| < draft-turner-clearancesponsor-attribute-02.txt | draft-turner-clearancesponsor-attribute-03.txt > | |||
|---|---|---|---|---|
| Network Working Group Sean Turner, IECA | Network Working Group Sean Turner, IECA | |||
| Internet Draft October 20, 2009 | Internet Draft February 1, 2010 | |||
| Intended Status: Informational Track | Intended Status: Informational Track | |||
| Expires: April 20, 2010 | Expires: August 1, 2010 | |||
| Clearance Sponsor Attribute | Clearance Sponsor Attribute | |||
| draft-turner-clearancesponsor-attribute-02.txt | draft-turner-clearancesponsor-attribute-03.txt | |||
| Abstract | ||||
| This document defines the clearance sponsor attribute. It indicates | ||||
| the entity that sponsored (i.e., granted) the clearance. This | ||||
| attribute is intended for use in public key certificates and | ||||
| attribute certificates that also include the clearance attribute. | ||||
| Status of this Memo | Status of this Memo | |||
| This Internet-Draft is submitted to IETF in full conformance with the | This Internet-Draft is submitted to IETF in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| other groups may also distribute working documents as Internet- | other groups may also distribute working documents as Internet- | |||
| Drafts. | Drafts. | |||
| skipping to change at page 1, line 31 ¶ | skipping to change at page 1, line 38 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
| This Internet-Draft will expire on April 20, 2010. | This Internet-Draft will expire on August 1, 2010. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2009 IETF Trust and the persons identified as the | Copyright (c) 2010 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents in effect on the date of | Provisions Relating to IETF Documents | |||
| publication of this document (http://trustee.ietf.org/license-info). | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | ||||
| Abstract | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | ||||
| This document defines the clearance sponsor attribute. This | described in the Simplified BSD License. | |||
| attribute may be included in locations or protocols that support | ||||
| X.500 attributes. | ||||
| 1. Introduction | 1. Introduction | |||
| This document specifies the clearance sponsor attribute. This | This document specifies the clearance sponsor attribute. It is | |||
| attribute may be included in locations or protocols that support | included in public key certificates [RFC5280] and attribute | |||
| X.500 attribute definitions to indicate the entity that sponsored the | certificates [RFC5755]. This attribute is only meaningful as a | |||
| clearance. This attribute is only meaningful when the clearance | companion of the clearance attribute [RFC5755]. The clearance | |||
| attribute [RFC3281bis] is also included. | sponsor is the entity (e.g., agency, department, or organization) | |||
| that granted the clearance to the subject named in the certificate. | ||||
| For example, the clearance sponsor for a subject asserting the Amoco | ||||
| clearance values [RFC3114] could be "Engineering". | ||||
| This attribute may be used in authorization decisions. For example, | This attribute may be used in automated authorization decisions. For | |||
| a web server deciding whether to allow a user access could check that | example, a web server deciding whether to allow a user access could | |||
| the clearance sponsor present in the user's certificate is on an | check that the clearance sponsor present in the user's certificate is | |||
| "approved" list. The web server could also check that the included | on an "approved" list. This check is performed in addition to | |||
| clearance sponsor is on an "approved" list to issue the included | certification path validation [RFC5280]. The mechanism for managing | |||
| clearance. | the "approved" list is beyond the scope of this document. | |||
| NOTE: This document does not provide LDAP equivalent schema | NOTE: This document does not provide an equivalent LDAP schema | |||
| specification as this attribute is initially targeted at public key | specification as this attribute is initially targeted at public key | |||
| certificates [RFC5280] and attribute certificates [RFC3281bis]. This | certificates [RFC5280] and attribute certificates [RFC5755]. | |||
| is left to a future specification. | Definition of an equivalent LDAP schema is left to a future | |||
| specification. | ||||
| 1.1. Terminology | 1.1. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 1.2. ASN.1 Syntax Notation | 1.2. ASN.1 Syntax Notation | |||
| The attributes are defined using ASN.1 [X.680]. | The attribute is defined using ASN.1 [X.680] through [X.683]. | |||
| 2. Clearance Sponsor | 2. Clearance Sponsor | |||
| The clearance sponsor attribute indicates the sponsor of the | The clearance sponsor attribute, which is only meaningful if the | |||
| clearance of the subject with which this attribute is associated. | clearance attribute [RFC5755] is also present, indicates the sponsor | |||
| This attribute is only meaningful if the clearance attribute | of the clearance of the subject with which this attribute is | |||
| [RFC3281bis] is also present. The clearance sponsor attribute is a | associated. The clearance sponsor attribute is a DirectoryString | |||
| DirectoryString [RFC5280], which MUST use the UTF8String CHOICE, | [RFC5280], which MUST use the UTF8String CHOICE, string with a | |||
| string with a minimum size of 1 characters and a maximum of 32 | minimum size of 1 characters and a maximum of 64 characters. | |||
| characters. | ||||
| The following object identifier identifies the sponsor attribute: | The following object identifier identifies the sponsor attribute: | |||
| id-clearanceSponsor OBJECT IDENTIFIER ::= { | id-clearanceSponsor OBJECT IDENTIFIER ::= { | |||
| joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) | joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) | |||
| dod(2) infosec(1) attributes(5) 68 | dod(2) infosec(1) attributes(5) 68 | |||
| } | } | |||
| The ASN.1 syntax for the clearance sponsor attribute is as follows: | The ASN.1 syntax for the clearance sponsor attribute is as follows: | |||
| clearanceSponsor ATTRIBUTE ::= { | at-clearanceSponsor ATTRIBUTE ::= { | |||
| WITH SYNTAX DirectoryString { ub-clearance-sponsor } | TYPE DirectoryString { ub-clearance-sponsor } | |||
| ( WITH CONSTRAINT { utf8String PRESENT} ) | ( WITH COMPONENTS { utf8String PRESENT} ) | |||
| EQUALITY-MATCHING RULE caseIgnoreMatch | EQUALITY MATCHING RULE caseIgnoreMatch | |||
| SINGLE VALUE TRUE | IDENTIFIED BY id-clearanceSponsor | |||
| ID id-clearanceSponsor | ||||
| } | } | |||
| ub-clearance-sponsor INTEGER ::= 32 | ub-clearance-sponsor INTEGER ::= 64 | |||
| There MUST only be one value of clearanceSponsor associated with a | There MUST only be one value of clearanceSponsor associated with a | |||
| particular certificate, as distinct sponsors SHOULD be represented in | particular certificate. Distinct sponsors MUST be represented in | |||
| separate certificates. | separate certificates. | |||
| When an environment uses the Clearance Sponsor attribute, it is | ||||
| important that the same representation of the sponsor be used | ||||
| throughout the environment (e.g., using the same acronym). Further, | ||||
| the value in this attribute is not meant to be globally unique. When | ||||
| included in certificates, it is unique within the scope of the | ||||
| issuer. | ||||
| 3. Security Considerations | 3. Security Considerations | |||
| If this attribute is used as part of an authorization process, the | If this attribute is used as part of an authorization process, the | |||
| procedures employed by the entity that assigns each value must ensure | procedures employed by the entity that assigns each clearance sponsor | |||
| that the correct value is applied. Further, once applied to the | value must ensure that the correct value is applied. Including this | |||
| object it must be bound to the object; this binding is normally | attribute in a public key certificate or attribute certificate | |||
| performed by digitally signing over the object and the attribute to | ensures the value for the clearance sponsor is integrity protected. | |||
| ensure data integrity. | ||||
| The certificate issuer and clearance sponsor are not necessarily the | ||||
| same entity. If they are separate entities, then the mechanism used | ||||
| by the clearance sponsor to convey to the certificate issuer that | ||||
| clearance sponsor did in fact grant the clearance to the subject | ||||
| needs to be protected from unauthorized modification. | ||||
| If two entities are verifying each other's certificates, they do not | ||||
| share the same issuer, and they use the same clearance sponsor value | ||||
| (e.g., a United Kingdom PKI includes "MoD" and a New Zealand PKI also | ||||
| includes "MoD"), then the relying party has two choices 1) accept the | ||||
| two as strings as equivalent 2) indicate the sponsor as well as the | ||||
| trust anchor. To solve this problem, a mechanism, which is out side | ||||
| the scope of this specification, could be developed to allow a | ||||
| relying party to group together issuers that share a same context | ||||
| within which sponsor names have a unique significance. | ||||
| While values of DirectoryString can include the NUL (U+0000) code | While values of DirectoryString can include the NUL (U+0000) code | |||
| point, values used to represent clearance sponsors typically would | point, values used to represent clearance sponsors typically would | |||
| not. Implementations of the caseIgnoreMatch rule must, per X.501, | not. Implementations of the caseIgnoreMatch rule must, per X.501, | |||
| consider all of the assertion value and attribute value in matching | consider all of the assertion value and attribute value in matching | |||
| and hence protect against truncation attacks. | and hence protect against truncation attacks. | |||
| 4. IANA Considerations | 4. IANA Considerations | |||
| None: All identifiers are already registered. Please remove this | None: All identifiers are already registered. Please remove this | |||
| skipping to change at page 4, line 16 ¶ | skipping to change at page 4, line 39 ¶ | |||
| 5.1. Normative References | 5.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC5280] Cooper, D., et.al., "Internet X.509 Public Key | [RFC5280] Cooper, D., et.al., "Internet X.509 Public Key | |||
| Infrastructure Certificate and Certification | Infrastructure Certificate and Certification | |||
| Revocation List (CRL) Profile", RFC 5280, May 2008. | Revocation List (CRL) Profile", RFC 5280, May 2008. | |||
| [RFC3281bis] Farrell, S., Housley, R., and S. Turner, "An Internet | [RFC5755] Farrell, S., Housley, R., and S. Turner, "An Internet | |||
| Attribute Certificate Profile for Authorization", | Attribute Certificate Profile for Authorization", RFC | |||
| draft-ietf-pkix-3281update-05.txt, work-in-progress. | 5755, January 2010. | |||
| [RFCTBD] Schaad, J., and P. Hoffman, "New ASN.1 Modules for | ||||
| PKIX", draft-ietf-pkix-new-asn1-07.txt, work-in- | ||||
| progress. | ||||
| /** | /** | |||
| RFC Editor: Please replace "RFC3281bis" with "RFC####" where #### is | RFC Editor: Please replace "RFCTBD" with "RFC####" where #### is the | |||
| the number of the published RFC in both the references and the text. | number of the published RFC. Please do this in both the references | |||
| and the text. | ||||
| **/ | **/ | |||
| [X.520] ITU-T Recommendation X.520 (2002) | ISO/IEC 9594- | ||||
| 6:2002, Information technology - The Directory: | ||||
| Selected Attribute Types. | ||||
| [X.680] ITU-T Recommendation X.680 (2002) | ISO/IEC 8824- | [X.680] ITU-T Recommendation X.680 (2002) | ISO/IEC 8824- | |||
| 1:2002, Information technology - Abstract Syntax | 1:2002, Information technology - Abstract Syntax | |||
| Notation One (ASN.1): Specification of basic | Notation One (ASN.1): Specification of basic | |||
| notation. | notation. | |||
| [X.681] ITU-T Recommendation X.681 (2002) | ISO/IEC 8824- | ||||
| 2:2002. Information Technology - Abstract Syntax | ||||
| Notation One: Information Object Specification. | ||||
| [X.682] ITU-T Recommendation X.682 (2002) | ISO/IEC 8824- | ||||
| 3:2002. Information Technology - Abstract Syntax | ||||
| Notation One: Constraint Specification. | ||||
| [X.683] ITU-T Recommendation X.683 (2002) | ISO/IEC 8824- | ||||
| 4:2002. Information Technology - Abstract Syntax | ||||
| Notation One: Parameterization of ASN.1 | ||||
| Specifications. | ||||
| 5.2. Informative References | 5.2. Informative References | |||
| None | [RFC3114] Nicolls, W., "Implementing Company Classification | |||
| Policy with the S/MIME Security Label", RFC 3114, May | ||||
| 2002. | ||||
| Appendix A. ASN.1 Module | Appendix A. ASN.1 Module | |||
| This appendix provides the normative ASN.1 [X.680] definition for the | This appendix provides the normative ASN.1 [X.680] definitions for | |||
| structure described in this specification. | the structures described in this specification using ASN.1 as defined | |||
| in [X.680] through [X.683]. | ||||
| ClearanceSponsorAttribute-2008 | ClearanceSponsorAttribute-2008 | |||
| { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) | { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) | |||
| dod(2) infosec(1) modules(0) | dod(2) infosec(1) modules(0) | |||
| id-clearanceSponsorAttribute-2008(35) } | id-clearanceSponsorAttribute-2008(35) } | |||
| DEFINITIONS IMPLICIT TAGS ::= | DEFINITIONS IMPLICIT TAGS ::= | |||
| BEGIN | BEGIN | |||
| -- EXPORTS ALL -- | -- EXPORTS ALL -- | |||
| IMPORTS | IMPORTS | |||
| -- Imports from RFC 5280 [RFC5280]. | ||||
| -- Imports from New PKIX ASN.1 [RFCTBD] | ||||
| DirectoryString | DirectoryString | |||
| PKIX1Explicit88 | PKIX1Explicit-2009 | |||
| { iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
| security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
| id-pkix1-explicit(18) } | id-pkix1-explicit-02(51) } | |||
| -- Imports from New PKIX ASN.1 [RFCTBD] | ||||
| ATTRIBUTE | ||||
| FROM PKIX-CommonTypes-2009 | ||||
| { iso(1) identified-organization(3) dod(6) internet(1) | ||||
| security(5) mechanisms(5) pkix(7) id-mod(0) | ||||
| id-mod-pkixCommon-02(57) } | ||||
| -- Imports from ITU-T X.520 [X.520] | ||||
| -- Imports from ITU-T X.520 [X.520]. | ||||
| caseIgnoreMatch | caseIgnoreMatch | |||
| FROM SelectedAttributeTypes | FROM SelectedAttributeTypes | |||
| { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 } | { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 } | |||
| ; | ; | |||
| -- sponsor attribute OID and syntax | -- sponsor attribute OID and syntax | |||
| id-clearanceSponsor OBJECT IDENTIFIER ::= { | id-clearanceSponsor OBJECT IDENTIFIER ::= { | |||
| joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) | joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) | |||
| dod(2) infosec(1) attributes(5) 68 | dod(2) infosec(1) attributes(5) 68 | |||
| } | } | |||
| clearanceSponsor ATTRIBUTE ::= { | at-clearanceSponsor ATTRIBUTE ::= { | |||
| WITH SYNTAX DirectoryString { ub-clearance-sponsor } | TYPE DirectoryString { ub-clearance-sponsor } | |||
| ( WITH CONSTRAINT { utf8String PRESENT} ) | ( WITH COMPONENTS { utf8String PRESENT} ) | |||
| EQUALITY-MATCHING RULE caseIgnoreMatch | EQUALITY MATCHING RULE caseIgnoreMatch | |||
| SINGLE VALUE TRUE | IDENTIFIED BY id-clearanceSponsor | |||
| ID id-clearanceSponsor | ||||
| } | } | |||
| ub-clearance-sponsor INTEGER ::= 32 | ub-clearance-sponsor INTEGER ::= 64 | |||
| ATTRIBUTE ::= CLASS { | ||||
| &derivation ATTRIBUTE OPTIONAL, | ||||
| &Type OPTIONAL, | ||||
| -- either &Type or &derivation required | ||||
| &equality-match MATCHING-RULE OPTIONAL, | ||||
| &ordering-match MATCHING-RULE OPTIONAL, | ||||
| &substrings-match MATCHING-RULE OPTIONAL, | ||||
| &single-valued BOOLEAN DEFAULT FALSE, | ||||
| &collective BOOLEAN DEFAULT FALSE, | ||||
| -- operational extensions | ||||
| &no-user-modification BOOLEAN DEFAULT FALSE, | ||||
| &usage AttributeUsage DEFAULT userApplications, | ||||
| &id OBJECT IDENTIFIER UNIQUE } | ||||
| WITH SYNTAX { | ||||
| [ SUBTYPE OF &derivation ] | ||||
| [ WITH SYNTAX &Type ] | ||||
| [ EQUALITY MATCHING RULE &equality-match ] | ||||
| [ ORDERING MATCHING RULE &ordering-match ] | ||||
| [ SUBSTRINGS MATCHING RULE &substrings-match ] | ||||
| [ SINGLE VALUE &single-valued ] | ||||
| [ COLLECTIVE &collective ] | ||||
| [ NO USER MODIFICATION &no-user-modification ] | ||||
| [ USAGE &usage ] | ||||
| ID &id } | ||||
| MATCHING-RULE ::= CLASS { | ||||
| &AssertionType OPTIONAL, | ||||
| &id OBJECT IDENTIFIER UNIQUE } | ||||
| WITH SYNTAX { | ||||
| [ SYNTAX &AssertionType ] | ||||
| ID &id } | ||||
| AttributeType ::= ATTRIBUTE.&id | ||||
| AttributeValue ::= ATTRIBUTE.&Type | ||||
| AttributeUsage ::= ENUMERATED { | ||||
| userApplications (0), | ||||
| directoryOperation (1), | ||||
| distributedOperation (2), | ||||
| dSAOperation (3) } | ||||
| END | END | |||
| Author's Addresses | Author's Address | |||
| Sean Turner | Sean Turner | |||
| IECA, Inc. | IECA, Inc. | |||
| 3057 Nutley Street, Suite 106 | 3057 Nutley Street, Suite 106 | |||
| Fairfax, VA 22031 | Fairfax, VA 22031 | |||
| USA | USA | |||
| EMail: turners@ieca.com | EMail: turners@ieca.com | |||
| End of changes. 32 change blocks. | ||||
| 113 lines changed or deleted | 134 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||