Skip to main content

Updates for RSAES-OAEP and RSASSA-PSS Algorithm Parameters
draft-ietf-pkix-rfc4055-update-02

Revision differences

Document history

Date Rev. By Action
2012-08-22
02 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2009-03-16
02 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-03-16
02 (System) IANA Action state changed to No IC from In Progress
2009-03-16
02 (System) IANA Action state changed to In Progress
2009-03-16
02 Amy Vezza IESG state changed to Approved-announcement sent
2009-03-16
02 Amy Vezza IESG has approved the document
2009-03-16
02 Amy Vezza Closed "Approve" ballot
2009-03-16
02 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2009-03-10
02 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2009-03-09
02 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-03-09
02 (System) New version available: draft-ietf-pkix-rfc4055-update-02.txt
2009-02-10
02 Pasi Eronen State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Pasi Eronen
2009-01-30
02 (System) Removed from agenda for telechat - 2009-01-29
2009-01-29
02 Cindy Morgan State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan
2009-01-29
02 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2009-01-29
02 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2009-01-29
02 Jari Arkko
[Ballot discuss]
This is a good spec, but there were two easily correctable problems.

First, Section 2 says: "CAs that issue certificates with the
id-RSASSA-PSS …
[Ballot discuss]
This is a good spec, but there were two easily correctable problems.

First, Section 2 says: "CAs that issue certificates with the
id-RSASSA-PSS algorithm identifier SHOULD require the presence of
parameters in the subjectPublicKeyInfo algorithm field if the cA
boolean flag is set in the basic constraints certificate extension."

By reading this, it is not clear to me if you are talking about
something that the CA should do for the certificate it is creating,
or if it needs to verify something from the certificate request.
Either way, the text should probably be written slightly differently
to make it clear to implementors what they need to do. For instance,
"... SHOULD include parameters ..." or "... in the subjectPublicKeyInfo
algorithm field of the certificate request, if ..."

Secondly, Sections 3 and 4 introduce changes where the presence of a
field goes from SHOULD include to MUST NOT include. By reading the
writeup I understand that this does not have interoperability
implications, as it has not been implemented anyway (but it speaks
only about CAs, what about hosts?). Could you add a sentence or two
to the document to say the same thing? The writeup is not easily
accessible for anyone reading the RFC later.
2009-01-29
02 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2009-01-29
02 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2009-01-29
02 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2009-01-28
02 Chris Newman [Ballot Position Update] New position, Yes, has been recorded by Chris Newman
2009-01-28
02 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-01-28
02 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-01-28
02 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2009-01-27
02 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-01-27
02 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2009-01-26
02 Tim Polk [Ballot Position Update] New position, Recuse, has been recorded by Tim Polk
2009-01-22
02 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Tero Kivinen.
2009-01-22
02 Pasi Eronen State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Pasi Eronen
2009-01-22
02 Pasi Eronen Note field has been cleared by Pasi Eronen
2009-01-19
02 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-01-15
02 Samuel Weiler Request for Last Call review by SECDIR is assigned to Tero Kivinen
2009-01-15
02 Samuel Weiler Request for Last Call review by SECDIR is assigned to Tero Kivinen
2009-01-14
02 Amanda Baber IANA Last Call comments:

As described in the IANA Considerations section, we understand
this document to have NO IANA Actions.
2009-01-07
02 Russ Housley [Ballot Position Update] New position, Recuse, has been recorded by Russ Housley
2009-01-07
02 Pasi Eronen [Ballot Position Update] New position, Yes, has been recorded for Pasi Eronen
2009-01-07
02 Pasi Eronen Ballot has been issued by Pasi Eronen
2009-01-07
02 Pasi Eronen Created "Approve" ballot
2009-01-07
02 Pasi Eronen Placed on agenda for telechat - 2009-01-29 by Pasi Eronen
2009-01-05
02 Amy Vezza Last call sent
2009-01-05
02 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2009-01-04
02 Pasi Eronen Last Call was requested by Pasi Eronen
2009-01-04
02 Pasi Eronen State Changes to Last Call Requested from AD Evaluation by Pasi Eronen
2009-01-04
02 (System) Ballot writeup text was added
2009-01-04
02 (System) Last call text was added
2009-01-04
02 (System) Ballot approval text was added
2008-12-18
02 Pasi Eronen Will start IETF Last Call after the holidays.
2008-12-18
02 Pasi Eronen State Changes to AD Evaluation from Publication Requested by Pasi Eronen
2008-11-14
02 Tim Polk Originally assigned to Tim Polk but he is a co-author.
2008-11-14
02 Tim Polk Responsible AD has been changed to Pasi Eronen from Tim Polk
2008-08-27
02 Tim Polk Intended Status has been changed to Proposed Standard from None
2008-08-27
02 Tim Polk
This is the proto writeup for draft-ietf-pkix-rfc4055-update-01.txt.

Responses to questions 1.a-1.h in RFC 4858:

1.a - Steve Kent is the Shepherd.  He has personally …
This is the proto writeup for draft-ietf-pkix-rfc4055-update-01.txt.

Responses to questions 1.a-1.h in RFC 4858:

1.a - Steve Kent is the Shepherd.  He has personally reviewed the document
and asserts that it is ready for IESG publication.

1.b - The document has been reviewed by key WG members.  There are no
concerns about depth or breadth of the reviews.

1.c - I see no need for wider review.

1.d - There are no specific concerns of which the AD and/or IESG should be aware.

1.e - The WG consensus is now solid.

1.f - There has been no threat of an appeal by an WG members.

1.g - I have personally verified that the document satisfies all ID nits.

1.h - The document splits it references into normative and informative as required.

1.i - The document has an IANA consideration and it is consistent with the
main body (there are no IANA considerations).

1.j - There is no formal language in this document.

1.k - Write-up is as follows:

Technical Summary

The subjectPublicKeyInfo field of an X.509 certificate carries three data items: an algorithm identifier, optional parameters, and a bit string that represents the public key. The parameters are specific to the algorithm and this field usually contains simple values needed to characterize the public key algorithm, e.g., the generator and modulus for Diffie-Hellman. However, X.509 does not constrain the scope of this parameters field. The ANSI X9.62 standards committee elected to use this field to express potentially complex limitations on how the public key in the certificate can be used, e.g., which key derivation functions can be applied to the bit string that results from a Diffie-Hellman key exchange.

After considerable debate, the PKIX WG has decided to not express key usage constraints via this field. Instead, the WG decided that this sort of information should be expressed via use of distinct algorithm identifiers. (This  decision is consistent with the observation that current products are not deigned to handle such key usage restrictions expressed in the subjectPublicKeyInfo field.)

RFC 4055 such allowed restrictions to be placed in this field when used with RSA-OAEP.  This document changes RFC 4055 to say that restrictions MUST NOT be present in the certificate's subjectPublicKeyInfo field when used with RSA-OAEP. It also replaces incorrect references to the publicKeyAlgorithm field with references to the subjectPublicKeyInfo field. As a result, this revised version of RFC 4055 will be consistent with the PKIX WG conventions  adopted for this field.

Working Group Summary

This ID was discussed on the mailing list. A poll was taken on the PKIX list to determine whether the proposed change was the way forward and another poll was taken to determine whether the change would adversely affect implementations. The WG was in favor of the change and no implementer said it would adversely affect their products. Further, vendors that implement RFC 4055 support the change.

Document Quality

This document is a short update of an existing draft and is comparable in quality to its predecessor.

Personnel

Steve Kent is the document Shepherd.  Tim Polk is the responsible Security Area AD.
2008-08-27
02 Tim Polk Draft Added by Tim Polk in state Publication Requested
2008-05-01
01 (System) New version available: draft-ietf-pkix-rfc4055-update-01.txt
2008-01-23
00 (System) New version available: draft-ietf-pkix-rfc4055-update-00.txt