<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5274bis-11" category="std" consensus="true" submissionType="IETF" obsoletes="5274, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Compliance">Certificate Management Messages over CMS (CMC): Compliance Requirements</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="26"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Compliance</keyword>

    <abstract>


<?line 68?>

<t>This document provides a set of compliance statements about the CMC
(Certificate Management over CMS) enrollment protocol.  The ASN.1
structures and the transport mechanisms for the CMC enrollment
protocol are covered in other documents.  This document provides the
information needed to make a compliant version of CMC.</t>

<t>This document obsoletes RFC 5274 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5274bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/TBD"/>.</t>
    </note>


  </front>

  <middle>


<?line 78?>

<section anchor="introduction"><name>Introduction</name>

<t>The CMC (Certificate Management over CMS) protocol is designed in
terms of a client/server relationship.  In the simplest case, the
client is the requestor of the certificate (i.e., the End-Entity
(EE)) and the server is the issuer of the certificate (i.e., the
Certification Authority (CA)).  The introduction of a Registration
Authority (RA) into the set of agents complicates the picture only
slightly.  The RA becomes the server with respect to the certificate
requestor, and it becomes the client with respect to the certificate
issuer.  Any number of RAs can be inserted into the picture in this
manner.</t>

<t>The RAs may serve specialized purposes that are not currently covered
by this document.  One such purpose would be a Key Escrow agent.  As
such, all certificate requests for encryption keys would be directed
through this RA and it would take appropriate action to do the key
archival.  Key recovery requests could be defined in the CMC
methodology allowing for the Key Escrow agent to perform that
operation acting as the final server in the chain of agents.</t>

<t>If there are multiple RAs in the system, it is considered normal that
not all RAs will see all certificate requests.  The routing between
the RAs may be dependent on the content of the certificate requests
involved.</t>

<t>This document is divided into six sections, each section specifying
the requirements that are specific to a class of agents in the CMC
model.  These are 1) all Entities, 2) all Servers, 3) all Clients, 4)
all End-Entities, 5) all Registration Authorities, 6) all Certification
Authorities.</t>

<t>This document obsoletes RFC 5274 <xref target="CMC-COMPv1"/> and RFC 6402 <xref target="CMC-Updates"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>There are several different terms, abbreviations, and acronyms used
in this document that we define here for convenience and consistency
of usage:</t>

<dl>
  <dt>End-Entity (EE):</dt>
  <dd>
    <t>Refers to the entity that owns a key pair and for
whom a certificate is issued.</t>
  </dd>
  <dt>Registration Authority (RA) or Local RA (LRA):</dt>
  <dd>
    <t>Refers to an entity
that acts as an intermediary between the EE and the CA.  Multiple
RAs can exist between the End-Entity and the Certification
Authority.  RAs may perform additional services such as key
generation or key archival.  This document uses the term RA for
both RA and LRA.</t>
  </dd>
  <dt>Certification Authority (CA):</dt>
  <dd>
    <t>Refers to the entity that issues
certificates.</t>
  </dd>
  <dt>Client:</dt>
  <dd>
    <t>Refers to an entity that creates a PKI Request.  In this
document, both RAs and EEs can be clients.</t>
  </dd>
  <dt>Server:</dt>
  <dd>
    <t>Refers to the entities that process PKI Requests and create
PKI Responses.  In this document both CAs and RAs can be servers.</t>
  </dd>
  <dt>PKCS #10:</dt>
  <dd>
    <t>Refers to the Public Key Cryptography Standard #10
<xref target="PKCS10"/>, which defines a certification request syntax.</t>
  </dd>
  <dt>CRMF:</dt>
  <dd>
    <t>Refers to the Certificate Request Message Format RFC <xref target="CRMF"/>.
CMC uses this certification request syntax defined in this
document as part of the protocol.</t>
  </dd>
  <dt>CMS:</dt>
  <dd>
    <t>Refers to the Cryptographic Message Syntax RFC <xref target="CMS"/>.  This
document provides for basic cryptographic services including
encryption and signing with and without key management.</t>
  </dd>
  <dt>PKI Request/Response:</dt>
  <dd>
    <t>Refers to the requests/responses described in
this document.  PKI Requests include certification requests,
revocation requests, etc.  PKI Responses include certs-only
messages, failure messages, etc.</t>
  </dd>
  <dt>Proof-of-Identity:</dt>
  <dd>
    <t>Refers to the client proving they are who they say
that they are to the server.</t>
  </dd>
  <dt>Proof-of-Possession (POP):</dt>
  <dd>
    <t>Refers to a value that can be used to
prove that the private key corresponding to a public key is in the
possession and can be used by an End-Entity.</t>
  </dd>
  <dt>Transport wrapper:</dt>
  <dd>
    <t>Refers to the outermost CMS wrapping layer.</t>
  </dd>
  <dt>Entity:</dt>
  <dd>
    <t>Refers to EE, RA (or LRA), or CA.</t>
  </dd>
</dl>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-rfc-5274-and-6402"><name>Changes since RFC 5274 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>Added RA Identity Proof Witness and Response Body Controls to
CMC Controls Attribute table.</t>

<t>Updated the Cryptographic Algorithm Requirements, and added
section to maintain backwards compatability.</t>

<ul empty="true"><li>
  <t>Replaced SHA-1 for SHA-256</t>
</li></ul>

<ul empty="true"><li>
  <t>Replaced HMAC-SHA-1 for HMAC-SHA-256</t>
</li></ul>

<t>Updated the Introduction section, changed "all agents" to
"all entities" in the overview to maintain consistency
throughout the document, and re-numbered the section headers.</t>

</section>
<section anchor="requirements-for-all-entities"><name>Requirements for All Entities</name>

<t>All <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> compliance statements <bcp14>MUST</bcp14> be
adhered to unless specifically stated otherwise in this document.</t>

<t>All entities <bcp14>MUST</bcp14> support Full PKI Requests, Simple PKI Responses,
and Full PKI Responses.  Servers <bcp14>SHOULD</bcp14> support Simple PKI Requests.</t>

<t>All entities <bcp14>MUST</bcp14> support the use of the CRMF syntax for
certification requests.  Support for the PKCS #10 syntax for
certification requests <bcp14>SHOULD</bcp14> be implemented by servers.</t>

<t>The extendedFailInfo field <bcp14>SHOULD NOT</bcp14> be populated in the
CMCStatusInfoV2 object; the failInfo field <bcp14>SHOULD</bcp14> be used to relay
this information.  If the extendedFailInfo field is used, it is
suggested that an additional CMCStatusInfoV2 item exist for the same
body part with a failInfo field.</t>

<t>All entities <bcp14>MUST</bcp14> implement the HTTP transport mechanism as defined
in <xref target="CMC-TRANS"/>.  Other transport mechanisms <bcp14>MAY</bcp14> be implemented.</t>

<section anchor="cryptographic-algorithm-requirements"><name>Cryptographic Algorithm Requirements</name>

<t>All entities <bcp14>MUST</bcp14> verify RSA-SHA256 signatures in
SignedData; (see <xref target="CMS-ALG2"/>).  Entities <bcp14>MAY</bcp14> verify other signature
algorithms.</t>

<t>All entities <bcp14>MUST</bcp14> generate RSA-SHA256 signatures for
SignedData; (see <xref target="CMS-ALG2"/>).  Other signatures algorithms <bcp14>MAY</bcp14> be used
for generation.</t>

<t>All entities <bcp14>MUST</bcp14> support Advanced Encryption Standard (AES) as the
content encryption algorithm for EnvelopedData; (see <xref target="CMS-AES"/>).
Other content encryption algorithms <bcp14>MAY</bcp14> be implemented.</t>

<t>All entities <bcp14>MUST</bcp14> support AES-Galois/Counter Mode (GCM) as the
authenticated content encryption algorithm for AuthEnvelopedData; (see <xref target="CMS-AES-AE"/>).
They <bcp14>MUST</bcp14> also support a 12 octet nonce size and a 12 octet integrity
check value (ICV) length. Other content encryption algorithms <bcp14>MAY</bcp14> be
implemented.</t>

<t>All entities <bcp14>MUST</bcp14> support RSA as a key transport algorithm for
EnvelopedData and AuthEnvelopedData; (see <xref target="CMS-ALG2"/>). Other key
transport algorithms <bcp14>MAY</bcp14> be implemented.</t>

<t>If an entity supports key agreement for EnvelopedData or AuthEnvelopedData,
it <bcp14>MUST</bcp14> support Diffie-Hellman; (see <xref target="CMS-DH"/>).</t>

<t>If an entity supports PasswordRecipientInfo for EnvelopedData,
AuthenticatedData, or AuthEnvelopedData it <bcp14>MUST</bcp14> support PBKDF2 <xref target="PBKDF2"/>
for key derivation algorithms.  It <bcp14>MUST</bcp14> support AES key wrap
(see <xref target="AES-WRAP"/>) as the key encryption algorithm.</t>

<t>If AuthenticatedData is supported, PasswordRecipientInfo <bcp14>MUST</bcp14> be
supported.</t>

<t>Algorithm requirements for the Identity Proof Version 2 control
(<xref section="6.2.1" sectionFormat="of" target="CMC-STRUCT"/>) are: SHA-256 <bcp14>MUST</bcp14> be implemented
for hashAlgId.  HMAC-SHA256 <bcp14>MUST</bcp14> be implemented for macAlgId.</t>

<t>Algorithm requirements for the Pop Link Witness Version 2 control
(<xref section="6.3.1" sectionFormat="of" target="CMC-STRUCT"/>) are: SHA-256 <bcp14>MUST</bcp14> be implemented
for keyGenAlgorithm. PBKDF2 <xref target="PBKDF2"/> <bcp14>MAY</bcp14> be implemented for
keyGenAlgorithm.  HMAC-SHA256 <bcp14>MUST</bcp14> be implemented for macAlgorithm.</t>

<t>Algorithm requirements for the Encrypted POP and Decrypted POP
controls (<xref section="6.7" sectionFormat="of" target="CMC-STRUCT"/>) are: SHA-256 <bcp14>MUST</bcp14> be
implemented for witnessAlgID. HMAC-SHA256 <bcp14>MUST</bcp14> be implemented for
thePOPAlgID.</t>

<t>Algorithm requirements for Publish Trust Anchors control (<xref section="6.15" sectionFormat="of" target="CMC-STRUCT"/>) are: SHA-256 <bcp14>MUST</bcp14> be implemented for hashAlgorithm.</t>

<t>If an EE generates DH keys for certification, it <bcp14>MUST</bcp14> support <xref section="4" sectionFormat="of" target="DH-POP"/>.  EEs <bcp14>MAY</bcp14> support <xref section="3" sectionFormat="of" target="DH-POP"/>.  CAs and RAs
that do POP verification <bcp14>MUST</bcp14> support <xref section="4" sectionFormat="of" target="DH-POP"/> and
<bcp14>SHOULD</bcp14> support <xref section="3" sectionFormat="of" target="DH-POP"/>.</t>

<t>EEs that need to use a signature algorithm for keys that cannot
produce a signature <bcp14>MUST</bcp14> support <xref section="C" sectionFormat="of" target="CMC-STRUCT"/> and <bcp14>MUST</bcp14>
support the Encrypted/Decrypted POP controls.  CAs and RAs that do
POP verification <bcp14>MUST</bcp14> support this signature algorithm and <bcp14>MUST</bcp14>
support the Encrypted/Decrypted POP controls.</t>

<t>For backwards compatibility with the previous version of CMC,
servers <bcp14>MAY</bcp14> offer the algorithms specified therein, but <bcp14>SHOULD</bcp14>
use the CMC requests to identify which certificates should be
transitioned to more secure algorithms, if possible.</t>

</section>
<section anchor="controls"><name>Controls</name>

<t>The following table lists the name and level of support required for
each control.</t>

<texttable title="CMC Control Attributes" anchor="cmc-controls">
      <ttcol align='left'>Control</ttcol>
      <ttcol align='left'>EE</ttcol>
      <ttcol align='left'>RA</ttcol>
      <ttcol align='left'>CA</ttcol>
      <c>Extended CMC Status Info</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>CMC Status Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identity Proof Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Identity Proof</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Identification</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Random</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness Version 2</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>POP Link Witness</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Data Return</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Modify Cert Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Add Extensions</c>
      <c>N/A</c>
      <c><bcp14>MAY</bcp14></c>
      <c>(1)</c>
      <c>Transaction ID</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Sender Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Recipient Nonce</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Encrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Decrypted POP</c>
      <c>(4)</c>
      <c>(5)</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>RA POP Witness</c>
      <c>N/A</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>(1)</c>
      <c>Get Certificate</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Get CRL</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Revocation Request</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Registration Info</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Response Information</c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c><bcp14>SHOULD</bcp14></c>
      <c>Query Pending</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Confirm Cert.  Acceptance</c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c><bcp14>MUST</bcp14></c>
      <c>Publish Trust Anchors</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Authenticate Data</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>(3)</c>
      <c>Batch Request</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Batch Responses</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Publication Information</c>
      <c>optional</c>
      <c>optional</c>
      <c>optional</c>
      <c>Control Processed</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>RA Identity Proof Witness</c>
      <c>N/A</c>
      <c><bcp14>MUST</bcp14></c>
      <c>(2)</c>
      <c>Response Body</c>
      <c>(6)</c>
      <c>(6)</c>
      <c>N/A.</c>
</texttable>

<t>Notes:</t>

<t><list style="numbers" type="1">
  <t>CAs <bcp14>SHOULD</bcp14> implement this control if designed to work with RAs.</t>
  <t>CAs <bcp14>MUST</bcp14> implement this control if designed to work with RAs.</t>
  <t>Implementation is optional for these controls.  We strongly
suggest that they be implemented in order to populate client
trust anchors.</t>
  <t>EEs only need to implement this if (a) they support key agreement
algorithms or (b) they need to operate in environments where the
hardware keys cannot provide POP.</t>
  <t>RAs <bcp14>SHOULD</bcp14> implement this if they implement RA POP Witness.</t>
  <t>EE's <bcp14>SHOULD</bcp14> implement if designed to work with RAs and <bcp14>MUST</bcp14>
implement if intended to be used in environments where RAs are
used for identity validation or key generation.  RAs <bcp14>SHOULD</bcp14>
implement and validate responses for consistency.</t>
</list></t>

<t>Strong consideration should be given to implementing the Authenticate
Data and Publish Trust Anchors controls as this gives a simple method
for distributing trust anchors into clients without user
intervention.</t>

</section>
<section anchor="crmf-feature-requirements"><name>CRMF Feature Requirements</name>

<t>The following additional restrictions are placed on CRMF features:</t>

<t>The registration control tokens id-regCtrl-regToken and id-regCtrl-
authToken <bcp14>MUST NOT</bcp14> be used.  No specific CMC feature is used to
replace these items, but generally the CMC controls identification
and identityProof will perform the same service and are more
specifically defined.</t>

<t>The control token id-regCtrl-pkiArchiveOptions <bcp14>SHOULD NOT</bcp14> be
supported.  An alternative method is under development to provide
this functionality.</t>

<t>The behavior of id-regCtrl-oldCertID is not presently used.  It is
replaced by issuing the new certificate and using the id-cmc-
publishCert to remove the old certificate from publication.  This
operation would not normally be accompanied by an immediate
revocation of the old certificate; however, that can be accomplished
by the id-cmc-revokeRequest control.</t>

<t>The id-regCtrl-protocolEncrKey is not used.</t>

</section>
</section>
<section anchor="requirements-for-clients"><name>Requirements for Clients</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-servers"><name>Requirements for Servers</name>

<t>There are no additional requirements.</t>

</section>
<section anchor="requirements-for-ees"><name>Requirements for EEs</name>

<t>If an End-Entity implements Diffie-Hellman, it <bcp14>MUST</bcp14> implement either the
DH-POP Proof-of-Possession as defined in <xref section="4" sectionFormat="of" target="DH-POP"/> or the
challenge-response POP controls id-cmc-encryptedPOP and id-cmc-
decryptedPOP.</t>

</section>
<section anchor="requirements-for-ras"><name>Requirements for RAs</name>

<t>RAs <bcp14>SHOULD</bcp14> be able to do delegated POP.  RAs implementing this
feature <bcp14>MUST</bcp14> implement the id-cmc-lraPOPWitness control.</t>

<t>All RAs <bcp14>MUST</bcp14> implement the promotion of the id-aa-cmc-unsignedData as
covered in <xref section="3.2.3" sectionFormat="of" target="CMC-STRUCT"/>.</t>

</section>
<section anchor="requirements-for-cas"><name>Requirements for CAs</name>

<t>Providing for CAs to work in an environment with RAs is strongly
suggested.  Implementation of such support is strongly suggested as
this permits the delegation of substantial administrative interaction
onto an RA rather than at the CA.</t>

<t>CAs <bcp14>MUST</bcp14> perform at least minimal checks on all public keys before
issuing a certificate.  At a minimum, a check for syntax would occur
with the POP operation.  Additionally, CAs <bcp14>SHOULD</bcp14> perform simple
checks for known bad keys such as small subgroups for DSA-SHA1 and DH
keys <xref target="SMALL-SUB-GROUP"/> or known bad exponents for RSA keys.</t>

<t>CAs <bcp14>MUST</bcp14> enforce POP checking before issuing any certificate.  CAs
<bcp14>MAY</bcp14> delegate the POP operation to an RA for those cases where 1) a
challenge/response message pair must be used, 2) an RA performs
escrow of a key and checks for POP in that manner, or 3) an unusual
algorithm is used and that validation is done at the RA.</t>

<t>CAs <bcp14>SHOULD</bcp14> implement both the DH-POP Proof-of-Possession as defined
in <xref section="4" sectionFormat="of" target="DH-POP"/> and the challenge-response POP controls id-
cmc-encryptedPOP and id-cmc-decryptedPOP.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document uses <xref target="CMC-STRUCT"/> and <xref target="CMC-TRANS"/> as building blocks to
this document.  The security sections of those two documents are
included by reference.</t>

<t>Knowledge of how an entity is expected to operate is vital in
determining which sections of requirements are applicable to that
entity.  Care needs to be taken in determining which sections apply
and fully implementing the necessary code.</t>

<t>Cryptographic algorithms have and will be broken or weakened.
Implementers and users need to check that the cryptographic
algorithms listed in this document make sense from a security level.
The IETF from time to time may issue documents dealing with the
current state of the art.  Two examples of such documents are
<xref target="SMALL-SUB-GROUP"/> and <xref target="HASH-ATTACKS"/>.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document does not require action from IANA.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="6" month="February" year="2026"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-10"/>
   
</reference>

<reference anchor="CMC-TRANS">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="6" month="February" year="2026"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFC 5273 and RFC 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5273bis-10"/>
   
</reference>
<reference anchor="CMS">
  <front>
    <title>Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2009"/>
    <abstract>
      <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="70"/>
  <seriesInfo name="RFC" value="5652"/>
  <seriesInfo name="DOI" value="10.17487/RFC5652"/>
</reference>
<reference anchor="CMS-AES">
  <front>
    <title>Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="July" year="2003"/>
    <abstract>
      <t>This document specifies the conventions for using the Advanced Encryption Standard (AES) algorithm for encryption with the Cryptographic Message Syntax (CMS). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3565"/>
  <seriesInfo name="DOI" value="10.17487/RFC3565"/>
</reference>
<reference anchor="CMS-AES-AE">
  <front>
    <title>Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS)</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="November" year="2007"/>
    <abstract>
      <t>This document specifies the conventions for using the AES-CCM and the AES-GCM authenticated encryption algorithms with the Cryptographic Message Syntax (CMS) authenticated-enveloped-data content type. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5084"/>
  <seriesInfo name="DOI" value="10.17487/RFC5084"/>
</reference>
<reference anchor="CMS-ALG2">
  <front>
    <title>Using SHA2 Algorithms with Cryptographic Message Syntax</title>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="January" year="2010"/>
    <abstract>
      <t>This document describes the conventions for using the Secure Hash Algorithm (SHA) message digest algorithms (SHA-224, SHA-256, SHA-384, SHA-512) with the Cryptographic Message Syntax (CMS). It also describes the conventions for using these algorithms with the CMS and the Digital Signature Algorithm (DSA), Rivest Shamir Adleman (RSA), and Elliptic Curve DSA (ECDSA) signature algorithms. Further, it provides SMIMECapabilities attribute values for each algorithm. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5754"/>
  <seriesInfo name="DOI" value="10.17487/RFC5754"/>
</reference>
<reference anchor="CMS-DH">
  <front>
    <title>Diffie-Hellman Key Agreement Method</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="June" year="1999"/>
    <abstract>
      <t>This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1 working group. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2631"/>
  <seriesInfo name="DOI" value="10.17487/RFC2631"/>
</reference>
<reference anchor="CRMF">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="September" year="2005"/>
    <abstract>
      <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4211"/>
  <seriesInfo name="DOI" value="10.17487/RFC4211"/>
</reference>
<reference anchor="DH-POP">
  <front>
    <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
    <date month="May" year="2013"/>
    <abstract>
      <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
      <t>This document obsoletes RFC 2875.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6955"/>
  <seriesInfo name="DOI" value="10.17487/RFC6955"/>
</reference>
<reference anchor="PBKDF2">
  <front>
    <title>Use of Password-Based Message Authentication Code 1 (PBMAC1) in PKCS #12 Syntax</title>
    <author fullname="A. Kario" initials="A." surname="Kario"/>
    <date month="September" year="2025"/>
    <abstract>
      <t>This document specifies additions and amendments to RFCs 7292 and 8018. It also obsoletes the RFC 9579. It defines a way to use the Password-Based Message Authentication Code 1 (PBMAC1), defined in RFC 8018, inside the PKCS #12 syntax. The purpose of this specification is to permit the use of more modern Password-Based Key Derivation Functions (PBKDFs) and allow for regulatory compliance.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9879"/>
  <seriesInfo name="DOI" value="10.17487/RFC9879"/>
</reference>
<reference anchor="AES-WRAP">
  <front>
    <title>Advanced Encryption Standard (AES) Key Wrap Algorithm</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="September" year="2002"/>
  </front>
  <seriesInfo name="RFC" value="3394"/>
  <seriesInfo name="DOI" value="10.17487/RFC3394"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="PKCS10">
  <front>
    <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
    <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
    <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
    <date month="November" year="2000"/>
    <abstract>
      <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2986"/>
  <seriesInfo name="DOI" value="10.17487/RFC2986"/>
</reference>
<reference anchor="SMALL-SUB-GROUP">
  <front>
    <title>Methods for Avoiding the "Small-Subgroup" Attacks on the Diffie-Hellman Key Agreement Method for S/MIME</title>
    <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
    <date month="March" year="2000"/>
    <abstract>
      <t>This document will describe the situations relevant to implementations of S/MIME version 3 in which protection is necessary and the methods that can be used to prevent these attacks. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2785"/>
  <seriesInfo name="DOI" value="10.17487/RFC2785"/>
</reference>
<reference anchor="HASH-ATTACKS">
  <front>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="B. Schneier" initials="B." surname="Schneier"/>
    <date month="November" year="2005"/>
    <abstract>
      <t>Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols need to be changed, and if so, how. This document summarizes the use of hashes in many protocols, discusses how the collision attacks affect and do not affect the protocols, shows how to thwart known attacks on digital certificates, and discusses future directions for protocol designers. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4270"/>
  <seriesInfo name="DOI" value="10.17487/RFC4270"/>
</reference>
<reference anchor="CMC-COMPv1">
  <front>
    <title>Certificate Management Messages over CMS (CMC): Compliance Requirements</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document provides a set of compliance statements about the CMC (Certificate Management over CMS) enrollment protocol. The ASN.1 structures and the transport mechanisms for the CMC enrollment protocol are covered in other documents. This document provides the information needed to make a compliant version of CMC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5274"/>
  <seriesInfo name="DOI" value="10.17487/RFC5274"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>



    </references>

</references>


<?line 473?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>Thank you to Mike Bishop, Mohamed Boucadair, and Erik Kline for
reviewing the document and providing comments.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

