rfc9734.original.xml | rfc9734.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version='1.0' encoding='UTF-8'?> | |||
<!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
<!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
<!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
<!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
]> | ]> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3. | -ietf-lamps-im-keyusage-04" number="9734" category="std" updates="" obsoletes="" | |||
4) --> | consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRef | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | s="true" version="3" xml:lang="en"> | |||
-ietf-lamps-im-keyusage-04" category="std" consensus="true" submissionType="IETF | ||||
" tocInclude="true" sortRefs="true" symRefs="true" version="3"> | ||||
<!-- xml2rfc v2v3 conversion 3.23.2 --> | ||||
<front> | <front> | |||
<title abbrev="extendedKeyUsage for IM URIs">X.509 Certificate Extended Key Usage (EKU) for Instant Messaging URIs</title> | <title abbrev="extendedKeyUsage for IM URIs">X.509 Certificate Extended Key Usage (EKU) for Instant Messaging URIs</title> | |||
<seriesInfo name="Internet-Draft" value="draft-ietf-lamps-im-keyusage-04"/> | <seriesInfo name="RFC" value="9734"/> | |||
<author fullname="Rohan Mahy"> | <author fullname="Rohan Mahy"> | |||
<organization>Rohan Mahy Consulting Services</organization> | <organization>Rohan Mahy Consulting Services</organization> | |||
<address> | <address> | |||
<email>rohan.ietf@gmail.com</email> | <email>rohan.ietf@gmail.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2024" month="December" day="09"/> | <date year="2025" month="February"/> | |||
<area>SEC</area> | <area>SEC</area> | |||
<workgroup>LAMPS WG</workgroup> | <workgroup>lamps</workgroup> | |||
<keyword>x.509</keyword> | <keyword>x.509</keyword> | |||
<keyword>certificate</keyword> | <keyword>certificate</keyword> | |||
<keyword>extended key usage</keyword> | <keyword>extended key usage</keyword> | |||
<keyword>eku</keyword> | <keyword>eku</keyword> | |||
<keyword>instant messaging</keyword> | <keyword>instant messaging</keyword> | |||
<keyword>im URI</keyword> | <keyword>im URI</keyword> | |||
<keyword>mimi URL</keyword> | <keyword>mimi URL</keyword> | |||
<abstract> | <abstract> | |||
<?line 61?> | ||||
<t>RFC 5280 specifies several extended key purpose identifiers | <t>RFC 5280 specifies several extended key purpose identifiers | |||
(KeyPurposeIds) for X.509 certificates. This document defines | (KeyPurposeIds) for X.509 certificates. This document defines | |||
Instant Messaging (IM) identity KeyPurposeId for inclusion in | an Instant Messaging (IM) identity KeyPurposeId for inclusion in | |||
the Extended Key Usage (EKU) extension of X.509 v3 public key | the Extended Key Usage (EKU) extension of X.509 v3 public key | |||
certificates</t> | certificates</t> | |||
</abstract> | </abstract> | |||
<note removeInRFC="true"> | ||||
<name>About This Document</name> | ||||
<t> | ||||
The latest revision of this draft can be found at <eref target="https:// | ||||
rohanmahy.github.io/mahy-lamps-im-keyusage/draft-ietf-lamps-im-keyusage.html"/>. | ||||
Status information for this document may be found at <eref target="https | ||||
://datatracker.ietf.org/doc/draft-ietf-lamps-im-keyusage/"/>. | ||||
</t> | ||||
<t> | ||||
Discussion of this document takes place on the | ||||
LAMPS WG Working Group mailing list (<eref target="mailto:lamps@ietf.org | ||||
"/>), | ||||
which is archived at <eref target="https://mailarchive.ietf.org/arch/bro | ||||
wse/lamps/"/>. | ||||
Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/lamps/" | ||||
/>. | ||||
</t> | ||||
<t>Source for this draft and an issue tracker can be found at | ||||
<eref target="https://github.com/rohanmahy/mahy-lamps-im-keyusage"/>.</t | ||||
> | ||||
</note> | ||||
</front> | </front> | |||
<middle> | <middle> | |||
<?line 70?> | ||||
<section anchor="introduction"> | <section anchor="introduction"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<t>Instant Messaging (IM) systems using the Messaging Layer Security (MLS) | <t>Instant Messaging (IM) systems using the Messaging Layer Security (MLS) | |||
<xref target="RFC9420"/> protocol can incorporate per-client identity certificat e | <xref target="RFC9420"/> protocol can incorporate per-client identity certificat e | |||
credentials. A subjectAltName in these certificates can be an IM URI | credentials. A subjectAltName in these certificates can be an IM URI | |||
<xref target="RFC3860"/> or XMPP URI <xref target="RFC6121"/>, for example.</t> | <xref target="RFC3860"/> or Extensible Messaging and Presence Protocol (XMPP) UR | |||
<t>Organizations may be unwilling to issue certificates for Instant Messag | I <xref target="RFC6121"/>, for example.</t> | |||
e | <t>Organizations may be unwilling to issue certificates for an IM | |||
client using a general KeyPurposeId such as <tt>id-kp-serverAuth</tt> or | client using a general KeyPurposeId, such as <tt>id-kp-serverAuth</tt> or | |||
<tt>id-kp-clientAuth</tt>, because of the risk that such certificates could be | <tt>id-kp-clientAuth</tt>, because of the risk that such certificates could be | |||
abused in a cross-protocol attack.</t> | abused in a cross-protocol attack.</t> | |||
<t>An explanation of MLS credentials as they apply to Instant Messaging is | <t>An explanation of MLS credentials as they apply to IM is | |||
described in <xref target="I-D.barnes-mimi-identity-arch"/>. These credentials a re | described in <xref target="I-D.barnes-mimi-identity-arch"/>. These credentials a re | |||
expected to be heavily used in the More Instant Messaging Interoperability | expected to be heavily used in the More Instant Messaging Interoperability | |||
(MIMI) Working Group.</t> | (MIMI) Working Group.</t> | |||
</section> | </section> | |||
<section anchor="conventions-and-definitions"> | <section anchor="conventions-and-definitions"> | |||
<name>Conventions and Definitions</name> | <name>Conventions and Definitions</name> | |||
<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14 | <t> | |||
>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | |||
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECO | "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14> | |||
MMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ", | |||
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be i | "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", | |||
nterpreted as | "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
only when, they | be | |||
appear in all capitals, as shown here.</t> | interpreted as described in BCP 14 <xref target="RFC2119"/> <xref | |||
<?line -18?> | target="RFC8174"/> when, and only when, they appear in all capitals, as | |||
shown here. | ||||
</t> | ||||
</section> | ||||
</section> | ||||
<section anchor="the-im-uri-extended-key-usage"> | <section anchor="the-im-uri-extended-key-usage"> | |||
<name>The IM URI Extended Key Usage</name> | <name>The IM URI EKU</name> | |||
<t>This specification defines the KeyPurposeId id-kp-imUri, which | <t>This specification defines the KeyPurposeId <tt>id-kp-imUri</tt>, which | |||
may be included in certificates used to prove the identity of an Instant | may be | |||
Messaging client. | included in certificates used to prove the identity of an IM client. This | |||
This EKU extension <bcp14>MAY</bcp14>, at the option of the certificate issuer, | EKU extension <bcp14>MAY</bcp14>, at the option | |||
be either | of the certificate issuer, be either critical or non-critical.</t> | |||
critical or non-critical.</t> | ||||
<artwork><![CDATA[ | <sourcecode type="asn.1"><![CDATA[ | |||
id-kp OBJECT IDENTIFIER ::= { | id-kp OBJECT IDENTIFIER ::= { | |||
iso(1) identified-organization(3) dod(6) internet(1) | iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) kp(3) } | security(5) mechanisms(5) pkix(7) kp(3) } | |||
id-kp-imUri OBJECT IDENTIFIER ::= { id-kp TBD1 } | id-kp-imUri OBJECT IDENTIFIER ::= { id-kp 40 }]]></sourcecode> | |||
]]></artwork> | ||||
</section> | </section> | |||
<section anchor="security-considerations"> | <section anchor="security-considerations"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t>The Security Considerations of <xref target="RFC5280"/> are applicable | ||||
to this | <t>The security considerations of <xref target="RFC5280"/> are applicable | |||
document. This extended key purpose does not introduce new security | to this | |||
document. The <tt>id-kp-imUri</tt> extended key purpose does not introduce new | ||||
security | ||||
risks but instead reduces existing security risks by providing means | risks but instead reduces existing security risks by providing means | |||
to identify if the certificate is generated to sign IM identity credentials. | to identify if the certificate is generated to sign IM identity credentials. | |||
Issuers <bcp14>SHOULD NOT</bcp14> set the <tt>id-kp-imUri</tt> extended key purp ose and an | Issuers <bcp14>SHOULD NOT</bcp14> set the <tt>id-kp-imUri</tt> extended key purp ose and an | |||
<tt>id-kp-clientAuth</tt> or <tt>id-kp-serverAuth</tt> extended key purpose, as that would | <tt>id-kp-clientAuth</tt> or <tt>id-kp-serverAuth</tt> extended key purpose: tha t would | |||
defeat the improved specificity offered by having an <tt>id-kp-imUri</tt> extend ed key | defeat the improved specificity offered by having an <tt>id-kp-imUri</tt> extend ed key | |||
purpose.</t> | purpose.</t> | |||
</section> | </section> | |||
<section anchor="iana-considerations"> | <section anchor="iana-considerations"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>IANA is requested to register the following OIDs in the "SMI Security | <t>IANA has registered the following OID in the "SMI Security | |||
for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3). These | for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3). This | |||
OIDs are defined in Section 4.</t> | OID is defined in <xref target="the-im-uri-extended-key-usage"/>.</t> | |||
<table> | <table> | |||
<thead> | <thead> | |||
<tr> | <tr> | |||
<th align="left">Decimal</th> | <th align="left">Decimal</th> | |||
<th align="left">Description</th> | <th align="left">Description</th> | |||
<th align="left">References</th> | <th align="left">References</th> | |||
</tr> | </tr> | |||
</thead> | </thead> | |||
<tbody> | <tbody> | |||
<tr> | <tr> | |||
<td align="left">TBD1</td> | <td align="left">40</td> | |||
<td align="left">id-kp-imUri</td> | <td align="left">id-kp-imUri</td> | |||
<td align="left">This-RFC</td> | <td align="left">RFC 9734</td> | |||
</tr> | </tr> | |||
</tbody> | </tbody> | |||
</table> | </table> | |||
<t>IANA is also requested to register the following ASN.1 <xref target="IT U.X690.2021"/> | <t>IANA has also registered the following ASN.1 <xref target="ITU.X690.202 1"/> | |||
module OID in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5. 5.7.0). This OID is defined in <xref target="asn1-module"/>.</t> | module OID in the "SMI Security for PKIX Module Identifier" registry (1.3.6.1.5. 5.7.0). This OID is defined in <xref target="asn1-module"/>.</t> | |||
<table> | <table> | |||
<thead> | <thead> | |||
<tr> | <tr> | |||
<th align="left">Decimal</th> | <th align="left">Decimal</th> | |||
<th align="left">Description</th> | <th align="left">Description</th> | |||
<th align="left">References</th> | <th align="left">References</th> | |||
</tr> | </tr> | |||
</thead> | </thead> | |||
<tbody> | <tbody> | |||
<tr> | <tr> | |||
<td align="left">TBD2</td> | <td align="left">113</td> | |||
<td align="left">id-mod-im-eku</td> | <td align="left">id-mod-im-eku</td> | |||
<td align="left">This-RFC</td> | <td align="left">RFC 9734</td> | |||
</tr> | </tr> | |||
</tbody> | </tbody> | |||
</table> | </table> | |||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<displayreference target="I-D.barnes-mimi-identity-arch" to="E2E-IDENTITY"/> | ||||
<references anchor="sec-combined-references"> | <references anchor="sec-combined-references"> | |||
<name>References</name> | <name>References</name> | |||
<references anchor="sec-normative-references"> | <references anchor="sec-normative-references"> | |||
<name>Normative References</name> | <name>Normative References</name> | |||
<reference anchor="ITU.X690.2021"> | ||||
<reference anchor="ITU.X690.2021" target="https://www.itu.int/rec/T-REC- | ||||
X.690"> | ||||
<front> | <front> | |||
<title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title> | <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title> | |||
<author> | <author> | |||
<organization>International Telecommunications Union</organization > | <organization>ITU-T</organization> | |||
</author> | </author> | |||
<date year="2021"/> | <date month="February" year="2021"/> | |||
</front> | </front> | |||
<seriesInfo name="ITU-T" value="Recommendation X.690"/> | <seriesInfo name="ITU-T" value="Recommendation X.690"/> | |||
<seriesInfo name="ISO/IEC" value="8825-1-2021"/> | ||||
</reference> | </reference> | |||
<reference anchor="ITU.X680.2021"> | ||||
<reference anchor="ITU.X680.2021" target="https://www.itu.int/rec/T-REC- | ||||
X.680"> | ||||
<front> | <front> | |||
<title>Information Technology - Abstract Syntax Notation One (ASN.1) : Specification of basic notation</title> | <title>Information Technology - Abstract Syntax Notation One (ASN.1) : Specification of basic notation</title> | |||
<author> | <author> | |||
<organization>International Telecommunications Union</organization > | <organization>ITU-T</organization> | |||
</author> | </author> | |||
<date year="2021"/> | <date month="February" year="2021"/> | |||
</front> | ||||
<seriesInfo name="ITU-T" value="Recommendation X.680"/> | ||||
</reference> | ||||
<reference anchor="RFC2119"> | ||||
<front> | ||||
<title>Key words for use in RFCs to Indicate Requirement Levels</tit | ||||
le> | ||||
<author fullname="S. Bradner" initials="S." surname="Bradner"/> | ||||
<date month="March" year="1997"/> | ||||
<abstract> | ||||
