1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
|
Internet Engineering Task Force (IETF) H. Brockhaus
Request for Comments: 9480 D. von Oheimb
Updates: 4210, 5912, 6712 Siemens
Category: Standards Track J. Gray
ISSN: 2070-1721 Entrust
November 2023
Certificate Management Protocol (CMP) Updates
Abstract
This document contains a set of updates to the syntax of Certificate
Management Protocol (CMP) version 2 and its HTTP transfer mechanism.
This document updates RFCs 4210, 5912, and 6712.
The aspects of CMP updated in this document are using EnvelopedData
instead of EncryptedValue, clarifying the handling of p10cr messages,
improving the crypto agility, as well as adding new general message
types, extended key usages to identify certificates for use with CMP,
and well-known URI path segments.
CMP version 3 is introduced to enable signaling support of
EnvelopedData instead of EncryptedValue and signal the use of an
explicit hash AlgorithmIdentifier in certConf messages, as far as
needed.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
https://www.rfc-editor.org/info/rfc9480.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. Convention and Terminology
2. Updates to RFC 4210 - Certificate Management Protocol (CMP)
2.1. New Section 1.1 - Changes Since RFC 4210
2.2. New Section 4.5 - Extended Key Usage
2.3. Update Section 5.1.1 - PKI Message Header
2.4. New Section 5.1.1.3 - CertProfile
2.5. Update Section 5.1.3.1 - Shared Secret Information
2.6. Replace Section 5.1.3.4 - Multiple Protection
2.7. Replace Section 5.2.2 - Encrypted Values
2.8. New Section 5.2.9 - GeneralizedTime
2.9. Update Section 5.3.4 - Certification Response
2.10. Update Section 5.3.18 - Certificate Confirmation Content
2.11. Update Section 5.3.19.2 - Signing Key Pair Types
2.12. Update Section 5.3.19.3 - Encryption/Key Agreement Key Pair
Types
2.13. Replace Section 5.3.19.9 - Revocation Passphrase
2.14. New Section 5.3.19.14 - CA Certificates
2.15. New Section 5.3.19.15 - Root CA Certificate Update
2.16. New Section 5.3.19.16 - Certificate Request Template
2.17. New Section 5.3.19.17 - CRL Update Retrieval
2.18. Update Section 5.3.21 - Error Message Content
2.19. Replace Section 5.3.22 - Polling Request and Response
2.20. Update Section 7 - Version Negotiation
2.21. Update Section 7.1.1 - Clients Talking to RFC 2510 Servers
2.22. Add Section 8.4 - Private Keys for Certificate Signing and
CMP Message Protection
2.23. Add Section 8.5 - Entropy of Random Numbers, Key Pairs, and
Shared Secret Information
2.24. Add Section 8.6 - Trust Anchor Provisioning Using CMP
Messages
2.25. Add Section 8.7 - Authorizing Requests for Certificates
with Specific EKUs
2.26. Update Appendix B - The Use of Revocation Passphrase
2.27. Update Appendix C - Request Message Behavioral
Clarifications
2.28. Update Appendix D.1. - General Rules for Interpretation of
These Profiles
2.29. Update Appendix D.2. - Algorithm Use Profile
2.30. Update Appendix D.4. - Initial Registration/Certification
(Basic Authenticated Scheme)
3. Updates to RFC 6712 - HTTP Transfer for the Certificate
Management Protocol (CMP)
3.1. Update Section 1 - Introduction
3.2. New Section 1.1 - Changes Since RFC 6712
3.3. Replace Section 3.6 - HTTP Request-URI
4. IANA Considerations
4.1. Updates to the ASN.1 Modules in RFCs 4210 and 5912
4.2. Updates to the IANA Considerations of RFC 4210
4.2.1. SMI Security for PKIX Extended Key Purpose Registry
4.2.2. SMI Security for PKIX CMP Information Types
4.2.3. SMI Security for PKIX CRMF Registration Controls
4.3. Updates to the IANA Considerations of RFC 6712
4.3.1. Well-Known URIs
4.3.2. Certificate Management Protocol (CMP) Registry
5. Security Considerations
6. References
6.1. Normative References
6.2. Informative References
Appendix A. ASN.1 Modules
A.1. Update to RFC 4210 - 1988 ASN.1 Module
A.2. Update to RFC 5912 - 2002 ASN.1 Module
Acknowledgements
Authors' Addresses
1. Introduction
While using CMP [RFC4210] in industrial and Internet of Things
environments and developing the Lightweight CMP Profile [RFC9483],
some limitations were identified in the original CMP specification.
This document updates [RFC4210] and [RFC6712] to overcome these
limitations.
Among other updates, this document improves the crypto agility of
CMP, which allows more flexibility for future advances in
cryptography.
This document also introduces new extended key usages to identify CMP
endpoints on registration and certification authorities.
The main content of [RFC4210] and [RFC6712] remains unchanged. This
document lists all sections that are updated, replaced, or added to
the current text of the respective RFCs.
The authors acknowledge that the style of the document is hard to
read because the original RFCs must be read along with this document
to get the complete content. The working group decided to use this
approach in order to keep the changes to [RFC4210] and [RFC6712] to
the required minimum. This was meant to speed up the editorial
process and to minimize the effort spent on reviewing the full text
of the original documents.
However, [PKIX-CMP] and [HTTP-CMP] are intended to obsolete RFCs 4210
and 6712, respectively; these documents also include the changes
listed in this document.
1.1. Convention and Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
Technical terminology is used in conformance with [RFC4210],
[RFC4211], and [RFC5280]. The following key words are used:
CA: Certification authority, which issues certificates.
RA: Registration authority, an optional system component to which
a CA delegates certificate management functions, such as
authorization checks.
KGA: Key generation authority, which generates key pairs on behalf
of an EE. The KGA could be colocated with an RA or a CA.
EE: End entity, a user, device, or service that holds a PKI
certificate. An identifier for the EE is given as its subject
of the certificate.
2. Updates to RFC 4210 - Certificate Management Protocol (CMP)
2.1. New Section 1.1 - Changes Since RFC 4210
The following subsection describes feature updates to [RFC4210].
They are always related to the base specification. Hence, references
to the original sections in [RFC4210] are used whenever possible.
Insert this section after the current Section 1 of [RFC4210]:
1.1. Changes Since RFC 4210
The following updates are made in this document:
* Adding new extended key usages for various CMP server types, e.g.,
registration authority and certification authority, to express the
authorization of the entity identified in the certificate
containing the respective extended key usage extension that acts
as the indicated PKI management entity.
* Extending the description of multiple protection to cover
additional use cases, e.g., batch processing of messages.
* Offering EnvelopedData as the preferred choice next to
EncryptedValue to better support crypto agility in CMP. Note
that, according to [RFC4211], Section 2.1, point 9, the use of the
EncryptedValue structure has been deprecated in favor of the
EnvelopedData structure. [RFC4211] offers the EncryptedKey
structure a choice of EncryptedValue and EnvelopedData for
migration to EnvelopedData. For reasons of completeness and
consistency, the type EncryptedValue has been exchanged in all
occurrences in [RFC4210]. This includes the protection of
centrally generated private keys, encryption of certificates, and
protection of revocation passphrases. To properly differentiate
the support of EnvelopedData instead of EncryptedValue, CMP
version 3 is introduced in case a transaction is supposed to use
EnvelopedData.
* Offering an optional hashAlg field in CertStatus that supports
confirmation of certificates signed with signature algorithms,
e.g., preparing for upcoming post quantum algorithms, not directly
indicating a specific hash algorithm to use to compute the
certHash.
* Adding new general message types to request CA certificates, a
root CA update, a certificate request template, or a Certificate
Revocation List (CRL) update.
* Extending the usage of polling to p10cr, certConf, rr, genm, and
error messages.
* Deleting the mandatory algorithm profile in Appendix D.2 of
[RFC4210] and referring to Section 7 of CMP Algorithms [RFC9481].
2.2. New Section 4.5 - Extended Key Usage
The following subsection introduces a new extended key usage for CMP
servers authorized to centrally generate key pairs on behalf of end
entities.
Insert this section after Section 4.4.3 of [RFC4210]:
4.5. Extended Key Usage
The extended key usage (EKU) extension indicates the purposes for
which the certified key pair may be used. Therefore, it restricts
the use of a certificate to specific applications.
A CA may want to delegate parts of its duties to other PKI management
entities. This section provides a mechanism to both prove this
delegation and enable an automated means for checking the
authorization of this delegation. Such delegation may also be
expressed by other means, e.g., explicit configuration.
To offer automatic validation for the delegation of a role by a CA to
another entity, the certificates used for CMP message protection or
signed data for central key generation MUST be issued by the
delegating CA and MUST contain the respective EKUs. This proves the
authorization of this entity by delegating CA to act in the given
role, as described below.
The OIDs to be used for these EKUs are:
id-kp-cmcCA OBJECT IDENTIFIER ::= {
iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) kp(3) 27 }
id-kp-cmcRA OBJECT IDENTIFIER ::= {
iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) kp(3) 28 }
id-kp-cmKGA OBJECT IDENTIFIER ::= {
iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) kp(3) 32 }
Note: Section 2.10 of [RFC6402] specifies OIDs for a Certificate
Management over CMS (CMC) CA and a CMC RA. As the functionality of a
CA and RA is not specific to any certificate management protocol
(such as CMC or CMP), these EKUs are reused by CMP.
The meaning of the id-kp-cmKGA EKU is as follows:
CMP KGA: CMP key generation authorities are CAs or are identified by
the id-kp-cmKGA extended key usage. The CMP KGA knows the
private key it generated on behalf of the end entity. This
is a very sensitive service and needs specific
authorization, which by default is with the CA certificate
itself. The CA may delegate its authorization by placing
the id-kp-cmKGA extended key usage in the certificate used
to authenticate the origin of the generated private key.
The authorization may also be determined through local
configuration of the end entity.
2.3. Update Section 5.1.1 - PKI Message Header
Section 5.1.1 of [RFC4210] describes the PKI message header. This
document introduces the new version 3, indicating support of
EnvelopedData as specified in Section 2.7 and hashAlg as specified in
Section 2.10.
Replace the ASN.1 syntax of PKIHeader and the subsequent description
of pvno with the following text:
PKIHeader ::= SEQUENCE {
pvno INTEGER { cmp1999(1), cmp2000(2),
cmp2021(3) },
sender GeneralName,
recipient GeneralName,
messageTime [0] GeneralizedTime OPTIONAL,
protectionAlg [1] AlgorithmIdentifier{ALGORITHM, {...}}
OPTIONAL,
senderKID [2] KeyIdentifier OPTIONAL,
recipKID [3] KeyIdentifier OPTIONAL,
transactionID [4] OCTET STRING OPTIONAL,
senderNonce [5] OCTET STRING OPTIONAL,
recipNonce [6] OCTET STRING OPTIONAL,
freeText [7] PKIFreeText OPTIONAL,
generalInfo [8] SEQUENCE SIZE (1..MAX) OF
InfoTypeAndValue OPTIONAL
}
PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
The usage of the protocol version number (pvno) is described in
Section 7.
2.4. New Section 5.1.1.3 - CertProfile
Section 5.1.1 of [RFC4210] defines the PKIHeader and id-it OIDs to be
used in the generalInfo field. This section introduces id-it-
certProfile.
Insert this section after Section 5.1.1.2 of [RFC4210]:
5.1.1.3. CertProfile
This is used by the EE to indicate specific certificate profiles,
e.g., when requesting a new certificate or a certificate request
template; see Section 5.3.19.16.
id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21}
CertProfileValue ::= SEQUENCE SIZE (1..MAX) OF UTF8String
When used in an ir/cr/kur/genm, the value MUST NOT contain more
elements than the number of CertReqMsg or InfoTypeAndValue elements
and the certificate profile names refer to the elements in the given
order.
When used in a p10cr, the value MUST NOT contain multiple certificate
profile names.
2.5. Update Section 5.1.3.1 - Shared Secret Information
Section 5.1.3.1 of [RFC4210] describes the protection of a PKIMessage
based on message authentication code (MAC) using the algorithm id-
PasswordBasedMac.
Replace the first paragraph with the following text:
In this case, the sender and recipient share secret information with
sufficient entropy (established via out-of-band means or from a
previous PKI management operation). PKIProtection will contain a MAC
value and the protectionAlg MAY be one of the options described in
CMP Algorithms [RFC9481]. The PasswordBasedMac is specified as
follows (see also [RFC4211] and [RFC9045]):
Replace the last paragraph with the following text (Note: This fixes
Errata ID 2616):
Note: It is RECOMMENDED that the fields of PBMParameter remain
constant throughout the messages of a single transaction (e.g.,
ir/ip/certConf/pkiConf) to reduce the overhead associated with
PasswordBasedMac computation.
2.6. Replace Section 5.1.3.4 - Multiple Protection
Section 5.1.3.4 of [RFC4210] describes the nested message. This
document also enables using nested messages for batch-delivery
transport of PKI messages between PKI management entities and with
mixed body types.
Replace the text of the section with the following text:
5.1.3.4. Multiple Protection
When receiving a protected PKI message, a PKI management entity, such
as an RA, MAY forward that message along with adding its own
protection (which is a MAC or a signature, depending on the
information and certificates shared between the RA and the CA).
Additionally, multiple PKI messages MAY be aggregated. There are
several use cases for such messages.
* The RA confirms having validated and authorized a message and
forwards the original message unchanged.
* The RA modifies the message(s) in some way (e.g., adds or modifies
particular field values or adds new extensions) before forwarding
them; then, it MAY create its own desired PKIBody. If the changes
made by the RA to PKIMessage break the POP of a certificate
request, the RA MUST set the popo field to RAVerified. It MAY
include the original PKIMessage from the EE in the generalInfo
field of PKIHeader of a nested message (to accommodate, for
example, cases in which the CA wishes to check POP or other
information on the original EE message). The infoType to be used
in this situation is {id-it 15} (see Section 5.3.19 for the value
of id-it), and the infoValue is PKIMessages (contents MUST be in
the same order as the message in PKIBody).
* A PKI management entity collects several messages that are to be
forwarded in the same direction and forwards them in a batch.
Request messages can be transferred as batch upstream (towards the
CA); response or announce messages can be transferred as batch
downstream (towards an RA but not to the EE). For instance, this
can be used when bridging an off-line connection between two PKI
management entities.
These use cases are accomplished by nesting the messages within a new
PKI message. The structure used is as follows:
NestedMessageContent ::= PKIMessages
2.7. Replace Section 5.2.2 - Encrypted Values
Section 5.2.2 of [RFC4210] describes the use of EncryptedValue to
transport encrypted data. This document extends the encryption of
data to preferably use EnvelopedData.
Replace the text of the section with the following text:
5.2.2. Encrypted Values
Where encrypted data (in this specification, private keys,
certificates, or revocation passphrase) is sent in PKI messages, the
EncryptedKey data structure is used.
EncryptedKey ::= CHOICE {
encryptedValue EncryptedValue, -- deprecated
envelopedData [0] EnvelopedData }
See Certificate Request Message Format (CRMF) [RFC4211] for
EncryptedKey and EncryptedValue syntax and Cryptographic Message
Syntax (CMS) [RFC5652] for EnvelopedData syntax. Using the
EncryptedKey data structure offers the choice to either use
EncryptedValue (for backward compatibility only) or EnvelopedData.
The use of the EncryptedValue structure has been deprecated in favor
of the EnvelopedData structure. Therefore, it is RECOMMENDED to use
EnvelopedData.
Note: The EncryptedKey structure defined in CRMF [RFC4211] is reused
here, which makes the update backward compatible. Using the new
syntax with the untagged default choice EncryptedValue is bits-on-
the-wire compatible with the old syntax.
To indicate support for EnvelopedData, the pvno cmp2021 has been
introduced. Details on the usage of the protocol version number
(pvno) are described in Section 7.
The EncryptedKey data structure is used in CMP to transport a private
key, certificate, or revocation passphrase in encrypted form.
EnvelopedData is used as follows:
* It contains only one RecipientInfo structure because the content
is encrypted only for one recipient.
* It may contain a private key in the AsymmetricKeyPackage
structure, as defined in [RFC5958], that is wrapped in a
SignedData structure, as specified in Section 5 of CMS [RFC5652]
and [RFC8933], and signed by the Key Generation Authority.
* It may contain a certificate or revocation passphrase directly in
the encryptedContent field.
The content of the EnvelopedData structure, as specified in Section 6
of CMS [RFC5652], MUST be encrypted using a newly generated symmetric
content-encryption key. This content-encryption key MUST be securely
provided to the recipient using one of three key management
techniques.
The choice of the key management technique to be used by the sender
depends on the credential available at the recipient:
* recipient's certificate with an algorithm identifier and a public
key that supports key transport and where any given key usage
extension allows keyEncipherment: The content-encryption key will
be protected using the key transport key management technique, as
specified in Section 6.2.1 of CMS [RFC5652].
* recipient's certificate with an algorithm identifier and a public
key that supports key agreement and where any given key usage
extension allows keyAgreement: The content-encryption key will be
protected using the key agreement key management technique, as
specified in Section 6.2.2 of CMS [RFC5652].
* a password or shared secret: The content-encryption key will be
protected using the password-based key management technique, as
specified in Section 6.2.4 of CMS [RFC5652].
2.8. New Section 5.2.9 - GeneralizedTime
The following subsection points implementers to [RFC5280] regarding
usage of GeneralizedTime.
Insert this section after Section 5.2.8.4 of [RFC4210]:
5.2.9 GeneralizedTime
GeneralizedTime is a standard ASN.1 type and SHALL be used as
specified in Section 4.1.2.5.2 of [RFC5280].
2.9. Update Section 5.3.4 - Certification Response
Section 5.3.4 of [RFC4210] describes the Certification Response.
This document updates the syntax by using the parent structure
EncryptedKey instead of EncryptedValue, as described in Section 2.7
above. Additionally, it clarifies the certReqId to be used in
response to a p10cr message.
Replace the ASN.1 syntax with the following text (Note: This also
fixes Errata ID 3949 and 4078):
CertRepMessage ::= SEQUENCE {
caPubs [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
OPTIONAL,
response SEQUENCE OF CertResponse
}
CertResponse ::= SEQUENCE {
certReqId INTEGER,
status PKIStatusInfo,
certifiedKeyPair CertifiedKeyPair OPTIONAL,
rspInfo OCTET STRING OPTIONAL
-- analogous to the id-regInfo-utf8Pairs string defined
-- for regInfo in CertReqMsg [RFC4211]
}
CertifiedKeyPair ::= SEQUENCE {
certOrEncCert CertOrEncCert,
privateKey [0] EncryptedKey OPTIONAL,
-- See [RFC4211] for comments on encoding.
publicationInfo [1] PKIPublicationInfo OPTIONAL
}
CertOrEncCert ::= CHOICE {
certificate [0] CMPCertificate,
encryptedCert [1] EncryptedKey
}
Add the following as a new paragraph right after the ASN.1 syntax:
A p10cr message contains exactly one CertificationRequestInfo data
structure, as specified in PKCS #10 [RFC2986], but no certReqId.
Therefore, the certReqId in the corresponding Certification Response
(cp) message MUST be set to -1.
Add the following as new paragraphs to the end of the section:
The use of EncryptedKey is described in Section 5.2.2.
Note: To indicate support for EnvelopedData, the pvno cmp2021 has
been introduced. Details on the usage of different protocol version
numbers (pvno) are described in Section 7.
2.10. Update Section 5.3.18 - Certificate Confirmation Content
This section introduces an optional hashAlg field to the CertStatus
type used in certConf messages to explicitly specify the hash
algorithm for those certificates where no hash algorithm is specified
in the signatureAlgorithm field.
Replace the ASN.1 Syntax of CertStatus with the following text:
CertStatus ::= SEQUENCE {
certHash OCTET STRING,
certReqId INTEGER,
statusInfo PKIStatusInfo OPTIONAL,
hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}
OPTIONAL
}
The hashAlg field SHOULD be used only in exceptional cases where the
signatureAlgorithm of the certificate to be confirmed does not
specify a hash algorithm in the OID or in the parameters. In such
cases, e.g., for EdDSA, the hashAlg MUST be used to specify the hash
algorithm to be used for calculating the certHash value. Otherwise,
the certHash value SHALL be computed using the same hash algorithm as
used to create and verify the certificate signature. If hashAlg is
used, the CMP version indicated by the certConf message header must
be cmp2021(3).
2.11. Update Section 5.3.19.2 - Signing Key Pair Types
The following section clarifies the usage of the Signing Key Pair
Types on referencing elliptic curves.
Insert this note at the end of Section 5.3.19.2 of [RFC4210]:
Note: In case several elliptic curves are supported, several id-
ecPublicKey elements as defined in [RFC5480] need to be given, one
per named curve.
2.12. Update Section 5.3.19.3 - Encryption/Key Agreement Key Pair Types
The following section clarifies the use of the Encryption/Key
Agreement Key Pair Types on referencing elliptic curves.
Insert this note at the end of Section 5.3.19.3 of [RFC4210]:
Note: In case several elliptic curves are supported, several id-
ecPublicKey elements as defined in [RFC5480] need to be given, one
per named curve.
2.13. Replace Section 5.3.19.9 - Revocation Passphrase
Section 5.3.19.9 of [RFC4210] describes the provisioning of a
revocation passphrase for authenticating a later revocation request.
This document updates the handling by using the parent structure
EncryptedKey instead of EncryptedValue to transport this information,
as described in Section 2.7 above.
Replace the text of the section with the following text:
5.3.19.9. Revocation Passphrase
This MAY be used by the EE to send a passphrase to a CA/RA for the
purpose of authenticating a later revocation request (in the case
that the appropriate signing private key is no longer available to
authenticate the request). See Appendix B for further details on the
use of this mechanism.
GenMsg: {id-it 12}, EncryptedKey
GenRep: {id-it 12}, < absent >
The use of EncryptedKey is described in Section 5.2.2.
2.14. New Section 5.3.19.14 - CA Certificates
The following subsection describes PKI general messages using id-it-
caCerts. The intended use is specified in Section 4.3 of the
Lightweight CMP Profile [RFC9483].
Insert this section after Section 5.3.19.13 of [RFC4210]:
5.3.19.14. CA Certificates
This MAY be used by the client to get CA certificates.
GenMsg: {id-it 17}, < absent >
GenRep: {id-it 17}, SEQUENCE SIZE (1..MAX) OF
CMPCertificate | < absent >
2.15. New Section 5.3.19.15 - Root CA Certificate Update
The following subsection describes PKI general messages using id-it-
rootCaCert and id-it-rootCaKeyUpdate. The use is specified in
Section 4.3 of the Lightweight CMP Profile [RFC9483].
Insert this section after the new Section 5.3.19.14:
5.3.19.15. Root CA Certificate Update
This MAY be used by the client to get an update of a root CA
certificate, which is provided in the body of the request message.
In contrast to the ckuann message, this approach follows the request/
response model.
The EE SHOULD reference its current trust anchor in a TrustAnchor
structure in the request body, giving the root CA certificate if
available; otherwise, the public key value of the trust anchor is
given.
GenMsg: {id-it 20}, RootCaCertValue | < absent >
GenRep: {id-it 18}, RootCaKeyUpdateContent | < absent >
RootCaCertValue ::= CMPCertificate
RootCaKeyUpdateValue ::= RootCaKeyUpdateContent
RootCaKeyUpdateContent ::= SEQUENCE {
newWithNew CMPCertificate,
newWithOld [0] CMPCertificate OPTIONAL,
oldWithNew [1] CMPCertificate OPTIONAL
}
Note: In contrast to CAKeyUpdAnnContent, this type offers omitting
newWithOld and oldWithNew in the GenRep message, depending on the
needs of the EE.
2.16. New Section 5.3.19.16 - Certificate Request Template
The following subsection introduces the PKI general message using id-
it-certReqTemplate. Details are specified in Section 4.3 of the
Lightweight CMP Profile [RFC9483].
Insert this section after the new Section 5.3.19.15:
5.3.19.16. Certificate Request Template
This MAY be used by the client to get a template containing
requirements for certificate request attributes and extensions. The
controls id-regCtrl-algId and id-regCtrl-rsaKeyLen MAY contain
details on the types of subject public keys the CA is willing to
certify.
The id-regCtrl-algId control MAY be used to identify a cryptographic
algorithm (see Section 4.1.2.7 of [RFC5280]) other than
rsaEncryption. The algorithm field SHALL identify a cryptographic
algorithm. The contents of the optional parameters field will vary
according to the algorithm identified. For example, when the
algorithm is set to id-ecPublicKey, the parameters identify the
elliptic curve to be used; see [RFC5480].
The id-regCtrl-rsaKeyLen control SHALL be used for algorithm
rsaEncryption and SHALL contain the intended modulus bit length of
the RSA key.
GenMsg: {id-it 19}, < absent >
GenRep: {id-it 19}, CertReqTemplateContent | < absent >
CertReqTemplateValue ::= CertReqTemplateContent
CertReqTemplateContent ::= SEQUENCE {
certTemplate CertTemplate,
keySpec Controls OPTIONAL }
Controls ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
id-regCtrl-algId OBJECT IDENTIFIER ::= { iso(1)
identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) pkip(5) regCtrl(1) 11 }
AlgIdCtrl ::= AlgorithmIdentifier{ALGORITHM, {...}}
id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { iso(1)
identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) pkip(5) regCtrl(1) 12 }
RsaKeyLenCtrl ::= INTEGER (1..MAX)
The CertReqTemplateValue contains the prefilled certTemplate to be
used for a future certificate request. The publicKey field in the
certTemplate MUST NOT be used. In case the PKI management entity
wishes to specify supported public-key algorithms, the keySpec field
MUST be used. One AttributeTypeAndValue per supported algorithm or
RSA key length MUST be used.
Note: The controls ASN.1 type is defined in Section 6 of CRMF
[RFC4211].
2.17. New Section 5.3.19.17 - CRL Update Retrieval
The following subsection introduces the PKI general message using id-
it-crlStatusList and id-it-crls. Details are specified in
Section 4.3 of the Lightweight CMP Profile [RFC9483]. Insert this
section after the new Section 5.3.19.16:
5.3.19.17. CRL Update Retrieval
This MAY be used by the client to get new CRLs, specifying the source
of the CRLs and the thisUpdate value of the latest CRL it already
has, if available. A CRL source is given either by a
DistributionPointName or the GeneralNames of the issuing CA. The
DistributionPointName should be treated as an internal pointer to
identify a CRL that the server already has and not as a way to ask
the server to fetch CRLs from external locations. The server shall
only provide those CRLs that are more recent than the ones indicated
by the client.
GenMsg: {id-it 22}, SEQUENCE SIZE (1..MAX) OF CRLStatus
GenRep: {id-it 23}, SEQUENCE SIZE (1..MAX) OF
CertificateList | < absent >
CRLSource ::= CHOICE {
dpn [0] DistributionPointName,
issuer [1] GeneralNames }
CRLStatus ::= SEQUENCE {
source CRLSource,
thisUpdate Time OPTIONAL }
2.18. Update Section 5.3.21 - Error Message Content
Section 5.3.21 of [RFC4210] describes the regular use of error
messages. This document adds a use by a PKI management entity to
initiate delayed delivery in response to certConf, rr, and genm
requests and to error messages.
