RFC 9810: Internet X.509 Public Key Infrastructure -- Certificate Management Protocol (CMP)
- H. Brockhaus,
- D. von Oheimb,
- M. Ounsworth,
- J. Gray
Abstract
This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides interactions between client systems and PKI components such as a Registration Authority (RA) and a Certification Authority (CA).¶
This document adds support for management of certificates containing a Key Encapsulation Mechanism (KEM) public key and uses EnvelopedData instead of EncryptedValue. This document also includes the updates specified in Section 2 and Appendix A.2 of RFC 9480.¶
This document obsoletes RFC 4210, and together with RFC 9811, it also obsoletes RFC 9480. Appendix F of this document updates Section 9 of RFC 5912.¶
Status of This Memo
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
https://
Copyright Notice
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://
1. Introduction
This document describes the Internet X.509 PKI CMP. Protocol messages are defined for certificate creation and management. The term "certificate" in this document refers to an X.509v3 certificate as defined in [RFC5280].¶
1.1. Changes Made by RFC 4210
[RFC4210] differs from [RFC2510] in the following areas:¶
1.2. Updates Made by RFC 9480
CMP Updates [RFC9480] and CMP Algorithms [RFC9481] updated [RFC4210], supporting the PKI management operations specified in the Lightweight CMP Profile [RFC9483], in the following areas:¶
1.3. Changes Made by This Document
This document obsoletes [RFC4210] and [RFC9480].¶
Backward compatibility with CMP version 2 is maintained
wherever possible. Updates to CMP version 2 improve crypto
agility, extend the polling mechanism, add new general message
types, and add EKUs to identify special CMP
server authorizations. CMP version 3 is introduced for changes to
the ASN.1 syntax, which support EnvelopedData, certConf with hashAlg,
POPOPrivKey with agreeMAC, and Root
The updates made in this document include the changes specified by Section 2 and Appendix A.2 of [RFC9480] as described in Section 1.2. Additionally, this document updates the content of [RFC4210] in the following areas:¶
2. Terminology and Abbreviations
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document relies on the terminology defined in [RFC5280]. The most important abbreviations are listed below:¶
- CA:
- Certification Authority¶
- CMP:
- Certificate Management Protocol¶
- CMS:
- Cryptographic Message Syntax¶
- CRL:
- Certificate Revocation List¶
- CRMF:
- Certificate Request Message Format¶
- KEM:
- Key Encapsulation Mechanism¶
- KGA:
- Key Generation Authority¶
- LRA:
- Local Registration Authority¶
- MAC:
- Message Authentication Code¶
- PKI:
- Public Key Infrastructure¶
- POP:
- Proof
-of -Possession ¶ - RA:
- Registration Authority¶
- TEE:
- Trusted Execution Environment¶
3. PKI Management Overview
The PKI must be structured to be consistent with the types of individuals who must administer it. Providing such administrators with unbounded choices not only complicates the software required but also increases the chances that a subtle mistake by an administrator or software developer will result in broader compromise. Similarly, restricting administrators with cumbersome mechanisms will cause them not to use the PKI.¶
Management protocols are REQUIRED to support online interactions
between PKI components. For example, a
management protocol might be used between a
CA and a client system with which a key pair is associated or
between two CAs that issue cross
3.1. PKI Management Model
Before specifying particular message formats and procedures, we first define the entities involved in PKI management and their interactions (in terms of the PKI management functions required). We then group these functions in order to accommodate different identifiable types of end entities.¶
3.1.1. Definitions of PKI Entities
The entities involved in PKI management include the end entity (i.e., the entity to whom the certificate is issued) and the CA (i.e., the entity that issues the certificate). An RA might also be involved in PKI management.¶
3.1.1.1. Subjects and End Entities
The term "subject" is used here to refer to the entity to whom the
certificate is issued, typically named in the subject or
subjectAltName field of a certificate. When we wish to distinguish
the tools and/or software used by the subject (e.g., a local
certificate management module), we will use the term "subject equipment".
In general, the term "end entity", rather than
"subject", is preferred in order to avoid confusion with the field
name. It is important to note that the end entities here will
include not only human users of applications but also applications
themselves (e.g., for Internet Key Exchange Protocol (IKE) / IPsec) or devices (e.g., routers or industrial
control systems). This factor influences the
protocols that the PKI management operations use; for example,
application software is far more likely to know exactly which
certificate extensions are required than are human users. PKI
management entities are also end entities in the sense that they are
sometimes named in the subject or subjectAltName field of a
certificate or cross
All end entities require secure local access to some information --
at a minimum, their own name and private key, the name of a CA that
is directly trusted by this entity, and that CA's public key (or a
fingerprint of the public key where a self-certified version is
available elsewhere). Implementations MAY use secure local storage
for more than this minimum (e.g., the end entity's own certificates or
application
Though TEE formats are beyond the scope of this document (they are very dependent on equipment, et cetera), a generic interchange format for TEEs is defined here: a certification response message (see Section 5.3.4) MAY be used.¶
3.1.1.2. Certification Authority
The CA may or may not actually be a real "third party" from the end entity's point of view. Quite often, the CA will actually belong to the same organization as the end entities it supports.¶
Again, we use the term "CA" to refer to the entity named in the issuer field of a certificate. When it is necessary to distinguish the software or hardware tools used by the CA, we use the term "CA equipment".¶
The CA equipment will often include both an "offline" component and an "online" component, with the CA private key only available to the "offline" component. This is, however, a matter for implementers (though it is also relevant as a policy issue).¶
We use the term "root CA" to indicate a CA that is directly trusted by an end entity; that is, securely acquiring the value of a root CA public key requires some out-of-band step(s). This term is not meant to imply that a root CA is necessarily at the top of any hierarchy, simply that the CA in question is trusted directly. The "root CA" may provide its trust anchor information with or without using a certificate. In some circumstances, such a certificate may be self-signed, but in other circumstances, it may be cross-signed, signed by a peer, signed by a superior CA, or unsigned.¶
Note that other documents like [X509.2019] and [RFC5280] use the term "trusted CA" or "trust anchor" instead of "root CA". This document continues using "root CA" based on the above definition because it is also present in the ASN.1 syntax that cannot be changed easily.¶
A "subordinate CA" is one that is not a root CA for the end entity in question. Often, a subordinate CA will not be a root CA for any entity, but this is not mandatory.¶
3.1.1.3. Registration Authority
In addition to end entities and CAs, many environments call for the existence of an RA separate from the CA. The functions that the RA may carry out will vary from case to case but MAY include identity checking, token distribution, checking certificate requests and authentication of their origin, revocation reporting, name assignment, archival of key pairs, et cetera.¶
This document views the RA as an OPTIONAL component: When it is not present, the CA is assumed to be able to carry out the RA's functions so that the PKI management protocols are the same from the end entity's point of view.¶
Again, we distinguish, where necessary, between the RA and the tools used (the "RA equipment").¶
Note that an RA is itself an end entity. We further assume that all RAs are in fact certified end entities and that RAs have private keys that are usable for signing. How a particular CA equipment identifies some end entities as RAs is an implementation issue (i.e., this document specifies no special RA certification operation). We do not mandate that the RA is certified by the CA with which it is interacting at the moment (so one RA may work with more than one CA whilst only being certified once).¶
In some circumstances, end entities will communicate directly with a CA even where an RA is present. For example, for initial registration and/or certification, the end entity may use its RA but communicate directly with the CA in order to refresh its certificate.¶
3.1.1.4. Key Generation Authority
A KGA is a PKI management entity generating key pairs on behalf of an end entity. As the KGA generates the key pair, it knows the public and the private part.¶
This document views the KGA as an OPTIONAL component. When it is not present and central key generation is needed, the CA is assumed to be able to carry out the KGA's functions so that the PKI management protocol messages are the same from the end entity's point of view. If certain tasks of a CA are delegated to other components, this delegation needs authorization, which can be indicated by EKUs (see Section 4.5).¶
Note: When doing central generation of key pairs, implementers should consider the implications of server-side retention on the overall security of the system; in some cases, retention is good, for example, for escrow reasons, but in other cases, the server should clear its copy after delivery to the end entity.¶
Note: If the CA delegates key generation to a KGA, the KGA can be collocated with the RA.¶
3.1.2. PKI Management Requirements
The protocols given here meet the following requirements on PKI management¶
3.1.3. PKI Management Operations
The following diagram shows the relationship between the entities defined above in terms of the PKI management operations. The letters in the diagram indicate "protocols" in the sense that a defined set of PKI management messages can be sent along each of the lettered lines.¶
At a high level, the set of operations for which management messages are defined can be grouped as follows.¶
Note that online protocols are not the only way of implementing the above operations. For all operations, there are offline methods of achieving the same result, and this specification does not mandate use of online protocols. For example, when hardware tokens are used, many of the operations MAY be achieved as part of the physical token delivery.¶
Later sections define a set of standard messages supporting the above operations. Transfer protocols for conveying these exchanges in various environments (e.g., offline: file-based; online: email, HTTP [RFC9811], MQTT, and CoAP [RFC9482]) are beyond the scope of this document and must be specified separately. Appropriate transfer protocols MUST be capable of delivering the CMP messages reliably.¶
CMP provides inbuilt integrity protection and authentication. The information
communicated unencrypted in CMP messages does not contain sensitive
information endangering the security of the PKI when intercepted. However,
it might be possible for an eavesdropper to utilize the available information to
gather confidential technical or business
4. Assumptions and Restrictions
4.1. End Entity Initialization
The first step for an end entity in dealing with PKI management entities is to request information about the PKI functions supported and to securely acquire a copy of the relevant root CA public key(s).¶
4.2. Initial Registration/Certification
There are many schemes that can be used to achieve initial registration and certification of end entities. No one method is suitable for all situations due to the range of policies that a CA may implement and the variation in the types of end entity that can occur.¶
However, we can classify the initial registration
Having classified the schemes that are supported by this specification, we can then specify some as mandatory and some as optional. The goal is that the mandatory schemes cover a sufficient number of the cases that will arise in real use, whilst the optional schemes are available for special cases that arise less frequently. In this way, we achieve a balance between flexibility and ease of implementation.¶
Further classification of mandatory and optional schemes addressing
different environments is available, e.g., in Appendices C and
D of this specification on managing human user certificates
as well as in the Lightweight CMP Profile [RFC9483] on fully
automating certificate management in a machine
We will now describe the classification of initial
registration
4.2.1. Criteria Used
4.2.1.1. Initiation of Registration/Certification
In terms of the PKI messages that are produced, we can regard the
initiation of the initial registration
The possible locations are at the end entity, an RA, or a CA.¶
4.2.1.2. End Entity Message Origin Authentication
The online messages produced by the end entity that requires a certificate may be authenticated or not. The requirement here is to authenticate the origin of any messages from the end entity to the PKI (CA/RA).¶
In this specification, such authentication is achieved by two different means:¶
Thus, we can classify the initial registration
- Note 1:
- We do not discuss the authentication of the 'PKI management entity -> end entity' messages here, as this is always REQUIRED. In any case, it can be achieved simply once the root-CA public key has been installed at the end entity's equipment or it can be based on the initial authentication key.¶
- Note 2:
- An initial registration
/certification procedure can be secure where the messages from the end entity are authenticated via some out-of-band means (e.g., a subsequent visit).¶
4.2.1.3. Location of Key Generation
In this specification, "key generation" is regarded as occurring
wherever either the public or private component of a key pair first
occurs in a PKIMessage. Note that this does not preclude a
centralized key generation service by a KGA; the actual key pair MAY have
been
generated elsewhere and transported to the end entity, RA, or CA
using a (proprietary or standardized) key generation request
Thus, there are three possibilities for the location of "key generation": the end entity, a KGA, or a CA.¶
