Difference between revisions of "RFC5917"

From RFC-Wiki
 
Line 23: Line 23:
 
Internet Engineering Steering Group (IESG).  Not all documents
 
Internet Engineering Steering Group (IESG).  Not all documents
 
approved by the IESG are a candidate for any level of Internet
 
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
+
Standard; see Section 2 of [[RFC5741|RFC 5741]].
  
 
Information about the current status of this document, any
 
Information about the current status of this document, any
Line 34: Line 34:
 
document authors.  All rights reserved.
 
document authors.  All rights reserved.
  
This document is subject to BCP 78 and the IETF Trust's Legal
+
This document is subject to [[BCP78|BCP 78]] and the IETF Trust's Legal
 
Provisions Relating to IETF Documents
 
Provisions Relating to IETF Documents
 
(http://trustee.ietf.org/license-info) in effect on the date of
 
(http://trustee.ietf.org/license-info) in effect on the date of
Line 47: Line 47:
  
 
This document specifies the clearance sponsor attribute.  It is
 
This document specifies the clearance sponsor attribute.  It is
included in public key certificates [[[RFC5280]]] and attribute
+
included in public key certificates [[RFC5280]] and attribute
certificates [[[RFC5755]]].  This attribute is only meaningful as a
+
certificates [[RFC5755]].  This attribute is only meaningful as a
companion of the clearance attribute [[[RFC5755]]] [[[RFC5912]]].  The
+
companion of the clearance attribute [[RFC5755]] [[RFC5912]].  The
 
clearance sponsor is the entity (e.g., agency, department, or
 
clearance sponsor is the entity (e.g., agency, department, or
 
organization) that granted the clearance to the subject named in the
 
organization) that granted the clearance to the subject named in the
 
certificate.  For example, the clearance sponsor for a subject
 
certificate.  For example, the clearance sponsor for a subject
asserting the Amoco clearance values [[[RFC3114]]] could be
+
asserting the Amoco clearance values [[RFC3114]] could be
 
"Engineering".
 
"Engineering".
  
Line 60: Line 60:
 
check that the clearance sponsor present in the user's certificate is
 
check that the clearance sponsor present in the user's certificate is
 
on an "approved" list.  This check is performed in addition to
 
on an "approved" list.  This check is performed in addition to
certification path validation [[[RFC5280]]].  The mechanism for managing
+
certification path validation [[RFC5280]].  The mechanism for managing
 
the "approved" list is beyond the scope of this document.
 
the "approved" list is beyond the scope of this document.
  
 
NOTE: This document does not provide an equivalent Lightweight
 
NOTE: This document does not provide an equivalent Lightweight
 
Directory Access Protocol (LDAP) schema specification as this
 
Directory Access Protocol (LDAP) schema specification as this
attribute is initially targeted at public key certificates [[[RFC5280]]]
+
attribute is initially targeted at public key certificates [[RFC5280]]
and attribute certificates [[[RFC5755]]].  Definition of an equivalent
+
and attribute certificates [[RFC5755]].  Definition of an equivalent
 
LDAP schema is left to a future specification.
 
LDAP schema is left to a future specification.
  
Line 73: Line 73:
 
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
 
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
 
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [[[RFC2119]]].
+
document are to be interpreted as described in [[RFC2119]].
  
 
=== ASN.1 Syntax Notation ===
 
=== ASN.1 Syntax Notation ===
Line 83: Line 83:
  
 
The clearance sponsor attribute, which is only meaningful if the
 
The clearance sponsor attribute, which is only meaningful if the
clearance attribute [[[RFC5755]]] [[[RFC5912]]] is also present, indicates
+
clearance attribute [[RFC5755]] [[RFC5912]] is also present, indicates
 
the sponsor of the clearance of the subject with which this attribute
 
the sponsor of the clearance of the subject with which this attribute
 
is associated.  The clearance sponsor attribute is a DirectoryString
 
is associated.  The clearance sponsor attribute is a DirectoryString
[[[RFC5280]]], which MUST use the UTF8String CHOICE, with a minimum size
+
[[RFC5280]], which MUST use the UTF8String CHOICE, with a minimum size
 
of 1 character and a maximum of 64 characters.
 
of 1 character and a maximum of 64 characters.
  
Line 154: Line 154:
 
=== Normative References ===
 
=== Normative References ===
  
[[[RFC2119]]]  Bradner, S., "Key words for use in RFCs to Indicate
+
[[RFC2119]]  Bradner, S., "Key words for use in RFCs to Indicate
           Requirement Levels", BCP 14, RFC 2119, March 1997.
+
           Requirement Levels", [[BCP14|BCP 14]], [[RFC2119|RFC 2119]], March 1997.
  
[[[RFC5280]]]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
+
[[RFC5280]]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
 
           Housley, R., and W. Polk, "Internet X.509 Public Key
 
           Housley, R., and W. Polk, "Internet X.509 Public Key
 
           Infrastructure Certificate and Certificate Revocation List
 
           Infrastructure Certificate and Certificate Revocation List
           (CRL) Profile", RFC 5280, May 2008.
+
           (CRL) Profile", [[RFC5280|RFC 5280]], May 2008.
  
[[[RFC5755]]]  Farrell, S., Housley, R., and S. Turner, "An Internet
+
[[RFC5755]]  Farrell, S., Housley, R., and S. Turner, "An Internet
 
           Attribute Certificate Profile for Authorization", RFC
 
           Attribute Certificate Profile for Authorization", RFC
 
           5755, January 2010.
 
           5755, January 2010.
  
[[[RFC5912]]]  Schaad, J. and P. Hoffman, "New ASN.1 Modules for the
+
[[RFC5912]]  Schaad, J. and P. Hoffman, "New ASN.1 Modules for the
           Public Key Infrastructure Using X.509 (PKIX)", RFC 5912,
+
           Public Key Infrastructure Using X.509 (PKIX)", [[RFC5912|RFC 5912]],
 
           June 2010.
 
           June 2010.
  
Line 192: Line 192:
 
=== Informative References ===
 
=== Informative References ===
  
[[[RFC3114]]]  Nicolls, W., "Implementing Company Classification Policy
+
[[RFC3114]]  Nicolls, W., "Implementing Company Classification Policy
           with the S/MIME Security Label", RFC 3114, May 2002.
+
           with the S/MIME Security Label", [[RFC3114|RFC 3114]], May 2002.
  
 
Appendix A.  ASN.1 Module
 
Appendix A.  ASN.1 Module
Line 214: Line 214:
 
IMPORTS
 
IMPORTS
  
-- Imports from New PKIX ASN.1 [[[RFC5912]]]
+
-- Imports from New PKIX ASN.1 [[RFC5912]]
  
 
   DirectoryString
 
   DirectoryString
Line 222: Line 222:
 
         id-pkix1-explicit-02(51) }
 
         id-pkix1-explicit-02(51) }
  
-- Imports from New PKIX ASN.1 [[[RFC5912]]]
+
-- Imports from New PKIX ASN.1 [[RFC5912]]
  
 
   ATTRIBUTE
 
   ATTRIBUTE

Latest revision as of 14:50, 21 October 2020

Internet Engineering Task Force (IETF) S. Turner Request for Comments: 5917 IECA Category: Informational June 2010 ISSN: 2070-1721

                  Clearance Sponsor Attribute

Abstract

This document defines the clearance sponsor attribute. It indicates the entity that sponsored (i.e., granted) the clearance. This attribute is intended for use in public key certificates and attribute certificates that also include the clearance attribute.

Status of This Memo

This document is not an Internet Standards Track specification; it is published for informational purposes.

This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741.

Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5917.

Copyright Notice

Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

Introduction

This document specifies the clearance sponsor attribute. It is included in public key certificates RFC5280 and attribute certificates RFC5755. This attribute is only meaningful as a companion of the clearance attribute RFC5755 RFC5912. The clearance sponsor is the entity (e.g., agency, department, or organization) that granted the clearance to the subject named in the certificate. For example, the clearance sponsor for a subject asserting the Amoco clearance values RFC3114 could be "Engineering".

This attribute may be used in automated authorization decisions. For example, a web server deciding whether to allow a user access could check that the clearance sponsor present in the user's certificate is on an "approved" list. This check is performed in addition to certification path validation RFC5280. The mechanism for managing the "approved" list is beyond the scope of this document.

NOTE: This document does not provide an equivalent Lightweight Directory Access Protocol (LDAP) schema specification as this attribute is initially targeted at public key certificates RFC5280 and attribute certificates RFC5755. Definition of an equivalent LDAP schema is left to a future specification.

Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC2119.

ASN.1 Syntax Notation

The attribute is defined using ASN.1 [X.680], [X.681], [X.682], and [X.683].

Clearance Sponsor

The clearance sponsor attribute, which is only meaningful if the clearance attribute RFC5755 RFC5912 is also present, indicates the sponsor of the clearance of the subject with which this attribute is associated. The clearance sponsor attribute is a DirectoryString RFC5280, which MUST use the UTF8String CHOICE, with a minimum size of 1 character and a maximum of 64 characters.

The following object identifier identifies the sponsor attribute:

id-clearanceSponsor OBJECT IDENTIFIER ::= {

 joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101)
 dod(2) infosec(1) attributes(5) 68

}

The ASN.1 syntax for the clearance sponsor attribute is as follows:

at-clearanceSponsor ATTRIBUTE ::= {

 TYPE                   DirectoryString { ub-clearance-sponsor }
                        ( WITH COMPONENTS { utf8String PRESENT } )
 EQUALITY MATCHING RULE caseIgnoreMatch
 IDENTIFIED BY          id-clearanceSponsor

}

ub-clearance-sponsor INTEGER ::= 64

There MUST only be one value of clearanceSponsor associated with a particular certificate. Distinct sponsors MUST be represented in separate certificates.

When an environment uses the Clearance Sponsor attribute, it is important that the same representation of the sponsor be used throughout the environment (e.g., using the same acronym). Further, the value in this attribute is not meant to be globally unique. When included in certificates, it is unique within the scope of the issuer.

Security Considerations

If this attribute is used as part of an authorization process, the procedures employed by the entity that assigns each clearance sponsor value must ensure that the correct value is applied. Including this attribute in a public key certificate or attribute certificate ensures that the value for the clearance sponsor is integrity protected.

The certificate issuer and clearance sponsor are not necessarily the same entity. If they are separate entities, then the mechanism used by the clearance sponsor to convey to the certificate issuer that the clearance sponsor did in fact grant the clearance to the subject needs to be protected from unauthorized modification.

If two entities are verifying each other's certificates, they do not share the same issuer, and they use the same clearance sponsor value (e.g., a United Kingdom PKI includes "MoD" and a New Zealand PKI also includes "MoD"), then the relying party has two choices: 1) accept

the two strings as equivalent, or 2) indicate the sponsor as well as the trust anchor. To solve this problem, a mechanism, which is outside the scope of this specification, could be developed to allow a relying party to group together issuers that share a same context within which sponsor names have a unique significance.

While values of DirectoryString can include the NUL (U+0000) code point, values used to represent clearance sponsors typically would not. Implementations of the caseIgnoreMatch rule must, per X.501, consider all of the assertion value and attribute value in matching and hence protect against truncation attacks.

References

Normative References

RFC2119 Bradner, S., "Key words for use in RFCs to Indicate

          Requirement Levels", BCP 14, RFC 2119, March 1997.

RFC5280 Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,

          Housley, R., and W. Polk, "Internet X.509 Public Key
          Infrastructure Certificate and Certificate Revocation List
          (CRL) Profile", RFC 5280, May 2008.

RFC5755 Farrell, S., Housley, R., and S. Turner, "An Internet

          Attribute Certificate Profile for Authorization", RFC
          5755, January 2010.

RFC5912 Schaad, J. and P. Hoffman, "New ASN.1 Modules for the

          Public Key Infrastructure Using X.509 (PKIX)", RFC 5912,
          June 2010.

[X.520] ITU-T Recommendation X.520 (2002) | ISO/IEC 9594-6:2002,

          Information technology - The Directory:Selected Attribute
          Types.

[X.680] ITU-T Recommendation X.680 (2002) | ISO/IEC 8824-1:2002,

          Information technology - Abstract Syntax Notation One
          (ASN.1): Specification of basic notation.

[X.681] ITU-T Recommendation X.681 (2002) | ISO/IEC 8824-2:2002,

          Information Technology - Abstract Syntax Notation One:
          Information Object Specification.

[X.682] ITU-T Recommendation X.682 (2002) | ISO/IEC 8824-3:2002,

          Information Technology - Abstract Syntax Notation One:
          Constraint Specification.

[X.683] ITU-T Recommendation X.683 (2002) | ISO/IEC 8824-4:2002,

          Information Technology - Abstract Syntax Notation One:
          Parameterization of ASN.1 Specifications.

Informative References

RFC3114 Nicolls, W., "Implementing Company Classification Policy

          with the S/MIME Security Label", RFC 3114, May 2002.

Appendix A. ASN.1 Module

This appendix provides the normative ASN.1 [X.680] definitions for the structures described in this specification using ASN.1 as defined in [X.680], [X.681], [X.682], and [X.683].

ClearanceSponsorAttribute-2008

 { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101)
   dod(2) infosec(1) modules(0)
   id-clearanceSponsorAttribute-2008(35) }

DEFINITIONS IMPLICIT TAGS ::=

BEGIN

-- EXPORTS ALL --

IMPORTS

-- Imports from New PKIX ASN.1 RFC5912

 DirectoryString
   PKIX1Explicit-2009
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit-02(51) }

-- Imports from New PKIX ASN.1 RFC5912

 ATTRIBUTE
   FROM PKIX-CommonTypes-2009
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-mod-pkixCommon-02(57) }

-- Imports from ITU-T X.520 [X.520]

 caseIgnoreMatch
   FROM SelectedAttributeTypes
     { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 }

-- sponsor attribute OID and syntax

id-clearanceSponsor OBJECT IDENTIFIER ::= {

 joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101)
 dod(2) infosec(1) attributes(5) 68

}

at-clearanceSponsor ATTRIBUTE ::= {

 TYPE                   DirectoryString { ub-clearance-sponsor }
                        ( WITH COMPONENTS { utf8String PRESENT } )
 EQUALITY MATCHING RULE caseIgnoreMatch
 IDENTIFIED BY          id-clearanceSponsor

}

ub-clearance-sponsor INTEGER ::= 64

END

Author's Address

Sean Turner IECA, Inc. 3057 Nutley Street, Suite 106 Fairfax, VA 22031 USA

EMail: [email protected]