<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-rfc5273bis-01" category="std" consensus="true" submissionType="IETF" obsoletes="5273, 6402" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CMC: Transport Protocols">Certificate Management over CMS (CMC): Transport Protocols</title>

    <author initials="J." surname="Mandel, Ed" fullname="Joseph Mandel">
      <organization>AKAYLA, Inc.</organization>
      <address>
        <email>joe@akayla.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner, Ed" fullname="Sean Turner (editor)">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2024" month="September" day="29"/>

    <area>SEC</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Public Key Infrastructure</keyword> <keyword>Cryptographic Message Syntax</keyword> <keyword>Certificate Management</keyword> <keyword>Transport Protocols</keyword>

    <abstract>


<?line 68?>

<t>This document defines a number of transport mechanisms that are used
to move CMC (Certificate Management over CMS (Cryptographic Message
Syntax)) messages.  The transport mechanisms described in this
document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes RFCs 5273 and 6402.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5273bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG LAMPS mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/seanturner/cmcbis"/>.</t>
    </note>


  </front>

  <middle>


<?line 78?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a number of transport methods that are used to
move CMC messages (defined in <xref target="CMC-STRUCT"/>).  The transport
mechanisms described in this document are HTTP, file, mail, and TCP.</t>

<t>This document obsoletes <xref target="CMC-TRANSv1"/> and <xref target="CMC-Updates"/>. This
document also incorporates <xref target="erratum3593"/>.</t>

</section>
<section anchor="requirements-terminology"><name>Requirements Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="changes-since-5273-and-6402"><name>Changes Since 5273 and 6402</name>

<aside>  <t>Note: For now, this section will be list of the changes introduced
  by each version. After WGLC, this section will be finalized.</t>
</aside>

<t>TODO for -03:</t>

<t><list style="symbols">
  <t>Consider AuthEnvelopedData</t>
  <t>Added requirements to follow BCP 195</t>
</list></t>

<t>-02 version changes:</t>

<t><list style="symbols">
  <t>Replaced TLS 1.0 with TLS 1.2 or later</t>
</list></t>

<t>-01 version changes:</t>

<t><list style="symbols">
  <t>Changed RFC 5272 references to draft-mandel-lamps-rfc5272bis</t>
  <t>Merged <xref target="erratum3593"/></t>
</list></t>

<t>-00 version changes:</t>

<t><list style="symbols">
  <t>Moved 2119-text to its own section</t>
  <t>Added "Changes Since 5273 and 6402" section</t>
  <t>Updated references</t>
  <t>Merged <xref target="CMC-Updates"/> text</t>
  <t>Updated and moved Acknowledgments</t>
</list></t>

</section>
<section anchor="file-based-protocol"><name>File-Based Protocol</name>

<t>Enrollment messages and responses may be transferred between clients
and servers using file-system-based mechanisms, such as when
enrollment is performed for an off-line client.  When files are used
to transport binary, Full PKI Request or Full PKI Response messages,
there <bcp14>MUST</bcp14> be only one instance of a request or response message in a
single file.  The following file type extensions <bcp14>SHOULD</bcp14> be used:</t>

<texttable title="File PKI Request/Response Identification" anchor="file-id">
      <ttcol align='left'>Message Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <c>Simple PKI Request</c>
      <c>.p10</c>
      <c>Full PKI Request</c>
      <c>.crq</c>
      <c>Simple PKI Response</c>
      <c>.p7c</c>
      <c>Full PKI Response</c>
      <c>.crp</c>
</texttable>

</section>
<section anchor="mail-based-protocol"><name>Mail-Based Protocol</name>

<t>MIME wrapping is defined for those environments that are MIME native.
The basic mime wrapping in this section is taken from <xref target="SMIMEV4"/>.
When using a mail-based protocol, MIME wrapping between the layers of
CMS wrapping is optional.  Note that this is different from the
standard S/MIME (Secure MIME) message.</t>

<t>Simple enrollment requests are encoded using the "application/pkcs10"
content type.  A file name <bcp14>MUST</bcp14> be included either in a content-type
or a content-disposition statement.  The extension for the file <bcp14>MUST</bcp14>
be ".p10".</t>

<t>Simple enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  An smime-type parameter <bcp14>MUST</bcp14> be on the
content-type statement with a value of "certs-only".  A file name
with the ".p7c" extension <bcp14>MUST</bcp14> be specified as part of the content-
type or content-disposition statement.</t>

<t>Full enrollment request messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-request".  A file name with the ".p7m" extension
<bcp14>MUST</bcp14> be specified as part of the content-type or content-disposition
statement.</t>

<t>Full enrollment response messages <bcp14>MUST</bcp14> be encoded as content type
"application/pkcs7-mime".  The smime-type parameter <bcp14>MUST</bcp14> be included
with a value of "CMC-response".  A file name with the ".p7m"
extension <bcp14>MUST</bcp14> be specified as part of the content-type or content-
disposition statement.</t>

<texttable title="MIME PKI Request/Response Identification" anchor="mime-id">
      <ttcol align='left'>Item</ttcol>
      <ttcol align='left'>MIME Type</ttcol>
      <ttcol align='left'>File Extension</ttcol>
      <ttcol align='left'>SMIME Type</ttcol>
      <c>Simple PKI Request</c>
      <c>application/pkcs10</c>
      <c>.p10</c>
      <c>N/A</c>
      <c>Full PKI Request</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-request</c>
      <c>Simple PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7c</c>
      <c>certs-only</c>
      <c>Full PKI Response</c>
      <c>application/pkcs7-mime</c>
      <c>.p7m</c>
      <c>CMC-response</c>
</texttable>

</section>
<section anchor="httphttps-based-protocol"><name>HTTP/HTTPS-Based Protocol</name>

<t>This section describes the conventions for use of HTTP <xref target="HTTP"/> as a
transport layer.  In most circumstances, the use of HTTP over TLS
<xref target="HTTP"/> provides any necessary content protection from eavesdroppers.</t>

<t>In order for CMC clients and servers using HTTP to interoperate, the
following rules apply.</t>

<ul empty="true"><li>
  <t>Clients <bcp14>MUST</bcp14> use the POST method to submit their requests.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST</bcp14> use the 200 response code for successful responses.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients <bcp14>MAY</bcp14> attempt to send HTTP requests using TLS 1.2 <xref target="TLS"/> or
later, although servers are not required to support TLS. If
TLS 1.2 <xref target="TLS"/> (or later) is used then implementations <bcp14>MUST</bcp14> follow
the recommendations in <xref target="BCP195"/>.</t>
</li></ul>

<ul empty="true"><li>
  <t>Servers <bcp14>MUST NOT</bcp14> assume client support for any type of HTTP
authentication such as cookies, Basic authentication, or Digest
authentication.</t>
</li></ul>

<ul empty="true"><li>
  <t>Clients and servers are expected to follow the other rules and
restrictions in <xref target="HTTP"/>.  Note that some of those rules are for
HTTP methods other than POST; clearly, only the rules that apply
to POST are relevant for this specification.</t>
</li></ul>

<section anchor="pki-request"><name>PKI Request</name>

<t>A PKI Request using the POST method is constructed as follows:</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

<t>The body of the message is the binary value of the encoding of the
PKI Request.</t>

</section>
<section anchor="pki-response"><name>PKI Response</name>

<t>An HTTP-based PKI Response is composed of the appropriate HTTP
headers, followed by the binary value of the BER (Basic Encoding
Rules) encoding of either a Simple or Full PKI Response.</t>

<t>The Content-Type header <bcp14>MUST</bcp14> have the appropriate value from <xref target="mime-id"/>.</t>

</section>
</section>
<section anchor="tcp-based-protocol"><name>TCP-Based Protocol</name>

<t>When CMC messages are sent over a TCP-based connection, no wrapping
is required of the message.  Messages are sent in their binary
encoded form.</t>

<t>The client closes a connection after receiving a response, or it
issues another request to the server using the same connection.
Reusing one connection for multiple successive requests, instead of
opening multiple connections that are only used for a single request,
is <bcp14>RECOMMENDED</bcp14> for performance and resource conservation reasons.  A
server <bcp14>MAY</bcp14> close a connection after it has been idle for some period
of time; this timeout would typically be several minutes long.</t>

<t>CMC requires a registered port number to send and receive CMC
messages over TCP.  The title of this IP Protocol number is
"pkix-cmc".  The value of this TCP port is 5318.</t>

<t>Prior to <xref target="CMC-Updates"/>, CMC did not have a registered port number and
used an externally configured port from the Private Port range.
Client implementations <bcp14>MAY</bcp14> want to continue to allow for this to
occur.  Servers <bcp14>SHOULD</bcp14> change to use the new port.  It is expected
that HTTP will continue to be the primary transport method used by
CMC installations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned a TCP port number in the Registered Port Number
range for the use of CMC.</t>

<figure><artwork><![CDATA[
  Service name: pkix-cmc
  Port Number: 5318
  Transport protocol: TCP
  Description: PKIX Certificate Management using CMS (CMC)
  Reference: RFC 6402
  Assignee: iesg@ietf.org
  Contact: chair@ietf.org
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Mechanisms for thwarting replay attacks may be required in particular
implementations of this protocol depending on the operational
environment.  In cases where the Certification Authority (CA)
maintains significant state information, replay attacks may be
detectable without the inclusion of the optional nonce mechanisms.
Implementers of this protocol need to carefully consider
environmental conditions before choosing whether or not to implement
the senderNonce and recipientNonce attributes described in
<xref section="6.6" sectionFormat="of" target="CMC-STRUCT"/>.  Developers of state-constrained PKI clients are
strongly encouraged to incorporate the use of these attributes.</t>

<t>Initiation of a secure communications channel between an end-entity
and a CA or Registration Authority (RA) -- and, similarly, between an
RA and another RA or CA -- necessarily requires an out-of-band trust
initiation mechanism.  For example, a secure channel may be
constructed between the end-entity and the CA via IPsec <xref target="IPsec"/> or
TLS <xref target="TLS"/>.  Many such schemes exist, and the choice of any particular
scheme for trust initiation is outside the scope of this document.
Implementers of this protocol are strongly encouraged to consider
generally accepted principles of secure key management when
integrating this capability within an overall security architecture.</t>

<t>In some instances, no prior out-of-band trust will have been
initiated prior to use of this protocol.  This can occur when the
protocol itself is being used to download onto the system the set of
trust anchors to be used for these protocols.  In these instances,
the Enveloped Data content type (<xref section="3.2.1.3.3" sectionFormat="of" target="CMC-STRUCT"/>)
must be used to provide the same shrouding that TLS would have
provided.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="erratum3593" target="https://www.rfc-editor.org/errata/eid3593">
  <front>
    <title>RFC 5273 erratum 3593</title>
    <author >
      <organization></organization>
    </author>
    <date year="2013" month="April"/>
  </front>
</reference>


<reference anchor="BCP195">
  <front>
    <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
    <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
    <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
    <author fullname="T. Fossati" initials="T." surname="Fossati"/>
    <date month="November" year="2022"/>
    <abstract>
      <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
      <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="9325"/>
  <seriesInfo name="DOI" value="10.17487/RFC9325"/>
</reference>


<reference anchor="CMC-STRUCT">
   <front>
      <title>Certificate Management over CMS (CMC)</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="29" month="September" year="2024"/>
      <abstract>
	 <t>   This document defines the base syntax for CMC, a Certificate
   Management protocol using the Cryptographic Message Syntax (CMS).
   This protocol addresses two immediate needs within the Internet
   Public Key Infrastructure (PKI) community:

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5272bis-01"/>
   
</reference>

<reference anchor="HTTP">
  <front>
    <title>HTTP Semantics</title>
    <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
    <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
    <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
    <date month="June" year="2022"/>
    <abstract>
      <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
      <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="97"/>
  <seriesInfo name="RFC" value="9110"/>
  <seriesInfo name="DOI" value="10.17487/RFC9110"/>
</reference>

<reference anchor="IPsec">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="SMIMEV4">
  <front>
    <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8551"/>
  <seriesInfo name="DOI" value="10.17487/RFC8551"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="TLS">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2008"/>
    <abstract>
      <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5246"/>
  <seriesInfo name="DOI" value="10.17487/RFC5246"/>
</reference>


<reference anchor="CMC-TRANSv1">
   <front>
      <title>Certificate Management over CMS (CMC): Transport Protocols</title>
      <author fullname="Joe Mandel" initials="J." surname="Mandel">
         <organization>AKAYLA, Inc.</organization>
      </author>
      <author fullname="Sean Turner" initials="S." surname="Turner">
         <organization>sn3rd</organization>
      </author>
      <date day="12" month="September" year="2024"/>
      <abstract>
	 <t>   This document defines a number of transport mechanisms that are used
   to move CMC (Certificate Management over CMS (Cryptographic Message
   Syntax)) messages.  The transport mechanisms described in this
   document are HTTP, file, mail, and TCP.

   This document obsoletes RFCs 5273 and 6402.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc5273bis-00"/>
   
</reference>

<reference anchor="CMC-Updates">
  <front>
    <title>Certificate Management over CMS (CMC) Updates</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="November" year="2011"/>
    <abstract>
      <t>This document contains a set of updates to the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This document updates RFC 5272, RFC 5273, and RFC 5274.</t>
      <t>The new items in this document are: new controls for future work in doing server side key generation, definition of a Subject Information Access value to identify CMC servers, and the registration of a port number for TCP/IP for the CMC service to run on. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6402"/>
  <seriesInfo name="DOI" value="10.17487/RFC6402"/>
</reference>




    </references>


<?line 321?>

<section numbered="false" anchor="acknowledgements"><name>Acknowledgements</name>

<t>Obviously, the authors of this version of the document would like to
thank Jim Schaad and Michael Myers for their work on the previous
version of this document.</t>

<t>The acknowledgment from the previous version of this document follows:</t>

<t>The authors and the PKIX Working Group are grateful for the
participation of Xiaoyi Liu and Jeff Weinstein in helping to author
the original versions of this document.</t>

<t>The authors would like to thank Brian LaMacchia for his work in
developing and writing up many of the concepts presented in this
document.  The authors would also like to thank Alex Deacon and Barb
Fox for their contributions.</t>

</section>

    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="J." surname="Schaad" fullname="Jim Schaad">
      <organization>August Cellars</organization>
      <address>
      </address>
    </contact>
    <contact initials="M." surname="Myers" fullname="Michael Myers">
      <organization>TraceRoute Security, Inc.</organization>
      <address>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