4.2.1.4. Confirmation of Successful Certification
Following the creation of a certificate for an end entity, additional assurance can be gained by having the end entity explicitly confirm successful receipt of the message containing (or indicating the creation of) the certificate. Naturally, this confirmation message must be protected (based on the initial symmetric or asymmetric authentication key or other means).¶
This gives two further possibilities: confirmed or not.¶
4.2.2. Initial Registration/Certification Schemes
The criteria above allow for a large number of initial
registration
4.2.2.1. Centralized Scheme
In terms of the classification above, this scheme is, in some ways, the simplest possible, where:¶
In terms of message flow, this scheme means that the only message required is sent from the CA to the end entity. The message must contain the entire TEE for the end entity. Some out-of-band means must be provided to allow the end entity to authenticate the message received and to decrypt any encrypted values.¶
4.2.2.2. Basic Authenticated Scheme
In terms of the classification above, this scheme is where:¶
Note: An Initial Authentication Key (IAK) can be either a symmetric key or an asymmetric private key with a certificate issued by another PKI trusted for this purpose. The establishment of such trust is out of scope of this document.¶
In terms of message flow, the basic authenticated scheme is as follows:¶
Note: Where verification of the cert confirmation message fails, the RA/CA MUST revoke the newly issued certificate if it has been published or otherwise made available.¶
4.3. POP of Private Key
POP is where a PKI management entity (CA/RA) verifies if an end entity has access to the private key corresponding to a given public key. The question of whether, and in what circumstances, POPs add value to a PKI is a debate as old as PKI itself! See Section 8.1 for a further discussion on the necessity of POP in PKI.¶
The PKI management operations specified here make it possible for an end entity to prove to a CA/RA that it has possession of (i.e., is able to use) the private key corresponding to the public key for which a certificate is requested (see Section 5.2.8 for different POP methods). A given CA/RA is free to choose how to enforce POP (e.g., out-of-band procedural means versus PKIX-CMP in-band messages) in its certification exchanges (i.e., this may be a policy issue). However, it is REQUIRED that CAs/RAs MUST enforce POP by some means because there are currently many non-PKIX operational protocols in use (various electronic mail protocols are one example) that do not explicitly check the binding between the end entity and the private key. Until operational protocols that do verify the binding (for signature, encryption, key agreement, and KEM key pairs) exist, and are ubiquitous, this binding can only be assumed to have been verified by the CA/RA. Therefore, if the binding is not verified by the CA/RA, certificates in the Internet PKI end up being somewhat less meaningful.¶
POP is accomplished in different ways depending upon the type of key for which a certificate is requested. If a key can be used for multiple purposes (e.g., an RSA key), then any appropriate method MAY be used (e.g., a key that may be used for signing, as well as other purposes, MUST NOT be sent to the CA/RA in order to prove possession unless archival of the private key is explicitly desired).¶
This specification explicitly allows for cases where an end entity supplies the relevant proof to an RA and the RA subsequently attests to the CA that the required proof has been received (and validated!). For example, an end entity wishing to have a signing key certified could send the appropriate signature to the RA, which then simply notifies the relevant CA that the end entity has supplied the required proof. Of course, such a situation may be disallowed by some policies (e.g., CAs may be the only entities permitted to verify POP during certification).¶
4.3.1. Signature Keys
For signature keys, the end entity can sign a value to prove possession of the private key; see Section 5.2.8.2.¶
4.3.2. Encryption Keys
For encryption keys, the end entity can provide the private key to the CA/RA (e.g., for archiving), see Section 5.2.8.3.1, or can be required to decrypt a value in order to prove possession of the private key. Decrypting a value can be achieved either directly (see Section 5.2.8.3.3) or indirectly (see Section 5.2.8.3.2).¶
The direct method is for the RA/CA to issue a random challenge to which an immediate response by the end entity is required.¶
The indirect method is to issue a certificate that is encrypted for the end entity (and have the end entity demonstrate its ability to decrypt this certificate in the confirmation message). This allows a CA to issue a certificate in a form that can only be used by the intended end entity.¶
This specification encourages use of the indirect method because it requires no extra messages to be sent (i.e., the proof can be demonstrated using the {request, response, confirmation} triple of messages).¶
4.3.3. Key Agreement Keys
For key agreement keys, the end entity and the PKI management entity (i.e., CA or RA) must establish a shared secret key in order to prove that the end entity has possession of the private key.¶
Note that this need not impose any restrictions on the keys that can be certified by a given CA. In particular, for Diffie-Hellman (DH) keys, the end entity may freely choose its algorithm parameters provided that the CA can generate a short-term (or one-time) key pair with the appropriate parameters when necessary.¶
4.3.4. KEM Keys
For KEM keys, the end entity can provide the private key to the CA/RA (e.g., for archiving), see Section 5.2.8.3.1, or can be required to decrypt a value in order to prove possession of the private key. Decrypting a value can be achieved either directly (see Section 5.2.8.3.3) or indirectly (see Section 5.2.8.3.2).¶
Note: A definition of KEMs can be found in Section 1 of [RFC9629].¶
The direct method is for the RA/CA to issue a random challenge to which an immediate response by the end entity is required.¶
The indirect method is to issue a certificate that is encrypted for the end entity using a shared secret key derived from a key encapsulated using the public key (and have the end entity demonstrate its ability to use its private key for decapsulation of the KEM ciphertext, derive the shared secret key, decrypt this certificate, and provide a hash of the certificate in the confirmation message). This allows a CA to issue a certificate in a form that can only be used by the intended end entity.¶
This specification encourages use of the indirect method because it requires no extra messages to be sent (i.e., the proof can be demonstrated using the {request, response, confirmation} triple of messages).¶
A certification request message for a KEM certificate SHALL use POPOPrivKey by using the keyEncipherment choice of Proof
4.4. Root CA Key Update
This discussion only applies to CAs that are directly trusted by some end entities. Recognizing whether a self-signed or non-self-signed CA is supposed to be directly trusted for some end entities is a matter of CA policy and end entity configuration. Thus, this is beyond the scope of this document.¶
The basis of the procedure described here is that the CA protects its new public key using its previous private key and vice versa. Thus, when a CA updates its key pair, it may generate two link certificates: "old with new" and "new with old".¶
Note: The usage of link certificates has been shown to be very
specific for each use case, and no assumptions are done on this aspect.
Root
Note: When an LDAP directory is used to publish root CA updates, the old and new root CA certificates together with the two link certificates are stored as cACertificate attribute values.¶
When a CA changes its key pair, those entities who have acquired the old CA public key via "out-of-band" means are most affected. These end entities need to acquire the new CA public key in a trusted way. This may be achieved "out-of-band" by using a repository or by using online messages also containing the link certificates "new with old". Once the end entity acquired and properly verified the new CA public key, it must load the new trust anchor information into its trusted store.¶
The data structure used to protect the new and old CA public keys is typically a standard X.509v3 certificate (which may also contain extensions). There are no new data structures required.¶
Note: Sometimes self-signed root CA certificates do not make use of X.509v3 extensions and may be X.509v1 certificates. Therefore, a root CA key update must be able to work for version 1 certificates. The use of the X.509v3 KeyIdentifier extension is recommended for easier path building.¶
Note: While the scheme could be generalized to cover cases where the CA updates its key pair more than once during the validity period of one of its end entities' certificates, this generalization seems of dubious value. Not having this generalization simply means that the validity periods of certificates issued with the old CA key pair cannot exceed the end of the "old with new" certificate validity period.¶
Note: This scheme offers a mechanism to ensures that end entities will acquire the new CA public key, at the latest by the expiry of the last certificate they owned that was signed with the old CA private key. Certificate and/or key update operations occurring at other times do not necessarily require this (depending on the end entity's equipment).¶
Note: In practice, a new root CA may have a slightly different subject
Distinguished Name (DN), e.g., indicating a generation identifier like the year of issuance or
a version number, for instance, in an Organizational Unit (OU) element. How to bridge trust to
the new root CA certificate in a CA DN change or a cross
4.4.1. CA Operator Actions
To change the key of the CA, the CA operator does the following:¶
The old CA private key is then no longer required when the validity
of the "old with old" certificate ended. However, the old
CA public key will remain in use for validating the "new with old"
link certificate until the new CA public key is loaded into the
trusted store. The old CA public key is no longer required (other
than for non
The "new with new" certificate must have a validity period with a notBefore time that is before the notAfter time of the "old with old" certificate and a notAfter time that is after the notBefore time of the next update of this certificate.¶
The "new with old" certificate must have a validity period with the same notBefore time as the "new with new" certificate and a notAfter time by which all end entities of this CA will securely possess the new CA public key (at the latest, at the notAfter time of the "old with old" certificate).¶
The "old with new" certificate must have a validity period with the same notBefore and notAfter time as the "old with old" certificate.¶
Note: Further operational considerations on transition from one root CA self-signed certificate to the next is available in Section 5 of [RFC8649].¶
4.4.2. Verifying Certificates
Normally when verifying a signature, the verifier verifies (among other things) the certificate containing the public key of the signer. However, once a CA is allowed to update its key, there are a range of new possibilities. These are shown in the table below.¶
4.4.2.1. Verification in Cases 1 and 4
In these cases, the verifier has a local copy of the CA public key that can be used to verify the certificate directly. This is the same as the situation where no key change has occurred.¶
4.4.2.2. Verification in Case 2
In case 2, the verifier must get access to the new public key of the CA. Case 2 will arise when the CA operator has issued the verifier's certificate, then changed the CA's key, and then issued the signer's certificate; so it is quite a typical case.¶
The verifier does the following:¶
4.4.2.3. Verification in Case 3
In case 3, the verifier must get access to the old public key of the CA. Case 3 will arise when the CA operator has issued the signer's certificate, then changed the key, and then issued the verifier's certificate.¶
The verifier does the following:¶
4.4.3. Revocation - Change of the CA Key
As we saw above, the verification of a certificate becomes more complex once the CA is allowed to change its key. This is also true for revocation checks, as the CA may have signed the CRL using a newer private key than the one within the user's TEE.¶
The analysis of the alternatives is the same as for certificate verification.¶
4.5. EKU for PKI Entities
The EKU extension indicates the purposes for which the certified key pair may be used. Therefore, it restricts the use of a certificate to specific applications.¶
A CA may want to delegate parts of its duties to other PKI management entities. This section provides a mechanism to both prove this delegation and enable automated means for checking the authorization of this delegation. Such delegation may also be expressed by other means, e.g., explicit configuration.¶
To offer automatic validation for the delegation of a role by a CA to another entity, the certificates used for CMP message protection or signed data for central key generation MUST be issued by the delegating CA and MUST contain the respective EKUs. This proves that the delegating CA authorized this entity to act in the given role, as described below.¶
The OIDs to be used for these EKUs are:¶
Note: Section 2.10 of [RFC6402] specifies OIDs for a Certificate Management over CMS (CMC) CA and a CMC RA. As the functionality of a CA and RA is not specific to any protocol used for managing certificates (such as CMC or CMP), these EKUs are reused by CMP.¶
The meaning of the id-kp-cmKGA EKU is as follows:¶
- CMP KGA:
-
CMP KGAs are CAs or are identified by the id-kp-cmKGA EKU. The CMP KGA knows the private key it generated on behalf of the end entity. This is a very sensitive service and needs specific authorization, which by default is with the CA certificate itself. The CA may delegate its authorization by placing the id-kp-cmKGA EKU in the certificate used to authenticate the origin of the generated private key. The authorization may also be determined through local configuration of the end entity.¶
5. Data Structures
This section contains descriptions of the data structures required for PKI management messages. Section 6 describes constraints on their values and the sequence of events for each of the various PKI management operations.¶
5.1. Overall PKI Message
All of the messages used in this specification for the purposes of PKI management use the following structure:¶
The PKIHeader contains information that is common to many PKI messages.¶
The PKIBody contains message
The PKIProtection, when used, contains bits that protect the PKI message.¶
The extraCerts field can contain certificates that may be useful to the recipient. For example, this can be used by a CA or RA to present an end entity with certificates that it needs to verify its own new certificate (for example, if the CA that issued the end entity's certificate is not a root CA for the end entity). Note that this field does not necessarily contain a certification path; the recipient may have to sort, select from, or otherwise process the extra certificates in order to use them.¶
5.1.1. PKI Message Header
All PKI messages require some header information for addressing and
transaction identification. Some of this information will also be
present in a transport
The following data structure is used to contain this information:¶
The usage of the protocol version number (pvno) is described in Section 7.¶
The sender field contains the name of the sender of the PKIMessage. This name (in conjunction with senderKID, if supplied) should be sufficient to indicate the key to use to verify the protection on the message. If nothing about the sender is known to the sending entity (e.g., in the initial request message, where the end entity may not know its own DN, email name, IP address, etc.), then the "sender" field MUST contain a "NULL-DN" value in the directoryName choice. A "NULL-DN" is a SEQUENCE OF relative DNs of zero length and is encoded as 0x3000. In such a case, the senderKID field MUST hold an identifier (i.e., a reference number) that indicates to the receiver the appropriate shared secret information to use to verify the message.¶
The recipient field contains the name of the recipient of the PKIMessage. This name (in conjunction with recipKID, if supplied) should be usable to verify the protection on the message.¶
The protectionAlg field specifies the algorithm used to protect the message. If no protection bits are supplied (note that PKIProtection is OPTIONAL), then this field MUST be omitted; if protection bits are supplied, then this field MUST be supplied.¶
senderKID and recipKID are usable to indicate which keys have been used to protect the message (recipKID will normally only be required where protection of the message uses DH or Elliptic Curve Diffie-Hellman (ECDH) keys). These fields MUST be used if required to uniquely identify a key (e.g., if more than one key is associated with a given sender name). The senderKID SHOULD be used in any case.¶
Note: The recommendation of using senderKID has changed since [RFC4210], where it was recommended to be omitted if not needed to identify the protection key.¶
The transactionID field within the message header is to be used to
allow the recipient of a message to correlate this with an ongoing
transaction. This is needed for all transactions that consist of
more than just a single request
For transactions that consist of more than just a single
request
The senderNonce and recipNonce fields protect the PKIMessage against replay attacks. The senderNonce will typically be 128 bits of (pseudo-)random data generated by the sender, whereas the recipNonce is copied from the senderNonce field of the previous message in the transaction.¶
The messageTime field contains the time at which the sender created the message. This may be useful to allow end entities to correct/check their local time for consistency with the time on a central system.¶
The freeText field may be used to send a human-readable message to the recipient (in any number of languages). Each UTF8String MAY include a language tag [RFC5646] to indicate the language of the contained text. The first language used in this sequence indicates the desired language for replies.¶
The generalInfo field may be used to send machine
5.1.1.1. ImplicitConfirm
This is used by the end entity to inform the CA or RA that it does not wish to send a certificate confirmation for issued certificates.¶
If the CA grants the request to the end entity, it MUST put the same extension in the PKIHeader of the response. If the end entity does not find the extension in the response, it MUST send the certificate confirmation.¶
5.1.1.2. ConfirmWaitTime
This is used by the CA or RA to inform the end entity how long it intends to wait for the certificate confirmation before revoking the certificate and deleting the transaction.¶
5.1.1.3. OrigPKIMessage
An RA MAY include the original PKIMessage from the end entity in the generalInfo field of the PKIHeader of a PKIMessage. This is used by the RA to inform the CA of the original PKIMessage that it received from the end entity and modified in some way (e.g., added or modified particular field values or added new extensions) before forwarding the new PKIMessage. This accommodates, for example, cases in which the CA wishes to check the message origin, the POP, or other information on the original end entity message.¶
Note: If the changes made by the RA to the original PKIMessage break the POP of a certificate request, the RA can set the popo field of the new PKIMessage to raVerified (see Section 5.2.8.4).¶
Unless the OrigPKIMessage infoValue is in the header of a nested message, it MUST contain exactly one PKIMessage. The contents of OrigPKIMessage infoValue in the header of a nested message MAY contain multiple PKIMessage structures, which MUST be in the same order as the PKIMessage structures in PKIBody.¶
5.1.1.4. CertProfile
This is used by the end entity to indicate specific certificate profiles, e.g., when requesting a new certificate or a certificate request template (see Section 5.3.19.16).¶
When used in a p10cr message, the Cert
The certificate profile names in the Cert
5.1.1.5. KemCiphertextInfo
A PKI entity MAY provide the KEM ciphertext for MAC-based message protection using KEM (see Section 5.1.3.4) in the generalInfo field of a request message to a PKI management entity if it knows that the PKI management entity uses a KEM key pair and has its public key.¶
For more details of KEM-based message protection, see Section 5.1.3.4. See Section 5.3.19.18 for the definition of {id-it 24}.¶
5.1.2. PKI Message Body
The specific types are described in Section 5.3 below.¶
5.1.3. PKI Message Protection
Some PKI messages will be protected for integrity.¶
Note: If an asymmetric algorithm is used to protect a message and the relevant public component has been certified already, then the origin of the message can also be authenticated. On the other hand, if the public component is uncertified, then the message origin cannot be automatically authenticated but may be authenticated via out-of-band means.¶
When protection is applied, the following structure is used:¶
The input to the calculation of PKIProtection is the DER encoding of the following data structure:¶
There MAY be cases in which the PKIProtection BIT STRING is
deliberately not used to protect a message (i.e., this OPTIONAL field
is omitted) because other protection, external to PKIX, will be
applied instead. Such a choice is explicitly allowed in this
specification. Examples of such external protection include CMS [RFC5652] and Security Multiparts [RFC1847] encapsulation of the
PKIMessage (or simply the PKIBody (omitting the CHOICE tag), if the
relevant PKIHeader information is securely carried in the external
mechanism). It is noted, however, that many such external mechanisms
require that the end entity already possesses a public-key
certificate, a unique DN, and/or other such
infrastructure
Depending on the circumstances, the PKIProtection bits may contain a MAC or signature. Only the following cases can occur:¶
5.1.3.1. Shared Secret Information
In this case, the sender and recipient share secret information with sufficient entropy (established via out-of-band means). PKIProtection will contain a MAC value, and the protectionAlg MAY be one of the options described in Section 6.1 of CMP Algorithms [RFC9481].¶
The algorithm identifier id
The following text gives a method of key expansion to be used when the MAC algorithm requires an input length that is larger than the size of the one-way function (OWF).¶
Note: Section 4.4 of [RFC4211] and [RFC9045] do not mention this key expansion method or give an example using HMAC algorithms where key expansion is not needed. It is recognized that this omission in [RFC4211] can lead to confusion and possible incompatibility if key expansion [RFC4210] is not used when needed. Therefore, when key expansion is required (when K > H), the key expansion defined in the following text MUST be used.¶
In the above protectionAlg, the salt value is appended to the shared secret input. The OWF is then applied iterationCount times, where the salted secret is the input to the first iteration and, for each successive iteration, the input is set to be the output of the previous iteration. The output of the final iteration (called "BASEKEY" for ease of reference, with a size of "H") is what is used to form the symmetric key. If the MAC algorithm requires a K-bit key and K <= H, then the most significant K bits of BASEKEY are used. If K > H, then all of BASEKEY is used for the most significant H bits of the key, OWF("1" || BASEKEY) is used for the next most significant H bits of the key, OWF("2" || BASEKEY) is used for the next most significant H bits of the key, and so on, until all K bits have been derived. [Here "N" is the ASCII byte encoding the number N and "||" represents concatenation.]¶
Note: It is RECOMMENDED that the fields of PBMParameter remain
constant throughout the messages of a single transaction (e.g.,
ir
5.1.3.2. DH Key Pairs
Where the sender and receiver possess finite-field or elliptic
In the above protectionAlg, OWF is applied to the result of the DH computation. The OWF output (called "BASEKEY" for ease of reference, with a size of "H") is what is used to form the symmetric key. If the MAC algorithm requires a K-bit key and K <= H, then the most significant K bits of BASEKEY are used. If K > H, then all of BASEKEY is used for the most significant H bits of the key, OWF("1" || BASEKEY) is used for the next most significant H bits of the key, OWF("2" || BASEKEY) is used for the next most significant H bits of the key, and so on, until all K bits have been derived. [Here "N" is the ASCII byte encoding the number N and "||" represents concatenation.]¶
Note: Hash algorithms that can be used as OWFs are listed in Section 2 of CMP Algorithms [RFC9481].¶
5.1.3.3. Signature
In this case, the sender possesses a signature key pair and simply
signs the PKI message. PKIProtection will contain the signature
value and the protectionAlg will be an Algorithm
5.1.3.4. Key Encapsulation
In case the sender of a message has a KEM key pair, it can be used to establish a shared secret key for MAC-based message protection. This can be used for message authentication.¶
This approach uses the definition of KEM algorithm functions in Section 1 of [RFC9629] as follows:¶
A KEM algorithm provides three functions:¶
To support a particular KEM algorithm, the PKI entity that possesses a KEM key pair and wishes to use it for MAC-based message protection MUST support the KEM Decapsulate() function. The PKI entity that wishes to verify the MAC-based message protection MUST support the KEM Encapsulate() function. The respective public KEM key is usually carried in a certificate [ML-KEM].¶
Note: Both PKI entities send and receive messages in a PKI management operation. Both PKI entities may independently wish to protect messages using their KEM key pairs. For ease of explanation, we use the terms "Alice" to denote the PKI entity possessing the KEM key pair and who wishes to provide MAC-based message protection and "Bob" to denote the PKI entity having Alice's authentic public KEM key and who needs to verify the MAC-based protection provided by Alice.¶
Assuming Bob has Alice's KEM public key, he generates the ciphertext using KEM encapsulation and transfers it to Alice in an Info
Note: The OID for id-KemBasedMac was assigned on the private-use arc { iso(1) member-body(2) us(840) nortelnetworks
kdf is the algorithm identifier of the chosen KDF, and any associated parameters, used to derive the shared secret key.¶
kemContext MAY be used to transfer additional algorithm
len is the output length of the KDF and MUST be the desired size of the key to be used for MAC-based message protection.¶
mac is the algorithm identifier of the chosen MAC algorithm, and any associated parameters, used to calculate the MAC value.¶
The KDF and MAC algorithms MAY be chosen from the options in CMP Algorithms [RFC9481].¶
The Info
Note: This Info
In the following, a generic message flow for MAC-based protection using KEM is specified in more detail. It is assumed that Bob possesses Alice's public KEM key. Alice can be the initiator of a PKI management operation or the responder. For more detailed figures, see Appendix E.¶
Generic Message Flow:¶
This shared secret key (ssk) can be reused by Alice for MAC-based protection of further messages sent to Bob within the current PKI management operation.¶
This approach employs the notation of KDF(IKM, L, info) as described in Section 5 of [RFC9629] with the following changes:¶
There are various ways that Alice can request and Bob can provide the KEM ciphertext (see Appendix E for details). The Kem
If both the initiator and responder in a PKI management operation have KEM key pairs, this procedure can be applied by both entities independently, establishing and using different shared secret keys for either direction.¶
5.1.3.5. Multiple Protection
When receiving a protected PKI message, a PKI management entity, such as an RA, MAY forward that message adding its own protection. Additionally, multiple PKI messages MAY be aggregated. There are several use cases for such messages.¶
These use cases are accomplished by nesting the messages within a new PKI message. The structure used is as follows:¶
In case an RA needs to modify a request message, it MAY include the original PKIMessage in the generalInfo field of the modified message, as described in Section 5.1.1.3.¶
5.2. Common Data Structures
Before specifying the specific types that may be placed in a PKIBody, we define some data structures that are used in more than one case.¶
5.2.1. Requested Certificate Contents
Various PKI management messages require that the originator of the
message indicate some of the fields that are required to be present
in a certificate. The CertTemplate structure allows entities requesting a certificate
to specify the data fields that they want to be included.
Typically, they are required to provide at least the publicKey field.
