Internet Draft Author: Blake Ramsdell, draft-ramsdell-smime31-cert-00.txt Tumbleweed Communications July 14, 2000 Expires January 14, 2001 S/MIME Version 3.1 Certificate Profile Addendum Status of this memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Overview In light of the expiration of the primary RSA patent, it is proposed that the RSA algorithm replace the DSS and Diffie-Hellman as the MUST implement algorithms in the S/MIME profile. This draft will describe only the proposed changes to the S/MIME Version 3 Certificate Handling RFC [SMIMEV3CERT], and the rest of that RFC will remain identical. 1.1 Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [MUSTSHOULD]. 1.2 Discussion of This Draft This draft is being discussed on the "ietf-smime" mailing list. To subscribe, send a message to: ietf-smime-request@imc.org with the single word subscribe in the body of the message. There is a Web site for the mailing list at . 2. Changes to the S/MIME Version 3 Certificate Handling RFC The following changes to are proposed to [SMIMEV3CERT]: 1. Section 4.3 is replaced with the following: 4.3 Certificate and CRL Signing Algorithms Certificates and Certificate-Revocation Lists (CRLs) are signed by the certificate issuer. A receiving agent MUST be capable of verifying the signatures on certificates and CRLs made with md2WithRSAEncryption, md5WithRSAEncryption and sha- 1WithRSAEncryption signature algorithms with key sizes from 512 bits to 2048 bits described in [PKCS#1V2]. A receiving agent MAY be capable of verifying the signatures on certificates and CRLs made with id-dsa-with-sha1 [DSS]. 3. Security Considerations The security considerations are the same as for [SMIMEV3CERT]. A. References [SMIMEV3CERT] "S/MIME Version 3 Certificate Handling", RFC 2632 [DSS] NIST FIPS PUB 186, "Digital Signature Standard", 18 May 1994. [MUSTSHOULD] "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119 [PKCS#1V2], "PKCS #1: RSA Cryptography Specifications Version 2.0", RFC 2437 B. Acknowledgements C. Changes from last draft Initial revision. D. AuthorĘs address Blake Ramsdell Tumbleweed Communications 17720 NE 65th St Ste 201 Redmond, WA 98052 +1 425 376 0225 blake.ramsdell@tumbleweed.com