Skip to main content

Cryptographic Message Syntax (CMS) Authenticated-Enveloped-Data Content Type
draft-ietf-smime-cms-auth-enveloped-06

Revision differences

Document history

Date Rev. By Action
2012-08-22
06 (System) post-migration administrative database adjustment to the No Objection position for Chris Newman
2012-08-22
06 (System) post-migration administrative database adjustment to the Yes position for Jari Arkko
2007-10-01
06 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-10-01
06 (System) IANA Action state changed to No IC from In Progress
2007-10-01
06 (System) IANA Action state changed to In Progress
2007-10-01
06 Amy Vezza IESG state changed to Approved-announcement sent
2007-10-01
06 Amy Vezza IESG has approved the document
2007-10-01
06 Amy Vezza Closed "Approve" ballot
2007-10-01
06 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2007-09-30
06 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to Yes from Discuss by Jari Arkko
2007-09-26
06 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman
2007-09-21
06 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-09-21
06 (System) New version available: draft-ietf-smime-cms-auth-enveloped-06.txt
2007-09-21
06 (System) Removed from agenda for telechat - 2007-09-20
2007-09-20
06 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2007-09-20
06 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2007-09-20
06 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2007-09-20
06 Chris Newman
[Ballot discuss]
There is an important security consideration for all CMS encrypted
messages that was not documented in the CMS base specification (see
the comment).  …
[Ballot discuss]
There is an important security consideration for all CMS encrypted
messages that was not documented in the CMS base specification (see
the comment).  I would like to have a discussion of how others on the
IESG feel about the importance of this consideration and whether it
should be documented here as an interim measure, or should wait for
an update to CMS.
2007-09-20
06 Chris Newman
[Ballot comment]
Here's a rough attempt to describe the threat and mitigation:

A significant security threat to messaging environments today involves
various forms of unsolicited …
[Ballot comment]
Here's a rough attempt to describe the threat and mitigation:

A significant security threat to messaging environments today involves
various forms of unsolicited messages (spam and phishing).  Present
mitigation strategies for this threat involve analysis of message
plaintext by fingerprint engines that typically require access to
proprietary infrastructure on the Internet or intranet.  CMS recipients
that accept unsolicited encrypted messages are vulnerable to such
attacks and CMS defeats many common mitigation strategies.  Software
that receives encrypted CMS messages MUST provide a mechanism to
counter the threat of unsolicted messages.  One approach is to reject
or discard encrypted messages unless they meet some reasonable
definition of solicited (for example, if the validated originator is
present in the recipient's personal or corporate addressbook).  An
alternative approch would provide a client mechanism to call out to
a server-based service that filters for such inappropriate content.

Thankfully, CMS clients are not widely deployed enough (or easy enough
to use) for this threat to manifest yet.  But if continued work to
improve CMS support changes that situation we need to be prepared
for the most likely attack on the system.  IMHO, an in depth
discussion of the _many_ approaches to mitigation is
out-of-scope for this document and for IETF standards.
2007-09-20
06 Chris Newman
[Ballot discuss]
There is an important security consideration for all CMS encrypted messages that was not documented in the CMS base specification (see the comment).  …
[Ballot discuss]
There is an important security consideration for all CMS encrypted messages that was not documented in the CMS base specification (see the comment).  I would like to have a discussion of how others on the IESG feel about the importance of this consideration and whether it should be documented here as an interim measure, or should wait for an update to CMS.
2007-09-20
06 Chris Newman [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman
2007-09-19
06 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-09-19
06 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-09-19
06 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-09-19
06 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-09-19
06 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2007-09-19
06 Cullen Jennings [Ballot comment]
A helpful addition to this draft would be an appendix with one example messages.
2007-09-19
06 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-09-19
06 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2007-09-19
06 Lars Eggert [Ballot comment]
Boilerplate text on IPR is missing?
2007-09-19
06 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2007-09-19
06 Sam Hartman
[Ballot comment]
I still believe the paragraph about generic pre-computation attacks in
the security considerations section is misleading and the document
would be approved by …
[Ballot comment]
I still believe the paragraph about generic pre-computation attacks in
the security considerations section is misleading and the document
would be approved by citing the specific attacks David mentioned in
his mail.  This is a really minor issue and I understand if you disagree.

