<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.12 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2986 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2986.xml">
<!ENTITY RFC4648 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
<!ENTITY RFC7030 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
<!ENTITY I-D.ietf-anima-bootstrapping-keyinfra SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-bootstrapping-keyinfra.xml">
<!ENTITY RFC2045 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2045.xml">
<!ENTITY RFC2616 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2616.xml">
<!ENTITY RFC7230 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7230.xml">
<!ENTITY RFC7231 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7231.xml">
<!ENTITY RFC2985 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2985.xml">
<!ENTITY RFC2307 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2307.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-lamps-rfc7030est-clarify-03" category="std">

  <front>
    <title abbrev="rfc7030est">Clarification of Enrollment over Secure Transport (EST): transfer encodings and ASN.1</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2019" month="October" day="24"/>

    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document updates RFC7030: Enrollment over Secure Transport (EST) to resolve
some errata that was reported, and which has proven to have interoperability
when RFC7030 has been extended.</t>

<t>This document deprecates the specification of "Content-Transfer-Encoding"
headers for EST endpoints, providing a way to do this in an upward compatible
way.  This document additional defines a GRASP discovery mechanism for EST
endpoints, and specifies requirements for them.</t>

<t>Finally, this document fixes some syntactical errors in ASN.1 that was
presented.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC7030"/> defines the Enrollment over Secure Transport, or EST protocol.</t>

<t>This specification defines a number of HTTP end points for certificate enrollment and management.
The details of the transaction were defined in terms of MIME headers as defined in <xref target="RFC2045"/>,
rather than in terms of the HTTP protocol as defined in <xref target="RFC2616"/> and <xref target="RFC7230"/>.</t>

<t><xref target="RFC2616"/> and later <xref target="RFC7231"/> Appendix A.5 has text specifically
deprecating Content-Transfer-Encoding.</t>

<t><xref target="RFC7030"/> calls it out this header incorrectly.</t>

<t><xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> extends <xref target="RFC7030"/>, adding new
functionality, and interop testing of the protocol has revealed that unusual processing
called out in <xref target="RFC7030"/> causes confusion.</t>

<t>EST is currently specified as part of IEC 62351, and is widely used in Government,
Utilities and Financial markets today.</t>

<t>Changes to <xref target="RFC7030"/> to bring it inline with typical HTTP processing would change
the on-wire protocol in a way that is not backwards compatible. Reports from the field
suggest that many implementations do not send the Content-Transfer-Encoding, and many
of them ignore it.</t>

<t>This document therefore revises <xref target="RFC7030"/> to reflect the field reality, deprecating
the extranous field.</t>

<t>This document deals with errata numbers <xref target="errata4384"/>, <xref target="errata5107"/>, and <xref target="errata5108"/>.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The abbreviation "CTE" is used to denote the Content-Transfer-Encoding header, and the abbreviation
"CTE-base64" is used to denote a request or response whose Content-Transfer-Encoding header contains
the value "base64".</t>

</section>
<section anchor="rfc2119" title="Requirements Language">

<t>In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in BCP 14, RFC 2119
<xref target="RFC2119"/> and indicate requirement levels for compliant STuPiD
implementations.</t>

</section>
<section anchor="changes-to-est-endpoint-processing" title="Changes to EST endpoint processing">

<t>The <xref target="RFC7030"/> sections 4.1.3 (CA Certificates Response, /cacerts),
4.3.1/4.3.2 (Full CMC, /fullcmc), 4.4.2 (Server-Side Key Generation, /serverkeygen),
and 4.5.2 (CSR Attributes, /csrattrs) specify the use of base64 encoding with a
Content-Transfer-Encoding for requests and response.</t>

<t>This document updates <xref target="RFC7030"/> to require the POST request and payload response of all
endpoints in to be <xref target="RFC4648"/> section 4 Base64 encoded DER.  This format is to be used
regardless of whether there is any Content-Transfer-Encoding header, and any value in that
header is to be ignored.</t>

</section>
<section anchor="clarification-of-asn1-for-certificate-attribute-set" title="Clarification of ASN.1 for Certificate Attribute set.">

<t>Section 4.5.2 of <xref target="RFC7030"/> is to be replaced with the following text:</t>

<section anchor="csr-attributes-response" title="CSR Attributes Response">

<t>If locally configured policy for an authenticated EST client indicates
a CSR Attributes Response is to be provided, the server response MUST
include an HTTP 200 response code.  An HTTP response code of 204 or 404
indicates that a CSR Attributes Response is not available.  Regardless
of the response code, the EST server and CA MAY reject any subsequent
enrollment requests for any reason, e.g., incomplete CSR attributes in
the request.</t>

<t>Responses to attribute request messages MUST be encoded as the
content-type of "application/csrattrs", and are to be "base64" <xref target="RFC2045"/>
encoded.  The syntax for application/csrattrs body is as follows:</t>

<figure><artwork><![CDATA[
CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID

AttrOrOID ::= CHOICE {
  oid        OBJECT IDENTIFIER,
  attribute  Attribute {{AttrSet}} }

AttrSet ATTRIBUTE ::= { AttributesDefinedInRFC7030, ... }    
]]></artwork></figure>

<t>An EST server includes zero or more OIDs or attributes <xref target="RFC2986"/> that
it requests the client to use in the certification request.  The client
MUST ignore any OID or attribute it does not recognize.  When the
server encodes CSR Attributes as an empty SEQUENCE, it means that the
server has no specific additional information it desires in a client
certification request (this is functionally equivalent to an HTTP
response code of 204 or 404).</t>

<t>If the CA requires a particular crypto system or use of a particular
signature scheme (e.g., certification of a public key based on a
certain elliptic curve, or signing using a certain hash algorithm) it
MUST provide that information in the CSR Attribute Response.  If an
EST server requires the linking of identity and POP information (see
Section 3.5), it MUST include the challengePassword OID in the CSR
Attributes Response.</t>

<t>The structure of the CSR Attributes Response SHOULD, to the greatest
extent possible, reflect the structure of the CSR it is requesting.
Requests to use a particular signature scheme (e.g. using a
particular hash function) are represented as an OID to be reflected
in the SignatureAlgorithm of the CSR.  Requests to use a particular
crypto system (e.g., certification of a public key based on a certain
elliptic curve) are represented as an attribute, to be reflected as
the AlgorithmIdentifier of the SubjectPublicKeyInfo, with a type
indicating the algorithm and the values indicating the particular
parameters specific to the algorithm.  Requests for descriptive
information from the client are made by an attribute, to be
represented as Attributes of the CSR, with a type indicating the
<xref target="RFC2985"/> extensionRequest and the values indicating the particular
attributes desired to be included in the resulting certificate's
extensions.</t>

<t>The sequence is Distinguished Encoding Rules (DER) encoded <xref target="X690"/>
and then base64 encoded (Section 4 of <xref target="RFC4648"/>).  The resulting text
forms the application/csrattr body, without headers.</t>

<t>For example, if a CA requests a client to submit a certification
request containing the challengePassword (indicating that linking of
identity and POP information is requested; see Section 3.5), an
extensionRequest with the Media Access Control (MAC) address
(<xref target="RFC2307"/>) of the client, and to use the secp384r1 elliptic curve
and to sign with the SHA384 hash function.  Then, it takes the
following:</t>

<figure><artwork><![CDATA[
      OID:        challengePassword (1.2.840.113549.1.9.7)

      Attribute:  type = extensionRequest (1.2.840.113549.1.9.14)
                  value = macAddress (1.3.6.1.1.1.1.22)

      Attribute:  type = id-ecPublicKey (1.2.840.10045.2.1)
                  value = secp384r1 (1.3.132.0.34)

      OID:        ecdsaWithSHA384 (1.2.840.10045.4.3.3)
]]></artwork></figure>

<t>and encodes them into an ASN.1 SEQUENCE to produce:
~~~
    30 41 06 09 2a 86 48 86 f7 0d 01 09 07 30 12 06 07 2a 86 48 ce 3d
    02 01 31 07 06 05 2b 81 04 00 22 30 16 06 09 2a 86 48 86 f7 0d 01
    09 0e 31 09 06 07 2b 06 01 01 01 01 16 06 08 2a 86 48 ce 3d 04 03
    03
~~~</t>

<t>and then base64 encodes the resulting ASN.1 SEQUENCE to produce:</t>

<figure><artwork><![CDATA[
    MEEGCSqGSIb3DQEJBzASBgcqhkjOPQIBMQcGBSuBBAAiMBYGCSqGSIb3DQEJDjEJ
    BgcrBgEBAQEWBggqhkjOPQQDAw==
]]></artwork></figure>

</section>
</section>
<section anchor="clarification-of-error-messages-for-certificate-enrollment-operations" title="Clarification of error messages for certificate enrollment operations">

<t>errata 5108.</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>This document does not disclose any additional identifies to either active or
passive observer would see with <xref target="RFC7030"/>.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>This document clarifies an existing security mechanism.  An option is
introduced to the security mechanism using an implicit negotiation.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>The ASN.1 module in Appendix A of this doucment makes use of object
identifiers (OIDs).  This document requests that IANA register an
OID in the SMI Security for PKIX Arc in the Module identifiers
subarc (1.3.6.1.5.5.7.0) for the ASN.1 module.  The OID for the
Asymmetric Decryption Key Identifier (1.2.840.113549.1.9.16.2.54)
was previously defined in <xref target="RFC7030"/>.  IANA is requested to update
the "Reference" column for the Asymmetric Decryption Key Identifier
attribute to also include a reference to this doducment.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>This work was supported by the Huawei Technologies.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC2986;
&RFC4648;
&RFC7030;
&I-D.ietf-anima-bootstrapping-keyinfra;
<reference anchor="X680" >
  <front>
    <title>Information technology - Abstract Syntax Notation One.</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2002"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8824-1:2002"/>
</reference>
<reference anchor="X681" >
  <front>
    <title>Information technology - Abstract Syntax Notation One: Information Object Specification.</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2002"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8824-2:2002"/>
</reference>
<reference anchor="X682" >
  <front>
    <title>Information technology - Abstract Syntax Notation One: Constraint Specification.</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2002"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8824-2:2002"/>
</reference>
<reference anchor="X683" >
  <front>
    <title>Information technology - Abstract Syntax Notation One: Parameterization of ASN.1 Specifications.</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2002"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8824-2:2002"/>
</reference>
<reference anchor="X690" >
  <front>
    <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER).</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2002"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
</reference>
&RFC2045;


    </references>

    <references title='Informative References'>

&RFC2616;
&RFC7230;
&RFC7231;
<reference anchor="errata4384" target="https://www.rfc-editor.org/errata/eid4384">
  <front>
    <title>EST errata 4384: ASN.1 encoding error</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="errata5107" target="https://www.rfc-editor.org/errata/eid5107">
  <front>
    <title>EST errata 5107: use Content-Transfer-Encoding</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="errata5108" target="https://www.rfc-editor.org/errata/eid5108">
  <front>
    <title>EST errata 5108: use of Content-Type for error message</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
&RFC2985;
&RFC2307;


    </references>


<section anchor="asn1-module" title="ASN.1 Module">

<t>This annex provides the normative ASN.1 definitions for the structures
described in this specification using ASN.1 as defined in <xref target="X680"/>
through <xref target="X683"/>.</t>

<t>There is no ASN.1 Module in RFC 7030.  This module has been created
by combining the lines that are contained in the document body.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

