Internet Draft                                       Paul  Hoffman, IMC
draft-ietf-smime-x400transport-02.txt               Chris Bonatti, IECA
May 2, 2000
Expires in six months

                Transporting S/MIME Objects in X.400

Status of this Memo

This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026.

Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups. Note that other groups
may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference material
or to cite them other than as "work in progress."


      The list of current Internet-Drafts can be accessed at
      http://www.ietf.org/ietf/1id-abstracts.txt

      The list of Internet-Draft Shadow Directories can be accessed at
      http://www.ietf.org/shadow.html.


Abstract

This document describes protocol options for conveying CMS-protected
objects associated with S/MIME version 3 over an X.400 message transfer
system.


1. Introduction

The techniques described in the Cryptographic Message Syntax [CMS]
specification and message specifications can reasonably be transported
via a variety of electronic mail systems. This specification defines
the options and values necessary to enable interoperable transport of
S/MIME messages over an X.400 system.

1.1 Terminology

The key words "MUST", "SHALL", "REQUIRED", "SHOULD", "RECOMMENDED", and
"MAY" in this document are to be interpreted as described in RFC 2119
[MUSTSHOULD].

1.2 Definitions

For the purposes of this document, the following definitions apply.

ASN.1: Abstract Syntax Notation One, as defined in ISO/IEC 8824.

Object Identifier (OID): A globally unique identifier value consisting
of a sequence of integer values assigned through distributed
registration as specified by ISO/IEC 8824.

Transfer Encoding: A reversible transformation made on data so 8-bit or
binary data may be sent via a channel that only transmits 7-bit data.


2. S/MIME Packaging

2.1 The X.400 Message Structure

This section reviews the X.400 message format. An X.400 message has two
parts, the envelope and the content, as described in X.402 [X.400]:

Envelope --  An information object whose composition varies from one
transmittal step to another and that variously identifies the message's
originator and potential recipients, documents its previous conveyance
and directs its subsequent conveyance by the Message Transfer System
(MTS), and characterizes its content.

Content -- The content is the piece of information that the originating
User Agent wants to be delivered to one or more recipients. The MTS
neither examines nor modifies the content, except for conversion, during
its conveyance of the message.

One piece of information borne by the envelope identifies the type of
the content. The content type is an identifier (an ASN.1 OID or Integer)
that denotes the syntax and semantics of the content overall. This
identifier enables the MTS to determine the message's deliverability to
particular users, and enables User Agents and Message Stores to
interpret and process the content.

Some X.400 content types further refine the structure of content as a
set of heading elements and body parts. An example of this is the
Interpersonal Messaging System (IPMS). The IPMS content structure is
able to convey zero or more arbitrary body parts each identified by the
body part type. The body part type is an ASN.1 OID or Integer that
denotes the syntax and semantics of the body part in question.

2.2 Carrying S/MIME as X.400 Content

When transporting a CMS object in X.400, the preferred approach (except
as discussed in section 2.3 below) is to convey the object as X.400
message content. This section describes how S/MIME CMS objects are
conveyed as the content part of X.400 messages. This mechanism is
suitable for transport of CMS-protected messages regardless of the mail
content that has been encapsulated.

Implementations MUST include the CMS object in the content field of the
X.400 message.

If the CMS object is covered by an outer MIME wrapper, the content-type
field of the P1 envelope MUST be set to the following CMS-defined value:

id-data OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840)
     rsadsi(113549) pkcs(1) pkcs7(7) 1 }

If the CMS object is not covered by an outer MIME wrapper, the
content-type field of the P1 envelope MUST be set to the following
CMS-defined value:

id-ct-contentInfo  OBJECT IDENTIFIER ::= { iso(1) member-body(2)
     us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16)
     content-types(1) 6}

2.3 Carrying S/MIME as IPMS Body Parts

Under some circumstances S/MIME CMS objects MAY be conveyed within
select body parts of the content. Implementations generally SHOULD NOT
embed CMS objects within X.400 body parts because of the dependency on
the support provided by the content type. There is no guarantee that all
X.400 content types will necessarily include structured content, much
less body parts. Furthermore, the structure of different X.400 body
parts may vary to the extent that it is difficult to universally specify
the conveyance of CMS objects. Nevertheless, one notable exception is
necessary.

In instances when CMS objects are forwarded as part of a message
forwarding function, use of a body part is necessary. When forwarding a
CMS object in an IPMS or IPMS-compatible body part, implementations MUST
use the content-body-part as formally defined by [X.400], as shown below
for reference.

content-body-part {ExtendedContentType:content-type}
     EXTENDED-BODY-PART-TYPE ::= {
         PARAMETERS {ForwardedContentParameters IDENTIFIED BY
             {id-ep-content -- concatenated with content-type -- }},
         DATA {Content IDENTIFIED BY
             {id-et-content -- concatenated with content-type -- }} }

ForwardedContentParameters ::= SET {
     delivery-time     [0] MessageDeliveryTime OPTIONAL,
     delivery-envelope [1] OtherMessageDeliveryFields OPTIONAL,
     mts-identifier    [2] MessageDeliveryIdentifier OPTIONAL}

id-ep-content ::= {joint-iso-itu-t(2) mhs(6) ipms(1) ep(11) 17}

The implementation MUST copy the CMS object to be forwarded into the
Content field of the content-body-part. The direct-reference field of
the body part MUST include the OID formed by the concatenation of the
id-ep-content value and the following CMS-defined value.

id-ct-contentInfo  OBJECT IDENTIFIER ::=
     { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
     pkcs-9(9) smime(16) content-types(1) 6}

The ForwardedContentParameters are optional and MAY be supported at the
discretion of the implementor.

2.4 Transfer Encoding

According to various S/MIME specifications for message wrapping, CMS
objects MAY optionally be wrapped in MIME to dynamically support 7-bit
transport. This outer wrapping is not required for X.400 transport, and
generally SHOULD NOT be applied in a homogeneous X.400 environment.
Heterogeneous mail systems or other factors MAY require the presence of
this outer MIME wrapper

2.5 Encoded Information Type Indication

In [MSG], the application/pkcs7-mime content type and optional
"smime-type" parameter are used to convey details about the security
applied (signed or enveloped) along with information about the contained
content. This may aid receiving S/MIME implementations in correctly
processing the secured content. Additional values of smime-type are
defined in [ESS] and [X400WRAP]. In an X.400 transport environment, MIME
typing is not available. Therefore the equivalent semantic is conveyed
using the Encoded Information Types (EITs). The EITs are conveyed in
the original-encoded-information-types field of the X.400 message
envelope. This memo defines the following smime-types.

      smime-type            EIT Value (OID)
      CMS protection type   Inner Content

      enveloped-data        id-eit-envelopedData
      EnvelopedData         Data

      signed-data           id-eit-signedData
      SignedData            Data

      cert-management       id-eit-certManagement
      SignedData            empty (zero-length content)

      signed-receipt        id-eit-signedReceipt
      SignedData            Receipt

      enveloped-x400        id-eit-envelopedx400
      EnvelopedData         X.400 content

      signed-x400           id-eit-signedx400
      SignedData            X.400 content

Sending agents SHOULD include the appropriate S/MIME EIT OID value.
Receiving agents SHOULD recognize S/MIME OID values in the EITs field,
and process the message appropriately according to local procedures.

In order that consistency can be obtained in future S/MIME EIT
assignments, the following guidelines should be followed when assigning
a new values of EIT. Values assigned for S/MIME EITs should correspond
to assigned smime-type values on a one to one basis. The restrictions of
section 3.2.2 of [MSG] therefore apply. S/MIME EIT values may coexist
with other EIT values intended to further qualify the makeup of the
protected content.

2.5.1 Enveloped Data

The enveloped data EIT indicates that the X.400 content field contains a
MIME type that has been protected by the CMS Enveloped-data content type
in accordance with [MSG]. The resulting enveloped data CMS content is
conveyed in accordance with section 2.2. This EIT should be indicated by
the following OID value:

     id-eit-envelopedData  OBJECT IDENTIFIER ::=
         { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) eits(***) envelopedData(0) }

2.5.2 Signed Data

The signed data EIT indicates that the X.400 content field contains a
MIME type that has been protected by the CMS Signed-data content type in
accordance with [MSG]. The resulting signed data CMS content is conveyed
in accordance with section 2.2. This EIT should be indicated by the
following OID value:

    id-eit-signedData  OBJECT IDENTIFIER ::=
         { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) eits(***) signedData(1) }

2.5.3 Certificate Management

The certificate management message is used to transport certificates
and/or CRLs, such as in response to a registration request. This is
described in [CERT3]. The certificate management message consists of a
single instance of CMS content of type Signed-data. The encapContentInfo
eContent field MUST be absent and signerInfos field MUST be empty. The
resulting certificate management CMS content is conveyed in accordance
with section 2.2. This EIT should be indicated by the following OID
value:

     id-eit-certManagement  OBJECT IDENTIFIER ::=
         { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) eits(***) certManagement(2) }

2.5.4 Signed Receipt

The signed receipt EIT indicates that the X.400 content field contains a
Receipt content that has been protected by the CMS Signed-data content
type in accordance with [ESS]. The resulting signed data CMS content is
conveyed in accordance with section 2.2. This EIT should be indicated by
the following OID value:

     id-eit-signedReceipt  OBJECT IDENTIFIER ::=
         { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) eits(***) signedReceipt(3) }

2.5.5 Enveloped X.400

The enveloped X.400 EIT indicates that the X.400 content field contains
X.400 content that has been protected by the CMS Enveloped-data content
type in accordance with [X400WRAP]. The resulting enveloped X.400 CMS
content is conveyed in accordance with section 2.2. This EIT should be
indicated by the following OID value:

     id-eit-envelopedX400  OBJECT IDENTIFIER ::=
         { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) eits(***) envelopedX400(4) }

2.5.6 Signed X.400

The signed X.400 EIT indicates that the X.400 content field contains
X.400 content that has been protected by the CMS Signed-data content
type in accordance with [X400WRAP]. The resulting signed X.400 CMS
content is conveyed in accordance with section 2.2. This EIT should be
indicated by the following OID value:

     id-eit-signedX400  OBJECT IDENTIFIER ::=
         { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
         pkcs-9(9) smime(16) eits(***) signedX400(5) }


3. Security Considerations

This entire document discusses the topic of conveying security protocol
structures. Additional security issues are identified in section 5 of
[MSG], section 6 of [ESS] and the Security Considerations section of
[CMS].


A. References

[CERT3] Ramsdell, B., Editor, "S/MIME Version 3 Certificate
Handling", RFC 2632, June 1999.

[CMS] Housley, R., "Cryptographic Message Syntax", RFC 2630, June 1999.

[MSG] Ramsdell, B., Editor "S/MIME Version 3 Message Specification", RFC
2633, June 1999.

[MUSTSHOULD] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.

[PKCS-7] Kaliski, B., "PKCS #7: Cryptographic Message Syntax Version
1.5", RFC 2315, March 1998.

[X.400] ITU-T X.400 Series of Recommendations, Information technology -
Message Handling Systems (MHS). X.400: System and Service Overview;
X.402: Overall Architecture; X.411: Message Transfer System: Abstract
Service Definition and Procedures; X.420: Interpersonal Messaging
System; 1996.


B. Differences between version -01 and -02

Added section 2.5 and its sub-sections.

Added [CERT3] to Appendix A.


C. Editors' Addresses

Paul Hoffman
Internet Mail Consortium
127 Segre Place
Santa Cruz, CA  95060  USA
phoffman@imc.org

Chris Bonatti
IECA, Inc.
bonattic@ieca.com