Having read the text, I definitely think Jari's concern about the
ASN.1 is valid.  I suggest replacing explicit set of tag with "the
universal tag for the set of type".
2007-09-19
06 Sam Hartman [Ballot Position Update] New position, Yes, has been recorded by Sam Hartman
2007-09-18
06 Jari Arkko
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:

> AuthEnvelopedData ::= SEQUENCE {
>      version CMSVersion,
>      originatorInfo …
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:

> AuthEnvelopedData ::= SEQUENCE {
>      version CMSVersion,
>      originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
>      recipientInfos RecipientInfos,
>      authEncryptedContentInfo EncryptedContentInfo,
>      authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
>      mac MessageAuthenticationCode,
>      unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
...
> The IMPLICIT [1] tag in the
> authAttrs field is not used for the DER encoding, rather an EXPLICIT
> SET OF tag is used.  That is, the DER encoding of the SET OF tag,
> rather than of the IMPLICIT [1] tag, is to be included in the
> construction of the AAD along with the length and content octets of
> the authAttrs value.

I see that the same scheme is used in RFC 3582 for
something else. However, I do not understand either
what the RFC 3582 text or this text means.

There is no EXPLICIT tag in the syntax anywhere.
Your text is ambiguous with regards to whether
one should use an explicit tag for the SET OF
universal tag (resulting in two tag fields in
the DER output), or just the SET OF universal
tag (resulting in one tag field).

Finally, it is unclear what should be done if
the component authAttrs is missing. Should
the input to AAD be an empty string, or
something else?
2007-09-18
06 Jari Arkko
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:
Comment: I realize that my ASN.1 knowledge is rusty, but:

> AuthEnvelopedData ::= SEQUENCE …
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:
Comment: I realize that my ASN.1 knowledge is rusty, but:

> AuthEnvelopedData ::= SEQUENCE {
>      version CMSVersion,
>      originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
>      recipientInfos RecipientInfos,
>      authEncryptedContentInfo EncryptedContentInfo,
>      authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
>      mac MessageAuthenticationCode,
>      unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
...
> The IMPLICIT [1] tag in the
> authAttrs field is not used for the DER encoding, rather an EXPLICIT
> SET OF tag is used.  That is, the DER encoding of the SET OF tag,
> rather than of the IMPLICIT [1] tag, is to be included in the
> construction of the AAD along with the length and content octets of
> the authAttrs value.

I see that the same scheme is used in RFC 3582 for
something else. However, I do not understand either
what the RFC 3582 text or this text means.

There is no EXPLICIT tag in the syntax anywhere.
Your text is ambiguous with regards to whether
one should use an explicit tag for the SET OF
universal tag (resulting in two tag fields in
the DER output), or just the SET OF universal
tag (resulting in one tag field).

Finally, it is unclear what should be done if
the component authAttrs is missing. Should
the input to AAD be an empty string, or
something else?
2007-09-18
06 Jari Arkko
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:

There is no EXPLICIT tag in the syntax anywhere.
Your text is ambiguous with …
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:

There is no EXPLICIT tag in the syntax anywhere.
Your text is ambiguous with regards to whether
one should use an explicit tag for the SET OF
universal tag (resulting in two tag fields in
the DER output), or just the SET OF universal
tag (resulting in one tag field).

Finally, it is unclear what should be done if
the component authAttrs is missing. Should
the input to AAD be an empty string, or
something else?
2007-09-18
06 Jari Arkko
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:

> AuthEnvelopedData ::= SEQUENCE {
>      version CMSVersion,
>      originatorInfo …
[Ballot discuss]
I realize that my ASN.1 knowledge is rusty, but:

> AuthEnvelopedData ::= SEQUENCE {
>      version CMSVersion,
>      originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL,
>      recipientInfos RecipientInfos,
>      authEncryptedContentInfo EncryptedContentInfo,
>      authAttrs [1] IMPLICIT AuthAttributes OPTIONAL,
>      mac MessageAuthenticationCode,
>      unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
...
> The IMPLICIT [1] tag in the
> authAttrs field is not used for the DER encoding, rather an EXPLICIT
> SET OF tag is used.  That is, the DER encoding of the SET OF tag,
> rather than of the IMPLICIT [1] tag, is to be included in the
> construction of the AAD along with the length and content octets of
> the authAttrs value.

I see that the same scheme is used in RFC 3582 for
something else. However, I do not understand either
what the RFC 3582 text or this text means.

First, you have a freedom to specify this in the way that you
want to. Why not use the IMPLICIT/EXPLICIT tag you want to,
rather than have the text disagree with the formal syntax.
I would expect such differences to cause interesting
problems for automatic encoder/decoder generation by
a compiler.

Second, there is no EXPLICIT tag in the syntax anywhere.
As I recall ASN.1, types either have their natural
tags, their natural tag is implicitly changed to something
else, or there's an explicit additional tag. So what is
the EXPLICIT tag that this text refers to?
2007-09-18
06 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2007-09-14
06 Russ Housley [Ballot Position Update] New position, Recuse, has been recorded by Russ Housley
2007-09-13
05 (System) New version available: draft-ietf-smime-cms-auth-enveloped-05.txt
2007-09-12
06 Tim Polk [Ballot Position Update] New position, Yes, has been recorded for Tim Polk
2007-09-12
06 Tim Polk Ballot has been issued by Tim Polk
2007-09-12
06 Tim Polk Created "Approve" ballot
2007-09-12
06 Tim Polk State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk
2007-09-12
06 Tim Polk Placed on agenda for telechat - 2007-09-20 by Tim Polk
2007-09-11
06 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-09-11
06 Amanda Baber IANA Last Call comment:

As described in the IANA Considerations section, we understand this document
to have NO IANA Actions.
2007-08-30
06 Samuel Weiler Request for Last Call review by SECDIR is assigned to Lakshminath Dondeti
2007-08-30
06 Samuel Weiler Request for Last Call review by SECDIR is assigned to Lakshminath Dondeti
2007-08-28
06 Amy Vezza Last call sent
2007-08-28
06 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-08-28
06 Tim Polk State Changes to Last Call Requested from AD Evaluation by Tim Polk
2007-08-28
06 Tim Polk Last Call was requested by Tim Polk
2007-08-28
06 (System) Ballot writeup text was added
2007-08-28
06 (System) Last call text was added
2007-08-28
06 (System) Ballot approval text was added
2007-08-28
06 Tim Polk Intended Status has been changed to Proposed Standard from None
2007-07-23
06 Tim Polk State Change Notice email list have been change to smime-chairs@tools.ietf.org, housley@vigilsec.com from smime-chairs@tools.ietf.org
2007-07-23
06 Tim Polk State Changes to AD Evaluation from Publication Requested by Tim Polk
2007-07-23
06 Tim Polk State Change Notice email list have been change to smime-chairs@tools.ietf.org, housley@vigilsec.com from smime-chairs@tools.ietf.org
2007-07-23
06 Tim Polk Draft Added by Tim Polk in state Publication Requested
2007-04-26
04 (System) New version available: draft-ietf-smime-cms-auth-enveloped-04.txt
2007-04-05
03 (System) New version available: draft-ietf-smime-cms-auth-enveloped-03.txt
2007-02-14
02 (System) New version available: draft-ietf-smime-cms-auth-enveloped-02.txt
2007-01-30
01 (System) New version available: draft-ietf-smime-cms-auth-enveloped-01.txt
2007-01-02
00 (System) New version available: draft-ietf-smime-cms-auth-enveloped-00.txt