GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


rfc:rfc9480



Internet Engineering Task Force (IETF) H. Brockhaus Request for Comments: 9480 D. von Oheimb Updates: 4210, 5912, 6712 Siemens Category: Standards Track J. Gray ISSN: 2070-1721 Entrust

                                                         November 2023
           Certificate Management Protocol (CMP) Updates

Abstract

 This document contains a set of updates to the syntax of Certificate
 Management Protocol (CMP) version 2 and its HTTP transfer mechanism.
 This document updates RFCs 4210, 5912, and 6712.
 The aspects of CMP updated in this document are using EnvelopedData
 instead of EncryptedValue, clarifying the handling of p10cr messages,
 improving the crypto agility, as well as adding new general message
 types, extended key usages to identify certificates for use with CMP,
 and well-known URI path segments.
 CMP version 3 is introduced to enable signaling support of
 EnvelopedData instead of EncryptedValue and signal the use of an
 explicit hash AlgorithmIdentifier in certConf messages, as far as
 needed.

Status of This Memo

 This is an Internet Standards Track document.
 This document is a product of the Internet Engineering Task Force
 (IETF).  It represents the consensus of the IETF community.  It has
 received public review and has been approved for publication by the
 Internet Engineering Steering Group (IESG).  Further information on
 Internet Standards is available in Section 2 of RFC 7841.
 Information about the current status of this document, any errata,
 and how to provide feedback on it may be obtained at
 https://www.rfc-editor.org/info/rfc9480.

Copyright Notice

 Copyright (c) 2023 IETF Trust and the persons identified as the
 document authors.  All rights reserved.
 This document is subject to BCP 78 and the IETF Trust's Legal
 Provisions Relating to IETF Documents
 (https://trustee.ietf.org/license-info) in effect on the date of
 publication of this document.  Please review these documents
 carefully, as they describe your rights and restrictions with respect
 to this document.  Code Components extracted from this document must
 include Revised BSD License text as described in Section 4.e of the
 Trust Legal Provisions and are provided without warranty as described
 in the Revised BSD License.

Table of Contents

 1.  Introduction
   1.1.  Convention and Terminology
 2.  Updates to RFC 4210 - Certificate Management Protocol (CMP)
   2.1.  New Section 1.1 - Changes Since RFC 4210
   2.2.  New Section 4.5 - Extended Key Usage
   2.3.  Update Section 5.1.1 - PKI Message Header
   2.4.  New Section 5.1.1.3 - CertProfile
   2.5.  Update Section 5.1.3.1 - Shared Secret Information
   2.6.  Replace Section 5.1.3.4 - Multiple Protection
   2.7.  Replace Section 5.2.2 - Encrypted Values
   2.8.  New Section 5.2.9 - GeneralizedTime
   2.9.  Update Section 5.3.4 - Certification Response
   2.10. Update Section 5.3.18 - Certificate Confirmation Content
   2.11. Update Section 5.3.19.2 - Signing Key Pair Types
   2.12. Update Section 5.3.19.3 - Encryption/Key Agreement Key Pair
          Types
   2.13. Replace Section 5.3.19.9 - Revocation Passphrase
   2.14. New Section 5.3.19.14 - CA Certificates
   2.15. New Section 5.3.19.15 - Root CA Certificate Update
   2.16. New Section 5.3.19.16 - Certificate Request Template
   2.17. New Section 5.3.19.17 - CRL Update Retrieval
   2.18. Update Section 5.3.21 - Error Message Content
   2.19. Replace Section 5.3.22 - Polling Request and Response
   2.20. Update Section 7 - Version Negotiation
   2.21. Update Section 7.1.1 - Clients Talking to RFC 2510 Servers
   2.22. Add Section 8.4 - Private Keys for Certificate Signing and
          CMP Message Protection
   2.23. Add Section 8.5 - Entropy of Random Numbers, Key Pairs, and
          Shared Secret Information
   2.24. Add Section 8.6 - Trust Anchor Provisioning Using CMP
          Messages
   2.25. Add Section 8.7 - Authorizing Requests for Certificates
          with Specific EKUs
   2.26. Update Appendix B - The Use of Revocation Passphrase
   2.27. Update Appendix C - Request Message Behavioral
          Clarifications
   2.28. Update Appendix D.1. - General Rules for Interpretation of
          These Profiles
   2.29. Update Appendix D.2. - Algorithm Use Profile
   2.30. Update Appendix D.4. - Initial Registration/Certification
          (Basic Authenticated Scheme)
 3.  Updates to RFC 6712 - HTTP Transfer for the Certificate
         Management Protocol (CMP)
   3.1.  Update Section 1 - Introduction
   3.2.  New Section 1.1 - Changes Since RFC 6712
   3.3.  Replace Section 3.6 - HTTP Request-URI
 4.  IANA Considerations
   4.1.  Updates to the ASN.1 Modules in RFCs 4210 and 5912
   4.2.  Updates to the IANA Considerations of RFC 4210
     4.2.1.  SMI Security for PKIX Extended Key Purpose Registry
     4.2.2.  SMI Security for PKIX CMP Information Types
     4.2.3.  SMI Security for PKIX CRMF Registration Controls
   4.3.  Updates to the IANA Considerations of RFC 6712
     4.3.1.  Well-Known URIs
     4.3.2.  Certificate Management Protocol (CMP) Registry
 5.  Security Considerations
 6.  References
   6.1.  Normative References
   6.2.  Informative References
 Appendix A.  ASN.1 Modules
   A.1.  Update to RFC 4210 - 1988 ASN.1 Module
   A.2.  Update to RFC 5912 - 2002 ASN.1 Module
 Acknowledgements
 Authors' Addresses

1. Introduction

 While using CMP [RFC4210] in industrial and Internet of Things
 environments and developing the Lightweight CMP Profile [RFC9483],
 some limitations were identified in the original CMP specification.
 This document updates [RFC4210] and [RFC6712] to overcome these
 limitations.
 Among other updates, this document improves the crypto agility of
 CMP, which allows more flexibility for future advances in
 cryptography.
 This document also introduces new extended key usages to identify CMP
 endpoints on registration and certification authorities.
 The main content of [RFC4210] and [RFC6712] remains unchanged.  This
 document lists all sections that are updated, replaced, or added to
 the current text of the respective RFCs.
 The authors acknowledge that the style of the document is hard to
 read because the original RFCs must be read along with this document
 to get the complete content.  The working group decided to use this
 approach in order to keep the changes to [RFC4210] and [RFC6712] to
 the required minimum.  This was meant to speed up the editorial
 process and to minimize the effort spent on reviewing the full text
 of the original documents.
 However, [PKIX-CMP] and [HTTP-CMP] are intended to obsolete RFCs 4210
 and 6712, respectively; these documents also include the changes
 listed in this document.

1.1. Convention and Terminology

 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
 "OPTIONAL" in this document are to be interpreted as described in
 BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
 capitals, as shown here.
 Technical terminology is used in conformance with [RFC4210],
 [RFC4211], and [RFC5280].  The following key words are used:
 CA:    Certification authority, which issues certificates.
 RA:    Registration authority, an optional system component to which
        a CA delegates certificate management functions, such as
        authorization checks.
 KGA:   Key generation authority, which generates key pairs on behalf
        of an EE.  The KGA could be colocated with an RA or a CA.
 EE:    End entity, a user, device, or service that holds a PKI
        certificate.  An identifier for the EE is given as its subject
        of the certificate.

2. Updates to RFC 4210 - Certificate Management Protocol (CMP)

2.1. New Section 1.1 - Changes Since RFC 4210

 The following subsection describes feature updates to [RFC4210].
 They are always related to the base specification.  Hence, references
 to the original sections in [RFC4210] are used whenever possible.
 Insert this section after the current Section 1 of [RFC4210]:
 1.1.  Changes Since RFC 4210
 The following updates are made in this document:
  • Adding new extended key usages for various CMP server types, e.g.,

registration authority and certification authority, to express the

    authorization of the entity identified in the certificate
    containing the respective extended key usage extension that acts
    as the indicated PKI management entity.
  • Extending the description of multiple protection to cover

additional use cases, e.g., batch processing of messages.

  • Offering EnvelopedData as the preferred choice next to

EncryptedValue to better support crypto agility in CMP. Note

    that, according to [RFC4211], Section 2.1, point 9, the use of the
    EncryptedValue structure has been deprecated in favor of the
    EnvelopedData structure.  [RFC4211] offers the EncryptedKey
    structure a choice of EncryptedValue and EnvelopedData for
    migration to EnvelopedData.  For reasons of completeness and
    consistency, the type EncryptedValue has been exchanged in all
    occurrences in [RFC4210].  This includes the protection of
    centrally generated private keys, encryption of certificates, and
    protection of revocation passphrases.  To properly differentiate
    the support of EnvelopedData instead of EncryptedValue, CMP
    version 3 is introduced in case a transaction is supposed to use
    EnvelopedData.
  • Offering an optional hashAlg field in CertStatus that supports

confirmation of certificates signed with signature algorithms,

    e.g., preparing for upcoming post quantum algorithms, not directly
    indicating a specific hash algorithm to use to compute the
    certHash.
  • Adding new general message types to request CA certificates, a

root CA update, a certificate request template, or a Certificate

    Revocation List (CRL) update.
  • Extending the usage of polling to p10cr, certConf, rr, genm, and

error messages.

  • Deleting the mandatory algorithm profile in Appendix D.2 of

[RFC4210] and referring to Section 7 of CMP Algorithms [RFC9481].

2.2. New Section 4.5 - Extended Key Usage

 The following subsection introduces a new extended key usage for CMP
 servers authorized to centrally generate key pairs on behalf of end
 entities.
 Insert this section after Section 4.4.3 of [RFC4210]:
 4.5.  Extended Key Usage
 The extended key usage (EKU) extension indicates the purposes for
 which the certified key pair may be used.  Therefore, it restricts
 the use of a certificate to specific applications.
 A CA may want to delegate parts of its duties to other PKI management
 entities.  This section provides a mechanism to both prove this
 delegation and enable an automated means for checking the
 authorization of this delegation.  Such delegation may also be
 expressed by other means, e.g., explicit configuration.
 To offer automatic validation for the delegation of a role by a CA to
 another entity, the certificates used for CMP message protection or
 signed data for central key generation MUST be issued by the
 delegating CA and MUST contain the respective EKUs.  This proves the
 authorization of this entity by delegating CA to act in the given
 role, as described below.
 The OIDs to be used for these EKUs are:
    id-kp-cmcCA OBJECT IDENTIFIER ::= {
       iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) kp(3) 27 }
    id-kp-cmcRA OBJECT IDENTIFIER ::= {
       iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) kp(3) 28 }
    id-kp-cmKGA OBJECT IDENTIFIER ::= {
       iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) kp(3) 32 }
 Note: Section 2.10 of [RFC6402] specifies OIDs for a Certificate
 Management over CMS (CMC) CA and a CMC RA.  As the functionality of a
 CA and RA is not specific to any certificate management protocol
 (such as CMC or CMP), these EKUs are reused by CMP.
 The meaning of the id-kp-cmKGA EKU is as follows:
 CMP KGA:  CMP key generation authorities are CAs or are identified by
           the id-kp-cmKGA extended key usage.  The CMP KGA knows the
           private key it generated on behalf of the end entity.  This
           is a very sensitive service and needs specific
           authorization, which by default is with the CA certificate
           itself.  The CA may delegate its authorization by placing
           the id-kp-cmKGA extended key usage in the certificate used
           to authenticate the origin of the generated private key.
           The authorization may also be determined through local
           configuration of the end entity.

2.3. Update Section 5.1.1 - PKI Message Header

 Section 5.1.1 of [RFC4210] describes the PKI message header.  This
 document introduces the new version 3, indicating support of
 EnvelopedData as specified in Section 2.7 and hashAlg as specified in
 Section 2.10.
 Replace the ASN.1 syntax of PKIHeader and the subsequent description
 of pvno with the following text:
    PKIHeader ::= SEQUENCE {
       pvno                INTEGER     { cmp1999(1), cmp2000(2),
                                         cmp2021(3) },
       sender              GeneralName,
       recipient           GeneralName,
       messageTime     [0] GeneralizedTime         OPTIONAL,
       protectionAlg   [1] AlgorithmIdentifier{ALGORITHM, {...}}
                           OPTIONAL,
       senderKID       [2] KeyIdentifier           OPTIONAL,
       recipKID        [3] KeyIdentifier           OPTIONAL,
       transactionID   [4] OCTET STRING            OPTIONAL,
       senderNonce     [5] OCTET STRING            OPTIONAL,
       recipNonce      [6] OCTET STRING            OPTIONAL,
       freeText        [7] PKIFreeText             OPTIONAL,
       generalInfo     [8] SEQUENCE SIZE (1..MAX) OF
                           InfoTypeAndValue     OPTIONAL
    }
    PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
 The usage of the protocol version number (pvno) is described in
 Section 7.

2.4. New Section 5.1.1.3 - CertProfile

 Section 5.1.1 of [RFC4210] defines the PKIHeader and id-it OIDs to be
 used in the generalInfo field.  This section introduces id-it-
 certProfile.
 Insert this section after Section 5.1.1.2 of [RFC4210]:
 5.1.1.3.  CertProfile
 This is used by the EE to indicate specific certificate profiles,
 e.g., when requesting a new certificate or a certificate request
 template; see Section 5.3.19.16.
    id-it-certProfile  OBJECT IDENTIFIER ::= {id-it 21}
    CertProfileValue ::= SEQUENCE SIZE (1..MAX) OF UTF8String
 When used in an ir/cr/kur/genm, the value MUST NOT contain more
 elements than the number of CertReqMsg or InfoTypeAndValue elements
 and the certificate profile names refer to the elements in the given
 order.
 When used in a p10cr, the value MUST NOT contain multiple certificate
 profile names.

2.5. Update Section 5.1.3.1 - Shared Secret Information

 Section 5.1.3.1 of [RFC4210] describes the protection of a PKIMessage
 based on message authentication code (MAC) using the algorithm id-
 PasswordBasedMac.
 Replace the first paragraph with the following text:
 In this case, the sender and recipient share secret information with
 sufficient entropy (established via out-of-band means or from a
 previous PKI management operation).  PKIProtection will contain a MAC
 value and the protectionAlg MAY be one of the options described in
 CMP Algorithms [RFC9481].  The PasswordBasedMac is specified as
 follows (see also [RFC4211] and [RFC9045]):
 Replace the last paragraph with the following text (Note: This fixes
 Errata ID 2616):
 Note: It is RECOMMENDED that the fields of PBMParameter remain
 constant throughout the messages of a single transaction (e.g.,
 ir/ip/certConf/pkiConf) to reduce the overhead associated with
 PasswordBasedMac computation.

2.6. Replace Section 5.1.3.4 - Multiple Protection

 Section 5.1.3.4 of [RFC4210] describes the nested message.  This
 document also enables using nested messages for batch-delivery
 transport of PKI messages between PKI management entities and with
 mixed body types.
 Replace the text of the section with the following text:
 5.1.3.4.  Multiple Protection
 When receiving a protected PKI message, a PKI management entity, such
 as an RA, MAY forward that message along with adding its own
 protection (which is a MAC or a signature, depending on the
 information and certificates shared between the RA and the CA).
 Additionally, multiple PKI messages MAY be aggregated.  There are
 several use cases for such messages.
  • The RA confirms having validated and authorized a message and

forwards the original message unchanged.

