Cryptographic Message Syntax (CMS) Authenticated-Enveloped-Data Content Type
draft-ietf-smime-cms-auth-enveloped-06
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
06 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
06 | (System) | post-migration administrative database adjustment to the Yes position for Jari Arkko |
2007-10-01
|
06 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-10-01
|
06 | (System) | IANA Action state changed to No IC from In Progress |
2007-10-01
|
06 | (System) | IANA Action state changed to In Progress |
2007-10-01
|
06 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-10-01
|
06 | Amy Vezza | IESG has approved the document |
2007-10-01
|
06 | Amy Vezza | Closed "Approve" ballot |
2007-10-01
|
06 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2007-09-30
|
06 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss by Jari Arkko |
2007-09-26
|
06 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2007-09-21
|
06 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-09-21
|
06 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-06.txt |
2007-09-21
|
06 | (System) | Removed from agenda for telechat - 2007-09-20 |
2007-09-20
|
06 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2007-09-20
|
06 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2007-09-20
|
06 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2007-09-20
|
06 | Chris Newman | [Ballot discuss] There is an important security consideration for all CMS encrypted messages that was not documented in the CMS base specification (see the comment). … [Ballot discuss] There is an important security consideration for all CMS encrypted messages that was not documented in the CMS base specification (see the comment). I would like to have a discussion of how others on the IESG feel about the importance of this consideration and whether it should be documented here as an interim measure, or should wait for an update to CMS. |
2007-09-20
|
06 | Chris Newman | [Ballot comment] Here's a rough attempt to describe the threat and mitigation: A significant security threat to messaging environments today involves various forms of unsolicited … [Ballot comment] Here's a rough attempt to describe the threat and mitigation: A significant security threat to messaging environments today involves various forms of unsolicited messages (spam and phishing). Present mitigation strategies for this threat involve analysis of message plaintext by fingerprint engines that typically require access to proprietary infrastructure on the Internet or intranet. CMS recipients that accept unsolicited encrypted messages are vulnerable to such attacks and CMS defeats many common mitigation strategies. Software that receives encrypted CMS messages MUST provide a mechanism to counter the threat of unsolicted messages. One approach is to reject or discard encrypted messages unless they meet some reasonable definition of solicited (for example, if the validated originator is present in the recipient's personal or corporate addressbook). An alternative approch would provide a client mechanism to call out to a server-based service that filters for such inappropriate content. Thankfully, CMS clients are not widely deployed enough (or easy enough to use) for this threat to manifest yet. But if continued work to improve CMS support changes that situation we need to be prepared for the most likely attack on the system. IMHO, an in depth discussion of the _many_ approaches to mitigation is out-of-scope for this document and for IETF standards. |
2007-09-20
|
06 | Chris Newman | [Ballot discuss] There is an important security consideration for all CMS encrypted messages that was not documented in the CMS base specification (see the comment). … [Ballot discuss] There is an important security consideration for all CMS encrypted messages that was not documented in the CMS base specification (see the comment). I would like to have a discussion of how others on the IESG feel about the importance of this consideration and whether it should be documented here as an interim measure, or should wait for an update to CMS. |
2007-09-20
|
06 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2007-09-19
|
06 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-09-19
|
06 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2007-09-19
|
06 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2007-09-19
|
06 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2007-09-19
|
06 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2007-09-19
|
06 | Cullen Jennings | [Ballot comment] A helpful addition to this draft would be an appendix with one example messages. |
2007-09-19
|
06 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2007-09-19
|
06 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2007-09-19
|
06 | Lars Eggert | [Ballot comment] Boilerplate text on IPR is missing? |
2007-09-19
|
06 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2007-09-19
|
06 | Sam Hartman | [Ballot comment] I still believe the paragraph about generic pre-computation attacks in the security considerations section is misleading and the document would be approved by … [Ballot comment] I still believe the paragraph about generic pre-computation attacks in the security considerations section is misleading and the document would be approved by citing the specific attacks David mentioned in his mail. This is a really minor issue and I understand if you disagree. Having read the text, I definitely think Jari's concern about the ASN.1 is valid. I suggest replacing explicit set of tag with "the universal tag for the set of type". |
2007-09-19
|
06 | Sam Hartman | [Ballot Position Update] New position, Yes, has been recorded by Sam Hartman |
2007-09-18
|
06 | Jari Arkko | [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: > AuthEnvelopedData ::= SEQUENCE { > version CMSVersion, > originatorInfo … [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: > AuthEnvelopedData ::= SEQUENCE { > version CMSVersion, > originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, > recipientInfos RecipientInfos, > authEncryptedContentInfo EncryptedContentInfo, > authAttrs [1] IMPLICIT AuthAttributes OPTIONAL, > mac MessageAuthenticationCode, > unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL } ... > The IMPLICIT [1] tag in the > authAttrs field is not used for the DER encoding, rather an EXPLICIT > SET OF tag is used. That is, the DER encoding of the SET OF tag, > rather than of the IMPLICIT [1] tag, is to be included in the > construction of the AAD along with the length and content octets of > the authAttrs value. I see that the same scheme is used in RFC 3582 for something else. However, I do not understand either what the RFC 3582 text or this text means. There is no EXPLICIT tag in the syntax anywhere. Your text is ambiguous with regards to whether one should use an explicit tag for the SET OF universal tag (resulting in two tag fields in the DER output), or just the SET OF universal tag (resulting in one tag field). Finally, it is unclear what should be done if the component authAttrs is missing. Should the input to AAD be an empty string, or something else? |
2007-09-18
|
06 | Jari Arkko | [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: Comment: I realize that my ASN.1 knowledge is rusty, but: > AuthEnvelopedData ::= SEQUENCE … [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: Comment: I realize that my ASN.1 knowledge is rusty, but: > AuthEnvelopedData ::= SEQUENCE { > version CMSVersion, > originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, > recipientInfos RecipientInfos, > authEncryptedContentInfo EncryptedContentInfo, > authAttrs [1] IMPLICIT AuthAttributes OPTIONAL, > mac MessageAuthenticationCode, > unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL } ... > The IMPLICIT [1] tag in the > authAttrs field is not used for the DER encoding, rather an EXPLICIT > SET OF tag is used. That is, the DER encoding of the SET OF tag, > rather than of the IMPLICIT [1] tag, is to be included in the > construction of the AAD along with the length and content octets of > the authAttrs value. I see that the same scheme is used in RFC 3582 for something else. However, I do not understand either what the RFC 3582 text or this text means. There is no EXPLICIT tag in the syntax anywhere. Your text is ambiguous with regards to whether one should use an explicit tag for the SET OF universal tag (resulting in two tag fields in the DER output), or just the SET OF universal tag (resulting in one tag field). Finally, it is unclear what should be done if the component authAttrs is missing. Should the input to AAD be an empty string, or something else? |
2007-09-18
|
06 | Jari Arkko | [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: There is no EXPLICIT tag in the syntax anywhere. Your text is ambiguous with … [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: There is no EXPLICIT tag in the syntax anywhere. Your text is ambiguous with regards to whether one should use an explicit tag for the SET OF universal tag (resulting in two tag fields in the DER output), or just the SET OF universal tag (resulting in one tag field). Finally, it is unclear what should be done if the component authAttrs is missing. Should the input to AAD be an empty string, or something else? |
2007-09-18
|
06 | Jari Arkko | [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: > AuthEnvelopedData ::= SEQUENCE { > version CMSVersion, > originatorInfo … [Ballot discuss] I realize that my ASN.1 knowledge is rusty, but: > AuthEnvelopedData ::= SEQUENCE { > version CMSVersion, > originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, > recipientInfos RecipientInfos, > authEncryptedContentInfo EncryptedContentInfo, > authAttrs [1] IMPLICIT AuthAttributes OPTIONAL, > mac MessageAuthenticationCode, > unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL } ... > The IMPLICIT [1] tag in the > authAttrs field is not used for the DER encoding, rather an EXPLICIT > SET OF tag is used. That is, the DER encoding of the SET OF tag, > rather than of the IMPLICIT [1] tag, is to be included in the > construction of the AAD along with the length and content octets of > the authAttrs value. I see that the same scheme is used in RFC 3582 for something else. However, I do not understand either what the RFC 3582 text or this text means. First, you have a freedom to specify this in the way that you want to. Why not use the IMPLICIT/EXPLICIT tag you want to, rather than have the text disagree with the formal syntax. I would expect such differences to cause interesting problems for automatic encoder/decoder generation by a compiler. Second, there is no EXPLICIT tag in the syntax anywhere. As I recall ASN.1, types either have their natural tags, their natural tag is implicitly changed to something else, or there's an explicit additional tag. So what is the EXPLICIT tag that this text refers to? |
2007-09-18
|
06 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko |
2007-09-14
|
06 | Russ Housley | [Ballot Position Update] New position, Recuse, has been recorded by Russ Housley |
2007-09-13
|
05 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-05.txt |
2007-09-12
|
06 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
2007-09-12
|
06 | Tim Polk | Ballot has been issued by Tim Polk |
2007-09-12
|
06 | Tim Polk | Created "Approve" ballot |
2007-09-12
|
06 | Tim Polk | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk |
2007-09-12
|
06 | Tim Polk | Placed on agenda for telechat - 2007-09-20 by Tim Polk |
2007-09-11
|
06 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2007-09-11
|
06 | Amanda Baber | IANA Last Call comment: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2007-08-30
|
06 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Lakshminath Dondeti |
2007-08-30
|
06 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Lakshminath Dondeti |
2007-08-28
|
06 | Amy Vezza | Last call sent |
2007-08-28
|
06 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-08-28
|
06 | Tim Polk | State Changes to Last Call Requested from AD Evaluation by Tim Polk |
2007-08-28
|
06 | Tim Polk | Last Call was requested by Tim Polk |
2007-08-28
|
06 | (System) | Ballot writeup text was added |
2007-08-28
|
06 | (System) | Last call text was added |
2007-08-28
|
06 | (System) | Ballot approval text was added |
2007-08-28
|
06 | Tim Polk | Intended Status has been changed to Proposed Standard from None |
2007-07-23
|
06 | Tim Polk | State Change Notice email list have been change to smime-chairs@tools.ietf.org, housley@vigilsec.com from smime-chairs@tools.ietf.org |
2007-07-23
|
06 | Tim Polk | State Changes to AD Evaluation from Publication Requested by Tim Polk |
2007-07-23
|
06 | Tim Polk | State Change Notice email list have been change to smime-chairs@tools.ietf.org, housley@vigilsec.com from smime-chairs@tools.ietf.org |
2007-07-23
|
06 | Tim Polk | Draft Added by Tim Polk in state Publication Requested |
2007-04-26
|
04 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-04.txt |
2007-04-05
|
03 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-03.txt |
2007-02-14
|
02 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-02.txt |
2007-01-30
|
01 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-01.txt |
2007-01-02
|
00 | (System) | New version available: draft-ietf-smime-cms-auth-enveloped-00.txt |