A CertTemplate structure is identical to a TBSCertificate structure (see [RFC5280])
but with all fields optional
Note: Even if the originator completely specifies the contents of a certificate it requires, a CA is free to modify fields within the certificate actually issued. If the modified certificate is unacceptable to the requester, the requester MUST send back a certConf message that either does not include this certificate (via a CertHash) or does include this certificate (via a CertHash) along with a status of "rejected". See Section 5.3.18 for the definition and use of CertHash and the certConf message.¶
Note: Before requesting a new certificate, an end entity can request a certTemplate structure as a kind of certificate request blueprint in order to learn which data the CA expects to be present in the certificate request (see Section 5.3.19.16).¶
See CRMF [RFC4211] for CertTemplate syntax.¶
If certTemplate is an empty SEQUENCE (i.e., all fields omitted), then the
controls field in the CertRequest structure MAY contain the id
Also see [RFC4212] for more details on how to manage certificates in alternative formats using CRMF [RFC4211] syntax.¶
5.2.2. Encrypted Values
When encrypted data like a private key, certificate, POP challenge, or revocation passphrase is sent in PKI messages, it is RECOMMENDED to use the EnvelopedData structure. In some cases, this is accomplished by using the EncryptedKey data structure instead of EncryptedValue.¶
See Certificate Request Message Format (CRMF) [RFC4211] for EncryptedKey and EncryptedValue syntax and Cryptographic Message Syntax (CMS) [RFC5652] for EnvelopedData syntax. Using the EncryptedKey data structure offers the choice to either use EncryptedValue (for backward compatibility only) or EnvelopedData. The use of the EncryptedValue structure has been deprecated in favor of the EnvelopedData structure. Therefore, it is RECOMMENDED to use EnvelopedData.¶
Note: The EncryptedKey structure defined in CRMF [RFC4211] is used here, which makes the update backward compatible. Using the new syntax
with the untagged default choice EncryptedValue is bits
To indicate support for EnvelopedData, the pvno cmp2021 has been introduced. Details on the usage of the protocol version number are described in Section 7.¶
The EnvelopedData structure is RECOMMENDED to be used in CMP to transport a private key, certificate, POP challenge, or revocation passphrase in encrypted form as follows:¶
The content of the EnvelopedData structure, as specified in Section 6 of [RFC5652],
MUST be encrypted using a newly generated symmetric content
The choice of the key management technique to be used by the sender depends on the credential available at the recipient:¶
Note: There are cases where the algorithm identifier, the type of the public key, and the key usage extension will not be sufficient to decide on the key management technique to use, e.g., when rsaEncryption is the algorithm identifier. In such cases, it is a matter of local policy to decide.¶
5.2.3. Status Codes and Failure Information for PKI Messages
All response messages will include some status information. The following values are defined.¶
Responders may use the following syntax to provide more information about failure cases.¶
5.2.4. Certificate Identification
In order to identify particular certificates, the CertId data structure is used.¶
5.2.5. Out-of-Band Root CA Public Key
Each root CA that provides a self-signed certificate must be able to publish its current public key via some "out-of-band" means or together with the respective link certificate using an online mechanism. While such mechanisms are beyond the scope of this document, we define data structures that can support such mechanisms.¶
There are generally two methods available: Either the CA directly publishes its self-signed certificate, or this information is available via the directory (or equivalent) and the CA publishes a hash of this value to allow verification of its integrity before use.¶
Note: As an alternative to out-of-band distribution of root CA public keys, the CA can provide the self-signed certificate together with link certificates, e.g., using Root
The fields within this certificate are restricted as follows:¶
The intention of the hash value is that anyone who has securely received the hash value (via the out-of-band means) can verify a self-signed certificate for that CA.¶
5.2.6. Archive Options
Requesters may indicate that they wish the PKI to archive a private
key value using the PKIArchive
5.2.7. Publication Information
Requesters may indicate that they wish the PKI to publish a
certificate using the PKIPublication
5.2.8. POP Structures
The POP structure used is indicated in the popo field
of type Proof
5.2.8.1. raVerified
An end entity MUST NOT use raVerified. If an RA performs changes to a certification request breaking the provided POP, or if the RA requests a certificate on behalf of an end entity and cannot provide the POP itself, the RA MUST use raVerified. Otherwise, it SHOULD NOT use raVerified.¶
When introducing raVerified, the RA MUST check the existing POP, or it MUST ensure by other means that the end entity is the holder of the private key. The RA MAY provide the original message containing the POP in the generalInfo field using the id
5.2.8.2. POPOSigningKey Structure
If the certification request is for a key pair that supports signing (i.e., a request for a verification certificate), then the POP of the private key is demonstrated through use of the POPOSigningKey structure; for details, see Section 4.1 of [RFC4211].¶
Note: For the purposes of this specification, the ASN.1 comment given in Appendix C of [RFC4211] pertains not only to certTemplate but also to the altCertTemplate control, as defined in Section 5.2.1.¶
If certTemplate (or the altCertTemplate control) contains the subject and publicKey values, then poposkInput MUST be omitted and the signature MUST be computed on the DER-encoded value of the certReq field of the CertReqMsg (or the DER-encoded value of Alt
In the special case that the CA/RA has a DH certificate that is known to the end entity and the certification request is for a key agreement key pair, the end entity can also use the POPOSigningKey structure (where the algorithm
5.2.8.3. POPOPrivKey Structure
If the certification request is for a key pair that does not support signing (i.e., a request for an encryption or key agreement certificate), then the POP of the private key is demonstrated through use of the POPOPrivKey structure in one of the following three ways; for details see Sections 4.2 and 4.3 in [RFC4211].¶
When using agreeMAC or encryptedKey choices, the pvno cmp2021(3) MUST be used. Details on the usage of the protocol version number are described in Section 7.¶
5.2.8.3.1. Inclusion of the Private Key
This method mentioned previously in Section 4.3 demonstrates POP of the private key by including the encrypted private key in the CertRequest in the POPOPrivKey structure or in the PKIArchive
For a certification request message indicating cmp2021(3) in the pvno field of the PKIHeader, the encrypted private key MUST be transferred in the encryptedKey choice of POPOPrivKey (or within the PKIArchive
Note: The thisMessage choice has been deprecated in favor of encryptedKey. When using cmp2000(2) in the certification request message header for backward compatibility, the thisMessage choice of POPOPrivKey is used containing the encrypted private key in an EncryptedValue structure wrapped in a BIT STRING. This allows the necessary conveyance and protection of the private key while maintaining bits
5.2.8.3.2. Indirect Method - Encrypted Certificate
The indirect method mentioned previously in Section 4.3 demonstrates POP of the private key by having the CA return the requested certificate in encrypted form (see Section 5.2.2). This method is indicated in the CertRequest by requesting the encrCert option in the subsequent
The end entity proves knowledge of the private key to the CA by providing the correct CertHash for this certificate in the certConf message. This demonstrates POP because the end entity can only compute the correct CertHash if it is able to recover the encrypted certificate, and it can only recover the certificate if it is able to obtain the symmetric key using the required private key. Clearly, for this to work, the CA MUST NOT publish the certificate until the certConf message arrives (when certHash is to be used to demonstrate POP). See Section 5.3.18 for further details, and see Section 8.11 for security considerations regarding use of CT logs.¶
The recipient SHOULD maintain a context of the PKI management operation, e.g., using transactionID and certReqId, to identify the private key to use when decrypting the EnvelopedData containing the newly issued certificate. The recipient may be unable to use the RecipientInfo structure as it refers to the certificate that is still encrypted. The sender MUST populate the rid field as specified by CMS, and the client MAY ignore it.¶
5.2.8.3.3. Direct Method - Challenge-Response Protocol
The direct method mentioned previously in Section 4.3 demonstrates POP of the private key by having the end entity engage in a challenge
Note: This method would typically be used in an environment in which an RA verifies POP and then makes a certification request to the CA on behalf of the end entity. In such a scenario, the CA trusts the RA to have done POP correctly before the RA requests a certificate for the end entity.¶
The complete protocol then looks as follows (note that req' does not necessarily encapsulate req as a nested message):¶
This protocol is obviously much longer than the exchange given in Section 5.2.8.3.2 above but allows a Local Registration Authority (LRA) to be involved and has the property that the certificate itself is not actually created until the POP is complete. In some environments, a different order of the above messages may be required, such as the following (this may be determined by policy):¶
The challenge
More details on the fields in this syntax are available in Appendix F.¶
For a popdecc message indicating cmp2021(3) in the pvno field of the PKIHeader, the encryption of Rand MUST be transferred in the encryptedRand field in a CMS EnvelopedData structure as defined in Section 5.2.2. The challenge field MUST contain an empty OCTET STRING.¶
The recipient SHOULD maintain a context of the PKI management operation, e.g., using transactionID and certReqId, to identify the private key to use when decrypting encryptedRand. The sender MUST populate the rid field in the EnvelopedData sequence using the issuer
Note: The challenge field has been deprecated in favor of encryptedRand. When using cmp2000(2) in the popdecc message header for backward compatibility, the challenge field MUST contain the encryption (involving the public key for which the certification request is being made) of Rand and encryptedRand MUST be omitted. Using challenge (omitting the optional encryptedRand field) is bit-compatible with [RFC4210]. Note that the size of Rand, when used with challenge, needs to be appropriate for encryption, involving the public key of the requester. If, in some environment, names are so long that they cannot fit (e.g., very long DNs), then whatever portion will fit should be used (as long as it includes at least the common name, and as long as the receiver is able to deal meaningfully with the abbreviation).¶
On receiving the popdecc message, the end entity decrypts all included challenges and responds with a popdecr message containing the decrypted integer values in the same order.¶
5.2.8.4. Summary of POP Options
The text in this section provides several options with respect to POP techniques. Using "SK" for "signing key", "EK" for "encryption key", "KAK" for "key agreement key", and "KEMK" for "key encapsulation mechanism key", the techniques may be summarized as follows:¶
Given this array of options, it is natural to ask how an end entity can know what is supported by the CA/RA (i.e., which options it may use when requesting certificates). The following guidelines should clarify this situation for end entity implementers.¶
5.2.9. GeneralizedTime
GeneralizedTime is a standard ASN.1 type and SHALL be used as specified in Section 4.1.2.5.2 of [RFC5280].¶
5.3. Operation-Specific Data Structures
5.3.1. Initialization Request
An Initialization request message contains as the PKIBody a
CertReqMessages data structure, which specifies the requested
certificate(s). Typically, Subject
See Section 5.2.1 and [RFC4211] for CertReqMessages syntax.¶
5.3.2. Initialization Response
An Initialization response message contains as the PKIBody a CertRepMessage data structure, which has for each certificate requested a PKIStatusInfo field, a subject certificate, and possibly a private key (normally encrypted using EnvelopedData; see Section 4.1.6 of [RFC9483] for further information).¶
See Section 5.3.4 for CertRepMessage syntax. Note that if the PKI message protection is "shared secret information" (see Section 5.1.3.1), then any certificate transported in the caPubs field may be directly trusted as a root CA certificate by the initiator.¶
5.3.3. Certification Request
A Certification request message contains as the PKIBody a CertReqMessages data structure, which specifies the requested certificates (see the profiles defined in Section 4.1.2 of [RFC9483] and Appendix C.2 for further information). This message is intended to be used for existing PKI entities who wish to obtain additional certificates.¶
See Section 5.2.1 and [RFC4211] for CertReqMessages syntax.¶
Alternatively, the PKIBody MAY be a Certification
5.3.4. Certification Response
A Certification response message contains as the PKIBody a CertRepMessage data structure, which has a status value for each certificate requested and optionally has a CA public key, failure information, a subject certificate, and an encrypted private key.¶
A p10cr message contains exactly one Certification
Only one of the failInfo (in PKIStatusInfo) and certificate (in
Certified
Given an EncryptedCert and the relevant decryption key, the certificate may be obtained. The purpose of this is to allow a CA to return the value of a certificate but with the constraint that only the intended recipient can obtain the actual certificate. The benefit of this approach is that a CA may reply with a certificate even in the absence of proof that the requester is the end entity that can use the relevant private key (note that the proof is not obtained until the certConf message is received by the CA). Thus, the CA will not have to revoke that certificate in the event that something goes wrong with the POP (but MAY do so anyway, depending upon policy).¶
The use of EncryptedKey is described in Section 5.2.2.¶
Note: To indicate support for EnvelopedData, the pvno cmp2021 has been introduced. Details on the usage of different protocol version numbers are described in Section 7.¶
5.3.5. Key Update Request Content
For key update requests, the CertReqMessages syntax is used.
Typically, Subject
See Section 5.2.1 and [RFC4211] for CertReqMessages syntax.¶
5.3.6. Key Update Response Content
For key update responses, the CertRepMessage syntax is used. The response is identical to the initialization response.¶
See Section 5.3.4 for CertRepMessage syntax.¶
5.3.7. Key Recovery Request Content
For key recovery requests, the syntax used is identical to the
initialization request Cert
See Section 5.2.1 and [RFC4211] for CertReqMessages syntax. Note that if a key history is required, the requester must supply a protocol encryption key control in the request message.¶
5.3.8. Key Recovery Response Content
For key recovery responses, the following syntax is used. For some status values (e.g., waiting), none of the optional fields will be present.¶
5.3.9. Revocation Request Content
When requesting revocation of a certificate (or several certificates), the following data structure is used (see the profiles defined in Section 4.2 of [RFC9483] for further information). The name of the requester is present in the PKIHeader structure.¶
5.3.10. Revocation Response Content
The revocation response is the response to the above message. If produced, this is sent to the requester of the revocation. (A separate revocation announcement message MAY be sent to the subject of the certificate for which revocation was requested.)¶
5.3.11. Cross-Certification Request Content
Cross
See Section 5.2.1 and [RFC4211] for CertReqMessages syntax.¶
5.3.12. Cross-Certification Response Content
Cross
See Section 5.3.4 for CertRepMessage syntax.¶
5.3.13. CA Key Update Announcement Content
When a CA updates its own key pair, the following data structure MAY be used to announce this event.¶
When using Root
In contrast to CAKey
5.3.14. Certificate Announcement
This structure MAY be used to announce the existence of certificates.¶
Note that this message is intended to be used for those cases (if any) where there is no pre-existing method for publication of certificates; it is not intended to be used where, for example, X.500 is the method for publication of certificates.¶
5.3.15. Revocation Announcement
When a CA has revoked, or is about to revoke, a particular certificate, it MAY issue an announcement of this (possibly upcoming) event.¶
A CA MAY use such an announcement to warn (or notify) a subject that its certificate is about to be (or has been) revoked. This would typically be used where the request for revocation did not come from the subject concerned.¶
The willBeRevokedAt field contains the time at which a new entry will be added to the relevant CRLs.¶
5.3.16. CRL Announcement
When a CA issues a new CRL (or set of CRLs), the following data structure MAY be used to announce this event.¶
5.3.17. PKI Confirmation Content
This data structure is used in the protocol exchange as the final PKIMessage. Its content is the same in all cases -- actually, there is no content since the PKIHeader carries all the required information.¶
Use of this message for certificate confirmation is NOT RECOMMENDED; certConf SHOULD be used instead. Upon receiving a pkiconf for a certificate response, the recipient MAY treat it as a certConf with all certificates being accepted.¶
5.3.18. Certificate Confirmation Content
This data structure is used by the client to send a confirmation to the CA/RA to accept or reject certificates.¶
The hashAlg field SHOULD be used only in exceptional cases where the signature
For any particular CertStatus, omission of the statusInfo field indicates acceptance of the specified certificate. Alternatively, explicit status details (with respect to acceptance or rejection) MAY be provided in the statusInfo field, perhaps for auditing purposes at the CA/RA.¶
Within Cert
5.3.19. PKI General Message Content
5.3.19.1. CA Protocol Encryption Certificate
This MAY be used by the end entity to get a certificate from the CA to use to protect sensitive information during the protocol.¶
End entities MUST ensure that the correct certificate is used for this purpose.¶
5.3.19.2. Signing Key Pair Types
This MAY be used by the end entity to get the list of signature algorithms whose subject public key values the CA is willing to certify.¶
Note: For the purposes of this exchange, rsaEncryption and sha256With
Note: In case several elliptic curves are supported, several id-ecPublicKey elements as defined in [RFC5480] need to be given, one per named curve.¶
5.3.19.3. Encryption / Key Agreement Key Pair Types
This MAY be used by the client to get the list of encryption / key agreement algorithms whose subject public key values the CA is willing to certify.¶
Note: In case several elliptic curves are supported, several id-ecPublicKey elements as defined in [RFC5480] need to be given, one per named curve.¶
5.3.19.4. Preferred Symmetric Algorithm
This MAY be used by the client to get the CA-preferred symmetric encryption algorithm for any confidential information that needs to be exchanged between the end entity and the CA (for example, if the end entity wants to send its private decryption key to the CA for archival purposes).¶
5.3.19.5. Updated CA Key Pair
This MAY be used by the CA to announce a CA key update event.¶
See Section 5.3.13 for details of CA key update announcements.¶
5.3.19.7. Unsupported Object Identifiers
This is used by the server to return a list of object identifiers that it does not recognize or support from the list submitted by the client.¶
5.3.19.8. Key Pair Parameters
This MAY be used by the end entity to request the domain parameters to use for generating the key pair for certain public-key algorithms. It can be used, for example, to request the appropriate P, Q, and G to generate the DH/DSA key or to request a set of well-known elliptic curves.¶
An absent infoValue in the GenRep indicates that the algorithm specified in GenMsg is not supported.¶
End entities MUST ensure that the parameters are acceptable to it and that the GenRep message is authenticated (to avoid substitution attacks).¶
5.3.19.9. Revocation Passphrase
This MAY be used by the end entity to send a passphrase to a CA/RA for the purpose of authenticating a later revocation request (in the case that the appropriate signing private key is no longer available to authenticate the request). See Appendix B for further details on the use of this mechanism.¶
The use of EncryptedKey is described in Section 5.2.2.¶
5.3.19.10. ImplicitConfirm
See Section 5.1.1.1 for the definition and use of {id-it 13}.¶
5.3.19.11. ConfirmWaitTime
See Section 5.1.1.2 for the definition and use of {id-it 14}.¶
5.3.19.12. Original PKIMessage
See Section 5.1.1.3 for the definition and use of {id-it 15}.¶
5.3.19.13. Supported Language Tags
This MAY be used to determine the appropriate language tag [RFC5646] to use in subsequent messages. The sender sends its list of supported languages (in order of most to least preferred); the receiver returns the one it wishes to use. (Note: Each UTF8String MUST include a language tag.) If none of the offered tags are supported, an error MUST be returned.¶
5.3.19.14. CA Certificates
This MAY be used by the client to get CA certificates.¶
5.3.19.15. Root CA Update
This MAY be used by the client to get an update of a root CA certificate,
which is provided in the body of the request message. In contrast to the
ckuann message, this approach follows the request
The end entity SHOULD reference its current trust anchor in RootCaCertValue in the request body, giving the root CA certificate if available.¶
Note: In contrast to CAKey
5.3.19.16. Certificate Request Template
This MAY be used by the client to get a template containing requirements
for certificate request attributes and extensions. The controls id
The id
Note: The client may specify a profile name in the certProfile field (see Section 5.1.1.4).¶
The id
The Cert
Note: The controls for an ASN.1 type are defined in Section 6 of CRMF [RFC4211].¶
5.3.19.17. CRL Update Retrieval
This MAY be used by the client to get new CRLs, specifying the source of
the CRLs and the thisUpdate value of the latest CRL it already has, if available.
A CRL source is given either by a Distribution
5.3.19.18. KEM Ciphertext
This MAY be used by a PKI entity to get the KEM ciphertext for MAC-based message protection using KEM (see Section 5.1.3.4).¶
The PKI entity that possesses a KEM key pair can request the ciphertext by sending an Info
kem is the algorithm identifier of the KEM algorithm, and any associated parameters, used to generate the ciphertext (ct).¶
ct is the ciphertext output from the KEM Encapsulate function.¶
Note: These Info
5.3.20. PKI General Response Content
Examples of GenReps that MAY be supported include those listed in the subsections of Section 5.3.19.¶
5.3.21. Error Message Content
This data structure MAY be used by an end entity, CA, or RA to convey error information and by a PKI management entity to initiate delayed delivery of responses.¶
This message MAY be generated at any time during a PKI transaction. If the client sends this request, the server MUST respond with a pkiconf response or another error message if any part of the header is not valid.¶
In case a PKI management entity sends an error message to the end entity with the pKIStatusInfo field containing the status "waiting", the end entity SHOULD initiate polling as described in Section 5.3.22. If the end entity does not initiate polling, both sides MUST treat this message as the end of the transaction (if a transaction is in progress).¶
If protection is desired on the message, the client MUST protect it using the same technique (i.e., signature or MAC) as the starting message of the transaction. The CA MUST always sign it with a signature key.¶
5.3.22. Polling Request and Response
This pair of messages is intended to handle scenarios in which the client needs to poll the server to determine the status of an outstanding response (i.e., when the "waiting" PKIStatus has been received).¶
Unless implicit confirmation has been requested and granted, in response to an ir, cr, p10cr, kur, krr, or ccr request message, polling is initiated with an ip, cp, kup, krp, or ccp response message containing status "waiting". For any type of request message, polling can be initiated with an error response message with status "waiting". The following clauses describe how polling messages are used. It is assumed that multiple certConf messages can be sent during transactions. There will be one sent in response to each ip, cp, kup, krp, or ccp that contains a CertStatus for an issued certificate.¶
The following client-side state machine describes polling for individual CertResponse elements at the example of an ir request message.¶
In the following exchange, the end entity is enrolling for two certificates in one request.¶
The following client-side state machine describes polling for a complete response message.¶
In the following exchange, the end entity is sending a general message request, and the response is delayed by the server.¶
6. Mandatory PKI Management Functions
Some of the PKI management functions outlined in Section 3.1 are described in this section.¶
This section deals with functions that are "mandatory" in the sense that all end entity and CA/RA implementations MUST be able to provide the functionality described. This part is effectively the profile of the PKI management functionality that MUST be supported. Note, however, that the management functions described in this section do not need to be accomplished using the PKI messages defined in Section 5 if alternate means are suitable for a given environment. See Section 7 of [RFC9483] and Appendix C for profiles of the PKIMessage structures that MUST be supported for specific use cases.¶
6.1. Root CA Initialization
[See Section 3.1.1.2 for this document's definition of "root CA".]¶
If a newly created root CA is at the top of a PKI hierarchy, it usually
produces a "self
In order to make the CA's self
The data structure used to carry the fingerprint may be the OOBCertHash (see Section 5.2.5).¶
6.2. Root CA Key Update
CA keys (as all other keys) have a finite lifetime and will have to be updated on a periodic basis. The certificates NewWithNew, NewWithOld, and OldWithNew (see Section 4.4.1) MAY be issued by the CA to aid existing end entities who hold the current root CA certificate (OldWithOld) to transition securely to the new root CA certificate (NewWithNew) and to aid new end entities who will hold NewWithNew to acquire OldWithOld securely for verification of existing data.¶
6.3. Subordinate CA Initialization
[See Section 3.1.1.2 for this document's definition of "subordinate CA".]¶
From the perspective of PKI management protocols, the initialization of a subordinate CA is the same as the initialization of an end entity. The only difference is that the subordinate CA must also produce an initial revocation list.¶
6.4. CRL Production
Before issuing any certificates, a newly established CA (which issues CRLs) must produce "empty" versions of each CRL, which are to be periodically produced.¶
6.5. PKI Information Request
When a PKI entity (CA, RA, or end entity) wishes to acquire information about the current status of a CA, it MAY send that CA a request for such information.¶
The CA MUST respond to the request by providing (at least) all of the information requested by the requester. If some of the information cannot be provided, then an error must be conveyed to the requester.¶
If PKIMessages are used to request and supply this PKI information, then the request MUST be the GenMsg message, the response MUST be the GenRep message, and the error MUST be the Error message. These messages are protected using a MAC based on shared secret information (e.g., password-based MAC; see Section 6.1 of "CMP Algorithms" [RFC9481]) or using any asymmetric authentication means such as a signature (if the end entity has an existing certificate).¶
6.6. Cross-Certification
The requester CA is the CA that will become the subject of the
cross
The requester CA must be "up and running" before initiating the
cross
6.6.1. One-Way Request-Response Scheme
The cross
This scheme is suitable where the two CAs in question can already verify each other's signatures (they have some common points of trust) or where there is an out-of-band verification of the origin of the certification request.¶
Detailed Description:¶
Cross
The authorization code is used for authentication and integrity purposes. This is done by generating a symmetric key based on the authorization code and using the symmetric key for generating MACs on all messages exchanged. (Authentication may alternatively be done using signatures instead of MACs, if the CAs are able to retrieve and validate the required public keys by some means, such as an out-of-band hash comparison.)¶
The requester CA initiates the exchange by generating a cross
Upon receipt of the ccr message, the responder CA validates the
message and the MAC, saves the requester random number, and generates
its own random number (responder random number). It then generates
(and archives, if desired) a new requester certificate that contains
the requester CA public key and is signed with the responder CA
signature private key. The responder CA responds with the cross
Upon receipt of the ccp message, the requester CA validates the message (including the received random numbers) and the MAC. The requester CA responds with the certConf message. The fields in this message are protected from modification with a MAC based on the authorization code. The requester CA MAY write the requester certificate to the Repository as an aid to later certificate path construction.¶
Upon receipt of the certConf message, the responder CA validates the message and the MAC and sends back an acknowledgement using the pkiconf message. It MAY also publish the requester certificate as an aid to later path construction.¶
Notes:¶
(A simpler, non-interactive model of cross
6.7. End Entity Initialization
As with CAs, end entities must be initialized. Initialization of end entities requires at least two steps:¶
(Other possible steps include the retrieval of trust condition information and/or out-of-band verification of other CA public keys.)¶
6.7.1. Acquisition of PKI Information
The information REQUIRED is:¶
Additional information could be required (e.g., supported extensions or CA policy information) in order to produce a certification request that will be successful. However, for simplicity, we do not mandate that the end entity acquires this information via the PKI messages. The end result is simply that some certification requests may fail (e.g., if the end entity wants to generate its own encryption key, but the CA doesn't allow that).¶
The required information MAY be acquired as described in Section 6.5.¶
6.7.2. Out-of-Band Verification of the Root CA Key
An end entity must securely possess the public key of its root CA.
One method to achieve this is to provide the end entity with the CA's
self
See Section 6.1 for further details.¶
6.8. Certificate Request
An initialized end entity MAY request an additional certificate at any time (for any purpose). This request will be made using the certification request (cr) message. If the end entity already possesses a signing key pair (with a corresponding verification certificate), then this cr message will typically be protected by the entity's digital signature. The CA returns the new certificate (if the request is successful) in a CertRepMessage.¶
6.9. Key Update
When a key pair is due to expire, the relevant end entity MAY request a key update; that is, it MAY request that the CA issue a new certificate for a new key pair (or, in certain circumstances, a new certificate for the same key pair). The request is made using a key update request (kur) message (referred to, in some environments, as a "Certificate Update" operation). If the end entity already possesses a signing key pair (with a corresponding verification certificate), then this message will typically be protected by the entity's digital signature. The CA returns the new certificate (if the request is successful) in a key update response (kup) message, which is syntactically identical to a CertRepMessage.¶
7. Version Negotiation
This section defines the version negotiation used to support older protocols between clients and servers.¶
If a client knows the protocol version(s) supported by the server (e.g., from a previous PKIMessage exchange or via some out-of-band means), then it MUST send a PKIMessage with the highest version supported by both it and the server. If a client does not know what version(s) the server supports, then it MUST send a PKIMessage using the highest version it supports with the following exception: Version cmp2021 SHOULD only be used if cmp2021 syntax is needed for the request being sent or for the expected response.¶
Note: Using cmp2000 as the default pvno value is done to avoid extra
message exchanges for version negotiation and to foster compatibility
with cmp2000 implementations
If a server receives a message with a version that it supports, then
the version of the response message MUST be the same as the received
version. If a server receives a message with a version higher or
lower than it supports, then it MUST send back an ErrorMsg with the
unsupported
If a client gets back an ErrorMsgContent with the unsupported
7.1. Supporting RFC 2510 Implementations
[RFC2510] did not specify the behavior of implementations receiving versions they did not understand since there was only one version in existence. With the introduction of the revision in [RFC4210], the following versioning behavior is recommended.¶
7.1.1. Clients Talking to RFC 2510 Servers
If, after sending a message with a pvno value higher than cmp1999, a client receives an ErrorMsgContent with a version of cmp1999, then it MUST abort the current transaction.¶
If a client receives a non-error PKIMessage with a version of cmp1999, then it MAY decide to continue the transaction (if the transaction hasn't finished) using the semantics described in [RFC2510]. If it does not choose to do so and the transaction is not finished, then it MUST abort the transaction and send an ErrorMsgContent with a version of cmp1999.¶
7.1.2. Servers Receiving Version cmp1999 PKIMessages
If a server receives a version cmp1999 message, it MAY revert to the behavior described in [RFC2510] and respond with version cmp1999 messages. If it does not choose to do so, then it MUST send back an ErrorMsgContent as described above in Section 7.¶
8. Security Considerations
8.1. On the Necessity of POP
It is well established that the role of a CA is to
verify that the name and public key belong to the end entity prior to
issuing a certificate. If an entity holding a private key obtains a certificate containing the corresponding public key issued for a different entity, it can authenticate as the entity named in the certificate. This facilitates masquerading. It is not entirely clear what security guarantees are lost if an end entity is able to obtain a certificate containing a public key that they do not possess the corresponding private key for. There are some scenarios,
described as "forwarding attacks" in Appendix A of [Gueneysu], in
which this can lead to protocol attacks against a naively implemented
sign
8.2. POP with a Decryption Key
Some cryptographic considerations are worth explicitly spelling out.
In the protocols specified above, when an end entity is required to
prove possession of a decryption key, it is effectively challenged to
decrypt something (its own certificate). This scheme (and many
others!) could be vulnerable to an attack if the possessor of the
decryption key in question could be fooled into decrypting an
arbitrary challenge and returning the cleartext to an attacker.
Although in this specification a number of other failures in security
are required in order for this attack to succeed, it is conceivable
that some future services (e.g., notary, trusted time) could
potentially be vulnerable to such attacks. For this reason, we
reiterate the general rule that implementations should be very careful
about decrypting arbitrary "ciphertext" and revealing recovered
"plaintext" since such a practice can lead to serious security
vulnerabilities
The client MUST return the decrypted values only if they match the expected content type. In an indirect method, the decrypted value MUST be a valid certificate, and in a direct method, the decrypted value MUST be a Rand as defined in Section 5.2.8.3.3.¶
8.3. POP by Exposing the Private Key
Note also that exposing a private key to the CA/RA as a POP technique can carry some security risks (depending upon whether or not the CA/RA can be trusted to handle such material appropriately). Implementers are advised to:¶
8.4. Attack Against DH Key Exchange
A small subgroup attack during a DH key exchange may be carried out as follows. A malicious end entity may deliberately choose DH parameters that enable it to derive (a significant number of bits of) the DH private key of the CA during a key archival or key recovery operation. Armed with this knowledge, the end entity would then be able to retrieve the decryption private key of another unsuspecting end entity, EE2, during EE2's legitimate key archival or key recovery operation with that CA. In order to avoid the possibility of such an attack, two courses of action are available. (1) The CA may generate a fresh DH key pair to be used as a protocol encryption key pair for each end entity with which it interacts. (2) The CA may enter into a key validation protocol (not specified in this document) with each requesting end entity to ensure that the end entity's protocol encryption key pair will not facilitate this attack. Option (1) is clearly simpler (requiring no extra protocol exchanges from either party) and is therefore RECOMMENDED.¶
8.5. Perfect Forward Secrecy
Long-term security typically requires perfect forward secrecy (pfs). When transferring encrypted long-term confidential values such as centrally generated private keys or revocation passphrases, pfs is likely important. Yet, it is not needed for CMP message protection providing integrity and authenticity because transfer of PKI messages is usually completed in very limited time. For the same reason, it is not typically required for the indirect method to provide a POP (Section 5.2.8.3.2) delivering the newly issued certificate in encrypted form.¶
Encrypted values (Section 5.2.2) are transferred using CMS EnvelopedData [RFC5652], which does not offer pfs. In cases where long-term security is needed, CMP messages SHOULD be transferred over a mechanism that provides pfs, such as TLS with appropriate cipher suites selected.¶
8.6. Private Keys for Certificate Signing and CMP Message Protection
A CA should not reuse its certificate signing key for other purposes, such as protecting CMP responses and TLS connections. This way, exposure to other parts of the system and the number of uses of this particularly critical key are reduced to a minimum.¶
8.7. Entropy of Random Numbers, Key Pairs, and Shared Secret Information
Implementations must generate nonces and private keys from random input.
The use of inadequate pseudorandom number generators (PRNGs) to generate
cryptographic keys can result in little or no security. An attacker may find
it much easier to reproduce the PRNG environment that produced the keys and
to search the resulting small set of possibilities than brute-force searching the whole key space. As an example of predictable random numbers, see [CVE-2008-0166]; consequences of low-entropy random numbers are discussed in Mining Your Ps and Qs [MiningPsQs]. The generation of quality random numbers is difficult. ISO/IEC 20543:2019 [ISO.20543-2019], NIST SP 800-90A Rev.1 [NIST
If shared secret information is generated by a cryptographical
If the entropy of shared secret information protecting the delivery of a centrally generated key pair is known, it should not be less than the security strength of that key pair; if the shared secret information is reused for different key pairs, the security of the shared secret information should exceed the security strength of each individual key pair.¶
For the case of a PKI management operation that delivers a new trust anchor (e.g., a root CA certificate), using caPubs or genp that is (a) not concluded in a timely manner or (b) where the shared secret information is reused for several key management operations, the entropy of the shared secret information, if known, should not be less than the security strength of the trust anchor being managed by the operation. The shared secret information should have an entropy that at least matches the security strength of the key material being managed by the operation. Certain use cases may require shared secret information that may be of a low security strength, e.g., a human-generated password. It is RECOMMENDED that such secret information be limited to a single PKI management operation.¶
Importantly for this section, further information about algorithm use profiles and their security strength is available in Section 7 of CMP Algorithms [RFC9481].¶
8.8. Recurring Usage of KEM Keys for Message Protection
For each PKI management operation using MAC-based message protection involving KEM (see Section 5.1.3.4), the KEM Encapsulate() function, providing a fresh KEM ciphertext (ct) and shared secret (ss), MUST be invoked.¶
It is assumed that the overall data size of the CMP messages in a PKI management operation protected by a single shared secret key is small enough not to introduce extra security risks.¶
To be appropriate for use with this specification, the KEM algorithm
MUST explicitly be designed to be secure when the public key is used
many times. For example, a KEM algorithm with a single-use public
key is not appropriate because the public key is expected to be
carried in a long-lived certificate [RFC5280] and used over and over.
Thus, KEM algorithms that offer indistinguishab
Therefore, given a long-term public key using an IND-CCA2-secure KEM algorithm, there is no limit to the number of CMP messages that can be authenticated using KEM keys for MAC-based message protection.¶
8.9. Trust Anchor Provisioning Using CMP Messages
A provider of trust anchors, which may be an RA involved in configuration management of its clients, MUST NOT include to-be-trusted CA certificates in a CMP message unless the specific deployment scenario can ensure that it is adequate that the receiving end entity trusts these certificates, e.g., by loading them into its trust store.¶
Whenever an end entity receives in a CMP message a CA certificate to be used as a trust anchor (for example, in the caPubs field of a certificate response or in a general response), it MUST properly authenticate the message sender with existing trust anchors without requiring new trust anchor information included in the message.¶
Additionally, the end entity MUST verify that the sender is an authorized source of trust anchors. This authorization is governed by local policy and typically indicated using shared secret information or with a signature-based message protection using a certificate issued by a PKI that is explicitly authorized for this purpose.¶
8.10. Authorizing Requests for Certificates with Specific EKUs
When a CA issues a certificate containing EKU extensions as defined in Section 4.5, this expresses delegation of an authorization that originally is only with the CA certificate itself. Such delegation is a very sensitive action in a PKI, and therefore, special care must be taken when approving such certificate requests to ensure that only legitimate entities receive a certificate containing such an EKU.¶
8.11. Usage of CT Logs
CAs that support indirect POP MUST NOT also publish final certificates to CT logs [RFC9162] before having received the certConf message containing the certHash of that certificate to complete the POP. The risk is that a malicious actor could fetch the final certificate from the CT log and use that to spoof a response to the implicit POP challenge via a certConf response. This risk does not apply to CT precertificates
If a certificate or its precertificate was published in a CT log, it must be revoked if a required certConf message could not be verified, especially when the implicit POP was used.¶
9. IANA Considerations
This document updates the ASN.1 modules in Appendix A.2 of CMP Updates [RFC9480]. The OID 116
IANA has added the following entry in the "SMI Security for PKIX CMP Information Types" registry within the SMI Numbers registry group (see <https://
Note that the new OID 1
All existing references to [RFC2510], [RFC4210], and [RFC9480] at <https://
10. References
10.1. Normative References
- [MvOV97]
-
Menezes, A., van Oorschot, P., and S. Vanstone, "Handbook of Applied Cryptography", CRC Press ISBN 0-8493-8523-7, , <https://
cacr >..uwaterloo .ca /hac / - [RFC2119]
-
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10
.17487 , , <https:///RFC2119 www >..rfc -editor .org /info /rfc2119 - [RFC2985]
-
Nystrom, M. and B. Kaliski, "PKCS #9: Selected Object Classes and Attribute Types Version 2.0", RFC 2985, DOI 10
.17487 , , <https:///RFC2985 www >..rfc -editor .org /info /rfc2985 - [RFC2986]
-
Nystrom, M. and B. Kaliski, "PKCS #10: Certification Request Syntax Specification Version 1.7", RFC 2986, DOI 10
.17487 , , <https:///RFC2986 www >..rfc -editor .org /info /rfc2986 - [RFC3629]
-
Yergeau, F., "UTF-8, a transformation format of ISO 10646", STD 63, RFC 3629, DOI 10
.17487 , , <https:///RFC3629 www >..rfc -editor .org /info /rfc3629 - [RFC4211]
-
Schaad, J., "Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)", RFC 4211, DOI 10
.17487 , , <https:///RFC4211 www >..rfc -editor .org /info /rfc4211 - [RFC5280]
-
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 5280, DOI 10
.17487 , , <https:///RFC5280 www >..rfc -editor .org /info /rfc5280 - [RFC5480]
-
Turner, S., Brown, D., Yiu, K., Housley, R., and T. Polk, "Elliptic Curve Cryptography Subject Public Key Information", RFC 5480, DOI 10
.17487 , , <https:///RFC5480 www >..rfc -editor .org /info /rfc5480 - [RFC5646]
-
Phillips, A., Ed. and M. Davis, Ed., "Tags for Identifying Languages", BCP 47, RFC 5646, DOI 10
.17487 , , <https:///RFC5646 www >..rfc -editor .org /info /rfc5646 - [RFC5652]
-
Housley, R., "Cryptographic Message Syntax (CMS)", STD 70, RFC 5652, DOI 10
.17487 , , <https:///RFC5652 www >..rfc -editor .org /info /rfc5652 - [RFC5958]
-
Turner, S., "Asymmetric Key Packages", RFC 5958, DOI 10
.17487 , , <https:///RFC5958 www >..rfc -editor .org /info /rfc5958 - [RFC6402]
-
Schaad, J., "Certificate Management over CMS (CMC) Updates", RFC 6402, DOI 10
.17487 , , <https:///RFC6402 www >..rfc -editor .org /info /rfc6402 - [RFC8174]
-
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10
.17487 , , <https:///RFC8174 www >..rfc -editor .org /info /rfc8174 - [RFC8933]
-
Housley, R., "Update to the Cryptographic Message Syntax (CMS) for Algorithm Identifier Protection", RFC 8933, DOI 10
.17487 , , <https:///RFC8933 www >..rfc -editor .org /info /rfc8933 - [RFC9045]
-
Housley, R., "Algorithm Requirements Update to the Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)", RFC 9045, DOI 10
.17487 , , <https:///RFC9045 www >..rfc -editor .org /info /rfc9045 - [RFC9481]
-
Brockhaus, H., Aschauer, H., Ounsworth, M., and J. Gray, "Certificate Management Protocol (CMP) Algorithms", RFC 9481, DOI 10
.17487 , , <https:///RFC9481 www >..rfc -editor .org /info /rfc9481 - [RFC9629]
-
Housley, R., Gray, J., and T. Okubo, "Using Key Encapsulation Mechanism (KEM) Algorithms in the Cryptographic Message Syntax (CMS)", RFC 9629, DOI 10
.17487 , , <https:///RFC9629 www >..rfc -editor .org /info /rfc9629
10.2. Informative References
- [AIS31]
-
Killmann, W. and W. Schindler, "A proposal for: Functionality classes for random number generators - Version 2.0", Federal Office for Information Security (BSI), , <https://
www >..bsi .bund .de /Shared Docs /Downloads /DE /BSI /Zertifizierung /Interpretatione n /AIS _31 _Functionality _classes _for _random _number _generators _e .pdf - [CVE-2008-0166]
-
National Institute of Science and Technology (NIST), "National Vulnerability Database - CVE-2008-0166", , <https://
nvd >..nist .gov /vuln /detail /CVE -2008 -0166 - [ETSI
-3GPP .33 .310] -
3GPP, "Network Domain Security (NDS); Authentication Framework (AF)", 3GPP TS 33.310 16.6.0, , <http://
www >..3gpp .org /ftp /Specs /html -info /33310 .htm - [Fujisaki]
-
Fujisaki, E. and T. Okamoto, "Secure Integration of Asymmetric and Symmetric Encryption Schemes", Journal of Cryptology, vol. 26, no. 1, pp. 80-101, DOI 10
.1007 , , <https:///s00145 -011 -9114 -1 doi >..org /10 .1007 /s00145 -011 -9114 -1 - [Gueneysu]
-
Gueneysu, T., Hodges, P., Land, G., Ounsworth, M., Stebila, D., and G. Zaverucha, "Proof
-of , Cryptology ePrint Archive, Paper 2022/703, , <https://-possession for KEM certificates using verifiable generation" eprint >..iacr .org /2022 /703 - [Hofheinz]
-
Hofheinz, D., Hövelmanns, K., and E. Kiltz, "A Modular Analysis of the Fujisaki
-Okamoto , Theory of Cryptography (TCC 2017), Lecture Notes in Computer Science, vol. 10677, pp. 341-371, DOI 10Transformation" .1007 , , <https:///978 -3 -319 -70500 -2 _12 doi >..org /10 .1007 /978 -3 -319 -70500 -2 _12 - [IEEE
.802 .1AR -2018] -
IEEE, "IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity", IEEE Std 802.1AR-2018, DOI 10
.1109 , , <https:///ieeestd .2018 .8423794 doi >..org /10 .1109 /ieeestd .2018 .8423794 - [ISO.20543-2019]
-
ISO/IEC, "Information technology -- Security techniques -- Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408", ISO/IEC 20543:2019, , <https://
www >..iso .org /standard /68296 .html - [MiningPsQs]
-
Heninger, N., Durumeric, Z., Wustrow, E., and J. A. Halderman, "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices", 21st USENIX Security Symposium (USENIX Security 12), , <https://
www >..usenix .org /conference /usenixsecurity1 2 /technical -sessions /presentation /heninger - [ML-KEM]
-
Turner, S., Kampanakis, P., Massimo, J., and B. Westerbaan, "Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module
-Lattice , Work in Progress, Internet-Draft, draft-Based Key -Encapsulation Mechanism (ML-KEM)" -ietf , , <https://-lamps -kyber -certificates -11 datatracker >..ietf .org /doc /html /draft -ietf -lamps -kyber -certificates -11 - [NIST
.SP .800 _90Ar1] -
Barker, E. B. and J. M. Kelsey, "Recommendation for Random Number Generation Using Deterministic Random Bit Generators", NIST SP 800-90Ar1, DOI 10
.6028 , , <https:///NIST .SP .800 -90Ar1 nvlpubs >..nist .gov /nistpubs /Special Publications /NIST .SP .800 -90Ar1 .pdf - [RFC1847]
-
Galvin, J., Murphy, S., Crocker, S., and N. Freed, "Security Multiparts for MIME: Multipart
/Signed , RFC 1847, DOI 10and Multipart /Encrypted" .17487 , , <https:///RFC1847 www >..rfc -editor .org /info /rfc1847 - [RFC2510]
-
Adams, C. and S. Farrell, "Internet X.509 Public Key Infrastructure Certificate Management Protocols", RFC 2510, DOI 10
.17487 , , <https:///RFC2510 www >..rfc -editor .org /info /rfc2510 - [RFC2585]
-
Housley, R. and P. Hoffman, "Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP", RFC 2585, DOI 10
.17487 , , <https:///RFC2585 www >..rfc -editor .org /info /rfc2585 - [RFC4210]
-
Adams, C., Farrell, S., Kause, T., and T. Mononen, "Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)", RFC 4210, DOI 10
.17487 , , <https:///RFC4210 www >..rfc -editor .org /info /rfc4210 - [RFC4212]
-
Blinov, M. and C. Adams, "Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols", RFC 4212, DOI 10
.17487 , , <https:///RFC4212 www >..rfc -editor .org /info /rfc4212 - [RFC4303]
-
Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303, DOI 10
.17487 , , <https:///RFC4303 www >..rfc -editor .org /info /rfc4303 - [RFC4511]
-
Sermersheim, J., Ed., "Lightweight Directory Access Protocol (LDAP): The Protocol", RFC 4511, DOI 10
.17487 , , <https:///RFC4511 www >..rfc -editor .org /info /rfc4511 - [RFC5912]
-
Hoffman, P. and J. Schaad, "New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, DOI 10
.17487 , , <https:///RFC5912 www >..rfc -editor .org /info /rfc5912 - [RFC6268]
-
Schaad, J. and S. Turner, "Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)", RFC 6268, DOI 10
.17487 , , <https:///RFC6268 www >..rfc -editor .org /info /rfc6268 - [RFC6712]
-
Kause, T. and M. Peylo, "Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management Protocol (CMP)", RFC 6712, DOI 10
.17487 , , <https:///RFC6712 www >..rfc -editor .org /info /rfc6712 - [RFC7296]
-
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., and T. Kivinen, "Internet Key Exchange Protocol Version 2 (IKEv2)", STD 79, RFC 7296, DOI 10
.17487 , , <https:///RFC7296 www >..rfc -editor .org /info /rfc7296 - [RFC7299]
-
Housley, R., "Object Identifier Registry for the PKIX Working Group", RFC 7299, DOI 10
.17487 , , <https:///RFC7299 www >..rfc -editor .org /info /rfc7299 - [RFC8446]
-
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10
.17487 , , <https:///RFC8446 www >..rfc -editor .org /info /rfc8446 - [RFC8572]
-
Watsen, K., Farrer, I., and M. Abrahamsson, "Secure Zero Touch Provisioning (SZTP)", RFC 8572, DOI 10
.17487 , , <https:///RFC8572 www >..rfc -editor .org /info /rfc8572 - [RFC8649]
-
Housley, R., "Hash Of Root Key Certificate Extension", RFC 8649, DOI 10
.17487 , , <https:///RFC8649 www >..rfc -editor .org /info /rfc8649 - [RFC8995]
-
Pritikin, M., Richardson, M., Eckert, T., Behringer, M., and K. Watsen, "Bootstrapping Remote Secure Key Infrastructure (BRSKI)", RFC 8995, DOI 10
.17487 , , <https:///RFC8995 www >..rfc -editor .org /info /rfc8995 - [RFC9147]
-
Rescorla, E., Tschofenig, H., and N. Modadugu, "The Datagram Transport Layer Security (DTLS) Protocol Version 1.3", RFC 9147, DOI 10
.17487 , , <https:///RFC9147 www >..rfc -editor .org /info /rfc9147 - [RFC9162]
-
Laurie, B., Messeri, E., and R. Stradling, "Certificate Transparency Version 2.0", RFC 9162, DOI 10
.17487 , , <https:///RFC9162 www >..rfc -editor .org /info /rfc9162 - [RFC9480]
-
Brockhaus, H., von Oheimb, D., and J. Gray, "Certificate Management Protocol (CMP) Updates", RFC 9480, DOI 10
.17487 , , <https:///RFC9480 www >..rfc -editor .org /info /rfc9480 - [RFC9482]
-
Sahni, M., Ed. and S. Tripathi, Ed., "Constrained Application Protocol (CoAP) Transfer for the Certificate Management Protocol", RFC 9482, DOI 10
.17487 , , <https:///RFC9482 www >..rfc -editor .org /info /rfc9482 - [RFC9483]
-
Brockhaus, H., von Oheimb, D., and S. Fries, "Lightweight Certificate Management Protocol (CMP) Profile", RFC 9483, DOI 10
.17487 , , <https:///RFC9483 www >..rfc -editor .org /info /rfc9483 - [RFC9733]
-
von Oheimb, D., Ed., Fries, S., and H. Brockhaus, "BRSKI with Alternative Enrollment (BRSKI-AE)", RFC 9733, DOI 10
.17487 , , <https:///RFC9733 www >..rfc -editor .org /info /rfc9733 - [RFC9811]
-
Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray, "Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management Protocol (CMP)", RFC 9811, , <https://
www >..rfc -editor .org /info /rfc9811 - [UNISIG
.Subset -137] -
UNISIG, "ERTMS/ETCS On-line Key Management FFFIS", Subset-137, V1.0.0, , <https://
www >..era .europa .eu /system /files /2023 -01 /sos3 _index083 _-_subset -137 _v100 .pdf - [X509.2019]
-
ITU-T, "Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks", ITU-T Recommendation X.509 (10/2019), , <https://
handle >..itu .int /11 .1002 /1000 /14033
Appendix A. Reasons for the Presence of RAs
The reasons that justify the presence of an RA can be split into those that are due to technical factors and those that are organizational in nature. Technical reasons include the following.¶
Some of the organizational reasons that argue for the presence of an RA are the following.¶
Further reasons relevant for automated machine
Appendix B. The Use of Revocation Passphrase
A revocation request must incorporate suitable security mechanisms,
including proper authentication, in order to reduce the probability
of successful denial
A mechanism that has seen use in some environments is "revocation passphrase", in which a value of sufficient entropy (i.e., a relatively long passphrase rather than a short password) is shared between (only) the entity and the CA/RA at some point prior to revocation; this value is later used to authenticate the revocation request.¶
In this specification, the following technique to establish shared secret information (i.e., a revocation passphrase) is OPTIONAL to support. Its precise use in CMP messages is as follows.¶
Note: For a message transferring a revocation passphrase indicating cmp2021(3) in the pvno field of the PKIHeader, the encrypted passphrase MUST be transferred in the envelopedData choice of EncryptedKey as defined in Section 5.2.2. When using cmp2000(2) in the message header for backward compatibility, the encryptedValue is used. This allows the necessary conveyance and protection of the passphrase while maintaining bits
Using the technique specified above, the revocation passphrase may be
initially established and updated at any time without requiring extra
messages or out-of-band exchanges. For example, the revocation
request message itself (protected and authenticated through a MAC
that uses the revocation passphrase as a key) may contain, in the
PKIHeader, a new revocation passphrase to be used for authenticating
future revocation requests for any of the entity's other
certificates. In some environments, this may be preferable to
mechanisms that reveal the passphrase in the revocation request
message, since this can allow a denial
Furthermore, the above technique can provide strong cryptographic protection over the entire revocation request message even when a digital signature is not used. Techniques that do authentication of the revocation request by simply revealing the revocation passphrase typically do not provide cryptographic protection over the fields of the request message (so that a request for revocation of one certificate may be modified by an unauthorized third party to a request for revocation of another certificate for that entity).¶
Appendix C. PKI Management Message Profiles (REQUIRED)
This appendix contains detailed profiles for those PKIMessages that MUST be supported by conforming implementations (see Section 6).¶
Note: Appendices C and D focus on PKI management operations managing certificates for human end entities. In contrast, the Lightweight CMP Profile [RFC9483] focuses on typical use cases of industrial and IoT scenarios supporting highly automated certificate lifecycle management scenarios.¶
Profiles for the PKIMessages used in the following PKI management operations are provided:¶
C.2. Algorithm Use Profile
For specifications of algorithm identifiers and respective conventions for
conforming implementations
C.3. POP Profile
The table below describes the POP fields for use (in signature field of
pop field of Proof
Note: For examples of MSG_SIG_ALG OIDs, see Section 3 of CMP Algorithms [RFC9481].¶
POP of a private decryption key that corresponds to a public encryption key for which a certificate has been requested does not use this profile; the CertHash field of the certConf message is used instead.¶
Not every CA/RA will do POP (of signing key, decryption key, or key agreement key) in the PKIX-CMP in-band certification request protocol (how POP is done MAY ultimately be a policy issue that is made explicit for any given CA in its publicized Policy OID and Certification Practice Statement). However, this specification mandates that CA/RA entities MUST do POP (by some means) as part of the certification process. All end entities MUST be prepared to provide POP (i.e., these components of the PKIX-CMP protocol MUST be supported).¶
C.4. Initial Registration/Certification (Basic Authenticated Scheme)
An (uninitialized) end entity requests a (first) certificate from a CA. When the CA responds with a message containing a certificate, the end entity replies with a certificate confirmation. The CA sends a pkiconf message back, closing the transaction. All messages are authenticated.¶
This scheme allows the end entity to request certification of a locally generated public key (typically a signature key). The end entity MAY also choose to request the centralized generation and certification of another key pair (typically an encryption key pair).¶
Certification may only be requested for one locally generated public key (for more, use separate PKIMessages).¶
The end entity MUST support POP of the private key associated with the locally generated public key.¶
Preconditions:¶
Message Flow:¶
For this profile, we mandate that the end entity MUST include all (i.e., one or two) CertReqMsg in a single PKIMessage and that the PKI (CA) MUST produce a single response PKIMessage that contains the complete response (i.e., including the OPTIONAL second key pair, if it was requested and if centralized key generation is supported). For simplicity, we also mandate that this message MUST be the final one (i.e., no use of "waiting" status value).¶
The end entity has an out-of-band interaction with the CA/RA. This
transaction established the shared secret, the reference
Initialization Request -- ir¶
Initialization Response -- ip¶
Certificate confirm -- certConf¶
Confirmation -- pkiconf¶
C.5. Certificate Request
An (initialized) end entity requests a certificate from a CA (for any reason). When the CA responds with a message containing a certificate, the end entity replies with a certificate confirmation. The CA replies with a pkiconf message to close the transaction. All messages are authenticated.¶
The profile for this exchange is identical to that given in Appendix C.4, with the following exceptions:¶
C.6. Key Update Request
An (initialized) end entity requests a certificate from a CA (to update the key pair and/or corresponding certificate that it already possesses). When the CA responds with a message containing a certificate, the end entity replies with a certificate confirmation. The CA replies with a PKIConfirm to close the transaction. All messages are authenticated.¶
The profile for this exchange is identical to that given in Appendix C.4, with the following exceptions:¶
Appendix D. PKI Management Message Profiles (OPTIONAL)
This appendix contains detailed profiles for those PKIMessages that
MAY be supported by implementations
Profiles for the PKIMessages used in the following PKI management operations are provided:¶
Future versions of this document may extend the above to include profiles for the operations listed below (along with other operations, if desired).¶
D.2. Algorithm Use Profile
Identical to Appendix C.2.¶
D.3. Self-Signed Certificates
The table below is a profile of how a certificate structure may be "self-signed". These structures are used for distribution of new root CA public keys. This can occur in one of three ways (see Section 4.4 above for a description of the use of these structures):¶
A newWithNew certificate (including relevant extensions) must contain "sensible" values for all fields. For example, when present, subjectAltName MUST be identical to issuerAltName, and, when present, keyIdentifiers must contain appropriate values, et cetera.¶
D.4. Root CA Key Update
A root CA updates its key pair. It then produces a CA key update announcement message that can be made available (via some transport mechanism) to the relevant entities. A confirmation message is not required from the end entities.¶
ckuann message:¶
D.5. PKI Information Request/Response
The end entity sends a general message to the PKI requesting details that will be required for later PKI management operations. The RA/CA responds with a general response. If an RA generates the response, then it will simply forward the equivalent message that it previously received from the CA, with the possible addition of certificates to the extraCerts fields of the PKIMessage. A confirmation message is not required from the end entity.¶
Message Flows:¶
genM:¶
genP:¶
D.6. Cross-Certification Request/Response (1-way)
This section describes the creation of a single cross
Preconditions:¶
The use of certificate confirmation and the corresponding server confirmation is determined by the generalInfo field in the PKIHeader (see Section 5.1.1). The following profile does not mandate support for either confirmation.¶
Message Flows:¶
ccr:¶
ccp:¶
D.7. In-Band Initialization Using External Identity Certificate
An (uninitialized) end entity wishes to initialize into the PKI with a CA, CA-1. It uses, for authentication purposes, a pre-existing identity certificate issued by another (external) CA, CA-X. A trust relationship must already have been established between CA-1 and CA-X so that CA-1 can validate the end entity identity certificate signed by CA-X. Furthermore, some mechanism must already have been established within the TEE, also known as PSE, of the end entity that would allow it to authenticate and verify PKIMessages signed by CA-1 (as one example, the TEE may contain a certificate issued for the public key of CA-1, signed by another CA that the end entity trusts on the basis of out-of-band authentication techniques).¶
The end entity sends an initialization request to start the transaction. When CA-1 responds with a message containing the new certificate, the end entity replies with a certificate confirmation. CA-1 replies with a pkiconf message to close the transaction. All messages are signed (the end entity messages are signed using the private key that corresponds to the public key in its external identity certificate; the CA-1 messages are signed using the private key that corresponds to the public key in a certificate that can be chained to a trust anchor in the end entity's TEE).¶
The profile for this exchange is identical to that given in Appendix C.4, with the following exceptions:¶
Appendix E. Variants of Using KEM Keys for PKI Message Protection
As described in Section 5.1.3.4, any party in a PKI management operation may wish to use a KEM key pair for message protection. Possible cases are described below.¶
For any PKI management operation started by a PKI entity with any type of request message, the following message flows describe the use of a KEM key. There are two cases to distinguish, namely whether the PKI entity or the PKI management entity owns a KEM key pair. If both sides own KEM key pairs, the flows need to be combined such that for each direction a shared secret key is established.¶
In the following message flows, Alice indicates the PKI entity that uses a KEM key pair for message authentication and Bob provides the KEM ciphertext using Alice's public KEM key, as described in Section 5.1.3.4.¶
Note: Figure 4 describes the situation where KEM-based message protection may not require more than one message exchange. In this case, the transactionID MUST also be used by the PKI entity (Bob) to ensure domain separation between different PKI management operations.¶
Appendix F. Compilable ASN.1 Definitions
This section contains the updated 2002 ASN.1 module from [RFC5912], which was updated in [RFC9480]. This module replaces the module in Section 9 of [RFC5912]. The module contains those changes to the normative ASN.1 module from Appendix F of [RFC4210] that were specified in [RFC9480], as well as changes made in this document. This module makes reference to ASN.1 structures defined in [RFC6268], as well as the UTF-8 encoding defined in [RFC3629].¶
Acknowledgements
The authors of this document wish to thank Carlisle Adams, Stephen Farrell, Tomi Kause, and Tero Mononen, the original authors of [RFC4210], for their work.¶
We also thank all reviewers of this document for their valuable feedback.¶
Adding KEM support to this document was partly funded by the German Federal Ministry of Education and Research in the project Quoryptan through grant number 16KIS2033.¶