  • The RA modifies the message(s) in some way (e.g., adds or modifies

particular field values or adds new extensions) before forwarding

    them; then, it MAY create its own desired PKIBody.  If the changes
    made by the RA to PKIMessage break the POP of a certificate
    request, the RA MUST set the popo field to RAVerified.  It MAY
    include the original PKIMessage from the EE in the generalInfo
    field of PKIHeader of a nested message (to accommodate, for
    example, cases in which the CA wishes to check POP or other
    information on the original EE message).  The infoType to be used
    in this situation is {id-it 15} (see Section 5.3.19 for the value
    of id-it), and the infoValue is PKIMessages (contents MUST be in
    the same order as the message in PKIBody).
  • A PKI management entity collects several messages that are to be

forwarded in the same direction and forwards them in a batch.

    Request messages can be transferred as batch upstream (towards the
    CA); response or announce messages can be transferred as batch
    downstream (towards an RA but not to the EE).  For instance, this
    can be used when bridging an off-line connection between two PKI
    management entities.
 These use cases are accomplished by nesting the messages within a new
 PKI message.  The structure used is as follows:
    NestedMessageContent ::= PKIMessages

2.7. Replace Section 5.2.2 - Encrypted Values

 Section 5.2.2 of [RFC4210] describes the use of EncryptedValue to
 transport encrypted data.  This document extends the encryption of
 data to preferably use EnvelopedData.
 Replace the text of the section with the following text:
 5.2.2.  Encrypted Values
 Where encrypted data (in this specification, private keys,
 certificates, or revocation passphrase) is sent in PKI messages, the
 EncryptedKey data structure is used.
    EncryptedKey ::= CHOICE {
       encryptedValue        EncryptedValue, -- deprecated
       envelopedData     [0] EnvelopedData }
 See Certificate Request Message Format (CRMF) [RFC4211] for
 EncryptedKey and EncryptedValue syntax and Cryptographic Message
 Syntax (CMS) [RFC5652] for EnvelopedData syntax.  Using the
 EncryptedKey data structure offers the choice to either use
 EncryptedValue (for backward compatibility only) or EnvelopedData.
 The use of the EncryptedValue structure has been deprecated in favor
 of the EnvelopedData structure.  Therefore, it is RECOMMENDED to use
 EnvelopedData.
 Note: The EncryptedKey structure defined in CRMF [RFC4211] is reused
 here, which makes the update backward compatible.  Using the new
 syntax with the untagged default choice EncryptedValue is bits-on-
 the-wire compatible with the old syntax.
 To indicate support for EnvelopedData, the pvno cmp2021 has been
 introduced.  Details on the usage of the protocol version number
 (pvno) are described in Section 7.
 The EncryptedKey data structure is used in CMP to transport a private
 key, certificate, or revocation passphrase in encrypted form.
 EnvelopedData is used as follows:
  • It contains only one RecipientInfo structure because the content

is encrypted only for one recipient.

  • It may contain a private key in the AsymmetricKeyPackage

structure, as defined in [RFC5958], that is wrapped in a

    SignedData structure, as specified in Section 5 of CMS [RFC5652]
    and [RFC8933], and signed by the Key Generation Authority.
  • It may contain a certificate or revocation passphrase directly in

the encryptedContent field.

 The content of the EnvelopedData structure, as specified in Section 6
 of CMS [RFC5652], MUST be encrypted using a newly generated symmetric
 content-encryption key.  This content-encryption key MUST be securely
 provided to the recipient using one of three key management
 techniques.
 The choice of the key management technique to be used by the sender
 depends on the credential available at the recipient:
  • recipient's certificate with an algorithm identifier and a public

key that supports key transport and where any given key usage

    extension allows keyEncipherment: The content-encryption key will
    be protected using the key transport key management technique, as
    specified in Section 6.2.1 of CMS [RFC5652].
  • recipient's certificate with an algorithm identifier and a public

key that supports key agreement and where any given key usage

    extension allows keyAgreement: The content-encryption key will be
    protected using the key agreement key management technique, as
    specified in Section 6.2.2 of CMS [RFC5652].
  • a password or shared secret: The content-encryption key will be

protected using the password-based key management technique, as

    specified in Section 6.2.4 of CMS [RFC5652].

2.8. New Section 5.2.9 - GeneralizedTime

 The following subsection points implementers to [RFC5280] regarding
 usage of GeneralizedTime.
 Insert this section after Section 5.2.8.4 of [RFC4210]:
 5.2.9 GeneralizedTime
 GeneralizedTime is a standard ASN.1 type and SHALL be used as
 specified in Section 4.1.2.5.2 of [RFC5280].

2.9. Update Section 5.3.4 - Certification Response

 Section 5.3.4 of [RFC4210] describes the Certification Response.
 This document updates the syntax by using the parent structure
 EncryptedKey instead of EncryptedValue, as described in Section 2.7
 above.  Additionally, it clarifies the certReqId to be used in
 response to a p10cr message.
 Replace the ASN.1 syntax with the following text (Note: This also
 fixes Errata ID 3949 and 4078):
    CertRepMessage ::= SEQUENCE {
        caPubs          [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                            OPTIONAL,
        response            SEQUENCE OF CertResponse
    }
    CertResponse ::= SEQUENCE {
        certReqId           INTEGER,
        status              PKIStatusInfo,
        certifiedKeyPair    CertifiedKeyPair    OPTIONAL,
        rspInfo             OCTET STRING        OPTIONAL
        -- analogous to the id-regInfo-utf8Pairs string defined
        -- for regInfo in CertReqMsg [RFC4211]
    }
    CertifiedKeyPair ::= SEQUENCE {
       certOrEncCert       CertOrEncCert,
       privateKey      [0] EncryptedKey        OPTIONAL,
       -- See [RFC4211] for comments on encoding.
       publicationInfo [1] PKIPublicationInfo  OPTIONAL
    }
    CertOrEncCert ::= CHOICE {
       certificate     [0] CMPCertificate,
       encryptedCert   [1] EncryptedKey
    }
 Add the following as a new paragraph right after the ASN.1 syntax:
 A p10cr message contains exactly one CertificationRequestInfo data
 structure, as specified in PKCS #10 [RFC2986], but no certReqId.
 Therefore, the certReqId in the corresponding Certification Response
 (cp) message MUST be set to -1.
 Add the following as new paragraphs to the end of the section:
 The use of EncryptedKey is described in Section 5.2.2.
 Note: To indicate support for EnvelopedData, the pvno cmp2021 has
 been introduced.  Details on the usage of different protocol version
 numbers (pvno) are described in Section 7.

2.10. Update Section 5.3.18 - Certificate Confirmation Content

 This section introduces an optional hashAlg field to the CertStatus
 type used in certConf messages to explicitly specify the hash
 algorithm for those certificates where no hash algorithm is specified
 in the signatureAlgorithm field.
 Replace the ASN.1 Syntax of CertStatus with the following text:
    CertStatus ::= SEQUENCE {
       certHash    OCTET STRING,
       certReqId   INTEGER,
       statusInfo  PKIStatusInfo OPTIONAL,
       hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}
                   OPTIONAL
    }
 The hashAlg field SHOULD be used only in exceptional cases where the
 signatureAlgorithm of the certificate to be confirmed does not
 specify a hash algorithm in the OID or in the parameters.  In such
 cases, e.g., for EdDSA, the hashAlg MUST be used to specify the hash
 algorithm to be used for calculating the certHash value.  Otherwise,
 the certHash value SHALL be computed using the same hash algorithm as
 used to create and verify the certificate signature.  If hashAlg is
 used, the CMP version indicated by the certConf message header must
 be cmp2021(3).

2.11. Update Section 5.3.19.2 - Signing Key Pair Types

 The following section clarifies the usage of the Signing Key Pair
 Types on referencing elliptic curves.
 Insert this note at the end of Section 5.3.19.2 of [RFC4210]:
 Note: In case several elliptic curves are supported, several id-
 ecPublicKey elements as defined in [RFC5480] need to be given, one
 per named curve.

2.12. Update Section 5.3.19.3 - Encryption/Key Agreement Key Pair Types

 The following section clarifies the use of the Encryption/Key
 Agreement Key Pair Types on referencing elliptic curves.
 Insert this note at the end of Section 5.3.19.3 of [RFC4210]:
 Note: In case several elliptic curves are supported, several id-
 ecPublicKey elements as defined in [RFC5480] need to be given, one
 per named curve.

2.13. Replace Section 5.3.19.9 - Revocation Passphrase

 Section 5.3.19.9 of [RFC4210] describes the provisioning of a
 revocation passphrase for authenticating a later revocation request.
 This document updates the handling by using the parent structure
 EncryptedKey instead of EncryptedValue to transport this information,
 as described in Section 2.7 above.
 Replace the text of the section with the following text:
 5.3.19.9.  Revocation Passphrase
 This MAY be used by the EE to send a passphrase to a CA/RA for the
 purpose of authenticating a later revocation request (in the case
 that the appropriate signing private key is no longer available to
 authenticate the request).  See Appendix B for further details on the
 use of this mechanism.
    GenMsg:    {id-it 12}, EncryptedKey
    GenRep:    {id-it 12}, < absent >
 The use of EncryptedKey is described in Section 5.2.2.

2.14. New Section 5.3.19.14 - CA Certificates

 The following subsection describes PKI general messages using id-it-
 caCerts.  The intended use is specified in Section 4.3 of the
 Lightweight CMP Profile [RFC9483].
 Insert this section after Section 5.3.19.13 of [RFC4210]:
 5.3.19.14.  CA Certificates
 This MAY be used by the client to get CA certificates.
    GenMsg:    {id-it 17}, < absent >
    GenRep:    {id-it 17}, SEQUENCE SIZE (1..MAX) OF
                           CMPCertificate | < absent >

2.15. New Section 5.3.19.15 - Root CA Certificate Update

 The following subsection describes PKI general messages using id-it-
 rootCaCert and id-it-rootCaKeyUpdate.  The use is specified in
 Section 4.3 of the Lightweight CMP Profile [RFC9483].
 Insert this section after the new Section 5.3.19.14:
 5.3.19.15.  Root CA Certificate Update
 This MAY be used by the client to get an update of a root CA
 certificate, which is provided in the body of the request message.
 In contrast to the ckuann message, this approach follows the request/
 response model.
 The EE SHOULD reference its current trust anchor in a TrustAnchor
 structure in the request body, giving the root CA certificate if
 available; otherwise, the public key value of the trust anchor is
 given.
    GenMsg:    {id-it 20}, RootCaCertValue | < absent >
    GenRep:    {id-it 18}, RootCaKeyUpdateContent | < absent >
    RootCaCertValue ::= CMPCertificate
    RootCaKeyUpdateValue ::= RootCaKeyUpdateContent
    RootCaKeyUpdateContent ::= SEQUENCE {
       newWithNew       CMPCertificate,
       newWithOld   [0] CMPCertificate OPTIONAL,
       oldWithNew   [1] CMPCertificate OPTIONAL
       }
 Note: In contrast to CAKeyUpdAnnContent, this type offers omitting
 newWithOld and oldWithNew in the GenRep message, depending on the
 needs of the EE.

2.16. New Section 5.3.19.16 - Certificate Request Template

 The following subsection introduces the PKI general message using id-
 it-certReqTemplate.  Details are specified in Section 4.3 of the
 Lightweight CMP Profile [RFC9483].
 Insert this section after the new Section 5.3.19.15:
 5.3.19.16.  Certificate Request Template
 This MAY be used by the client to get a template containing
 requirements for certificate request attributes and extensions.  The
 controls id-regCtrl-algId and id-regCtrl-rsaKeyLen MAY contain
 details on the types of subject public keys the CA is willing to
 certify.
 The id-regCtrl-algId control MAY be used to identify a cryptographic
 algorithm (see Section 4.1.2.7 of [RFC5280]) other than
 rsaEncryption.  The algorithm field SHALL identify a cryptographic
 algorithm.  The contents of the optional parameters field will vary
 according to the algorithm identified.  For example, when the
 algorithm is set to id-ecPublicKey, the parameters identify the
 elliptic curve to be used; see [RFC5480].
 The id-regCtrl-rsaKeyLen control SHALL be used for algorithm
 rsaEncryption and SHALL contain the intended modulus bit length of
 the RSA key.
    GenMsg:    {id-it 19}, < absent >
    GenRep:    {id-it 19}, CertReqTemplateContent | < absent >
    CertReqTemplateValue  ::= CertReqTemplateContent
    CertReqTemplateContent ::= SEQUENCE {
      certTemplate           CertTemplate,
      keySpec                Controls OPTIONAL }
    Controls  ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
    id-regCtrl-algId OBJECT IDENTIFIER ::= { iso(1)
       identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) pkip(5) regCtrl(1) 11 }
    AlgIdCtrl ::= AlgorithmIdentifier{ALGORITHM, {...}}
    id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { iso(1)
       identified-organization(3) dod(6) internet(1) security(5)
       mechanisms(5) pkix(7) pkip(5) regCtrl(1) 12 }
    RsaKeyLenCtrl ::= INTEGER (1..MAX)
 The CertReqTemplateValue contains the prefilled certTemplate to be
 used for a future certificate request.  The publicKey field in the
 certTemplate MUST NOT be used.  In case the PKI management entity
 wishes to specify supported public-key algorithms, the keySpec field
 MUST be used.  One AttributeTypeAndValue per supported algorithm or
 RSA key length MUST be used.
 Note: The controls ASN.1 type is defined in Section 6 of CRMF
 [RFC4211].

2.17. New Section 5.3.19.17 - CRL Update Retrieval

 The following subsection introduces the PKI general message using id-
 it-crlStatusList and id-it-crls.  Details are specified in
 Section 4.3 of the Lightweight CMP Profile [RFC9483].  Insert this
 section after the new Section 5.3.19.16:
 5.3.19.17.  CRL Update Retrieval
 This MAY be used by the client to get new CRLs, specifying the source
 of the CRLs and the thisUpdate value of the latest CRL it already
 has, if available.  A CRL source is given either by a
 DistributionPointName or the GeneralNames of the issuing CA.  The
 DistributionPointName should be treated as an internal pointer to
 identify a CRL that the server already has and not as a way to ask
 the server to fetch CRLs from external locations.  The server shall
 only provide those CRLs that are more recent than the ones indicated
 by the client.
    GenMsg:    {id-it 22}, SEQUENCE SIZE (1..MAX) OF CRLStatus
    GenRep:    {id-it 23}, SEQUENCE SIZE (1..MAX) OF
                             CertificateList  |  < absent >
    CRLSource ::= CHOICE {
       dpn          [0] DistributionPointName,
       issuer       [1] GeneralNames }
    CRLStatus ::= SEQUENCE {
       source       CRLSource,
       thisUpdate   Time OPTIONAL }

2.18. Update Section 5.3.21 - Error Message Content

 Section 5.3.21 of [RFC4210] describes the regular use of error
 messages.  This document adds a use by a PKI management entity to
 initiate delayed delivery in response to certConf, rr, and genm
 requests and to error messages.
 Replace the first sentence of the first paragraph with the following
 one:
 This data structure MAY be used by an EE, CA, or RA to convey error
 information and by a PKI management entity to initiate delayed
 delivery of responses.
 Replace the second paragraph with the following text:
 This message MAY be generated at any time during a PKI transaction.
 If the client sends this request, the server MUST respond with a
 PKIConfirm response or another ErrorMsg if any part of the header is
 not valid.  In case a PKI management entity sends an error message to
 the EE with the pKIStatusInfo field containing the status "waiting",
 the EE will initiate polling as described in Section 5.3.22.
 Otherwise, both sides MUST treat this message as the end of the
 transaction (if a transaction is in progress).

2.19. Replace Section 5.3.22 - Polling Request and Response

 Section 5.3.22 of [RFC4210] describes when and how polling messages
 are used for ir, cr, and kur messages.  This document extends the
 polling mechanism for outstanding responses to any kind of request
 message.  This update also fixes the inconsistent use of the terms
 'pReq' vs. 'pollReq' and 'pRep' vs. 'pollRep'.
 Replace Section 5.3.22 of [RFC4210] with following text:
 This pair of messages is intended to handle scenarios in which the
 client needs to poll the server to determine the status of an
 outstanding response (i.e., when the "waiting" PKIStatus has been
 received).
    PollReqContent ::= SEQUENCE OF SEQUENCE {
       certReqId    INTEGER }
    PollRepContent ::= SEQUENCE OF SEQUENCE {
       certReqId    INTEGER,
       checkAfter   INTEGER,  -- time in seconds
       reason       PKIFreeText OPTIONAL }
 In response to an ir, cr, p10cr, or kur request message, polling is
 initiated with an ip, cp, or kup response message containing status
 "waiting".  For any type of request message, polling can be initiated
 with an error response messages with status "waiting".  The following
 clauses describe how polling messages are used.  It is assumed that
 multiple certConf messages can be sent during transactions.  There
 will be one sent in response to each ip, cp, or kup that contains a
 CertStatus for an issued certificate.
 1  In response to an ip, cp, or kup message, an EE will send a
    certConf for all issued certificates and expect a PKIconf for each
    certConf.  An EE will send a pollReq message in response to each
    CertResponse element of an ip, cp, or kup message with status
    "waiting" and in response to an error message with status
    "waiting".  Its certReqId MUST be either the index of a
    CertResponse data structure with status "waiting" or -1, referring
    to the complete response.
 2  In response to a pollReq, a CA/RA will return an ip, cp, or kup if
    one or more of the still pending requested certificates are ready
    or the final response to some other type of request is available;
    otherwise, it will return a pollRep.
 3  If the EE receives a pollRep, it will wait for at least the number
    of seconds given in the checkAfter field before sending another
    pollReq.
 4  If the EE receives an ip, cp, or kup, then it will be treated in
    the same way as the initial response; if it receives any other
    response, then this will be treated as the final response to the
    original request.
 The following client-side state machine describes polling for
 individual CertResponse elements.
                             START
                               |
                               v
                            Send ir
                               | ip
                               v
                          Check status
                          of returned <------------------------+
                             certs                             |
                               |                               |
     +------------------------>|<------------------+           |
     |                         |                   |           |
     |        (issued)         v       (waiting)   |           |
   Add to <----------- Check CertResponse ------> Add to       |
  conf list           for each certificate      pending list   |
                               /                               |
                              /                                |
                 (conf list) /     (empty conf list)           |
                            /                     ip           |
                           /                 +-----------------+
    (empty pending list)  /                  |    pollRep
      END <---- Send certConf        Send pollReq---------->Wait
                       |                 ^   ^               |
                       |                 |   |               |
                       +-----------------+   +---------------+
                          (pending list)
 In the following exchange, the end entity is enrolling for two
 certificates in one request.
  Step  End Entity                       PKI
  --------------------------------------------------------------------
  1   Format ir
  2                    -> ir      ->
  3                                    Handle ir
  4                                    Manual intervention is
                                       required for both certs
  5                    <- ip      <-
  6   Process ip
  7   Format pollReq
  8                    -> pollReq  ->
  9                                    Check status of cert requests
  10                                   Certificates not ready
  11                                   Format pollRep
  12                   <- pollRep  <-
  13  Wait
  14  Format pollReq
  15                   -> pollReq  ->
  16                                   Check status of cert requests
  17                                   One certificate is ready
  18                                   Format ip
  19                   <- ip       <-
  20  Handle ip
  21  Format certConf
  22                   -> certConf ->
  23                                   Handle certConf
  24                                   Format ack
  25                   <- pkiConf   <-
  26  Format pollReq
  27                   -> pollReq  ->
  28                                   Check status of certificate
  29                                   Certificate is ready
  30                                   Format ip
  31                   <- ip       <-
  31  Handle ip
  32  Format certConf
  33                   -> certConf ->
  34                                   Handle certConf
  35                                   Format ack
  36                   <- pkiConf  <-
 The following client-side state machine describes polling for a
 complete response message.
                                 Start
                                   |
                                   | Send request
                                   |
              +----------- Receive response ------------+
              |                                         |
              | ip/cp/kup/error with                    | other
              | status "waiting"                        | response
              |                                         |
              v                                         |
  +------> Polling                                      |
  |           |                                         |
  |           | Send pollReq                            |
  |           | Receive response                        |
  |           |                                         |
  |   pollRep | other response                          |
  +-----------+------------------->+<-------------------+
                                   |
                                   v
                             Handle response
                                   |
                                   v
                                  End
 In the following exchange, the end entity is sending a general
 message request, and the response is delayed by the server.
  Step  End Entity                       PKI
  --------------------------------------------------------------------
  1   Format genm
  2                  -> genm     ->
  3                                 Handle genm
  4                                 delay in response is necessary
  5                                 Format error message "waiting"
                                    with certReqId set to -1
  6                   <- error   <-
  7   Process error
  8   Format pollReq
  9                   -> pollReq ->
  10                                Check status of original request
                                    general message response not ready
  11                                Format pollRep
  12                  <- pollRep <-
  13  Wait
  14  Format pollReq
  15                  -> pollReq ->
  16                                Check status of original request
                                    general message response is ready
  17                                Format genp
  18                  <- genp    <-
  19  Handle genp

2.20. Update Section 7 - Version Negotiation

 Section 7 of [RFC4210] describes the use of CMP versions.  This
 document describes the handling of the additional CMP version
 cmp2021, which is introduced to indicate support of EnvelopedData and
 hashAlg.
 Replace the text of the second paragraph with the following text:
 If a client knows the protocol version(s) supported by the server
 (e.g., from a previous PKIMessage exchange or via some out-of-band
 means), then it MUST send a PKIMessage with the highest version
 supported by both it and the server.  If a client does not know what
 version(s) the server supports, then it MUST send a PKIMessage using
 the highest version it supports with the following exception.
 Version cmp2021 SHOULD only be used if cmp2021 syntax is needed for
 the request being sent or for the expected response.
 Note: Using cmp2000 as the default pvno is done to avoid extra
 message exchanges for version negotiation and to foster compatibility
 with cmp2000 implementations.  Version cmp2021 syntax is only needed
 if a message exchange uses hashAlg (in CertStatus) or EnvelopedData.

2.21. Update Section 7.1.1 - Clients Talking to RFC 2510 Servers

 Section 7.1.1 of [RFC4210] describes the behavior of a client sending
 a cmp2000 message talking to a cmp1999 server, as specified in
 [RFC2510].  This document extends the section to clients with any
 higher version than cmp1999.
 Replace the first sentence of Section 7.1.1 of [RFC4210] with the
 following text:
 If, after sending a message with a protocol version number higher
 than cmp1999, a client receives an ErrorMsgContent with a version of
 cmp1999, then it MUST abort the current transaction.

2.22. Add Section 8.4 - Private Keys for Certificate Signing and CMP

     Message Protection
 The following subsection addresses the risk arising from reusing the
 CA private key for CMP message protection.
 Insert this section after Section 8.3 of [RFC4210] (Note: This fixes
 Errata ID 5731):
 8.4.  Private Keys for Certificate Signing and CMP Message Protection
 A CA should not reuse its certificate signing key for other purposes,
 such as protecting CMP responses and TLS connections.  This way,
 exposure to other parts of the system and the number of uses of this
 particularly critical key are reduced to a minimum.

2.23. Add Section 8.5 - Entropy of Random Numbers, Key Pairs, and

     Shared Secret Information
 The following subsection addresses the risk arising from low entropy
 of random numbers, asymmetric keys, and shared secret information.
 Insert this section after the new Section 8.4:
 8.5.  Entropy of Random Numbers, Key Pairs, and Shared Secret
 Information
 Implementations must generate nonces and private keys from random
 input.  The use of inadequate pseudorandom number generators (PRNGs)
 to generate cryptographic keys can result in little or no security.
 An attacker may find it much easier to reproduce the PRNG environment
 that produced the keys and to search the resulting small set of
 possibilities than brute-force searching the whole key space.  As an
 example of predictable random numbers, see [CVE-2008-0166];
 consequences of low-entropy random numbers are discussed in Mining
 Your Ps and Qs [MiningPsQs].  The generation of quality random
 numbers is difficult.  ISO/IEC 20543:2019 [ISO.20543-2019], NIST SP
 800-90A Rev.1 [NIST_SP_800_90Ar1], BSI AIS 31 V2.0 [AIS31], and other
 specifications offer valuable guidance in this area.
 If shared secret information is generated by a cryptographically
 secure random number generator (CSRNG), it is safe to assume that the
 entropy of the shared secret information equals its bit length.  If
 no CSRNG is used, the entropy of shared secret information depends on
 the details of the generation process and cannot be measured securely
 after it has been generated.  If user-generated passwords are used as
 shared secret information, their entropy cannot be measured and are
 typically insufficient for protected delivery of centrally generated
 keys or trust anchors.
 If the entropy of shared secret information protecting the delivery
 of a centrally generated key pair is known, it should not be less
 than the security strength of that key pair; if the shared secret
 information is reused for different key pairs, the security of the
 shared secret information should exceed the security strength of each
 individual key pair.
 For the case of a PKI management operation that delivers a new trust
 anchor (e.g., a root CA certificate) using caPubs or genm that is (a)
 not concluded in a timely manner or (b) where the shared secret
 information is reused for several key management operations, the
 entropy of the shared secret information, if known, should not be
 less than the security strength of the trust anchor being managed by
 the operation.  The shared secret information should have an entropy
 that at least matches the security strength of the key material being
 managed by the operation.  Certain use cases may require shared
 secret information that may be of a low security strength, e.g., a
 human-generated password.  It is RECOMMENDED that such secret
 information be limited to a single PKI management operation.

2.24. Add Section 8.6 - Trust Anchor Provisioning Using CMP Messages

 The following subsection addresses the risk arising from in-band
 provisioning of new trust anchors in a PKI management operation.
 Insert this section after the new Section 8.5:
 8.6.  Trust Anchor Provisioning Using CMP Messages
 A provider of trust anchors, which may be an RA involved in
 configuration management of its clients, MUST NOT include to-be-
 trusted CA certificates in a CMP message unless the specific
 deployment scenario can ensure that it is adequate that the receiving
 EE trusts these certificates, e.g., by loading them into its trust
 store.
 Whenever an EE receives in a CMP message a CA certificate to be used
 as a trust anchor (for example in the caPubs field of a certificate
 response or in a general response), it MUST properly authenticate the
 message sender with existing trust anchor information without
 requiring the new trust anchors included in the message.
 Additionally, the EE MUST verify that the sender is an authorized
 source of trust anchors.  This authorization is governed by local
 policy and typically indicated using shared secret information or
 with a signature-based message protection using a certificate issued
 by a PKI that is explicitly authorized for this purpose.

2.25. Add Section 8.7 - Authorizing Requests for Certificates with

     Specific EKUs
 The following subsection addresses the security considerations to
 follow when authorizing requests for certificates containing specific
 EKUs.
 Insert this section after new Section 8.6:
 8.7.  Authorizing Requests for Certificates with Specific EKUs
 When a CA issues a certificate containing extended key usage
 extensions as defined in Section 4.5, this expresses delegation of an
 authorization that originally is only with the CA certificate itself.
 Such delegation is a very sensitive action in a PKI and therefore
 special care must be taken when approving such certificate requests
 to ensure that only legitimate entities receive a certificate
 containing such an EKU.

2.26. Update Appendix B - The Use of Revocation Passphrase

 Appendix B of [RFC4210] describes the use of the revocation
 passphrase.  As this document updates [RFC4210] to utilize the parent
 structure EncryptedKey instead of EncryptedValue as described in
 Section 2.7 above, the description is updated accordingly.
 Replace the first bullet point of this section with the following
 text:
  • The OID and value specified in Section 5.3.19.9 MAY be sent in a

GenMsg message at any time or MAY be sent in the generalInfo field

    of the PKIHeader of any PKIMessage at any time.  (In particular,
    the EncryptedKey structure as described in Section 5.2.2 may be
    sent in the header of the certConf message that confirms
    acceptance of certificates requested in an initialization request
    or certificate request message.)  This conveys a revocation
    passphrase chosen by the entity to the relevant CA/RA.  When
    EnvelopedData is used, this is in the decrypted bytes of the
    encryptedContent field.  When EncryptedValue is used, this is in
    the decrypted bytes of the encValue field.  Furthermore, the
    transfer is accomplished with appropriate confidentiality
    characteristics.
 Replace the third bullet point of this section with the following
 text:
  • Either the localKeyId attribute of EnvelopedData as specified in

[RFC2985] or the valueHint field of EncryptedValue MAY contain a

    key identifier (chosen by the entity, along with the passphrase
    itself) to assist in later retrieval of the correct passphrase
    (e.g., when the revocation request is constructed by the entity
    and received by the CA/RA).

2.27. Update Appendix C - Request Message Behavioral Clarifications

 Appendix C of [RFC4210] provides clarifications to the request
 message behavior.  As this document updates [RFC4210] to utilize the
 parent structure EncryptedKey instead of EncryptedValue as described
 in Section 2.7 above, the description is updated accordingly.
 Replace the comment within the ASN.1 syntax coming after the
 definition of POPOSigningKey with the following text (Note: This
 fixes Errata ID 2615):
  1. - – * For the purposes of this specification, the ASN.1 comment – * given in [RFC4211] pertains not only to certTemplate but – * also to the altCertTemplate control. –
  2. - * The signature (using "algorithmIdentifier") is on the
  3. - * DER-encoded value of poposkInput (i.e., the "value" OCTETs
  4. - * of the POPOSigningKeyInput DER). NOTE: If CertReqMsg
  5. - * certReq certTemplate (or the altCertTemplate control)
  6. - * contains the subject and publicKey values, then poposkInput
  7. - * MUST be omitted and the signature MUST be computed on the
  8. - * DER-encoded value of CertReqMsg certReq (or the DER-
  9. - * encoded value of AltCertTemplate). If
  10. - * certTemplate/altCertTemplate does not contain both the
  11. - * subject and public key values (i.e., if it contains only
  12. - * one of these or neither), then poposkInput MUST be present
  13. - * and MUST be signed.
  14. - Replace the ASN.1 syntax of POPOPrivKey with the following text: POPOPrivKey ::= CHOICE { thisMessage [0] BIT STRING, – deprecated subsequentMessage [1] SubsequentMessage, dhMAC [2] BIT STRING, – deprecated agreeMAC [3] PKMACValue, encryptedKey [4] EnvelopedData } –
  15. - * When using CMP V2, the encrypted value MUST be transferred in
  16. - * the thisMessage field that is given as BIT STRING in [RFC4211],
  17. - * but it requires EncryptedValue. Therefore, this document makes
  18. - * the behavioral clarification for CMP V2 of specifying that the
  19. - * contents of "thisMessage" MUST be encoded as an
  20. - * EncryptedValue and then wrapped in a BIT STRING.
  21. - * When using CMP V3, the encrypted value MUST be transferred
  22. - * in the encryptedKey field, as specified in Section 5.2.2.
  23. - **

2.28. Update Appendix D.1. - General Rules for Interpretation of These

     Profiles
 Appendix D.1 of [RFC4210] provides general rules for interpretation
 of the PKI management messages profiles specified in Appendices D and
 E of [RFC4210].  This document updates a sentence regarding the new
 protocol version cmp2021.
 Replace the last sentence of the first paragraph of the section with
 the following text:
 Mandatory fields are not mentioned if they have an obvious value
 (e.g., in this version of these profiles, pvno is always cmp2000).

2.29. Update Appendix D.2. - Algorithm Use Profile

 Appendix D.2 of [RFC4210] provides a list of algorithms that
 implementations must support when claiming conformance with PKI
 management message profiles, as specified in Appendix D.2 of CMP
 [RFC4210].  This document redirects to the new algorithm profile, as
 specified in Section 7.1 of CMP Algorithms [RFC9481].
 Replace the text of the section with the following text:
 D.2.  Algorithm Use Profile
 For specifications of algorithm identifiers and respective
 conventions for conforming implementations, please refer to
 Section 7.1 of CMP Algorithms [RFC9481].

2.30. Update Appendix D.4. - Initial Registration/Certification (Basic

     Authenticated Scheme)
 Appendix D.4 of [RFC4210] provides the initial registration/
 certification scheme.  This scheme shall continue using
 EncryptedValue for backward compatibility reasons.
 Replace the line specifying protectionAlg of the Initialization
 Response message with the following text (Note: This fixes Errata ID
 5201):
 protectionAlg        MSG_MAC_ALG
 Replace the comment after the privateKey field of
 crc[1].certifiedKeyPair in the syntax of the Initialization Response
 message with the following text:
  1. - see Appendix C (Request Message Behavioral Clarifications)
  2. - for backward compatibility reasons, use EncryptedValue

3. Updates to RFC 6712 - HTTP Transfer for the Certificate Management

  Protocol (CMP)

3.1. Update Section 1 - Introduction

 To indicate and explain why delayed delivery of all kinds of
 PKIMessages may be handled at transfer level and/or at CMP level, the
 introduction of [RFC6712] is updated.
 Replace the third paragraph of this section with the following text:
 In addition to reliable transport, CMP requires connection and error
 handling from the transfer protocol, which is all covered by HTTP.
 Additionally, delayed delivery of CMP response messages may be
 handled at transfer level, regardless of the message contents.  Since
 this document extends the polling mechanism specified in the second
 version of CMP [RFC4210] to cover all types of PKI management
 transactions, delays detected at application level may also be
 handled within CMP, using pollReq and pollRep messages.

3.2. New Section 1.1 - Changes Since RFC 6712

 The following subsection describes feature updates to [RFC6712].
 They are related to the base specification.  Hence, references to the
 original sections in [RFC6712] are used whenever possible.
 Insert this section after the current Section 1 of [RFC6712]:
 1.1 Changes Since RFC 6712
 The following updates are made in this document:
  • Introduce the HTTP path '/.well-known/cmp'.
  • Extend the URI structure.

3.3. Replace Section 3.6 - HTTP Request-URI

 Section 3.6 of [RFC6712] specifies the used HTTP URIs.  This document
 introduces the HTTP path '/.well-known/cmp' and extends the URIs.
 Replace the text of the section with the following text:
 3.6.  HTTP Request-URI
 Each CMP server on a PKI management entity supporting HTTP or HTTPS
 transfer MUST support the use of the path prefix '/.well-known/' as
 defined in [RFC8615] and the registered name 'cmp' to ease
 interworking in a multi-vendor environment.
 The CMP client needs to be configured with sufficient information to
 form the CMP server URI.  This is at least the authority portion of
 the URI, e.g., 'www.example.com:80', or the full operation path
 segment of the PKI management entity.  Additionally, OPTIONAL path
 segments MAY be added after the registered application name as part
 of the full operation path to provide further distinction.  The path
 segment 'p' followed by an arbitraryLabel <name> could, for example,
 support the differentiation of specific CAs or certificate profiles.
 Further path segments, e.g., as specified in the Lightweight CMP
 Profile [RFC9483], could indicate PKI management operations using an
 operationLabel <operation>.  A valid, full CMP URI can look like
 this:
    http://www.example.com/.well-known/cmp
    http://www.example.com/.well-known/cmp/<operation>
    http://www.example.com/.well-known/cmp/p/<name>
    http://www.example.com/.well-known/cmp/p/<name>/<operation>

4. IANA Considerations

4.1. Updates to the ASN.1 Modules in RFCs 4210 and 5912

 This document updates the ASN.1 modules of Appendix F of [RFC4210]
 and Section 9 of [RFC5912] as shown in Appendixes A.1 and A.2 of this
 document, respectively.  The OIDs 99 (id-mod-cmp2021-88) and 100 (id-
 mod-cmp2021-02) have been registered in the "SMI Security for PKIX
 Module Identifier" registry to identify the updated ASN.1 modules.

4.2. Updates to the IANA Considerations of RFC 4210

 This document updates the IANA Consideration sections of [RFC4210] by
 adding this content.

4.2.1. SMI Security for PKIX Extended Key Purpose Registry

 IANA has registered the following new entry in the "SMI Security for
 PKIX Extended Key Purpose" registry (see
 <https://www.iana.org/assignments/smi-numbers>, as defined in
 [RFC7299]:
 +=========+=============+============+
 | Decimal | Description | References |
 +=========+=============+============+
 | 32      | id-kp-cmKGA | RFC 9480   |
 +---------+-------------+------------+
      Table 1: Addition to the SMI
     Security for PKIX Extended Key
                Purpose

4.2.2. SMI Security for PKIX CMP Information Types

 IANA has registered the following new entries in the "SMI Security
 for PKIX CMP Information Types" registry (see
 <https://www.iana.org/assignments/smi-numbers>), as defined in
 [RFC7299]:
 +=========+=======================+============+
 | Decimal | Description           | References |
 +=========+=======================+============+
 | 17      | id-it-caCerts         | RFC 9480   |
 +---------+-----------------------+------------+
 | 18      | id-it-rootCaKeyUpdate | RFC 9480   |
 +---------+-----------------------+------------+
 | 19      | id-it-certReqTemplate | RFC 9480   |
 +---------+-----------------------+------------+
 | 20      | id-it-rootCaCert      | RFC 9480   |
 +---------+-----------------------+------------+
 | 21      | id-it-certProfile     | RFC 9480   |
 +---------+-----------------------+------------+
 | 22      | id-it-crlStatusList   | RFC 9480   |
 +---------+-----------------------+------------+
 | 23      | id-it-crls            | RFC 9480   |
 +---------+-----------------------+------------+
        Table 2: Additions to the PKIX CMP
            Information Types Registry

4.2.3. SMI Security for PKIX CRMF Registration Controls

 IANA has registered the following new entries in the "SMI Security
 for PKIX CRMF Registration Controls" registry (see
 <https://www.iana.org/assignments/smi-numbers>), as defined in
 [RFC7299]:
 +=========+======================+============+
 | Decimal | Description          | References |
 +=========+======================+============+
 | 11      | id-regCtrl-algId     | RFC 9480   |
 +---------+----------------------+------------+
 | 12      | id-regCtrl-rsaKeyLen | RFC 9480   |
 +---------+----------------------+------------+
        Table 3: Addition to the PKIX CRMF
          Registration Controls Registry

4.3. Updates to the IANA Considerations of RFC 6712

 This document contains an update to the IANA Considerations sections
 of [RFC6712] by adding this content.

4.3.1. Well-Known URIs

 IANA has registered the following new entry in the "Well-Known URIs"
 registry (see <https://www.iana.org/assignments/well-known-uris>), as
 defined in [RFC8615]:
 URI Suffix:  cmp
 Change Controller:  IETF
 Reference:  [RFC9480] [RFC9482]
 Status:  permanent
 Related Information:  CMP has a registry at
    <https://www.iana.org/assignments/cmp>

4.3.2. Certificate Management Protocol (CMP) Registry

 This document defines a new protocol registry group entitled
 "Certificate Management Protocol (CMP)" (at
 <https://www.iana.org/assignments/cmp>) with a new "CMP Well-Known
 URI Path Segments" registry containing three columns: Path Segment,
 Description, and Reference.  New items can be added using the
 Specification Required [RFC8615] process.  The initial entry of this
 registry is:
 Path Segment:  p
 Description:  Indicates that the next path segment specifies, e.g., a
    CA or certificate profile name
 Reference:  [RFC9480] [RFC9482]

5. Security Considerations

 The security considerations of [RFC4210] are extended in Section 2.22
 to Section 2.24.  No security considerations updates of [RFC6712]
 were required.

6. References

6.1. Normative References

 [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
            Requirement Levels", BCP 14, RFC 2119,
            DOI 10.17487/RFC2119, March 1997,
            <https://www.rfc-editor.org/info/rfc2119>.
 [RFC2510]  Adams, C. and S. Farrell, "Internet X.509 Public Key
            Infrastructure Certificate Management Protocols",
            RFC 2510, DOI 10.17487/RFC2510, March 1999,
            <https://www.rfc-editor.org/info/rfc2510>.
 [RFC2985]  Nystrom, M. and B. Kaliski, "PKCS #9: Selected Object
            Classes and Attribute Types Version 2.0", RFC 2985,
            DOI 10.17487/RFC2985, November 2000,
            <https://www.rfc-editor.org/info/rfc2985>.
 [RFC2986]  Nystrom, M. and B. Kaliski, "PKCS #10: Certification
            Request Syntax Specification Version 1.7", RFC 2986,
            DOI 10.17487/RFC2986, November 2000,
            <https://www.rfc-editor.org/info/rfc2986>.
 [RFC3629]  Yergeau, F., "UTF-8, a transformation format of ISO
            10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November
            2003, <https://www.rfc-editor.org/info/rfc3629>.
 [RFC4210]  Adams, C., Farrell, S., Kause, T., and T. Mononen,
            "Internet X.509 Public Key Infrastructure Certificate
            Management Protocol (CMP)", RFC 4210,
            DOI 10.17487/RFC4210, September 2005,
            <https://www.rfc-editor.org/info/rfc4210>.
 [RFC4211]  Schaad, J., "Internet X.509 Public Key Infrastructure
            Certificate Request Message Format (CRMF)", RFC 4211,
            DOI 10.17487/RFC4211, September 2005,
            <https://www.rfc-editor.org/info/rfc4211>.
 [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
            Housley, R., and W. Polk, "Internet X.509 Public Key
            Infrastructure Certificate and Certificate Revocation List
            (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
            <https://www.rfc-editor.org/info/rfc5280>.
 [RFC5480]  Turner, S., Brown, D., Yiu, K., Housley, R., and T. Polk,
            "Elliptic Curve Cryptography Subject Public Key
            Information", RFC 5480, DOI 10.17487/RFC5480, March 2009,
            <https://www.rfc-editor.org/info/rfc5480>.
 [RFC5652]  Housley, R., "Cryptographic Message Syntax (CMS)", STD 70,
            RFC 5652, DOI 10.17487/RFC5652, September 2009,
            <https://www.rfc-editor.org/info/rfc5652>.
 [RFC5958]  Turner, S., "Asymmetric Key Packages", RFC 5958,
            DOI 10.17487/RFC5958, August 2010,
            <https://www.rfc-editor.org/info/rfc5958>.
 [RFC6402]  Schaad, J., "Certificate Management over CMS (CMC)
            Updates", RFC 6402, DOI 10.17487/RFC6402, November 2011,
            <https://www.rfc-editor.org/info/rfc6402>.
 [RFC6712]  Kause, T. and M. Peylo, "Internet X.509 Public Key
            Infrastructure -- HTTP Transfer for the Certificate
            Management Protocol (CMP)", RFC 6712,
            DOI 10.17487/RFC6712, September 2012,
            <https://www.rfc-editor.org/info/rfc6712>.
 [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
            2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
            May 2017, <https://www.rfc-editor.org/info/rfc8174>.
 [RFC8615]  Nottingham, M., "Well-Known Uniform Resource Identifiers
            (URIs)", RFC 8615, DOI 10.17487/RFC8615, May 2019,
            <https://www.rfc-editor.org/info/rfc8615>.
 [RFC8933]  Housley, R., "Update to the Cryptographic Message Syntax
            (CMS) for Algorithm Identifier Protection", RFC 8933,
            DOI 10.17487/RFC8933, October 2020,
            <https://www.rfc-editor.org/info/rfc8933>.
 [RFC9045]  Housley, R., "Algorithm Requirements Update to the
            Internet X.509 Public Key Infrastructure Certificate
            Request Message Format (CRMF)", RFC 9045,
            DOI 10.17487/RFC9045, June 2021,
            <https://www.rfc-editor.org/info/rfc9045>.
 [RFC9481]  Brockhaus, H., Aschauer, H., Ounsworth, M., and J. Gray,
            "Certificate Management Protocol (CMP) Algorithms",
            RFC 9481, DOI 10.17487/RFC9481, November 2023,
            <https://www.rfc-editor.org/info/rfc9481>.
 [RFC9482]  Sahni, M., Ed. and S. Tripathi, Ed., "Constrained
            Application Protocol (CoAP) Transfer for the Certificate
            Management Protocol", RFC 9482, DOI 10.17487/RFC9482,
            November 2023, <https://www.rfc-editor.org/info/rfc9482>.

6.2. Informative References

 [AIS31]    Killmann, W. and W. Schindler, "A proposal for:
            Functionality classes for random number generators -
            Version 2.0", September 2011,
            <https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/
            Zertifizierung/Interpretationen/AIS_31_Functionality_class
            es_for_random_number_generators_e.pdf>.
 [CVE-2008-0166]
            National Institute of Science and Technology (NIST),
            "National Vulnerability Database - CVE-2008-0166", May
            2008, <https://nvd.nist.gov/vuln/detail/CVE-2008-0166>.
 [HTTP-CMP] Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray,
            "Internet X.509 Public Key Infrastructure -- HTTP Transfer
            for the Certificate Management Protocol (CMP)", Work in
            Progress, Internet-Draft, draft-ietf-lamps-rfc6712bis-03,
            10 February 2023, <https://datatracker.ietf.org/doc/html/
            draft-ietf-lamps-rfc6712bis-03>.
 [ISO.20543-2019]
            International Organization for Standardization (ISO),
            "Information technology -- Security techniques -- Test and
            analysis methods for random bit generators within ISO/IEC
            19790 and ISO/IEC 15408", ISO/IEC 20543:2019, October
            2019.
 [MiningPsQs]
            Heninger, N., Durumeric, Z., Wustrow, E., and J. A.
            Halderman, "Mining Your Ps and Qs: Detection of Widespread
            Weak Keys in Network Devices", Security'12: Proceedings of
            the 21st USENIX conference on Security symposium, August
            2012, <https://www.usenix.org/conference/usenixsecurity12/
            technical-sessions/presentation/heninger>.
 [NIST_SP_800_90Ar1]
            Barker, E. B., Kelsey, J. M., and NIST, "Recommendation
            for Random Number Generation Using Deterministic Random
            Bit Generators", NIST Special Publications
            (General) 800-90Ar1, DOI 10.6028/NIST.SP.800-90Ar1, June
            2015,
            <https://nvlpubs.nist.gov/nistpubs/SpecialPublications/
            NIST.SP.800-90Ar1.pdf>.
 [PKIX-CMP] Brockhaus, H., von Oheimb, D., Ounsworth, M., and J. Gray,
            "Internet X.509 Public Key Infrastructure -- Certificate
            Management Protocol (CMP)", Work in Progress, Internet-
            Draft, draft-ietf-lamps-rfc4210bis-07, 19 June 2023,
            <https://datatracker.ietf.org/doc/html/draft-ietf-lamps-
            rfc4210bis-07>.
 [RFC2104]  Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
            Hashing for Message Authentication", RFC 2104,
            DOI 10.17487/RFC2104, February 1997,
            <https://www.rfc-editor.org/info/rfc2104>.
 [RFC2202]  Cheng, P. and R. Glenn, "Test Cases for HMAC-MD5 and HMAC-
            SHA-1", RFC 2202, DOI 10.17487/RFC2202, September 1997,
            <https://www.rfc-editor.org/info/rfc2202>.
 [RFC5912]  Hoffman, P. and J. Schaad, "New ASN.1 Modules for the
            Public Key Infrastructure Using X.509 (PKIX)", RFC 5912,
            DOI 10.17487/RFC5912, June 2010,
            <https://www.rfc-editor.org/info/rfc5912>.
 [RFC7299]  Housley, R., "Object Identifier Registry for the PKIX
            Working Group", RFC 7299, DOI 10.17487/RFC7299, July 2014,
            <https://www.rfc-editor.org/info/rfc7299>.
 [RFC9483]  Brockhaus, H., von Oheimb, D., and S. Fries, "Lightweight
            Certificate Management Protocol (CMP) Profile", RFC 9483,
            DOI 10.17487/RFC9483, November 2023,
            <https://www.rfc-editor.org/info/rfc9483>.

