first argument must be the string + "DES-CBC", signifying (as defined in RFC-1115) use of the DES + algorithm in the CBC mode. The second argument represents a 64-bit + Initializing Vector (IV) as a contiguous string of 16 hexadecimal + digits. Subsequent revisions of RFC-1115 will specify any additional + values which may appear as the first argument of this field. + +4.6.2 Encapsulated Header Fields Normally Per-Message + + This group of encapsulated header fields contains fields which + ordinarily occur no more than once per message. Depending on the key + management option(s) employed, some of these fields may be absent + from some messages. The "X-Sender-ID" field may occur more than once + in a message if different sender-oriented IK components (perhaps + corresponding to different versions) must be used for different + + + +Linn [Page 21] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + recipients. In this case later occurrences override prior + occurrences. If a mixture of symmetric and asymmetric key + distribution is used within a single message, the recipients for each + type of key distribution technology should be grouped together to + simplify parsing. + +4.6.2.1 X-Sender-ID Field + + The "X-Sender-ID:" encapsulated header field, required for all + privacy-enhanced messages, identifies a message's sender and provides + the sender's IK identification component. It should be replicated + within the encapsulated text. The IK identification component + carried in an "X-Sender-ID:" field is used in conjunction with all + subsequent "X-Recipient-ID:" fields until another "X-Sender-ID:" + field occurs; the ordinary case will be that only a single "X- + Sender-ID:" field will occur, prior to any "X-Recipient-ID:" fields. + + The "X-Sender-ID:" field contains (in order) an Entity Identifier + subfield, an (optional) Issuing Authority subfield, and an (optional) + Version/Expiration subfield. The optional subfields are omitted if + their use is rendered redundant by information carried in subsequent + "X-Recipient-ID:" fields; this will ordinarily be the case where + symmetric cryptography is used for key management. The subfields are + delimited by the colon character (":"), optionally followed by + whitespace. + + Section 5.2, Interchange Keys, discusses the semantics of these + subfields and specifies the alphabet from which they are chosen. + Note that multiple "X-Sender-ID:" fields may occur within a single + encapsulated header. All "X-Recipient-ID:" fields are interpreted in + the context of the most recent preceding "X-Sender-ID:" field; it is + illegal for an "X-Recipient-ID:" field to occur in a header before an + "X-Sender-ID:" has been provided. + +4.6.2.2 X-Certificate Field + + The "X-Certificate:" encapsulated header field is used only when + asymmetric key management is employed for one or more of a message's + recipients. To facilitate processing by recipients (at least in + advance of general directory server availability), inclusion of this + field in all messages is strongly recommended. The field transfers a + sender's certificate as a numeric quantity, represented with the + encoding mechanism defined in Section 4.3.2.4 of this RFC. The + semantics of a certificate are discussed in RFC-1114. The + certificate carried in an "X-Certificate:" field is used in + conjunction with "X-Sender-ID:" and "X-Recipient-ID:" fields for + which asymmetric key management is employed. + + + + +Linn [Page 22] + +RFC 1113 Mail Privacy: Procedures August 1989 + + +4.6.2.3 X-MIC-Info Field + + The "X-MIC-Info:" encapsulated header field, used only when + asymmetric key management is employed for at least one recipient of a + message, carries three arguments, separated by commas. The first + argument identifies the algorithm under which the accompanying MIC is + computed; RFC-1115 specifies the acceptable set of MIC algorithm + identifiers. The second argument identifies the algorithm under + which the accompanying MIC is encrypted; for purposes of this RFC, + the string "RSA" as described in RFC-1115 must occur, identifying + use of the RSA algorithm. The third argument is a MIC, + asymmetrically encrypted using the originator's private component. + As discussed earlier in this section, the asymmetrically encrypted + MIC is represented using the technique described in Section 4.3.2.4 + of this RFC. + + The "X-MIC-Info:" field will occur immediately following the + message's "X-Sender-ID:" field and any "X-Certificate:" or "X- + Issuer-Certificate:" fields. Analogous to the "X-Sender-ID:" field, + an "X-MIC-Info:" field applies to all subsequent recipients for whom + asymmetric key management is used. + +4.6.3 Encapsulated Header Fields with Variable Occurrences + + This group of encapsulated header fields contains fields which will + normally occur variable numbers of times within a message, with + numbers of occurrences ranging from zero to non-zero values which are + independent of the number of recipients. + +4.6.3.1 X-Issuer-Certificate Field + + The "X-Issuer-Certificate:" encapsulated header field is meaningful + only when asymmetric key management is used for at least one of a + message's recipients. A typical "X-Issuer-Certificate:" field would + contain the certificate containing the public component used to sign + the certificate carried in the message's "X-Certificate:" field, for + recipients' use in chaining through that certificate's certification + path. Other "X-Issuer-Certificate:" fields, typically representing + higher points in a certification path, also may be included by a + sender. The order in which "X-Issuer-Certificate:" fields are + included need not correspond to the order of the certification path; + the order of that path may in general differ from the viewpoint of + different recipients. More information on certification paths can be + found in RFC-1114. + + The certificate is represented in the same manner as defined for the + "X-Certificate:" field, and any "X-Issuer-Certificate:" fields will + ordinarily follow the "X-Certificate:" field directly. Use of the + + + +Linn [Page 23] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + "X-Issuer-Certificate:" field is optional even when asymmetric key + management is employed, although its incorporation is strongly + recommended in the absence of alternate directory server facilities + from which recipients can access issuers' certificates. + +4.6.4 Per-Recipient Encapsulated Header Fields + + This group of encapsulated header fields normally appears once for + each of a message's named recipients. As a special case, these + fields may be omitted in the case of a "MIC-ONLY" message to + recipients for whom asymmetric key management is employed, given that + the chosen MIC algorithm is keyless. + +4.6.4.1 X-Recipient-ID Field + + The "X-Recipient-ID:" encapsulated header field identifies a + recipient and provides the recipient's IK identification component. + One "X-Recipient-ID:" field is included for each of a message's named + recipients. It should be replicated within the encapsulated text. + The field contains (in order) an Entity Identifier subfield, an + Issuing Authority subfield, and a Version/Expiration subfield. The + subfields are delimited by the colon character (":"), optionally + followed by whitespace. + + Section 5.2, Interchange Keys, discusses the semantics of the + subfields and specifies the alphabet from which they are chosen. All + "X-Recipient-ID:" fields are interpreted in the context of the most + recent preceding "X-Sender-ID:" field; it is illegal for an "X- + Recipient-ID:" field to occur in a header before an "X-Sender-ID:" + has been provided. + +4.6.4.2 X-Key-Info Field + + One "X-Key-Info:" field is included for each of a message's named + recipients. Each "X-Key-Info:" field is interpreted in the context + of the most recent preceding "X-Recipient-ID:" field; normally, an + "X-Key-Info:" field will immediately follow its associated "X- + Recipient-ID:" field. The field's argument(s) differ depending on + whether symmetric or asymmetric key management is used for a + particular recipient. + +4.6.4.2.1 Symmetric Key Management + + When symmetric key management is employed for a given recipient, the + "X-Key-Info:" encapsulated header field transfers four items, + separated by commas: an IK Use Indicator, a MIC Algorithm Indicator, + a DEK and a MIC. The IK Use Indicator identifies the algorithm and + mode in which the identified IK was used for DEK encryption for a + + + +Linn [Page 24] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + particular recipient. For recipients for whom symmetric key + management is used, it may assume the reserved string values "DES- + ECB" or "DES-EDE", as defined in RFC-1115. + + The MIC Algorithm Indicator identifies the MIC computation algorithm + used for a particular recipient; values for this subfield are defined + in RFC-1115. The DEK and MIC are encrypted under the IK identified + by a preceding "X-Recipient-ID:" field and prior "X-Sender-ID:" + field; they are represented as two strings of contiguous hexadecimal + digits, separated by a comma. + + When DEA-1 is used for message text encryption, the DEK + representation will be 16 hexadecimal digits (corresponding to a 64- + bit key); this subfield can be extended to 32 hexadecimal digits + (corresponding to a 128-bit key) if required to support other + algorithms. + + Symmetric encryption of MICs is always performed in the same + encryption mode used to encrypt the message's DEK. Encrypted MICs, + like encrypted DEKs, are represented as contiguous strings of + hexadecimal digits. The size of a MIC is dependent on the choice of + MIC algorithm as specified in the MIC Algorithm Indicator subfield. + +4.6.4.2.2 Asymmetric Key Management + + When asymmetric key management is employed for a given recipient, the + "X-Key-Info:" field transfers two quantities, separated by commas. + The first argument is an IK Use Indicator identifying the algorithm + (and mode, if applicable) in which the DEK is encrypted; for purposes + of this RFC, the IK Use Indicator subfield will always assume the + reserved string value "RSA" (as defined in RFC-1115) for recipients + for whom asymmetric key management is employed, signifying use of the + RSA algorithm. The second argument is a DEK, encrypted (using + asymmetric encryption) under the recipient's public component. + + Throughout this RFC we have adopted the terms "private component" and + "public component" to refer to the quantities which are, + respectively, kept secret and made publically available in asymmetric + cryptosystems. This convention is adopted to avoid possible + confusion arising from use of the term "secret key" to refer to + either the former quantity or to a key in a symmetric cryptosystem. + + As discussed earlier in this section, the asymmetrically encrypted + DEK is represented using the technique described in Section 4.3.2.4 + of this RFC. + + + + + + +Linn [Page 25] + +RFC 1113 Mail Privacy: Procedures August 1989 + + +5. Key Management + + Several cryptographic constructs are involved in supporting the + privacy-enhanced message processing procedure. A set of fundamental + elements is assumed. Data Encrypting Keys (DEKs) are used to encrypt + message text and (for some MIC computation algorithms) in the message + integrity check (MIC) computation process. Interchange Keys (IKs) + are used to encrypt DEKs and MICs for transmission with messages. In + a certificate-based asymmetric key management architecture, + certificates are used as a means to provide entities' public + components and other information in a fashion which is securely bound + by a central authority. The remainder of this section provides more + information about these constructs. + +5.1 Data Encrypting Keys (DEKs) + + Data Encrypting Keys (DEKs) are used for encryption of message text + and (with some MIC computation algorithms) for computation of message + integrity check quantities (MICs). It is strongly recommended that + DEKs be generated and used on a one-time, per-message, basis. A + transmitted message will incorporate a representation of the DEK + encrypted under an appropriate interchange key (IK) for each of the + named recipients. + + DEK generation can be performed either centrally by key distribution + centers (KDCs) or by endpoint systems. Dedicated KDC systems may be + able to implement stronger algorithms for random DEK generation than + can be supported in endpoint systems. On the other hand, + decentralization allows endpoints to be relatively self-sufficient, + reducing the level of trust which must be placed in components other + than a message's originator and recipient. Moreover, decentralized + DEK generation at endpoints reduces the frequency with which senders + must make real-time queries of (potentially unique) servers in order + to send mail, enhancing communications availability. + + When symmetric cryptography is used, one advantage of centralized + KDC-based generation is that DEKs can be returned to endpoints + already encrypted under the IKs of message recipients rather than + providing the IKs to the senders. This reduces IK exposure and + simplifies endpoint key management requirements. This approach has + less value if asymmetric cryptography is used for key management, + since per-recipient public IK components are assumed to be generally + available and per-sender private IK components need not necessarily + be shared with a KDC. + +5.2 Interchange Keys (IKs) + + Interchange Key (IK) components are used to encrypt DEKs and MICs. + + + +Linn [Page 26] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + In general, IK granularity is at the pairwise per-user level except + for mail sent to address lists comprising multiple users. In order + for two principals to engage in a useful exchange of privacy-enhanced + electronic mail using conventional cryptography, they must first + possess common IK components (when symmetric key management is used) + or complementary IK components (when asymmetric key management is + used). When symmetric cryptography is used, the IK consists of a + single component, used to encrypt both DEKs and MICs. When + asymmetric cryptography is used, a recipient's public component is + used as an IK to encrypt DEKs (a transformation invertible only by a + recipient possessing the corresponding private component), and the + originator's private component is used to encrypt MICs (a + transformation invertible by all recipients, since the originator's + certificate provides the necessary public component of the + originator). + + While this RFC does not prescribe the means by which interchange keys + are provided to appropriate parties, it is useful to note that such + means may be centralized (e.g., via key management servers) or + decentralized (e.g., via pairwise agreement and direct distribution + among users). In any case, any given IK component is associated with + a responsible Issuing Authority (IA). When certificate-based + asymmetric key management, as discussed in RFC-1114, is employed, the + IA function is performed by a Certification Authority (CA). + + When an IA generates and distributes an IK component, associated + control information is provided to direct how it is to be used. In + order to select the appropriate IK(s) to use in message encryption, a + sender must retain a correspondence between IK components and the + recipients with which they are associated. Expiration date + information must also be retained, in order that cached entries may + be invalidated and replaced as appropriate. + + Since a message may be sent with multiple IK components identified, + corresponding to multiple intended recipients, each recipient's UA + must be able to determine that recipient's intended IK component. + Moreover, if no corresponding IK component is available in the + recipient's database when a message arrives, the recipient must be + able to identify the required IK component and identify that IK + component's associated IA. Note that different IKs may be used for + different messages between a pair of communicants. Consider, for + example, one message sent from A to B and another message sent (using + the IK-per-list method) from A to a mailing list of which B is a + member. The first message would use IK components associated + individually with A and B, but the second would use an IK component + shared among list members. + + When a privacy-enhanced message is transmitted, an indication of the + + + +Linn [Page 27] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + IK components used for DEK and MIC encryption must be included. To + this end, the "X-Sender-ID:" and "X-Recipient-ID:" encapsulated + header fields provide the following data: + + 1. Identification of the relevant Issuing Authority (IA subfield) + + 2. Identification of an entity with which a particular IK + component is associated (Entity Identifier or EI subfield) + + 3. Version/Expiration subfield + + The colon character (":") is used to delimit the subfields within an + "X-Sender-ID:" or "X-Recipient-ID:". The IA, EI, and + version/expiration subfields are generated from a restricted + character set, as prescribed by the following BNF (using notation as + defined in RFC-822, sections 2 and 3.3): + + IKsubfld := 1*ia-char + + ia-char := DIGIT / ALPHA / "'" / "+" / "(" / ")" / + "," / "." / "/" / "=" / "?" / "-" / "@" / + "%" / "!" / '"' / "_" / "<" / ">" + An example "X-Recipient-ID:" field is as follows: + + X-Recipient-ID: linn@ccy.bbn.com:ptf-kmc:2 + + This example field indicates that IA "ptf-kmc" has issued an IK + component for use on messages sent to "linn@ccy.bbn.com", and that + the IA has provided the number 2 as a version indicator for that IK + component. + +5.2.1 Subfield Definitions + + The following subsections define the subfields of "X-Sender-ID:" and + "X-Recipient-ID:" fields. + +5.2.1.1 Entity Identifier Subfield + + An entity identifier is constructed as an IKsubfld. More + restrictively, an entity identifier subfield assumes the following + form: + + <user>@<domain-qualified-host> + + In order to support universal interoperability, it is necessary to + assume a universal form for the naming information. For the case of + installations which transform local host names before transmission + into the broader Internet, it is strongly recommended that the host + + + +Linn [Page 28] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + name as presented to the Internet be employed. + +5.2.1.2 Issuing Authority Subfield + + An IA identifier subfield is constructed as an IKsubfld. IA + identifiers must be assigned in a manner which assures uniqueness. + This can be done on a centralized or hierarchic basis. + +5.2.1.3 Version/Expiration Subfield + + A version/expiration subfield is constructed as an IKsubfld. The + version/expiration subfield format may vary among different IAs, but + must satisfy certain functional constraints. An IA's + version/expiration subfields must be sufficient to distinguish among + the set of IK components issued by that IA for a given identified + entity. Use of a monotonically increasing number is sufficient to + distinguish among the IK components provided for an entity by an IA; + use of a timestamp additionally allows an expiration time or date to + be prescribed for an IK component. + +5.2.2 IK Cryptoperiod Issues + + An IK component's cryptoperiod is dictated in part by a tradeoff + between key management overhead and revocation responsiveness. It + would be undesirable to delete an IK component permanently before + receipt of a message encrypted using that IK component, as this would + render the message permanently undecipherable. Access to an expired + IK component would be needed, for example, to process mail received + by a user (or system) which had been inactive for an extended period + of time. In order to enable very old IK components to be deleted, a + message's recipient desiring encrypted local long term storage should + transform the DEK used for message text encryption via re-encryption + under a locally maintained IK, rather than relying on IA maintenance + of old IK components for indefinite periods. + +6. User Naming + +6.1 Current Approach + + Unique naming of electronic mail users, as is needed in order to + select corresponding keys correctly, is an important topic and one + which has received significant study. Our current architecture + associates IK components with user names represented in a universal + form ("user@domain-qualified-host"), relying on the following + properties: + + 1. The universal form must be specifiable by an IA as it + distributes IK components and known to a UA as it processes + + + +Linn [Page 29] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + received IK components and IK component identifiers. If a + UA or IA uses addresses in a local form which is different + from the universal form, it must be able to perform an + unambiguous mapping from the universal form into the local + representation. + + 2. The universal form, when processed by a sender UA, must have + a recognizable correspondence with the form of a recipient + address as specified by a user (perhaps following local + transformation from an alias into a universal form). + + It is difficult to ensure these properties throughout the Internet. + For example, an MTS which transforms address representations between + the local form used within an organization and the universal form as + used for Internet mail transmission may cause property 2 to be + violated. + +6.2 Issues for Consideration + + The use of flat (non-hierarchic) electronic mail user identifiers, + which are unrelated to the hosts on which the users reside, may offer + value. As directory servers become more widespread, it may become + appropriate for would-be senders to search for desired recipients + based on such attributes. Personal characteristics, like social + security numbers, might be considered. Individually-selected + identifiers could be registered with a central authority, but a means + to resolve name conflicts would be necessary. + + A point of particular note is the desire to accommodate multiple + names for a single individual, in order to represent and allow + delegation of various roles in which that individual may act. A + naming mechanism that binds user roles to keys is needed. Bindings + cannot be immutable since roles sometimes change (e.g., the + comptroller of a corporation is fired). + + It may be appropriate to examine the prospect of extending the + DARPA/DoD domain system and its associated name servers to resolve + user names to unique user IDs. An additional issue arises with + regard to mailing list support: name servers do not currently perform + (potentially recursive) expansion of lists into users. ISO and CSNet + are working on user-level directory service mechanisms, which may + also bear consideration. + +7. Example User Interface and Implementation + + In order to place the mechanisms and approaches discussed in this RFC + into context, this section presents an overview of a prototype + implementation. This implementation is a standalone program which is + + + +Linn [Page 30] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + invoked by a user, and lies above the existing UA sublayer. In the + UNIX system, and possibly in other environments as well, such a + program can be invoked as a "filter" within an electronic mail UA or + a text editor, simplifying the sequence of operations which must be + performed by the user. This form of integration offers the advantage + that the program can be used in conjunction with a range of UA + programs, rather than being compatible only with a particular UA. + + When a user wishes to apply privacy enhancements to an outgoing + message, the user prepares the message's text and invokes the + standalone program (interacting with the program in order to provide + address information and other data required to perform privacy + enhancement processing), which in turn generates output suitable for + transmission via the UA. When a user receives a privacy-enhanced + message, the UA delivers the message in encrypted form, suitable for + decryption and associated processing by the standalone program. + + In this prototype implementation (based on symmetric key management), + a cache of IK components is maintained in a local file, with entries + managed manually based on information provided by originators and + recipients. This cache is, effectively, a simple database. IK + components are selected for transmitted messages based on the + sender's identity and on recipient names, and corresponding "X- + Sender-ID:" and "X-Recipient-ID:" fields are placed into the + message's encapsulated header. When a message is received, these + fields are used as a basis for a lookup in the database, yielding the + appropriate IK component entries. DEKs and IVs are generated + dynamically within the program. + + Options and destination addresses are selected by command line + arguments to the standalone program. The function of specifying + destination addresses to the privacy enhancement program is logically + distinct from the function of specifying the corresponding addresses + to the UA for use by the MTS. This separation results from the fact + that, in many cases, the local form of an address as specified to a + UA differs from the Internet global form as used in "X-Sender-ID:" + and "X-Recipient-ID:" fields. + +8. Areas For Further Study + + The procedures defined in this RFC are sufficient to support + implementation of privacy-enhanced electronic mail transmission among + cooperating parties in the Internet. Further effort will be needed, + however, to enhance robustness, generality, and interoperability. In + particular, further work is needed in the following areas: + + 1. User naming techniques, and their relationship to the domain + system, name servers, directory services, and key management + + + +Linn [Page 31] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + functions. + + 2. Detailed standardization of Issuing Authority and directory + service functions and interactions. + + 3. Privacy-enhanced interoperability with X.400 mail. + + We anticipate generation of subsequent RFCs which will address these + topics. + +9. References + + This section identifies background references which may be useful to + those contemplating use of the mechanisms defined in this RFC. + + ISO 7498/Part 2 - Security Architecture, prepared by ISO/TC97/SC + 21/WG 1 Ad hoc group on Security, extends the OSI Basic Reference + Model to cover security aspects which are general architectural + elements of communications protocols, and provides an annex with + tutorial and background information. + + US Federal Information Processing Standards Publication (FIPS + PUB) 46, Data Encryption Standard, 15 January 1977, defines the + encipherment algorithm used for message text encryption and + Message Authentication Code (MAC) computation. + + FIPS PUB 81, DES Modes of Operation, 2 December 1980, defines + specific modes in which the Data Encryption Standard algorithm + may to be used to perform encryption. + + FIPS PUB 113, Computer Data Authentication, May 1985, defines a + specific procedure for use of the Data Encryption Standard + algorithm to compute a MAC. + +NOTES: + + [1] Key generation for MIC computation and message text encryption + may either be performed by the sending host or by a centralized + server. This RFC does not constrain this design alternative. + Section 5.1 identifies possible advantages of a centralized + server approach if symmetric key management is employed. + + [2] American National Standard Data Encryption Algorithm (ANSI + X3.92-1981), American National Standards Institute, Approved 30 + December 1980. + + [3] Federal Information Processing Standards Publication 46, Data + Encryption Standard, 15 January 1977. + + + +Linn [Page 32] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + [4] Information Processing Systems: Data Encipherment: Modes of + Operation of a 64-bit Block Cipher. + + [5] Federal Information Processing Standards Publication 81, DES + Modes of Operation, 2 December 1980. + + [6] ANSI X9.17-1985, American National Standard, Financial + Institution Key Management (Wholesale), American Bankers + Association, April 4, 1985, Section 7.2. + + [7] Postel, J., "Simple Mail Transfer Protocol" RFC-821, + USC/Information Sciences Institute, August 1982. + + [8] This transformation should occur only at an SMTP endpoint, not at + an intervening relay, but may take place at a gateway system + linking the SMTP realm with other environments. + + [9] Use of the SMTP canonicalization procedure at this stage was + selected since it is widely used and implemented in the Internet + community, not because SMTP interoperability with this + intermediate result is required; no privacy-enhanced message will + be passed to SMTP for transmission directly from this step in the + four-phase transformation procedure. + + [10] Crocker, D., "Standard for the Format of ARPA Internet Text + Messages", RFC-822, August 1982. + + [11] Rose, M. and E. Stefferud, "Proposed Standard for Message + Encapsulation", RFC-934, January 1985. + + [12] CCITT Recommendation X.411 (1988), "Message Handling Systems: + Message Transfer System: Abstract Service Definition and + Procedures". + + [13] CCITT Recommendation X.509 (1988), "The Directory - + Authentication Framework". + + [14] Kille, S., "Mapping between X.400 and RFC-822", RFC-987, June + 1986. + + [15] Federal Information Processing Standards Publication 113, + Computer Data Authentication, May 1985. + + [16] American National Standard for Information Systems - Data + Encryption Algorithm - Modes of Operation (ANSI X3.106-1983), + American National Standards Institute - Approved 16 May 1983. + + [17] Voydock, V. and S. Kent, "Security Mechanisms in High-Level + + + +Linn [Page 33] + +RFC 1113 Mail Privacy: Procedures August 1989 + + + Network Protocols", ACM Computing Surveys, Vol. 15, No. 2, Pages + 135-171, June 1983. + +Author's Address + + John Linn + Secure Systems + Digital Equipment Corporation + 85 Swanson Road, BXB1-2/D04 + Boxborough, MA 01719-1326 + + Phone: 508-264-5491 + + EMail: Linn@ultra.enet.dec.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Linn [Page 34] +
\ No newline at end of file |