Skip to main content

Updates to Lightweight OCSP Profile for High Volume Environments
draft-ietf-lamps-rfc5019bis-12

Revision differences

Document history

Date Rev. By Action
2024-09-19
12 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Overtaken by Events'
2024-09-19
12 Tero Kivinen Assignment of request for Last Call review by SECDIR to Ivaylo Petrov was marked no-response
2024-09-13
12 (System) IANA Action state changed to No IANA Actions from In Progress
2024-09-13
12 (System) RFC Editor state changed to MISSREF
2024-09-13
12 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2024-09-13
12 (System) Announcement was received by RFC Editor
2024-09-13
12 (System) IANA Action state changed to In Progress
2024-09-13
12 (System) Removed all action holders (IESG state changed)
2024-09-13
12 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2024-09-13
12 Cindy Morgan IESG has approved the document
2024-09-13
12 Cindy Morgan Closed "Approve" ballot
2024-09-13
12 Cindy Morgan Ballot approval text was generated
2024-09-13
12 Cindy Morgan Ballot writeup was changed
2024-09-13
12 Roman Danyliw IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2024-09-13
12 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-12.txt
2024-09-13
12 (System) New version approved
2024-09-13
12 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-09-13
12 Tadahiko Ito Uploaded new revision
2024-09-13
11 (System) Changed action holders to Roman Danyliw (IESG state changed)
2024-09-13
11 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2024-09-13
11 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-11.txt
2024-09-13
11 (System) New version approved
2024-09-13
11 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-09-13
11 Tadahiko Ito Uploaded new revision
2024-09-09
10 Roman Danyliw Per Murray Kucherawy's IESG review, please add replace "HTTP header" with "HTTP header field" in Section 6 and 7.2
2024-09-09
10 (System) Changed action holders to Sean Turner, Clint Wilson, Tadahiko Ito, Corey Bonnell (IESG state changed)
2024-09-09
10 Roman Danyliw IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation::AD Followup
2024-08-14
10 Paul Wouters [Ballot comment]
thanks for confirming the IPR issue is properly set.
2024-08-14
10 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss
2024-08-11
10 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-10.txt
2024-08-11
10 (System) New version approved
2024-08-11
10 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-08-11
10 Tadahiko Ito Uploaded new revision
2024-08-11
09 (System) Changed action holders to Roman Danyliw (IESG state changed)
2024-08-11
09 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2024-08-11
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2024-08-11
09 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-09.txt
2024-08-11
09 (System) New version approved
2024-08-11
09 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-08-11
09 Tadahiko Ito Uploaded new revision
2024-07-15
08 Carlos Pignataro Closed request for Last Call review by OPSDIR with state 'Overtaken by Events'
2024-07-15
08 Carlos Pignataro Assignment of request for Last Call review by OPSDIR to Nagendra Nainar was marked no-response
2024-05-02
08 Roman Danyliw Please revise per IESG feedback -- to address the DISCUSS, replace the document boilerplate with the pre5378Trust200902 version.
2024-04-18
08 (System) Changed action holders to Tadahiko Ito, Clint Wilson, Corey Bonnell, Sean Turner (IESG state changed)
2024-04-18
08 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2024-04-18
08 Murray Kucherawy [Ballot comment]
Where you say "header", I believe you mean "header field", especially below Section 7.
2024-04-18
08 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2024-04-18
08 Deb Cooley
[Ballot comment]
I have only one comment:

Section 3.2.2, Appendix A:  The two terms 'byName' and 'byKey' are used without being defined (note: this is …
[Ballot comment]
I have only one comment:

Section 3.2.2, Appendix A:  The two terms 'byName' and 'byKey' are used without being defined (note: this is true in RFC 5019 too).  There are numerous 'Name' fields in the ASN.1, but no 'Key' fields.  My suggestion is to define these terms by pointing to the appropriate ASN.1 field.

[note:  finally, I get to ballot on a document I understand.  LOL]
2024-04-18
08 Deb Cooley [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley
2024-04-17
08 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2024-04-17
08 Paul Wouters
[Ballot discuss]
This document updates and re-uses text from a pre2008 RFC, so it needs to use the pre5378Trust200902 boilerplate.

Otherwise, the document looks good. …
[Ballot discuss]
This document updates and re-uses text from a pre2008 RFC, so it needs to use the pre5378Trust200902 boilerplate.