Replace the first sentence of the first paragraph with the following
one:
This data structure MAY be used by an EE, CA, or RA to convey error
information and by a PKI management entity to initiate delayed
delivery of responses.
Replace the second paragraph with the following text:
This message MAY be generated at any time during a PKI transaction.
If the client sends this request, the server MUST respond with a
PKIConfirm response or another ErrorMsg if any part of the header is
not valid. In case a PKI management entity sends an error message to
the EE with the pKIStatusInfo field containing the status "waiting",
the EE will initiate polling as described in Section 5.3.22.
Otherwise, both sides MUST treat this message as the end of the
transaction (if a transaction is in progress).
2.19. Replace Section 5.3.22 - Polling Request and Response
Section 5.3.22 of [RFC4210] describes when and how polling messages
are used for ir, cr, and kur messages. This document extends the
polling mechanism for outstanding responses to any kind of request
message. This update also fixes the inconsistent use of the terms
'pReq' vs. 'pollReq' and 'pRep' vs. 'pollRep'.
Replace Section 5.3.22 of [RFC4210] with following text:
This pair of messages is intended to handle scenarios in which the
client needs to poll the server to determine the status of an
outstanding response (i.e., when the "waiting" PKIStatus has been
received).
PollReqContent ::= SEQUENCE OF SEQUENCE {
certReqId INTEGER }
PollRepContent ::= SEQUENCE OF SEQUENCE {
certReqId INTEGER,
checkAfter INTEGER, -- time in seconds
reason PKIFreeText OPTIONAL }
In response to an ir, cr, p10cr, or kur request message, polling is
initiated with an ip, cp, or kup response message containing status
"waiting". For any type of request message, polling can be initiated
with an error response messages with status "waiting". The following
clauses describe how polling messages are used. It is assumed that
multiple certConf messages can be sent during transactions. There
will be one sent in response to each ip, cp, or kup that contains a
CertStatus for an issued certificate.
1 In response to an ip, cp, or kup message, an EE will send a
certConf for all issued certificates and expect a PKIconf for each
certConf. An EE will send a pollReq message in response to each
CertResponse element of an ip, cp, or kup message with status
"waiting" and in response to an error message with status
"waiting". Its certReqId MUST be either the index of a
CertResponse data structure with status "waiting" or -1, referring
to the complete response.
2 In response to a pollReq, a CA/RA will return an ip, cp, or kup if
one or more of the still pending requested certificates are ready
or the final response to some other type of request is available;
otherwise, it will return a pollRep.
3 If the EE receives a pollRep, it will wait for at least the number
of seconds given in the checkAfter field before sending another
pollReq.
4 If the EE receives an ip, cp, or kup, then it will be treated in
the same way as the initial response; if it receives any other
response, then this will be treated as the final response to the
original request.
The following client-side state machine describes polling for
individual CertResponse elements.
START
|
v
Send ir
| ip
v
Check status
of returned <------------------------+
certs |
| |
+------------------------>|<------------------+ |
| | | |
| (issued) v (waiting) | |
Add to <----------- Check CertResponse ------> Add to |
conf list for each certificate pending list |
/ |
/ |
(conf list) / (empty conf list) |
/ ip |
/ +-----------------+
(empty pending list) / | pollRep
END <---- Send certConf Send pollReq---------->Wait
| ^ ^ |
| | | |
+-----------------+ +---------------+
(pending list)
In the following exchange, the end entity is enrolling for two
certificates in one request.
Step End Entity PKI
--------------------------------------------------------------------
1 Format ir
2 -> ir ->
3 Handle ir
4 Manual intervention is
required for both certs
5 <- ip <-
6 Process ip
7 Format pollReq
8 -> pollReq ->
9 Check status of cert requests
10 Certificates not ready
11 Format pollRep
12 <- pollRep <-
13 Wait
14 Format pollReq
15 -> pollReq ->
16 Check status of cert requests
17 One certificate is ready
18 Format ip
19 <- ip <-
20 Handle ip
21 Format certConf
22 -> certConf ->
23 Handle certConf
24 Format ack
25 <- pkiConf <-
26 Format pollReq
27 -> pollReq ->
28 Check status of certificate
29 Certificate is ready
30 Format ip
31 <- ip <-
31 Handle ip
32 Format certConf
33 -> certConf ->
34 Handle certConf
35 Format ack
36 <- pkiConf <-
The following client-side state machine describes polling for a
complete response message.
Start
|
| Send request
|
+----------- Receive response ------------+
| |
| ip/cp/kup/error with | other
| status "waiting" | response
| |
v |
+------> Polling |
| | |
| | Send pollReq |
| | Receive response |
| | |
| pollRep | other response |
+-----------+------------------->+<-------------------+
|
v
Handle response
|
v
End
In the following exchange, the end entity is sending a general
message request, and the response is delayed by the server.
Step End Entity PKI
--------------------------------------------------------------------
1 Format genm
2 -> genm ->
3 Handle genm
4 delay in response is necessary
5 Format error message "waiting"
with certReqId set to -1
6 <- error <-
7 Process error
8 Format pollReq
9 -> pollReq ->
10 Check status of original request
general message response not ready
11 Format pollRep
12 <- pollRep <-
13 Wait
14 Format pollReq
15 -> pollReq ->
16 Check status of original request
general message response is ready
17 Format genp
18 <- genp <-
19 Handle genp
2.20. Update Section 7 - Version Negotiation
Section 7 of [RFC4210] describes the use of CMP versions. This
document describes the handling of the additional CMP version
cmp2021, which is introduced to indicate support of EnvelopedData and
hashAlg.
Replace the text of the second paragraph with the following text:
If a client knows the protocol version(s) supported by the server
(e.g., from a previous PKIMessage exchange or via some out-of-band
means), then it MUST send a PKIMessage with the highest version
supported by both it and the server. If a client does not know what
version(s) the server supports, then it MUST send a PKIMessage using
the highest version it supports with the following exception.
Version cmp2021 SHOULD only be used if cmp2021 syntax is needed for
the request being sent or for the expected response.
Note: Using cmp2000 as the default pvno is done to avoid extra
message exchanges for version negotiation and to foster compatibility
with cmp2000 implementations. Version cmp2021 syntax is only needed
if a message exchange uses hashAlg (in CertStatus) or EnvelopedData.
2.21. Update Section 7.1.1 - Clients Talking to RFC 2510 Servers
Section 7.1.1 of [RFC4210] describes the behavior of a client sending
a cmp2000 message talking to a cmp1999 server, as specified in
[RFC2510]. This document extends the section to clients with any
higher version than cmp1999.
Replace the first sentence of Section 7.1.1 of [RFC4210] with the
following text:
If, after sending a message with a protocol version number higher
than cmp1999, a client receives an ErrorMsgContent with a version of
cmp1999, then it MUST abort the current transaction.
2.22. Add Section 8.4 - Private Keys for Certificate Signing and CMP
Message Protection
The following subsection addresses the risk arising from reusing the
CA private key for CMP message protection.
Insert this section after Section 8.3 of [RFC4210] (Note: This fixes
Errata ID 5731):
8.4. Private Keys for Certificate Signing and CMP Message Protection
A CA should not reuse its certificate signing key for other purposes,
such as protecting CMP responses and TLS connections. This way,
exposure to other parts of the system and the number of uses of this
particularly critical key are reduced to a minimum.
2.23. Add Section 8.5 - Entropy of Random Numbers, Key Pairs, and
Shared Secret Information
The following subsection addresses the risk arising from low entropy
of random numbers, asymmetric keys, and shared secret information.
Insert this section after the new Section 8.4:
8.5. Entropy of Random Numbers, Key Pairs, and Shared Secret
Information
Implementations must generate nonces and private keys from random
input. The use of inadequate pseudorandom number generators (PRNGs)
to generate cryptographic keys can result in little or no security.
An attacker may find it much easier to reproduce the PRNG environment
that produced the keys and to search the resulting small set of
possibilities than brute-force searching the whole key space. As an
example of predictable random numbers, see [CVE-2008-0166];
consequences of low-entropy random numbers are discussed in Mining
Your Ps and Qs [MiningPsQs]. The generation of quality random
numbers is difficult. ISO/IEC 20543:2019 [ISO.20543-2019], NIST SP
800-90A Rev.1 [NIST_SP_800_90Ar1], BSI AIS 31 V2.0 [AIS31], and other
specifications offer valuable guidance in this area.
If shared secret information is generated by a cryptographically
secure random number generator (CSRNG), it is safe to assume that the
entropy of the shared secret information equals its bit length. If
no CSRNG is used, the entropy of shared secret information depends on
the details of the generation process and cannot be measured securely
after it has been generated. If user-generated passwords are used as
shared secret information, their entropy cannot be measured and are
typically insufficient for protected delivery of centrally generated
keys or trust anchors.
If the entropy of shared secret information protecting the delivery
of a centrally generated key pair is known, it should not be less
than the security strength of that key pair; if the shared secret
information is reused for different key pairs, the security of the
shared secret information should exceed the security strength of each
individual key pair.
For the case of a PKI management operation that delivers a new trust
anchor (e.g., a root CA certificate) using caPubs or genm that is (a)
not concluded in a timely manner or (b) where the shared secret
information is reused for several key management operations, the
entropy of the shared secret information, if known, should not be
less than the security strength of the trust anchor being managed by
the operation. The shared secret information should have an entropy
that at least matches the security strength of the key material being
managed by the operation. Certain use cases may require shared
secret information that may be of a low security strength, e.g., a
human-generated password. It is RECOMMENDED that such secret
information be limited to a single PKI management operation.
2.24. Add Section 8.6 - Trust Anchor Provisioning Using CMP Messages
The following subsection addresses the risk arising from in-band
provisioning of new trust anchors in a PKI management operation.
Insert this section after the new Section 8.5:
8.6. Trust Anchor Provisioning Using CMP Messages
A provider of trust anchors, which may be an RA involved in
configuration management of its clients, MUST NOT include to-be-
trusted CA certificates in a CMP message unless the specific
deployment scenario can ensure that it is adequate that the receiving
EE trusts these certificates, e.g., by loading them into its trust
store.
Whenever an EE receives in a CMP message a CA certificate to be used
as a trust anchor (for example in the caPubs field of a certificate
response or in a general response), it MUST properly authenticate the
message sender with existing trust anchor information without
requiring the new trust anchors included in the message.
Additionally, the EE MUST verify that the sender is an authorized
source of trust anchors. This authorization is governed by local
policy and typically indicated using shared secret information or
with a signature-based message protection using a certificate issued
by a PKI that is explicitly authorized for this purpose.
2.25. Add Section 8.7 - Authorizing Requests for Certificates with
Specific EKUs
The following subsection addresses the security considerations to
follow when authorizing requests for certificates containing specific
EKUs.
Insert this section after new Section 8.6:
8.7. Authorizing Requests for Certificates with Specific EKUs
When a CA issues a certificate containing extended key usage
extensions as defined in Section 4.5, this expresses delegation of an
authorization that originally is only with the CA certificate itself.
Such delegation is a very sensitive action in a PKI and therefore
special care must be taken when approving such certificate requests
to ensure that only legitimate entities receive a certificate
containing such an EKU.
2.26. Update Appendix B - The Use of Revocation Passphrase
Appendix B of [RFC4210] describes the use of the revocation
passphrase. As this document updates [RFC4210] to utilize the parent
structure EncryptedKey instead of EncryptedValue as described in
Section 2.7 above, the description is updated accordingly.
Replace the first bullet point of this section with the following
text:
* The OID and value specified in Section 5.3.19.9 MAY be sent in a
GenMsg message at any time or MAY be sent in the generalInfo field
of the PKIHeader of any PKIMessage at any time. (In particular,
the EncryptedKey structure as described in Section 5.2.2 may be
sent in the header of the certConf message that confirms
acceptance of certificates requested in an initialization request
or certificate request message.) This conveys a revocation
passphrase chosen by the entity to the relevant CA/RA. When
EnvelopedData is used, this is in the decrypted bytes of the
encryptedContent field. When EncryptedValue is used, this is in
the decrypted bytes of the encValue field. Furthermore, the
transfer is accomplished with appropriate confidentiality
characteristics.
Replace the third bullet point of this section with the following
text:
* Either the localKeyId attribute of EnvelopedData as specified in
[RFC2985] or the valueHint field of EncryptedValue MAY contain a
key identifier (chosen by the entity, along with the passphrase
itself) to assist in later retrieval of the correct passphrase
(e.g., when the revocation request is constructed by the entity
and received by the CA/RA).
2.27. Update Appendix C - Request Message Behavioral Clarifications
Appendix C of [RFC4210] provides clarifications to the request
message behavior. As this document updates [RFC4210] to utilize the
parent structure EncryptedKey instead of EncryptedValue as described
in Section 2.7 above, the description is updated accordingly.
Replace the comment within the ASN.1 syntax coming after the
definition of POPOSigningKey with the following text (Note: This
fixes Errata ID 2615):
-- **********
-- * For the purposes of this specification, the ASN.1 comment
-- * given in [RFC4211] pertains not only to certTemplate but
-- * also to the altCertTemplate control.
-- **********
-- * The signature (using "algorithmIdentifier") is on the
-- * DER-encoded value of poposkInput (i.e., the "value" OCTETs
-- * of the POPOSigningKeyInput DER). NOTE: If CertReqMsg
-- * certReq certTemplate (or the altCertTemplate control)
-- * contains the subject and publicKey values, then poposkInput
-- * MUST be omitted and the signature MUST be computed on the
-- * DER-encoded value of CertReqMsg certReq (or the DER-
-- * encoded value of AltCertTemplate). If
-- * certTemplate/altCertTemplate does not contain both the
-- * subject and public key values (i.e., if it contains only
-- * one of these or neither), then poposkInput MUST be present
-- * and MUST be signed.
-- **********
Replace the ASN.1 syntax of POPOPrivKey with the following text:
POPOPrivKey ::= CHOICE {
thisMessage [0] BIT STRING, -- deprecated
subsequentMessage [1] SubsequentMessage,
dhMAC [2] BIT STRING, -- deprecated
agreeMAC [3] PKMACValue,
encryptedKey [4] EnvelopedData }
-- **********
-- * When using CMP V2, the encrypted value MUST be transferred in
-- * the thisMessage field that is given as BIT STRING in [RFC4211],
-- * but it requires EncryptedValue. Therefore, this document makes
-- * the behavioral clarification for CMP V2 of specifying that the
-- * contents of "thisMessage" MUST be encoded as an
-- * EncryptedValue and then wrapped in a BIT STRING.
-- * When using CMP V3, the encrypted value MUST be transferred
-- * in the encryptedKey field, as specified in Section 5.2.2.
-- **********
2.28. Update Appendix D.1. - General Rules for Interpretation of These
Profiles
Appendix D.1 of [RFC4210] provides general rules for interpretation
of the PKI management messages profiles specified in Appendices D and
E of [RFC4210]. This document updates a sentence regarding the new
protocol version cmp2021.
Replace the last sentence of the first paragraph of the section with
the following text:
Mandatory fields are not mentioned if they have an obvious value
(e.g., in this version of these profiles, pvno is always cmp2000).
2.29. Update Appendix D.2. - Algorithm Use Profile
Appendix D.2 of [RFC4210] provides a list of algorithms that
implementations must support when claiming conformance with PKI
management message profiles, as specified in Appendix D.2 of CMP
[RFC4210]. This document redirects to the new algorithm profile, as
specified in Section 7.1 of CMP Algorithms [RFC9481].
Replace the text of the section with the following text:
D.2. Algorithm Use Profile
For specifications of algorithm identifiers and respective
conventions for conforming implementations, please refer to
Section 7.1 of CMP Algorithms [RFC9481].
2.30. Update Appendix D.4. - Initial Registration/Certification (Basic
Authenticated Scheme)
Appendix D.4 of [RFC4210] provides the initial registration/
certification scheme. This scheme shall continue using
EncryptedValue for backward compatibility reasons.
Replace the line specifying protectionAlg of the Initialization
Response message with the following text (Note: This fixes Errata ID
5201):
protectionAlg MSG_MAC_ALG
Replace the comment after the privateKey field of
crc[1].certifiedKeyPair in the syntax of the Initialization Response
message with the following text:
-- see Appendix C (Request Message Behavioral Clarifications)
-- for backward compatibility reasons, use EncryptedValue
3. Updates to RFC 6712 - HTTP Transfer for the Certificate Management
Protocol (CMP)
3.1. Update Section 1 - Introduction
To indicate and explain why delayed delivery of all kinds of
PKIMessages may be handled at transfer level and/or at CMP level, the
introduction of [RFC6712] is updated.
Replace the third paragraph of this section with the following text:
In addition to reliable transport, CMP requires connection and error
handling from the transfer protocol, which is all covered by HTTP.
Additionally, delayed delivery of CMP response messages may be
handled at transfer level, regardless of the message contents. Since
this document extends the polling mechanism specified in the second
version of CMP [RFC4210] to cover all types of PKI management
transactions, delays detected at application level may also be
handled within CMP, using pollReq and pollRep messages.
3.2. New Section 1.1 - Changes Since RFC 6712
The following subsection describes feature updates to [RFC6712].
They are related to the base specification. Hence, references to the
original sections in [RFC6712] are used whenever possible.
Insert this section after the current Section 1 of [RFC6712]:
1.1 Changes Since RFC 6712
The following updates are made in this document:
* Introduce the HTTP path '/.well-known/cmp'.
* Extend the URI structure.
3.3. Replace Section 3.6 - HTTP Request-URI
Section 3.6 of [RFC6712] specifies the used HTTP URIs. This document
introduces the HTTP path '/.well-known/cmp' and extends the URIs.
Replace the text of the section with the following text:
3.6. HTTP Request-URI
Each CMP server on a PKI management entity supporting HTTP or HTTPS
transfer MUST support the use of the path prefix '/.well-known/' as
defined in [RFC8615] and the registered name 'cmp' to ease
interworking in a multi-vendor environment.
The CMP client needs to be configured with sufficient information to
form the CMP server URI. This is at least the authority portion of
the URI, e.g., 'www.example.com:80', or the full operation path
segment of the PKI management entity. Additionally, OPTIONAL path
segments MAY be added after the registered application name as part
of the full operation path to provide further distinction. The path
segment 'p' followed by an arbitraryLabel <name> could, for example,
support the differentiation of specific CAs or certificate profiles.
Further path segments, e.g., as specified in the Lightweight CMP
Profile [RFC9483], could indicate PKI management operations using an
operationLabel <operation>. A valid, full CMP URI can look like
this:
http://www.example.com/.well-known/cmp
http://www.example.com/.well-known/cmp/<operation>
http://www.example.com/.well-known/cmp/p/<name>
http://www.example.com/.well-known/cmp/p/<name>/<operation>
4. IANA Considerations
4.1. Updates to the ASN.1 Modules in RFCs 4210 and 5912
This document updates the ASN.1 modules of Appendix F of [RFC4210]
and Section 9 of [RFC5912] as shown in Appendixes A.1 and A.2 of this
document, respectively. The OIDs 99 (id-mod-cmp2021-88) and 100 (id-
mod-cmp2021-02) have been registered in the "SMI Security for PKIX
Module Identifier" registry to identify the updated ASN.1 modules.
4.2. Updates to the IANA Considerations of RFC 4210
This document updates the IANA Consideration sections of [RFC4210] by
adding this content.
4.2.1. SMI Security for PKIX Extended Key Purpose Registry
IANA has registered the following new entry in the "SMI Security for
PKIX Extended Key Purpose" registry (see
<https://www.iana.org/assignments/smi-numbers>, as defined in
[RFC7299]:
+=========+=============+============+
| Decimal | Description | References |
+=========+=============+============+
| 32 | id-kp-cmKGA | RFC 9480 |
+---------+-------------+------------+
Table 1: Addition to the SMI
Security for PKIX Extended Key
Purpose
4.2.2. SMI Security for PKIX CMP Information Types
IANA has registered the following new entries in the "SMI Security
for PKIX CMP Information Types" registry (see
<https://www.iana.org/assignments/smi-numbers>), as defined in
[RFC7299]:
+=========+=======================+============+
| Decimal | Description | References |
+=========+=======================+============+
| 17 | id-it-caCerts | RFC 9480 |
+---------+-----------------------+------------+
| 18 | id-it-rootCaKeyUpdate | RFC 9480 |
+---------+-----------------------+------------+
| 19 | id-it-certReqTemplate | RFC 9480 |
+---------+-----------------------+------------+
| 20 | id-it-rootCaCert | RFC 9480 |
+---------+-----------------------+------------+
| 21 | id-it-certProfile | RFC 9480 |
+---------+-----------------------+------------+
| 22 | id-it-crlStatusList | RFC 9480 |
+---------+-----------------------+------------+
| 23 | id-it-crls | RFC 9480 |
+---------+-----------------------+------------+
Table 2: Additions to the PKIX CMP
Information Types Registry
4.2.3. SMI Security for PKIX CRMF Registration Controls
IANA has registered the following new entries in the "SMI Security
for PKIX CRMF Registration Controls" registry (see
<https://www.iana.org/assignments/smi-numbers>), as defined in
[RFC7299]:
+=========+======================+============+
| Decimal | Description | References |
+=========+======================+============+
| 11 | id-regCtrl-algId | RFC 9480 |
+---------+----------------------+------------+
| 12 | id-regCtrl-rsaKeyLen | RFC 9480 |
+---------+----------------------+------------+
Table 3: Addition to the PKIX CRMF
Registration Controls Registry
4.3. Updates to the IANA Considerations of RFC 6712
This document contains an update to the IANA Considerations sections
of [RFC6712] by adding this content.
4.3.1. Well-Known URIs
IANA has registered the following new entry in the "Well-Known URIs"
registry (see <https://www.iana.org/assignments/well-known-uris>), as
defined in [RFC8615]:
URI Suffix: cmp
Change Controller: IETF
Reference: [RFC9480] [RFC9482]
Status: permanent
Related Information: CMP has a registry at
<https://www.iana.org/assignments/cmp>
4.3.2. Certificate Management Protocol (CMP) Registry
This document defines a new protocol registry group entitled
"Certificate Management Protocol (CMP)" (at
<https://www.iana.org/assignments/cmp>) with a new "CMP Well-Known
URI Path Segments" registry containing three columns: Path Segment,
Description, and Reference. New items can be added using the
Specification Required [RFC8615] process. The initial entry of this
registry is:
Path Segment: p
Description: Indicates that the next path segment specifies, e.g., a
CA or certificate profile name
Reference: [RFC9480] [RFC9482]
5. Security Considerations
The security considerations of [RFC4210] are extended in Section 2.22
to Section 2.24. No security considerations updates of [RFC6712]
were required.
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC2510] Adams, C. and S. Farrell, "Internet X.509 Public Key
Infrastructure Certificate Management Protocols",
RFC 2510, DOI 10.17487/RFC2510, March 1999,
<https://www.rfc-editor.org/info/rfc2510>.
[RFC2985] Nystrom, M. and B. Kaliski, "PKCS #9: Selected Object
Classes and Attribute Types Version 2.0", RFC 2985,
DOI 10.17487/RFC2985, November 2000,
<https://www.rfc-editor.org/info/rfc2985>.
[RFC2986] Nystrom, M. and B. Kaliski, "PKCS #10: Certification
Request Syntax Specification Version 1.7", RFC 2986,
DOI 10.17487/RFC2986, November 2000,
<https://www.rfc-editor.org/info/rfc2986>.
[RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November
2003, <https://www.rfc-editor.org/info/rfc3629>.
[RFC4210] Adams, C., Farrell, S., Kause, T., and T. Mononen,
"Internet X.509 Public Key Infrastructure Certificate
Management Protocol (CMP)", RFC 4210,
DOI 10.17487/RFC4210, September 2005,
<https://www.rfc-editor.org/info/rfc4210>.
[RFC4211] Schaad, J., "Internet X.509 Public Key Infrastructure
Certificate Request Message Format (CRMF)", RFC 4211,
DOI 10.17487/RFC4211, September 2005,
<https://www.rfc-editor.org/info/rfc4211>.
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
<https://www.rfc-editor.org/info/rfc5280>.
[RFC5480] Turner, S., Brown, D., Yiu, K., Housley, R., and T. Polk,
"Elliptic Curve Cryptography Subject Public Key
Information", RFC 5480, DOI 10.17487/RFC5480, March 2009,
<https://www.rfc-editor.org/info/rfc5480>.
[RFC5652] Housley, R., "Cryptographic Message Syntax (CMS)", STD 70,
RFC 5652, DOI 10.17487/RFC5652, September 2009,
<https://www.rfc-editor.org/info/rfc5652>.
[RFC5958] Turner, S., "Asymmetric Key Packages", RFC 5958,
DOI 10.17487/RFC5958, August 2010,
<https://www.rfc-editor.org/info/rfc5958>.
[RFC6402] Schaad, J., "Certificate Management over CMS (CMC)
Updates", RFC 6402, DOI 10.17487/RFC6402, November 2011,
<https://www.rfc-editor.org/info/rfc6402>.
[RFC6712] Kause, T. and M. Peylo, "Internet X.509 Public Key
Infrastructure -- HTTP Transfer for the Certificate
Management Protocol (CMP)", RFC 6712,
DOI 10.17487/RFC6712, September 2012,
<https://www.rfc-editor.org/info/rfc6712>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8615] Nottingham, M., "Well-Known Uniform Resource Identifiers
(URIs)", RFC 8615, DOI 10.17487/RFC8615, May 2019,
<https://www.rfc-editor.org/info/rfc8615>.
[RFC8933] Housley, R., "Update to the Cryptographic Message Syntax
(CMS) for Algorithm Identifier Protection", RFC 8933,
DOI 10.17487/RFC8933, October 2020,
<https://www.rfc-editor.org/info/rfc8933>.
[RFC9045] Housley, R., "Algorithm Requirements Update to the
Internet X.509 Public Key Infrastructure Certificate
Request Message Format (CRMF)", RFC 9045,
DOI 10.17487/RFC9045, June 2021,
<https://www.rfc-editor.org/info/rfc9045>.
[RFC9481] Brockhaus, H., Aschauer, H., Ounsworth, M., and J. Gray,
"Certificate Management Protocol (CMP) Algorithms",
RFC 9481, DOI 10.17487/RFC9481, November 2023,
<https://www.rfc-editor.org/info/rfc9481>.
[RFC9482] Sahni, M., Ed. and S. Tripathi, Ed., "Constrained
Application Protocol (CoAP) Transfer for the Certificate
Management Protocol", RFC 9482, DOI 10.17487/RFC9482,
November 2023, <https://www.rfc-editor.org/info/rfc9482>.
6.2. Informative References
[AIS31] Killmann, W. and W. Schindler, "A proposal for:
Functionality classes for random number generators -
Version 2.0", September 2011,
<https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/
Zertifizierung/Interpretationen/AIS_31_Functionality_class
es_for_random_number_generators_e.pdf>.
[CVE-2008-0166]
National Institute of Science and Technology (NIST),
"National Vulnerability Database - CVE-2008-0166", May
2008, <https://nvd.nist.gov/vuln/detail/CVE-2008-0166>.
[HTTP-CMP] Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray,
"Internet X.509 Public Key Infrastructure -- HTTP Transfer
for the Certificate Management Protocol (CMP)", Work in
Progress, Internet-Draft, draft-ietf-lamps-rfc6712bis-03,
10 February 2023, <https://datatracker.ietf.org/doc/html/
draft-ietf-lamps-rfc6712bis-03>.
[ISO.20543-2019]
International Organization for Standardization (ISO),
"Information technology -- Security techniques -- Test and
analysis methods for random bit generators within ISO/IEC
19790 and ISO/IEC 15408", ISO/IEC 20543:2019, October
2019.
[MiningPsQs]
Heninger, N., Durumeric, Z., Wustrow, E., and J. A.
Halderman, "Mining Your Ps and Qs: Detection of Widespread
Weak Keys in Network Devices", Security'12: Proceedings of
the 21st USENIX conference on Security symposium, August
2012, <https://www.usenix.org/conference/usenixsecurity12/
technical-sessions/presentation/heninger>.
[NIST_SP_800_90Ar1]
Barker, E. B., Kelsey, J. M., and NIST, "Recommendation
for Random Number Generation Using Deterministic Random
Bit Generators", NIST Special Publications
(General) 800-90Ar1, DOI 10.6028/NIST.SP.800-90Ar1, June
2015,
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/
NIST.SP.800-90Ar1.pdf>.
[PKIX-CMP] Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray,
"Internet X.509 Public Key Infrastructure -- Certificate
Management Protocol (CMP)", Work in Progress, Internet-
Draft, draft-ietf-lamps-rfc4210bis-07, 19 June 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-lamps-
rfc4210bis-07>.
[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
Hashing for Message Authentication", RFC 2104,
DOI 10.17487/RFC2104, February 1997,
<https://www.rfc-editor.org/info/rfc2104>.
[RFC2202] Cheng, P. and R. Glenn, "Test Cases for HMAC-MD5 and HMAC-
SHA-1", RFC 2202, DOI 10.17487/RFC2202, September 1997,
<https://www.rfc-editor.org/info/rfc2202>.
[RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the
Public Key Infrastructure Using X.509 (PKIX)", RFC 5912,
DOI 10.17487/RFC5912, June 2010,
<https://www.rfc-editor.org/info/rfc5912>.
[RFC7299] Housley, R., "Object Identifier Registry for the PKIX
Working Group", RFC 7299, DOI 10.17487/RFC7299, July 2014,
<https://www.rfc-editor.org/info/rfc7299>.
[RFC9483] Brockhaus, H., von Oheimb, D., and S. Fries, "Lightweight
Certificate Management Protocol (CMP) Profile", RFC 9483,
DOI 10.17487/RFC9483, November 2023,
<https://www.rfc-editor.org/info/rfc9483>.
Appendix A. ASN.1 Modules
A.1. Update to RFC 4210 - 1988 ASN.1 Module
This section contains the updated ASN.1 module for [RFC4210]. This
module replaces the module in Appendix F of that document. Although
a 2002 ASN.1 module is provided, this 1988 ASN.1 module remains the
normative module, as per the policy of the PKIX Working Group.
PKIXCMP {iso(1) identified-organization(3)
dod(6) internet(1) security(5) mechanisms(5) pkix(7)
id-mod(0) id-mod-cmp2021-88(99)}
DEFINITIONS EXPLICIT TAGS ::=
BEGIN
-- EXPORTS ALL --
IMPORTS
Certificate, CertificateList, Extensions, Name, Time,
AlgorithmIdentifier, id-kp
--, UTF8String -- -- if required; otherwise, comment out
FROM PKIX1Explicit88 {iso(1) identified-organization(3)
dod(6) internet(1) security(5) mechanisms(5) pkix(7)
id-mod(0) id-pkix1-explicit-88(18)}
-- The import of Name is added to define CertificationRequest
-- instead of importing it from PKCS #10 [RFC2986].
DistributionPointName, GeneralNames, GeneralName, KeyIdentifier
FROM PKIX1Implicit88 {iso(1) identified-organization(3)
dod(6) internet(1) security(5) mechanisms(5) pkix(7)
id-mod(0) id-pkix1-implicit-88(19)}
CertTemplate, PKIPublicationInfo, EncryptedKey, CertId,
CertReqMessages, Controls, AttributeTypeAndValue, id-regCtrl
FROM PKIXCRMF-2005 {iso(1) identified-organization(3)
dod(6) internet(1) security(5) mechanisms(5) pkix(7)
id-mod(0) id-mod-crmf2005(36)}
-- The import of EncryptedKey is added due to the updates made
-- in CMP Updates [RFC9480]. EncryptedValue does not need to
-- be imported anymore and is therefore removed here.
-- Also, see the behavioral clarifications to CRMF codified in
-- Appendix C of this specification.
EnvelopedData, SignedData, Attribute
FROM CryptographicMessageSyntax2004 { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
smime(16) modules(0) cms-2004(24) }
-- The import of EnvelopedData and SignedData is added due to
-- the updates made in CMP Updates [RFC9480].
-- The import of Attribute is added to define
-- CertificationRequest instead of importing it from
-- PKCS #10 [RFC2986].
;
-- The rest of the module contains locally defined OIDs and
-- constructs:
CMPCertificate ::= CHOICE {
x509v3PKCert Certificate
}
-- This syntax, while bits-on-the-wire compatible with the
-- standard X.509 definition of "Certificate", allows the
-- possibility of future certificate types (such as X.509
-- attribute certificates, card-verifiable
-- certificates, or other kinds of certificates) within this
-- Certificate Management Protocol, should a need ever arise to
-- support such generality. Those implementations that do not
-- foresee a need to ever support other certificate types MAY, if
-- they wish, comment out the above structure and "uncomment" the
-- following one prior to compiling this ASN.1 module. (Note that
-- interoperability with implementations that don't do this will be
-- unaffected by this change.)
-- CMPCertificate ::= Certificate
PKIMessage ::= SEQUENCE {
header PKIHeader,
body PKIBody,
protection [0] PKIProtection OPTIONAL,
extraCerts [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
OPTIONAL
}
PKIMessages ::= SEQUENCE SIZE (1..MAX) OF PKIMessage
PKIHeader ::= SEQUENCE {
pvno INTEGER { cmp1999(1), cmp2000(2),
cmp2021(3) },
sender GeneralName,
-- identifies the sender
recipient GeneralName,
-- identifies the intended recipient
messageTime [0] GeneralizedTime OPTIONAL,
-- time of production of this message (used when the sender
-- believes that the transport will be "suitable", i.e.,
-- that the time will still be meaningful upon receipt)
protectionAlg [1] AlgorithmIdentifier OPTIONAL,
-- algorithm used for the calculation of protection bits
senderKID [2] KeyIdentifier OPTIONAL,
recipKID [3] KeyIdentifier OPTIONAL,
-- to identify specific keys used for protection
transactionID [4] OCTET STRING OPTIONAL,
-- identifies the transaction, i.e., this will be the same in
-- corresponding request, response, certConf, and PKIConf
-- messages
senderNonce [5] OCTET STRING OPTIONAL,
recipNonce [6] OCTET STRING OPTIONAL,
-- nonces used to provide replay protection, senderNonce
-- is inserted by the creator of this message; recipNonce
-- is a nonce previously inserted in a related message by
-- the intended recipient of this message.
freeText [7] PKIFreeText OPTIONAL,
-- this may be used to indicate context-specific instructions
-- (this field is intended for human consumption)
generalInfo [8] SEQUENCE SIZE (1..MAX) OF
InfoTypeAndValue OPTIONAL
-- this may be used to convey context-specific information
-- (this field not primarily intended for human consumption)
}
PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
-- text encoded as a UTF-8 string [RFC3629]
PKIBody ::= CHOICE { -- message-specific body elements
ir [0] CertReqMessages, --Initialization Request
ip [1] CertRepMessage, --Initialization Response
cr [2] CertReqMessages, --Certification Request
cp [3] CertRepMessage, --Certification Response
p10cr [4] CertificationRequest, --imported from [RFC2986]
popdecc [5] POPODecKeyChallContent, --pop Challenge
popdecr [6] POPODecKeyRespContent, --pop Response
kur [7] CertReqMessages, --Key Update Request
kup [8] CertRepMessage, --Key Update Response
krr [9] CertReqMessages, --Key Recovery Request
krp [10] KeyRecRepContent, --Key Recovery Response
rr [11] RevReqContent, --Revocation Request
rp [12] RevRepContent, --Revocation Response
ccr [13] CertReqMessages, --Cross-Cert. Request
ccp [14] CertRepMessage, --Cross-Cert. Response
ckuann [15] CAKeyUpdAnnContent, --CA Key Update Ann.
cann [16] CertAnnContent, --Certificate Ann.
rann [17] RevAnnContent, --Revocation Ann.
crlann [18] CRLAnnContent, --CRL Announcement
pkiconf [19] PKIConfirmContent, --Confirmation
nested [20] NestedMessageContent, --Nested Message
genm [21] GenMsgContent, --General Message
genp [22] GenRepContent, --General Response
error [23] ErrorMsgContent, --Error Message
certConf [24] CertConfirmContent, --Certificate Confirm
pollReq [25] PollReqContent, --Polling Request
pollRep [26] PollRepContent --Polling Response
}
PKIProtection ::= BIT STRING
ProtectedPart ::= SEQUENCE {
header PKIHeader,
body PKIBody
}
id-PasswordBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 13}
PBMParameter ::= SEQUENCE {
salt OCTET STRING,
-- Note: Implementations MAY wish to limit acceptable sizes
-- of this string to values appropriate for their environment
-- in order to reduce the risk of denial-of-service attacks.
owf AlgorithmIdentifier,
-- AlgId for a One-Way Function (OWF)
iterationCount INTEGER,
-- number of times the OWF is applied
-- Note: Implementations MAY wish to limit acceptable sizes
-- of this integer to values appropriate for their environment
-- in order to reduce the risk of denial-of-service attacks.
mac AlgorithmIdentifier
-- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
} -- or HMAC [RFC2104, RFC2202])
id-DHBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 30}
DHBMParameter ::= SEQUENCE {
owf AlgorithmIdentifier,
-- AlgId for a One-Way Function
mac AlgorithmIdentifier
-- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
} -- or HMAC [RFC2104, RFC2202])
NestedMessageContent ::= PKIMessages
PKIStatus ::= INTEGER {
accepted (0),
-- you got exactly what you asked for
grantedWithMods (1),
-- you got something like what you asked for; the
-- requester is responsible for ascertaining the differences
rejection (2),
-- you don't get it, more information elsewhere in the message
waiting (3),
-- the request body part has not yet been processed; expect to
-- hear more later (note: proper handling of this status
-- response MAY use the polling req/rep PKIMessages specified
-- in Section 5.3.22 of [RFC4210]; alternatively, polling in the
-- underlying transport layer MAY have some utility in this
-- regard)
revocationWarning (4),
-- this message contains a warning that a revocation is
-- imminent
revocationNotification (5),
-- notification that a revocation has occurred
keyUpdateWarning (6)
-- update already done for the oldCertId specified in
-- CertReqMsg
}
PKIFailureInfo ::= BIT STRING {
-- since we can fail in more than one way!
-- More codes may be added in the future if/when required.
badAlg (0),
-- unrecognized or unsupported algorithm identifier
badMessageCheck (1),
-- integrity check failed (e.g., signature did not verify)
badRequest (2),
-- transaction not permitted or supported
badTime (3),
-- messageTime was not sufficiently close to the system time,
-- as defined by local policy
badCertId (4),
-- no certificate could be found matching the provided criteria
badDataFormat (5),
-- the data submitted has the wrong format
wrongAuthority (6),
-- the authority indicated in the request is different from the
-- one creating the response token
incorrectData (7),
-- the requester's data is incorrect (for notary services)
missingTimeStamp (8),
-- when the timestamp is missing but should be there
-- (by policy)
badPOP (9),
-- the proof-of-possession failed
certRevoked (10),
-- the certificate has already been revoked
certConfirmed (11),
-- the certificate has already been confirmed
wrongIntegrity (12),
-- not valid integrity, based on the password instead of the
-- signature or vice versa
badRecipientNonce (13),
-- not valid recipient nonce, either missing or wrong value
timeNotAvailable (14),
-- the time source of the Time Stamping Authority (TSA) is
-- not available
unacceptedPolicy (15),
-- the requested TSA policy is not supported by the TSA
unacceptedExtension (16),
-- the requested extension is not supported by the TSA
addInfoNotAvailable (17),
-- the additional information requested could not be
-- understood or is not available
badSenderNonce (18),
-- not valid sender nonce, either missing or wrong size
badCertTemplate (19),
-- not valid cert. template or missing mandatory information
signerNotTrusted (20),
-- signer of the message unknown or not trusted
transactionIdInUse (21),
-- the transaction identifier is already in use
unsupportedVersion (22),
-- the version of the message is not supported
notAuthorized (23),
-- the sender was not authorized to make the preceding
-- request or perform the preceding action
systemUnavail (24),
-- the request cannot be handled due to system unavailability
systemFailure (25),
-- the request cannot be handled due to system failure
duplicateCertReq (26)
-- the certificate cannot be issued because a duplicate
-- certificate already exists
}
PKIStatusInfo ::= SEQUENCE {
status PKIStatus,
statusString PKIFreeText OPTIONAL,
failInfo PKIFailureInfo OPTIONAL
}
OOBCert ::= CMPCertificate
OOBCertHash ::= SEQUENCE {
hashAlg [0] AlgorithmIdentifier OPTIONAL,
certId [1] CertId OPTIONAL,
hashVal BIT STRING
-- hashVal is calculated over the DER encoding of the
-- self-signed certificate with the identifier certID.
}
POPODecKeyChallContent ::= SEQUENCE OF Challenge
-- one Challenge per encryption key certification request (in the
-- same order as these requests appear in CertReqMessages)
Challenge ::= SEQUENCE {
owf AlgorithmIdentifier OPTIONAL,
-- MUST be present in the first Challenge; MAY be omitted in
-- any subsequent Challenge in POPODecKeyChallContent (if
-- omitted, then the owf used in the immediately preceding
-- Challenge is to be used)
witness OCTET STRING,
-- the result of applying the One-Way Function (owf) to a
-- randomly generated INTEGER, A (Note that a different
-- INTEGER MUST be used for each Challenge.)
challenge OCTET STRING
-- the encryption (under the public key for which the cert.
-- request is being made) of Rand
}
-- Rand was added in CMP Updates [RFC9480]
Rand ::= SEQUENCE {
-- Rand is encrypted under the public key to form the challenge
-- in POPODecKeyChallContent
int INTEGER,
-- the randomly generated INTEGER A (above)
sender GeneralName
-- the sender's name (as included in PKIHeader)
}
POPODecKeyRespContent ::= SEQUENCE OF INTEGER
-- One INTEGER per encryption key certification request (in the
-- same order as these requests appear in CertReqMessages). The
-- retrieved INTEGER A (above) is returned to the sender of the
-- corresponding Challenge.
CertRepMessage ::= SEQUENCE {
caPubs [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
OPTIONAL,
response SEQUENCE OF CertResponse
}
CertificationRequest ::= SEQUENCE {
certificationRequestInfo SEQUENCE {
version INTEGER,
subject Name,
subjectPublicKeyInfo SEQUENCE {
algorithm AlgorithmIdentifier,
subjectPublicKey BIT STRING },
attributes [0] IMPLICIT SET OF Attribute },
signatureAlgorithm AlgorithmIdentifier,
signature BIT STRING
}
CertResponse ::= SEQUENCE {
certReqId INTEGER,
-- to match this response with the corresponding request (a value
-- of -1 is to be used if certReqId is not specified in the
-- corresponding request, which can only be a p10cr)
status PKIStatusInfo,
certifiedKeyPair CertifiedKeyPair OPTIONAL,
rspInfo OCTET STRING OPTIONAL
-- analogous to the id-regInfo-utf8Pairs string defined
-- for regInfo in CertReqMsg [RFC4211]
}
CertifiedKeyPair ::= SEQUENCE {
certOrEncCert CertOrEncCert,
privateKey [0] EncryptedKey OPTIONAL,
-- See [RFC4211] for comments on encoding.
-- Changed from Encrypted Value to EncryptedKey as a CHOICE of
-- EncryptedValue and EnvelopedData due to the changes made in
-- CMP Updates [RFC9480].
-- Using the choice EncryptedValue is bit-compatible to the
-- syntax without this change.
publicationInfo [1] PKIPublicationInfo OPTIONAL
}
CertOrEncCert ::= CHOICE {
certificate [0] CMPCertificate,
encryptedCert [1] EncryptedKey
-- Changed from Encrypted Value to EncryptedKey as a CHOICE of
-- EncryptedValue and EnvelopedData due to the changes made in
-- CMP Updates [RFC9480].
-- Using the choice EncryptedValue is bit-compatible to the
-- syntax without this change.
}
KeyRecRepContent ::= SEQUENCE {
status PKIStatusInfo,
newSigCert [0] CMPCertificate OPTIONAL,
caCerts [1] SEQUENCE SIZE (1..MAX) OF
CMPCertificate OPTIONAL,
keyPairHist [2] SEQUENCE SIZE (1..MAX) OF
CertifiedKeyPair OPTIONAL
}
RevReqContent ::= SEQUENCE OF RevDetails
RevDetails ::= SEQUENCE {
certDetails CertTemplate,
-- allows the requester to specify as much as they can about
-- the cert. for which revocation is requested
-- (e.g., for cases in which serialNumber is not available)
crlEntryDetails Extensions OPTIONAL
-- requested crlEntryExtensions
}
RevRepContent ::= SEQUENCE {
status SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
-- in the same order as was sent in RevReqContent
revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId
OPTIONAL,
-- IDs for which revocation was requested
-- (same order as status)
crls [1] SEQUENCE SIZE (1..MAX) OF CertificateList
OPTIONAL
-- the resulting CRLs (there may be more than one)
}
CAKeyUpdAnnContent ::= SEQUENCE {
oldWithNew CMPCertificate, -- old pub signed with new priv
newWithOld CMPCertificate, -- new pub signed with old priv
newWithNew CMPCertificate -- new pub signed with new priv
}
CertAnnContent ::= CMPCertificate
RevAnnContent ::= SEQUENCE {
status PKIStatus,
certId CertId,
willBeRevokedAt GeneralizedTime,
badSinceDate GeneralizedTime,
crlDetails Extensions OPTIONAL
-- extra CRL details (e.g., crl number, reason, location, etc.)
}
CRLAnnContent ::= SEQUENCE OF CertificateList
CertConfirmContent ::= SEQUENCE OF CertStatus
CertStatus ::= SEQUENCE {
certHash OCTET STRING,
-- the hash of the certificate, using the same hash algorithm
-- as is used to create and verify the certificate signature
certReqId INTEGER,
-- to match this confirmation with the corresponding req/rep
statusInfo PKIStatusInfo OPTIONAL,
hashAlg [0] AlgorithmIdentifier OPTIONAL
-- the hash algorithm to use for calculating certHash
-- SHOULD NOT be used in all cases where the AlgorithmIdentifier
-- of the certificate signature specifies a hash algorithm
}
PKIConfirmContent ::= NULL
-- CertReqTemplateContent, id-regCtrl-algId, id-regCtrl-algId, and
-- id-regCtrl-rsaKeyLen were added in CMP Updates [RFC9480]
CertReqTemplateContent ::= SEQUENCE {
certTemplate CertTemplate,
-- prefilled certTemplate structure elements
-- The SubjectPublicKeyInfo field in the certTemplate MUST NOT
-- be used.
keySpec Controls OPTIONAL
-- MAY be used to specify supported algorithms
-- Controls ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
-- as specified in CRMF [RFC4211]
}
id-regCtrl-altCertTemplate OBJECT IDENTIFIER ::= { id-regCtrl 7 }
AltCertTemplate ::= AttributeTypeAndValue
-- specifies a template for a certificate other than an X.509v3
-- public key certificate
id-regCtrl-algId OBJECT IDENTIFIER ::= { id-regCtrl 11 }
AlgIdCtrl ::= AlgorithmIdentifier
-- SHALL be used to specify supported algorithms other than RSA
id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { id-regCtrl 12 }
RsaKeyLenCtrl ::= INTEGER (1..MAX)
-- SHALL be used to specify supported RSA key lengths
-- RootCaKeyUpdateContent, CRLSource, and CRLStatus were added in
-- CMP Updates [RFC9480]
RootCaKeyUpdateContent ::= SEQUENCE {
newWithNew CMPCertificate,
-- new root CA certificate
newWithOld [0] CMPCertificate OPTIONAL,
-- X.509 certificate containing the new public root CA key
-- signed with the old private root CA key
oldWithNew [1] CMPCertificate OPTIONAL
-- X.509 certificate containing the old public root CA key
-- signed with the new private root CA key
}
CRLSource ::= CHOICE {
dpn [0] DistributionPointName,
issuer [1] GeneralNames }
CRLStatus ::= SEQUENCE {
source CRLSource,
thisUpdate Time OPTIONAL }
InfoTypeAndValue ::= SEQUENCE {
infoType OBJECT IDENTIFIER,
infoValue ANY DEFINED BY infoType OPTIONAL
}
-- Example InfoTypeAndValue contents include, but are not limited
-- to, the following (uncomment in this ASN.1 module and use as
-- appropriate for a given environment):
--
-- id-it-caProtEncCert OBJECT IDENTIFIER ::= {id-it 1}
-- CAProtEncCertValue ::= CMPCertificate
-- id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
-- SignKeyPairTypesValue ::= SEQUENCE SIZE (1..MAX) OF
-- AlgorithmIdentifier
-- id-it-encKeyPairTypes OBJECT IDENTIFIER ::= {id-it 3}
-- EncKeyPairTypesValue ::= SEQUENCE SIZE (1..MAX) OF
-- AlgorithmIdentifier
-- id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
-- PreferredSymmAlgValue ::= AlgorithmIdentifier
-- id-it-caKeyUpdateInfo OBJECT IDENTIFIER ::= {id-it 5}
-- CAKeyUpdateInfoValue ::= CAKeyUpdAnnContent
-- id-it-currentCRL OBJECT IDENTIFIER ::= {id-it 6}
-- CurrentCRLValue ::= CertificateList
-- id-it-unsupportedOIDs OBJECT IDENTIFIER ::= {id-it 7}
-- UnsupportedOIDsValue ::= SEQUENCE SIZE (1..MAX) OF
-- OBJECT IDENTIFIER
-- id-it-keyPairParamReq OBJECT IDENTIFIER ::= {id-it 10}
-- KeyPairParamReqValue ::= OBJECT IDENTIFIER
-- id-it-keyPairParamRep OBJECT IDENTIFIER ::= {id-it 11}
-- KeyPairParamRepValue ::= AlgorithmIdentifier
-- id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12}
-- RevPassphraseValue ::= EncryptedKey
-- - Changed from Encrypted Value to EncryptedKey as a CHOICE
-- - of EncryptedValue and EnvelopedData due to the changes
-- - made in CMP Updates [RFC9480].
-- - Using the choice EncryptedValue is bit-compatible to the
-- - syntax without this change.
-- id-it-implicitConfirm OBJECT IDENTIFIER ::= {id-it 13}
-- ImplicitConfirmValue ::= NULL
-- id-it-confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14}
-- ConfirmWaitTimeValue ::= GeneralizedTime
-- id-it-origPKIMessage OBJECT IDENTIFIER ::= {id-it 15}
-- OrigPKIMessageValue ::= PKIMessages
-- id-it-suppLangTags OBJECT IDENTIFIER ::= {id-it 16}
-- SuppLangTagsValue ::= SEQUENCE OF UTF8String
-- id-it-caCerts OBJECT IDENTIFIER ::= {id-it 17}
-- CaCertsValue ::= SEQUENCE SIZE (1..MAX) OF
-- CMPCertificate
-- - id-it-caCerts added in CMP Updates [RFC9480]
-- id-it-rootCaKeyUpdate OBJECT IDENTIFIER ::= {id-it 18}
-- RootCaKeyUpdateValue ::= RootCaKeyUpdateContent
-- - id-it-rootCaKeyUpdate added in CMP Updates [RFC9480]
-- id-it-certReqTemplate OBJECT IDENTIFIER ::= {id-it 19}
-- CertReqTemplateValue ::= CertReqTemplateContent
-- - id-it-certReqTemplate added in CMP Updates [RFC9480]
-- id-it-rootCaCert OBJECT IDENTIFIER ::= {id-it 20}
-- RootCaCertValue ::= CMPCertificate
-- - id-it-rootCaCert added in CMP Updates [RFC9480]
-- id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21}
-- CertProfileValue ::= SEQUENCE SIZE (1..MAX) OF
-- UTF8String
-- - id-it-certProfile added in CMP Updates [RFC9480]
-- id-it-crlStatusList OBJECT IDENTIFIER ::= {id-it 22}
-- CRLStatusListValue ::= SEQUENCE SIZE (1..MAX) OF
-- CRLStatus
-- - id-it-crlStatusList added in CMP Updates [RFC9480]
-- id-it-crls OBJECT IDENTIFIER ::= {id-it 23}
-- CRLsValue ::= SEQUENCE SIZE (1..MAX) OF
-- CertificateList
-- - id-it-crls added in CMP Updates [RFC9480]
--
-- where
--
-- id-pkix OBJECT IDENTIFIER ::= {
-- iso(1) identified-organization(3)
-- dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
-- and
-- id-it OBJECT IDENTIFIER ::= {id-pkix 4}
--
--
-- This construct MAY also be used to define new PKIX Certificate
-- Management Protocol request and response messages or general-
-- purpose (e.g., announcement) messages for future needs or for
-- specific environments.
GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
-- May be sent by EE, RA, or CA (depending on message content).
-- The OPTIONAL infoValue parameter of InfoTypeAndValue will
-- typically be omitted for some of the examples given above.
-- The receiver is free to ignore any contained OIDs that it
-- does not recognize. If sent from EE to CA, the empty set
-- indicates that the CA may send
-- any/all information that it wishes.
GenRepContent ::= SEQUENCE OF InfoTypeAndValue
-- The receiver MAY ignore any contained OIDs that it does not
-- recognize.
ErrorMsgContent ::= SEQUENCE {
pKIStatusInfo PKIStatusInfo,
errorCode INTEGER OPTIONAL,
-- implementation-specific error codes
errorDetails PKIFreeText OPTIONAL
-- implementation-specific error details
}
PollReqContent ::= SEQUENCE OF SEQUENCE {
certReqId INTEGER
}
PollRepContent ::= SEQUENCE OF SEQUENCE {
certReqId INTEGER,
checkAfter INTEGER, -- time in seconds
reason PKIFreeText OPTIONAL
}
--
-- Extended key usage extension for PKI entities used in CMP
-- operations, added due to the changes made in
-- CMP Updates [RFC9480]
-- The EKUs for the CA and RA are reused from CMC, as defined in
-- [RFC6402]
--
-- id-kp-cmcCA OBJECT IDENTIFIER ::= { id-kp 27 }
-- id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 }
id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp 32 }
-- There is no 1988 ASN.1 module of PKCS #9 available to import the
-- syntax of the localKeyId attribute type and value from. Therefore,
-- the syntax is added here as needed for the updates made in
-- CMP Updates [RFC9480].
pkcs-9 OBJECT IDENTIFIER ::= {iso(1) member-body(2) us(840)
rsadsi(113549) pkcs(1) 9}
pkcs-9-at-localKeyId OBJECT IDENTIFIER ::= {pkcs-9 21}
LocalKeyIdValue ::= OCTET STRING
END -- of CMP module
A.2. Update to RFC 5912 - 2002 ASN.1 Module
This section contains the updated 2002 ASN.1 module for [RFC5912].
