1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
|
Internet Engineering Task Force (IETF) S. Turner
Request for Comments: 5917 IECA
Category: Informational June 2010
ISSN: 2070-1721
Clearance Sponsor Attribute
Abstract
This document defines the clearance sponsor attribute. It indicates
the entity that sponsored (i.e., granted) the clearance. This
attribute is intended for use in public key certificates and
attribute certificates that also include the clearance attribute.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc5917.
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Turner Informational [Page 1]
^L
RFC 5917 Clearance Sponsor Attribute June 2010
1. Introduction
This document specifies the clearance sponsor attribute. It is
included in public key certificates [RFC5280] and attribute
certificates [RFC5755]. This attribute is only meaningful as a
companion of the clearance attribute [RFC5755] [RFC5912]. The
clearance sponsor is the entity (e.g., agency, department, or
organization) that granted the clearance to the subject named in the
certificate. For example, the clearance sponsor for a subject
asserting the Amoco clearance values [RFC3114] could be
"Engineering".
This attribute may be used in automated authorization decisions. For
example, a web server deciding whether to allow a user access could
check that the clearance sponsor present in the user's certificate is
on an "approved" list. This check is performed in addition to
certification path validation [RFC5280]. The mechanism for managing
the "approved" list is beyond the scope of this document.
NOTE: This document does not provide an equivalent Lightweight
Directory Access Protocol (LDAP) schema specification as this
attribute is initially targeted at public key certificates [RFC5280]
and attribute certificates [RFC5755]. Definition of an equivalent
LDAP schema is left to a future specification.
1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
1.2. ASN.1 Syntax Notation
The attribute is defined using ASN.1 [X.680], [X.681], [X.682], and
[X.683].
2. Clearance Sponsor
The clearance sponsor attribute, which is only meaningful if the
clearance attribute [RFC5755] [RFC5912] is also present, indicates
the sponsor of the clearance of the subject with which this attribute
is associated. The clearance sponsor attribute is a DirectoryString
[RFC5280], which MUST use the UTF8String CHOICE, with a minimum size
of 1 character and a maximum of 64 characters.
Turner Informational [Page 2]
^L
RFC 5917 Clearance Sponsor Attribute June 2010
The following object identifier identifies the sponsor attribute:
id-clearanceSponsor OBJECT IDENTIFIER ::= {
joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101)
dod(2) infosec(1) attributes(5) 68
}
The ASN.1 syntax for the clearance sponsor attribute is as follows:
at-clearanceSponsor ATTRIBUTE ::= {
TYPE DirectoryString { ub-clearance-sponsor }
( WITH COMPONENTS { utf8String PRESENT } )
EQUALITY MATCHING RULE caseIgnoreMatch
IDENTIFIED BY id-clearanceSponsor
}
ub-clearance-sponsor INTEGER ::= 64
There MUST only be one value of clearanceSponsor associated with a
particular certificate. Distinct sponsors MUST be represented in
separate certificates.
When an environment uses the Clearance Sponsor attribute, it is
important that the same representation of the sponsor be used
throughout the environment (e.g., using the same acronym). Further,
the value in this attribute is not meant to be globally unique. When
included in certificates, it is unique within the scope of the
issuer.
3. Security Considerations
If this attribute is used as part of an authorization process, the
procedures employed by the entity that assigns each clearance sponsor
value must ensure that the correct value is applied. Including this
attribute in a public key certificate or attribute certificate
ensures that the value for the clearance sponsor is integrity
protected.
The certificate issuer and clearance sponsor are not necessarily the
same entity. If they are separate entities, then the mechanism used
by the clearance sponsor to convey to the certificate issuer that the
clearance sponsor did in fact grant the clearance to the subject
needs to be protected from unauthorized modification.
If two entities are verifying each other's certificates, they do not
share the same issuer, and they use the same clearance sponsor value
(e.g., a United Kingdom PKI includes "MoD" and a New Zealand PKI also
includes "MoD"), then the relying party has two choices: 1) accept
Turner Informational [Page 3]
^L
RFC 5917 Clearance Sponsor Attribute June 2010
the two strings as equivalent, or 2) indicate the sponsor as well as
the trust anchor. To solve this problem, a mechanism, which is
outside the scope of this specification, could be developed to allow
a relying party to group together issuers that share a same context
within which sponsor names have a unique significance.
While values of DirectoryString can include the NUL (U+0000) code
point, values used to represent clearance sponsors typically would
not. Implementations of the caseIgnoreMatch rule must, per X.501,
consider all of the assertion value and attribute value in matching
and hence protect against truncation attacks.
4. References
4.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, May 2008.
[RFC5755] Farrell, S., Housley, R., and S. Turner, "An Internet
Attribute Certificate Profile for Authorization", RFC
5755, January 2010.
[RFC5912] Schaad, J. and P. Hoffman, "New ASN.1 Modules for the
Public Key Infrastructure Using X.509 (PKIX)", RFC 5912,
June 2010.
[X.520] ITU-T Recommendation X.520 (2002) | ISO/IEC 9594-6:2002,
Information technology - The Directory:Selected Attribute
Types.
[X.680] ITU-T Recommendation X.680 (2002) | ISO/IEC 8824-1:2002,
Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation.
[X.681] ITU-T Recommendation X.681 (2002) | ISO/IEC 8824-2:2002,
Information Technology - Abstract Syntax Notation One:
Information Object Specification.
[X.682] ITU-T Recommendation X.682 (2002) | ISO/IEC 8824-3:2002,
Information Technology - Abstract Syntax Notation One:
Constraint Specification.
Turner Informational [Page 4]
^L
RFC 5917 Clearance Sponsor Attribute June 2010
[X.683] ITU-T Recommendation X.683 (2002) | ISO/IEC 8824-4:2002,
Information Technology - Abstract Syntax Notation One:
Parameterization of ASN.1 Specifications.
4.2. Informative References
[RFC3114] Nicolls, W., "Implementing Company Classification Policy
with the S/MIME Security Label", RFC 3114, May 2002.
Turner Informational [Page 5]
^L
RFC 5917 Clearance Sponsor Attribute June 2010
Appendix A. ASN.1 Module
This appendix provides the normative ASN.1 [X.680] definitions for
the structures described in this specification using ASN.1 as defined
in [X.680], [X.681], [X.682], and [X.683].
ClearanceSponsorAttribute-2008
{ joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101)
dod(2) infosec(1) modules(0)
id-clearanceSponsorAttribute-2008(35) }
DEFINITIONS IMPLICIT TAGS ::=
BEGIN
-- EXPORTS ALL --
IMPORTS
-- Imports from New PKIX ASN.1 [RFC5912]
DirectoryString
PKIX1Explicit-2009
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) id-mod(0)
id-pkix1-explicit-02(51) }
-- Imports from New PKIX ASN.1 [RFC5912]
ATTRIBUTE
FROM PKIX-CommonTypes-2009
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) id-mod(0)
id-mod-pkixCommon-02(57) }
-- Imports from ITU-T X.520 [X.520]
caseIgnoreMatch
FROM SelectedAttributeTypes
{ joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 }
;
-- sponsor attribute OID and syntax
id-clearanceSponsor OBJECT IDENTIFIER ::= {
joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101)
dod(2) infosec(1) attributes(5) 68
Turner Informational [Page 6]
^L
RFC 5917 Clearance Sponsor Attribute June 2010
}
at-clearanceSponsor ATTRIBUTE ::= {
TYPE DirectoryString { ub-clearance-sponsor }
( WITH COMPONENTS { utf8String PRESENT } )
EQUALITY MATCHING RULE caseIgnoreMatch
IDENTIFIED BY id-clearanceSponsor
}
ub-clearance-sponsor INTEGER ::= 64
END
Author's Address
Sean Turner
IECA, Inc.
3057 Nutley Street, Suite 106
Fairfax, VA 22031
USA
EMail: turners@ieca.com
Turner Informational [Page 7]
^L
|