Network Working Group | W. Chuang, Ed. |
Internet-Draft | Google, Inc. |
Intended status: Standards Track | T. Loder, Ed. |
Expires: November 8, 2018 | Agari |
May 7, 2018 |
Brand Indicator for Message Identification in X.509 certificates
draft-chuang-bimi-certificate-00
This document defines a X.509 certificate profile to distinguish those carrying logotypes and using email domain based authentication from other usages.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on November 8, 2018.
Copyright (c) 2018 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
[RFC5280] defines the Extended Key Usage extension to define different usages of X.509 certificates. These certificates may carry logotype as defined in [RFC3709] whose format is further refined in [RFC6170]. This document defines a new usage for these logotype carrying certificates to define an identify for Electronic Mail senders as defined in [RFC5321] and whose sending domain is authenticated by either Sender Policy Framework [RFC7208] or by Domain Key Identified Mail signatures [RFC6376]. This new profile distinguishes it from other certificate usages with electronic mail such as S/MIME [RFC5751].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
This section describes non-normatively the Brand Indicator for Message Identification (BIMI) electronic mail profile here. Its intended that there will be a separate document that specifies the BIMI electronic mail sending and receiving protocol that describes the BIMI electronic mail headers, the sender validation process using domain authentication methods and the fetch of the BIMI certificates. BIMI follows the current practice of using domain based validation methods Sender Policy Framework [RFC7208] or by Domain Key Identified Mail signatures [RFC6376]. When an electronic mail sender has been validated this way, and with the fetched BIMI certificate, the receiver can proceed to validate the BIMI certificate with the sender domain as described in this document. Upon successful validation, the receiver may choose to show the associated logotype and other identifying information contained in the BIMI certificate. This document does not inform other uses of logotype with other email profiles such as S/MIME.
Before a BIMI certificate can be used to provide identification, the certificate path MUST be validated using the algorithm in [RFC5280]. The BIMI certificate MUST contain an extended key usage extension specified for id-kp-BrandIndicatorforMessageIdentification as defined in Section 5. It MUST also contain dnsName field of an X.509 Subject Alternative Name as specified in [RFC5280] and a subject LogoType as specified in [RFC3709]. The BIMI certificate domain name and the domain of the From or Sender header email address are compared. If they match using the method specified in [RFC5280]), then the certificate identifies the sender of the electron mail and the certificate subject information may be used to describe the sender.
This document describes a new Extended Key Usage OID for the BIMI use case id-kp-BrandIndicatorforMessageIdentification.
id-kp-BrandIndicatorforMessageIdentification OBJECT IDENTIFIER ::= { id-kp 31 }
In Section 5 and the ASN.1 module identifier defined in Appendix A. IANA is kindly requested to reserve the following assignments for:
The following ASN.1 module normatively specifies the BIMI extended key usage name. This specification uses the ASN.1 definitions from [RFC7299].
LAMPS-BIMI-Certificate-2018 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-kp(3) id-kp-BrandIndicatorforMessageIdentification(TBD) } DEFINITIONS IMPLICIT TAGS ::= BEGIN IMPORTS id-pkix FROM PKIX1Explicit-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) } ; -- Extended key purpose identifiers id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } id-kp-BrandIndicatorforMessageIdentification OBJECT IDENTIFIER ::= { id-kp TBD } END
Thank you to Kefeng Chen and Kirk Hall for their help with the BIMI certificate profile. Thanks to the other document reviewers.