This module replaces the module in Section 9 of [RFC5912]. The
module contains those changes to the normative ASN.1 module from
Appendix F of [RFC4210] that were to update to the 2002 ASN.1
standard done in [RFC5912], as well as changes made in this document.
PKIXCMP-2021
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) id-mod(0)
id-mod-cmp2021-02(100) }
DEFINITIONS EXPLICIT TAGS ::=
BEGIN
IMPORTS
AttributeSet{}, SingleAttribute{}, Extensions{}, EXTENSION, ATTRIBUTE
FROM PKIX-CommonTypes-2009
{iso(1) identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57)}
AlgorithmIdentifier{}, SIGNATURE-ALGORITHM, ALGORITHM,
DIGEST-ALGORITHM, MAC-ALGORITHM
FROM AlgorithmInformation-2009
{iso(1) identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) id-mod(0)
id-mod-algorithmInformation-02(58)}
Certificate, CertificateList, Time, id-kp
FROM PKIX1Explicit-2009
{iso(1) identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51)}
DistributionPointName, GeneralNames, GeneralName, KeyIdentifier
FROM PKIX1Implicit-2009
{iso(1) identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-implicit-02(59)}
CertTemplate, PKIPublicationInfo, EncryptedKey, CertId,
CertReqMessages, Controls, RegControlSet, id-regCtrl
FROM PKIXCRMF-2009
{ iso(1) identified-organization(3) dod(6) internet(1)
security(5) mechanisms(5) pkix(7) id-mod(0)
id-mod-crmf2005-02(55) }
-- The import of EncryptedKey is added due to the updates made
-- in CMP Updates [RFC9480]. EncryptedValue does not need to
-- be imported anymore and is therefore removed here.
-- See also the behavioral clarifications to CRMF codified in
-- Appendix C of this specification.
CertificationRequest
FROM PKCS-10
{iso(1) identified-organization(3) dod(6) internet(1) security(5)
mechanisms(5) pkix(7) id-mod(0) id-mod-pkcs10-2009(69)}
-- (specified in [RFC2986] with 1993 ASN.1 syntax and IMPLICIT
-- tags). Alternatively, implementers may directly include
-- the syntax of [RFC2986] in this module.
localKeyId
FROM PKCS-9
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
modules(0) pkcs-9(1)}
-- The import of localKeyId is added due to the updates made in
-- CMP Updates [RFC9480].
EnvelopedData, SignedData
FROM CryptographicMessageSyntax-2009
{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
smime(16) modules(0) id-mod-cms-2004-02(41)}
-- The import of EnvelopedData and SignedData is added due to
-- the updates made in CMP Updates [RFC9480].
;
-- The rest of the module contains locally defined OIDs and
-- constructs:
CMPCertificate ::= CHOICE { x509v3PKCert Certificate, ... }
-- This syntax, while bits-on-the-wire compatible with the
-- standard X.509 definition of "Certificate", allows the
-- possibility of future certificate types (such as X.509
-- attribute certificates, card-verifiable
-- certificates, or other kinds of certificates) within this
-- Certificate Management Protocol, should a need ever arise to
-- support such generality. Those implementations that do not
-- foresee a need to ever support other certificate types MAY, if
-- they wish, comment out the above structure and "uncomment" the
-- following one prior to compiling this ASN.1 module. (Note that
-- interoperability with implementations that don't do this will be
-- unaffected by this change.)
-- CMPCertificate ::= Certificate
PKIMessage ::= SEQUENCE {
header PKIHeader,
body PKIBody,
protection [0] PKIProtection OPTIONAL,
extraCerts [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
OPTIONAL }
PKIMessages ::= SEQUENCE SIZE (1..MAX) OF PKIMessage
PKIHeader ::= SEQUENCE {
pvno INTEGER { cmp1999(1), cmp2000(2),
cmp2012(3) },
sender GeneralName,
-- identifies the sender
recipient GeneralName,
-- identifies the intended recipient
messageTime [0] GeneralizedTime OPTIONAL,
-- time of production of this message (used when the sender
-- believes that the transport will be "suitable", i.e.,
-- that the time will still be meaningful upon receipt)
protectionAlg [1] AlgorithmIdentifier{ALGORITHM, {...}}
OPTIONAL,
-- algorithm used for the calculation of protection bits
senderKID [2] KeyIdentifier OPTIONAL,
recipKID [3] KeyIdentifier OPTIONAL,
-- to identify specific keys used for protection
transactionID [4] OCTET STRING OPTIONAL,
-- identifies the transaction, i.e., this will be the same in
-- corresponding request, response, certConf, and PKIConf
-- messages
senderNonce [5] OCTET STRING OPTIONAL,
recipNonce [6] OCTET STRING OPTIONAL,
-- nonces used to provide replay protection, senderNonce
-- is inserted by the creator of this message; recipNonce
-- is a nonce previously inserted in a related message by
-- the intended recipient of this message.
freeText [7] PKIFreeText OPTIONAL,
-- this may be used to indicate context-specific instructions
-- (this field is intended for human consumption)
generalInfo [8] SEQUENCE SIZE (1..MAX) OF
InfoTypeAndValue OPTIONAL
-- this may be used to convey context-specific information
-- (this field not primarily intended for human consumption)
}
PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
-- text encoded as a UTF-8 string [RFC3629]
PKIBody ::= CHOICE { -- message-specific body elements
ir [0] CertReqMessages, --Initialization Request
ip [1] CertRepMessage, --Initialization Response
cr [2] CertReqMessages, --Certification Request
cp [3] CertRepMessage, --Certification Response
p10cr [4] CertificationRequest, --imported from [RFC2986]
popdecc [5] POPODecKeyChallContent, --pop Challenge
popdecr [6] POPODecKeyRespContent, --pop Response
kur [7] CertReqMessages, --Key Update Request
kup [8] CertRepMessage, --Key Update Response
krr [9] CertReqMessages, --Key Recovery Request
krp [10] KeyRecRepContent, --Key Recovery Response
rr [11] RevReqContent, --Revocation Request
rp [12] RevRepContent, --Revocation Response
ccr [13] CertReqMessages, --Cross-Cert. Request
ccp [14] CertRepMessage, --Cross-Cert. Response
ckuann [15] CAKeyUpdAnnContent, --CA Key Update Ann.
cann [16] CertAnnContent, --Certificate Ann.
rann [17] RevAnnContent, --Revocation Ann.
crlann [18] CRLAnnContent, --CRL Announcement
pkiconf [19] PKIConfirmContent, --Confirmation
nested [20] NestedMessageContent, --Nested Message
genm [21] GenMsgContent, --General Message
genp [22] GenRepContent, --General Response
error [23] ErrorMsgContent, --Error Message
certConf [24] CertConfirmContent, --Certificate Confirm
pollReq [25] PollReqContent, --Polling Request
pollRep [26] PollRepContent --Polling Response
}
PKIProtection ::= BIT STRING
ProtectedPart ::= SEQUENCE {
header PKIHeader,
body PKIBody }
id-PasswordBasedMac OBJECT IDENTIFIER ::= { iso(1) member-body(2)
usa(840) nt(113533) nsn(7) algorithms(66) 13 }
PBMParameter ::= SEQUENCE {
salt OCTET STRING,
-- Note: Implementations MAY wish to limit acceptable sizes
-- of this string to values appropriate for their environment
-- in order to reduce the risk of denial-of-service attacks.
owf AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
-- AlgId for a One-Way Function
iterationCount INTEGER,
-- number of times the OWF is applied
-- Note: Implementations MAY wish to limit acceptable sizes
-- of this integer to values appropriate for their environment
-- in order to reduce the risk of denial-of-service attacks.
mac AlgorithmIdentifier{MAC-ALGORITHM, {...}}
-- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
-- or HMAC [RFC2104, RFC2202])
}
id-DHBasedMac OBJECT IDENTIFIER ::= { iso(1) member-body(2)
usa(840) nt(113533) nsn(7) algorithms(66) 30 }
DHBMParameter ::= SEQUENCE {
owf AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
-- AlgId for a One-Way Function
mac AlgorithmIdentifier{MAC-ALGORITHM, {...}}
-- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
-- or HMAC [RFC2104, RFC2202])
}
PKIStatus ::= INTEGER {
accepted (0),
-- you got exactly what you asked for
grantedWithMods (1),
-- you got something like what you asked for; the
-- requester is responsible for ascertaining the differences
rejection (2),
-- you don't get it, more information elsewhere in the message
waiting (3),
-- the request body part has not yet been processed; expect to
-- hear more later (note: proper handling of this status
-- response MAY use the polling req/rep PKIMessages specified
-- in Section 5.3.22 of [RFC4210]; alternatively, polling in the
-- underlying transport layer MAY have some utility in this
-- regard)
revocationWarning (4),
-- this message contains a warning that a revocation is
-- imminent
revocationNotification (5),
-- notification that a revocation has occurred
keyUpdateWarning (6)
-- update already done for the oldCertId specified in
-- CertReqMsg
}
PKIFailureInfo ::= BIT STRING {
-- since we can fail in more than one way!
-- More codes may be added in the future if/when required.
badAlg (0),
-- unrecognized or unsupported algorithm identifier
badMessageCheck (1),
-- integrity check failed (e.g., signature did not verify)
badRequest (2),
-- transaction not permitted or supported
badTime (3),
-- messageTime was not sufficiently close to the system time,
-- as defined by local policy
badCertId (4),
-- no certificate could be found matching the provided criteria
badDataFormat (5),
-- the data submitted has the wrong format
wrongAuthority (6),
-- the authority indicated in the request is different from the
-- one creating the response token
incorrectData (7),
-- the requester's data is incorrect (for notary services)
missingTimeStamp (8),
-- when the timestamp is missing but should be there
-- (by policy)
badPOP (9),
-- the proof-of-possession failed
certRevoked (10),
-- the certificate has already been revoked
certConfirmed (11),
-- the certificate has already been confirmed
wrongIntegrity (12),
-- not valid integrity, based on the password instead of the
-- signature or vice versa
badRecipientNonce (13),
-- not valid recipient nonce, either missing or wrong value
timeNotAvailable (14),
-- the TSA's time source is not available
unacceptedPolicy (15),
-- the requested TSA policy is not supported by the TSA
unacceptedExtension (16),
-- the requested extension is not supported by the TSA
addInfoNotAvailable (17),
-- the additional information requested could not be
-- understood or is not available
badSenderNonce (18),
-- not valid sender nonce, either missing or wrong size
badCertTemplate (19),
-- not valid cert. template or missing mandatory information
signerNotTrusted (20),
-- signer of the message unknown or not trusted
transactionIdInUse (21),
-- the transaction identifier is already in use
unsupportedVersion (22),
-- the version of the message is not supported
notAuthorized (23),
-- the sender was not authorized to make the preceding
-- request or perform the preceding action
systemUnavail (24),
-- the request cannot be handled due to system unavailability
systemFailure (25),
-- the request cannot be handled due to system failure
duplicateCertReq (26)
-- the certificate cannot be issued because a duplicate
-- certificate already exists
}
PKIStatusInfo ::= SEQUENCE {
status PKIStatus,
statusString PKIFreeText OPTIONAL,
failInfo PKIFailureInfo OPTIONAL }
OOBCert ::= CMPCertificate
OOBCertHash ::= SEQUENCE {
hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}
OPTIONAL,
certId [1] CertId OPTIONAL,
hashVal BIT STRING
-- hashVal is calculated over the DER encoding of the
-- self-signed certificate with the identifier certID.
}
POPODecKeyChallContent ::= SEQUENCE OF Challenge
-- One Challenge per encryption key certification request (in the
-- same order as these requests appear in CertReqMessages)
Challenge ::= SEQUENCE {
owf AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}
OPTIONAL,
-- MUST be present in the first Challenge; MAY be omitted in
-- any subsequent Challenge in POPODecKeyChallContent (if
-- omitted, then the owf used in the immediately preceding
-- Challenge is to be used)
witness OCTET STRING,
-- the result of applying the One-Way Function (owf) to a
-- randomly generated INTEGER, A (Note that a different
-- INTEGER MUST be used for each Challenge.)
challenge OCTET STRING
-- the encryption (under the public key for which the cert.
-- request is being made) of Rand
}
-- Rand was added in CMP Updates [RFC9480]
Rand ::= SEQUENCE {
-- Rand is encrypted under the public key to form the challenge
-- in POPODecKeyChallContent
int INTEGER,
-- the randomly generated INTEGER A (above)
sender GeneralName
-- the sender's name (as included in PKIHeader)
}
POPODecKeyRespContent ::= SEQUENCE OF INTEGER
-- One INTEGER per encryption key certification request (in the
-- same order as these requests appear in CertReqMessages). The
-- retrieved INTEGER A (above) is returned to the sender of the
-- corresponding Challenge.
CertRepMessage ::= SEQUENCE {
caPubs [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
OPTIONAL,
response SEQUENCE OF CertResponse }
CertResponse ::= SEQUENCE {
certReqId INTEGER,
-- to match this response with the corresponding request (a value
-- of -1 is to be used if certReqId is not specified in the
-- corresponding request, which can only be a p10cr)
status PKIStatusInfo,
certifiedKeyPair CertifiedKeyPair OPTIONAL,
rspInfo OCTET STRING OPTIONAL
-- analogous to the id-regInfo-utf8Pairs string defined
-- for regInfo in CertReqMsg [RFC4211]
}
CertifiedKeyPair ::= SEQUENCE {
certOrEncCert CertOrEncCert,
privateKey [0] EncryptedKey OPTIONAL,
-- See [RFC4211] for comments on encoding.
-- Changed from Encrypted Value to EncryptedKey as a CHOICE of
-- EncryptedValue and EnvelopedData due to the changes made in
-- CMP Updates [RFC9480].
-- Using the choice EncryptedValue is bit-compatible to the
-- syntax without this change.
publicationInfo [1] PKIPublicationInfo OPTIONAL }
CertOrEncCert ::= CHOICE {
certificate [0] CMPCertificate,
encryptedCert [1] EncryptedKey
-- Changed from Encrypted Value to EncryptedKey as a CHOICE of
-- EncryptedValue and EnvelopedData due to the changes made in
-- CMP Updates [RFC9480].
-- Using the choice EncryptedValue is bit-compatible to the
-- syntax without this change.
}
KeyRecRepContent ::= SEQUENCE {
status PKIStatusInfo,
newSigCert [0] CMPCertificate OPTIONAL,
caCerts [1] SEQUENCE SIZE (1..MAX) OF
CMPCertificate OPTIONAL,
keyPairHist [2] SEQUENCE SIZE (1..MAX) OF
CertifiedKeyPair OPTIONAL }
RevReqContent ::= SEQUENCE OF RevDetails
RevDetails ::= SEQUENCE {
certDetails CertTemplate,
-- allows the requester to specify as much as they can about
-- the cert. for which revocation is requested
-- (e.g., for cases in which serialNumber is not available)
crlEntryDetails Extensions{{...}} OPTIONAL
-- requested crlEntryExtensions
}
RevRepContent ::= SEQUENCE {
status SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
-- in the same order as was sent in RevReqContent
revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId OPTIONAL,
-- IDs for which revocation was requested
-- (same order as status)
crls [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
-- the resulting CRLs (there may be more than one)
}
CAKeyUpdAnnContent ::= SEQUENCE {
oldWithNew CMPCertificate, -- old pub signed with new priv
newWithOld CMPCertificate, -- new pub signed with old priv
newWithNew CMPCertificate -- new pub signed with new priv
}
CertAnnContent ::= CMPCertificate
RevAnnContent ::= SEQUENCE {
status PKIStatus,
certId CertId,
willBeRevokedAt GeneralizedTime,
badSinceDate GeneralizedTime,
crlDetails Extensions{{...}} OPTIONAL
-- extra CRL details (e.g., crl number, reason, location, etc.)
}
CRLAnnContent ::= SEQUENCE OF CertificateList
PKIConfirmContent ::= NULL
NestedMessageContent ::= PKIMessages
-- CertReqTemplateContent, AttributeTypeAndValue,
-- ExpandedRegControlSet, id-regCtrl-altCertTemplate,
-- AltCertTemplate, regCtrl-algId, id-regCtrl-algId, AlgIdCtrl,
-- regCtrl-rsaKeyLen, id-regCtrl-rsaKeyLen, and RsaKeyLenCtrl
-- were added in CMP Updates [RFC9480]
CertReqTemplateContent ::= SEQUENCE {
certTemplate CertTemplate,
-- prefilled certTemplate structure elements
-- The SubjectPublicKeyInfo field in the certTemplate MUST NOT
-- be used.
keySpec Controls OPTIONAL
-- MAY be used to specify supported algorithms
-- Controls ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
-- as specified in CRMF [RFC4211]
}
AttributeTypeAndValue ::= SingleAttribute{{ ... }}
ExpandedRegControlSet ATTRIBUTE ::= { RegControlSet |
regCtrl-altCertTemplate | regCtrl-algId | regCtrl-rsaKeyLen, ... }
regCtrl-altCertTemplate ATTRIBUTE ::=
{ TYPE AltCertTemplate IDENTIFIED BY id-regCtrl-altCertTemplate }
id-regCtrl-altCertTemplate OBJECT IDENTIFIER ::= { id-regCtrl 7 }
AltCertTemplate ::= AttributeTypeAndValue
-- specifies a template for a certificate other than an X.509v3
-- public key certificate
regCtrl-algId ATTRIBUTE ::=
{ TYPE AlgIdCtrl IDENTIFIED BY id-regCtrl-algId }
id-regCtrl-algId OBJECT IDENTIFIER ::= { id-regCtrl 11 }
AlgIdCtrl ::= AlgorithmIdentifier{ALGORITHM, {...}}
-- SHALL be used to specify supported algorithms other than RSA
regCtrl-rsaKeyLen ATTRIBUTE ::=
{ TYPE RsaKeyLenCtrl IDENTIFIED BY id-regCtrl-rsaKeyLen }
id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { id-regCtrl 12 }
RsaKeyLenCtrl ::= INTEGER (1..MAX)
-- SHALL be used to specify supported RSA key lengths
-- RootCaKeyUpdateContent, CRLSource, and CRLStatus were added in
-- CMP Updates [RFC9480]
RootCaKeyUpdateContent ::= SEQUENCE {
newWithNew CMPCertificate,
-- new root CA certificate
newWithOld [0] CMPCertificate OPTIONAL,
-- X.509 certificate containing the new public root CA key
-- signed with the old private root CA key
oldWithNew [1] CMPCertificate OPTIONAL
-- X.509 certificate containing the old public root CA key
-- signed with the new private root CA key
}
CRLSource ::= CHOICE {
dpn [0] DistributionPointName,
issuer [1] GeneralNames }
CRLStatus ::= SEQUENCE {
source CRLSource,
thisUpdate Time OPTIONAL }
INFO-TYPE-AND-VALUE ::= TYPE-IDENTIFIER
InfoTypeAndValue ::= SEQUENCE {
infoType INFO-TYPE-AND-VALUE.
&id({SupportedInfoSet}),
infoValue INFO-TYPE-AND-VALUE.
&Type({SupportedInfoSet}{@infoType}) }
SupportedInfoSet INFO-TYPE-AND-VALUE ::= { ... }
-- Example InfoTypeAndValue contents include, but are not limited
-- to, the following (uncomment in this ASN.1 module and use as
-- appropriate for a given environment):
--
-- id-it-caProtEncCert OBJECT IDENTIFIER ::= {id-it 1}
-- CAProtEncCertValue ::= CMPCertificate
-- id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
-- SignKeyPairTypesValue ::= SEQUENCE SIZE (1..MAX) OF
-- AlgorithmIdentifier{{...}}
-- id-it-encKeyPairTypes OBJECT IDENTIFIER ::= {id-it 3}
-- EncKeyPairTypesValue ::= SEQUENCE SIZE (1..MAX) OF
-- AlgorithmIdentifier{{...}}
-- id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
-- PreferredSymmAlgValue ::= AlgorithmIdentifier{{...}}
-- id-it-caKeyUpdateInfo OBJECT IDENTIFIER ::= {id-it 5}
-- CAKeyUpdateInfoValue ::= CAKeyUpdAnnContent
-- id-it-currentCRL OBJECT IDENTIFIER ::= {id-it 6}
-- CurrentCRLValue ::= CertificateList
-- id-it-unsupportedOIDs OBJECT IDENTIFIER ::= {id-it 7}
-- UnsupportedOIDsValue ::= SEQUENCE SIZE (1..MAX) OF
-- OBJECT IDENTIFIER
-- id-it-keyPairParamReq OBJECT IDENTIFIER ::= {id-it 10}
-- KeyPairParamReqValue ::= OBJECT IDENTIFIER
-- id-it-keyPairParamRep OBJECT IDENTIFIER ::= {id-it 11}
-- KeyPairParamRepValue ::= AlgorithmIdentifier{{...}}
-- id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12}
-- RevPassphraseValue ::= EncryptedKey
-- - Changed from Encrypted Value to EncryptedKey as a CHOICE
-- - of EncryptedValue and EnvelopedData due to the changes
-- - made in CMP Updates [RFC9480]
-- - Using the choice EncryptedValue is bit-compatible to
-- - the syntax without this change
-- id-it-implicitConfirm OBJECT IDENTIFIER ::= {id-it 13}
-- ImplicitConfirmValue ::= NULL
-- id-it-confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14}
-- ConfirmWaitTimeValue ::= GeneralizedTime
-- id-it-origPKIMessage OBJECT IDENTIFIER ::= {id-it 15}
-- OrigPKIMessageValue ::= PKIMessages
-- id-it-suppLangTags OBJECT IDENTIFIER ::= {id-it 16}
-- SuppLangTagsValue ::= SEQUENCE OF UTF8String
-- id-it-caCerts OBJECT IDENTIFIER ::= {id-it 17}
-- CaCertsValue ::= SEQUENCE SIZE (1..MAX) OF
-- CMPCertificate
-- - id-it-caCerts added in CMP Updates [RFC9480]
-- id-it-rootCaKeyUpdate OBJECT IDENTIFIER ::= {id-it 18}
-- RootCaKeyUpdateValue ::= RootCaKeyUpdateContent
-- - id-it-rootCaKeyUpdate added in CMP Updates [RFC9480]
-- id-it-certReqTemplate OBJECT IDENTIFIER ::= {id-it 19}
-- CertReqTemplateValue ::= CertReqTemplateContent
-- - id-it-certReqTemplate added in CMP Updates [RFC9480]
-- id-it-rootCaCert OBJECT IDENTIFIER ::= {id-it 20}
-- RootCaCertValue ::= CMPCertificate
-- - id-it-rootCaCert added in CMP Updates [RFC9480]
-- id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21}
-- CertProfileValue ::= SEQUENCE SIZE (1..MAX) OF
-- UTF8String
-- - id-it-certProfile added in CMP Updates [RFC9480]
-- id-it-crlStatusList OBJECT IDENTIFIER ::= {id-it 22}
-- CRLStatusListValue ::= SEQUENCE SIZE (1..MAX) OF
-- CRLStatus
-- - id-it-crlStatusList added in CMP Updates [RFC9480]
-- id-it-crls OBJECT IDENTIFIER ::= {id-it 23}
-- CRLsValue ::= SEQUENCE SIZE (1..MAX) OF
-- CertificateList
-- - id-it-crls added in CMP Updates [RFC9480]
--
-- where
--
-- id-pkix OBJECT IDENTIFIER ::= {
-- iso(1) identified-organization(3)
-- dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
-- and
-- id-it OBJECT IDENTIFIER ::= {id-pkix 4}
--
--
-- This construct MAY also be used to define new PKIX Certificate
-- Management Protocol request and response messages or general-
-- purpose (e.g., announcement) messages for future needs or for
-- specific environments.
GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
-- May be sent by EE, RA, or CA (depending on message content).
-- The OPTIONAL infoValue parameter of InfoTypeAndValue will
-- typically be omitted for some of the examples given above.
-- The receiver is free to ignore any contained OIDs that it
-- does not recognize. If sent from EE to CA, the empty set
-- indicates that the CA may send
-- any/all information that it wishes.
GenRepContent ::= SEQUENCE OF InfoTypeAndValue
-- The receiver MAY ignore any contained OIDs that it does not
-- recognize.
ErrorMsgContent ::= SEQUENCE {
pKIStatusInfo PKIStatusInfo,
errorCode INTEGER OPTIONAL,
-- implementation-specific error codes
errorDetails PKIFreeText OPTIONAL
-- implementation-specific error details
}
CertConfirmContent ::= SEQUENCE OF CertStatus
CertStatus ::= SEQUENCE {
certHash OCTET STRING,
-- the hash of the certificate, using the same hash algorithm
-- as is used to create and verify the certificate signature
certReqId INTEGER,
-- to match this confirmation with the corresponding req/rep
statusInfo PKIStatusInfo OPTIONAL,
hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}} OPTIONAL
-- the hash algorithm to use for calculating certHash
-- SHOULD NOT be used in all cases where the AlgorithmIdentifier
-- of the certificate signature specifies a hash algorithm
}
PollReqContent ::= SEQUENCE OF SEQUENCE {
certReqId INTEGER }
PollRepContent ::= SEQUENCE OF SEQUENCE {
certReqId INTEGER,
checkAfter INTEGER, -- time in seconds
reason PKIFreeText OPTIONAL }
--
-- Extended key usage extension for PKI entities used in CMP
-- operations, added due to the changes made in
-- CMP Updates [RFC9480]
-- The EKUs for the CA and RA are reused from CMC, as defined in
-- [RFC6402]
--
-- id-kp-cmcCA OBJECT IDENTIFIER ::= { id-kp 27 }
-- id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 }
id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp 32 }
END
Acknowledgements
Special thanks goes to Jim Schaad for his guidance and the
inspiration to structure and write this document like [RFC6402],
which updates CMC. Special thanks also goes to Russ Housley, Lijun
Liao, Martin Peylo, and Tomas Gustavsson for reviewing and providing
valuable suggestions on improving this document.
We also thank all reviewers of this document for their valuable
feedback.
Authors' Addresses
Hendrik Brockhaus
Siemens
Werner-von-Siemens-Strasse 1
80333 Munich
Germany
Email: hendrik.brockhaus@siemens.com
URI: https://www.siemens.com
David von Oheimb
Siemens
Werner-von-Siemens-Strasse 1
80333 Munich
Germany
Email: david.von.oheimb@siemens.com
URI: https://www.siemens.com
John Gray
Entrust
1187 Park Place
Minneapolis, MN 55379
United States of America
Email: john.gray@entrust.com
URI: https://www.entrust.com
|