<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5274bis-00" category="std" consensus="true" submissionType="IETF" obsoletes="5274, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Compliance">Certificate Management Messages over CMS (CMC): Compliance Requirements</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akyala.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2024" month="September" day="12"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Compliance</keyword>

    <abstract>


<?line 70?>

<t>This document provides a set of compliance statements about the CMC
(Certificate Management over CMS) enrollment protocol.  The ASN.1
structures and the transport mechanisms for the CMC enrollment
protocol are covered in other documents.  This document provides the
information needed to make a compliant version of CMC.</t>

<t>This document obsoletes RFCs 5274 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/TBD"/>.</t>
    </note>


  </front>

  <middle>


<?line 80?>

<section anchor="introduction"><name>Introduction</name>

<t>The CMC (Certificate Management over CMS) protocol is designed in
terms of a client/server relationship.  In the simplest case, the
client is the requestor of the certificate (i.e., the End Entity
(EE)) and the server is the issuer of the certificate (i.e., the
Certification Authority (CA)).  The introduction of a Registration
Authority (RA) into the set of agents complicates the picture only
slightly.  The RA becomes the server with respect to the certificate
requestor, and it becomes the client with respect to the certificate
issuer.  Any number of RAs can be inserted into the picture in this
manner.</t>

<t>The RAs may serve specialized purposes that are not currently covered
by this document.  One such purpose would be a Key Escrow agent.  As
such, all certificate requests for encryption keys would be directed
through this RA and it would take appropriate action to do the key
archival.  Key recovery requests could be defined in the CMC
methodology allowing for the Key Escrow agent to perform that
operation acting as the final server in the chain of agents.</t>

<t>If there are multiple RAs in the system, it is considered normal that
not all RAs will see all certificate requests.  The routing between
the RAs may be dependent on the content of the certificate requests
involved.</t>

<t>This document is divided into six sections, each section specifying
the requirements that are specific to a class of agents in the CMC
model.  These are 1) all Entities, 2) all Servers, 3) all Clients, 4)
all End-Entities, 5) all Registration Authorities, 6) all Certification
Authorities.</t>

<t>This document obsoletes <xref target="CMC-COMPv1"/> and <xref target="CMC-Updates"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>There are several different terms, abbreviations, and acronyms used
in this document that we define here for convenience and consistency
of usage:</t>

<dl>
  <dt>End-Entity (EE):</dt>
  <dd>
    <t>Refers to the entity that owns a key pair and for
whom a certificate is issued.</t>
  </dd>
  <dt>Registration Authority (RA) or Local RA (LRA):</dt>
  <dd>
    <t>Refers to an entity
that acts as an intermediary between the EE and the CA.  Multiple
RAs can exist between the End-Entity and the Certification
Authority.  RAs may perform additional services such as key
generation or key archival.  This document uses the term RA for
both RA and LRA.</t>
  </dd>
  <dt>Certification Authority (CA):</dt>
  <dd>
    <t>Refers to the entity that issues
certificates.</t>
  </dd>
  <dt>Client:</dt>
  <dd>
    <t>Refers to an entity that creates a PKI Request.  In this
document, both RAs and EEs can be clients.</t>
  </dd>
  <dt>Server:</dt>
  <dd>
    <t>Refers to the entities that process PKI Requests and create
PKI Responses.  In this document both CAs and RAs can be servers.</t>
  </dd>
  <dt>PKCS #10:</dt>
  <dd>
    <t>Refers to the Public Key Cryptography Standard #10
<xref target="PKCS10"/>, which defines a certification request syntax.</t>
  </dd>
  <dt>CRMF:</dt>
  <dd>
    <t>Refers to the Certificate Request Message Format RFC <xref target="CRMF"/>.
CMC uses this certification request syntax defined in this
document as part of the protocol.</t>
  </dd>
  <dt>CMS:</dt>
  <dd>
    <t>Refers to the Cryptographic Message Syntax RFC <xref target="CMS"/>.  This
document provides for basic cryptographic services including
encryption and signing with and without key management.</t>
  </dd>
  <dt>PKI Request/Response:</dt>
  <dd>
    <t>Refers to the requests/responses described in
this document.  PKI Requests include certification requests,
revocation requests, etc.  PKI Responses include certs-only
messages, failure messages, etc.</t>
  </dd>
  <dt>Proof-of-Identity:</dt>
  <dd>
    <t>Refers to the client proving they are who they say
that they are to the server.</t>
  </dd>
  <dt>Proof-of-Possession (POP):</dt>
  <dd>
    <t>Refers to a value that can be used to
prove that the private key corresponding to a public key is in the
possession and can be used by an end-entity.</t>
  </dd>
  <dt>Transport wrapper:</dt>
  <dd>
    <t>Refers to the outermost CMS wrapping layer.</t>
  </dd>
</dl>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-rfc-5274-and-6402"><name>Changes since RFC 5274 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -03:</t>

<t><list style="symbols">
  <t>Update cryptographic algorithm requirements</t>
</list></t>

<t>-02 version changes:</t>

<t><list style="symbols">
  <t>Updated text in intro</t>
  <t>Changed "all agents" to "all entities" in overview</t>
  <t>Updated section header numbering</t>
</list></t>

<t>-01 version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Changed RFC 5273 references to draft-mandel-lamps-rfc5273bis</t>
</list></t>

<t>-00 version changes:</t>

<t><list style="symbols">
  <t>Added "Changes Since 5274 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="requirements-for-all-entities"><name>Requirements for All Entities</name>

<t>All <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> compliance statements <bcp14>MUST</bcp14> be
adhered to unless specifically stated otherwise in this document.</t>

<t>All entities <bcp14>MUST</bcp14> support Full PKI Requests, Simple PKI Responses,
and Full PKI Responses.  Servers <bcp14>SHOULD</bcp14> support Simple PKI Requests.</t>

<t>All entities <bcp14>MUST</bcp14> support the use of the CRMF syntax for
certification requests.  Support for the PKCS #10 syntax for
certification requests <bcp14>SHOULD</bcp14> be implemented by servers.</t>

<t>The extendedFailInfo field <bcp14>SHOULD NOT</bcp14> be populated in the
CMCStatusInfoV2 object; the failInfo field <bcp14>SHOULD</bcp14> be used to relay
this information.  If the extendedFailInfo field is used, it is
suggested that an additional CMCStatusInfoV2 item exist for the same
body part with a failInfo field.</t>

<t>All entities <bcp14>MUST</bcp14> implement the HTTP transport mechanism as defined
in <xref target="CMC-TRANS"/>.  Other transport mechanisms <bcp14>MAY</bcp14> be implemented.</t>

<section anchor="cryptographic-algorithm-requirements"><name>Cryptographic Algorithm Requirements</name>

<t>All entities <bcp14>MUST</bcp14> verify DSA-SHA1 and RSA-SHA1 signatures in
SignedData (see <xref target="CMS-ALG"/>).  Entities <bcp14>MAY</bcp14> verify other signature
algorithms.  It is strongly suggested that RSA-PSS with SHA-1 be
verified (see <xref target="CMS-RSA-PSS"/>).  It is strongly suggested that SHA-256
using RSA and RSA-PSS be verified (see <xref target="RSA-256"/>).</t>

<t>All entities <bcp14>MUST</bcp14> generate either DSA-SHA1 or RSA-SHA1 signatures for
SignedData (see <xref target="CMS-ALG"/>).  Other signatures algorithms <bcp14>MAY</bcp14> be used
for generation.</t>

<t>All entities <bcp14>MUST</bcp14> support Advanced Encryption Standard (AES) as the
content encryption algorithm for EnvelopedData (see <xref target="CMS-AES"/>).
Other content encryption algorithms <bcp14>MAY</bcp14> be implemented.</t>

<t>All entities <bcp14>MUST</bcp14> support RSA as a key transport algorithm for
EnvelopedData (see <xref target="CMS-ALG"/>).  All entities <bcp14>SHOULD</bcp14> support RSA-OAEP
(see <xref target="CMS-RSA-OAEP"/>) as a key transport algorithm.  Other key
transport algorithms <bcp14>MAY</bcp14> be implemented.</t>

<t>If an entity supports key agreement for EnvelopedData, it <bcp14>MUST</bcp14>
support Diffie-Hellman (see <xref target="CMS-DH"/>).</t>

<t>If an entity supports PasswordRecipientInfo for EnvelopedData or
AuthenticatedData, it <bcp14>MUST</bcp14> support PBKDF2 <xref target="PBKDF2"/> for key derivation
algorithms.  It <bcp14>MUST</bcp14> support AES key wrap (see <xref target="AES-WRAP"/> as the key
encryption algorithm.</t>

<t>If AuthenticatedData is supported, PasswordRecipientInfo <bcp14>MUST</bcp14> be
supported.</t>

<t>Algorithm requirements for the Identity Proof Version 2 control
<xref section="6.2.1" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented for
hashAlgId.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for hashAlgId.  HMAC-SHA1
<bcp14>MUST</bcp14> be implemented for macAlgId.  HMAC-SHA256 <bcp14>SHOULD</bcp14> be implemented
for macAlgId.</t>

<t>Algorithm requirements for the Pop Link Witness Version 2 control
<xref section="6.3.1" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented for
keyGenAlgorithm.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for keyGenAlgorithm.
PBKDF2 <xref target="PBKDF2"/> <bcp14>MAY</bcp14> be implemented for keyGenAlgorithm.  HMAC-SHA1
<bcp14>MUST</bcp14> be implemented for macAlgorithm.  HMAC-SHA256 <bcp14>SHOULD</bcp14> be
implemented for macAlgorithm.</t>

<t>Algorithm requirements for the Encrypted POP and Decrypted POP
controls <xref section="6.7" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented
for witnessAlgID.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for witnessAlgID.
HMAC-SHA1 <bcp14>MUST</bcp14> be implemented for thePOPAlgID.  HMAC-SHA256 <bcp14>SHOULD</bcp14> be
implemented for thePOPAlgID.</t>

<t>Algorithm requirements for Publish Trust Anchors control <xref section="6.15" sectionFormat="of" target="CMC-STRUCT"/> are: SHA-1 <bcp14>MUST</bcp14> be implemented for
hashAlgorithm.  SHA-256 <bcp14>SHOULD</bcp14> be implemented for hashAlgorithm.</t>

<t>If an EE generates DH keys for certification, it <bcp14>MUST</bcp14> support <xref section="4" sectionFormat="of" target="DH-POP"/>.  EEs <bcp14>MAY</bcp14> support <xref section="3" sectionFormat="of" target="DH-POP"/>.  CAs and RAs
that do POP verification <bcp14>MUST</bcp14> support <xref section="4" sectionFormat="of" target="DH-POP"/> and
<bcp14>SHOULD</bcp14> support <xref section="3" sectionFormat="of" target="DH-POP"/>.</t>

<t>EEs that need to use a signature algorithm for keys that cannot
produce a signature <bcp14>MUST</bcp14> support Appendix C of <xref target="CMC-STRUCT"/> and <bcp14>MUST</bcp14>
support the Encrypted/Decrypted POP controls.  CAs and RAs that do
POP verification <bcp14>MUST</bcp14> support this signature algorithm and <bcp14>MUST</bcp14>
support the Encrypted/Decrypted POP controls.</t>

</section>
<section anchor="controls"><name>Controls</name>

<t>The following table lists the name and level of support required for
each control.</t>

<texttable title="CMC Control Attributes" anchor="cmc-controls">
      <ttcol align='left'>Control</ttcol>
      <ttcol align='left'>EE</ttcol>
      <ttcol align='left'>RA</ttcol>
      <ttcol align='left'>CA</ttcol>
      <c>Extended CMC Status Info</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>CMC Status Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identity Proof Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Identity Proof</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identification</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Random</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Data Return</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Modify Cert Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Add Extensions</c>
      <c>N/A</c>
      <c><bcp14>MAY</bcp14></c>
      <c>(1)</c>
      <c>Transaction ID</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Sender Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Recipient Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Encrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Decrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>RA POP Witness</c>
      <c>N/A</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>(1)</c>
      <c>Get Certificate</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Get CRL</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Revocation Request</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Registration Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Response Information</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Query Pending</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Confirm Cert.  Acceptance</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Publish Trust Anchors</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Authenticate Data</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Batch Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Batch Responses</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Publication Information</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Control Processed</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>RA Identity Proof Witness</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Response Body</c>
      <c>(6)</c>
      <c>(6)</c>
      <c>N/A.</c>
</texttable>

<t>Notes:</t>

<t><list style="numbers">
  <t>CAs <bcp14>SHOULD</bcp14> implement this control if designed to work with RAs.</t>
  <t>CAs <bcp14>MUST</bcp14> implement this control if designed to work with RAs.</t>
  <t>Implementation is optional for these controls.  We strongly
suggest that they be implemented in order to populate client
trust anchors.</t>
  <t>EEs only need to implement this if (a) they support key agreement
algorithms or (b) they need to operate in environments where the
hardware keys cannot provide POP.</t>
  <t>RAs <bcp14>SHOULD</bcp14> implement this if they implement RA POP Witness.</t>
  <t>EE's <bcp14>SHOULD</bcp14> implement if designed to work with RAs and <bcp14>MUST</bcp14>
implement if intended to be used in environments where RAs are
used for identity validation or key generation.  RAs <bcp14>SHOULD</bcp14>
implement and validate responses for consistency.</t>
</list></t>

<t>Strong consideration should be given to implementing the Authenticate
Data and Publish Trust Anchors controls as this gives a simple method
for distributing trust anchors into clients without user
intervention.</t>

</section>
<section anchor="crmf-feature-requirements"><name>CRMF Feature Requirements</name>

<t>The following additional restrictions are placed on CRMF features:</t>

<t>The registration control tokens id-regCtrl-regToken and id-regCtrl-
authToken <bcp14>MUST NOT</bcp14> be used.  No specific CMC feature is used to
replace these items, but generally the CMC controls identification
and identityProof will perform the same service and are more
specifically defined.</t>

<t>The control token id-regCtrl-pkiArchiveOptions <bcp14>SHOULD NOT</bcp14> be
supported.  An alternative method is under development to provide
this functionality.</t>

<t>The behavior of id-regCtrl-oldCertID is not presently used.  It is
replaced by issuing the new certificate and using the id-cmc-
publishCert to remove the old certificate from publication.  This
operation would not normally be accompanied by an immediate
revocation of the old certificate; however, that can be accomplished
by the id-cmc-revokeRequest control.</t>

<t>The id-regCtrl-protocolEncrKey is not used.</t>

</section>
</section>
<section anchor="requirements-for-clients"><name>Requirements for Clients</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-servers"><name>Requirements for Servers</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-ees"><name>Requirements for EEs</name>

<t>If an entity implements Diffie-Hellman, it <bcp14>MUST</bcp14> implement either the
DH-POP Proof-of-Possession as defined in <xref section="4" sectionFormat="of" target="DH-POP"/> or the
challenge-response POP controls id-cmc-encryptedPOP and id-cmc-
decryptedPOP.</t>

</section>
<section anchor="requirements-for-ras"><name>Requirements for RAs</name>

<t>RAs <bcp14>SHOULD</bcp14> be able to do delegated POP.  RAs implementing this
feature <bcp14>MUST</bcp14> implement the id-cmc-lraPOPWitness control.</t>

<t>All RAs <bcp14>MUST</bcp14> implement the promotion of the id-aa-cmc-unsignedData as
covered in <xref section="3.2.3" sectionFormat="of" target="CMC-STRUCT"/>.</t>

</section>
<section anchor="requirements-for-cas"><name>Requirements for CAs</name>

<t>Providing for CAs to work in an environment with RAs is strongly
suggested.  Implementation of such support is strongly suggested as
this permits the delegation of substantial administrative interaction
onto an RA rather than at the CA.</t>

<t>CAs <bcp14>MUST</bcp14> perform at least minimal checks on all public keys before
issuing a certificate.  At a minimum, a check for syntax would occur
with the POP operation.  Additionally, CAs <bcp14>SHOULD</bcp14> perform simple
checks for known bad keys such as small subgroups for DSA-SHA1 and DH
keys <xref target="SMALL-SUB-GROUP"/> or known bad exponents for RSA keys.</t>

<t>CAs <bcp14>MUST</bcp14> enforce POP checking before issuing any certificate.  CAs
<bcp14>MAY</bcp14> delegate the POP operation to an RA for those cases where 1) a
challenge/response message pair must be used, 2) an RA performs
escrow of a key and checks for POP in that manner, or 3) an unusual
algorithm is used and that validation is done at the RA.</t>

<t>CAs <bcp14>SHOULD</bcp14> implement both the DH-POP Proof-of-Possession as defined
in <xref section="4" sectionFormat="of" target="DH-POP"/> and the challenge-response POP controls id-
cmc-encryptedPOP and id-cmc-decryptedPOP.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document uses <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> as building blocks to
this document.  The security sections of those two documents are
included by reference.</t>

<t>Knowledge of how an entity is expected to operate is vital in
determining which sections of requirements are applicable to that
entity.  Care needs to be taken in determining which sections apply
and fully implementing the necessary code.</t>

<t>Cryptographic algorithms have and will be broken or weakened.
Implementers and users need to check that the cryptographic
algorithms listed in this document make sense from a security level.
The IETF from time to time may issue documents dealing with the
current state of the art.  Two examples of such documents are
<xref target="SMALL-SUB-GROUP"/> and <xref target="HASH-ATTACKS"/>.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mandel-lamps-rfc5272bis-02"/>
   
</reference>


<reference anchor="CMC-TRANS">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFCs 5273 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mandel-lamps-rfc5273bis-02"/>
   
</reference>

<reference anchor="CMS">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>

<reference anchor="CMS-AES">
  <front>
    <title>Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document specifies the conventions for using the Advanced Encryption Standard (AES) algorithm for encryption with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3565"/>
  <seriesInfo name="DOI" value="10.17487/RFC3565"/>
</reference>

<reference anchor="CMS-ALG">
  <front>
    <title>Cryptographic Message Syntax (CMS) Algorithms</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3370"/>
  <seriesInfo name="DOI" value="10.17487/RFC3370"/>
</reference>

<reference anchor="CMS-DH">
  <front>
    <title>Diffie-Hellman Key Agreement Method</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="June" year="1999"/>
    <abstract>
      <t>This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1 working group. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2631"/>
  <seriesInfo name="DOI" value="10.17487/RFC2631"/>
</reference>

<reference anchor="CRMF">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="September" year="2005"/>
    <abstract>
      <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4211"/>
  <seriesInfo name="DOI" value="10.17487/RFC4211"/>
</reference>

<reference anchor="CMS-RSA-OAEP">
  <front>
    <title>Use of the RSAES-OAEP Key Transport Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document describes the conventions for using the RSAES-OAEP key transport algorithm with the Cryptographic Message Syntax (CMS). The CMS specifies the enveloped-data content type, which consists of an encrypted content and encrypted content-encryption keys for one or more recipients. The RSAES-OAEP key transport algorithm can be used to encrypt content-encryption keys for intended recipients. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3560"/>
  <seriesInfo name="DOI" value="10.17487/RFC3560"/>
</reference>

<reference anchor="CMS-RSA-PSS">
  <front>
    <title>Use of the RSASSA-PSS Signature Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document specifies the conventions for using the RSASSA-PSS (RSA Probabilistic Signature Scheme) digital signature algorithm with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4056"/>
  <seriesInfo name="DOI" value="10.17487/RFC4056"/>
</reference>

<reference anchor="DH-POP">
  <front>
    <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
    <date month="May" year="2013"/>
    <abstract>
      <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
      <t>This document obsoletes RFC 2875.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6955"/>
  <seriesInfo name="DOI" value="10.17487/RFC6955"/>
</reference>

<reference anchor="RSA-256">
  <front>
    <title>Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="June" year="2005"/>
    <abstract>
      <t>This document supplements RFC 3279. It describes the conventions for using the RSA Probabilistic Signature Scheme (RSASSA-PSS) signature algorithm, the RSA Encryption Scheme - Optimal Asymmetric Encryption Padding (RSAES-OAEP) key transport algorithm and additional one-way hash functions with the Public-Key Cryptography Standards (PKCS) #1 version 1.5 signature algorithm in the Internet X.509 Public Key Infrastructure (PKI). Encoding formats, algorithm identifiers, and parameter formats are specified. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4055"/>
  <seriesInfo name="DOI" value="10.17487/RFC4055"/>
</reference>

<reference anchor="PBKDF2">
  <front>
    <title>PKCS #5: Password-Based Cryptography Specification Version 2.0</title>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="September" year="2000"/>
    <abstract>
      <t>This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions, encryption schemes, message-authentication schemes, and ASN.1 syntax identifying the techniques. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2898"/>
  <seriesInfo name="DOI" value="10.17487/RFC2898"/>
</reference>

<reference anchor="AES-WRAP">
  <front>
    <title>Advanced Encryption Standard (AES) Key Wrap Algorithm</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3394"/>
  <seriesInfo name="DOI" value="10.17487/RFC3394"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="PKCS10">
  <front>
    <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
    <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="November" year="2000"/>
    <abstract>
      <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2986"/>
  <seriesInfo name="DOI" value="10.17487/RFC2986"/>
</reference>

<reference anchor="SMALL-SUB-GROUP">
  <front>
    <title>Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME</title>
    <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
    <date month="March" year="2000"/>
    <abstract>
      <t>This document will describe the situations relevant to implementations of S/MIME version 3 in which protection is necessary and the methods that can be used to prevent these attacks. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2785"/>
  <seriesInfo name="DOI" value="10.17487/RFC2785"/>
</reference>

<reference anchor="HASH-ATTACKS">
  <front>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="B. Schneier" initials="B." surname="Schneier"/>
    <date month="November" year="2005"/>
    <abstract>
      <t>Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols need to be changed, and if so, how. This document summarizes the use of hashes in many protocols, discusses how the collision attacks affect and do not affect the protocols, shows how to thwart known attacks on digital certificates, and discusses future directions for protocol designers. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4270"/>
  <seriesInfo name="DOI" value="10.17487/RFC4270"/>
</reference>


<reference anchor="CMC-COMPv1">
   <front>
      <title>Certificate Management Messages over CMS (CMC): Compliance Requirements</title>
      <author fullname="Joseph Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document provides a set of compliance statements about the CMC
   (Certificate Management over CMS) enrollment protocol.  The ASN.1
   structures and the transport mechanisms for the CMC enrollment
   protocol are covered in other documents.  This document provides the
   information needed to make a compliant version of CMC.

   This document obsoletes RFCs 5274 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mandel-lamps-rfc5274bis-02"/>
   
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 487?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