Appendix A. ASN.1 Modules

A.1. Update to RFC 4210 - 1988 ASN.1 Module

 This section contains the updated ASN.1 module for [RFC4210].  This
 module replaces the module in Appendix F of that document.  Although
 a 2002 ASN.1 module is provided, this 1988 ASN.1 module remains the
 normative module, as per the policy of the PKIX Working Group.
 PKIXCMP {iso(1) identified-organization(3)
       dod(6) internet(1) security(5) mechanisms(5) pkix(7)
       id-mod(0) id-mod-cmp2021-88(99)}
 DEFINITIONS EXPLICIT TAGS ::=
 BEGIN
  1. - EXPORTS ALL –
 IMPORTS
     Certificate, CertificateList, Extensions, Name, Time,
     AlgorithmIdentifier, id-kp
     --, UTF8String -- -- if required; otherwise, comment out
            FROM PKIX1Explicit88 {iso(1) identified-organization(3)
            dod(6) internet(1) security(5) mechanisms(5) pkix(7)
            id-mod(0) id-pkix1-explicit-88(18)}
     -- The import of Name is added to define CertificationRequest
     -- instead of importing it from PKCS #10 [RFC2986].
     DistributionPointName, GeneralNames, GeneralName, KeyIdentifier
            FROM PKIX1Implicit88 {iso(1) identified-organization(3)
            dod(6) internet(1) security(5) mechanisms(5) pkix(7)
            id-mod(0) id-pkix1-implicit-88(19)}
     CertTemplate, PKIPublicationInfo, EncryptedKey, CertId,
     CertReqMessages, Controls, AttributeTypeAndValue, id-regCtrl
            FROM PKIXCRMF-2005 {iso(1) identified-organization(3)
            dod(6) internet(1) security(5) mechanisms(5) pkix(7)
            id-mod(0) id-mod-crmf2005(36)}
     -- The import of EncryptedKey is added due to the updates made
     -- in CMP Updates [RFC9480]. EncryptedValue does not need to
     -- be imported anymore and is therefore removed here.
  1. - Also, see the behavioral clarifications to CRMF codified in
  2. - Appendix C of this specification.
     EnvelopedData, SignedData, Attribute
            FROM CryptographicMessageSyntax2004 { iso(1)
            member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
            smime(16) modules(0) cms-2004(24) }
     -- The import of EnvelopedData and SignedData is added due to
     -- the updates made in CMP Updates [RFC9480].
     -- The import of Attribute is added to define
     -- CertificationRequest instead of importing it from
     -- PKCS #10 [RFC2986].
     ;
  1. - The rest of the module contains locally defined OIDs and
  2. - constructs:
 CMPCertificate ::= CHOICE {
     x509v3PKCert        Certificate
 }
 -- This syntax, while bits-on-the-wire compatible with the
 -- standard X.509 definition of "Certificate", allows the
 -- possibility of future certificate types (such as X.509
 -- attribute certificates, card-verifiable
 -- certificates, or other kinds of certificates) within this
 -- Certificate Management Protocol, should a need ever arise to
 -- support such generality.  Those implementations that do not
 -- foresee a need to ever support other certificate types MAY, if
 -- they wish, comment out the above structure and "uncomment" the
 -- following one prior to compiling this ASN.1 module.  (Note that
 -- interoperability with implementations that don't do this will be
 -- unaffected by this change.)
  1. - CMPCertificate ::= Certificate
 PKIMessage ::= SEQUENCE {
     header           PKIHeader,
     body             PKIBody,
     protection   [0] PKIProtection OPTIONAL,
     extraCerts   [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                      OPTIONAL
 }
 PKIMessages ::= SEQUENCE SIZE (1..MAX) OF PKIMessage
 PKIHeader ::= SEQUENCE {
     pvno                INTEGER     { cmp1999(1), cmp2000(2),
                                       cmp2021(3) },
     sender              GeneralName,
     -- identifies the sender
     recipient           GeneralName,
     -- identifies the intended recipient
     messageTime     [0] GeneralizedTime         OPTIONAL,
     -- time of production of this message (used when the sender
     -- believes that the transport will be "suitable", i.e.,
     -- that the time will still be meaningful upon receipt)
     protectionAlg   [1] AlgorithmIdentifier     OPTIONAL,
     -- algorithm used for the calculation of protection bits
     senderKID       [2] KeyIdentifier           OPTIONAL,
     recipKID        [3] KeyIdentifier           OPTIONAL,
     -- to identify specific keys used for protection
     transactionID   [4] OCTET STRING            OPTIONAL,
     -- identifies the transaction, i.e., this will be the same in
     -- corresponding request, response, certConf, and PKIConf
     -- messages
     senderNonce     [5] OCTET STRING            OPTIONAL,
     recipNonce      [6] OCTET STRING            OPTIONAL,
     -- nonces used to provide replay protection, senderNonce
     -- is inserted by the creator of this message; recipNonce
     -- is a nonce previously inserted in a related message by
     -- the intended recipient of this message.
     freeText        [7] PKIFreeText             OPTIONAL,
     -- this may be used to indicate context-specific instructions
     -- (this field is intended for human consumption)
     generalInfo     [8] SEQUENCE SIZE (1..MAX) OF
                            InfoTypeAndValue     OPTIONAL
     -- this may be used to convey context-specific information
     -- (this field not primarily intended for human consumption)
 }
 PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
     -- text encoded as a UTF-8 string [RFC3629]
 PKIBody ::= CHOICE {       -- message-specific body elements
     ir       [0]  CertReqMessages,        --Initialization Request
     ip       [1]  CertRepMessage,         --Initialization Response
     cr       [2]  CertReqMessages,        --Certification Request
     cp       [3]  CertRepMessage,         --Certification Response
     p10cr    [4]  CertificationRequest,   --imported from [RFC2986]
     popdecc  [5]  POPODecKeyChallContent, --pop Challenge
     popdecr  [6]  POPODecKeyRespContent,  --pop Response
     kur      [7]  CertReqMessages,        --Key Update Request
     kup      [8]  CertRepMessage,         --Key Update Response
     krr      [9]  CertReqMessages,        --Key Recovery Request
     krp      [10] KeyRecRepContent,       --Key Recovery Response
     rr       [11] RevReqContent,          --Revocation Request
     rp       [12] RevRepContent,          --Revocation Response
     ccr      [13] CertReqMessages,        --Cross-Cert. Request
     ccp      [14] CertRepMessage,         --Cross-Cert. Response
     ckuann   [15] CAKeyUpdAnnContent,     --CA Key Update Ann.
     cann     [16] CertAnnContent,         --Certificate Ann.
     rann     [17] RevAnnContent,          --Revocation Ann.
     crlann   [18] CRLAnnContent,          --CRL Announcement
     pkiconf  [19] PKIConfirmContent,      --Confirmation
     nested   [20] NestedMessageContent,   --Nested Message
     genm     [21] GenMsgContent,          --General Message
     genp     [22] GenRepContent,          --General Response
     error    [23] ErrorMsgContent,        --Error Message
     certConf [24] CertConfirmContent,     --Certificate Confirm
     pollReq  [25] PollReqContent,         --Polling Request
     pollRep  [26] PollRepContent          --Polling Response
 }
 PKIProtection ::= BIT STRING
 ProtectedPart ::= SEQUENCE {
     header    PKIHeader,
     body      PKIBody
 }
 id-PasswordBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 13}
 PBMParameter ::= SEQUENCE {
     salt                OCTET STRING,
     -- Note: Implementations MAY wish to limit acceptable sizes
     -- of this string to values appropriate for their environment
     -- in order to reduce the risk of denial-of-service attacks.
     owf                 AlgorithmIdentifier,
     -- AlgId for a One-Way Function (OWF)
     iterationCount      INTEGER,
     -- number of times the OWF is applied
     -- Note: Implementations MAY wish to limit acceptable sizes
     -- of this integer to values appropriate for their environment
     -- in order to reduce the risk of denial-of-service attacks.
     mac                 AlgorithmIdentifier
     -- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
 }   -- or HMAC [RFC2104, RFC2202])
 id-DHBasedMac OBJECT IDENTIFIER ::= {1 2 840 113533 7 66 30}
 DHBMParameter ::= SEQUENCE {
     owf                 AlgorithmIdentifier,
     -- AlgId for a One-Way Function
     mac                 AlgorithmIdentifier
     -- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
 }   -- or HMAC [RFC2104, RFC2202])
 NestedMessageContent ::= PKIMessages
 PKIStatus ::= INTEGER {
     accepted               (0),
     -- you got exactly what you asked for
     grantedWithMods        (1),
     -- you got something like what you asked for; the
     -- requester is responsible for ascertaining the differences
     rejection              (2),
     -- you don't get it, more information elsewhere in the message
     waiting                (3),
     -- the request body part has not yet been processed; expect to
     -- hear more later (note: proper handling of this status
     -- response MAY use the polling req/rep PKIMessages specified
     -- in Section 5.3.22 of [RFC4210]; alternatively, polling in the
     -- underlying transport layer MAY have some utility in this
     -- regard)
     revocationWarning      (4),
     -- this message contains a warning that a revocation is
     -- imminent
     revocationNotification (5),
     -- notification that a revocation has occurred
     keyUpdateWarning       (6)
     -- update already done for the oldCertId specified in
     -- CertReqMsg
 }
 PKIFailureInfo ::= BIT STRING {
 -- since we can fail in more than one way!
 -- More codes may be added in the future if/when required.
     badAlg              (0),
     -- unrecognized or unsupported algorithm identifier
     badMessageCheck     (1),
     -- integrity check failed (e.g., signature did not verify)
     badRequest          (2),
     -- transaction not permitted or supported
     badTime             (3),
     -- messageTime was not sufficiently close to the system time,
     -- as defined by local policy
     badCertId           (4),
     -- no certificate could be found matching the provided criteria
     badDataFormat       (5),
     -- the data submitted has the wrong format
     wrongAuthority      (6),
     -- the authority indicated in the request is different from the
     -- one creating the response token
     incorrectData       (7),
     -- the requester's data is incorrect (for notary services)
     missingTimeStamp    (8),
     -- when the timestamp is missing but should be there
     -- (by policy)
     badPOP              (9),
     -- the proof-of-possession failed
     certRevoked         (10),
     -- the certificate has already been revoked
     certConfirmed       (11),
     -- the certificate has already been confirmed
     wrongIntegrity      (12),
     -- not valid integrity, based on the password instead of the
     -- signature or vice versa
     badRecipientNonce   (13),
     -- not valid recipient nonce, either missing or wrong value
     timeNotAvailable    (14),
     -- the time source of the Time Stamping Authority (TSA) is
     -- not available
     unacceptedPolicy    (15),
     -- the requested TSA policy is not supported by the TSA
     unacceptedExtension (16),
     -- the requested extension is not supported by the TSA
     addInfoNotAvailable (17),
     -- the additional information requested could not be
     -- understood or is not available
     badSenderNonce      (18),
     -- not valid sender nonce, either missing or wrong size
     badCertTemplate     (19),
     -- not valid cert. template or missing mandatory information
     signerNotTrusted    (20),
     -- signer of the message unknown or not trusted
     transactionIdInUse  (21),
     -- the transaction identifier is already in use
     unsupportedVersion  (22),
     -- the version of the message is not supported
     notAuthorized       (23),
     -- the sender was not authorized to make the preceding
     -- request or perform the preceding action
     systemUnavail       (24),
     -- the request cannot be handled due to system unavailability
     systemFailure       (25),
     -- the request cannot be handled due to system failure
     duplicateCertReq    (26)
     -- the certificate cannot be issued because a duplicate
     -- certificate already exists
 }
 PKIStatusInfo ::= SEQUENCE {
     status        PKIStatus,
     statusString  PKIFreeText     OPTIONAL,
     failInfo      PKIFailureInfo  OPTIONAL
 }
 OOBCert ::= CMPCertificate
 OOBCertHash ::= SEQUENCE {
     hashAlg     [0] AlgorithmIdentifier     OPTIONAL,
     certId      [1] CertId                  OPTIONAL,
     hashVal         BIT STRING
     -- hashVal is calculated over the DER encoding of the
     -- self-signed certificate with the identifier certID.
 }
 POPODecKeyChallContent ::= SEQUENCE OF Challenge
 -- one Challenge per encryption key certification request (in the
 -- same order as these requests appear in CertReqMessages)
 Challenge ::= SEQUENCE {
     owf                 AlgorithmIdentifier  OPTIONAL,
     -- MUST be present in the first Challenge; MAY be omitted in
     -- any subsequent Challenge in POPODecKeyChallContent (if
     -- omitted, then the owf used in the immediately preceding
     -- Challenge is to be used)
     witness             OCTET STRING,
     -- the result of applying the One-Way Function (owf) to a
     -- randomly generated INTEGER, A (Note that a different
     -- INTEGER MUST be used for each Challenge.)
     challenge           OCTET STRING
     -- the encryption (under the public key for which the cert.
     -- request is being made) of Rand
 }
  1. - Rand was added in CMP Updates [RFC9480]
 Rand ::= SEQUENCE {
 -- Rand is encrypted under the public key to form the challenge
 -- in POPODecKeyChallContent
    int                  INTEGER,
    -- the randomly generated INTEGER A (above)
    sender               GeneralName
    -- the sender's name (as included in PKIHeader)
 }
 POPODecKeyRespContent ::= SEQUENCE OF INTEGER
 -- One INTEGER per encryption key certification request (in the
 -- same order as these requests appear in CertReqMessages).  The
 -- retrieved INTEGER A (above) is returned to the sender of the
 -- corresponding Challenge.
 CertRepMessage ::= SEQUENCE {
     caPubs       [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                      OPTIONAL,
     response         SEQUENCE OF CertResponse
 }
 CertificationRequest ::= SEQUENCE {
     certificationRequestInfo  SEQUENCE {
       version                   INTEGER,
       subject                   Name,
       subjectPublicKeyInfo      SEQUENCE {
         algorithm                 AlgorithmIdentifier,
         subjectPublicKey          BIT STRING },
       attributes                [0] IMPLICIT SET OF Attribute },
     signatureAlgorithm        AlgorithmIdentifier,
     signature                 BIT STRING
 }
 CertResponse ::= SEQUENCE {
     certReqId           INTEGER,
     -- to match this response with the corresponding request (a value
     -- of -1 is to be used if certReqId is not specified in the
     -- corresponding request, which can only be a p10cr)
     status              PKIStatusInfo,
     certifiedKeyPair    CertifiedKeyPair    OPTIONAL,
     rspInfo             OCTET STRING        OPTIONAL
     -- analogous to the id-regInfo-utf8Pairs string defined
     -- for regInfo in CertReqMsg [RFC4211]
 }
 CertifiedKeyPair ::= SEQUENCE {
     certOrEncCert       CertOrEncCert,
     privateKey      [0] EncryptedKey        OPTIONAL,
     -- See [RFC4211] for comments on encoding.
     -- Changed from Encrypted Value to EncryptedKey as a CHOICE of
     -- EncryptedValue and EnvelopedData due to the changes made in
     -- CMP Updates [RFC9480].
     -- Using the choice EncryptedValue is bit-compatible to the
     -- syntax without this change.
     publicationInfo [1] PKIPublicationInfo  OPTIONAL
 }
 CertOrEncCert ::= CHOICE {
     certificate     [0] CMPCertificate,
     encryptedCert   [1] EncryptedKey
     -- Changed from Encrypted Value to EncryptedKey as a CHOICE of
     -- EncryptedValue and EnvelopedData due to the changes made in
     -- CMP Updates [RFC9480].
     -- Using the choice EncryptedValue is bit-compatible to the
     -- syntax without this change.
 }
 KeyRecRepContent ::= SEQUENCE {
     status                  PKIStatusInfo,
     newSigCert          [0] CMPCertificate OPTIONAL,
     caCerts             [1] SEQUENCE SIZE (1..MAX) OF
                                         CMPCertificate OPTIONAL,
     keyPairHist         [2] SEQUENCE SIZE (1..MAX) OF
                                         CertifiedKeyPair OPTIONAL
 }
 RevReqContent ::= SEQUENCE OF RevDetails
 RevDetails ::= SEQUENCE {
     certDetails         CertTemplate,
     -- allows the requester to specify as much as they can about
     -- the cert. for which revocation is requested
     -- (e.g., for cases in which serialNumber is not available)
     crlEntryDetails     Extensions       OPTIONAL
     -- requested crlEntryExtensions
 }
 RevRepContent ::= SEQUENCE {
     status       SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
     -- in the same order as was sent in RevReqContent
     revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId
                                         OPTIONAL,
     -- IDs for which revocation was requested
     -- (same order as status)
     crls     [1] SEQUENCE SIZE (1..MAX) OF CertificateList
                                         OPTIONAL
     -- the resulting CRLs (there may be more than one)
 }
 CAKeyUpdAnnContent ::= SEQUENCE {
     oldWithNew   CMPCertificate, -- old pub signed with new priv
     newWithOld   CMPCertificate, -- new pub signed with old priv
     newWithNew   CMPCertificate  -- new pub signed with new priv
 }
 CertAnnContent ::= CMPCertificate
 RevAnnContent ::= SEQUENCE {
     status              PKIStatus,
     certId              CertId,
     willBeRevokedAt     GeneralizedTime,
     badSinceDate        GeneralizedTime,
     crlDetails          Extensions  OPTIONAL
     -- extra CRL details (e.g., crl number, reason, location, etc.)
 }
 CRLAnnContent ::= SEQUENCE OF CertificateList
 CertConfirmContent ::= SEQUENCE OF CertStatus
 CertStatus ::= SEQUENCE {
    certHash    OCTET STRING,
    -- the hash of the certificate, using the same hash algorithm
    -- as is used to create and verify the certificate signature
    certReqId   INTEGER,
    -- to match this confirmation with the corresponding req/rep
    statusInfo  PKIStatusInfo OPTIONAL,
    hashAlg [0] AlgorithmIdentifier OPTIONAL
    -- the hash algorithm to use for calculating certHash
    -- SHOULD NOT be used in all cases where the AlgorithmIdentifier
    -- of the certificate signature specifies a hash algorithm
 }
 PKIConfirmContent ::= NULL
  1. - CertReqTemplateContent, id-regCtrl-algId, id-regCtrl-algId, and
  2. - id-regCtrl-rsaKeyLen were added in CMP Updates [RFC9480]
 CertReqTemplateContent ::= SEQUENCE {
    certTemplate           CertTemplate,
    -- prefilled certTemplate structure elements
    -- The SubjectPublicKeyInfo field in the certTemplate MUST NOT
    -- be used.
    keySpec                Controls OPTIONAL
    -- MAY be used to specify supported algorithms
    -- Controls  ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
    -- as specified in CRMF [RFC4211]
    }
 id-regCtrl-altCertTemplate OBJECT IDENTIFIER ::= { id-regCtrl 7 }
    AltCertTemplate ::= AttributeTypeAndValue
    -- specifies a template for a certificate other than an X.509v3
    -- public key certificate
 id-regCtrl-algId OBJECT IDENTIFIER ::= { id-regCtrl 11 }
    AlgIdCtrl ::= AlgorithmIdentifier
    -- SHALL be used to specify supported algorithms other than RSA
 id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { id-regCtrl 12 }
    RsaKeyLenCtrl ::= INTEGER (1..MAX)
    -- SHALL be used to specify supported RSA key lengths
  1. - RootCaKeyUpdateContent, CRLSource, and CRLStatus were added in
  2. - CMP Updates [RFC9480]
 RootCaKeyUpdateContent ::= SEQUENCE {
    newWithNew       CMPCertificate,
    -- new root CA certificate
    newWithOld   [0] CMPCertificate OPTIONAL,
    -- X.509 certificate containing the new public root CA key
    -- signed with the old private root CA key
    oldWithNew   [1] CMPCertificate OPTIONAL
    -- X.509 certificate containing the old public root CA key
    -- signed with the new private root CA key
    }
 CRLSource ::= CHOICE {
    dpn          [0] DistributionPointName,
    issuer       [1] GeneralNames }
 CRLStatus ::= SEQUENCE {
    source       CRLSource,
    thisUpdate   Time OPTIONAL }
 InfoTypeAndValue ::= SEQUENCE {
     infoType               OBJECT IDENTIFIER,
     infoValue              ANY DEFINED BY infoType  OPTIONAL
 }
 -- Example InfoTypeAndValue contents include, but are not limited
 -- to, the following (uncomment in this ASN.1 module and use as
 -- appropriate for a given environment):
 --
 --   id-it-caProtEncCert    OBJECT IDENTIFIER ::= {id-it 1}
 --      CAProtEncCertValue      ::= CMPCertificate
 --   id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
 --      SignKeyPairTypesValue   ::= SEQUENCE SIZE (1..MAX) OF
 --                                        AlgorithmIdentifier
 --   id-it-encKeyPairTypes  OBJECT IDENTIFIER ::= {id-it 3}
 --      EncKeyPairTypesValue    ::= SEQUENCE SIZE (1..MAX) OF
 --                                        AlgorithmIdentifier
 --   id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
 --      PreferredSymmAlgValue   ::= AlgorithmIdentifier
 --   id-it-caKeyUpdateInfo  OBJECT IDENTIFIER ::= {id-it 5}
 --      CAKeyUpdateInfoValue    ::= CAKeyUpdAnnContent
 --   id-it-currentCRL       OBJECT IDENTIFIER ::= {id-it 6}
 --      CurrentCRLValue         ::= CertificateList
 --   id-it-unsupportedOIDs  OBJECT IDENTIFIER ::= {id-it 7}
 --      UnsupportedOIDsValue    ::= SEQUENCE SIZE (1..MAX) OF
 --                                          OBJECT IDENTIFIER
 --   id-it-keyPairParamReq  OBJECT IDENTIFIER ::= {id-it 10}
 --      KeyPairParamReqValue    ::= OBJECT IDENTIFIER
 --   id-it-keyPairParamRep  OBJECT IDENTIFIER ::= {id-it 11}
 --      KeyPairParamRepValue    ::= AlgorithmIdentifier
 --   id-it-revPassphrase    OBJECT IDENTIFIER ::= {id-it 12}
 --      RevPassphraseValue      ::= EncryptedKey
 --      - Changed from Encrypted Value to EncryptedKey as a CHOICE
 --      - of EncryptedValue and EnvelopedData due to the changes
 --      - made in CMP Updates [RFC9480].
 --      - Using the choice EncryptedValue is bit-compatible to the
 --      - syntax without this change.
 --   id-it-implicitConfirm  OBJECT IDENTIFIER ::= {id-it 13}
 --      ImplicitConfirmValue    ::= NULL
 --   id-it-confirmWaitTime  OBJECT IDENTIFIER ::= {id-it 14}
 --      ConfirmWaitTimeValue    ::= GeneralizedTime
 --   id-it-origPKIMessage   OBJECT IDENTIFIER ::= {id-it 15}
 --      OrigPKIMessageValue     ::= PKIMessages
 --   id-it-suppLangTags     OBJECT IDENTIFIER ::= {id-it 16}
 --      SuppLangTagsValue       ::= SEQUENCE OF UTF8String
 --   id-it-caCerts          OBJECT IDENTIFIER ::= {id-it 17}
 --      CaCertsValue            ::= SEQUENCE SIZE (1..MAX) OF
 --                                             CMPCertificate
 --      - id-it-caCerts added in CMP Updates [RFC9480]
 --   id-it-rootCaKeyUpdate  OBJECT IDENTIFIER ::= {id-it 18}
 --      RootCaKeyUpdateValue    ::= RootCaKeyUpdateContent
 --      - id-it-rootCaKeyUpdate added in CMP Updates [RFC9480]
 --   id-it-certReqTemplate  OBJECT IDENTIFIER ::= {id-it 19}
 --      CertReqTemplateValue    ::= CertReqTemplateContent
 --      - id-it-certReqTemplate added in CMP Updates [RFC9480]
 --   id-it-rootCaCert       OBJECT IDENTIFIER ::= {id-it 20}
 --      RootCaCertValue         ::= CMPCertificate
 --      - id-it-rootCaCert added in CMP Updates [RFC9480]
 --   id-it-certProfile      OBJECT IDENTIFIER ::= {id-it 21}
 --      CertProfileValue        ::= SEQUENCE SIZE (1..MAX) OF
 --                                                 UTF8String
 --      - id-it-certProfile added in CMP Updates [RFC9480]
 --   id-it-crlStatusList    OBJECT IDENTIFIER ::= {id-it 22}
 --   CRLStatusListValue         ::= SEQUENCE SIZE (1..MAX) OF
 --                                                  CRLStatus
 --      - id-it-crlStatusList added in CMP Updates [RFC9480]
 --   id-it-crls             OBJECT IDENTIFIER ::= {id-it 23}
 --   CRLsValue                  ::= SEQUENCE SIZE (1..MAX) OF
 --                                            CertificateList
 --      - id-it-crls added in CMP Updates [RFC9480]
 --
 -- where
 --
 --   id-pkix OBJECT IDENTIFIER ::= {
 --      iso(1) identified-organization(3)
 --      dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
 -- and
 --   id-it   OBJECT IDENTIFIER ::= {id-pkix 4}
 --
 --
 -- This construct MAY also be used to define new PKIX Certificate
 -- Management Protocol request and response messages or general-
 -- purpose (e.g., announcement) messages for future needs or for
 -- specific environments.
 GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
  1. - May be sent by EE, RA, or CA (depending on message content).
  2. - The OPTIONAL infoValue parameter of InfoTypeAndValue will
  3. - typically be omitted for some of the examples given above.
  4. - The receiver is free to ignore any contained OIDs that it
  5. - does not recognize. If sent from EE to CA, the empty set
  6. - indicates that the CA may send
  7. - any/all information that it wishes.
 GenRepContent ::= SEQUENCE OF InfoTypeAndValue
 -- The receiver MAY ignore any contained OIDs that it does not
 -- recognize.
 ErrorMsgContent ::= SEQUENCE {
     pKIStatusInfo          PKIStatusInfo,
     errorCode              INTEGER           OPTIONAL,
     -- implementation-specific error codes
     errorDetails           PKIFreeText       OPTIONAL
     -- implementation-specific error details
 }
 PollReqContent ::= SEQUENCE OF SEQUENCE {
     certReqId              INTEGER
 }
 PollRepContent ::= SEQUENCE OF SEQUENCE {
     certReqId              INTEGER,
     checkAfter             INTEGER,  -- time in seconds
     reason                 PKIFreeText OPTIONAL
 }
  1. -
  2. - Extended key usage extension for PKI entities used in CMP
  3. - operations, added due to the changes made in
  4. - CMP Updates [RFC9480]
  5. - The EKUs for the CA and RA are reused from CMC, as defined in
  6. - [RFC6402]
  7. -
  1. - id-kp-cmcCA OBJECT IDENTIFIER ::= { id-kp 27 }
  2. - id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 }

id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp 32 }

  1. - There is no 1988 ASN.1 module of PKCS #9 available to import the
  2. - syntax of the localKeyId attribute type and value from. Therefore,
  3. - the syntax is added here as needed for the updates made in
  4. - CMP Updates [RFC9480].
 pkcs-9 OBJECT IDENTIFIER ::= {iso(1) member-body(2) us(840)
                               rsadsi(113549) pkcs(1) 9}
 pkcs-9-at-localKeyId OBJECT IDENTIFIER ::= {pkcs-9 21}
 LocalKeyIdValue ::= OCTET STRING
 END -- of CMP module

