draft-ietf-lamps-cmp-updates-23.original | draft-ietf-lamps-cmp-updates-24.txt | |||
---|---|---|---|---|
LAMPS Working Group H. Brockhaus, Ed. | LAMPS Working Group H. Brockhaus, Ed. | |||
Internet-Draft D. von Oheimb | Internet-Draft D. von Oheimb | |||
Updates: 4210, 5912, 6712 (if approved) Siemens | Updates: 4210, 5912, 6712 (if approved) Siemens | |||
Intended status: Standards Track J. Gray | Intended status: Standards Track J. Gray | |||
Expires: 31 December 2022 Entrust | Expires: 13 January 2024 Entrust | |||
29 June 2022 | 12 July 2023 | |||
Certificate Management Protocol (CMP) Updates | Certificate Management Protocol (CMP) Updates | |||
draft-ietf-lamps-cmp-updates-23 | draft-ietf-lamps-cmp-updates-24 | |||
Abstract | Abstract | |||
This document contains a set of updates to the syntax and transfer of | This document contains a set of updates to the syntax and transfer of | |||
Certificate Management Protocol (CMP) version 2. This document | Certificate Management Protocol (CMP) version 2. This document | |||
updates RFC 4210, RFC 5912, and RFC 6712. | updates RFC 4210, RFC 5912, and RFC 6712. | |||
The aspects of CMP updated in this document are using EnvelopedData | The aspects of CMP updated in this document are using EnvelopedData | |||
instead of EncryptedValue, clarifying the handling of p10cr messages, | instead of EncryptedValue, clarifying the handling of p10cr messages, | |||
improving the crypto agility, as well as adding new general message | improving the crypto agility, as well as adding new general message | |||
skipping to change at page 1, line 45 ¶ | skipping to change at page 1, line 45 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on 31 December 2022. | This Internet-Draft will expire on 13 January 2024. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
license-info) in effect on the date of publication of this document. | license-info) in effect on the date of publication of this document. | |||
Please review these documents carefully, as they describe your rights | Please review these documents carefully, as they describe your rights | |||
and restrictions with respect to this document. Code Components | and restrictions with respect to this document. Code Components | |||
extracted from this document must include Revised BSD License text as | extracted from this document must include Revised BSD License text as | |||
described in Section 4.e of the Trust Legal Provisions and are | described in Section 4.e of the Trust Legal Provisions and are | |||
provided without warranty as described in the Revised BSD License. | provided without warranty as described in the Revised BSD License. | |||
skipping to change at page 4, line 29 ¶ | skipping to change at page 4, line 29 ¶ | |||
replaced, or added to the current text of the respective RFCs. | replaced, or added to the current text of the respective RFCs. | |||
The authors acknowledge that the style of the document is hard to | The authors acknowledge that the style of the document is hard to | |||
read because the original RFCs must be read along with this document | read because the original RFCs must be read along with this document | |||
to get the complete content. The working group decided to use this | to get the complete content. The working group decided to use this | |||
approach in order to keep the changes to RFC 4210 [RFC4210] and | approach in order to keep the changes to RFC 4210 [RFC4210] and | |||
RFC 6712 [RFC6712] to the required minimum. This was meant to speed | RFC 6712 [RFC6712] to the required minimum. This was meant to speed | |||
up the editorial process and to minimize the effort spent on | up the editorial process and to minimize the effort spent on | |||
reviewing the whole text of the original documents. | reviewing the whole text of the original documents. | |||
Nevertheless, in the meantime RFC4210bis [I-D.ietf-lamps-rfc4210bis] | ||||
and RFC6712bis [I-D.ietf-lamps-rfc6712bis] drafts were submitted | ||||
incorporating the changes listed in this document into the original | ||||
RFC text. | ||||
1.1. Convention and Terminology | 1.1. Convention and Terminology | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
capitals, as shown here. | capitals, as shown here. | |||
Technical terminology is used in conformance with RFC 4210 [RFC4210], | Technical terminology is used in conformance with RFC 4210 [RFC4210], | |||
RFC 4211 [RFC4211], and RFC 5280 [RFC5280]. The following key words | RFC 4211 [RFC4211], and RFC 5280 [RFC5280]. The following key words | |||
skipping to change at page 7, line 39 ¶ | skipping to change at page 7, line 39 ¶ | |||
itself. The CA may delegate its authorization by placing | itself. The CA may delegate its authorization by placing | |||
the id-kp-cmKGA extended key usage in the certificate used | the id-kp-cmKGA extended key usage in the certificate used | |||
to authenticate the origin of the generated private key. | to authenticate the origin of the generated private key. | |||
The authorization may also be determined through local | The authorization may also be determined through local | |||
configuration of the end entity. | configuration of the end entity. | |||
2.3. Update Section 5.1.1. - PKI Message Header | 2.3. Update Section 5.1.1. - PKI Message Header | |||
Section 5.1.1 of RFC 4210 [RFC4210] describes the PKI message header. | Section 5.1.1 of RFC 4210 [RFC4210] describes the PKI message header. | |||
This document introduces the new version 3 indicating support of | This document introduces the new version 3 indicating support of | |||
EnvelopedData as specified in Section 2.7. | EnvelopedData as specified in Section 2.7 and hashAlg as specified in | |||
Section 2.10. | ||||
Replace the ASN.1 Syntax of PKIHeader and the subsequent description | Replace the ASN.1 Syntax of PKIHeader and the subsequent description | |||
of pvno with the following text: | of pvno with the following text: | |||
PKIHeader ::= SEQUENCE { | PKIHeader ::= SEQUENCE { | |||
pvno INTEGER { cmp1999(1), cmp2000(2), | pvno INTEGER { cmp1999(1), cmp2000(2), | |||
cmp2021(3) }, | cmp2021(3) }, | |||
sender GeneralName, | sender GeneralName, | |||
recipient GeneralName, | recipient GeneralName, | |||
messageTime [0] GeneralizedTime OPTIONAL, | messageTime [0] GeneralizedTime OPTIONAL, | |||
skipping to change at page 11, line 39 ¶ | skipping to change at page 11, line 39 ¶ | |||
The content of the EnvelopedData structure, as specified in CMS | The content of the EnvelopedData structure, as specified in CMS | |||
section 6 [RFC5652], MUST be encrypted using a newly generated | section 6 [RFC5652], MUST be encrypted using a newly generated | |||
symmetric content-encryption key. This content-encryption key MUST | symmetric content-encryption key. This content-encryption key MUST | |||
be securely provided to the recipient using one of three key | be securely provided to the recipient using one of three key | |||
management techniques. | management techniques. | |||
The choice of the key management technique to be used by the sender | The choice of the key management technique to be used by the sender | |||
depends on the credential available at the recipient: | depends on the credential available at the recipient: | |||
* Recipient's certificate that contains a key usage extension | * Recipient's certificate with an algorithm identifier and a public | |||
asserting keyAgreement: The content-encryption key will be | key that supports key transport and where any given key usage | |||
protected using the key agreement key management technique, as | extension allows keyEncipherment: The content-encryption key will | |||
specified in CMS section 6.2.2 [RFC5652]. This is the preferred | be protected using the key transport key management technique, as | |||
technique. | specified in CMS Section 6.2.1 [RFC5652]. | |||
* Recipient's certificate that contains a key usage extension | * Recipient's certificate with an algorithm identifier and a public | |||
asserting keyEncipherment: The content-encryption key will be | key that supports key agreement and where any given key usage | |||
protected using the key transport key management technique, as | extension allows keyAgreement: The content-encryption key will be | |||
specified in CMS section 6.2.1 [RFC5652]. | protected using the key agreement key management technique, as | |||
specified in CMS Section 6.2.2 [RFC5652]. | ||||
* A password or shared secret: The content-encryption key will be | * A password or shared secret: The content-encryption key will be | |||
protected using the password-based key management technique, as | protected using the password-based key management technique, as | |||
specified in CMS section 6.2.4 [RFC5652]. | specified in CMS Section 6.2.4 [RFC5652]. | |||
2.8. New Section 5.2.9 - GeneralizedTime | 2.8. New Section 5.2.9 - GeneralizedTime | |||
The following subsection point implementers to [RFC5280] regarding | The following subsection point implementers to [RFC5280] regarding | |||
usage of GeneralizedTime. | usage of GeneralizedTime. | |||
Insert this section after Section 5.2.8.4: | Insert this section after Section 5.2.8.4: | |||
5.2.9 GeneralizedTime | 5.2.9 GeneralizedTime | |||
skipping to change at page 26, line 6 ¶ | skipping to change at page 26, line 6 ¶ | |||
Implementations must generate nonces and private keys from random | Implementations must generate nonces and private keys from random | |||
input. The use of inadequate pseudo-random number generators (PRNGs) | input. The use of inadequate pseudo-random number generators (PRNGs) | |||
to generate cryptographic keys can result in little or no security. | to generate cryptographic keys can result in little or no security. | |||
An attacker may find it much easier to reproduce the PRNG environment | An attacker may find it much easier to reproduce the PRNG environment | |||
that produced the keys and to search the resulting small set of | that produced the keys and to search the resulting small set of | |||
possibilities than brute-force searching the whole key space. As an | possibilities than brute-force searching the whole key space. As an | |||
example of predictable random numbers see [CVE-2008-0166]; | example of predictable random numbers see [CVE-2008-0166]; | |||
consequences of low-entropy random numbers are discussed in Mining | consequences of low-entropy random numbers are discussed in Mining | |||
Your Ps and Qs [MiningPsQs]. The generation of quality random | Your Ps and Qs [MiningPsQs]. The generation of quality random | |||
numbers is difficult. ISO/IEC 20543:2019 [ISO.20543-2019], NIST SP | numbers is difficult. ISO/IEC 20543:2019 [ISO.20543-2019], NIST SP | |||
800-90A Rev.1 [NIST.SP.800-90Ar1], BSI AIS 31 V2.0 [AIS31], and | 800-90A Rev.1 [NIST_SP_800_90Ar1], BSI AIS 31 V2.0 [AIS31], and | |||
others offer valuable guidance in this area. | others offer valuable guidance in this area. | |||
If shared secret information is generated by a cryptographically | If shared secret information is generated by a cryptographically | |||
secure random-number generator (CSRNG) it is safe to assume that the | secure random-number generator (CSRNG) it is safe to assume that the | |||
entropy of the shared secret information equals its bit length. If | entropy of the shared secret information equals its bit length. If | |||
no CSRNG is used, the entropy of a shared secret information depends | no CSRNG is used, the entropy of a shared secret information depends | |||
on the details of the generation process and cannot be measured | on the details of the generation process and cannot be measured | |||
securely after it has been generated. If user-generated passwords | securely after it has been generated. If user-generated passwords | |||
are used as shared secret information, their entropy cannot be | are used as shared secret information, their entropy cannot be | |||
measured and are typically insufficient for protected delivery of | measured and are typically insufficient for protected delivery of | |||
skipping to change at page 29, line 24 ¶ | skipping to change at page 29, line 24 ¶ | |||
-- * contains the subject and publicKey values, then poposkInput | -- * contains the subject and publicKey values, then poposkInput | |||
-- * MUST be omitted and the signature MUST be computed on the | -- * MUST be omitted and the signature MUST be computed on the | |||
-- * DER-encoded value of CertReqMsg certReq (or the DER- | -- * DER-encoded value of CertReqMsg certReq (or the DER- | |||
-- * encoded value of AltCertTemplate). If | -- * encoded value of AltCertTemplate). If | |||
-- * certTemplate/altCertTemplate does not contain both the | -- * certTemplate/altCertTemplate does not contain both the | |||
-- * subject and public key values (i.e., if it contains only | -- * subject and public key values (i.e., if it contains only | |||
-- * one of these, or neither), then poposkInput MUST be present | -- * one of these, or neither), then poposkInput MUST be present | |||
-- * and MUST be signed. | -- * and MUST be signed. | |||
-- ********** | -- ********** | |||
Replace the comment within the ASN.1 syntax coming after the | Replace the ASN.1 syntax of POPOPrivKey with the following text: | |||
definition of POPOPrivKey with the following text: | ||||
POPOPrivKey ::= CHOICE { | ||||
thisMessage [0] BIT STRING, -- deprecated | ||||
subsequentMessage [1] SubsequentMessage, | ||||
dhMAC [2] BIT STRING, -- deprecated | ||||
agreeMAC [3] PKMACValue, | ||||
encryptedKey [4] EnvelopedData } | ||||
-- ********** | -- ********** | |||
-- * the type of "thisMessage" is given as BIT STRING in RFC 4211 | -- * When using CMP V2 the encrypted value MUST be transferred in | |||
-- * [RFC4211]; it should be "EncryptedKey" (in accordance with | -- * the thisMessage field that is given as BIT STRING in [RFC4211] | |||
-- * Section 5.2.2 of this specification). Therefore, this | -- * but it requires EncryptedValue. Therefore, this document makes | |||
-- * document makes the behavioral clarification of specifying | -- * the behavioral clarification for CMP V2 of specifying that the | |||
-- * that the contents of "thisMessage" MUST be encoded either as | -- * contents of "thisMessage" MUST be encoded as an | |||
-- * "EnvelopedData" or "EncryptedValue" (only for backward | -- * EncryptedValue and then wrapped in a BIT STRING. | |||
-- * compatibility) and then wrapped in a BIT STRING. This | -- * When using CMP V3 the encrypted value MUST be transferred | |||
-- * allows the necessary conveyance and protection of the | -- * in the encryptedKey field as specified in Section 5.2.2. | |||
-- * private key while maintaining bits-on-the-wire compatibility | ||||
-- * with RFC4210 and [RFCXXXX]. | ||||
-- ********** | -- ********** | |||
2.28. Update Appendix D.1. - General Rules for Interpretation of These | 2.28. Update Appendix D.1. - General Rules for Interpretation of These | |||
Profiles | Profiles | |||
Appendix D.1 of RFC 4210 [RFC4210] provides general rules for | Appendix D.1 of RFC 4210 [RFC4210] provides general rules for | |||
interpretation of the PKI management messages profiles specified in | interpretation of the PKI management messages profiles specified in | |||
Appendix D and Appendix E of RFC 4210 [RFC4210]. This document | Appendix D and Appendix E of RFC 4210 [RFC4210]. This document | |||
updates a sentence regarding the new protocol version cmp2021. | updates a sentence regarding the new protocol version cmp2021. | |||
skipping to change at page 34, line 44 ¶ | skipping to change at page 34, line 45 ¶ | |||
We also thank all reviewers of this document for their valuable | We also thank all reviewers of this document for their valuable | |||
feedback. | feedback. | |||
7. References | 7. References | |||
7.1. Normative References | 7.1. Normative References | |||
[I-D.ietf-ace-cmpv2-coap-transport] | [I-D.ietf-ace-cmpv2-coap-transport] | |||
Sahni, M. and S. Tripathi, "CoAP Transfer for the | Sahni, M. and S. Tripathi, "CoAP Transfer for the | |||
Certificate Management Protocol", Work in Progress, | Certificate Management Protocol", Work in Progress, | |||
Internet-Draft, draft-ietf-ace-cmpv2-coap-transport-04, 8 | Internet-Draft, draft-ietf-ace-cmpv2-coap-transport-10, 15 | |||
November 2021, <https://datatracker.ietf.org/doc/html/ | May 2023, <https://datatracker.ietf.org/doc/html/draft- | |||
draft-ietf-ace-cmpv2-coap-transport-04>. | ietf-ace-cmpv2-coap-transport-10>. | |||
[I-D.ietf-lamps-cmp-algorithms] | [I-D.ietf-lamps-cmp-algorithms] | |||
Brockhaus, H., Aschauer, H., Ounsworth, M., and J. Gray, | Brockhaus, H., Aschauer, H., Ounsworth, M., and J. Gray, | |||
"Certificate Management Protocol (CMP) Algorithms", Work | "Certificate Management Protocol (CMP) Algorithms", Work | |||
in Progress, Internet-Draft, draft-ietf-lamps-cmp- | in Progress, Internet-Draft, draft-ietf-lamps-cmp- | |||
algorithms-15, 2 June 2022, | algorithms-15, 2 June 2022, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-lamps- | <https://datatracker.ietf.org/doc/html/draft-ietf-lamps- | |||
cmp-algorithms-15>. | cmp-algorithms-15>. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
skipping to change at page 37, line 14 ¶ | skipping to change at page 37, line 14 ¶ | |||
<https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ | <https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ | |||
Zertifizierung/Interpretationen/AIS_31_Functionality_class | Zertifizierung/Interpretationen/AIS_31_Functionality_class | |||
es_for_random_number_generators_e.pdf>. | es_for_random_number_generators_e.pdf>. | |||
[CVE-2008-0166] | [CVE-2008-0166] | |||
National Institute of Science and Technology (NIST), | National Institute of Science and Technology (NIST), | |||
"National Vulnerability Database - CVE-2008-0166", 13 May | "National Vulnerability Database - CVE-2008-0166", 13 May | |||
2008, <https://nvd.nist.gov/vuln/detail/CVE-2008-0166>. | 2008, <https://nvd.nist.gov/vuln/detail/CVE-2008-0166>. | |||
[I-D.ietf-lamps-lightweight-cmp-profile] | [I-D.ietf-lamps-lightweight-cmp-profile] | |||
Brockhaus, H., Oheimb, D. V., and S. Fries, "Lightweight | Brockhaus, H., von Oheimb, D., and S. Fries, "Lightweight | |||
Certificate Management Protocol (CMP) Profile", Work in | Certificate Management Protocol (CMP) Profile", Work in | |||
Progress, Internet-Draft, draft-ietf-lamps-lightweight- | Progress, Internet-Draft, draft-ietf-lamps-lightweight- | |||
cmp-profile-12, 13 May 2022, | cmp-profile-21, 17 February 2023, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-lamps- | <https://datatracker.ietf.org/doc/html/draft-ietf-lamps- | |||
lightweight-cmp-profile-12>. | lightweight-cmp-profile-21>. | |||
[IEEE.802.1AR_2018] | [I-D.ietf-lamps-rfc4210bis] | |||
IEEE, "IEEE Standard for Local and metropolitan area | Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray, | |||
networks - Secure Device Identity", IEEE 802.1AR-2018, | "Internet X.509 Public Key Infrastructure -- Certificate | |||
DOI 10.1109/IEEESTD.2018.8423794, 2 August 2018, | Management Protocol (CMP)", Work in Progress, Internet- | |||
<https://ieeexplore.ieee.org/document/8423794>. | Draft, draft-ietf-lamps-rfc4210bis-07, 19 June 2023, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-lamps- | ||||
rfc4210bis-07>. | ||||
[I-D.ietf-lamps-rfc6712bis] | ||||
Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray, | ||||
"Internet X.509 Public Key Infrastructure -- HTTP Transfer | ||||
for the Certificate Management Protocol (CMP)", Work in | ||||
Progress, Internet-Draft, draft-ietf-lamps-rfc6712bis-03, | ||||
10 February 2023, <https://datatracker.ietf.org/doc/html/ | ||||
draft-ietf-lamps-rfc6712bis-03>. | ||||
[ISO.20543-2019] | [ISO.20543-2019] | |||
International Organization for Standardization (ISO), | International Organization for Standardization (ISO), | |||
"Information technology -- Security techniques -- Test and | "Information technology -- Security techniques -- Test and | |||
analysis methods for random bit generators within ISO/IEC | analysis methods for random bit generators within ISO/IEC | |||
19790 and ISO/IEC 15408", ISO Draft Standard 20543-2019, | 19790 and ISO/IEC 15408", ISO Draft Standard 20543-2019, | |||
October 2019. | October 2019. | |||
[MiningPsQs] | [MiningPsQs] | |||
Security'12: Proceedings of the 21st USENIX conference on | Security'12: Proceedings of the 21st USENIX conference on | |||
Security symposium, Heninger, N., Durumeric, Z., Wustrow, | Security symposium, Heninger, N., Durumeric, Z., Wustrow, | |||
E., and J. A. Halderman, "Mining Your Ps and Qs: Detection | E., and J. A. Halderman, "Mining Your Ps and Qs: Detection | |||
of Widespread Weak Keys in Network Devices", August 2012, | of Widespread Weak Keys in Network Devices", August 2012, | |||
<https://www.usenix.org/conference/usenixsecurity12/ | <https://www.usenix.org/conference/usenixsecurity12/ | |||
technical-sessions/presentation/heninger>. | technical-sessions/presentation/heninger>. | |||
[NIST.SP.800-90Ar1] | [NIST_SP_800_90Ar1] | |||
Barker, Elaine B. and John M. Kelsey, "Recommendation for | Barker, E. B., Kelsey, J. M., and NIST, "Recommendation | |||
Random Number Generation Using Deterministic Random Bit | for Random Number Generation Using Deterministic Random | |||
Generators", NIST NIST SP 800-90Ar1, | Bit Generators", NIST Special Publications | |||
DOI 10.6028/NIST.SP.800-90Ar1, June 2015, | (General) 800-90Ar1, DOI 10.6028/NIST.SP.800-90Ar1, June | |||
2015, | ||||
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/ | <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/ | |||
NIST.SP.800-90Ar1.pdf>. | NIST.SP.800-90Ar1.pdf>. | |||
[PKCS11] RSA Laboratories, "The Public-Key Cryptography Standards - | [PKCS11] RSA Laboratories, "The Public-Key Cryptography Standards - | |||
Cryptographic Token Interface Standard. Version 2.10", | Cryptographic Token Interface Standard. Version 2.10", | |||
December 1999, | December 1999, | |||
<https://www.cryptsoft.com/pkcs11doc/STANDARD/ | <https://www.cryptsoft.com/pkcs11doc/STANDARD/ | |||
pkcs11v2-10.pdf>. | pkcs11v2-10.pdf>. | |||
[RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | [RFC2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed- | |||
skipping to change at page 65, line 41 ¶ | skipping to change at page 65, line 46 ¶ | |||
-- id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 } | -- id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 } | |||
id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp 32 } | id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp 32 } | |||
END | END | |||
Appendix B. History of Changes | Appendix B. History of Changes | |||
[RFC Editor: This appendix must be deleted in the final version of | [RFC Editor: This appendix must be deleted in the final version of | |||
the document.] | the document.] | |||
From version 23 -> 24: | ||||
* Added a note to Section 1 informing about rfc4210bis and | ||||
rfc6712bis activity | ||||
* Updated Section 2.7 on guidance which CMS key management technique | ||||
to use with encrypted values (see thread "CMS: selection of key | ||||
management technique to use for EnvelopedData") | ||||
* Updated Section 2.27 to align usage of EnvelopedData in | ||||
POPOPrivKey (see thread "draft-ietf-lamps-cmp-updates Section 2.27 | ||||
- Alignment with RFC4211 syntax") | ||||
From version 22 -> 23: | From version 22 -> 23: | |||
* Addressed comments from IESG discussion (see thread "Francesca | * Addressed comments from IESG discussion (see thread "Francesca | |||
Palombini's No Objection on draft-ietf-lamps-cmp-updates-22: (with | Palombini's No Objection on draft-ietf-lamps-cmp-updates-22: (with | |||
COMMENT)") | COMMENT)") | |||
* Addressed comment from Carl (see thread "Paul Wouters' Discuss on | * Addressed comment from Carl (see thread "Paul Wouters' Discuss on | |||
draft-ietf-lamps-cmp-updates-21: (with DISCUSS and COMMENT)") | draft-ietf-lamps-cmp-updates-21: (with DISCUSS and COMMENT)") | |||
From version 21 -> 22: | From version 21 -> 22: | |||
End of changes. 20 change blocks. | ||||
45 lines changed or deleted | 78 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |