diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3854.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3854.txt')
-rw-r--r-- | doc/rfc/rfc3854.txt | 843 |
1 files changed, 843 insertions, 0 deletions
diff --git a/doc/rfc/rfc3854.txt b/doc/rfc/rfc3854.txt new file mode 100644 index 0000000..c56db8d --- /dev/null +++ b/doc/rfc/rfc3854.txt @@ -0,0 +1,843 @@ + + + + + + +Network Working Group P. Hoffman +Request for Comments: 3854 IMC +Category: Standards Track C. Bonatti + IECA + A. Eggen + FFI + July 2004 + + + Securing X.400 Content with Secure/Multipurpose Internet Mail + Extensions (S/MIME) + +Status of this Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2004). + +Abstract + + This document describes a protocol for adding cryptographic signature + and encryption services to X.400 content with Secure/Multipurpose + Internet Mail Extensions (S/MIME). + +1. Introduction + + The techniques described in the Cryptographic Message Syntax [CMS] + specification are general enough to support many different content + types. The [CMS] specification thus provides many options for + providing different security mechanisms. In order to ensure + interoperability of systems within the X.400 community, it is + necessary to specify the use of CMS features to protect X.400 content + (called "CMS-X.400" in this document). + +1.1. Specification Overview + + This document is intended to be similar to the S/MIME Version 3.1 + Message Specification [MSG] except that it is tailored to the + requirements of X.400 content rather than Multipurpose Internet Mail + Extensions (MIME). + + + + + +Hoffman, et al. Standards Track [Page 1] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + This document defines how to create an X.400 content type that has + been cryptographically enhanced according to [CMS]. In order to + create S/MIME messages carrying X.400 content, an S/MIME agent has to + follow specifications in this document, as well as the specifications + listed in [CMS]. This memo also defines new parameter values for the + application/pkcs7-mime MIME type that can be used to transport those + body parts. + + Throughout this document, there are requirements and recommendations + made for how receiving agents handle incoming messages. There are + separate requirements and recommendations for how sending agents + create outgoing messages. In general, the best strategy is to "be + liberal in what you receive and conservative in what you send". Most + of the requirements are placed on the handling of incoming messages + while the recommendations are mostly on the creation of outgoing + messages. + + This document does not address transport of CMS-X.400 content. It is + assumed that CMS-X.400 content would be transported by Internet mail + systems, X.400, or other suitable transport. + + This document describes applying security services to the content of + entire X.400 messages, which may or may not be IPMS messages. These + objects can be carried by several means, including SMTP-based mail + and X.400 mail. Note that cooperating S/MIME agents must support + common forms of message content in order to achieve interoperability. + + If the CMS objects are sent as parts of an RFC 822 message, a + standard MIXER gateway [MIXER] will most likely choose to encapsulate + the message. This is not likely to be a format that is usable by an + X.400 recipient. MIXER is specifically focused on translation + between X.420 Interpersonal Messages and non-secure RFC822/MIME + messages. The discussion of security-related body parts in sections + 7.3 and 7.4 of [BODYMAP] is relevant to CMS messages. + + Definition of gateway services to support relay of CMS object between + X.400 and SMTP environments is beyond the scope of this document. + +1.2. Terminology + + The key words "MUST", "SHALL", "REQUIRED", "SHOULD", "RECOMMENDED", + and "MAY" in this document are to be interpreted as described in BCP + 14, RFC 2119 [MUSTSHOULD]. + + + + + + + + +Hoffman, et al. Standards Track [Page 2] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + +1.3. Definitions + + For the purposes of this document, the following definitions apply. + + ASN.1: Abstract Syntax Notation One, as defined in + ISO/IEC 8824. + + BER: Basic Encoding Rules for ASN.1, as defined in + ISO/IEC 8825-1. + + Certificate: A type that binds an entity's distinguished name + to a public key with a digital signature. + + DER: Distinguished Encoding Rules for ASN.1, as defined + in ISO/IEC 8825-1. + + 7-bit data: Text data with lines less than 998 characters + long, where none of the characters have the 8th + bit set, and there are no NULL characters. <CR> + and <LF> occur only as part of a <CR><LF> end of + line delimiter. + + 8-bit data: Text data with lines less than 998 characters, and + where none of the characters are NULL characters. + <CR> and <LF> occur only as part of a <CR><LF> end + of line delimiter. + + Binary data: Arbitrary data. + + Transfer Encoding: A reversible transformation made on data so 8-bit + or binary data may be sent via a channel that only + transmits 7-bit data. + + Receiving agent: Software that interprets and processes S/MIME CMS + objects. + + Sending agent: Software that creates S/MIME CMS objects. + + S/MIME agent: User software that is a receiving agent, a sending + agent, or both. + +1.4. Compatibility with Prior Practice of S/MIME + + There are believed to be no existing X.400 implementations that + support S/MIME version 2. Further, signed interoperability between + X.400 and MIME systems that support S/MIME version 2 is not believed + + + + + +Hoffman, et al. Standards Track [Page 3] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + to be easily achievable. Therefore backward compatibility with + S/MIME version 2 is not considered to be a requirement for this + document. + + It is a goal of this document to, if possible, maintain backward + compatibility with existing X.400 implementations that employ S/MIME + v3.1 wrappers. + +2. CMS Options + + CMS allows for a wide variety of options in content and algorithm + support. This section puts forth a number of support requirements + and recommendations in order to achieve a base level of + interoperability among all CMS-X.400 implementations. [CMS] provides + additional details regarding the use of the cryptographic algorithms. + +2.1. DigestAlgorithmIdentifier + + Sending and receiving agents MUST support SHA-1 [CMSALG]. + +2.2. SignatureAlgorithmIdentifier + + Receiving agents MUST support id-dsa-with-sha1 defined in [CMSALG]. + The algorithm parameters MUST be absent (not encoded as NULL). + Receiving agents MUST support rsaEncryption, defined in [CMSALG]. + + Sending agents MUST support either id-dsa-with-sha1 or rsaEncryption. + +2.3. KeyEncryptionAlgorithmIdentifier + + Sending and receiving agents MUST support rsaEncryption, defined in + [CMSALG]. + + Sending and receiving agents SHOULD support Diffie-Hellman defined in + [CMSALG]. + +2.4. General Syntax + + The general syntax of CMS objects consist of an instance of the + ContentInfo structure containing one of several defined CMS content + types. CMS defines multiple content types. Of these, only the + SignedData and EnvelopedData content types are used for CMS-X.400. + +2.4.1. SignedData Content Type + + Sending agents MUST use the signedData content type to apply a + digital signature to a message or, in a degenerate case where there + is no signature information, to convey certificates. + + + +Hoffman, et al. Standards Track [Page 4] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + +2.4.2. EnvelopedData Content Type + + Senders MUST use the envelopedData content type to apply privacy + protection to a message. A sender needs to have access to a public + key for each intended message recipient to use this service. This + content type does not provide authentication. + +2.5. Attribute SignerInfo Type + + The SignerInfo type allows the inclusion of unsigned and signed + attributes to be included along with a signature. + + Receiving agents MUST be able to handle zero or one instance of each + of the signed attributes listed here. Sending agents SHOULD generate + one instance of each of the following signed attributes in each CMS- + X400 message: + + - signingTime + - sMIMECapabilities + - sMIMEEncryptionKeyPreference + + Requirements for processing of these attributes MUST be in accordance + with the S/MIME Message Specification [MSG]. Handling of the + signingTime attribute MUST comply with clause 2.5.1 of [MSG]. + Handling of the sMIMECapabilities attribute MUST comply with clause + 2.5.2 of [MSG]. Handling of the sMIMEEncryptionKeyPreference + attribute MUST comply with clause 2.5.3 of [MSG]. + + Further, receiving agents SHOULD be able to handle zero or one + instance in the signed attributes of the signingCertificate attribute + [ESS]. + + Sending agents SHOULD generate one instance of the signingCertificate + signed attribute in each CMS-X400 message. + + Additional attributes and values for these attributes may be defined + in the future. Receiving agents SHOULD handle attributes or values + that they do not recognize in a graceful manner. + + Sending agents that include signed attributes that are not listed + here SHOULD display those attributes to the user, so that the user is + aware of all of the data being signed. + + + + + + + + + +Hoffman, et al. Standards Track [Page 5] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + +2.6. ContentEncryptionAlgorithmIdentifier + + Sending and receiving agents MUST support encryption and decryption + with DES EDE3 CBC, hereinafter called "tripleDES" [CMSALG]. Sending + and receiving agents SHOULD support encryption and decryption with + AES [CMSAES] at a key size of 128, 192 and 256 bits. + +3. Creating S/MIME Messages + + This section describes the S/MIME message formats and how they can be + used to secure X.400 contents. The S/MIME messages are a combination + of X.400 contents and CMS objects (i.e., a ContentInfo structure + containing one of the CMS-defined content types). The X.400 content + and other data, such as certificates and algorithm identifiers, are + given to CMS processing facilities which produces a CMS object. This + document also describes how nested, secured S/MIME messages should be + formatted when encapsulating an X.400 content, and provides an + example of how a triple-wrapped S/MIME message over X.400 content + should be created if backwards compatibility with S/MIME version 2 is + of no concern. + + S/MIME provides one format for enveloped-only data, several formats + for signed-only data, and several formats for signed and enveloped + data. The different formats are required to accommodate several + environments, in particular for signed messages. Only one of these + signed formats is applicable to X.400. + + Note that canonicalization is not required for X.400 content because + it is a binary rather than text encoding, and only the "embedded" + content version is used. These dramatically simplify the description + of S/MIME productions. + + The reader of this section is expected to understand X.400 as + described in [X.400] and S/MIME as described in [CMS] and [ESS]. + +3.1. The X.400 Message Structure + + This section reviews the X.400 message format. An X.400 message has + two parts, the envelope and the content, as described in X.402 + [X.400]: + + Envelope -- An information object whose composition varies from one + transmittal step to another and that variously identifies the + message's originator and potential recipients, documents its previous + conveyance and directs its subsequent conveyance by the Message + Transfer System (MTS), and characterizes its content. + + + + + +Hoffman, et al. Standards Track [Page 6] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + Content -- The content is the piece of information that the + originating User Agent wants to be delivered to one or more + recipients. The MTS neither examines nor modifies the content, + except for conversion, during its conveyance of the message. MTS + conversion is not applicable to the scenario of this document because + such conversion is incompatible with CMS protection mechanisms. + + One piece of information borne by the envelope identifies the type of + the content. The content type is an identifier (an ASN.1 OID or + Integer) that denotes the syntax and semantics of the content + overall. This identifier enables the MTS to determine the message's + deliverability to particular users, and enables User Agents and + Message Stores to interpret and process the content. + + Another piece of information borne by the envelope identifies the + types of encoded information represented in the content. An encoded + information type (EIT) is an identifier (an ASN.1 Object Identifier + or Integer) that denotes the medium and format (e.g., IA5 text or + Group 3 facsimile) of individual portions of the content. It further + enables the MTS to determine the message's deliverability to + particular users, and to identify opportunities for it to make the + message deliverable by converting a portion of the content from one + EIT to another. + + This document describes how S/MIME CMS is used to secure the content + part of X.400 messages. + +3.2. Creating a Signed-only Message with X.400 Content + + The SignedData format as described in the Cryptographic Message + Syntax [CMS] MUST be used for signing of X.400 contents. + + The X.400 content to be protected MUST be placed in the SignedData + encapContentInfo eContent field. Note that this X.400 content SHOULD + maintain the encoding defined by the content type, but SHOULD NOT be + MIME wrapped. The object identifier for the content type of the + protected X.400 content MUST be placed in the SignedData + encapContentInfo eContentType field. + + The signedData object is encapsulated by a ContentInfo SEQUENCE with + a contentType of id-signedData. + + Note that if SMTP [SMTP] is used to transport the resulting signed- + only message then the optional MIME encoding SHOULD be used. If + binary transports such as X.400 are used then the optional MIME + encoding SHOULD NOT be used. + + + + + +Hoffman, et al. Standards Track [Page 7] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + There are many reasons for this requirement. An outer MIME wrapper + should not be used in X.400. Further, there are places where X.400 + systems will interact with SMTP/MIME systems where the outer MIME + wrapper might be necessary. Because this wrapping is outside the + security wrappers, any gateway system that might bridge the gap + between the two systems will be smart enough to apply or remove the + outer MIME wrapper as appropriate. + +3.2.1. MIME Wrapping to Dynamically Support 7-bit Transport + + The signedData object MAY optionally be wrapped in MIME. This allows + the system to support 7-bit transport when required. This outer MIME + wrapper MAY be dynamically added or removed throughout the delivery + path since it is outside the signature and encryption wrappers. In + this case the application/pkcs7-mime type as defined in S/MIME + Version 3.1 Message Specification [MSG] SHOULD be used with the + following parameters: + + Content-Type: application/pkcs7-mime; smime-type=signed-x400 + Content-Transfer-Encoding: base64 + + If the application/pkcs7-mime MIME type is used to support 7-bit + transport, the steps to create this format are: + + Step 1. The X.400 content to be signed is ASN.1 encoded. + + Step 2. The ASN.1 encoded X.400 content and other required data is + processed into a CMS object of type SignedData. The SignedData + structure is encapsulated by a ContentInfo SEQUENCE with a + contentType of id-signedData. + + Step 3. The CMS object is inserted into an application/pkcs7-mime + MIME entity. + + The smime-type parameter for messages using application/pkcs7-mime + with SignedData is "signed-x400" as defined in [TRANSPORT]. + +3.3. Creating an Enveloped-only Message with X.400 Content + + This section describes the format for enveloping an X.400 content + without signing it. It is important to note that sending enveloped + but not signed messages does not provide for data integrity. It is + possible to replace ciphertext in such a way that the processed + message will still be valid, but the meaning is altered. + + The EnvelopedData format as described in [CMS] is used for + confidentiality of the X.400 contents. + + + + +Hoffman, et al. Standards Track [Page 8] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + The X.400 content to be protected MUST be placed in the EnvelopedData + encryptedContentInfo encryptedContent field. Note that this X.400 + content SHOULD maintain the encoding defined by the content type, but + SHOULD NOT be MIME wrapped. The object identifier for content type + of the protected X.400 content MUST be placed in the EnvelopedData + encryptedContentInfo contentType field. + + The envelopedData object is encapsulated by a ContentInfo SEQUENCE + with a contentType of id-envelopedData. + + Note that if SMTP is used to transport the resulting enveloped-only + message then the optional MIME encoding SHOULD be used. If other + transport (e.g., X.400) that is optimized for binary content is used + then the optional MIME encoding SHOULD NOT be used. + +3.3.1. MIME Wrapping to Dynamically Support 7-bits Transport + + The envelopedData object MAY optionally be wrapped in MIME. This + allows the system to support 7-bit transport when required. This + outer MIME wrapper MAY be dynamically added or removed throughout the + delivery path since it is outside the signature and encryption + wrappers. In this case, the application/pkcs7-mime type as defined + in S/MIME Version 3.1 Message Specification [MSG] SHOULD be used with + the following parameters: + + Content-Type: application/pkcs7-mime; smime-type=enveloped-x400 + Content-Transfer-Encoding: base64 + + If the application/pkcs7-mime MIME type is used to support 7-bit + transport, the steps to create this format are: + + Step 1. The X.400 content to be enveloped is ASN.1 encoded. + + Step 2. The ASN.1 encoded X.400 content and other required data is + processed into a CMS object of type EnvelopedData. In addition to + encrypting a copy of the content-encryption key for each recipient, a + copy of the content encryption key SHOULD be encrypted for the + originator and included in the EnvelopedData (see [CMS] Section 6). + The EnvelopedData structure is encapsulated by a ContentInfo SEQUENCE + with a contentType of id-envelopedData. + + Step 3. The CMS object is inserted into an application/pkcs7-mime + MIME entity to allow for 7-bit transport. + + If the application/pkcs7-mime MIME entity is used, the smime-type + parameter for enveloped-only messages is "enveloped-x400" as defined + in [TRANSPORT]. + + + + +Hoffman, et al. Standards Track [Page 9] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + +3.4. Nested CMS Structures + + To achieve signing and enveloping, any of the signed-only and + encrypted-only CMS objects may be nested. + + When nesting is used, backwards compatibility with S/MIME version 2 + requires that each layer of the nested message are identified with + the OID id-data, and when id-data is used a MIME wrapper is required. + This can potentially lead to an enormous amount of overhead and + should be avoided. Because S/MIME version 2 compatibility is of no + concern, implementations SHOULD directly encode the encapsulated + object as the eContent of the current structure. + + MIME wrapping to support 7-bit transport is optional and need only be + used around the outermost CMS structure. In this case, the + application/pkcs7 content type MUST be used. + + An S/MIME implementation MUST be able to receive and process + arbitrarily nested CMS structures within reasonable resource limits + of the recipient computer. + +3.4.1. Creating a Triple Wrapped Message With an X.400 Content + + The Enhanced Security Services for S/MIME [ESS] document provides + examples of how nested, secured S/MIME messages are formatted. ESS + provides an example of how a triple-wrapped S/MIME message is + formatted using application/pkcs7-mime for the signatures. + + This section explains how an X.400 content may be conveyed within a + Triple Wrapped Message because S/MIME version 2 compatibility is of + no concern: + + Step 1. Start with the X.400 content (called the "original + content"). The X.400 content MUST be ASN.1 encoded, but SHOULD NOT + be MIME wrapped. + + Step 2. Place the ASN.1 encoded X.400 content to be protected in the + SignedData encapContentInfo eContent field. Add any attributes that + are to be signed. + + Step 3. Sign the result of step 2 (the original content). The + SignedData encapContentInfo eContentType MUST contain the object + identifier of the X.400 content. + + Step 4. Encrypt the result of step 3 as a single block. The + EnvelopedData encryptedContentInfo contentType MUST be set to id- + signedData. This is called the "encrypted body". + + + + +Hoffman, et al. Standards Track [Page 10] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + Step 5. Using the same logic as in step 2 and 3 above, sign the + result of step 4 (the encrypted body) as a single block. The + SignedData encapContentInfo eContentType MUST be set to id- + envelopedData. The outer SignedData structure is encapsulated by a + ContentInfo SEQUENCE with a contentType of id-signedData. + + Step 6. The resulting message is called the "outer signature", and + is also the triple wrapped message. + + MIME wrapping to support 7-bit transport is optional and MUST only be + used around the outermost CMS structure. In this case, the + application/pkcs7-mime content type MUST be used. The smime-type in + the case of adding a MIME wrapper MUST be consistent with that + appropriate to the innermost protection layer. + + In some instances, an smime-type will be created that only reflects + one security service (such as certs-only, which applies only to + signed-only messages). However, as new layers are wrapped, this + smime-type SHOULD be propagated upwards. Thus if a certs-only + message were to be encrypted, or wrapped in a new SignedData + structure, the smime-type of certs-only should be propagated up to + the next MIME wrapper. In other words, the innermost type is + reflected outwards. + +3.5. Carrying Plaintext X.400 Content in SMTP + + While the objectives of this document focus on protecting X.400 + content with CMS wrappers, it is a reality that users do not + generally send all message using security. It therefore stands to + reason that a means to carry non-secured X.400 content over the + chosen transport system must be seamlessly provided. While + transporting X.400 content in an X.400 system is trivial, carrying + X.400 content in SMTP requires additional definition. + + Content-Type: application/x400-content; content-type = 1*DIGIT *( "." + 1*DIGIT) + + where the content-type parameter value is either a single integer + (for a built-in content-type) or an OID in dotted notation (for an + extended content-type). + + + + + + + + + + + +Hoffman, et al. Standards Track [Page 11] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + +4. Use of Certificates + +4.1. Certificate Enrollment + + S/MIME v3.1 does not specify how to get a certificate from a + certificate authority, but instead mandates that every sending agent + already has a certificate. The PKIX Working Group has, at the time + of this writing, produced two separate standards for certificate + enrollment: CMP (RFC 2510) and CMC (RFC 2792). + +4.2. Certificate Processing + + A receiving agent MUST provide some certificate retrieval mechanism + in order to gain access to certificates for recipients of digital + envelopes. This document does not cover how S/MIME agents handle + certificates, only what they do after a certificate has been + validated or rejected. S/MIME certification issues are covered in + [CERT31]. + + At a minimum, for initial S/MIME deployment, a user agent could + automatically generate a message to an intended recipient requesting + that recipient's certificate in a signed return message. Receiving + and sending agents SHOULD also provide a mechanism to allow a user to + "store and protect" certificates for correspondents in such a way so + as to guarantee their later retrieval. + +4.3. Certificate Name Use for X.400 Content + + End-entity certificates used in the context of this document MAY + contain an X.400 address as described in [X.400]. The address must + be in the form of an "ORAddress". The X.400 address SHOULD be in the + subjectAltName extension, and SHOULD NOT be in the subject + distinguished name. + + Sending agents SHOULD make the originator address in the X.400 + content (e.g., the "originator" field in P22) match an X.400 address + in the signer's certificate. + + Receiving agents MUST recognize X.400 addresses in the subjectAltName + field. + + Receiving agents SHOULD check that the originator address in the + X.400 content matches an X.400 address in the signer's certificate, + if X.400 addresses are present in the certificate and an originator + address is available in the content. A receiving agent SHOULD + provide some explicit alternate processing of the message if this + + + + + +Hoffman, et al. Standards Track [Page 12] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + comparison fails, which may be to display a message that shows the + recipient the addresses in the certificate or other certificate + details. + + The subject alternative name extension is used in S/MIME as the + preferred means to convey the X.400 address(es) that correspond to + the entity for this certificate. Any X.400 addresses present MUST be + encoded using the x400Address CHOICE of the GeneralName type. Since + the SubjectAltName type is a SEQUENCE OF GeneralName, multiple X.400 + addresses MAY be present. + +5. Security Considerations + + This specification introduces no new security concerns to the CMS or + S/MIME models. Security issues are identified in section 5 of [MSG], + section 6 of [ESS] and the Security Considerations section of [CMS]. + +6. References + +6.1. Normative References + + [CERT31] Ramsdell, B., Ed., "Secure/Multipurpose Internet Mail + Extensions (S/MIME) Version 3.1 Certificate Handling", + RFC 3850, July 2004. + + [CMS] Housley, R., "Cryptographic Message Syntax (CMS)", RFC + 3852, July 2004. + + [CMSAES] Schaad, J., "Use of the AES Encryption Algorithm in + CMS", RFC 3565, July 2003. + + [CMSALG] Housley, R., "Cryptographic Message Syntax (CMS) + Algorithms", RFC 3370, August 2002. + + [ESS] Hoffman, P., Editor "Enhanced Security Services for + S/MIME", RFC 2634, June 1999. + + [MSG] Ramsdell, B., Ed., "Secure/Multipurpose Internet Mail + Extensions (S/MIME) Version 3.1 Message Specification", + RFC 3851, July 2004. + + [MUSTSHOULD] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [TRANSPORT] Hoffman, P. and C. Bonatti, "Transporting + Secure/Multipurpose Internet Mail Extensions (S/MIME) + Objects in X.400", RFC 3855, July 2004. + + + + +Hoffman, et al. Standards Track [Page 13] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + + [X.400] ITU-T X.400 Series of Recommendations, Information + technology - Message Handling Systems (MHS). X.400: + System and Service Overview; X.402: Overall + Architecture; X.411: Message Transfer System: Abstract + Service Definition and Procedures; X.420: Interpersonal + Messaging System; 1996. + +6.2. Informative References + + [BODYMAP] Alvestrand, H., Ed., "Mapping between X.400 and RFC- + 822/MIME Message Bodies", RFC 2157, January 1998. + + [MIXER] Kille, S., Ed., "MIXER (Mime Internet X.400 Enhanced + Relay): Mapping between X.400 and RFC 822/MIME", RFC + 2156, January 1998. + + [SMTP] Klensin, J., "Simple Mail Transfer Protocol", RFC 2821, + April, 2001. + +7. Editors' Addresses + + Paul Hoffman + Internet Mail Consortium + 127 Segre Place + Santa Cruz, CA 95060 USA + + EMail: phoffman@imc.org + + + Chris Bonatti + IECA, Inc. + 15309 Turkey Foot Road + Darnestown, MD 20878-3640 USA + + EMail: bonattic@ieca.com + + + Anders Eggen + Forsvarets Forskningsinstitutt + Postboks 25 + 2027 Kjeller, Norway + + EMail: anders.eggen@ffi.no + + + + + + + + +Hoffman, et al. Standards Track [Page 14] + +RFC 3854 Securing X.400 with S/MIME July 2004 + + +8. Full Copyright Statement + + Copyright (C) The Internet Society (2004). This document is subject + to the rights, licenses and restrictions contained in BCP 78, and + except as set forth therein, the authors retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET + ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, + INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE + INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at ietf- + ipr@ietf.org. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + +Hoffman, et al. Standards Track [Page 15] + |