summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9158.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9158.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9158.txt')
-rw-r--r--doc/rfc/rfc9158.txt179
1 files changed, 179 insertions, 0 deletions
diff --git a/doc/rfc/rfc9158.txt b/doc/rfc/rfc9158.txt
new file mode 100644
index 0000000..98d7fff
--- /dev/null
+++ b/doc/rfc/rfc9158.txt
@@ -0,0 +1,179 @@
+
+
+
+
+Internet Engineering Task Force (IETF) R. Housley
+Request for Comments: 9158 Vigil Security
+Updates: 7299 November 2021
+Category: Informational
+ISSN: 2070-1721
+
+
+ Update to the Object Identifier Registry for the PKIX Working Group
+
+Abstract
+
+ RFC 7299 describes the object identifiers that were assigned by the
+ Public Key Infrastructure using X.509 (PKIX) Working Group in an arc
+ that was allocated by IANA (1.3.6.1.5.5.7). A small number of object
+ identifiers that were assigned in RFC 4212 are omitted from RFC 7299,
+ and this document updates RFC 7299 to correct that oversight.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Not all documents
+ approved by the IESG are candidates for any level of Internet
+ Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9158.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Revised BSD License text as described in Section 4.e of the
+ Trust Legal Provisions and are provided without warranty as described
+ in the Revised BSD License.
+
+Table of Contents
+
+ 1. Introduction
+ 2. IANA Considerations
+ 2.1. "SMI Security for PKIX CRMF Registration Controls for
+ Alternate Certificate Formats" Registry
+ 3. Security Considerations
+ 4. References
+ 4.1. Normative References
+ 4.2. Informative References
+ Author's Address
+
+1. Introduction
+
+ When the Public Key Infrastructure using X.509 (PKIX) Working Group
+ was chartered, an object identifier arc was allocated by IANA for use
+ by that working group. After the PKIX Working Group was closed, RFC
+ 7299 [RFC7299] was published to describe the object identifiers that
+ were assigned in that arc. A small number of object identifiers that
+ were assigned in RFC 4212 [RFC4212] are not included in RFC 7299, and
+ this document corrects that oversight.
+
+ The PKIX Certificate Management Protocol (CMP) [RFC4210] allocated
+ id-regCtrl-altCertTemplate (1.3.6.1.5.5.7.5.1.7), and then two object
+ identifiers were assigned within that arc [RFC4212], which were
+ intended to be used with either PKIX CMP [RFC4210] or PKIX
+ Certificate Management over CMS (CMC) [RFC5272] [RFC5273] [RFC5274]
+ [RFC6402].
+
+ This document describes the object identifiers that were assigned in
+ that arc, establishes an IANA registry for that arc, and establishes
+ IANA allocation policies for any future assignments within that arc.
+
+2. IANA Considerations
+
+ IANA has created a new subregistry.
+
+2.1. "SMI Security for PKIX CRMF Registration Controls for Alternate
+ Certificate Formats" Registry
+
+ Within the "Structure of Management Information (SMI) Numbers (MIB
+ Module Registrations)" registry, IANA has created the "SMI Security
+ for PKIX CRMF Registration Controls for Alternate Certificate
+ Formats" subregistry (1.3.6.1.5.5.7.5.1.7). The initial contents of
+ this subregistry are as follows:
+
+ +=========+===========================+============+
+ | Decimal | Description | References |
+ +=========+===========================+============+
+ | 1 | id-acTemplate | [RFC4212] |
+ +---------+---------------------------+------------+
+ | 2 | id-openPGPCertTemplateExt | [RFC4212] |
+ +---------+---------------------------+------------+
+
+ Table 1: New SMI Security for PKIX CRMF
+ Registration Controls for Alternate Certificate
+ Formats Subregistry
+
+ Future updates to the registry table are to be made according to the
+ Specification Required policy defined in [RFC8126]. The expert is
+ expected to ensure that any new values are strongly related to the
+ work that was done by the PKIX Working Group. In particular,
+ additional object identifiers should be needed for use with either
+ the PKIX CMP or PKIX CMC to support alternative certificate formats.
+ Object identifiers for other purposes should not be assigned in this
+ arc.
+
+3. Security Considerations
+
+ This document populates an IANA registry, and it raises no new
+ security considerations. The protocols that specify these values
+ include the security considerations associated with their usage.
+
+4. References
+
+4.1. Normative References
+
+ [RFC7299] Housley, R., "Object Identifier Registry for the PKIX
+ Working Group", RFC 7299, DOI 10.17487/RFC7299, July 2014,
+ <https://www.rfc-editor.org/info/rfc7299>.
+
+ [RFC8126] Cotton, M., Leiba, B., and T. Narten, "Guidelines for
+ Writing an IANA Considerations Section in RFCs", BCP 26,
+ RFC 8126, DOI 10.17487/RFC8126, June 2017,
+ <https://www.rfc-editor.org/info/rfc8126>.
+
+4.2. Informative References
+
+ [RFC4210] Adams, C., Farrell, S., Kause, T., and T. Mononen,
+ "Internet X.509 Public Key Infrastructure Certificate
+ Management Protocol (CMP)", RFC 4210,
+ DOI 10.17487/RFC4210, September 2005,
+ <https://www.rfc-editor.org/info/rfc4210>.
+
+ [RFC4212] Blinov, M. and C. Adams, "Alternative Certificate Formats
+ for the Public-Key Infrastructure Using X.509 (PKIX)
+ Certificate Management Protocols", RFC 4212,
+ DOI 10.17487/RFC4212, October 2005,
+ <https://www.rfc-editor.org/info/rfc4212>.
+
+ [RFC5272] Schaad, J. and M. Myers, "Certificate Management over CMS
+ (CMC)", RFC 5272, DOI 10.17487/RFC5272, June 2008,
+ <https://www.rfc-editor.org/info/rfc5272>.
+
+ [RFC5273] Schaad, J. and M. Myers, "Certificate Management over CMS
+ (CMC): Transport Protocols", RFC 5273,
+ DOI 10.17487/RFC5273, June 2008,
+ <https://www.rfc-editor.org/info/rfc5273>.
+
+ [RFC5274] Schaad, J. and M. Myers, "Certificate Management Messages
+ over CMS (CMC): Compliance Requirements", RFC 5274,
+ DOI 10.17487/RFC5274, June 2008,
+ <https://www.rfc-editor.org/info/rfc5274>.
+
+ [RFC6402] Schaad, J., "Certificate Management over CMS (CMC)
+ Updates", RFC 6402, DOI 10.17487/RFC6402, November 2011,
+ <https://www.rfc-editor.org/info/rfc6402>.
+
+Author's Address
+
+ Russ Housley
+ Vigil Security, LLC
+ 516 Dranesville Road
+ Herndon, VA 20170
+ United States of America
+
+ Email: housley@vigilsec.com