A.2. Update to RFC 5912 - 2002 ASN.1 Module

 This section contains the updated 2002 ASN.1 module for [RFC5912].
 This module replaces the module in Section 9 of [RFC5912].  The
 module contains those changes to the normative ASN.1 module from
 Appendix F of [RFC4210] that were to update to the 2002 ASN.1
 standard done in [RFC5912], as well as changes made in this document.
 PKIXCMP-2021
     { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-mod(0)
     id-mod-cmp2021-02(100) }
 DEFINITIONS EXPLICIT TAGS ::=
 BEGIN
 IMPORTS
 AttributeSet{}, SingleAttribute{}, Extensions{}, EXTENSION, ATTRIBUTE
 FROM PKIX-CommonTypes-2009
     {iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57)}
 AlgorithmIdentifier{}, SIGNATURE-ALGORITHM, ALGORITHM,
     DIGEST-ALGORITHM, MAC-ALGORITHM
 FROM AlgorithmInformation-2009
     {iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0)
     id-mod-algorithmInformation-02(58)}
 Certificate, CertificateList, Time, id-kp
 FROM PKIX1Explicit-2009
     {iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51)}
 DistributionPointName, GeneralNames, GeneralName, KeyIdentifier
 FROM PKIX1Implicit-2009
     {iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-implicit-02(59)}
 CertTemplate, PKIPublicationInfo, EncryptedKey, CertId,
     CertReqMessages, Controls, RegControlSet, id-regCtrl
 FROM PKIXCRMF-2009
     { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-mod(0)
     id-mod-crmf2005-02(55) }
     -- The import of EncryptedKey is added due to the updates made
     -- in CMP Updates [RFC9480]. EncryptedValue does not need to
     -- be imported anymore and is therefore removed here.
  1. - See also the behavioral clarifications to CRMF codified in
  2. - Appendix C of this specification.
 CertificationRequest
 FROM PKCS-10
     {iso(1) identified-organization(3) dod(6) internet(1) security(5)
     mechanisms(5) pkix(7) id-mod(0) id-mod-pkcs10-2009(69)}
 -- (specified in [RFC2986] with 1993 ASN.1 syntax and IMPLICIT
 -- tags).  Alternatively, implementers may directly include
 -- the syntax of [RFC2986] in this module.
 localKeyId
 FROM PKCS-9
     {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
     modules(0) pkcs-9(1)}
     -- The import of localKeyId is added due to the updates made in
     -- CMP Updates [RFC9480].
 EnvelopedData, SignedData
 FROM CryptographicMessageSyntax-2009
     {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
     smime(16) modules(0) id-mod-cms-2004-02(41)}
     -- The import of EnvelopedData and SignedData is added due to
     -- the updates made in CMP Updates [RFC9480].
 ;
  1. - The rest of the module contains locally defined OIDs and
  2. - constructs:
 CMPCertificate ::= CHOICE { x509v3PKCert Certificate, ... }
 -- This syntax, while bits-on-the-wire compatible with the
 -- standard X.509 definition of "Certificate", allows the
 -- possibility of future certificate types (such as X.509
 -- attribute certificates, card-verifiable
 -- certificates, or other kinds of certificates) within this
 -- Certificate Management Protocol, should a need ever arise to
 -- support such generality.  Those implementations that do not
 -- foresee a need to ever support other certificate types MAY, if
 -- they wish, comment out the above structure and "uncomment" the
 -- following one prior to compiling this ASN.1 module.  (Note that
 -- interoperability with implementations that don't do this will be
 -- unaffected by this change.)
  1. - CMPCertificate ::= Certificate
 PKIMessage ::= SEQUENCE {
     header           PKIHeader,
     body             PKIBody,
     protection   [0] PKIProtection OPTIONAL,
     extraCerts   [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                   OPTIONAL }
 PKIMessages ::= SEQUENCE SIZE (1..MAX) OF PKIMessage
 PKIHeader ::= SEQUENCE {
     pvno                INTEGER     { cmp1999(1), cmp2000(2),
                                       cmp2012(3) },
     sender              GeneralName,
     -- identifies the sender
     recipient           GeneralName,
     -- identifies the intended recipient
     messageTime     [0] GeneralizedTime         OPTIONAL,
     -- time of production of this message (used when the sender
     -- believes that the transport will be "suitable", i.e.,
     -- that the time will still be meaningful upon receipt)
     protectionAlg   [1] AlgorithmIdentifier{ALGORITHM, {...}}
                             OPTIONAL,
     -- algorithm used for the calculation of protection bits
     senderKID       [2] KeyIdentifier           OPTIONAL,
     recipKID        [3] KeyIdentifier           OPTIONAL,
     -- to identify specific keys used for protection
     transactionID   [4] OCTET STRING            OPTIONAL,
     -- identifies the transaction, i.e., this will be the same in
     -- corresponding request, response, certConf, and PKIConf
     -- messages
     senderNonce     [5] OCTET STRING            OPTIONAL,
     recipNonce      [6] OCTET STRING            OPTIONAL,
     -- nonces used to provide replay protection, senderNonce
     -- is inserted by the creator of this message; recipNonce
     -- is a nonce previously inserted in a related message by
     -- the intended recipient of this message.
     freeText        [7] PKIFreeText             OPTIONAL,
     -- this may be used to indicate context-specific instructions
     -- (this field is intended for human consumption)
     generalInfo     [8] SEQUENCE SIZE (1..MAX) OF
                         InfoTypeAndValue     OPTIONAL
     -- this may be used to convey context-specific information
     -- (this field not primarily intended for human consumption)
 }
 PKIFreeText ::= SEQUENCE SIZE (1..MAX) OF UTF8String
     -- text encoded as a UTF-8 string [RFC3629]
 PKIBody ::= CHOICE {       -- message-specific body elements
     ir       [0]  CertReqMessages,        --Initialization Request
     ip       [1]  CertRepMessage,         --Initialization Response
     cr       [2]  CertReqMessages,        --Certification Request
     cp       [3]  CertRepMessage,         --Certification Response
     p10cr    [4]  CertificationRequest,   --imported from [RFC2986]
     popdecc  [5]  POPODecKeyChallContent, --pop Challenge
     popdecr  [6]  POPODecKeyRespContent,  --pop Response
     kur      [7]  CertReqMessages,        --Key Update Request
     kup      [8]  CertRepMessage,         --Key Update Response
     krr      [9]  CertReqMessages,        --Key Recovery Request
     krp      [10] KeyRecRepContent,       --Key Recovery Response
     rr       [11] RevReqContent,          --Revocation Request
     rp       [12] RevRepContent,          --Revocation Response
     ccr      [13] CertReqMessages,        --Cross-Cert. Request
     ccp      [14] CertRepMessage,         --Cross-Cert. Response
     ckuann   [15] CAKeyUpdAnnContent,     --CA Key Update Ann.
     cann     [16] CertAnnContent,         --Certificate Ann.
     rann     [17] RevAnnContent,          --Revocation Ann.
     crlann   [18] CRLAnnContent,          --CRL Announcement
     pkiconf  [19] PKIConfirmContent,      --Confirmation
     nested   [20] NestedMessageContent,   --Nested Message
     genm     [21] GenMsgContent,          --General Message
     genp     [22] GenRepContent,          --General Response
     error    [23] ErrorMsgContent,        --Error Message
     certConf [24] CertConfirmContent,     --Certificate Confirm
     pollReq  [25] PollReqContent,         --Polling Request
     pollRep  [26] PollRepContent          --Polling Response
 }
 PKIProtection ::= BIT STRING
 ProtectedPart ::= SEQUENCE {
     header    PKIHeader,
     body      PKIBody }
 id-PasswordBasedMac OBJECT IDENTIFIER ::= { iso(1) member-body(2)
     usa(840) nt(113533) nsn(7) algorithms(66) 13 }
 PBMParameter ::= SEQUENCE {
     salt                OCTET STRING,
     -- Note: Implementations MAY wish to limit acceptable sizes
     -- of this string to values appropriate for their environment
     -- in order to reduce the risk of denial-of-service attacks.
     owf                 AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
     -- AlgId for a One-Way Function
     iterationCount      INTEGER,
     -- number of times the OWF is applied
     -- Note: Implementations MAY wish to limit acceptable sizes
     -- of this integer to values appropriate for their environment
     -- in order to reduce the risk of denial-of-service attacks.
     mac                 AlgorithmIdentifier{MAC-ALGORITHM, {...}}
     -- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
     -- or HMAC [RFC2104, RFC2202])
 }
 id-DHBasedMac OBJECT IDENTIFIER ::= { iso(1) member-body(2)
     usa(840) nt(113533) nsn(7) algorithms(66) 30 }
 DHBMParameter ::= SEQUENCE {
     owf                 AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
     -- AlgId for a One-Way Function
     mac                 AlgorithmIdentifier{MAC-ALGORITHM, {...}}
     -- the MAC AlgId (e.g., HMAC-SHA256, AES-GMAC [RFC9481],
     -- or HMAC [RFC2104, RFC2202])
 }
 PKIStatus ::= INTEGER {
     accepted               (0),
     -- you got exactly what you asked for
     grantedWithMods        (1),
     -- you got something like what you asked for; the
     -- requester is responsible for ascertaining the differences
     rejection              (2),
     -- you don't get it, more information elsewhere in the message
     waiting                (3),
     -- the request body part has not yet been processed; expect to
     -- hear more later (note: proper handling of this status
     -- response MAY use the polling req/rep PKIMessages specified
     -- in Section 5.3.22 of [RFC4210]; alternatively, polling in the
     -- underlying transport layer MAY have some utility in this
     -- regard)
     revocationWarning      (4),
     -- this message contains a warning that a revocation is
     -- imminent
     revocationNotification (5),
     -- notification that a revocation has occurred
     keyUpdateWarning       (6)
     -- update already done for the oldCertId specified in
     -- CertReqMsg
 }
 PKIFailureInfo ::= BIT STRING {
 -- since we can fail in more than one way!
 -- More codes may be added in the future if/when required.
     badAlg              (0),
     -- unrecognized or unsupported algorithm identifier
     badMessageCheck     (1),
     -- integrity check failed (e.g., signature did not verify)
     badRequest          (2),
     -- transaction not permitted or supported
     badTime             (3),
     -- messageTime was not sufficiently close to the system time,
     -- as defined by local policy
     badCertId           (4),
     -- no certificate could be found matching the provided criteria
     badDataFormat       (5),
     -- the data submitted has the wrong format
     wrongAuthority      (6),
     -- the authority indicated in the request is different from the
     -- one creating the response token
     incorrectData       (7),
     -- the requester's data is incorrect (for notary services)
     missingTimeStamp    (8),
     -- when the timestamp is missing but should be there
     -- (by policy)
     badPOP              (9),
     -- the proof-of-possession failed
     certRevoked         (10),
     -- the certificate has already been revoked
     certConfirmed       (11),
     -- the certificate has already been confirmed
     wrongIntegrity      (12),
     -- not valid integrity, based on the password instead of the
     -- signature or vice versa
     badRecipientNonce   (13),
     -- not valid recipient nonce, either missing or wrong value
     timeNotAvailable    (14),
     -- the TSA's time source is not available
     unacceptedPolicy    (15),
     -- the requested TSA policy is not supported by the TSA
     unacceptedExtension (16),
     -- the requested extension is not supported by the TSA
     addInfoNotAvailable (17),
     -- the additional information requested could not be
     -- understood or is not available
     badSenderNonce      (18),
     -- not valid sender nonce, either missing or wrong size
     badCertTemplate     (19),
     -- not valid cert. template or missing mandatory information
     signerNotTrusted    (20),
     -- signer of the message unknown or not trusted
     transactionIdInUse  (21),
     -- the transaction identifier is already in use
     unsupportedVersion  (22),
     -- the version of the message is not supported
     notAuthorized       (23),
     -- the sender was not authorized to make the preceding
     -- request or perform the preceding action
     systemUnavail       (24),
     -- the request cannot be handled due to system unavailability
     systemFailure       (25),
     -- the request cannot be handled due to system failure
     duplicateCertReq    (26)
     -- the certificate cannot be issued because a duplicate
     -- certificate already exists
 }
 PKIStatusInfo ::= SEQUENCE {
     status        PKIStatus,
     statusString  PKIFreeText     OPTIONAL,
     failInfo      PKIFailureInfo  OPTIONAL }
 OOBCert ::= CMPCertificate
 OOBCertHash ::= SEQUENCE {
     hashAlg     [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}
                         OPTIONAL,
     certId      [1] CertId                  OPTIONAL,
     hashVal         BIT STRING
     -- hashVal is calculated over the DER encoding of the
     -- self-signed certificate with the identifier certID.
 }
 POPODecKeyChallContent ::= SEQUENCE OF Challenge
 -- One Challenge per encryption key certification request (in the
 -- same order as these requests appear in CertReqMessages)
 Challenge ::= SEQUENCE {
     owf                 AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}
                             OPTIONAL,
     -- MUST be present in the first Challenge; MAY be omitted in
     -- any subsequent Challenge in POPODecKeyChallContent (if
     -- omitted, then the owf used in the immediately preceding
     -- Challenge is to be used)
     witness             OCTET STRING,
     -- the result of applying the One-Way Function (owf) to a
     -- randomly generated INTEGER, A (Note that a different
     -- INTEGER MUST be used for each Challenge.)
     challenge           OCTET STRING
     -- the encryption (under the public key for which the cert.
     -- request is being made) of Rand
 }
  1. - Rand was added in CMP Updates [RFC9480]
 Rand ::= SEQUENCE {
 -- Rand is encrypted under the public key to form the challenge
 -- in POPODecKeyChallContent
    int                  INTEGER,
    -- the randomly generated INTEGER A (above)
    sender               GeneralName
    -- the sender's name (as included in PKIHeader)
 }
 POPODecKeyRespContent ::= SEQUENCE OF INTEGER
 -- One INTEGER per encryption key certification request (in the
 -- same order as these requests appear in CertReqMessages).  The
 -- retrieved INTEGER A (above) is returned to the sender of the
 -- corresponding Challenge.
 CertRepMessage ::= SEQUENCE {
     caPubs       [1] SEQUENCE SIZE (1..MAX) OF CMPCertificate
                   OPTIONAL,
     response         SEQUENCE OF CertResponse }
 CertResponse ::= SEQUENCE {
     certReqId           INTEGER,
     -- to match this response with the corresponding request (a value
     -- of -1 is to be used if certReqId is not specified in the
     -- corresponding request, which can only be a p10cr)
     status              PKIStatusInfo,
     certifiedKeyPair    CertifiedKeyPair    OPTIONAL,
     rspInfo             OCTET STRING        OPTIONAL
     -- analogous to the id-regInfo-utf8Pairs string defined
     -- for regInfo in CertReqMsg [RFC4211]
 }
 CertifiedKeyPair ::= SEQUENCE {
     certOrEncCert       CertOrEncCert,
     privateKey      [0] EncryptedKey      OPTIONAL,
     -- See [RFC4211] for comments on encoding.
     -- Changed from Encrypted Value to EncryptedKey as a CHOICE of
     -- EncryptedValue and EnvelopedData due to the changes made in
     -- CMP Updates [RFC9480].
     -- Using the choice EncryptedValue is bit-compatible to the
     -- syntax without this change.
     publicationInfo [1] PKIPublicationInfo  OPTIONAL }
 CertOrEncCert ::= CHOICE {
     certificate     [0] CMPCertificate,
     encryptedCert   [1] EncryptedKey
     -- Changed from Encrypted Value to EncryptedKey as a CHOICE of
     -- EncryptedValue and EnvelopedData due to the changes made in
     -- CMP Updates [RFC9480].
     -- Using the choice EncryptedValue is bit-compatible to the
     -- syntax without this change.
 }
 KeyRecRepContent ::= SEQUENCE {
     status                  PKIStatusInfo,
     newSigCert          [0] CMPCertificate OPTIONAL,
     caCerts             [1] SEQUENCE SIZE (1..MAX) OF
                                      CMPCertificate OPTIONAL,
     keyPairHist         [2] SEQUENCE SIZE (1..MAX) OF
                                      CertifiedKeyPair OPTIONAL }
 RevReqContent ::= SEQUENCE OF RevDetails
 RevDetails ::= SEQUENCE {
     certDetails         CertTemplate,
     -- allows the requester to specify as much as they can about
     -- the cert. for which revocation is requested
     -- (e.g., for cases in which serialNumber is not available)
     crlEntryDetails     Extensions{{...}}    OPTIONAL
     -- requested crlEntryExtensions
 }
 RevRepContent ::= SEQUENCE {
     status       SEQUENCE SIZE (1..MAX) OF PKIStatusInfo,
     -- in the same order as was sent in RevReqContent
     revCerts [0] SEQUENCE SIZE (1..MAX) OF CertId OPTIONAL,
     -- IDs for which revocation was requested
     -- (same order as status)
     crls     [1] SEQUENCE SIZE (1..MAX) OF CertificateList OPTIONAL
     -- the resulting CRLs (there may be more than one)
 }
 CAKeyUpdAnnContent ::= SEQUENCE {
     oldWithNew   CMPCertificate, -- old pub signed with new priv
     newWithOld   CMPCertificate, -- new pub signed with old priv
     newWithNew   CMPCertificate  -- new pub signed with new priv
 }
 CertAnnContent ::= CMPCertificate
 RevAnnContent ::= SEQUENCE {
     status              PKIStatus,
     certId              CertId,
     willBeRevokedAt     GeneralizedTime,
     badSinceDate        GeneralizedTime,
     crlDetails          Extensions{{...}}  OPTIONAL
     -- extra CRL details (e.g., crl number, reason, location, etc.)
 }
 CRLAnnContent ::= SEQUENCE OF CertificateList
 PKIConfirmContent ::= NULL
 NestedMessageContent ::= PKIMessages
  1. - CertReqTemplateContent, AttributeTypeAndValue,
  2. - ExpandedRegControlSet, id-regCtrl-altCertTemplate,
  3. - AltCertTemplate, regCtrl-algId, id-regCtrl-algId, AlgIdCtrl,
  4. - regCtrl-rsaKeyLen, id-regCtrl-rsaKeyLen, and RsaKeyLenCtrl
  5. - were added in CMP Updates [RFC9480]
 CertReqTemplateContent ::= SEQUENCE {
    certTemplate           CertTemplate,
    -- prefilled certTemplate structure elements
    -- The SubjectPublicKeyInfo field in the certTemplate MUST NOT
    -- be used.
    keySpec                Controls OPTIONAL
    -- MAY be used to specify supported algorithms
    -- Controls  ::= SEQUENCE SIZE (1..MAX) OF AttributeTypeAndValue
    -- as specified in CRMF [RFC4211]
    }
 AttributeTypeAndValue ::= SingleAttribute{{ ... }}
 ExpandedRegControlSet ATTRIBUTE ::= { RegControlSet |
    regCtrl-altCertTemplate | regCtrl-algId | regCtrl-rsaKeyLen, ... }
 regCtrl-altCertTemplate ATTRIBUTE ::=
    { TYPE AltCertTemplate IDENTIFIED BY id-regCtrl-altCertTemplate }
 id-regCtrl-altCertTemplate OBJECT IDENTIFIER ::= { id-regCtrl 7 }
 AltCertTemplate ::= AttributeTypeAndValue
    -- specifies a template for a certificate other than an X.509v3
    -- public key certificate
 regCtrl-algId ATTRIBUTE ::=
    { TYPE AlgIdCtrl IDENTIFIED BY id-regCtrl-algId }
 id-regCtrl-algId OBJECT IDENTIFIER ::= { id-regCtrl 11 }
 AlgIdCtrl ::= AlgorithmIdentifier{ALGORITHM, {...}}
    -- SHALL be used to specify supported algorithms other than RSA
 regCtrl-rsaKeyLen ATTRIBUTE ::=
    { TYPE RsaKeyLenCtrl IDENTIFIED BY id-regCtrl-rsaKeyLen }
 id-regCtrl-rsaKeyLen OBJECT IDENTIFIER ::= { id-regCtrl 12 }
 RsaKeyLenCtrl ::= INTEGER (1..MAX)
    -- SHALL be used to specify supported RSA key lengths
  1. - RootCaKeyUpdateContent, CRLSource, and CRLStatus were added in
  2. - CMP Updates [RFC9480]
 RootCaKeyUpdateContent ::= SEQUENCE {
    newWithNew       CMPCertificate,
    -- new root CA certificate
    newWithOld   [0] CMPCertificate OPTIONAL,
    -- X.509 certificate containing the new public root CA key
    -- signed with the old private root CA key
    oldWithNew   [1] CMPCertificate OPTIONAL
    -- X.509 certificate containing the old public root CA key
    -- signed with the new private root CA key
    }
 CRLSource ::= CHOICE {
    dpn          [0] DistributionPointName,
    issuer       [1] GeneralNames }
 CRLStatus ::= SEQUENCE {
    source       CRLSource,
    thisUpdate   Time OPTIONAL }
 INFO-TYPE-AND-VALUE ::= TYPE-IDENTIFIER
 InfoTypeAndValue ::= SEQUENCE {
     infoType    INFO-TYPE-AND-VALUE.
                     &id({SupportedInfoSet}),
     infoValue   INFO-TYPE-AND-VALUE.
                     &Type({SupportedInfoSet}{@infoType}) }
 SupportedInfoSet INFO-TYPE-AND-VALUE ::= { ... }
  1. - Example InfoTypeAndValue contents include, but are not limited
  2. - to, the following (uncomment in this ASN.1 module and use as
  3. - appropriate for a given environment):
  4. -
  5. - id-it-caProtEncCert OBJECT IDENTIFIER ::= {id-it 1}
  6. - CAProtEncCertValue ::= CMPCertificate
  7. - id-it-signKeyPairTypes OBJECT IDENTIFIER ::= {id-it 2}
  8. - SignKeyPairTypesValue ::= SEQUENCE SIZE (1..MAX) OF
  9. - AlgorithmIdentifierrfc
  10. - id-it-encKeyPairTypes OBJECT IDENTIFIER ::= {id-it 3}
  11. - EncKeyPairTypesValue ::= SEQUENCE SIZE (1..MAX) OF
  12. - AlgorithmIdentifierrfc
  13. - id-it-preferredSymmAlg OBJECT IDENTIFIER ::= {id-it 4}
  14. - PreferredSymmAlgValue ::= AlgorithmIdentifierrfc
  15. - id-it-caKeyUpdateInfo OBJECT IDENTIFIER ::= {id-it 5}
  16. - CAKeyUpdateInfoValue ::= CAKeyUpdAnnContent
  17. - id-it-currentCRL OBJECT IDENTIFIER ::= {id-it 6}
  18. - CurrentCRLValue ::= CertificateList
  19. - id-it-unsupportedOIDs OBJECT IDENTIFIER ::= {id-it 7}
  20. - UnsupportedOIDsValue ::= SEQUENCE SIZE (1..MAX) OF
  21. - OBJECT IDENTIFIER
  22. - id-it-keyPairParamReq OBJECT IDENTIFIER ::= {id-it 10}
  23. - KeyPairParamReqValue ::= OBJECT IDENTIFIER
  24. - id-it-keyPairParamRep OBJECT IDENTIFIER ::= {id-it 11}
  25. - KeyPairParamRepValue ::= AlgorithmIdentifierrfc
  26. - id-it-revPassphrase OBJECT IDENTIFIER ::= {id-it 12}
  27. - RevPassphraseValue ::= EncryptedKey
  28. - - Changed from Encrypted Value to EncryptedKey as a CHOICE
  29. - - of EncryptedValue and EnvelopedData due to the changes
  30. - - made in CMP Updates [RFC9480]
  31. - - Using the choice EncryptedValue is bit-compatible to
  32. - - the syntax without this change
  33. - id-it-implicitConfirm OBJECT IDENTIFIER ::= {id-it 13}
  34. - ImplicitConfirmValue ::= NULL
  35. - id-it-confirmWaitTime OBJECT IDENTIFIER ::= {id-it 14}
  36. - ConfirmWaitTimeValue ::= GeneralizedTime
  37. - id-it-origPKIMessage OBJECT IDENTIFIER ::= {id-it 15}
  38. - OrigPKIMessageValue ::= PKIMessages
  39. - id-it-suppLangTags OBJECT IDENTIFIER ::= {id-it 16}
  40. - SuppLangTagsValue ::= SEQUENCE OF UTF8String
  41. - id-it-caCerts OBJECT IDENTIFIER ::= {id-it 17}
  42. - CaCertsValue ::= SEQUENCE SIZE (1..MAX) OF
  43. - CMPCertificate
  44. - - id-it-caCerts added in CMP Updates [RFC9480]
  45. - id-it-rootCaKeyUpdate OBJECT IDENTIFIER ::= {id-it 18}
  46. - RootCaKeyUpdateValue ::= RootCaKeyUpdateContent
  47. - - id-it-rootCaKeyUpdate added in CMP Updates [RFC9480]
  48. - id-it-certReqTemplate OBJECT IDENTIFIER ::= {id-it 19}
  49. - CertReqTemplateValue ::= CertReqTemplateContent
  50. - - id-it-certReqTemplate added in CMP Updates [RFC9480]
  51. - id-it-rootCaCert OBJECT IDENTIFIER ::= {id-it 20}
  52. - RootCaCertValue ::= CMPCertificate
  53. - - id-it-rootCaCert added in CMP Updates [RFC9480]
  54. - id-it-certProfile OBJECT IDENTIFIER ::= {id-it 21}
  55. - CertProfileValue ::= SEQUENCE SIZE (1..MAX) OF
  56. - UTF8String
  57. - - id-it-certProfile added in CMP Updates [RFC9480]
  58. - id-it-crlStatusList OBJECT IDENTIFIER ::= {id-it 22}
  59. - CRLStatusListValue ::= SEQUENCE SIZE (1..MAX) OF
  60. - CRLStatus
  61. - - id-it-crlStatusList added in CMP Updates [RFC9480]
  62. - id-it-crls OBJECT IDENTIFIER ::= {id-it 23}
  63. - CRLsValue ::= SEQUENCE SIZE (1..MAX) OF
  64. - CertificateList
  65. - - id-it-crls added in CMP Updates [RFC9480]
  66. -
  67. - where
  68. -
  69. - id-pkix OBJECT IDENTIFIER ::= {
  70. - iso(1) identified-organization(3)
  71. - dod(6) internet(1) security(5) mechanisms(5) pkix(7)}
  72. - and
  73. - id-it OBJECT IDENTIFIER ::= {id-pkix 4}
  74. -
  75. -
  76. - This construct MAY also be used to define new PKIX Certificate
  77. - Management Protocol request and response messages or general-
  78. - purpose (e.g., announcement) messages for future needs or for
  79. - specific environments.
 GenMsgContent ::= SEQUENCE OF InfoTypeAndValue
  1. - May be sent by EE, RA, or CA (depending on message content).
  2. - The OPTIONAL infoValue parameter of InfoTypeAndValue will
  3. - typically be omitted for some of the examples given above.
  4. - The receiver is free to ignore any contained OIDs that it
  5. - does not recognize. If sent from EE to CA, the empty set
  6. - indicates that the CA may send
  7. - any/all information that it wishes.
 GenRepContent ::= SEQUENCE OF InfoTypeAndValue
 -- The receiver MAY ignore any contained OIDs that it does not
 -- recognize.
 ErrorMsgContent ::= SEQUENCE {
     pKIStatusInfo          PKIStatusInfo,
     errorCode              INTEGER           OPTIONAL,
     -- implementation-specific error codes
     errorDetails           PKIFreeText       OPTIONAL
     -- implementation-specific error details
 }
 CertConfirmContent ::= SEQUENCE OF CertStatus
 CertStatus ::= SEQUENCE {
     certHash    OCTET STRING,
     -- the hash of the certificate, using the same hash algorithm
     -- as is used to create and verify the certificate signature
     certReqId   INTEGER,
     -- to match this confirmation with the corresponding req/rep
     statusInfo  PKIStatusInfo OPTIONAL,
     hashAlg [0] AlgorithmIdentifier{DIGEST-ALGORITHM, {...}} OPTIONAL
     -- the hash algorithm to use for calculating certHash
     -- SHOULD NOT be used in all cases where the AlgorithmIdentifier
     -- of the certificate signature specifies a hash algorithm
    }
 PollReqContent ::= SEQUENCE OF SEQUENCE {
     certReqId              INTEGER }
 PollRepContent ::= SEQUENCE OF SEQUENCE {
     certReqId              INTEGER,
     checkAfter             INTEGER,  -- time in seconds
     reason                 PKIFreeText OPTIONAL }
  1. -
  2. - Extended key usage extension for PKI entities used in CMP
  3. - operations, added due to the changes made in
  4. - CMP Updates [RFC9480]
  5. - The EKUs for the CA and RA are reused from CMC, as defined in
  6. - [RFC6402]
  7. -
  1. - id-kp-cmcCA OBJECT IDENTIFIER ::= { id-kp 27 }
  2. - id-kp-cmcRA OBJECT IDENTIFIER ::= { id-kp 28 }

id-kp-cmKGA OBJECT IDENTIFIER ::= { id-kp 32 }

 END

Acknowledgements

 Special thanks goes to Jim Schaad for his guidance and the
 inspiration to structure and write this document like [RFC6402],
 which updates CMC.  Special thanks also goes to Russ Housley, Lijun
 Liao, Martin Peylo, and Tomas Gustavsson for reviewing and providing
 valuable suggestions on improving this document.
 We also thank all reviewers of this document for their valuable
 feedback.

Authors' Addresses

 Hendrik Brockhaus
 Siemens
 Werner-von-Siemens-Strasse 1
 80333 Munich
 Germany
 Email: hendrik.brockhaus@siemens.com
 URI:   https://www.siemens.com
 David von Oheimb
 Siemens
 Werner-von-Siemens-Strasse 1
 80333 Munich
 Germany
 Email: david.von.oheimb@siemens.com
 URI:   https://www.siemens.com
 John Gray
 Entrust
 1187 Park Place
 Minneapolis, MN 55379
 United States of America
 Email: john.gray@entrust.com
 URI:   https://www.entrust.com
/home/gen.uk/domains/wiki.gen.uk/public_html/data/pages/rfc/rfc9480.txt · Last modified: 2023/11/05 15:29 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki