<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-lamps-rfc7030-csrattrs-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="CSRAttrs">Clarification of RFC7030 CSR Attributes definition</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-lamps-rfc7030-csrattrs-04"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson" role="editor">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="O." surname="Friel" fullname="Owen Friel">
      <organization>Cisco</organization>
      <address>
        <email>ofriel@cisco.com</email>
      </address>
    </author>
    <author initials="D." surname="von Oheimb" fullname="Dr. David von Oheimb">
      <organization>Siemens</organization>
      <address>
        <email>dev@ddvo.net</email>
      </address>
    </author>
    <author initials="D." surname="Harkins" fullname="Dan Harkins">
      <organization>The Industrial Lounge</organization>
      <address>
        <email>dharkins@lounge.org</email>
      </address>
    </author>
    <date year="2022" month="July" day="24"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>The Enrollment over Secure Transport (EST, RFC7030) is ambiguous in its specification of the CSR Attributes Response. This has resulted in implementation challenges and implementor confusion.</t>
      <t>This document updates RFC7030 (EST) and clarifies how the CSR Attributes Response can be used by an EST server to specify both CSR attribute OIDs and also CSR attribute values that the server expects the client to include in subsequent CSR request.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Enrollment over Secure Transport <xref target="RFC7030"/> (EST) has been used in a wide variety of applications.
In particular, <xref target="RFC8994"/> and <xref target="RFC8995"/> describe a way to use it in order to build out an autonomic control plane (ACP) <xref target="RFC8368"/>.</t>
      <t>The ACP requires that each node be given a very specific SubjectAltName.
In the ACP specification, the solution was for the EST server to use section 2.6 of <xref target="RFC7030"/> to convey to the EST client the actual SubjectAltName that will end up in its certificate.</t>
      <t>As a result of some implementation challenges, it came to light that this particular way of using the CSR attributes was not universally agreed upon, and it was suggested that it went contrary to section 2.6.</t>
      <t>Section 2.6 says that the CSR attributes "provide additional descriptive information that the EST server cannot access itself".</t>
      <t>After significant discussion, it has been determined that <xref section="4.5" sectionFormat="of" target="RFC7030"/> specification is sufficiently difficult to read that clarification is needed.</t>
      <t>This document motivates the different use cases, and provides additional worked out examples.</t>
      <t>This document also updates section 4.5 to include revised ASN.1 that covers all uses and is backward compatible with the existing use.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="csr-attributes-handling">
      <name>CSR Attributes Handling</name>
      <section anchor="current-est-csr-attributes-specification">
        <name>Current EST CSR Attributes Specification</name>
        <t>The ASN.1 for CSR Attributes as defined in EST section 4.5.2 is:</t>
        <artwork><![CDATA[
   CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID

   AttrOrOID ::= CHOICE (oid OBJECT IDENTIFIER, attribute Attribute }

   Attribute { ATTRIBUTE:IOSet } ::= SEQUENCE {
        type   ATTRIBUTE.&id({IOSet}),
        values SET SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{@type}) }
]]></artwork>
      </section>
      <section anchor="revisedsimplified-est-csr-attributes-specification">
        <name>Revised/Simplified EST CSR Attributes Specification</name>
        <t>(XXX: This isn't really simpler, is it?)</t>
        <artwork><![CDATA[
   CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID

   AttrOrOID ::= CHOICE (oid OBJECT IDENTIFIER,
                         attribute Attribute }

   Attribute { ATTRIBUTE:IOSet } ::= SEQUENCE {
        extType  ATTRIBUTE.&id({IOSet}),
        extAttr  SET SIZE(1..MAX) OF ATTRIBUTE.&Type({IOSet}{@type})
   }
]]></artwork>
        <t>A key part that was unclear is that extAttr above could be an entire
Extension, as per <xref section="4.2" sectionFormat="of" target="RFC5280"/>.
This structure naturally includes both the extention ID, a critical bit, and the extension value.</t>
        <t>The extType for such an extension would be "ExtensionRequest" (extReq), which is OID 1.2.840.113549.1.9.14.</t>
        <artwork><![CDATA[
   Extensions  ::=  SEQUENCE SIZE (1..MAX) OF Extension

   Extension  ::=  SEQUENCE  {
        extnID      OBJECT IDENTIFIER,
        critical    BOOLEAN DEFAULT FALSE,
        extnValue   OCTET STRING
                    -- contains the DER encoding of an ASN.1 value
                    -- corresponding to the extension type identified
                    -- by extnID
        }
]]></artwork>
        <t>With this understand, the needs of <xref target="RFC8994"/> and <xref target="RFC8995"/> are satisfied, however with a change to the bits on the wire.</t>
      </section>
    </section>
    <section anchor="co-existence-with-existing-implementations">
      <name>Co-existence with existing implementations</name>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="rfc8994acp-subjectaltname-with-specific-othername-included">
        <name>RFC8994/ACP subjectAltName with specific otherName included</name>
        <t>This is a dump in "dumpasn1" format of a CSR Attributes object which a specific otherName included.</t>
        <artwork><![CDATA[
  0  90: SEQUENCE {
  2  88:   SEQUENCE {
  4   9:     OBJECT IDENTIFIER extensionRequest (1 2 840 113549 1 9 14)
 15  75:     SET {
 17  73:       SEQUENCE {
 19   3:         OBJECT IDENTIFIER subjectAltName (2 5 29 17)
 24   3:         [0] {
 26   1:           BOOLEAN TRUE
       :           }
 29  61:         SEQUENCE {
 31  59:           [0] {
 33  57:             UTF8String
       :               'rfc8994+fd739fc23c3440112233445500000000+@acp.ex'
       :               'ample.com'
       :             }
       :           }
       :         }
       :       }
       :     }
       :   }
]]></artwork>
      </section>
      <section anchor="est-server-requires-public-keys-of-a-specific-size">
        <name>EST server requires public keys of a specific size</name>
        <t>TBD</t>
      </section>
      <section anchor="est-server-requires-a-public-key-of-a-specific-algorithmcurve">
        <name>EST server requires a public key of a specific algorithm/curve</name>
        <t>TBD</t>
      </section>
      <section anchor="est-server-requires-a-specific-extension-to-be-present">
        <name>EST server requires a specific extension to be present</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>All security considertions from EST <xref target="RFC7030"/> section 6 are applicable.</t>
      <section anchor="identity-and-privacy-considerations">
        <name>Identity and Privacy Considerations</name>
        <t>An EST server may use this mechanism to instruct the EST client about the identities it should include in the CSR it sends as part of enrollment.
The client may only be aware of its IDevID Subject, which includes a manufacturer serial number.
The EST server can use this mechanism to tell the client to include a specific fully qualified domain name in the CSR in order to complete domain ownership proofs required by the CA.
Additionally, the EST server may deem the manufacturer serial number in an IDevID as personally identifiable information, and may want to specify a new random opaque identifier that the pledge should use in its CSR.
This may be desirable if the CA and EST server have different operators.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>No requests are made to IANA.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TODO</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8994" target="https://www.rfc-editor.org/info/rfc8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer">
              <organization/>
            </author>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing.  This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration.  This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions.  It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8368" target="https://www.rfc-editor.org/info/rfc8368">
          <front>
            <title>Using an Autonomic Control Plane for Stable Connectivity of Network Operations, Administration, and Maintenance (OAM)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>Operations, Administration, and Maintenance (OAM), as per BCP 161, for data networks is often subject to the problem of circular dependencies when relying on connectivity provided by the network to be managed for the OAM purposes.</t>
              <t>Provisioning while bringing up devices and networks tends to be more difficult to automate than service provisioning later on.  Changes in core network functions impacting reachability cannot be automated because of ongoing connectivity requirements for the OAM equipment itself, and widely used OAM protocols are not secure enough to be carried across the network without security concerns.</t>
              <t>This document describes how to integrate OAM processes with an autonomic control plane in order to provide stable and secure connectivity for those OAM processes.  This connectivity is not subject to the aforementioned circular dependencies.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8368"/>
          <seriesInfo name="DOI" value="10.17487/RFC8368"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