Otherwise, the document looks good.

See https://www.rfc-editor.org/rfc/rfc7991.html#appendix-A.1.1.4
2024-04-17
08 Paul Wouters Ballot discuss text updated for Paul Wouters
2024-04-17
08 Paul Wouters [Ballot discuss]
This document updates and re-uses text from a pre2008 RFC, so it needs to use the pre5378Trust200902 boilerplate.

Otherwise, the document looks good.
2024-04-17
08 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2024-04-17
08 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2024-04-16
08 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2024-04-16
08 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this update.

One thing the I noticed that the profile transport uses HTTP only ( and not HTTPs). There …
[Ballot comment]
Thanks for working on this update.

One thing the I noticed that the profile transport uses HTTP only ( and not HTTPs). There might be good reasons for using it that way in certain scenarios. I would strongly suggest to explain the rational(s) behind the choice.
2024-04-16
08 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2024-04-16
08 Éric Vyncke
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-lamps-rfc5019bis-08

Thank you for the work put into this document.

Please find below some non-blocking COMMENT …
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-lamps-rfc5019bis-08

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (including a nearly DISCUSS for section 3.1.1) but replies would be appreciated even if only for my own education).

Special thanks to Russ Housley for the shepherd's detailed write-up including the WG consensus *but it lacks* the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric

# COMMENTS (non-blocking)

## Section 3.1.1

Even if 3.1.1 is included in 3.1 (profile-related), `OCSPRequests that conform to this profile` the "this" is a little unclear. Suggest to be more specific rather than using "this".

About `these OCSP clients should transition`, should this be a normative "SHOULD" ? Also, the paragraph above has a "MUST" for SHA-256 and this text appears to allow for SHA-1. To be honest, I was really close to ballot a DISCUSS on this point.

## Section 3.1.2

I am confused after reading this section. Should the responders simply ignore invalid request signature ? How can a server "MUST be prepared" while still responders "MAY ignore the signature".

## Section 3.2.2

Isn't `on the returned OCSPResponse` a pleonasm ? I.e., the response is always 'returned'.

## Section 3.2.4

`producedAt MUST be expressed Greenwich Mean Time (Zulu)` or should be UTC ?

## Section 6

Even if the payload is signed and contains public information, is a non-https scheme suitable in `including the scheme and delimiters (http://)` ?

## Section 7.1

Should there be any recommendation on the Max-Age value in `responders MAY indicate when the client should fetch an updated OCSP response by using the cache- control:max-age directive`?

## Section 7.2

Are CDN implicitly covered by "HTTP proxies" ?

In `max-age = < n > -where n is a time value later than thisUpdate but earlier than nextUpdate.` is max-age really an absolute time rather than a relative time in seconds ?

## Section 7.3

Probably due to my lack of knowledge about OCSP, but is there a difference in "OCSP responder" and "server" in this section ? Especially about `First, it allows for the caching of OCSP responses on the server, thus lowering the number of hits to the OCSP responder.`
2024-04-16
08 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2024-04-15
08 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2024-04-15
08 Gunter Van de Velde
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08

Thank you for the work put into this document.

Please find below some …
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points.

I hope that this review helps to improve the document,

117   (For brevity we refer to OCSP as being used to verify certificate
118   status, but only the revocation status of a certificate is checked
119   via this protocol.)

As networking generalist i am unclear what the 'but only' refers towards? it reads a bit odd.
in addition not sure if the word 'we' helps in a formal document.

What about following rewrite suggestion:
For brevity, the term "OCSP" is used herein to denote the verification of certificate status; however, it should be noted that this protocol is employed solely to ascertain the revocation status of a certificate.

121   To date, many OCSP deployments have been used to ensure timely and
122   secure certificate status information for high-value electronic
123   transactions or highly sensitive information, such as in the banking
124   and financial environments.  As such, the requirement for an OCSP

This text processes difficult for me. Would he following text be a potential rewrite?

To date, numerous OCSP deployments have been implemented to provide timely and
secure certificate status information, crucial for high-value electronic
transactions and the handling of highly sensitive information, particularly
within the banking and financial sectors.

128   is not an issue, and have run on client and server systems where
129   processing power is not constrained.

I assume that there is no additional constraints beyond the capabilities of the CPU/memory used?

151   This document addresses the scalability issues inherent when using
152   OCSP in PKI environments described above by defining a message
153   profile and clarifying OCSP client and responder behavior that will
154   permit:

Instead of writing 'in PKI environments described above' would it not be more
simpler to say 'in highly scaled PKI environments'?

668 8.  Security Considerations

Is there a special fallback consideration in scenarios where the OCSP
check fails (either due to responder issues or network problems)?
Are there any additional privacy considerations associated with the
lightweight solution beyond those already noted for the traditional OCSP?

G/
2024-04-15
08 Gunter Van de Velde Ballot comment text updated for Gunter Van de Velde
2024-04-15
08 Gunter Van de Velde
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08

Thank you for the work put into this document.

Please find below some …
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points.

Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots.

I hope that this review helps to improve the document,

117   (For brevity we refer to OCSP as being used to verify certificate
118   status, but only the revocation status of a certificate is checked
119   via this protocol.)

As networking generalist i am unclear what the 'but only' refers towards? it reads a bit odd.
in addition not sure if the word 'we' helps in a formal document.

What about following rewrite suggestion:
For brevity, the term "OCSP" is used herein to denote the verification of certificate status; however, it should be noted that this protocol is employed solely to ascertain the revocation status of a certificate.

121   To date, many OCSP deployments have been used to ensure timely and
122   secure certificate status information for high-value electronic
123   transactions or highly sensitive information, such as in the banking
124   and financial environments.  As such, the requirement for an OCSP

This text processes difficult for me. Would he following text be a potential rewrite?

To date, numerous OCSP deployments have been implemented to provide timely and
secure certificate status information, crucial for high-value electronic
transactions and the handling of highly sensitive information, particularly
within the banking and financial sectors.

128   is not an issue, and have run on client and server systems where
129   processing power is not constrained.

I assume that there is no additional constraints beyond the capabilities of the CPU/memory used?

151   This document addresses the scalability issues inherent when using
152   OCSP in PKI environments described above by defining a message
153   profile and clarifying OCSP client and responder behavior that will
154   permit:

Instead of writing 'in PKI environments described above' would it not be more
simpler to say 'in highly scaled PKI environments'?

668 8.  Security Considerations

Is there a special fallback consideration in scenarios where the OCSP
check fails (either due to responder issues or network problems)?
Are there any additional privacy considerations associated with the
lightweight solution beyond those already noted for the traditional OCSP?

G/
2024-04-15
08 Gunter Van de Velde [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde
2024-04-13
08 Erik Kline
[Ballot comment]
# Internet AD comments for draft-ietf-lamps-rfc5019bis-08
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits …
[Ballot comment]
# Internet AD comments for draft-ietf-lamps-rfc5019bis-08
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits

### Appendix B.5

* Out of curiosity, what causes the different formats for the time strings:

  - "GeneralizedTime 10/04/2024 12:37:47 GMT", and
  - "UTCTime 02/04/2024 12:37:47 GMT"?

  Clearly they're both GMT, and therefore compliant with S3.2.4.  I'm just
  curious...
2024-04-13
08 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2024-04-12
08 Orie Steele
[Ballot comment]
# Orie Steele, ART AD, comments for draft-ietf-lamps-rfc5019bis-08
CC @OR13

This review is in the ["IETF Comments" Markdown format][ICMF].
You can use the …
[Ballot comment]
# Orie Steele, ART AD, comments for draft-ietf-lamps-rfc5019bis-08
CC @OR13

This review is in the ["IETF Comments" Markdown format][ICMF].
You can use the [`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues, or using this [online validator](https://mnot.github.io/ietf-comments/).

Line numbers are generated with this:
https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-lamps-rfc5019bis-08.txt&submitcheck=True

## Comments

### Section 1 profile discovery

```
169   OCSP does not have the means to signal responder capabilities within
170   the protocol.  Thus, clients will need to use out-of-band mechanisms
171   to determine whether a responder conforms to the profile defined in
172   this document.  Regardless of the availability of such out-of-band
173   mechanisms, this profile ensures that interoperability will still
174   occur between an OCSP client that fully conforms with [RFC6960] and a
175   responder that is operating in a mode as described in this
176   specification.
```

Consider documenting at least 1 out of band mechanism in an appendix?

### Section 3.1.1 missing Signature

```
194   Provided for convenience here, but unchanged from [RFC6960], the
195   ASN.1 structure corresponding to the OCSPRequest with the relevant
196   CertID is:
```

https://datatracker.ietf.org/doc/html/rfc6960#section-4.1.1 contains:

```
  Signature      ::=    SEQUENCE {
      signatureAlgorithm      AlgorithmIdentifier,
      signature              BIT STRING,
      certs              [0] EXPLICIT SEQUENCE OF Certificate
  OPTIONAL}
```

But this section does not.

I am not sure if this impacts "copy paste / validation", but it is a "change" that I noticed.

Later sections note that unsigned requests are acceptable, perhaps this is the reason for the ommision?

### Section 3.1.1 which AlgorithmIdentifier is used for SHA-256?

```
221   The CertID.issuerNameHash and CertID.issuerKeyHash fields contain
222   hashes of the issuer's DN and public key, respectively.  OCSP clients
223   that conform with this profile MUST use SHA-256 as defined in
224   [RFC6234] as the hashing algorithm for the CertID.issuerNameHash and
225   the CertID.issuerKeyHash values.
```

I wondered if there is a better reference for the AlgorithmIdentifier that is SHA-256.
Something more ASN.1 specific?

### sha-1 still ok?

In Section 3.1.1:

```
230   However, these OCSP clients should transition from SHA-1 to SHA-256
231   as soon as practical.
```

Capitalize SHOULD? Why not MUST? (given the as soon as practical comment)

Later in security considerations:

```
749 8.7.  Use of SHA-1 for the calculation of CertID field values

751   Although the use of SHA-1 for the calculation of CertID field values
752   is not of concern from a cryptographic security standpoint, the
753   continued use of SHA-1 in an ecosystem requires that software that
754   interoperates with the ecosystem maintain support for SHA-1.  This
755   increases implementation complexity and potential attack surface for
756   the software in question.  Thus, the continued use of SHA-1 in an
757   ecosystem to maintain interoperability with legacy software must be
758   weighed against the increased implementation complexity and potential
759   attack surface.
```

8.7 framing reads as "no rush", which does not seem like a security consideration.


### Section 3.1.2 ignore requestorName?

```
246   If the OCSPRequest is signed, the client SHALL specify its name in
247   the OCSPRequest.requestorName field; otherwise, clients SHOULD NOT
248   include the requestorName field in the OCSPRequest.  OCSP servers
249   MUST be prepared to receive unsigned OCSP requests that contain the
250   requestorName field, but MUST handle such requests as if the
251   requestorName field were absent.
```

Why not "clients MUST NOT include the requestorName field in the OCSPRequest" ?

Wording of the second part could also be clearer, something like:

```
248   include the requestorName field in the OCSPRequest.  OCSP servers
249   MUST handle unsigned OCSP requests that contain the
250   requestorName field, as if the requestorName field were absent.
```

### Section 3.2.3 resource exhaustion?

```
382   Also, in order to ensure the database of revocation information does
383   not grow unbounded over time, the responder MAY remove the status
384   records of expired certificates.  Requests from clients for
```

Why not SHOULD? Under what circumstances SHOULD the status records for expired certificates be retained indefinitely?

### Section 3.2.4 redundant MUST?

```
400       available about the status of the certificate.  Responders MUST
401       always include this value to aid in response caching.  See
402       Section 7 for additional information on caching.
```

The MUST here seems redundant? Are these fields always present, or optional except for this one?

The text in later sections implies these are all mandatory.

### Section 4.2 expiration checks

```
439   Similarly, an application MUST validate the signature on certificates
440   in a chain, before asking an OCSP client to check the status of the
441   certificate.  If the certificate signature is invalid or the
442   application is not able to verify it, an OCSP check MUST NOT be
443   requested.  Clients SHOULD NOT make a request to check the status of
444   expired certificates.
```

Why not MUST NOT? Consider:

```
441   certificate.  If the certificate signature is invalid or the
442   application is not able to verify it, or the certificate is expired,
443   an OCSP check MUST NOT be requested.
```

### Section 6 HTTP vs HTTPs

```
492 6.  Transport Profile

494   OCSP clients can send HTTP-based OCSP requests using either the GET
495   or POST method.  The OCSP responder MUST support requests and
496   responses over HTTP.  When sending requests that are less than or
497   equal to 255 bytes in total (after encoding) including the scheme and
498   delimiters (http://), server name and base64-encoded OCSPRequest
```

I assume the use of `http` instead of `https` is intentional,
I wouldn't mind a brief comment on why not HTTPs here.


# 8.5.  Modification of HTTP Headers is ok?

```
734   manipulated by an attacker.  Clients SHOULD use these values for
735   caching guidance only and ultimately SHOULD rely only on the values
736   present in the signed OCSPResponse.  Clients SHOULD NOT rely on
```

Why not MUST?


## Nits

### Section 8.3 capitalize must

```
715   As detailed in [RFC6960], clients must properly validate the
716   signature of the OCSP response and the signature on the OCSP response
717   signer certificate to ensure an authorized responder created it.
```

### 8.4.  Denial-of-Service Attacks

Consider alternative language to "should", such as "ought to", or capitalize it, and make it more actionable.


### Section 3.1.1 DN expand on first use

```
221   The CertID.issuerNameHash and CertID.issuerKeyHash fields contain
222   hashes of the issuer's DN and public key, respectively.  OCSP clients
```
2024-04-12
08 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2024-04-10
08 Roman Danyliw Placed on agenda for telechat - 2024-04-18
2024-04-10
08 Roman Danyliw Ballot has been issued
2024-04-10
08 Roman Danyliw [Ballot Position Update] New position, Yes, has been recorded for Roman Danyliw
2024-04-10
08 Roman Danyliw Created "Approve" ballot
2024-04-10
08 Roman Danyliw IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2024-04-10
08 Roman Danyliw Ballot writeup was changed
2024-04-10
08 Roman Danyliw Ballot approval text was generated
2024-04-10
08 (System) Changed action holders to Roman Danyliw (IESG state changed)
2024-04-10
08 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2024-04-10
08 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-08.txt
2024-04-10
08 (System) New version approved
2024-04-10
08 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-04-10
08 Tadahiko Ito Uploaded new revision
2024-04-04
07 Roman Danyliw
Thanks for making the revisions in response to IETF LC directorate feedback.  In -07 the text in the abstract saying that this document obsoletes RFC5019 …
Thanks for making the revisions in response to IETF LC directorate feedback.  In -07 the text in the abstract saying that this document obsoletes RFC5019 was lost. Please add it back in.
2024-04-04
07 (System) Changed action holders to Sean Turner, Clint Wilson, Tadahiko Ito, Corey Bonnell (IESG state changed)
2024-04-04
07 Roman Danyliw IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2024-04-03
07 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-07.txt
2024-04-03
07 (System) New version approved
2024-04-03
07 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-04-03
07 Tadahiko Ito Uploaded new revision
2024-04-03
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2024-04-03
06 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-06.txt
2024-04-03
06 (System) New version approved
2024-04-03
06 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-04-03
06 Tadahiko Ito Uploaded new revision
2024-03-29
05 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2024-03-23
05 Paul Kyzivat Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Paul Kyzivat.
2024-03-14
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Ivaylo Petrov
2024-03-13
05 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2024-03-13
05 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-lamps-rfc5019bis-05, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-lamps-rfc5019bis-05, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2024-03-13
05 Jean Mahoney Request for Last Call review by GENART is assigned to Paul Kyzivat
2024-03-12
05 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Nagendra Nainar
2024-03-08
05 Cindy Morgan IANA Review state changed to IANA - Review Needed
2024-03-08
05 Cindy Morgan
The following Last Call announcement was sent out (ends 2024-03-29):

From: The IESG
To: IETF-Announce
CC: draft-ietf-lamps-rfc5019bis@ietf.org, housley@vigilsec.com, lamps-chairs@ietf.org, rdd@cert.org, spasm@ietf.org …
The following Last Call announcement was sent out (ends 2024-03-29):

From: The IESG
To: IETF-Announce
CC: draft-ietf-lamps-rfc5019bis@ietf.org, housley@vigilsec.com, lamps-chairs@ietf.org, rdd@cert.org, spasm@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Updates to Lightweight OCSP Profile for High Volume Environments) to Proposed Standard


The IESG has received a request from the Limited Additional Mechanisms for
PKIX and SMIME WG (lamps) to consider the following document: - 'Updates to
Lightweight OCSP Profile for High Volume Environments'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2024-03-29. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  RFC 5019 defines a lightweight profile for OCSP that makes the
  protocol more suitable for use in high-volume environments.  The
  lightweight profile specifies the mandatory use of SHA-1 when
  calculating the values of several fields in OCSP requests and
  responses.  In recent years, weaknesses have been demonstrated with
  the SHA-1 algorithm.  As a result, SHA-1 is increasingly falling out
  of use even for non-security relevant use cases.  This document
  obsoletes the lightweight profile as specified in RFC 5019 to instead
  recommend the use of SHA-256 where SHA-1 was previously required.  An
  RFC 5019-compliant OCSP client is still able to use SHA-1, but the
  use of SHA-1 may become obsolete in the future.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5019bis/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    draft-ietf-tls-rfc8446bis: The Transport Layer Security (TLS) Protocol Version 1.3 (None - Internet Engineering Task Force (IETF))



2024-03-08
05 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2024-03-08
05 Cindy Morgan Last call announcement was changed
2024-03-08
05 Roman Danyliw Last call was requested
2024-03-08
05 Roman Danyliw Last call announcement was generated
2024-03-08
05 Roman Danyliw Ballot approval text was generated
2024-03-08
05 Roman Danyliw Ballot writeup was generated
2024-03-08
05 Roman Danyliw IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2024-03-08
05 (System) Changed action holders to Roman Danyliw (IESG state changed)
2024-03-08
05 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2024-03-08
05 Cindy Morgan New version available: draft-ietf-lamps-rfc5019bis-05.txt
2024-03-08
05 Cindy Morgan Secretariat manually posting. Approvals already received
2024-03-08
05 Cindy Morgan Uploaded new revision
2024-03-05
04 Roman Danyliw AD Review: https://mailarchive.ietf.org/arch/msg/spasm/zZ1_nLaIKq1wwC-cokyw1ei12fU/
2024-03-05
04 (System) Changed action holders to Roman Danyliw, Tadahiko Ito, Clint Wilson, Corey Bonnell, Sean Turner (IESG state changed)
2024-03-05
04 Roman Danyliw IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested
2024-03-02
04 Russ Housley
# Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with …
# Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

  There is broad support in the LAMPS WG for this document.  WG Last Call
  included many implementers, and all of the issues that were raise were
  resolved quickly.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

  Suggested improvements were readily accepted by the authors.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

  No one has threatened an appeal; however, one concern was raised during
  WG Last Call that should be highlighted.  This document includes:

~~~
    OCSP responders SHOULD NOT distribute OCSP responses that contain
    CertIDs that use SHA-1 if the OCSP responder has no clients that
    require the use of SHA-1.
~~~

  It is recognized that there is no obvious point in time when this will be
  true.  However, no one could offer a better criteria for stopping support
  for SHA-1, which everyone wants to do.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

  OCSP is widely deployed.

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

  No concerns about interaction with other technologies.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

  No special reviews are needed.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

  This document does not include a YANG module.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

  ASN.1 is used.  It is a subset of the ASN.1 from the full OCSP specification
  in RFC 6960.  As a result, this document does not contain an ASN.1 module.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

  Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

    No concerns were noticed.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

    As reflected in the Datatracker: Proposed Standard on the IETF Stream.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

    The authors have explicitly stated that thye is unaware of any IPR
    that needs to be declared.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front
    page is greater than five, please provide a justification.

    Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

    IDnits offers the following complaint:

~~~
    The abstract seems to indicate that this document updates RFC5019, but
    the header doesn't have an 'Updates:' line to match this.
~~~

    This is an error.  This document obsoletes RFC 5019, and the header
    indicates this.  Further, the Introduction contains a list of bullets
    for the "Substantive changes to RFC 5019".

    IDnits offers the following additional complaints:

~~~
    -- Looks like a reference, but probably isn't: '0' on line 282

    -- Looks like a reference, but probably isn't: '1' on line 283

    -- Looks like a reference, but probably isn't: '2' on line 203
~~~

    This is not the case.  These are ASN.1 tags.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

    No concerns.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

    All references are freely available.  [OCSPMP] takes a minute to locate,
    but it is available.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

    There are no downward references.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

    This document will wait on [I-D.ietf-tls-rfc8446bis], which seems to be
    progressing fairly rapidly.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

    This document obsoletes RFC 5019.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

    No updates to any IANA registries are needed.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

    No new IANA registries are needed.
2024-03-02
04 Russ Housley IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2024-03-02
04 Russ Housley IESG state changed to Publication Requested from I-D Exists
2024-03-02
04 (System) Changed action holders to Roman Danyliw (IESG state changed)
2024-03-02
04 Russ Housley Responsible AD changed to Roman Danyliw
2024-03-02
04 Russ Housley Document is now in IESG state Publication Requested
2024-03-02
04 Russ Housley IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2024-03-02
04 Russ Housley
# Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with …
# Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

  There is broad support in the LAMPS WG for this document.  WG Last Call
  included many implementers, and all of the issues that were raise were
  resolved quickly.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

  Suggested improvements were readily accepted by the authors.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

  No one has threatened an appeal; however, one concern was raised during
  WG Last Call that should be highlighted.  This document includes:

~~~
    OCSP responders SHOULD NOT distribute OCSP responses that contain
    CertIDs that use SHA-1 if the OCSP responder has no clients that
    require the use of SHA-1.
~~~

  It is recognized that there is no obvious point in time when this will be
  true.  However, no one could offer a better criteria for stopping support
  for SHA-1, which everyone wants to do.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

  OCSP is widely deployed.

## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

  No concerns about interaction with other technologies.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

  No special reviews are needed.

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

  This document does not include a YANG module.

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

  ASN.1 is used.  It is a subset of the ASN.1 from the full OCSP specification
  in RFC 6960.  As a result, this document does not contain an ASN.1 module.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

  Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

    No concerns were noticed.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

    As reflected in the Datatracker: Proposed Standard on the IETF Stream.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

    The authors have explicitly stated that thye is unaware of any IPR
    that needs to be declared.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front
    page is greater than five, please provide a justification.

    Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

    IDnits offers the following complaint:

~~~
    The abstract seems to indicate that this document updates RFC5019, but
    the header doesn't have an 'Updates:' line to match this.
~~~

    This is an error.  This document obsoletes RFC 5019, and the header
    indicates this.  Further, the Introduction contains a list of bullets
    for the "Substantive changes to RFC 5019".

    IDnits offers the following additional complaints:

~~~
    -- Looks like a reference, but probably isn't: '0' on line 282

    -- Looks like a reference, but probably isn't: '1' on line 283

    -- Looks like a reference, but probably isn't: '2' on line 203
~~~

    This is not the case.  These are ASN.1 tags.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

    No concerns.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

    All references are freely available.  [OCSPMP] takes a minute to locate,
    but it is available.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

    There are no downward references.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

    This document will wait on [I-D.ietf-tls-rfc8446bis], which seems to be
    progressing fairly rapidly.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

    This document obsoletes RFC 5019.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

    No updates to any IANA registries are needed.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

    No new IANA registries are needed.
2024-02-29
04 Russ Housley Notification list changed to housley@vigilsec.com because the document shepherd was set
2024-02-29
04 Russ Housley Document shepherd changed to Russ Housley
2024-02-29
04 Russ Housley Changed consensus to Yes from Unknown
2024-02-29
04 Russ Housley Intended Status changed to Proposed Standard from None
2024-02-25
04 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-04.txt
2024-02-25
04 (System) New version approved
2024-02-25
04 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-02-25
04 Tadahiko Ito Uploaded new revision
2024-02-23
03 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-03.txt
2024-02-23
03 (System) New version approved
2024-02-23
03 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-02-23
03 Tadahiko Ito Uploaded new revision
2024-01-29
02 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-02.txt
2024-01-29
02 Corey Bonnell New version approved
2024-01-29
02 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-01-29
02 Tadahiko Ito Uploaded new revision
2024-01-11
02 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2024-01-11
02 Tadahiko Ito Uploaded new revision
2024-01-10
01 Russ Housley IETF WG state changed to In WG Last Call from WG Document
2023-12-14
01 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-01.txt
2023-12-14
01 (System) New version approved
2023-12-14
01 (System) Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito
2023-12-14
01 Tadahiko Ito Uploaded new revision
2023-11-06
00 Russ Housley This document now replaces draft-bonnell-rfc5019bis instead of None
2023-11-06
00 Tadahiko Ito New version available: draft-ietf-lamps-rfc5019bis-00.txt
2023-11-06
00 Russ Housley WG -00 approved
2023-11-06
00 Tadahiko Ito Set submitter to "伊藤忠彦", replaces to draft-bonnell-rfc5019bis and sent approval email to group chairs: lamps-chairs@ietf.org
2023-11-06
00 Tadahiko Ito Uploaded new revision