1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
|
<pre>Network Working Group J. Schaad
Request for Comments: 5035 Soaring Hawk Consulting
Updates: <a href="./rfc2634">2634</a> August 2007
Category: Standards Track
<span class="h1">Enhanced Security Services (ESS) Update:</span>
<span class="h1">Adding CertID Algorithm Agility</span>
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Abstract
In the original Enhanced Security Services for S/MIME document (<a href="./rfc2634">RFC</a>
<a href="./rfc2634">2634</a>), a structure for cryptographically linking the certificate to
be used in validation with the signature was introduced; this
structure was hardwired to use SHA-1. This document allows for the
structure to have algorithm agility and defines a new attribute for
this purpose.
Table of Contents
<a href="#section-1">1</a>. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-2">2</a>
<a href="#section-1.1">1.1</a>. Notation . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-2">2</a>
<a href="#section-1.2">1.2</a>. Updates to <a href="./rfc2634">RFC 2634</a> . . . . . . . . . . . . . . . . . . . <a href="#page-2">2</a>
2. Replace <a href="#section-5.4">Section 5.4</a> 'Signing Certificate Attribute
Definitions' . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
3. Insert New <a href="#section-5.4.1">Section 5.4.1</a> 'Signing Certificate Attribute
Definition Version 2' . . . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
4. Insert New <a href="#section-5.4.1.1">Section 5.4.1.1</a> 'Certificate Identification
Version 2' . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
5. Insert New <a href="#section-5.4.2">Section 5.4.2</a> 'Signing Certificate Attribute
Definition Version 1' . . . . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
6. Insert New <a href="#section-5.4.2.1">Section 5.4.2.1</a> 'Certificate Identification
Version 1' . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
<a href="#section-7">7</a>. Security Considerations . . . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-8">8</a>. Normative References . . . . . . . . . . . . . . . . . . . . . <a href="#page-10">10</a>
<a href="#appendix-A">Appendix A</a>. ASN.1 Module . . . . . . . . . . . . . . . . . . . . <a href="#page-11">11</a>
<span class="grey">Schaad Standards Track [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
In the original Enhanced Security Services (ESS) for S/MIME document
[<a href="#ref-ESS" title=""Enhanced Security Services for S/MIME"">ESS</a>], a structure for cryptographically linking the certificate to
be used in validation with the signature was defined. This
structure, called ESSCertID, identifies a certificate by its hash.
The structure is hardwired to use a SHA-1 hash value. The recent
attacks on SHA-1 require that we define a new attribute that allows
for the use of different algorithms. This document performs that
task.
This document defines the structure ESSCertIDv2 along with a new
attribute SigningCertificateV2, which uses the updated structure.
This document allows for the structure to have algorithm agility by
including an algorithm identifier and defines a new signed attribute
to use the new structure.
This document specifies the continued use of ESSCertID to ensure
compatibility when SHA-1 is used for certificate disambiguation.
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>. Notation</span>
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
<span class="h3"><a class="selflink" id="section-1.2" href="#section-1.2">1.2</a>. Updates to <a href="./rfc2634">RFC 2634</a></span>
This document updates <a href="./rfc2634#section-5.4">Section 5.4 of RFC 2634</a>. Once the updates are
applied, the revised section will have the following structure:
5.4 Signing Certificate Attribute Definitions
5.4.1 Signing Certificate Attribute Definition Version 2
5.4.1.1 Certificate Identification Version 2
5.4.2 Signing Certificate Attribute Definition Version 1
5.4.2.1 Certificate Identification Version 1
In addition, the ASN.1 module in <a href="#appendix-A">Appendix A</a> is replaced.
<span class="grey">Schaad Standards Track [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Replace <a href="#section-5.4">Section 5.4</a> 'Signing Certificate Attribute Definitions'</span>
5.4 Signing Certificate Attribute Definitions
The signing certificate attribute is designed to prevent simple
substitution and re-issue attacks, and to allow for a restricted set
of certificates to be used in verifying a signature.
Two different attributes exist for this due to a flaw in the original
design. The only substantial difference between the two attributes
is that SigningCertificateV2 allows for hash algorithm agility, while
SigningCertificate forces the use of the SHA-1 hash algorithm. With
the recent advances in the ability to create hash collisions for
SHA-1, it is wise to move forward sooner rather than later.
When the SHA-1 hash function is used, the SigningCertificate
attribute MUST be used. The SigningCertificateV2 attribute MUST be
used if any algorithm other than SHA-1 is used and SHOULD NOT be used
for SHA-1. Applications SHOULD recognize both attributes as long as
they consider SHA-1 able to distinguish between two different
certificates, (i.e., the possibility of a collision is sufficiently
low). If both attributes exist in a single message, they are
independently evaluated.
Four cases exist that need to be taken into account when using this
attribute for correct processing:
1. Signature validates and the hashes match: This is the success
case.
2. Signature validates and the hashes do not match: In this case,
the certificate contained the correct public key, but the
certificate containing the public key is not the one that the
signer intended to be used. In this case the application should
attempt a search for a different certificate with the same public
key and for which the hashes match. If no such certificate can
be found, this is a failure case.
3. Signature fails validation and the hashes match: In this case, it
can be assumed that the signature has been modified in some
fashion. This is a failure case.
4. Signature fails validation and the hashes do not match: In this
case, it can be either that the signature has been modified, or
that the wrong certificate has been used. Applications should
attempt a search for a different certificate that matches the
hash value in the attribute and use the new certificate to retry
the signature validation.
<span class="grey">Schaad Standards Track [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Insert New <a href="#section-5.4.1">Section 5.4.1</a> 'Signing Certificate Attribute Definition</span>
<span class="h2"> Version 2'</span>
5.4.1 Signing Certificate Attribute Definition Version 2
The signing certificate attribute is designed to prevent the simple
substitution and re-issue attacks, and to allow for a restricted set
of certificates to be used in verifying a signature.
SigningCertificateV2 is identified by the OID:
id-aa-signingCertificateV2 OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 47 }
The attribute has the ASN.1 definition:
SigningCertificateV2 ::= SEQUENCE {
certs SEQUENCE OF ESSCertIDv2,
policies SEQUENCE OF PolicyInformation OPTIONAL
}
certs
contains the list of certificates that are to be used in
validating the message. The first certificate identified in the
sequence of certificate identifiers MUST be the certificate used
to verify the signature. The encoding of the ESSCertIDv2 for this
certificate SHOULD include the issuerSerial field. If other
constraints ensure that issuerAndSerialNumber will be present in
the SignerInfo, the issuerSerial field MAY be omitted. The
certificate identified is used during the signature verification
process. If the hash of the certificate does not match the
certificate used to verify the signature, the signature MUST be
considered invalid.
If more than one certificate is present, subsequent certificates
limit the set of certificates that are used during validation.
Certificates can be either attribute certificates (limiting
authorizations) or public key certificates (limiting path
validation). The issuerSerial field (in the ESSCertIDv2
structure) SHOULD be present for these certificates, unless the
client who is validating the signature is expected to have easy
access to all the certificates required for validation. If only
the signing certificate is present in the sequence, there are no
restrictions on the set of certificates used in validating the
signature.
<span class="grey">Schaad Standards Track [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
policies
contains a sequence of policy information terms that identify
those certificate policies that the signer asserts apply to the
certificate, and under which the certificate should be relied
upon. This value suggests a policy value to be used in the
relying party's certification path validation. The definition of
PolicyInformation can be found in [<a href="./rfc3280" title=""Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"">RFC3280</a>].
If present, the SigningCertificateV2 attribute MUST be a signed
attribute; it MUST NOT be an unsigned attribute. CMS defines
SignedAttributes as a SET OF Attribute. A SignerInfo MUST NOT
include multiple instances of the SigningCertificateV2 attribute.
CMS defines the ASN.1 syntax for the signed attributes to include
attrValues SET OF AttributeValue. A SigningCertificateV2 attribute
MUST include only a single instance of AttributeValue. There MUST
NOT be zero or multiple instances of AttributeValue present in the
attrValues SET OF AttributeValue.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Insert New <a href="#section-5.4.1.1">Section 5.4.1.1</a> 'Certificate Identification Version 2'</span>
Insert the following text as a new section.
5.4.1.1 Certificate Identification Version 2
The best way to identify certificates is an often-discussed issue.
The ESSCertIDv2 structure supplies two different fields that are used
for this purpose.
The hash of the entire certificate allows for a verifier to check
that the certificate used in the verification process was the same
certificate the signer intended. Hashes are convenient in that they
are frequently used by certificate stores as a method of indexing and
retrieving certificates as well. The use of the hash is required by
this structure since the detection of substituted certificates is
based on the fact they would map to different hash values.
The issuer/serial number pair is the method of identification of
certificates used in [<a href="./rfc3280" title=""Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"">RFC3280</a>]. That document imposes a restriction
for certificates that the issuer distinguished name must be present.
The issuer/serial number pair would therefore normally be sufficient
to identify the correct signing certificate. (This assumes the same
issuer name is not reused from the set of trust anchors.) The
issuer/serial number pair can be stored in the sid field of the
SignerInfo object. However, the sid field is not covered by the
signature. In the cases where the issuer/serial number pair is not
used in the sid or the issuer/serial number pair needs to be signed,
it SHOULD be placed in the issuerSerial field of the ESSCertIDv2
structure.
<span class="grey">Schaad Standards Track [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
Attribute certificates and additional public key certificates
containing information do not have an issuer/serial number pair
represented anywhere in a SignerInfo object. When an attribute
certificate or an additional public key certificate is not included
in the SignedData object, it becomes much more difficult to get the
correct set of certificates based only on a hash of the certificate.
For this reason, these certificates SHOULD be identified by the
IssuerSerial object.
This document defines a certificate identifier as:
ESSCertIDv2 ::= SEQUENCE {
hashAlgorithm AlgorithmIdentifier
DEFAULT {algorithm id-sha256},
certHash Hash,
issuerSerial IssuerSerial OPTIONAL
}
Hash ::= OCTET STRING
IssuerSerial ::= SEQUENCE {
issuer GeneralNames,
serialNumber CertificateSerialNumber
}
The fields of ESSCertIDv2 are defined as follows:
hashAlgorithm
contains the identifier of the algorithm used in computing
certHash.
certHash
is computed over the entire DER-encoded certificate (including the
signature) using the SHA-1 algorithm.
issuerSerial
holds the identification of the certificate. The issuerSerial
would normally be present unless the value can be inferred from
other information (e.g., the sid field of the SignerInfo object).
The fields of IssuerSerial are defined as follows:
issuer
contains the issuer name of the certificate. For non-attribute
certificates, the issuer MUST contain only the issuer name from
the certificate encoded in the directoryName choice of
GeneralNames. For attribute certificates, the issuer MUST contain
the issuer name field from the attribute certificate.
<span class="grey">Schaad Standards Track [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
serialNumber
holds the serial number that uniquely identifies the certificate
for the issuer.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Insert New <a href="#section-5.4.2">Section 5.4.2</a> 'Signing Certificate Attribute Definition</span>
<span class="h2"> Version 1'</span>
(Note: This section does not present new material. This section
contains the original contents of Section 5.4 in [<a href="#ref-ESS" title=""Enhanced Security Services for S/MIME"">ESS</a>], which are
retained with minor changes in this specification to achieve
backwards compatibility.)
Insert the following text as a new section.
5.4.2 Signing Certificate Attribute Definition Version 1
The signing certificate attribute is designed to prevent the simple
substitution and re-issue attacks, and to allow for a restricted set
of certificates to be used in verifying a signature.
The definition of SigningCertificate is
SigningCertificate ::= SEQUENCE {
certs SEQUENCE OF ESSCertID,
policies SEQUENCE OF PolicyInformation OPTIONAL
}
id-aa-signingCertificate OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 12 }
The first certificate identified in the sequence of certificate
identifiers MUST be the certificate used to verify the signature.
The encoding of the ESSCertID for this certificate SHOULD include the
issuerSerial field. If other constraints ensure that
issuerAndSerialNumber will be present in the SignerInfo, the
issuerSerial field MAY be omitted. The certificate identified is
used during the signature verification process. If the hash of the
certificate does not match the certificate used to verify the
signature, the signature MUST be considered invalid.
If more than one certificate is present in the sequence of
ESSCertIDs, the certificates after the first one limit the set of
certificates that are used during validation. Certificates can be
either attribute certificates (limiting authorizations) or public key
certificates (limiting path validation). The issuerSerial field (in
the ESSCertID structure) SHOULD be present for these certificates,
unless the client who is validating the signature is expected to have
<span class="grey">Schaad Standards Track [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
easy access to all the certificates required for validation. If only
the signing certificate is present in the sequence, there are no
restrictions on the set of certificates used in validating the
signature.
The sequence of policy information terms identifies those certificate
policies that the signer asserts apply to the certificate, and under
which the certificate should be relied upon. This value suggests a
policy value to be used in the relying party's certification path
validation.
If present, the SigningCertificate attribute MUST be a signed
attribute; it MUST NOT be an unsigned attribute. Cryptographic
Message Syntax (CMS) defines SignedAttributes as a SET OF Attribute.
A SignerInfo MUST NOT include multiple instances of the
SigningCertificate attribute. CMS defines the ASN.1 syntax for the
signed attributes to include attrValues SET OF AttributeValue. A
SigningCertificate attribute MUST include only a single instance of
AttributeValue. There MUST NOT be zero or multiple instances of
AttributeValue present in the attrValues SET OF AttributeValue.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Insert New <a href="#section-5.4.2.1">Section 5.4.2.1</a> 'Certificate Identification Version 1'</span>
(Note: This section does not present new material. This section
contains the original contents of Section 5.4 in [<a href="#ref-ESS" title=""Enhanced Security Services for S/MIME"">ESS</a>], which are
retained with minor changes in this specification to achieve
backwards compatibility.)
Delete old <a href="#section-5.4.1">Section 5.4.1</a>
Insert the following as new text
5.4.2.1 Certificate Identification Version 1
Certificates are uniquely identified using the information in the
ESSCertID structure. Discussion can be found in <a href="#section-5.4.1.1">Section 5.4.1.1</a>.
This document defines a certificate identifier as:
ESSCertID ::= SEQUENCE {
certHash Hash,
issuerSerial IssuerSerial OPTIONAL
}
<span class="grey">Schaad Standards Track [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
The fields of ESSCertID are defined as follows:
certHash
is computed over the entire DER-encoded certificate (including the
signature).
issuerSerial
holds the identification of the certificate. This field would
normally be present unless the value can be inferred from other
information (e.g., the sid field of the SignerInfo object).
The fields of IssuerSerial are discussed in <a href="#section-5.4.1.1">Section 5.4.1.1</a>
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Security Considerations</span>
This document is designed to address the security issue of a
substituted certificate used by the validator. If a different
certificate is used by the validator than the signer, the validator
may not get the correct result. An example of this would be that the
original certificate was revoked and a new certificate with the same
public key was issued for a different individual. Since the issuer/
serial number field is not protected, the attacker could replace this
and point to the new certificate and validation would be successful.
The attributes defined in this document are to be placed in locations
that are protected by the signature. This attribute does not provide
any additional security if placed in an unsigned or un-authenticated
location.
The attributes defined in this document permit a signer to select a
hash algorithm to identify a certificate. A poorly selected hash
algorithm may provide inadequate protection against certificate
substitution or result in denial of service for this protection. By
employing the attributes defined in this specification with the same
hash algorithm used for message signing, the sender can ensure that
these attributes provide commensurate security.
Since recipients must support the hash algorithm to verify the
signature, selecting the same hash algorithm also increases the
likelihood that the hash algorithm is supported in the context of
certificate identification. Note that an unsupported hash algorithm
for certificate identification does not preclude validating the
message but does deny the message recipient protection against
certificate substitution.
To ensure that legacy implementations are provided protection against
certificate substitution, clients are permitted to include both
ESScertID and ESScertIDv2 in the same message. Since these
<span class="grey">Schaad Standards Track [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
attributes are generated and evaluated independently, the contents
could conceivably be in conflict. Specifically, where a signer has
multiple certificates containing the same public key, the two
attributes could specify different signing certificates. The result
of signature processing may vary depending on which certificate is
used to validate the signature.
Recipients that attempt to evaluate both attributes may choose to
reject such a message.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Normative References</span>
[<a id="ref-ESS">ESS</a>] Hoffman, P., "Enhanced Security Services for S/MIME",
<a href="./rfc2634">RFC 2634</a>, June 1999.
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="./rfc2119">RFC 2119</a>, <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, March 1997.
[<a id="ref-RFC3280">RFC3280</a>] Housley, R., Ford, W., Polk, W., and D. Solo, "Internet
X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile", <a href="./rfc3280">RFC 3280</a>,
April 2002.
[<a id="ref-RFC3852">RFC3852</a>] Housley, R., "Cryptographic Message Syntax (CMS)",
<a href="./rfc3852">RFC 3852</a>, July 2004.
[<a id="ref-UTF8">UTF8</a>] Yergeau, F., "UTF-8, a transformation format of ISO
10646", STD 63, <a href="./rfc3629">RFC 3629</a>, November 2003.
<span class="grey">Schaad Standards Track [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
<span class="h2"><a class="selflink" id="appendix-A" href="#appendix-A">Appendix A</a>. ASN.1 Module</span>
Replace the ASN.1 module in <a href="./rfc2634">RFC 2634</a> with this one.
ExtendedSecurityServices-2006
{ iso(1) member-body(2) us(840) rsadsi(113549)
pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-ess-2006(30) }
DEFINITIONS IMPLICIT TAGS ::=
BEGIN
IMPORTS
-- Cryptographic Message Syntax (CMS) [<a href="./rfc3852" title=""Cryptographic Message Syntax (CMS)"">RFC3852</a>]
ContentType, IssuerAndSerialNumber, SubjectKeyIdentifier
FROM CryptographicMessageSyntax2004 { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16)
modules(0) cms-2004(24)}
-- PKIX Certificate and CRL Profile, Section A.1 Explicity Tagged Module
-- 1988 Syntax [<a href="./rfc3280" title=""Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"">RFC3280</a>]
AlgorithmIdentifier, CertificateSerialNumber
FROM PKIX1Explicit88 { iso(1) identified-organization(3) dod(6)
internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
id-pkix1-explicit(18) }
-- PKIX Certificate and CRL Profile, Sec A.2 Implicitly Tagged Module,
-- 1988 Syntax [<a href="./rfc3280" title=""Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"">RFC3280</a>]
PolicyInformation, GeneralNames
FROM PKIX1Implicit88 {iso(1) identified-organization(3) dod(6)
internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
id-pkix1-implicit(19)};
-- Extended Security Services
-- The construct "SEQUENCE SIZE (1..MAX) OF" appears in several ASN.1
-- constructs in this module. A valid ASN.1 SEQUENCE can have zero or
-- more entries. The SIZE (1..MAX) construct constrains the SEQUENCE to
-- have at least one entry. MAX indicates the upper bound is
-- unspecified. Implementations are free to choose an upper bound that
-- suits their environment.
-- UTF8String ::= [UNIVERSAL 12] IMPLICIT OCTET STRING
-- The contents are formatted as described in [<a href="#ref-UTF8" title=""UTF-8, a transformation format of ISO 10646"">UTF8</a>]
-- <a href="#section-2.7">Section 2.7</a>
ReceiptRequest ::= SEQUENCE {
signedContentIdentifier ContentIdentifier,
receiptsFrom ReceiptsFrom,
receiptsTo SEQUENCE SIZE (1..ub-receiptsTo) OF GeneralNames
}
<span class="grey">Schaad Standards Track [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
ub-receiptsTo INTEGER ::= 16
id-aa-receiptRequest OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 1}
ContentIdentifier ::= OCTET STRING
id-aa-contentIdentifier OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 7}
ReceiptsFrom ::= CHOICE {
allOrFirstTier [0] AllOrFirstTier, -- formerly "allOrNone [0]AllOrNone"
receiptList [1] SEQUENCE OF GeneralNames
}
AllOrFirstTier ::= INTEGER { -- Formerly AllOrNone
allReceipts (0),
firstTierRecipients (1)
}
-- <a href="#section-2.8">Section 2.8</a>
Receipt ::= SEQUENCE {
version ESSVersion,
contentType ContentType,
signedContentIdentifier ContentIdentifier,
originatorSignatureValue OCTET STRING
}
id-ct-receipt OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-ct(1) 1}
ESSVersion ::= INTEGER { v1(1) }
-- <a href="#section-2.9">Section 2.9</a>
ContentHints ::= SEQUENCE {
contentDescription UTF8String (SIZE (1..MAX)) OPTIONAL,
contentType ContentType
}
id-aa-contentHint OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 4}
-- <a href="#section-2.10">Section 2.10</a>
MsgSigDigest ::= OCTET STRING
<span class="grey">Schaad Standards Track [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
id-aa-msgSigDigest OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 5}
-- <a href="#section-2.11">Section 2.11</a>
ContentReference ::= SEQUENCE {
contentType ContentType,
signedContentIdentifier ContentIdentifier,
originatorSignatureValue OCTET STRING
}
id-aa-contentReference OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 10 }
-- <a href="#section-3.2">Section 3.2</a>
ESSSecurityLabel ::= SET {
security-policy-identifier SecurityPolicyIdentifier,
security-classification SecurityClassification OPTIONAL,
privacy-mark ESSPrivacyMark OPTIONAL,
security-categories SecurityCategories OPTIONAL
}
id-aa-securityLabel OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 2}
SecurityPolicyIdentifier ::= OBJECT IDENTIFIER
SecurityClassification ::= INTEGER {
unmarked (0),
unclassified (1),
restricted (2),
confidential (3),
secret (4),
top-secret (5)
}(0..ub-integer-options)
ub-integer-options INTEGER ::= 256
ESSPrivacyMark ::= CHOICE {
pString PrintableString (SIZE (1..ub-privacy-mark-length)),
utf8String UTF8String (SIZE (1..MAX))
}
ub-privacy-mark-length INTEGER ::= 128
SecurityCategories ::= SET SIZE (1..ub-security-categories) OF
SecurityCategory
<span class="grey">Schaad Standards Track [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
ub-security-categories INTEGER ::= 64
SecurityCategory ::= SEQUENCE {
type [0] OBJECT IDENTIFIER,
value [1] ANY DEFINED BY type
}
--Note: The aforementioned SecurityCategory syntax produces identical
--hex encodings as the following SecurityCategory syntax that is
--documented in the X.411 specification:
--
--SecurityCategory ::= SEQUENCE {
-- type [0] SECURITY-CATEGORY,
-- value [1] ANY DEFINED BY type }
--
--SECURITY-CATEGORY MACRO ::=
--BEGIN
--TYPE NOTATION ::= type | empty
--VALUE NOTATION ::= value (VALUE OBJECT IDENTIFIER)
--END
-- <a href="#section-3.4">Section 3.4</a>
EquivalentLabels ::= SEQUENCE OF ESSSecurityLabel
id-aa-equivalentLabels OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 9}
-- <a href="#section-4.4">Section 4.4</a>
MLExpansionHistory ::= SEQUENCE
SIZE (1..ub-ml-expansion-history) OF MLData
id-aa-mlExpandHistory OBJECT IDENTIFIER ::= { iso(1) member-body(2)
us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) id-aa(2) 3 }
ub-ml-expansion-history INTEGER ::= 64 MLData ::= SEQUENCE {
mailListIdentifier EntityIdentifier,
expansionTime GeneralizedTime,
mlReceiptPolicy MLReceiptPolicy OPTIONAL
}
EntityIdentifier ::= CHOICE {
issuerAndSerialNumber IssuerAndSerialNumber,
subjectKeyIdentifier SubjectKeyIdentifier
}
<span class="grey">Schaad Standards Track [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
MLReceiptPolicy ::= CHOICE {
none [0] NULL,
insteadOf [1] SEQUENCE SIZE (1..MAX) OF GeneralNames,
inAdditionTo [2] SEQUENCE SIZE (1..MAX) OF GeneralNames
}
-- <a href="#section-5.4">Section 5.4</a>
SigningCertificate ::= SEQUENCE {
certs SEQUENCE OF ESSCertID,
policies SEQUENCE OF PolicyInformation OPTIONAL
}
id-aa-signingCertificate OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 12 }
SigningCertificateV2 ::= SEQUENCE {
certs SEQUENCE OF ESSCertIDv2,
policies SEQUENCE OF PolicyInformation OPTIONAL
}
id-aa-signingCertificateV2 OBJECT IDENTIFIER ::= { iso(1)
member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
smime(16) id-aa(2) 47 }
id-sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2)
country(16) us(840) organization(1) gov(101)
csor(3) nistalgorithm(4) hashalgs(2) 1 }
ESSCertIDv2 ::= SEQUENCE {
hashAlgorithm AlgorithmIdentifier
DEFAULT {algorithm id-sha256},
certHash Hash,
issuerSerial IssuerSerial OPTIONAL
}
ESSCertID ::= SEQUENCE {
certHash Hash,
issuerSerial IssuerSerial OPTIONAL
}
Hash ::= OCTET STRING IssuerSerial ::= SEQUENCE {
issuer GeneralNames,
serialNumber CertificateSerialNumber
}
END
<span class="grey">Schaad Standards Track [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
-- of ExtendedSecurityServices-2006
Author's Address
Jim Schaad
Soaring Hawk Consulting
PO Box 675
Gold Bar, WA 98251
EMail: jimsch@exmsft.com
<span class="grey">Schaad Standards Track [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc5035">RFC 5035</a> ESSCertID Update August 2007</span>
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Schaad Standards Track [Page 17]
</pre>
|