<t>In many standards track documents several words are used to sig | ||||
nify the requirements in the specification. These words are often capitalized. T | ||||
his document defines these words as they should be interpreted in IETF documents | ||||
. This document specifies an Internet Best Current Practices for the Internet Co | ||||
mmunity, and requests discussion and suggestions for improvements.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="2119"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2119"/> | ||||
</reference> | ||||
<reference anchor="RFC8174"> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
tle> | ||||
<author fullname="B. Leiba" initials="B." surname="Leiba"/> | ||||
<date month="May" year="2017"/> | ||||
<abstract> | ||||
<t>RFC 2119 specifies common key words that may be used in protoco | ||||
l specifications. This document aims to reduce the ambiguity by clarifying that | ||||
only UPPERCASE usage of the key words have the defined special meanings.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="8174"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
</reference> | ||||
<reference anchor="RFC5280"> | ||||
<front> | ||||
<title>Internet X.509 Public Key Infrastructure Certificate and Cert | ||||
ificate Revocation List (CRL) Profile</title> | ||||
<author fullname="D. Cooper" initials="D." surname="Cooper"/> | ||||
<author fullname="S. Santesson" initials="S." surname="Santesson"/> | ||||
<author fullname="S. Farrell" initials="S." surname="Farrell"/> | ||||
<author fullname="S. Boeyen" initials="S." surname="Boeyen"/> | ||||
<author fullname="R. Housley" initials="R." surname="Housley"/> | ||||
<author fullname="W. Polk" initials="W." surname="Polk"/> | ||||
<date month="May" year="2008"/> | ||||
<abstract> | ||||
<t>This memo profiles the X.509 v3 certificate and X.509 v2 certif | ||||
icate revocation list (CRL) for use in the Internet. An overview of this approac | ||||
h and model is provided as an introduction. The X.509 v3 certificate format is d | ||||
escribed in detail, with additional information regarding the format and semanti | ||||
cs of Internet name forms. Standard certificate extensions are described and two | ||||
Internet-specific extensions are defined. A set of required certificate extensi | ||||
ons is specified. The X.509 v2 CRL format is described in detail along with stan | ||||
dard and Internet-specific extensions. An algorithm for X.509 certification path | ||||
validation is described. An ASN.1 module and examples are provided in the appen | ||||
dices. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | </front> | |||
<seriesInfo name="RFC" value="5280"/> | <seriesInfo name="ITU-T Recommendation" value="X.680"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC5280"/> | <seriesInfo name="ISO/IEC" value="8824-1:2021"/> | |||
</reference> | </reference> | |||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | ||||
119.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | ||||
174.xml"/> | ||||
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5 | ||||
280.xml"/> | ||||
</references> | </references> | |||
<references anchor="sec-informative-references"> | <references anchor="sec-informative-references"> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="RFC9420"> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9 | |||
<front> | 420.xml"/> | |||
<title>The Messaging Layer Security (MLS) Protocol</title> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3 | |||
<author fullname="R. Barnes" initials="R." surname="Barnes"/> | 860.xml"/> | |||
<author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/ | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6 | |||
> | 121.xml"/> | |||
<author fullname="R. Robert" initials="R." surname="Robert"/> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D. | |||
<author fullname="J. Millican" initials="J." surname="Millican"/> | barnes-mimi-identity-arch.xml"/> | |||
<author fullname="E. Omara" initials="E." surname="Omara"/> | ||||
<author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon | ||||
"/> | ||||
<date month="July" year="2023"/> | ||||
<abstract> | ||||
<t>Messaging applications are increasingly making use of end-to-en | ||||
d security mechanisms to ensure that messages are only accessible to the communi | ||||
cating endpoints, and not to any servers involved in delivering messages. Establ | ||||
ishing keys to provide such protections is challenging for group chat settings, | ||||
in which more than two clients need to agree on a key but may not be online at t | ||||
he same time. In this document, we specify a key establishment protocol that pro | ||||
vides efficient asynchronous group key establishment with forward secrecy (FS) a | ||||
nd post-compromise security (PCS) for groups in size ranging from two to thousan | ||||
ds.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9420"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9420"/> | ||||
</reference> | ||||
<reference anchor="RFC3860"> | ||||
<front> | ||||
<title>Common Profile for Instant Messaging (CPIM)</title> | ||||
<author fullname="J. Peterson" initials="J." surname="Peterson"/> | ||||
<date month="August" year="2004"/> | ||||
<abstract> | ||||
<t>At the time this document was written, numerous instant messagi | ||||
ng protocols were in use, and little interoperability between services based on | ||||
these protocols has been achieved. This specification defines common semantics a | ||||
nd data formats for instant messaging to facilitate the creation of gateways bet | ||||
ween instant messaging services. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3860"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3860"/> | ||||
</reference> | ||||
<reference anchor="RFC6121"> | ||||
<front> | ||||
<title>Extensible Messaging and Presence Protocol (XMPP): Instant Me | ||||
ssaging and Presence</title> | ||||
<author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre | ||||
"/> | ||||
<date month="March" year="2011"/> | ||||
<abstract> | ||||
<t>This document defines extensions to core features of the Extens | ||||
ible Messaging and Presence Protocol (XMPP) that provide basic instant messaging | ||||
(IM) and presence functionality in conformance with the requirements in RFC 277 | ||||
9. This document obsoletes RFC 3921. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6121"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6121"/> | ||||
</reference> | ||||
<reference anchor="I-D.barnes-mimi-identity-arch"> | ||||
<front> | ||||
<title>Identity for E2E-Secure Communications</title> | ||||
<author fullname="Richard Barnes" initials="R." surname="Barnes"> | ||||
<organization>Cisco</organization> | ||||
</author> | ||||
<author fullname="Rohan Mahy" initials="R." surname="Mahy"> | ||||
<organization>Wire</organization> | ||||
</author> | ||||
<date day="23" month="October" year="2023"/> | ||||
<abstract> | ||||
<t> End-to-end (E2E) security is a critical property for modern | ||||
user | ||||
communications systems. E2E security protects users' communications | ||||
from tampering or inspection by intermediaries that are involved in | ||||
delivering those communcations from one logical endpoint to another. | ||||
In addition to the much-discussed E2E encryption systems, true E2E | ||||
security requires an identity mechanism that prevents the | ||||
communications provider from impersonating participants in a session, | ||||
as a way to gain access to the session. This document describes a | ||||
high-level architecture for E2E identity, identifying the critical | ||||
mechanisms that need to be specified. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="Internet-Draft" value="draft-barnes-mimi-identity-ar | ||||
ch-01"/> | ||||
</reference> | ||||
</references> | </references> | |||
</references> | </references> | |||
<?line 157?> | ||||
<section anchor="asn1-module"> | <section anchor="asn1-module"> | |||
<name>ASN.1 Module</name> | <name>ASN.1 Module</name> | |||
<t>The following module adheres to ASN.1 specifications <xref target="ITU. X680.2021"/> and | <t>The following module adheres to ASN.1 specifications <xref target="ITU. X680.2021"/> and | |||
<xref target="ITU.X690.2021"/>.</t> | <xref target="ITU.X690.2021"/>.</t> | |||
<sourcecode type="asn1"><![CDATA[ | ||||
<sourcecode type="asn.1"><![CDATA[ | ||||
<CODE BEGINS> | <CODE BEGINS> | |||
IM-EKU | IM-EKU | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
id-mod-im-eku (TBD2) } | id-mod-im-eku (113) } | |||
DEFINITIONS IMPLICIT TAGS ::= | DEFINITIONS IMPLICIT TAGS ::= | |||
BEGIN | BEGIN | |||
-- OID Arc | -- OID Arc | |||
id-kp OBJECT IDENTIFIER ::= | id-kp OBJECT IDENTIFIER ::= | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) kp(3) } | security(5) mechanisms(5) pkix(7) kp(3) } | |||
-- Extended Key Usage Values | -- Extended Key Usage Values | |||
id-kp-imUri OBJECT IDENTIFIER ::= { id-kp TBD1 } | id-kp-imUri OBJECT IDENTIFIER ::= { id-kp 40 } | |||
END | END | |||
<CODE ENDS> | <CODE ENDS>]]></sourcecode> | |||
]]></sourcecode> | ||||
</section> | ||||
<section anchor="change-log"> | ||||
<name>Change log</name> | ||||
<t>RFC Editor, please remove this section on publication.</t> | ||||
<ul spacing="normal"> | ||||
<li> | ||||
<t>made Proposed Standard</t> | ||||
</li> | ||||
<li> | ||||
<t>added a <bcp14>MAY</bcp14> statement in Section 3</t> | ||||
</li> | ||||
<li> | ||||
<t>corrected typo in registration of the ASN.1 module (Thanks Sean!)</ | ||||
t> | ||||
</li> | ||||
<li> | ||||
<t>updated author affiliation</t> | ||||
</li> | ||||
<li> | ||||
<t>added ASN.1 module</t> | ||||
</li> | ||||
<li> | ||||
<t>specified that eku is optionally critical</t> | ||||
</li> | ||||
</ul> | ||||
</section> | </section> | |||
<section numbered="false" anchor="acknowledgments"> | <section numbered="false" anchor="acknowledgments"> | |||
<name>Acknowledgments</name> | <name>Acknowledgments</name> | |||
<t>Thanks to Sean Turner and Russ Housley for reviews, suggestions, | <t>Thanks to <contact fullname="Sean Turner"/> and <contact | |||
corrections, and encouragement.</t> | fullname="Russ Housley"/> for reviews, suggestions, corrections, and | |||
encouragement.</t> | ||||
</section> | </section> | |||
</back> | ||||
<!-- ##markdown-source: | ||||
H4sIAAAAAAAAA8VYbXPbuBH+jl+xp3yROiZj2U7iaHK5ky0lYWPZriX3ctPp | ||||
TCASklDzRQVIO6rj/Jb+lv6yPgtQb7GS6bVz0yQTESCw2H1299kFgyAQpS5T | ||||
1aHGh/DZ/ks6VabUEx3LUlH/U6nyRCX0Xi3o2sqpomb//XWLJoWhKLelzEsa | ||||
KIs3Op/S9VVkG0KOx0bdQp6qd2Oz3+t2DeplfMC0MIsO2TIRIiniXGZQIzFy | ||||
UgZalZMgldncBjoLbtSiYgnB/pGw1TjT1uoiLxdzrI/6ozdET0imtsChGifO | ||||
+di8bOxBh0SXhdEy5UHUPcEPlGhEV6M3DZFX2ViZjkigSkfERW5VbivbodJU | ||||
SsCEQyGNkh0a9k/FXWFupqao5h066w4uh/TLWwG9MJ10BAX0idHjh3gNIA+X | ||||
KBAWk7PCzd5U/KNrDLMlhm4yY4j4KdOZxvOZuFV5BRWJvtaAyKPwC7RjF7zl | ||||
95jNpE475AD8mbEMCzPl7bqcVeMOmWIm80zOFk/5v8dAY2kK/W3ZoVlZzm3n | ||||
6dPVltALCXXxjc1Pv+fCcFZmqRCyKmeFYeBwFNGkSlPv/is+hgYQ7F5AbZnr | ||||
f8gS/t58SafwVpWWbPNQmVsdK+s2KG+50zZkFX6e8kwYF5kQeWEyiLp1UEaj | ||||
6/DD85f74cH+QbvjNteZ8NoNsCKf+A1FTiMVz/IiLaYL+KU7PA/bpPK4SFgB | ||||
U6XKdupNw7mKvft5WzGhE2l1TP3l4iteTM2T/lVrr95yKvMix4700apTrKoX | ||||
yTyhnrZscaXtDAH19eLecvEKXKohRJbkpTK50wnHjFSqAEhW5bWelq5z/Lgd | ||||
LhuIQXFDq4xWVgOKpUAAF4zgDCcCse0t/RACS7HC9fi/wnVsSyPjkoaLvJSf | ||||
6Lwo/aqLHMzjUG99E+exwzmvt/xfgTgGEHppJEebEEEQkKzNE+LqzSk9Ozje | ||||
J+utgPusulUGKm3xxbwy88Iq0sxnvM5Y0QSfXvr5KLGeiz11bzCPDYlGM20J | ||||
vFpBt5ISNdE5kuQxbTejQas+oVzQpnQnW+dxWjHf4kmUs+9UBae6rd3hVbo9 | ||||
hA3jFI6BOWJTwRqTTCdJqoR4wp4xRVLFznvfUtMubKkyCyLlKdZmveBMLpQB | ||||
G8SVYUOag7NhS9zf/wSwXx4d7D880NwUZREXKcWSrYkL2Gm40M2VCeJUM04r | ||||
IDZ5PDbKTaPIhNQl1KC/qbjspuU5SAuSWBO4adM+d8ZYIW/rmlercnj8nFVh | ||||
pw0uL/kF+RfP2wfth4c9h7n6BN5MVSjExQYBWtD6gmVW+Z1OU4dAQSiG1VdH | ||||
Py7PMMGb54GTNFW5C7ctd9sqnpG09FEnwc08QMQjJrtIoo/QV9SzXpCb3YMy | ||||
saxgORzOzjDa3uBBll7UNh5FlSbYgAYBOxJGTVJsCmuDlV9kWcr4BmZ3c2Aw | ||||
T2W+Sm94kzbcwGrixAXJ+TxdMA6PI0ZbkSgbGz32xwHnKOiFY2mQCAEX12Dp | ||||
7UCaePbwECJpnCM3DzJKQBf4G1JwDvCfKXmrUy7nXrCLw8KoHTo4vikQX3Ks | ||||
UxwkmoNoELW2CzYMRgKgpN3yoexox/acsdqNhYBejhG437DUGFwPR9zS8C+d | ||||
X7jnq/6frqOrfo+fh++6Z2erB1GvGL67uD7rrZ/WO08vBoP+ec9vxixtTYnG | ||||
oPsr3rBWjYvLUXRx3j1reMs3OQZQ1QhpNntuFGMmv3LDyenlv/7ZPoI7fkDY | ||||
H7TbL5EPfnDcfnGEwd1M5f60IgfMfsjeFvC2ksbFTsppPNclfLTH0WBnxV0O | ||||
1xhOmz/8hZH5a4dejeN5++h1PcEGb00uMduadJg9nnm02YO4Y2rHMSs0t+a/ | ||||
Qnpb3+6vW+Ml7huTr34CCSgK2sc/vXYhxFHi2WYHS3MQwVt2q3DWZcGF8BYX | ||||
+GTX2bXRe/CAjmeiZh9XEBLvy60Md+kA/yOdb5WTuCJTJDAToU8PsU4PTyah | ||||
1wxFZKOGwH74tXRyivmSBni0cahnP8NERAp9qTLgauQMN1MgQfRVwXKMqPjy | ||||
5YtwdhFdnPyxfzqiqNc/H0Vvov4VUafzI92jtGtbNNutdc1Ngs0utHnYQsAn | ||||
zectH+S5KrFacH/gC0/zWQv9fIz+U9vM8mh+oz81X7ToZs6bH4TYwHaHIk4P | ||||
jz+NTnpt7GDF2b+r4sbtLxQ0coMevvGSUfPZxR0HsouzlFkToIxTl7CcxWKZ | ||||
xcvOYWcjkhTwM3ostt1Va0W5ulvZLrgAWBpXpbvaKJkQmBSrWJxvXldrqV67 | ||||
cPGiXSebKQlruKh58Bekd7m8rl41IVs9dTV2Xbk3qrWIXIBYWmcmNPBR9XHD | ||||
Dx9328scJPMdpY+ja0eZ3CVkz9cqhPIdl0CQ4UTVca0zlyvJKil9rkxAYgkj | ||||
M0Od4XKdf0dXUR8Tuiaqe959FBxuEqgZ9fcKdzqPmlFTOAQNE+sxKdK0uOOj | ||||
LqKeXZa0xnAQraJKcFNx+T76sM0sNWE0ankGfVc7PAyfh+3wGf6+CA9bLqBQ | ||||
VYWTzdHnSccRCMS71D6C+p9R8mKdIXX5iSuGT3vC+EoxKDlH0mfxuRPUf9ZP | ||||
O8ZY6BPISdhMOh5zkAfciGOwxog/I/xHQPk74P391jXy4UFkyApkFWzdCSOt | ||||
YBz4hdGqtf82hvut0Oekk2o38bu/lzZvB/5UNDC/G4oHKxRxFt/o1U31GEZu | ||||
6cdo4TgWPUK1mfdPNvX0hLUGswZNJly+LaPuN2/VKrtC+3iJNueneOQDz/TE | ||||
B4pXpxe9Pp3030bnQ9TIaBCgyoCt738/mvcQNfd59TZcTcbRVYBe/010HnFB | ||||
H4K6Ls+i02hEo+7bIbO/cOoymM7hXRPXJWN3sfhfrPlNZQv67Lj7/VmmFV/n | ||||
fnNRE+h5UNW8h/AM/7g6h04YWkByWkz9VbnvvuLtEa5EEqRsVOYbDO5mav7A | ||||
P3/RdPZyB4jLUqLoEs13wX3JEJ1HIk2CFzJhCyR3GISGBBdKd/Fbk9EhFuFy | ||||
aOqefzEv+G2dnXKzFfFhWodvcwS9UdKGqGI/tCCjmieuSPnvECQnE9wB/OeJ | ||||
pRabAjC5/B6Q+ILBQQMjffuDjpdrm+9mXILFN3lxl6pkygZYcd/xXzRV8mNj | ||||
AiJTDZdoTiekFKtFowrON66uXVXW0ruisqnytGTUrVZ36KZtNZ2C/zjn9kQN | ||||
hBu4ffzdqzJwvesWxL8B7cjL5UMWAAA= | ||||
</back> | ||||
</rfc> | </rfc> | |||
End of changes. 46 change blocks. | ||||
319 lines changed or deleted | 97 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |