The SODP (Secure Object Delivery Protocol) Server Interfaces: NSA's Profile for Delivery of Certificates, CRLs, and Symmetric Keys to Clients
draft-turner-sodp-profile-00

Document Type Active Internet-Draft (individual)
Last updated 2019-03-25
Stream (None)
Intended RFC status (None)
Formats plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
Network Working Group                                         M. Jenkins
Internet Draft                                                       NSA
Intended Status: Informational                               Sean Turner
Expires: September 25, 2019                                        sn3rd
                                                          March 25, 2019

     The SODP (Secure Object Delivery Protocol) Server Interfaces:
              NSA's Profile for Delivery of Certificates,
                  CRLs, and Symmetric Keys to Clients
                    draft-turner-sodp-profile-00.txt

Abstract

   This document specifies protocol interfaces profiled by the US NSA
   (United States National Security Agency) for NSS (National Security
   System) servers that provide public key certificates, CRLs
   (Certificate Revocation Lists), and symmetric keys to NSS clients.
   Servers that support these interfaces are referred to as SODP (Secure
   Object Delivery Protocol) servers. The intended audience for this
   profile comprises developers of client devices that will obtain key
   management services from NSA-operated SODP servers.  The profile
   indicates which options from the profiled base specifications are
   necessary to achieve interoperability with those servers.  It also
   imposes requirements on client devices beyond those in the base
   specifications.  Interfaces supported by SODP servers include: EST
   (Enrollment over Secure Transport) and its extensions as well as CMC
   (Certificate Management over CMS (Cryptographic Message Syntax)).

   This profile applies to the capabilities, configuration, and
   operation of all components of US National Security Systems (SP 800-
   59). It is also appropriate for other US Government systems that
   process high-value information. It is made publicly available for use
   by developers and operators of these and any other system
   deployments.

   This profile conforms to the existing requirements of NSA's
   Commercial National Security Algorithms.  As operational needs evolve
   over time, this profile will be updated to incorporate new commercial
   algorithms and protocols as they are developed and approved for use.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
 

Turner                 Expires September 12, 2019               [Page 1]
Internet-Draft         The SODP Server Interfaces         March 11, 2019

   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1. Documents to be Familiar With . . . . . . . . . . . . . . .  4
     1.2.  Document Organization  . . . . . . . . . . . . . . . . . .  4
     1.3.  Environment  . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Abstract Syntax Notation One . . . . . . . . . . . . . . . . .  6
   3.  EST Interface  . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.1.  Hypertext Transfer Protocol Layer  . . . . . . . . . . . .  6
     3.2.  Transport Layer Security . . . . . . . . . . . . . . . . .  6
     3.3.  Eligibility  . . . . . . . . . . . . . . . . . . . . . . .  6
     3.4.  Authentication . . . . . . . . . . . . . . . . . . . . . .  7
     3.5.  Authorization  . . . . . . . . . . . . . . . . . . . . . .  7
     3.6.  EST and EST Extensions . . . . . . . . . . . . . . . . . .  7
       3.6.1.  /pal . . . . . . . . . . . . . . . . . . . . . . . . .  7
       3.6.2.  /cacerts . . . . . . . . . . . . . . . . . . . . . . .  7
       3.6.3.  /simpleenroll  . . . . . . . . . . . . . . . . . . . .  8
       3.6.4.  /simplereenroll  . . . . . . . . . . . . . . . . . . .  8
Show full document text