diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5917.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5917.txt')
-rw-r--r-- | doc/rfc/rfc5917.txt | 395 |
1 files changed, 395 insertions, 0 deletions
diff --git a/doc/rfc/rfc5917.txt b/doc/rfc/rfc5917.txt new file mode 100644 index 0000000..2154e0f --- /dev/null +++ b/doc/rfc/rfc5917.txt @@ -0,0 +1,395 @@ + + + + + + +Internet Engineering Task Force (IETF) S. Turner +Request for Comments: 5917 IECA +Category: Informational June 2010 +ISSN: 2070-1721 + + + Clearance Sponsor Attribute + +Abstract + + This document defines the clearance sponsor attribute. It indicates + the entity that sponsored (i.e., granted) the clearance. This + attribute is intended for use in public key certificates and + attribute certificates that also include the clearance attribute. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are a candidate for any level of Internet + Standard; see Section 2 of RFC 5741. + + Information about the current status of this document, any + errata, and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc5917. + +Copyright Notice + + Copyright (c) 2010 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + + +Turner Informational [Page 1] + +RFC 5917 Clearance Sponsor Attribute June 2010 + + +1. Introduction + + This document specifies the clearance sponsor attribute. It is + included in public key certificates [RFC5280] and attribute + certificates [RFC5755]. This attribute is only meaningful as a + companion of the clearance attribute [RFC5755] [RFC5912]. The + clearance sponsor is the entity (e.g., agency, department, or + organization) that granted the clearance to the subject named in the + certificate. For example, the clearance sponsor for a subject + asserting the Amoco clearance values [RFC3114] could be + "Engineering". + + This attribute may be used in automated authorization decisions. For + example, a web server deciding whether to allow a user access could + check that the clearance sponsor present in the user's certificate is + on an "approved" list. This check is performed in addition to + certification path validation [RFC5280]. The mechanism for managing + the "approved" list is beyond the scope of this document. + + NOTE: This document does not provide an equivalent Lightweight + Directory Access Protocol (LDAP) schema specification as this + attribute is initially targeted at public key certificates [RFC5280] + and attribute certificates [RFC5755]. Definition of an equivalent + LDAP schema is left to a future specification. + +1.1. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +1.2. ASN.1 Syntax Notation + + The attribute is defined using ASN.1 [X.680], [X.681], [X.682], and + [X.683]. + +2. Clearance Sponsor + + The clearance sponsor attribute, which is only meaningful if the + clearance attribute [RFC5755] [RFC5912] is also present, indicates + the sponsor of the clearance of the subject with which this attribute + is associated. The clearance sponsor attribute is a DirectoryString + [RFC5280], which MUST use the UTF8String CHOICE, with a minimum size + of 1 character and a maximum of 64 characters. + + + + + + + +Turner Informational [Page 2] + +RFC 5917 Clearance Sponsor Attribute June 2010 + + + The following object identifier identifies the sponsor attribute: + + id-clearanceSponsor OBJECT IDENTIFIER ::= { + joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) + dod(2) infosec(1) attributes(5) 68 + } + + The ASN.1 syntax for the clearance sponsor attribute is as follows: + + at-clearanceSponsor ATTRIBUTE ::= { + TYPE DirectoryString { ub-clearance-sponsor } + ( WITH COMPONENTS { utf8String PRESENT } ) + EQUALITY MATCHING RULE caseIgnoreMatch + IDENTIFIED BY id-clearanceSponsor + } + + ub-clearance-sponsor INTEGER ::= 64 + + There MUST only be one value of clearanceSponsor associated with a + particular certificate. Distinct sponsors MUST be represented in + separate certificates. + + When an environment uses the Clearance Sponsor attribute, it is + important that the same representation of the sponsor be used + throughout the environment (e.g., using the same acronym). Further, + the value in this attribute is not meant to be globally unique. When + included in certificates, it is unique within the scope of the + issuer. + +3. Security Considerations + + If this attribute is used as part of an authorization process, the + procedures employed by the entity that assigns each clearance sponsor + value must ensure that the correct value is applied. Including this + attribute in a public key certificate or attribute certificate + ensures that the value for the clearance sponsor is integrity + protected. + + The certificate issuer and clearance sponsor are not necessarily the + same entity. If they are separate entities, then the mechanism used + by the clearance sponsor to convey to the certificate issuer that the + clearance sponsor did in fact grant the clearance to the subject + needs to be protected from unauthorized modification. + + If two entities are verifying each other's certificates, they do not + share the same issuer, and they use the same clearance sponsor value + (e.g., a United Kingdom PKI includes "MoD" and a New Zealand PKI also + includes "MoD"), then the relying party has two choices: 1) accept + + + +Turner Informational [Page 3] + +RFC 5917 Clearance Sponsor Attribute June 2010 + + + the two strings as equivalent, or 2) indicate the sponsor as well as + the trust anchor. To solve this problem, a mechanism, which is + outside the scope of this specification, could be developed to allow + a relying party to group together issuers that share a same context + within which sponsor names have a unique significance. + + While values of DirectoryString can include the NUL (U+0000) code + point, values used to represent clearance sponsors typically would + not. Implementations of the caseIgnoreMatch rule must, per X.501, + consider all of the assertion value and attribute value in matching + and hence protect against truncation attacks. + +4. References + +4.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., + Housley, R., and W. Polk, "Internet X.509 Public Key + Infrastructure Certificate and Certificate Revocation List + (CRL) Profile", RFC 5280, May 2008. + + [RFC5755] Farrell, S., Housley, R., and S. Turner, "An Internet + Attribute Certificate Profile for Authorization", RFC + 5755, January 2010. + + [RFC5912] Schaad, J. and P. Hoffman, "New ASN.1 Modules for the + Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, + June 2010. + + [X.520] ITU-T Recommendation X.520 (2002) | ISO/IEC 9594-6:2002, + Information technology - The Directory:Selected Attribute + Types. + + [X.680] ITU-T Recommendation X.680 (2002) | ISO/IEC 8824-1:2002, + Information technology - Abstract Syntax Notation One + (ASN.1): Specification of basic notation. + + [X.681] ITU-T Recommendation X.681 (2002) | ISO/IEC 8824-2:2002, + Information Technology - Abstract Syntax Notation One: + Information Object Specification. + + [X.682] ITU-T Recommendation X.682 (2002) | ISO/IEC 8824-3:2002, + Information Technology - Abstract Syntax Notation One: + Constraint Specification. + + + + +Turner Informational [Page 4] + +RFC 5917 Clearance Sponsor Attribute June 2010 + + + [X.683] ITU-T Recommendation X.683 (2002) | ISO/IEC 8824-4:2002, + Information Technology - Abstract Syntax Notation One: + Parameterization of ASN.1 Specifications. + +4.2. Informative References + + [RFC3114] Nicolls, W., "Implementing Company Classification Policy + with the S/MIME Security Label", RFC 3114, May 2002. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Turner Informational [Page 5] + +RFC 5917 Clearance Sponsor Attribute June 2010 + + +Appendix A. ASN.1 Module + + This appendix provides the normative ASN.1 [X.680] definitions for + the structures described in this specification using ASN.1 as defined + in [X.680], [X.681], [X.682], and [X.683]. + + ClearanceSponsorAttribute-2008 + { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) + dod(2) infosec(1) modules(0) + id-clearanceSponsorAttribute-2008(35) } + + DEFINITIONS IMPLICIT TAGS ::= + + BEGIN + + -- EXPORTS ALL -- + + IMPORTS + + -- Imports from New PKIX ASN.1 [RFC5912] + + DirectoryString + PKIX1Explicit-2009 + { iso(1) identified-organization(3) dod(6) internet(1) + security(5) mechanisms(5) pkix(7) id-mod(0) + id-pkix1-explicit-02(51) } + + -- Imports from New PKIX ASN.1 [RFC5912] + + ATTRIBUTE + FROM PKIX-CommonTypes-2009 + { iso(1) identified-organization(3) dod(6) internet(1) + security(5) mechanisms(5) pkix(7) id-mod(0) + id-mod-pkixCommon-02(57) } + + -- Imports from ITU-T X.520 [X.520] + + caseIgnoreMatch + FROM SelectedAttributeTypes + { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 } + + ; + + -- sponsor attribute OID and syntax + + id-clearanceSponsor OBJECT IDENTIFIER ::= { + joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) + dod(2) infosec(1) attributes(5) 68 + + + +Turner Informational [Page 6] + +RFC 5917 Clearance Sponsor Attribute June 2010 + + + } + + at-clearanceSponsor ATTRIBUTE ::= { + TYPE DirectoryString { ub-clearance-sponsor } + ( WITH COMPONENTS { utf8String PRESENT } ) + EQUALITY MATCHING RULE caseIgnoreMatch + IDENTIFIED BY id-clearanceSponsor + } + + ub-clearance-sponsor INTEGER ::= 64 + + END + +Author's Address + + Sean Turner + IECA, Inc. + 3057 Nutley Street, Suite 106 + Fairfax, VA 22031 + USA + + EMail: turners@ieca.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Turner Informational [Page 7] + |