<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-11" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="26"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 83?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 93?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 <xref target="CMC-TRANSv1"/> and RFC 6402 <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>IANA assigned TCP port 5318 for the use of CMC.</t>

<t>Clarified the file extensions for Full PKI Requests and Responses.</t>

<t>Added examples of encoding types for mail-based Requests and Responses.</t>

<t>Replaced TLS 1.0 with TLS 1.2 or later, and added that implemetations are
required to follow the recommendations in <xref target="BCP195"/>.</t>

<t>Addressed <xref target="erratum3593"/>.</t>

<t>Added reference to RFC9205 for HTTP guidance.</t>

<t>Restrict early data (0-RTT) if using TLS 1.3 or QUIC.</t>

<t>Restrict the use of TCP-Pipelining.</t>

<t>Clarified the limitations of SMTP-over-TLS and the use of authenticated TLS for message delivery.</t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file and the file <bcp14>MUST</bcp14> be binary encoded. The abbreviations crq
and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>What follows is a set of Simple PKI Request and Response messages and a
set of Full PKI Request and Response messages. The headers discussed
below appear in the top-level content of the message and the messages'
contents are the entire messages' bodies.</t>

<aside>  <t>The examples that follow are purposely truncated for brevity.</t>
</aside>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type <xref target="RFC5967"/>.  A file name <bcp14>MUST</bcp14> be included either in a
Content-Type or a Content-Disposition header in the name or filename
parameter, respectively. The extension for the file <bcp14>MUST</bcp14> be ".p10”.  An
example similar to that from <xref target="RFC5967"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-client@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7A@example.com>
To: cmc-server@example.com
Subject: Simple Enrollment Request
Date: Tue, 3 Feb 2026 16:08:28 -0500
MIME-Version: 1.0
Content-Type: application/pkcs10; name=smime.p10
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p10

< message contents >
]]></artwork></figure>

<t>Simple PKI Response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  A smime-type parameter <bcp14>MUST</bcp14> be on the
Content-Type header with a value of "certs-only".  A file name with
the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the Content-Type or
Content-Disposition header in the name or filename parameter,
respectively. An example similar to that from <xref target="SMIMEV4"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-server@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7B@example.com>
To: cmc-client@example.com
Subject: Re: Simple Enrollment Request
Date: Tue, 3 Feb 2026 16:09:28 -0500
MIME-Version: 1.0
References: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7A@example.com>
In-Reply-To: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7A@example.com>
Content-Type: application/pkcs7-mime; smime-type=certs-only;
  name=smime.p7c
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p7c

< message contents >
]]></artwork></figure>

<t>Full PKI Request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the Content-Type or Content-Disposition
header in the name or filename parameter, respectively. An example
similar to that from <xref target="SMIMEV4"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-client@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7C@example.com>
To: cmc-server@example.com
Subject: Full Enrollment Request
Date: Tue, 3 Feb 2026 16:10:28 -0500
MIME-Version: 1.0
Content-Type: application/pkcs7-mime; smime-type=CMC-Request;
  name=smime.p7c
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p7m

< message contents >
]]></artwork></figure>

<t>Full PKI Response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-Response".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the Content-Type or Content-Disposition
statement.  An example similar to that from <xref target="SMIMEV4"/> follows:</t>

<figure><artwork><![CDATA[
From: cmc-server@example.com
Message-Id: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7D@example.com>
To: cmc-client@example.com
Subject: Re: Full Enrollment Request
Date: Tue, 3 Feb 2026 16:11:28 -0500
MIME-Version: 1.0
References: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7C@example.com>
In-Reply-To: <E06C3FA6-FF15-4851-AC7F-DB9F3B1C2C7C@example.com>
Content-Type: application/pkcs7-mime; smime-type=CMC-Response;
  name=smime.p7m
Content-Transfer-Encoding: base64
Content-Disposition: inline; filename=smime.p7m

< message contents >
]]></artwork></figure>

<t>For file names present in the name or filename parameters, non-ASCII
text is prohibited.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-Request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-Response</c>
</texttable>

</section>
<section anchor="http-based-protocol"><name>HTTP-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
data transfer protocol.  Consult <xref target="HTTP-IMP"/> for additional information.
The use of HTTPS <xref target="HTTP"/> provides any necessary
content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients are configured with sufficient information to form the server URI <xref target="RFC3986"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Client requests are submitted by use of the POST method.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 2XX response codes for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send certification requests using HTTPS <xref target="HTTP"/>,
although servers are not required to support TLS/QUIC but a secure channel
might be available regardless depending on the HTTP version implemented
<xref target="HTTP/1.0"/>, <xref target="HTTP/1.1"/>, <xref target="HTTP/2"/>, <xref target="HTTP/3"/>, or later. If TLS is used by the HTTP version, then the
implementation <bcp14>MUST</bcp14> follow the recommendations in <xref target="BCP195"/>. CMC implementations
that support TLS 1.3 or QUIC <bcp14>MUST NOT</bcp14> use early data (i.e., 0-RTT) because POST is
not idempotent.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients are not required to support any type of HTTP
authentication (<xref section="11" sectionFormat="of" target="HTTP"/>) nor Cookies <xref target="COOKIES"/>. Thus, servers
can not rely on these features to be available.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type field <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type field for a request:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-Request; name=request.p7m</t>
</li></ul>

<t>The content of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>The content of an HTTP-based PKI Response is
the binary value of the BER (Basic Encoding
Rules) encoding <xref target="X690"/> of either a Simple or Full PKI Response.</t>

<t>The Content-Type field <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type field for a response:</t>

<ul empty="true"><li>
  <t>Content-Type: application/pkcs7-mime; smime-type=CMC-Response; name=response.p7m</t>
</li></ul>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.
The client <bcp14>MUST</bcp14> wait for the full response before making another request
on the same connection. A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The Service Name is "pkix-cmc".
The TCP port number is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> continue to use a port chosen from the
Private Port range.  A TCP Server <bcp14>SHOULD</bcp14> use port 5318 assigned to the CMC service.
It is expected that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: [RFC-to-be]
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

<t>IANA is requested to update the existing references to <xref target="CMC-TRANSv1"/> in the
Media Type Sub-Parameter Registries for CMC-Request and CMC-Response to [ RFC-to-be ].</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the (optional) CMC nonce mechanisms.
Implementers and Designers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement or use
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
or Authenticated Enveloped Data content type <xref section="3.2.1.3.5" sectionFormat="of" target="CMC-STRUCT"/>
provides the same shrouding that TLS would have provided.</t>

<t>For the mail-based protocol, the Enveloped Data or Authenticated
Enveloped Data content types can also be used to apply confidentiality
protection (content shrouding) to the conveyed messages.
Note that even if the application uses SMTP-over-TLS <xref target="RFC3207"/>
with its preferred Message Submission Agent (MSA)
for initial submission of the message for delivery, SMTP
in subsequent relay hops may not be either authenticated or encrypted.
For some combinations of initial MSA and destination domains it may be
possible to request use of authenticated TLS at every relay "hop" of
message delivery via the mechanism specified in <xref target="RFC8689"/>. This <bcp14>MAY</bcp14>
be used, when supported, and expected to work, but risks non-delivery
if some of the SMTP servers along the relay chain do not support the
REQUIRETLS ESMTP extension.</t>

<t>For the file-based protocol, an additional method of applying
confidentiality protection (content shrouding) to the conveyed messages
is usually available in the form of filesystem permissions.  The local
system may allow for read access to be limited to just a single user or
group that corresponds to the entity authorized to read the request or
response, respectively, and diligent use of these filesystem permissions
can be a useful mechanism in multi-user environments.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="6" month="February" year="2026"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-10"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="HTTP-IMP">
  <front>
    <title>Building Protocols with HTTP</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>Applications often use HTTP as a substrate to create HTTP-based APIs. This document specifies best practices for writing specifications that use HTTP to define new application protocols. It is written primarily to guide IETF efforts to define application protocols using HTTP for deployment on the Internet but might be applicable in other situations.</t>
      <t>This document obsoletes RFC 3205.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="56"/>
  <seriesInfo name="RFC" value="9205"/>
  <seriesInfo name="DOI" value="10.17487/RFC9205"/>
</reference>

<reference anchor="X690" target="https://www.itu.int/rec/T-REC-X.690">
  <front>
    <title>Information Technology -- Abstract Syntax Notation One (ASN.1): ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="ITU-T Recommendation" value="X.690"/>
  <seriesInfo name="ISO/IEC" value="8825-1:2021"/>
</reference>


<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC5967">
  <front>
    <title>The application/pkcs10 Media Type</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="August" year="2010"/>
    <abstract>
      <t>This document specifies a media type used to carry PKCS #10 certification requests as defined in RFC 2986. It carries over the original specification from RFC 2311, which recently has been moved to Historic status, and properly links it to RFC 2986. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5967"/>
  <seriesInfo name="DOI" value="10.17487/RFC5967"/>
</reference>
<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>
<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>
<reference anchor="HTTP_1.0">
  <front>
    <title>Hypertext Transfer Protocol -- HTTP/1.0</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="H. Frystyk" initials="H." surname="Frystyk"/>
    <date month="May" year="1996"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="1945"/>
  <seriesInfo name="DOI" value="10.17487/RFC1945"/>
</reference>
<reference anchor="HTTP_1.1">
  <front>
    <title>HTTP/1.1</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
      <t>This document obsoletes portions of RFC 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="99"/>
  <seriesInfo name="RFC" value="9112"/>
  <seriesInfo name="DOI" value="10.17487/RFC9112"/>
</reference>
<reference anchor="HTTP_2">
  <front>
    <title>HTTP/2</title>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <author fullname="C. Benfield" initials="C." role="editor" surname="Benfield"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.</t>
      <t>This document obsoletes RFCs 7540 and 8740.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9113"/>
  <seriesInfo name="DOI" value="10.17487/RFC9113"/>
</reference>
<reference anchor="HTTP_3">
  <front>
    <title>HTTP/3</title>
    <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9114"/>
  <seriesInfo name="DOI" value="10.17487/RFC9114"/>
</reference>
<reference anchor="COOKIES">
  <front>
    <title>HTTP State Management Mechanism</title>
    <author fullname="A. Barth" initials="A." surname="Barth"/>
    <date month="April" year="2011"/>
    <abstract>
      <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6265"/>
  <seriesInfo name="DOI" value="10.17487/RFC6265"/>
</reference>

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="RFC3207">
  <front>
    <title>SMTP Service Extension for Secure SMTP over Transport Layer Security</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2002"/>
    <abstract>
      <t>This document describes an extension to the SMTP (Simple Mail Transfer Protocol) service that allows an SMTP server and client to use TLS (Transport Layer Security) to provide private, authenticated communication over the Internet. This gives SMTP agents the ability to protect some or all of their communications from eavesdroppers and attackers. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3207"/>
  <seriesInfo name="DOI" value="10.17487/RFC3207"/>
</reference>
<reference anchor="RFC8689">
  <front>
    <title>SMTP Require TLS Option</title>
    <author fullname="J. Fenton" initials="J." surname="Fenton"/>
    <date month="November" year="2019"/>
    <abstract>
      <t>The SMTP STARTTLS option, used in negotiating transport-level encryption of SMTP connections, is not as useful from a security standpoint as it might be because of its opportunistic nature; message delivery is, by default, prioritized over security. This document describes an SMTP service extension, REQUIRETLS, and a message header field, TLS-Required. If the REQUIRETLS option or TLS-Required message header field is used when sending a message, it asserts a request on the part of the message sender to override the default negotiation of TLS, either by requiring that TLS be negotiated when the message is relayed or by requesting that recipient-side policy mechanisms such as MTA-STS and DNS-Based Authentication of Named Entities (DANE) be ignored when relaying a message for which security is unimportant.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8689"/>
  <seriesInfo name="DOI" value="10.17487/RFC8689"/>
</reference>



    </references>

</references>


<?line 451?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>Thank you to Julian Reschke, Benjamin Kaduk, Vidhi Goel, Thomas Fossati,
Gorry Fairhurst, Éric Vyncke, Gunter Van de Velde, Mahesh Jethanandani,
Mike Bishop, Mohamed Boucadair, Viktor Dukhovni, and Eliot Lear for reviewing
the document and providing comments.</t>

<t>The acknowledgement from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

