diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc8358.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc8358.txt')
-rw-r--r-- | doc/rfc/rfc8358.txt | 507 |
1 files changed, 507 insertions, 0 deletions
diff --git a/doc/rfc/rfc8358.txt b/doc/rfc/rfc8358.txt new file mode 100644 index 0000000..6e6a95b --- /dev/null +++ b/doc/rfc/rfc8358.txt @@ -0,0 +1,507 @@ + + + + + + +Internet Engineering Task Force (IETF) R. Housley +Request for Comments: 8358 Vigil Security +Updates: 5485 March 2018 +Category: Informational +ISSN: 2070-1721 + + + Update to Digital Signatures on Internet-Draft Documents + +Abstract + + RFC 5485 specifies the conventions for digital signatures on + Internet-Drafts. The Cryptographic Message Syntax (CMS) is used to + create a detached signature, which is stored in a separate companion + file so that no existing utilities are impacted by the addition of + the digital signature. + + The RFC Editor recently published the first RFC that includes non- + ASCII characters in a text file. The conventions specified in RFC + 7997 were followed. We assume that non-ASCII characters will soon + start appearing in Internet-Drafts as well. This document updates + the handling of digital signatures on Internet-Drafts that contain + non-ASCII characters in a text file. + + This document updates RFC 5485. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8358. + + + + + + + + + + +Housley Informational [Page 1] + +RFC 8358 Update to Digital Signatures March 2018 + + +Copyright Notice + + Copyright (c) 2018 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 + 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 + 1.2. ASN.1 . . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 2. Detached Signature Files . . . . . . . . . . . . . . . . . . 4 + 3. Additional Content Types . . . . . . . . . . . . . . . . . . 4 + 4. Need for Canonicalization . . . . . . . . . . . . . . . . . . 5 + 4.1. ASCII, UTF-8, and HTML File Canonicalization . . . . . . 6 + 4.2. XML File Canonicalization . . . . . . . . . . . . . . . . 6 + 4.3. No Canonicalization of Other File Formats . . . . . . . . 7 + 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 + 6. Security Considerations . . . . . . . . . . . . . . . . . . . 7 + 7. Deployment and Operational Considerations . . . . . . . . . . 7 + 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 + 8.1. Normative References . . . . . . . . . . . . . . . . . . 7 + 8.2. Informative References . . . . . . . . . . . . . . . . . 9 + Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 9 + Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 9 + + + + + + + + + + + + + + + + + +Housley Informational [Page 2] + +RFC 8358 Update to Digital Signatures March 2018 + + +1. Introduction + + RFC 5485 [IDSIG] specifies the conventions for digital signatures on + Internet-Drafts. The Cryptographic Message Syntax (CMS) [CMS] is + used to create a detached signature, which is stored in a separate + companion file so that no existing utilities are impacted by the + addition of the digital signature. + + The RFC Editor recently published the first RFC that includes non- + ASCII characters in a text file. The conventions specified in RFC + 7997 [RFCED] were followed. We assume that non-ASCII characters will + soon start appearing in Internet-Drafts as well. This document + updates the handling of digital signatures on Internet-Drafts that + contain non-ASCII characters in a text file. + + This document updates RFC 5485 [IDSIG], which contains the + conventions that have been used by the IETF Secretariat to digitally + sign Internet-Drafts for the past few years. The IETF Secretariat + generates the digital signature shortly after the Internet-Draft is + posted in the repository. + + The digital signature allows anyone to confirm that the contents of + the Internet-Draft have not been altered since the time that the + document was signed. + + The digital signature is intended to provide a straightforward way + for anyone to determine whether a particular file contains the + Internet-Draft that was made available by the IETF Secretariat. The + signing-time associated with the signature provides the wall clock + time at which the signature was generated; it is not intended to + provide a trusted timestamp. + +1.1. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in + BCP 14 [STDWORDS] [STDWORDS2] when, and only when, they appear in all + capitals, as shown here. + +1.2. ASN.1 + + The CMS uses Abstract Syntax Notation One (ASN.1) [X.680]. ASN.1 is + a formal notation used for describing data protocols, regardless of + the programming language used by the implementation. Encoding rules + describe how the values defined in ASN.1 will be represented for + transmission. The Basic Encoding Rules (BER) [X.690] are the most + widely employed rule set, but they offer more than one way to + + + +Housley Informational [Page 3] + +RFC 8358 Update to Digital Signatures March 2018 + + + represent data structures. For example, definite length encoding and + indefinite length encoding are supported. This flexibility is not + desirable when digital signatures are used. As a result, the + Distinguished Encoding Rules (DER) [X.690] were invented. DER is a + subset of BER that ensures a single way to represent a given value. + For example, DER always employs definite length encoding. + +2. Detached Signature Files + + All Internet-Draft file names begin with "draft-". The next portion + of the file name depends on the source of the document. For example, + documents from IETF working groups usually have "ietf-" followed by + the working group abbreviation, and this is followed by a string that + helps people figure out the subject of the document. + + All Internet-Draft file names end with a hyphen followed by a two + digit version number and a suffix. The suffix indicates the type of + file. For example, a text file will have a suffix of ".txt". Today, + plain text files are the most common, but the RFC Editor has + announced plans to make use of other formats [RFCSERIES]. Each file + format employs a different suffix. + + Going forward, one cannot assume that a text file with a suffix of + ".txt" will contain only ASCII characters. + + The companion signature file has exactly the same file name as the + RFC or Internet-Draft, except that ".p7s" is added to the end. This + file name suffix conforms to the conventions in RFC 5751 [MSG]. Here + are a few example names: + + Internet-Draft: draft-ietf-example-widgets-03.txt + Signature File: draft-ietf-example-widgets-03.txt.p7s + + Internet-Draft: draft-ietf-example-widgets-03.pdf + Signature File: draft-ietf-example-widgets-03.pdf.p7s + + Internet-Draft: draft-housley-internet-draft-sig-file-00.txt + Signature File: draft-housley-internet-draft-sig-file-00.txt.p7s + +3. Additional Content Types + + The CMS is used to construct the detached signatures for Internet- + Drafts. The CMS ContentInfo content type MUST always be present, and + it MUST encapsulate the CMS SignedData content type. Since a + detached signature is being created, the CMS SignedData content type + MUST NOT encapsulate the Internet-Draft. The CMS detached signature + is summarized in RFC 5485 [IDSIG]. + + + + +Housley Informational [Page 4] + +RFC 8358 Update to Digital Signatures March 2018 + + + The SignedData.SignerInfo.EncapsulatedContentInfo.eContentType value + MUST identify the format of the Internet-Draft that is being signed. + Section 5 of RFC 5485 [IDSIG] lists the file formats and the + associated content type. This document expands that list as follows: + + File Format Content Type + ----------- ------------ + ASCII text id-ct-asciiTextWithCRLF + UTF-8 text (includes non-ASCII) id-ct-utf8TextWithCRLF + HyperText Markup Language (HTML) id-ct-htmlWithCRLF + EPUB id-ct-epub + Extensible Markup Language (XML) id-ct-xml + Portable Document Format (PDF) id-ct-pdf + PostScript id-ct-postscript + + The object identifiers associated with the content types listed above + table are: + + id-ct OBJECT IDENTIFIER ::= { iso(1) member-body(2) + us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) 1 } + + id-ct-asciiTextWithCRLF OBJECT IDENTIFIER ::= { id-ct 27 } + + id-ct-utf8TextWithCRLF OBJECT IDENTIFIER ::= { id-ct 37 } + + id-ct-htmlWithCRLF OBJECT IDENTIFIER ::= { id-ct 38 } + + id-ct-epub OBJECT IDENTIFIER ::= { id-ct 39 } + + id-ct-xml OBJECT IDENTIFIER ::= { id-ct 28 } + + id-ct-pdf OBJECT IDENTIFIER ::= { id-ct 29 } + + id-ct-postscript OBJECT IDENTIFIER ::= { id-ct 30 } + +4. Need for Canonicalization + + In general, the content of an Internet-Draft is treated like a single + octet string for the generation of the digital signature. + Unfortunately, the text and HTML files require canonicalization to + avoid signature validation problems. The primary concern is the + manner in which different operating systems indicate the end of a + line of text. Some systems use a single new-line character, other + systems use the combination of the carriage-return character followed + by a line-feed character, and other systems use fixed-length records + padded with space characters. For the digital signature to validate + properly, a single convention must be employed. + + + + +Housley Informational [Page 5] + +RFC 8358 Update to Digital Signatures March 2018 + + +4.1. ASCII, UTF-8, and HTML File Canonicalization + + The canonicalization procedure follows the conventions used for text + files in the File Transfer Protocol (FTP) [FTP]. Such files must be + supported by FTP implementations, so code reuse seems likely. + + The canonicalization procedure converts the data from its internal + character representation to the standard 8-bit NVT-ASCII + representation (see TELNET [TELNET]). In accordance with the NVT + standard, the <CRLF> sequence MUST be used to denote the end of a + line of text. Using the standard NVT-ASCII representation means that + data MUST be interpreted as 8-bit bytes. + + Trailing space characters MUST NOT appear on a line of text. That + is, the space character must not be followed by the <CRLF> sequence. + + Thus, a blank line is represented solely by the <CRLF> sequence. + + The form-feed nonprintable character (0x0C) is expected in Internet- + Drafts. Other non-printable characters, such as tab and backspace, + are not expected, but they do occur. Non-printable or non-ASCII + characters (ones outside the range 0x20 to 0x7E) MUST NOT be changed + in any way not covered by the rules for end-of-line handling in the + previous paragraph. + + Trailing blank lines MUST NOT appear at the end of the file. That + is, the file must not end with multiple consecutive <CRLF> sequences. + + In some environments, a Byte Order Mark (BOM) (U+FEFF) is used at the + beginning of a file to indicate that it contains non-ASCII + characters. In UTF-8 or HTML files, a BOM at the beginning of the + file is not considered to be part of the file content. One or more + consecutive leading BOMs, if present, MUST NOT be processed by the + digital signature algorithm. + + Any end-of-file marker used by an operating system is not considered + to be part of the file content. When present, such end-of-file + markers MUST NOT be processed by the digital signature algorithm. + + Note: This text file canonicalization procedure is consistent with + the NVT-ASCII definition offered in Appendix B of RFC 5198 [UFNI]. + +4.2. XML File Canonicalization + + Utilities that produce XML files are expected to follow the guidance + provided by the World Wide Web Consortium (W3C) in Section 2.11 of + [R20081126]. If this guidance is followed, no canonicalization is + needed. + + + +Housley Informational [Page 6] + +RFC 8358 Update to Digital Signatures March 2018 + + + A robust signature generation process MAY perform canonicalization to + ensure that the W3C guidance has been followed. This guidance says + that a <LF> character MUST be used to denote the end of a line of + text within an XML file. Therefore, any two-character <CRLF> + sequence and any <CR> that is not followed by <LF> are to be + translated to a single <LF> character. + +4.3. No Canonicalization of Other File Formats + + No canonicalization is needed for file formats currently used or + planned for Internet-Drafts other than ASCII, UTF-8, HTML, and XML + files. Other file formats, including PDF [PDF], PostScript [PS], and + EPUB [EPUB] are treated as a simple sequence of octets by the digital + signature algorithm. + +5. IANA Considerations + + IANA has registered object identifiers for three content types in the + "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" + registry as follows: + + Description OID Specification + ----------------------------------------------------------------- + id-ct-utf8TextWithCRLF 1.2.840.113549.1.9.16.1.37 [RFC8358] + id-ct-htmlWithCRLF 1.2.840.113549.1.9.16.1.38 [RFC8358] + id-ct-epub 1.2.840.113549.1.9.16.1.39 [RFC8358] + +6. Security Considerations + + The security considerations in RFC 5485 [IDSIG] are unchanged. + +7. Deployment and Operational Considerations + + The deployment considerations in RFC 5485 [IDSIG] are unchanged. + +8. References + +8.1. Normative References + + [CMS] Housley, R., "Cryptographic Message Syntax (CMS)", STD 70, + RFC 5652, DOI 10.17487/RFC5652, September 2009, + <https://www.rfc-editor.org/info/rfc5652>. + + [EPUB] International Digital Publishing Forum, "EPUB Content + Documents 3.1", January 2017, + <http://www.idpf.org/epub/31/spec/epub-contentdocs.html>. + + + + + +Housley Informational [Page 7] + +RFC 8358 Update to Digital Signatures March 2018 + + + [IDSIG] Housley, R., "Digital Signatures on Internet-Draft + Documents", RFC 5485, DOI 10.17487/RFC5485, March 2009, + <https://www.rfc-editor.org/info/rfc5485>. + + [PDF] International Organization for Standardization, "Document + management -- Electronic document file format for long- + term preservation -- Part 3: Use of ISO 32000-1 with + support for embedded files (PDF/A-3)", ISO 19005-3:2012, + 2012. + + [PS] Adobe Systems Incorporated, "PostScript Language Reference + Manual, third edition", Addison-Wesley Publishing Company, + ISBN 0-201-37922-8, 1999. + + [R20081126] + Bray, T., Paoli, J., Sperberg-McQueen, M., Maler, E., and + F. Yergeau, "Extensible Markup Language (XML) 1.0 (Fifth + Edition)", World Wide Web Consortium Recommendation + REC-xml-20081126, November 2008, + <http://www.w3.org/TR/2008/REC-xml-20081126>. + + [STDWORDS] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [STDWORDS2] + Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC + 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, + May 2017, <https://www.rfc-editor.org/info/rfc8174>. + + [X.680] ITU-T, "Information Technology - Abstract Syntax Notation + One: Specification of Basic Notation", + Recommendation X.680, ISO/IEC 8824-1:2002, 2002. + + [X.690] ITU-T, "Information technology -- ASN.1 encoding rules: + Specification of Basic Encoding Rules (BER), Canonical + Encoding Rules (CER) and Distinguished Encoding Rules + (DER)", ITU-T Recommendation X.690, ISO/IEC International + Standard 8825-1:2008, November 2008. + + + + + + + + + + + +Housley Informational [Page 8] + +RFC 8358 Update to Digital Signatures March 2018 + + +8.2. Informative References + + [FTP] Postel, J. and J. Reynolds, "File Transfer Protocol", + STD 9, RFC 959, DOI 10.17487/RFC0959, October 1985, + <https://www.rfc-editor.org/info/rfc959>. + + [MSG] Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet + Mail Extensions (S/MIME) Version 3.2 Message + Specification", RFC 5751, DOI 10.17487/RFC5751, January + 2010, <https://www.rfc-editor.org/info/rfc5751>. + + [RFCED] Flanagan, H., Ed., "The Use of Non-ASCII Characters in + RFCs", RFC 7997, DOI 10.17487/RFC7997, December 2016, + <https://www.rfc-editor.org/info/rfc7997>. + + [RFCSERIES] + Flanagan, H. and N. Brownlee, "RFC Series Format + Requirements and Future Development", RFC 6949, + DOI 10.17487/RFC6949, May 2013, + <https://www.rfc-editor.org/info/rfc6949>. + + [TELNET] Postel, J. and J. Reynolds, "Telnet Protocol + Specification", STD 8, RFC 854, DOI 10.17487/RFC0854, + May 1983, <https://www.rfc-editor.org/info/rfc854>. + + [UFNI] Klensin, J. and M. Padlipsky, "Unicode Format for Network + Interchange", RFC 5198, DOI 10.17487/RFC5198, March 2008, + <https://www.rfc-editor.org/info/rfc5198>. + +Acknowledgements + + The idea for the Internet-Draft signature file came from a discussion + with Scott Bradner at IETF 69 in Chicago, IL, USA. Many helpful + suggestions came from Jim Schaad, Pasi Eronen, Chris Newman, and Glen + Barney. Glen Barney also played a key role in implementing Internet- + Draft signatures as specified in RFC 5485 [IDSIG]. + +Author's Address + + Russell Housley + Vigil Security, LLC + 918 Spring Knoll Drive + Herndon, VA 20170 + United States of America + + Email: housley@vigilsec.com + + + + + +Housley Informational [Page 9] + |