<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-07" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="August" day="29"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 67?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 and RFC 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 77?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFC 5273 <xref target="CMC-TRANSv1"/> and RFC 6402 <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<t>Merged <xref target="CMC-Updates"/> text.</t>

<t>IANA assigned TCP port 5318 for the use of CMC.</t>

<t>Clarified the file extensions for Full PKI Requests and Responses.</t>

<t>Replaced TLS 1.0 for TLS 1.2 or later, and added that implemetations are
required to follow the recommendations in <xref target="BCP195"/>.</t>

<t>Addressed <xref target="erratum3593"/>.</t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file. crq and crp stand for Full PKI Request/Response,
respectively; for clarity we define file extensions for them. The
following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS is supported by an implementation, then the implementation <bcp14>MUST</bcp14>
folow the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type header for a request:
&gt;&gt; Content-Type: application/pkcs7-mime; smime-type=CMC-request;
&gt;&gt;  name=request.p7m</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>A Content-Type header for a response:
&gt;&gt; Content-Type: application/pkcs7-mime; smime-type=CMC-response;
&gt;&gt;  name=response.p7m</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The Service Name is "pkix-cmc".
The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: [RFC-to-be]
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

<t>IANA is requested to update the existing references to <xref target="CMC-TRANSv1"/> in the
Media Type Sub-Parameter Registries for CMC-Request and CMC-Response to [ RFC-to-be ].</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>

<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="29" month="August" year="2025"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-07"/>
   
</reference>
<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>
<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>
<reference anchor="CMC-TRANSv1">
  <front>
    <title>Certificate Management over CMS (CMC): Transport Protocols</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="M. Myers" initials="M." surname="Myers"/>
    <date month="June" year="2008"/>
    <abstract>
      <t>This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages. The transport mechanisms described in this document are HTTP, file, mail, and TCP. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5273"/>
  <seriesInfo name="DOI" value="10.17487/RFC5273"/>
</reference>
<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>
<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>



    </references>

</references>


<?line 314?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

