<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-automation-keyusages-06" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocDepth="3" tocInclude="true" sortRefs="false" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="EKU for Automation">X.509 Certificate Extended Key Usage (EKU) for Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-automation-keyusages-06"/>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="D." surname="Goltzsche" fullname="David Goltzsche">
      <organization>Siemens Mobility</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>david.goltzsche@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <date year="2025"/>
    <area>sec</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Industrial Automation</keyword>
    <keyword>ERJU</keyword>
    <keyword>extended key usage</keyword>
    <keyword>extension</keyword>
    <keyword>PKI</keyword>
    <abstract>
      <?line 162?>

<t>RFC 5280 defines the Extended Key Usage (EKU) extension and several extended key purposes (KeyPurposeIds) for use with that extension in X.509 certificates.  This document defines KeyPurposeIds for general-purpose and trust anchor configuration files, for software and firmware update packages, and for safety-critical communication to be included in the EKU extension of X.509 v3 public key certificates.</t>
    </abstract>
  </front>
  <middle>
    <?line 167?>

<section anchor="Intro">
      <name>Introduction</name>
      <t>KeyPurposeIds added to the certificate's extended key usage extension as defined in <xref target="RFC5280"/> are meant to express intent as to the purpose of the named usage, for humans and for complying libraries. In addition, the IANA registry "SMI Security for PKIX Extended Key Purpose" <xref target="RFC7299"/> contains additional KeyPurposeIds. The use of the anyExtendedKeyUsage KeyPurposeId, as defined in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, is generally considered a poor practice.</t>
      <t>This document defines KeyPurposeIds for certificates that are used for the following purposes, among others:</t>
      <ul spacing="normal">
        <li>
          <t>Validating signatures of general-purpose software configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of trust anchor configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of software and firmware update packages.</t>
        </li>
        <li>
          <t>Authenticating communication endpoints authorized for safety-critical communication.</t>
        </li>
      </ul>
      <t>If the purpose of the issued certificates is not restricted, i.e., the type of operations for which a public key contained in the certificate can be used in unintended ways, increasing the risk of cross-application attacks. Failure to ensure proper segregation of duties means that an application or system that generates the public/private keys and applies for a certificate to the operator certification authority could obtain a certificate that can be misused for tasks that this application or system is not entitled to perform. For example, management of trust anchors is a particularly critical task. A device could potentially accept a trust anchor configuration file signed by a service that uses a certificate with no EKU or with the KeyPurposeId id-kp-codeSigning (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) or id-kp-documentSigning <xref target="RFC9336"/>. A device should only accept trust anchor configuration files if the file is verified with a certificate that has been explicitly issued for this purpose.</t>
      <t>The KeyPurposeId id-kp-serverAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS WWW server, and the KeyPurposeId id-kp-clientAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS WWW client. However, there are currently no KeyPurposeIds for usage with X.509 certificates for safety-critical communication.</t>
      <t>This document addresses the above problems by defining keyPurposeIds for the EKU extension of X.509 public key certificates. These certificates are either used for signing files (general-purpose configuration and trust anchor configuration files, software and firmware update packages) or are used for safety-critical communication.</t>
      <t>Vendor-defined KeyPurposeIds used within a PKI governed by the vendor or a group of vendors typically do not pose interoperability concerns, as non-critical extensions can be safely ignored if unrecognized. However, using KeyPurposeIds outside of their intended vendor-controlled environment or in ExtendedKeyUsage extensions that have been marked critical can lead to interoperability issues. Therefore, it is advisable not to rely on vendor-defined KeyPurposeIds. Instead, this specification defines standard KeyPurposeIds to ensure interoperability across various vendors and industries.</t>
      <t>This specification focuses on use in industrial automation and rail automation. The definitions are intentionally broad to also allow use of the KeyPurposeIds in other deployments. The context in which the KeyPurposeIds defined in this document are used is out of scope for this document. The details for each deployment needs to be
described in technical standards and certificate policies.</t>
      <section anchor="use-cases">
        <name>Use Cases</name>
        <t>Automation hardware and software products will become more safe and secure by fulfilling mandatory, generic system requirements related to cyber security driven by federal offices like the <xref target="EU-CRA">European Union Cyber Resilience Act</xref> governed by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy.
Automation products connected to the Internet would bear the so called <xref target="CE-marking">CE marking</xref> to indicate they comply.
Such regulation was announced in the <xref target="EU-STRATEGY">2020 EU Cybersecurity Strategy</xref>, and complements other legislation in this area, specifically the NIS2 Framework, <xref target="NIS2">Directive on measures for a high common level of cybersecurity across the Union</xref>.
2020 EU Cybersecurity Strategy suggests to implement and extend international standards such as the <xref target="IEC.62443-4-2">Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</xref> (IACS refers to industrial automation and control system) and the <xref target="IEC.62443-3-3">Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</xref>. Automation hardware and software products of diverse vendors that are connected on automation networks and the Internet can be used to build common automation solutions. Standardized attributes would allow transparency of security properties and interoperability for vendors in context of software and firmware updates, general-purpose configuration, trust anchor configuration, and safety communication.</t>
        <t>A concrete example for Automation is a Rail Automation system. The <xref target="ERJU">Europe's Rail Joint Undertaking System Pillar</xref> deliver a unified operational concept and a functional, safe, and secure system architecture with system requirements for Rail Automation. The deliverables include due consideration of cyber security aspects based on the IEC 62443 series of standards, focused on the European railway network to which <xref target="Directive-2016_797">Directive 2016/797 - Interoperability of the rail system within the EU</xref> applies.</t>
      </section>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document uses terms defined in <xref target="RFC5280"/>. X.509 certificate extensions are defined using ASN.1 <xref target="X.680"/> and <xref target="X.690"/>.</t>
      <t>The term 'safety-critical communication' refers to communication that could, under certain conditions, lead to a state in which human life, health, property, or the environment is endangered. For the definition of 'safety' see <xref target="NIST_Glossary"/> and <xref target="ISO.IEC.IEEE_12207"/>.</t>
    </section>
    <section anchor="EKU">
      <name>Extended Key Purpose for Automation</name>
      <t>This specification defines the KeyPurposeIds id-kp-configSigning, id-kp-trustAnchorConfigSigning, id-kp-updatePackageSigning, and id-kp-safetyCommunication and uses these, respectively, for: signing general-purpose configuration files or trust anchor configuration files, signing software or firmware update packages, or authenticating communication peers for safety-critical communication. As described in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, "[i]f the [extended key usage] extension is present, then the certificate <bcp14>MUST</bcp14> only be used for one of the purposes indicated" and "[i]f multiple [key] purposes are indicated the application need not recognize all purposes indicated, as long as the intended purpose is present".</t>
      <t>None of the KeyPurposeIds specified in this document are intrinsically mutually exclusive.  Instead, the acceptable combinations of those KeyPurposeIds with others specified in this document and with other KeyPurposeIds specified elsewhere are left to the technical standards of the respective application and the certificate policy of the respective PKI.  For example, a technical standard may specify: 'Different keys and certificates <bcp14>MUST</bcp14> be used for safety communication and for trust anchor updates, and a relying party <bcp14>MUST</bcp14> ignore the KeyPurposeId id-kp-trustAnchorConfigSigning if id-kp-safetyCommunication is one of the specified key purposes in a certificate.' The certificate policy for example may specify: 'The id-kp-safetyCommunication KeyPuposeId <bcp14>SHOULD NOT</bcp14> be included in an issued certificate together with the KeyPurposeId id-kp-trustAnchorConfigSigning.' Technical standards and certificate policies of different applications may specify other rules.  Further considerations on prohibiting combinations of KeyPurposeIds is described in the Security Considerations section of this document.</t>
      <t>Systems or applications that verify the signature of a general-purpose configuration file or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication <bcp14>SHOULD</bcp14> require that corresponding KeyPurposeIds be specified by the EKU extension. If the certificate requester knows the certificate users are mandated to use these KeyPurposeIds, it <bcp14>MUST</bcp14> enforce their inclusion. Additionally, such a certificate requester <bcp14>MUST</bcp14> ensure that the KeyUsage extension be set to digitalSignature for signature verification, to keyEncipherment for public key encryption, and keyAgreement for key agreement.</t>
    </section>
    <section anchor="include-EKU">
      <name>Including the Extended Key Purpose in Certificates</name>
      <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. The EKU extension syntax is repeated here for convenience:</t>
      <artwork><![CDATA[
   ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId

   KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
      <t>As described in <xref target="RFC5280"/>, the EKU extension may, at the option of the certificate issuer, be either critical or non-critical. The inclusion of KeyPurposeIds id-kp-configSigning, id-kp-trustAnchorConfigSigning, id-kp-updatePackageSigning, and id-kp-safetyCommunication in a certificate indicates that the public key encoded in the certificate has been certified for the following usages:</t>
      <ul spacing="normal">
        <li>
          <t>id-kp-configSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-configSigning may be used for verifying signatures of general-purpose configuration files of various formats (for example XML, YAML, or JSON). Configuration files are used to configure hardware or software.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-trustAnchorConfigSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-trustAnchorConfigSigning may be used for verifying signatures of trust anchor configuration files of various formats (for example XML, YAML, or JSON).
Trust anchor configuration files are used to add or remove trust anchors to the trust store of a device.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-updatePackageSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-updatePackageSigning may be used for verifying signatures of software or firmware update packages. Update packages are used to install software (including bootloader, firmware, safety-related applications, and others) on systems.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-safetyCommunication</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-safetyCommunication may be used to authenticate a communication peer for safety-critical communication based on TLS or other protocols.</t>
        </li>
      </ul>
      <artwork><![CDATA[
   id-kp  OBJECT IDENTIFIER  ::=
       { iso(1) identified-organization(3) dod(6) internet(1)
         security(5) mechanisms(5) pkix(7) 3 }

   id-kp-configSigning             OBJECT IDENTIFIER ::= { id-kp 41 }
   id-kp-trustAnchorConfigSigning  OBJECT IDENTIFIER ::= { id-kp 42 }
   id-kp-updatePackageSigning      OBJECT IDENTIFIER ::= { id-kp 43 }
   id-kp-safetyCommunication       OBJECT IDENTIFIER ::= { id-kp 44 }
]]></artwork>
    </section>
    <section anchor="ca-implication">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority <bcp14>MUST</bcp14> ensure that the correct values for the EKU extension as well as the KU extension are inserted in each certificate that is issued. The inclusion of the id-kp-configSigning, id-kp-trustAnchorConfigSigning, id-kp-updatePackageSigning, and id-kp-safetyCommunication KeyPurposeIds does not preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document. These extended key usage key purposes do not introduce new security risks but instead reduce existing security risks by providing the means to identify if the certificate is generated to verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party may additionally prohibit use of specific combinations of KeyPurposeIds.  The procedure for allowing or disallowing combinations of KeyPurposeIds using excluded KeyPurposeId and permitted KeyPurposeId, as carried out by a relying party, is defined in <xref section="4" sectionFormat="of" target="RFC9336"/>.  The technical standards and certificate policies of the application should explicitly enumerate requirements for excluded or permitted KeyPurposeIds or their combinations. An example of excluded KeyPurposeIds can be the presence of the anyExtendedKeyUsage KeyPurposeId. Examples of allowed KeyPurposeIds combinations can be the presence of id-kp-safetyCommunication together with id-kp-clinetAuth or id-kp-serverAuth.</t>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>In some security protocols, such as <xref target="RFC5246">TLS 1.2</xref>, certificates are exchanged in the clear. In other security protocols, such as <xref target="RFC8446">TLS 1.3</xref>, the certificates are encrypted. The inclusion of the EKU extension can help an observer determine the purpose of the certificate. In addition, if the certificate is issued by a public certification authority, the inclusion of an EKU extension can help an attacker to monitor the Certificate Transparency logs <xref target="RFC9162"/> to identify the purpose of the certificate which may reveal private information of the certificate subject.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following ASN.1 <xref target="X.680"/> module OID in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">id-mod-automation-eku</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is also requested to register the following OIDs in the "SMI Security for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).  These OIDs are defined in <xref target="include-EKU"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">41</td>
            <td align="left">id-kp-configSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">42</td>
            <td align="left">id-kp-trustAnchorConfigSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">43</td>
            <td align="left">id-kp-updatePackageSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">44</td>
            <td align="left">id-kp-safetyCommunication</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknow">
      <name>Acknowledgments</name>
      <t>We would like to thank the authors of <xref target="RFC9336"/> and <xref target="RFC9509"/> for  their excellent template.</t>
      <t>We also thank all reviewers of this document for their valuable feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC.X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC.X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9336">
          <front>
            <title>X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing</title>
            <author fullname="T. Ito" initials="T." surname="Ito"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines a general-purpose Document-Signing KeyPurposeId for inclusion in the Extended Key Usage (EKU) extension of X.509 public key certificates. Document-Signing applications may require that the EKU extension be present and that a Document-Signing KeyPurposeId be indicated in order for the certificate to be acceptable to that Document-Signing application.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9336"/>
          <seriesInfo name="DOI" value="10.17487/RFC9336"/>
        </reference>
        <reference anchor="RFC9509">
          <front>
            <title>X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Ekman" initials="J." surname="Ekman"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines encrypting JSON objects in HTTP messages, using JSON Web Tokens (JWTs), and signing the OAuth 2.0 access tokens KeyPurposeIds for inclusion in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by Network Functions (NFs) for the 5G System.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9509"/>
          <seriesInfo name="DOI" value="10.17487/RFC9509"/>
        </reference>
        <reference anchor="Directive-2016_797" target="https://eur-lex.europa.eu/eli/dir/2016/797/2020-05-28">
          <front>
            <title>Directive 2016/797 - Interoperability of the rail system within the EU</title>
            <author>
              <organization>European Parliament, Council of the European Union</organization>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="ERJU" target="https://rail-research.europa.eu/wp-content/uploads/2023/10/ERJU_SP_CyberSecurity_Review3_Files.zip">
          <front>
            <title>SP-Cybersecurity-SharedCybersecurityServices - Review 3 Final Draft Specs (V0.90)</title>
            <author>
              <organization>Europe's Rail Joint Undertaking</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-CRA" target="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act">
          <front>
            <title>Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUCIL on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-STRATEGY" target="https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0">
          <front>
            <title>The EU's Cybersecurity Strategy for the Digital Decade</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="NIST_Glossary" target="https://csrc.nist.gov/glossary/term/safety">
          <front>
            <title>Directive (EU) 2022/2555 of the European Parliament and of the Council</title>
            <author>
              <organization>NIST CSRC</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ISO.IEC.IEEE_12207" target="https://www.iso.org/standard/63712.html">
          <front>
            <title>Systems and software engineering – Software life cycle processes</title>
            <author>
              <organization>ISO/IEC/IEEE</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="NIS2" target="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive">
          <front>
            <title>Directive (EU) 2022/2555 of the European Parliament and of the Council</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="IEC.62443-4-2" target="https://webstore.iec.ch/publication/34421">
          <front>
            <title>Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
          <seriesInfo name="IEC 62443-4-2:2019" value=""/>
        </reference>
        <reference anchor="IEC.62443-3-3" target="https://webstore.iec.ch/publication/7033">
          <front>
            <title>Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2013" month="August"/>
          </front>
          <seriesInfo name="IEC 62443-3-3:2013" value=""/>
        </reference>
        <reference anchor="CE-marking" target="https://single-market-economy.ec.europa.eu/single-market/ce-marking_en">
          <front>
            <title>CE marking</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 324?>

<section anchor="asn1">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and
<xref target="X.690"/>.</t>
      <sourcecode type="asn1"><![CDATA[
<CODE BEGINS>

Automation-EKU
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-automation-eku (TBD1) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- OID Arc

id-kp OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

-- Extended Key Usage Values

id-kp-configSigning            OBJECT IDENTIFIER ::= { id-kp 41 }
id-kp-trustAnchorConfigSigning OBJECT IDENTIFIER ::= { id-kp 42 }
id-kp-updatePackageSigning     OBJECT IDENTIFIER ::= { id-kp 43 }
id-kp-safetyCommunication      OBJECT IDENTIFIER ::= { id-kp 44 }

END


<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="history">
      <name>History of Changes</name>
      <t>[RFC Editor: Please remove this appendix in the release version of the document.]</t>
      <t>Changes from 05 -&gt; 06:</t>
      <ul spacing="normal">
        <li>
          <t>Addressed AD review comments from Mike Bishop, Gorry Fairhurst, Andy Newton, Mohamed Boucadair, Erik Kline, and Eric Vyncke</t>
        </li>
      </ul>
      <t>Changes from 04 -&gt; 05:</t>
      <ul spacing="normal">
        <li>
          <t>Addressed SECDIR review comments from Carl Wallace</t>
        </li>
      </ul>
      <t>Changes from 03 -&gt; 04:</t>
      <ul spacing="normal">
        <li>
          <t>Addressed Deb's AD review comments (see "AD Comments on draft-ietf-lamps-automation-keyusages")</t>
        </li>
        <li>
          <t>Added early allocated OIDs</t>
        </li>
      </ul>
      <t>Changes from 02 -&gt; 03:</t>
      <ul spacing="normal">
        <li>
          <t>Rename id-kp-trustanchorSigning to id-kp-trustAnchorConfigSigning</t>
        </li>
        <li>
          <t>Rename id-kp-updateSigning to id-kp-updatePackageSigning</t>
        </li>
        <li>
          <t>Fixed some nits</t>
        </li>
      </ul>
      <t>Changes from 01 -&gt; 02:</t>
      <ul spacing="normal">
        <li>
          <t>Updates Sections 3 and 6 addressing last call comments (see "WG Last Call for draft-ietf-lamps-automation-keyusages-01")</t>
        </li>
      </ul>
      <t>Changes from 01 -&gt; 02:</t>
      <ul spacing="normal">
        <li>
          <t>Implemented the changes requested during WGLC</t>
        </li>
      </ul>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed some minor nids and wording issues</t>
        </li>
      </ul>
      <t>draft-ietf-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Updated document and filename after WG adoption</t>
        </li>
      </ul>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Updated last paragraph of Section 1 addressing WG adoption comments by Rich and Russ</t>
        </li>
        <li>
          <t>Updated name and OID of ASN.1 module</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Broadened the scope to general automation use case and use ERJU as an example.</t>
        </li>
        <li>
          <t>Fixed some nits reported.</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-eu-rail-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Initial version of the document following best practices from RFC 9336 and RFC 9509</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Fazekas-Zisch" fullname="Szofia Fazekas-Zisch">
        <organization abbrev="Siemens">Siemens AG Digital Industries Factory Automation</organization>
        <address>
          <postal>
            <street>Breslauer Str. 5</street>
            <city>Fuerth</city>
            <code>90766</code>
            <country>Germany</country>
          </postal>
          <email>szofia.fazekas-zisch@siemens.com</email>
          <uri>https://www.siemens.com</uri>
        </address>
      </contact>
      <contact initials="B." surname="Fouques" fullname="Baptiste Fouques">
        <organization>Alstom</organization>
        <address>
          <email>baptiste.fouques@alstomgroup.com</email>
        </address>
      </contact>
      <contact initials="D. G." surname="Orta" fullname="Daniel Gutierrez Orta">
        <organization>CAF Signalling</organization>
        <address>
          <email>daniel.gutierrez@cafsignalling.com</email>
        </address>
      </contact>
      <contact initials="M." surname="Weller" fullname="Martin Weller">
        <organization>Hitachi Rail</organization>
        <address>
          <email>martin.weller@urbanandmainlines.com</email>
        </address>
      </contact>
      <contact initials="N." surname="Poyet" fullname="Nicolas Poyet">
        <organization>SNCF</organization>
        <address>
          <email>nicolas.poyet@sncf.fr</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
