Internet DRAFT - draft-seantek-certfrag
draft-seantek-certfrag
Network Working Group S. Leonard
Internet-Draft Penango, Inc.
Updates: 2585 (if approved) November 12, 2014
Intended status: Standards Track
Expires: May 16, 2015
URI Fragment Identifiers for the application/pkix-cert Media Type
draft-seantek-certfrag-02
Abstract
This memo describes Uniform Resource Identifier (URI) fragment
identifiers for PKIX certificates, which are identified with the
Internet media type application/pkix-cert.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 16, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Leonard Expires May 16, 2015 [Page 1]
Internet-Draft certfrag November 2014
1. Fragment
A digital certificate [RFC5280] is comprised of parts that are of
interest to particular users and applications. For example, a user
agent may wish to draw attention to the "notAfter" time for an
expired certificate. Uniform Resource Indicators (URIs) can include
fragment identifiers to identify such sub-parts of a resource; see
Section 3.5 of [RFC3986]. However, the semantics of fragment
identifiers depend upon the Internet media type [RFC2046], not the
URI scheme. Therefore, the fragment identifiers in this memo apply
to the application/pkix-cert Internet media type [RFC2585]. The
following fragments are hereby defined:
+------------+------------------------------------------------------+
| Identifier | Certificate Part (ASN.1 identifier) |
+------------+------------------------------------------------------+
| v | tbsCertificate.version |
| sn | tbsCertificate.serialNumber |
| sig | tbsCertificate.signature; also signatureAlgorithm |
| issuer | tbsCertificate.issuer |
| nb | tbsCertificate.validity.notBefore |
| na | tbsCertificate.validity.notAfter |
| subject | tbsCertificate.subject |
| spki | tbsCertificate.subjectPublicKeyInfo |
| ext | tbsCertificate.extensions |
| ext:<OID> | tbsCertificate.extensions |
| | {Extension matching extoid == extnID}* |
| sigval | signatureValue |
+------------+------------------------------------------------------+
* The particular extension in the Extensions "SEQUENCE" is identified
by OID only; there are no textual identifiers. The syntax of the
<OID> matches the "numericoid" production of [RFC4512].
Table 1: Certificate Parts and Fragments
The fragments defined in the table above are case-insensitive. The
table is not exhaustive: should additional identifiers be required, a
future document may specify additional identifiers.
2. IANA Considerations
IANA needs to add a reference to this specification in the
application/pkix-cert media type registration.
Additionally, the registration template needs to be updated to add
the following section:
Leonard Expires May 16, 2015 [Page 2]
Internet-Draft certfrag November 2014
Fragment identifier considerations: Fragment identification is
supported by using fragment identifiers as specified by this memo.
It has also been observed that DER-encoded certificates and
certificate revocation lists begin with octet 0x30 (in US-ASCII:
'0'), which is the tag for an ASN.1 SEQUENCE. Accordingly, the magic
number(s) subsections for application/pkix-cert and
application/pkix-crl are to be amended to say:
Magic number(s): 0x30 ('0', SEQUENCE tag)
3. Security Considerations
Digital certificates are important building blocks for
authentication, integrity, authorization, and (occasionally)
confidentiality services. Accordingly, identifying digital
certificates incorrectly can have significant security ramifications.
A URI that identifies a certificate will likely be used by an
application or user for some security-related service, such as to
retrieve the certificate as part of a validation procedure. When a
fragment identifies a part of a certificate, the application will
define the behavioral semantics. A certificate displaying
application might zoom in on that aspect of the certificate, while a
public key-processing application might use a fragment identifier
like "#spki" in a URI when identifying a certificate from which to
extract the "SubjectPublicKeyInfo" structure for further processing.
The (textual) values of the fragment identifier are not supposed to
be used in lieu of the values they are supposed to be identifying
because the fragment identifiers are not parts of the actual
certificate. Interpreting these identifiers incorrectly may cause
denial-of-service attacks.
4. Normative References
[RFC2046] Freed, N. and N. Borenstein, "Multipurpose Internet Mail
Extensions (MIME) Part Two: Media Types", RFC 2046,
November 1996.
[RFC2585] Housley, R. and P. Hoffman, "Internet X.509 Public Key
Infrastructure Operational Protocols: FTP and HTTP", RFC
2585, May 1999.
[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66, RFC
3986, January 2005.
Leonard Expires May 16, 2015 [Page 3]
Internet-Draft certfrag November 2014
[RFC4512] Zeilenga, K., "Lightweight Directory Access Protocol
(LDAP): Directory Information Models", RFC 4512, June
2006.
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", RFC 5280, May 2008.
Author's Address
Sean Leonard
Penango, Inc.
5900 Wilshire Boulevard
21st Floor
Los Angeles, CA 90036
USA
Email: dev+ietf@seantek.com
URI: http://www.penango.com/
Leonard Expires May 16, 2015 [Page 4]