<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ounsworth-lamps-pq-external-pubkeys-00" category="std" consensus="true" submissionType="IETF" updates="{&quot;RFC5280&quot;=&gt;nil}" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="External X.509 Keys">External Keys For Use In Internet X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ounsworth-lamps-pq-external-pubkeys-00"/>
    <author initials="M." surname="Ounsworth" fullname="Mike Ounsworth">
      <organization abbrev="Entrust">Entrust Limited</organization>
      <address>
        <postal>
          <street>1000 Innovation Drive</street>
          <city>Ottawa, Ontario</city>
          <code>K2K 1E3</code>
          <country>Canada</country>
        </postal>
        <email>mike.ounsworth@entrust.com</email>
      </address>
    </author>
    <author initials="M.-J. O." surname="Saarinen" fullname="Markku-Juhani O. Saarinen">
      <organization>PQShield</organization>
      <address>
        <email>mjos@pqshield.com</email>
      </address>
    </author>
    <author fullname="J. Gray">
      <organization>Entrust</organization>
      <address>
        <email>john.gray@entrust.com</email>
      </address>
    </author>
    <author fullname="D. Hook">
      <organization>KeyFactor</organization>
      <address>
        <email>david.hook@keyfactor.com</email>
      </address>
    </author>
    <date year="2023" month="September" day="30"/>
    <workgroup>LAMPS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>Many of the post quantum cryptographic algorithms have either large public keys or signatures. In the interest of reducing bandwidth of transitting X.509 certificates, this document defines new public key and signature algorithms for referencing external public key and signature data by hash, URL, etc. This mechanism is designed to mimic the behaviour of an Authority Information Access extension.</t>
      <!-- End of Abstract -->



    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://EntrustCorporation.github.io/draft-pq-external-pubkeys/draft-ounsworth-pq-external-pubkeys.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ounsworth-lamps-pq-external-pubkeys/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/EntrustCorporation/draft-pq-external-pubkeys"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="sec-intro">
      <name>Introduction</name>
    </section>
    <section anchor="sec-pub">
      <name>External Value</name>
      <t>The id-external-value algorithm identifier is used for identifying a public key or signature which is provided as a reference to external data.</t>
      <artwork><![CDATA[
id-external-value OBJECT IDENTIFIER  ::=  { iso(1)
            identified-organization(3) dod(6) internet(1)
            security(5) mechanisms(5) pkix(7) algorithms(6)
            TBDOID }
]]></artwork>
      <t>EDNOTE: for prototyping purposes, <tt>id-external-value ::= 1.3.6.1.4.1.22554.4.2</tt></t>
      <t>The corresponding subjectPublicKey is the DER encoding of the following structure:</t>
      <artwork><![CDATA[
ExternalValue ::= SEQUENCE {
  location     GeneralName,
  hashAlg      AlgorithmIdentifier,
  hashVal      OCTET STRING
}
]]></artwork>
      <t>Upon retrieval of the referenced data, the hash of the OCTET STRING of the retrieved data (removing base64 encoding as per <xref target="RFC4648"/> if necessary) MUST be verified using hashAlg to match the <tt>ExternalPublicKey.hash</tt> value.</t>
      <section anchor="external-public-key">
        <name>External Public Key</name>
        <t>When used with a public key, algorithm parameters for id-external-value are absent.</t>
        <t>When ExternalValue is placed into a SubjectPublicKeyInfo.subjectPublicKey, the ExternalValue.location MUST refer to a DER-encoded SubjectPublicKeyInfo, which MAY be base64 encoded as per <xref target="RFC4648"/> for easier transport over text protocols.</t>
        <!-- End of Introduction section -->

</section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>##  Object Identifier Allocations</t>
      <section anchor="module-registration-smi-security-for-pkix-module-identifier">
        <name>Module Registration - SMI Security for PKIX Module Identifier</name>
        <ul spacing="normal">
          <li>
            <t>Decimal: IANA Assigned - <strong>Replace TBDMOD</strong></t>
          </li>
          <li>
            <t>Description: EXTERNAL-PUBKEY-2023 - id-mod-external-pubkey</t>
          </li>
          <li>
            <t>References: This Document</t>
          </li>
        </ul>
        <section anchor="object-identifier-registrations-smi-security-for-pkix-algorithms">
          <name>Object Identifier Registrations - SMI Security for PKIX Algorithms</name>
          <ul spacing="normal">
            <li>
              <t>Attest Statement
              </t>
              <ul spacing="normal">
                <li>
                  <t>Decimal: IANA Assigned - Replace <strong>TBDOID</strong></t>
                </li>
                <li>
                  <t>Description: id-external-value</t>
                </li>
                <li>
                  <t>References: This Document</t>
                </li>
              </ul>
            </li>
          </ul>
          <!-- End of IANA Considerations section -->

</section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no security implications to externalizing a public key from a certificate as described in this draft. It is of course possible for a malicious actor to replace or tamper with the public key data at the referenced location, but since the hash of the public key data is included in the signed certificate, any such tampering will be detected and the certificate verification will fail.</t>
      <section anchor="csrs-and-ct-logs">
        <name>CSRs and CT logs</name>
        <t>In practice, situations will arise where the ExternalPublicKey.location refers to a location which is not publicly available either because it is in a local keystore, on a private network, or no longer being hosted.</t>
        <t>Not having the public key in a certificate signing request (CSR) could make it substantially harder for CAs to perform vetting of the key, for example for cryptographic strength or checking for prior revocation due to key compromise. A certificate requester MUST make the full public key available to the CA at the time of certificate request either by ensuring that the link in the ExternalPublicKey.location is visible to the CA, or by supplying the full public key to the CA out of band.</t>
        <t>Not having the public key in Certificate Transparency (CT) logs could make it substantially harder for researchers to perform auditing tasks on CT logs. This may require additional CT mechanisms.</t>
        <!-- End of Security Considerations section -->

</section>
    </section>
    <section anchor="appendices">
      <name>Appendices</name>
      <section anchor="asn1-module">
        <name>ASN.1 Module</name>
        <artwork><![CDATA[
EXTERNAL-PUBKEY-2023
           {iso(1) identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) id-mod(0) id-mod-external-pubkey(TBDMOD)}

DEFINITIONS IMPLICIT TAGS ::= BEGIN

EXPORTS ALL;

IMPORTS

  GeneralName
  FROM PKIX1Implicit-2009
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-implicit-02(59)}

  AlgorithmIdentifier{}
  FROM AlgorithmInformation-2009
      {iso(1) identified-organization(3) dod(6) internet(1) security(5)
      mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58)}

;

id-external-value OBJECT IDENTIFIER  ::=  { iso(1) 
            identified-organization(3) dod(6) internet(1) 
            security(5) mechanisms(5) pkix(7) algorithms(6)
            TBDOID }

ExternalValue ::= SEQUENCE {
  location     GeneralName,
  hashAlg      AlgorithmIdentifier,
  hashVal      OCTET STRING
}

END
]]></artwork>
      </section>
      <section anchor="samples">
        <name>Samples</name>
        <t>Here is a sample of a Kyber1024 end entity certificate with an external public key. A trust anchor certificate using the algorithm ecdsaWithSHA256 is provided so that the Kyber1024 End Entity certificate can be verified.</t>
        <t>This is a modest example demonstrating a 550 byte Kyber1024 certificate and a 2.2 kb external Kyber1024 public key. This "compression" effect will be even more pronounced with algorithms such as Classic McEliece which have public keys in the hundreds of kilobytes; with the external public key mechanism, the size of the certificate remains constant regardless of how large the externalized subject public key is.</t>
        <t>End entity Kyber1024 Certificate with <tt>ExternalValue</tt> public key:</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIBajCCAQ+gAwIBAgIGAYrnq6R7MAoGCCqGSM49BAMCMDoxDjAMBgNVBAMMBVFT
IENBMRswGQYDVQQKDBJRdWFudGl0eSBTdXJ2ZXlvcnMxCzAJBgNVBAYTAlhYMB4X
DTIzMDkzMDE5NTgyMFoXDTI0MDEwODE5NTgyMFowHTEbMBkGA1UEAwwSRXRoZWwg
dGhlIEFhcmR2YXJrMGcwDAYKKwYBBAGBsBoEAgNXADBUhiNmaWxlOi8vbG9jYWxf
a2V5c2VydmVyL3N1cnZleW9ycy5kYjALBglghkgBZQMEAgEEIOc9S8iXUv01kSjc
XaG0mpL5O0a5GOOOckd6m84UK/VToxAwDjAMBgNVHRMBAf8EAjAAMAoGCCqGSM49
BAMCA0kAMEYCIQCsdcyyIrcGy3Ro4WyOYhAHoxSXFO0Ptgfm9FaXAqno9wIhAJLy
vNED2FxrxJCu5y+4EZyFIA2cZ2IU40FILxaB3Y72
-----END CERTIFICATE-----
]]></artwork>
        <t>For illustrative purposes, the <tt>SubjectPublicKeyInfo</tt> within the end entity certificate decodes as:</t>
        <artwork><![CDATA[
subjectPublicKeyInfo SubjectPublicKeyInfo SEQUENCE (2 elem)
      algorithm AlgorithmIdentifier SEQUENCE (1 elem)
        algorithm OBJECT IDENTIFIER 1.3.6.1.4.1.22554.4.2 ExternalValue
      subjectPublicKey BIT STRING (688 bit)
        SEQUENCE (3 elem)
          [6] (35 byte) file://local_keyserver/surveyors.db
          SEQUENCE (1 elem)
            OBJECT IDENTIFIER 2.16.840.1.101.3.4.2.1 sha-256
          OCTET STRING (32 byte) E73D4BC89752FD359...
]]></artwork>
        <t>The external public key object referenced by the end entity certificate is:</t>
        <artwork><![CDATA[
-----BEGIN PUBLIC KEY-----
MIIGNDANBgsrBgEEAYGwGgUGAwOCBiEAb4wXewtjbrOj8aATsKNEsylhQhGacYZO
lFUEIOeXVeK1/ZqjZSISJNuVTvoZvxjJXoV24vO/CLFi+HqCoNK6jZGsSwQ963k4
gRRAbxkuzIc1bvRpofeTyNgVD9EQVwa1mJqYFmi3iJnI8ENG3rsMi7Obqlh26qRD
eUkh5PQGyZap8YOy7+k02AjEAFAzxzSqyfl1Nip3PLREfWs6SpF4/7ace5UIkGi/
AXaZegUSSJORm9sOi2FDOFhhzglf/+I6YKyTPczCqaIk+wdjPDJLU0i+PDLKEwZa
BlglVPqTDwpENKXMIUPI+3OXqExlHEWIB2uy/8ZlKzNSFFWwKeVSOJJLH0Uqe4AO
VfVZDrIXVfBQYsN4W9fCIKCKk1WKk3PAsCEXqOGMUgGFAUuqd6U0cHqAEKeXYFMl
GCsJ8qd2mLgTUol3eBavlURa3HledZskZiik1JlCCvi6wGPFtwVj1JJE9ntF7smp
OZyxUhhWvFiR4qWGPbSNhgAUd5qrKzphU5aDjWsUTIVryKFfYZC2DGy32oIua6s3
NqcR0+tz4Vg7UIbAurFVQPh7AppRyflsXpkWZJR2toxYsmGzs7di2HFUsIyNVsoF
ztFbT0vJEXsuEHhleWKYJSUKZiGQokKgUrHIEwhu0dLDnDG3eSPDbgpJ1iHDknqQ
FSNKl5Yp6LqM7sFB5uZTDIIzbdsJ+mwsXYp5oIevcegbmno5CXNP56Mg6UKnZOmI
GGwxGPUSoJB4hBhl7QwC1PoDOuCTQ0KRW1JeiPUsvbiAyIM/dNG7LqR5ZHzFREe7
NdEbyhrEHFu5Z5pgm6J9crGWJ0QzmvLP3MKm5/CqbDMbsBSPD+vJarIzAeWxzElP
UjK3bDBvH1l2cFQW1NpP4Hl6zYF5o2h5rKM6qHwpzogTM+IIe1Ua4fhc+ysCZ+yi
WWd8UXdcNEJ3WaINEceYktLPJJnGVEM2+asH9eyLyOsglxQhibAgnEdh3XKTAKqB
/EyhYbLLOKJfz9GiDzSqFJIecZGxRdvK4aam2yG86/dco6IorWDPa1GyC7xBubwl
LDBZGNhPqEHP47lIsfpRYRa1tDsoH0tP5GAAUUUI+6tLU+LCo5sqXoxt9PDGZfmq
P9InsZQfeWksDhQvNtDKpiMHrKo1+HeCL/suUPvNd0VOLbKZufS9UCRH/pGqGGxU
o6kcrsN4krQfNrIphAoGcyy9u+XPOXw0NUxeReBIQPE+URijogsH2BYQ+6ITEqki
RQSGtZuNoUwLUxtb2/pe5YStwESuqRUfMYB3pzcdEKbLkbnG/mRMNJWUtdOQAkcI
SFF9DdJ/+YgLfzqiuemhsJGprmqPXzKQ6XecvVdkRrYjotgOjHBl4GBxAL1DdKdc
JfSRfcegxCQAPOLE95UJ10ouEyMnSAJS2EgVaqpLK+Ayb8AKmrOJkuc8vFOLw9Ul
cqd+7DnGFNVyT8XCldti7kQRlSUvq2eIPcCqdOQ1CzmffIxg42wuN2skgXSN00eo
VLt+HHm/q7p48hQTL2R8bLYqJHbKRetXz0yAXqkBMDck71QDg9so+0ZAO3W4nyqC
2zKYdxItCJEZkxs6rvJaJwq8WQxmXMgoUUeNjmduVFJ5FGas6rQRWRhaWYquj7Om
H0dsgSYeRPmG89lViCYEVjfO6AgI4rG7H6ZOqokNQeeEHSo6ZJmo1+AbzoKimFev
M2axfjokPzm8CjgQVMOxCJdgxamkXzasjZOxZourBUJYBCA5lztlEiKDD4G0UzGs
muaO7HSVxyWNJ+QELRmh/LQnj+UwE6JcdJIoQEA2iCvIrWSHwTcS17oIE4aQocMs
DGEqoigjmVh/1YAiXrStzlzGiSkxAiU5b5eXsYwqqoZKVpNYR7O2k/mLdxwhA7cY
9YTMUQY7WqCESslAycCJ0luKEPNbLOMHs4tsAlxUj5igbEOkK3weYKecndE/aGNW
nKCh18aKT8U8idLDvpBuGmMAW3ZhhPRLSrJXQpMkwKaAOcl547iPYRiQAqIDgiyT
qAkqPbJ9BwvEs6xb8iZCJna5d5lXQiNrD0v+OU8P28vZ7zbjf6oEfmI/6j3OydtS
S5EjF9K6/ZQ=
-----END PUBLIC KEY-----
]]></artwork>
        <t>For illustrative purposes, the key data, which is itself a <tt>SubjectPublicKeyInfo</tt>, decodes as:</t>
        <artwork><![CDATA[
SEQUENCE (2 elem)
  SEQUENCE (1 elem)
    OBJECT IDENTIFIER 1.3.6.1.4.1.22554.5.6.3 Kyber1024
  BIT STRING (12544 bit) 01101111...
]]></artwork>
        <t>The following trust anchor certificate can be used to validate the above end entity certificate.</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="intellectual-property-considerations">
        <name>Intellectual Property Considerations</name>
        <t>None.</t>
      </section>
    </section>
    <section anchor="contributors-and-acknowledgements">
      <name>Contributors and Acknowledgements</name>
      <t>This document incorporates contributions and comments from a large group of experts. The Editors would especially like to acknowledge the expertise and tireless dedication of the following people, who attended many long meetings and generated millions of bytes of electronic mail and VOIP traffic over the past year in pursuit of this document:</t>
      <t>Serge Mister (Entrust).</t>
      <t>We are grateful to all, including any contributors who may have
been inadvertently omitted from this list.</t>
      <t>This document borrows text from similar documents, including those referenced below. Thanks go to the authors of those
   documents.  "Copying always makes things easier and less error prone" - <xref target="RFC8411"/>.</t>
      <section anchor="making-contributions">
        <name>Making contributions</name>
        <t>Additional contributions to this draft are welcome. Please see the working copy of this draft at, as well as open issues at:</t>
        <t>https://github.com/EntrustCorporation/draft-ounsworth-pq-external-keys</t>
        <!-- End of Contributors section -->

</section>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC4648" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
        <front>
          <title>The Base16, Base32, and Base64 Data Encodings</title>
          <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
          <date month="October" year="2006"/>
          <abstract>
            <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4648"/>
        <seriesInfo name="DOI" value="10.17487/RFC4648"/>
      </reference>
      <reference anchor="RFC5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC8411" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8411.xml">
        <front>
          <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <author fullname="R. Andrews" initials="R." surname="Andrews"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8411"/>
        <seriesInfo name="DOI" value="10.17487/RFC8411"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
