LAMPS Working Group | H. Brockhaus |
Internet-Draft | Siemens |
Updates: 4210 (if approved) | July 6, 2020 |
Intended status: Standards Track | |
Expires: January 7, 2021 |
CMP Updates
draft-ietf-lamps-cmp-updates-02
This document contains a set of updates to the base syntax of Certificate Management Protocol (CMP) version 2. This document updates RFC 4210.
Specifically, the CMP services updated in this document comprise the enabling of using EnvelopedData instead of EncryptedValue and the definition of extended key usages to identify certificates of CMP endpoints on certification and registration authorities.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 7, 2021.
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
While using CMP in industrial and IoT environments and developing the Lightweight CMP Profile some limitations were identified in the original CMP specification. This document updates RFC 4210 to overcome these limitations.
In general, this document aims to improve the crypto agility of CMP to be flexible to react on future advances in cryptography.
This document also introduces new extended key usages to identify CMP endpoints on registration and certification authorities.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.
In this document, these words will appear with that interpretation only when in ALL CAPS. Lower case uses of these words are not to be interpreted as carrying significance described in RFC 2119.
Technical terminology is used in conformance with RFC 4210, RFC 4211, and RFC 5280. The following key words are used:
The following subsection describes feature updates to RFC 4210. They are always related to the base specification. Hence references to the original sections in RFC 4210 are used whenever possible.
Insert this section at the end of the current Section 1.
1.1 Changes since RFC 4210
The following updates are made in draft-ietf-lamps-cmp-updates:
The following subsection describes new extended key usages for different CMP server typesspecitied in RFC 4210.
Insert this section at the end of the current Section 4.
4.5 Extended Key Usage
The Extended Key Usage (EKU) extension indicates the purposes for which the certified public key may be used. It therefore restricts the use of a certificate to specific applications.
A CA may want to delegate parts of their duties to other PKI management entities. The mechanism to prove this delegation explained in this section offers zero-touch means to check the authorization of such delegation. Such delegation could also be expressed by other means, e.g., explicit configuration.
To offer automatic validation means for the delegation of a role by a CA, the certificates used by PKI management entities for CMP message protection or signed data for central key generation MUST be issued by the delegating CA and MUST contain the respective EKUs. This proves the authorization of this entity by the delegating CA to act as the PKI management entity as described below.
The ASN.1 to define these EKUs is:
id-kp-cmcCA OBJECT IDENTIFIER ::= { id-kp 27 } id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 } id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp ... }
< TBD: id-kp-cmKGA to be defined. >
Note: RFC 6402 section 2.10 specifies OIDs for a CMC CA and a CMC RA. As the functionality of a CA and RA is not specific to whether use CMC or CMP as certificate management protocol, the same OIDs SHALL be used for a CMP CA and a CMP RA.
< TBD: The Description of the OIDs needs to be extended to avoid confusion as they currently only refer to CMC endpoints. >
The description of the PKI management entity for each of the EKUs is as follows:
Note: In device PKIs, especially those issuing IDevID certificates, CA may have very long validity (including the GeneralizedTime value 99991231235959Z to indicate a not well-defined expiration date as specified in IEEE 802.1AR Section 8.5 [IEEE802.1AR] and RFC 5280 Section 4.1.2.5). Such validity periods SHOULD NOT be used for protection of CMP messages. Certificates for delegated CMP message protection (CMP CA, CMP RA, CMP KGA) MUST NOT use indefinite expiration date.
Section 5.1.3.4 of RFC 4210 describes the nested message. This document opens the usage of nested messages also for batch transport of PKI messages between different PKI management entities.
Replace the text of the section with the following text.
In cases where an end entity sends a protected PKI message to an RA, the RA MAY forward that message to a CA, adding its own protection (which MAY be a MAC or a signature, depending on the information and certificates shared between the RA and the CA). There are different use cases for such multi protected messages.
These use cases are accomplished by nesting the messages sent by the PKI entity within a new PKI message. The structure used is as follows.
NestedMessageContent ::= PKIMessages
(The use of PKIMessages, a SEQUENCE OF PKIMessage, lets the RA batch the requests of several EEs in a single new message.)
Section 5.2.2 of RFC 4210 describes the usage of EncryptedValue to transport encrypted data. This document extends the encryption of data to preferably use EnvelopedData.
Replace the text of the section with the following text.
Where encrypted data (restricted, in this specification, to be either private keys, certificates, or passwords) are sent in PKI messages, the EncryptedKey data structure is used.
EncryptedKey ::= CHOICE { encryptedValue EncryptedValue, -- deprecated envelopedData [0] EnvelopedData }
See CRMF for EncryptedKey and EncryptedValue syntax and for EnvelopedData syntax see CMS. Using the EncryptedKey data structure, the choice to either use EncryptedValue (for backward compatibility only) or EnvelopedData is offered. The use of the EncryptedValue structure has been deprecated in favor of the EnvelopedData structure. Therefore, it is recommended to use EnvelopedData.
The EncryptedKey data structure is used in CMP to either transport a private key, certificate or revocation passphrase in encrypted form.
EnvelopedData is used as follows:
Note: When transferring a centrally generated private key in a certificate response message to the EE, the algorithm identifier and the associated public key will anyhow be transported in this response message. Therefore, the private key will not be delivered in a key package structure as specified in [RFC5958] and [RFC6032]. But the wrapping of the private key in a SignedData structure that is wrapped in the EnvelopedData structure as specified in [RFC6032] is applied.
The content of the EnvelopedData structure, as specified in CMS section 6, MUST be encrypted using a newly generated symmetric content-encryption key. This content-encryption key MUST be securely provided to the recipient using one of three key management techniques.
The choice of the key management technique to be used by the sender depends on the credential available for the recipient:
Section 5.3.4 of RFC 4210 describes the Certification Response. This document updates the syntax by using the parent structure EncryptedKey instead of EncryptedValue as described in Section 2.1 above.
Replace the ASN.1 syntax of CertifiedKeyPair and CertOrEncCert with the following text.
CertifiedKeyPair ::= SEQUENCE { certOrEncCert CertOrEncCert, privateKey [0] EncryptedKey OPTIONAL, -- see [CRMF] for comment on encoding publicationInfo [1] PKIPublicationInfo OPTIONAL } CertOrEncCert ::= CHOICE { certificate [0] Certificate, encryptedCert [1] EncryptedKey }
Add the following paragraphs to the end of the section.
The use of EncryptedKey is described in section 5.2.2.
Section 5.3.19.9 of RFC 4210 describes the provisioning of a revocation passphrase for authenticating a later revocation request. This document updates the handling by using the parent structure EncryptedKey instead of EncryptedValue to transport this information as described in Section 2.1 above.
Replace the text of the section with the following text.
This MAY be used by the EE to send a passphrase to a CA/RA for the purpose of authenticating a later revocation request (in the case that the appropriate signing private key is no longer available to authenticate the request). See Appendix B for further details on the use of this mechanism.
GenMsg: {id-it 12}, EncryptedKey GenRep: {id-it 12}, < absent >
The use of EncryptedKey is described in section 5.2.2.
Section 5.3.22 of RFC 4210 describes when and how polling messages are used. This document adds the polling mechanism also to outstanding p10cr transactions.
Replace all paragraphs in front of the state machine diagram with the following text.
This pair of messages is intended to handle scenarios in which the client needs to poll the server in order to determine the status of an outstanding ir, cr, p10cr, or kur transaction (i.e., when the "waiting" PKIStatus has been received).
PollReqContent ::= SEQUENCE OF SEQUENCE { certReqId INTEGER } PollRepContent ::= SEQUENCE OF SEQUENCE { certReqId INTEGER, checkAfter INTEGER, -- time in seconds reason PKIFreeText OPTIONAL }
The following clauses describe when polling messages are used, and how they are used. It is assumed that multiple certConf messages can be sent during transactions. There will be one sent in response to each ip, cp, or kup that contains a CertStatus for an issued certificate.
Note: A p10cr message contains exactly one CertificationRequestInfo data structure as specified in PKCS#10 but no certificate request number. Therefore, the certReqId MUST be set to 0 in all following messages of this transaction.
Appendix B of RFC 4210 describes the usage of the revocation passphrase. As this document updates RFC 4210 to utilize the parent structure EncryptedKey instead of EncryptedValue as described in Section 2.1 above, the description is updated accordingly.
Replace the first bullet point of this section with the following text.
Replace the third bullet point of this section with the following text.
Appendix C of RFC 4210 provides clarifications to the request message behavior. As this document updates RFC 4210 to utilize the parent structure EncryptedKey instead of EncryptedValue as described in Section 2.1 above, the description is updated accordingly.
Replace the note coming after the ASN.1 syntax of POPOPrivKey of this section with the following text.
-- ********** -- * the type of "thisMessage" is given as BIT STRING in RFC 4211 -- * [RFC4211]; it should be "EncryptedKey" (in accordance with -- * Section 5.2.2 of this specification). Therefore, this document -- * makes the behavioral clarification of specifying that the -- * contents of "thisMessage" MUST be encoded either as -- * "EnvelopedData" or "EncryptedValue" (only for backward -- * compatibility) and then wrapped in a BIT STRING. This allows -- * the necessary conveyance and protection of the private key -- * while maintaining bits-on-the-wire compatibility with RFC 4211 -- * [RFC4211]. -- **********
Appendix D.4 of RFC 4210 provides the initial registration/certification scheme. This scheme shall continue to use EncryptedValue for backward compatibility reasons.
Replace the comment after the privateKey field of crc[1].certifiedKeyPair in the syntax of the Initialization Response message with the following text.
-- see Appendix C, Request Message Behavioral Clarifications -- for backward compatibility reasons, use EncryptedValue
< TBD: A new OID for id-kp-cmKGA needs to be requested. >
< TBD: The existing description and information of id-kp-cmcRA and id-kp-cmcCA need to be updated to reflect their extended usage. >
No changes are made to the existing security considerations of RFC 4210.
Special thank goes to Jim Schaad for his guidance and the inspiration on structuring and writing this document I got from [RFC6402] that updates CMC.
I also like to thank all reviewers of this document for their valuable feedback.
[I-D.ietf-lamps-lightweight-cmp-profile] | Brockhaus, H., Fries, S. and D. Oheimb, "Lightweight CMP Profile", Internet-Draft draft-ietf-lamps-lightweight-cmp-profile-01, March 2020. |
[RFC5958] | Turner, S., "Asymmetric Key Packages", RFC 5958, DOI 10.17487/RFC5958, August 2010. |
[RFC6032] | Turner, S. and R. Housley, "Cryptographic Message Syntax (CMS) Encrypted Key Package Content Type", RFC 6032, DOI 10.17487/RFC6032, December 2010. |
Changes to the following parts are needed
localKeyId FROM PKCS-9 {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) modules(0) pkcs-9(1)}
CertTemplate, PKIPublicationInfo, EncryptedKey, EncryptedValue, CertId, CertReqMessages FROM PKIXCRMF-2005 {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-crmf2005(36)}
EnvelopedData, SignedData FROM CryptographicMessageSyntax2004 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) cms-2004(24) }
CertifiedKeyPair ::= SEQUENCE { certOrEncCert CertOrEncCert, privateKey [0] EncryptedKey OPTIONAL, -- see [CRMF] for comment on encoding publicationInfo [1] PKIPublicationInfo OPTIONAL } CertOrEncCert ::= CHOICE { certificate [0] CMPCertificate, encryptedCert [1] EncryptedKey } -- id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12} -- RevPassphraseValue ::= EncryptedKey -- -- Extended Key Usage extension for PKI entities used in -- CMP operations -- id-kp-cmcCA OBJECT IDENTIFIER ::= { id-kp 27 } id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 } id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp ... }
< TBD: id-kp-cmKGA to be defined. >
< TBD: If needed the complete ASN.1 Module from RFC 4210 section needs to be copied here. >
From version 01 -> 02:
From version 00 -> 01:
From draft-brockhaus-lamps-cmp-updates-03 -> draft-ietf-lamps-cmp-updates-00:
From version 02 -> 03:
From version 01 -> 02:
From version 00 -> 01: