| < draft-ietf-lamps-rfc5750-bis-03.txt | draft-ietf-lamps-rfc5750-bis-04.txt > | |||
|---|---|---|---|---|
| LAMPS J. Schaad | LAMPS J. Schaad | |||
| Internet-Draft August Cellars | Internet-Draft August Cellars | |||
| Intended status: Standards Track B. Ramsdell | Obsoletes: 5750 (if approved) B. Ramsdell | |||
| Expires: September 14, 2017 Brute Squad Labs, Inc. | Intended status: Standards Track Brute Squad Labs, Inc. | |||
| S. Turner | Expires: October 9, 2017 S. Turner | |||
| sn3rd | sn3rd | |||
| March 13, 2017 | April 7, 2017 | |||
| Secure/Multipurpose Internet Mail Extensions (S/ MIME) Version 4.0 | Secure/Multipurpose Internet Mail Extensions (S/ MIME) Version 4.0 | |||
| Certificate Handling | Certificate Handling | |||
| draft-ietf-lamps-rfc5750-bis-03 | draft-ietf-lamps-rfc5750-bis-04 | |||
| Abstract | Abstract | |||
| This document specifies conventions for X.509 certificate usage by | This document specifies conventions for X.509 certificate usage by | |||
| Secure/Multipurpose Internet Mail Extensions (S/MIME) v4.0 agents. | Secure/Multipurpose Internet Mail Extensions (S/MIME) v4.0 agents. | |||
| S/MIME provides a method to send and receive secure MIME messages, | S/MIME provides a method to send and receive secure MIME messages, | |||
| and certificates are an integral part of S/MIME agent processing. | and certificates are an integral part of S/MIME agent processing. | |||
| S/MIME agents validate certificates as described in RFC 5280, the | S/MIME agents validate certificates as described in RFC 5280, the | |||
| Internet X.509 Public Key Infrastructure Certificate and CRL Profile. | Internet X.509 Public Key Infrastructure Certificate and CRL Profile. | |||
| S/MIME agents must meet the certificate processing requirements in | S/MIME agents must meet the certificate processing requirements in | |||
| this document as well as those in RFC 5280. This document obsoletes | this document as well as those in RFC 5280. This document obsoletes | |||
| RFC 3850. | RFC 5750. | |||
| Contributing to this document | Contributing to this document | |||
| The source for this draft is being maintained in GitHub. Suggested | The source for this draft is being maintained in GitHub. Suggested | |||
| changes should be submitted as pull requests at <https://github.com/ | changes should be submitted as pull requests at <https://github.com/ | |||
| lamps-wg/smime>. Instructions are on that page as well. Editorial | lamps-wg/smime>. Instructions are on that page as well. Editorial | |||
| changes can be managed in GitHub, but any substantial issues need to | changes can be managed in GitHub, but any substantial issues need to | |||
| be discussed on the LAMPS mailing list. | be discussed on the LAMPS mailing list. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 2, line 4 ¶ | skipping to change at page 2, line 4 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 14, 2017. | This Internet-Draft will expire on October 9, 2017. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 3, line 9 ¶ | skipping to change at page 3, line 9 ¶ | |||
| 3. Using Distinguished Names for Internet Mail . . . . . . . . . 9 | 3. Using Distinguished Names for Internet Mail . . . . . . . . . 9 | |||
| 4. Certificate Processing . . . . . . . . . . . . . . . . . . . 10 | 4. Certificate Processing . . . . . . . . . . . . . . . . . . . 10 | |||
| 4.1. Certificate Revocation Lists . . . . . . . . . . . . . . 11 | 4.1. Certificate Revocation Lists . . . . . . . . . . . . . . 11 | |||
| 4.2. Certificate Path Validation . . . . . . . . . . . . . . . 11 | 4.2. Certificate Path Validation . . . . . . . . . . . . . . . 11 | |||
| 4.3. Certificate and CRL Signing Algorithms and Key Sizes . . 12 | 4.3. Certificate and CRL Signing Algorithms and Key Sizes . . 12 | |||
| 4.4. PKIX Certificate Extensions . . . . . . . . . . . . . . . 13 | 4.4. PKIX Certificate Extensions . . . . . . . . . . . . . . . 13 | |||
| 4.4.1. Basic Constraints . . . . . . . . . . . . . . . . . . 14 | 4.4.1. Basic Constraints . . . . . . . . . . . . . . . . . . 14 | |||
| 4.4.2. Key Usage Certificate Extension . . . . . . . . . . . 14 | 4.4.2. Key Usage Certificate Extension . . . . . . . . . . . 14 | |||
| 4.4.3. Subject Alternative Name . . . . . . . . . . . . . . 15 | 4.4.3. Subject Alternative Name . . . . . . . . . . . . . . 15 | |||
| 4.4.4. Extended Key Usage Extension . . . . . . . . . . . . 15 | 4.4.4. Extended Key Usage Extension . . . . . . . . . . . . 15 | |||
| 5. Security Considerations . . . . . . . . . . . . . . . . . . . 16 | 5. IANA Considertions . . . . . . . . . . . . . . . . . . . . . 16 | |||
| 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 18 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 16 | |||
| 6.1. Normative References . . . . . . . . . . . . . . . . . . 18 | 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 18 | |||
| 6.2. Informational References . . . . . . . . . . . . . . . . 20 | 7.1. Normative References . . . . . . . . . . . . . . . . . . 18 | |||
| 7.2. Informational References . . . . . . . . . . . . . . . . 20 | ||||
| Appendix A. Historic Considerations . . . . . . . . . . . . . . 23 | Appendix A. Historic Considerations . . . . . . . . . . . . . . 23 | |||
| A.1. Signature Algorithms and Key Sizes . . . . . . . . . . . 23 | A.1. Signature Algorithms and Key Sizes . . . . . . . . . . . 23 | |||
| Appendix B. Moving S/MIME v2 Certificate Handling to Historic | Appendix B. Moving S/MIME v2 Certificate Handling to Historic | |||
| Status . . . . . . . . . . . . . . . . . . . . . . . 24 | Status . . . . . . . . . . . . . . . . . . . . . . . 24 | |||
| Appendix C. Acknowledgments . . . . . . . . . . . . . . . . . . 24 | Appendix C. Acknowledgments . . . . . . . . . . . . . . . . . . 24 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 25 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 1. Introduction | 1. Introduction | |||
| S/MIME (Secure/Multipurpose Internet Mail Extensions) v4.0, described | S/MIME (Secure/Multipurpose Internet Mail Extensions) v4.0, described | |||
| skipping to change at page 13, line 30 ¶ | skipping to change at page 13, line 30 ¶ | |||
| [RFC4055] and the signature algorithm definition is found in | [RFC4055] and the signature algorithm definition is found in | |||
| [RFC3447]. | [RFC3447]. | |||
| For RSASSA-PSS with SHA-256 see [RFC4056]. | For RSASSA-PSS with SHA-256 see [RFC4056]. | |||
| For ECDSA see [RFC5758] and [RFC6090]. The first reference provides | For ECDSA see [RFC5758] and [RFC6090]. The first reference provides | |||
| the signature algorithm's object identifier and the second provides | the signature algorithm's object identifier and the second provides | |||
| the signature algorithm's definition. Curves other than curve P-256 | the signature algorithm's definition. Curves other than curve P-256 | |||
| MAY be used as well. | MAY be used as well. | |||
| For EdDSA see [I-D.ietf-curdle-pkix] and [I-D.irtf-cfrg-eddsa]. The | For EdDSA see [I-D.ietf-curdle-pkix] and [RFC8032]. The first | |||
| first reference provides the signature algorithm's object identifier | reference provides the signature algorithm's object identifier and | |||
| and the second provides the signature algorithm's definition. Other | the second provides the signature algorithm's definition. Other | |||
| curves than curve 25519 MAY be used as well. | curves than curve 25519 MAY be used as well. | |||
| 4.4. PKIX Certificate Extensions | 4.4. PKIX Certificate Extensions | |||
| PKIX describes an extensible framework in which the basic certificate | PKIX describes an extensible framework in which the basic certificate | |||
| information can be extended and describes how such extensions can be | information can be extended and describes how such extensions can be | |||
| used to control the process of issuing and validating certificates. | used to control the process of issuing and validating certificates. | |||
| The PKIX Working Group has ongoing efforts to identify and create | The PKIX Working Group has ongoing efforts to identify and create | |||
| extensions that have value in particular certification environments. | extensions that have value in particular certification environments. | |||
| Further, there are active efforts underway to issue PKIX certificates | Further, there are active efforts underway to issue PKIX certificates | |||
| skipping to change at page 16, line 5 ¶ | skipping to change at page 16, line 5 ¶ | |||
| extended key usage extension, then the certificate may also be used | extended key usage extension, then the certificate may also be used | |||
| to sign but not encrypt S/MIME messages. | to sign but not encrypt S/MIME messages. | |||
| If the extended key usage extension is present in the certificate, | If the extended key usage extension is present in the certificate, | |||
| then interpersonal message S/MIME receiving agents MUST check that it | then interpersonal message S/MIME receiving agents MUST check that it | |||
| contains either the emailProtection or the anyExtendedKeyUsage OID as | contains either the emailProtection or the anyExtendedKeyUsage OID as | |||
| defined in [RFC5280]. S/MIME uses other than interpersonal messaging | defined in [RFC5280]. S/MIME uses other than interpersonal messaging | |||
| MAY require the explicit presence of the extended key usage extension | MAY require the explicit presence of the extended key usage extension | |||
| or other OIDs to be present in the extension or both. | or other OIDs to be present in the extension or both. | |||
| 5. Security Considerations | 5. IANA Considertions | |||
| This document has no new IANA considerations. | ||||
| 6. Security Considerations | ||||
| All of the security issues faced by any cryptographic application | All of the security issues faced by any cryptographic application | |||
| must be faced by a S/MIME agent. Among these issues are protecting | must be faced by a S/MIME agent. Among these issues are protecting | |||
| the user's private key, preventing various attacks, and helping the | the user's private key, preventing various attacks, and helping the | |||
| user avoid mistakes such as inadvertently encrypting a message for | user avoid mistakes such as inadvertently encrypting a message for | |||
| the wrong recipient. The entire list of security considerations is | the wrong recipient. The entire list of security considerations is | |||
| beyond the scope of this document, but some significant concerns are | beyond the scope of this document, but some significant concerns are | |||
| listed here. | listed here. | |||
| When processing certificates, there are many situations where the | When processing certificates, there are many situations where the | |||
| skipping to change at page 18, line 5 ¶ | skipping to change at page 18, line 9 ¶ | |||
| CRLs associated with newly received messages than the one provided | CRLs associated with newly received messages than the one provided | |||
| for certificates and CRLs associated with previously stored messages. | for certificates and CRLs associated with previously stored messages. | |||
| Server implementations (e.g., secure mail list servers) where user | Server implementations (e.g., secure mail list servers) where user | |||
| warnings are not appropriate SHOULD reject messages with weak | warnings are not appropriate SHOULD reject messages with weak | |||
| cryptography. | cryptography. | |||
| If an implementation is concerned about compliance with National | If an implementation is concerned about compliance with National | |||
| Institute of Standards and Technology (NIST) key size | Institute of Standards and Technology (NIST) key size | |||
| recommendations, then see [SP800-57]. | recommendations, then see [SP800-57]. | |||
| 6. References | 7. References | |||
| 6.1. Normative References | 7.1. Normative References | |||
| [FIPS186-2] | [FIPS186-2] | |||
| National Institute of Standards and Technology (NIST), | National Institute of Standards and Technology (NIST), | |||
| "Digital Signature Standard (DSS) [With Change Notice 1]", | "Digital Signature Standard (DSS) [With Change Notice 1]", | |||
| Federal Information Processing Standards | Federal Information Processing Standards | |||
| Publication 186-2, January 2000. | Publication 186-2, January 2000. | |||
| [FIPS186-3] | [FIPS186-3] | |||
| National Institute of Standards and Technology (NIST), | National Institute of Standards and Technology (NIST), | |||
| "Digital Signature Standard (DSS)", Federal Information | "Digital Signature Standard (DSS)", Federal Information | |||
| Processing Standards Publication 186-3, June 2009. | Processing Standards Publication 186-3, June 2009. | |||
| [I-D.ietf-lamps-eai-addresses] | [I-D.ietf-lamps-eai-addresses] | |||
| Melnikov, A. and W. Chuang, "Internationalized Email | Melnikov, A. and W. Chuang, "Internationalized Email | |||
| Addresses in X.509 certificates", draft-ietf-lamps-eai- | Addresses in X.509 certificates", draft-ietf-lamps-eai- | |||
| addresses-08 (work in progress), March 2017. | addresses-08 (work in progress), March 2017. | |||
| [I-D.ietf-lamps-rfc5751-bis] | [I-D.ietf-lamps-rfc5751-bis] | |||
| Schaad, J., Ramsdell, B., and S. Turner, "Secure/ | Schaad, J., Ramsdell, B., and S. Turner, "Secure/ | |||
| Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 | Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 | |||
| Message Specification", draft-ietf-lamps-rfc5751-bis-03 | Message Specification", draft-ietf-lamps-rfc5751-bis-04 | |||
| (work in progress), February 2017. | (work in progress), March 2017. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <http://www.rfc-editor.org/info/rfc2119>. | <http://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC2634] Hoffman, P., Ed., "Enhanced Security Services for S/MIME", | [RFC2634] Hoffman, P., Ed., "Enhanced Security Services for S/MIME", | |||
| RFC 2634, DOI 10.17487/RFC2634, June 1999, | RFC 2634, DOI 10.17487/RFC2634, June 1999, | |||
| <http://www.rfc-editor.org/info/rfc2634>. | <http://www.rfc-editor.org/info/rfc2634>. | |||
| skipping to change at page 20, line 35 ¶ | skipping to change at page 20, line 40 ¶ | |||
| This group of documents represents S/MIME version 4.0. | This group of documents represents S/MIME version 4.0. | |||
| This set of documents are [RFC2634], | This set of documents are [RFC2634], | |||
| [I-D.ietf-lamps-rfc5751-bis], [[This Document]], | [I-D.ietf-lamps-rfc5751-bis], [[This Document]], | |||
| [RFC5652], and [RFC5035]. | [RFC5652], and [RFC5035]. | |||
| [X.680] "Information Technology - Abstract Syntax Notation One | [X.680] "Information Technology - Abstract Syntax Notation One | |||
| (ASN.1): Specification of basic notation. ITU-T | (ASN.1): Specification of basic notation. ITU-T | |||
| Recommendation X.680 (2002) | ISO/IEC 8824-1:2002.". | Recommendation X.680 (2002) | ISO/IEC 8824-1:2002.". | |||
| 6.2. Informational References | 7.2. Informational References | |||
| [ESS] "Enhanced Security Services for S/ MIME". | [ESS] "Enhanced Security Services for S/ MIME". | |||
| This is the set of documents dealing with enhanged | This is the set of documents dealing with enhanged | |||
| security services and refers to [RFC2634] and [RFC5035]. | security services and refers to [RFC2634] and [RFC5035]. | |||
| [I-D.ietf-curdle-pkix] | [I-D.ietf-curdle-pkix] | |||
| Josefsson, S. and J. Schaad, "Algorithm Identifiers for | Josefsson, S. and J. Schaad, "Algorithm Identifiers for | |||
| Ed25519, Ed25519ph, Ed448, Ed448ph, X25519 and X448 for | Ed25519, Ed448, X25519 and X448 for use in the Internet | |||
| use in the Internet X.509 Public Key Infrastructure", | X.509 Public Key Infrastructure", draft-ietf-curdle- | |||
| draft-ietf-curdle-pkix-03 (work in progress), November | pkix-04 (work in progress), March 2017. | |||
| 2016. | ||||
| [I-D.irtf-cfrg-eddsa] | ||||
| Josefsson, S. and I. Liusvaara, "Edwards-curve Digital | ||||
| Signature Algorithm (EdDSA)", draft-irtf-cfrg-eddsa-08 | ||||
| (work in progress), August 2016. | ||||
| [PKCS6] RSA Laboratories, "PKCS #6: Extended-Certificate Syntax | [PKCS6] RSA Laboratories, "PKCS #6: Extended-Certificate Syntax | |||
| Standard", November 1993. | Standard", November 1993. | |||
| [RFC2311] Dusse, S., Hoffman, P., Ramsdell, B., Lundblade, L., and | [RFC2311] Dusse, S., Hoffman, P., Ramsdell, B., Lundblade, L., and | |||
| L. Repka, "S/MIME Version 2 Message Specification", | L. Repka, "S/MIME Version 2 Message Specification", | |||
| RFC 2311, DOI 10.17487/RFC2311, March 1998, | RFC 2311, DOI 10.17487/RFC2311, March 1998, | |||
| <http://www.rfc-editor.org/info/rfc2311>. | <http://www.rfc-editor.org/info/rfc2311>. | |||
| [RFC2312] Dusse, S., Hoffman, P., Ramsdell, B., and J. Weinstein, | [RFC2312] Dusse, S., Hoffman, P., Ramsdell, B., and J. Weinstein, | |||
| skipping to change at page 22, line 34 ¶ | skipping to change at page 22, line 34 ¶ | |||
| [RFC6151] Turner, S. and L. Chen, "Updated Security Considerations | [RFC6151] Turner, S. and L. Chen, "Updated Security Considerations | |||
| for the MD5 Message-Digest and the HMAC-MD5 Algorithms", | for the MD5 Message-Digest and the HMAC-MD5 Algorithms", | |||
| RFC 6151, DOI 10.17487/RFC6151, March 2011, | RFC 6151, DOI 10.17487/RFC6151, March 2011, | |||
| <http://www.rfc-editor.org/info/rfc6151>. | <http://www.rfc-editor.org/info/rfc6151>. | |||
| [RFC6194] Polk, T., Chen, L., Turner, S., and P. Hoffman, "Security | [RFC6194] Polk, T., Chen, L., Turner, S., and P. Hoffman, "Security | |||
| Considerations for the SHA-0 and SHA-1 Message-Digest | Considerations for the SHA-0 and SHA-1 Message-Digest | |||
| Algorithms", RFC 6194, DOI 10.17487/RFC6194, March 2011, | Algorithms", RFC 6194, DOI 10.17487/RFC6194, March 2011, | |||
| <http://www.rfc-editor.org/info/rfc6194>. | <http://www.rfc-editor.org/info/rfc6194>. | |||
| [RFC8032] Josefsson, S. and I. Liusvaara, "Edwards-Curve Digital | ||||
| Signature Algorithm (EdDSA)", RFC 8032, | ||||
| DOI 10.17487/RFC8032, January 2017, | ||||
| <http://www.rfc-editor.org/info/rfc8032>. | ||||
| [SMIMEv2] "S/MIME version v2". | [SMIMEv2] "S/MIME version v2". | |||
| This group of documents represents S/MIME version 2. This | This group of documents represents S/MIME version 2. This | |||
| set of documents are [RFC2311], [RFC2312], [RFC2313], | set of documents are [RFC2311], [RFC2312], [RFC2313], | |||
| [RFC2314], and [RFC2315]. | [RFC2314], and [RFC2315]. | |||
| [SMIMEv3] "S/MIME version 3". | [SMIMEv3] "S/MIME version 3". | |||
| This group of documents represents S/MIME version 3. This | This group of documents represents S/MIME version 3. This | |||
| set of documents are [RFC2630], [RFC2631], [RFC2632], | set of documents are [RFC2630], [RFC2631], [RFC2632], | |||
| End of changes. 14 change blocks. | ||||
| 29 lines changed or deleted | 33 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||