<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-00" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2024" month="September" day="12"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 67?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFCs 5273 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 77?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -03:</t>

<t><list style="symbols">
  <t>Consider AuthEnvelopedData</t>
</list></t>

<t>-02 version changes:</t>

<t><list style="symbols">
  <t>Replaced TLS 1.0 with TLS 1.2</t>
</list></t>

<t>-01 version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Merged <xref target="erratum3593"/></t>
</list></t>

<t>-00 version changes:</t>

<t><list style="symbols">
  <t>Moved 2119-text to its own section</t>
  <t>Added "Changes Since 5273 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file.  The following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>



<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mandel-lamps-rfc5272bis-02"/>
   
</reference>

<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>

<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>


<reference anchor="CMC-TRANSv1">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="4" month="March" year="2024"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFCs 5273 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mandel-lamps-rfc5273bis-02"/>
   
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 317?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

