Internet DRAFT - draft-ounsworth-pq-external-pubkeys
draft-ounsworth-pq-external-pubkeys
LAMPS M. Ounsworth
Internet-Draft Entrust
Updates: {"RFC5280"=>nil} (if approved) M. Saarinen
Intended status: Standards Track PQShield
Expires: September 22, 2021 March 21, 2021
External Keys And Signatures For Use In Internet PKI
draft-ounsworth-pq-external-pubkeys-00
Abstract
Many of the post quantum cryptographic algorithms have either large
public keys or signatures. In the interest of reducing bandwidth of
transitting X.509 certificates, this document defines new public key
and signature algorithms for referencing external public key and
signature data by hash, URL, etc. This mechanism is designed to
mimic the behaviour of an Authority Information Access extension.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 22, 2021.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
Ounsworth & Saarinen Expires September 22, 2021 [Page 1]
Internet-Draft External keys and sigs March 2021
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. External Value . . . . . . . . . . . . . . . . . . . . . . . 2
2.1. External Public Key . . . . . . . . . . . . . . . . . . . 3
2.2. External Signature . . . . . . . . . . . . . . . . . . . 3
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
4.1. CSRs and CT logs . . . . . . . . . . . . . . . . . . . . 3
5. Appendices . . . . . . . . . . . . . . . . . . . . . . . . . 4
5.1. ASN.1 Module . . . . . . . . . . . . . . . . . . . . . . 4
5.2. Intellectual Property Considerations . . . . . . . . . . 4
6. Contributors and Acknowledgements . . . . . . . . . . . . . . 4
6.1. Making contributions . . . . . . . . . . . . . . . . . . 4
7. Normative References . . . . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
2. External Value
The id-external-value algorithm identifier is used for identifying a
public key or signature which is provided as a reference to external
data.
id-external-value ::= < OID >
The corresponding subjectPublicKey is the DER encoding of the
following structure:
ExternalValue ::= SEQUENCE {
location GeneralName,
hashAlg AlgorithmIdentifier,
hashVal BIT STRING
}
Upon retrieval of the referenced data, the hash of the OCTET STRING
of the retrieved data (removing base64 encoding as per [RFC4648] if
necessary) MUST be verified using hashAlg to match the
ExternalPublicKey.hash value.
Ounsworth & Saarinen Expires September 22, 2021 [Page 2]
Internet-Draft External keys and sigs March 2021
2.1. External Public Key
When used with a public key, algorithm parameters for id-external-
value are absent.
When ExternalValue is placed into a
SubjectPublicKeyInfo.subjectPublicKey, the ExternalValue.location
MUST refer to a DER-encoded SubjectPublicKeyInfo, which MAY be base64
encoded as per [RFC4648] for easier transport over text protocols.
2.2. External Signature
When used with a signatureAlgorithm, algorithm parameters are to
contain the AlgorithmIdentifier of the signature that is being
externalized.
When ExternalValue is placed into a signatureValue, the location MUST
refer to the BIT STRING of a signatureValue, which MAY be base64
encoded as per [RFC4648] for easier transport over text protocols.
3. IANA Considerations
The ASN.1 module OID is TBD. The id-alg-composite OID is to be
assigned by IANA.
4. Security Considerations
4.1. CSRs and CT logs
In practice, situations will arise where the
ExternalPublicKey.location refers to a location which is not publicly
available either because it is in a local keystore, on a private
network, or no longer being hosted.
Not having the public key in a certificate signing request (CSR)
could make it substantially harder for CAs to perform vetting of the
key, for example for cryptographic strength or checking for prior
revocation due to key compromise. A certificate requester MUST make
the full public key available to the CA at the time of certificate
request either by ensuring that the link in the
ExternalPublicKey.location is visible to the CA, or by supplying the
full public key to the CA out of band.
Not having the public key in Certificate Transparency (CT) logs could
make it substantially harder for researchers to perform auditing
tasks on CT logs. This may require additional CT mechanisms.
Ounsworth & Saarinen Expires September 22, 2021 [Page 3]
Internet-Draft External keys and sigs March 2021
5. Appendices
5.1. ASN.1 Module
5.2. Intellectual Property Considerations
The following IPR Disclosure relates to this draft:
https://datatracker.ietf.org/ipr/3588/
6. Contributors and Acknowledgements
This document incorporates contributions and comments from a large
group of experts. The Editors would especially like to acknowledge
the expertise and tireless dedication of the following people, who
attended many long meetings and generated millions of bytes of
electronic mail and VOIP traffic over the past year in pursuit of
this document:
John Gray (Entrust), Serge Mister (Entrust), Scott Fluhrer (Cisco
Systems), Panos Kampanakis (Cisco Systems), Daniel Van Geest (ISARA),
and Tim Hollebeek (Digicert).
We are grateful to all, including any contributors who may have been
inadvertently omitted from this list.
This document borrows text from similar documents, including those
referenced below. Thanks go to the authors of those documents.
"Copying always makes things easier and less error prone" -
[RFC8411].
6.1. Making contributions
Additional contributions to this draft are weclome. Please see the
working copy of this draft at, as well as open issues at:
https://github.com/EntrustCorporation/draft-ounsworth-pq-external-
keys
7. Normative References
[RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data
Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006,
<https://www.rfc-editor.org/info/rfc4648>.
Ounsworth & Saarinen Expires September 22, 2021 [Page 4]
Internet-Draft External keys and sigs March 2021
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
<https://www.rfc-editor.org/info/rfc5280>.
[RFC8411] Schaad, J. and R. Andrews, "IANA Registration for the
Cryptographic Algorithm Object Identifier Range",
RFC 8411, DOI 10.17487/RFC8411, August 2018,
<https://www.rfc-editor.org/info/rfc8411>.
Authors' Addresses
Mike Ounsworth
Entrust Limited
1000 Innovation Drive
Ottawa, Ontario K2K 1E3
Canada
Email: mike.ounsworth@entrust.com
Markku-Juhani O. Saarinen
PQShield
Email: mjos@pqshield.com
Ounsworth & Saarinen Expires September 22, 2021 [Page 5]