Cryptographic Token Key Initialization Protocol (CT-KIP) Version 1.0 Revision 1
RFC 4758
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21
|
02 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2018-12-20
|
02 | (System) | Received changes through RFC Editor sync (changed abstract to 'This document constitutes Revision 1 of Cryptographic Token Key Initialization Protocol (CT-KIP) Version 1.0 from RSA … Received changes through RFC Editor sync (changed abstract to 'This document constitutes Revision 1 of Cryptographic Token Key Initialization Protocol (CT-KIP) Version 1.0 from RSA Laboratories' One-Time Password Specifications (OTPS) series. The body of this document, except for the intellectual property considerations section, is taken from the CT-KIP Version 1.0 document, but comments received during the IETF review are reflected; hence, the status of a revised version. As no "bits-on-the-wire" have changed, the protocol specified herein is compatible with CT-KIP Version 1.0. CT-KIP is a client-server protocol for initialization (and configuration) of cryptographic tokens. The protocol requires neither private-key capabilities in the cryptographic tokens, nor an established public-key infrastructure. Provisioned (or generated) secrets will only be available to the server and the cryptographic token itself. This memo provides information for the Internet community.') |
2015-10-14
|
02 | (System) | Notify list changed from magnus@rsasecurity.com to (None) |
2012-08-22
|
02 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2012-08-22
|
02 | (System) | post-migration administrative database adjustment to the No Objection position for Ted Hardie |
2006-12-04
|
02 | Amy Vezza | State Changes to RFC Published from RFC Ed Queue by Amy Vezza |
2006-12-04
|
02 | Amy Vezza | [Note]: 'RFC 4758' added by Amy Vezza |
2006-11-30
|
02 | (System) | RFC published |
2006-11-08
|
02 | (System) | Request for Early review by SECDIR Completed. Reviewer: Sandra Murphy. |
2006-09-24
|
02 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2006-09-20
|
02 | Amy Vezza | IESG state changed to Approved-announcement sent |
2006-09-20
|
02 | Amy Vezza | IESG has approved the document |
2006-09-20
|
02 | Amy Vezza | Closed "Approve" ballot |
2006-09-20
|
02 | Russ Housley | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Russ Housley |
2006-09-20
|
02 | Ted Hardie | [Ballot Position Update] Position for Ted Hardie has been changed to No Objection from Discuss by Ted Hardie |
2006-09-06
|
02 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2006-09-05
|
02 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-09-05
|
02 | (System) | New version available: draft-nystrom-ct-kip-02.txt |
2006-07-20
|
02 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2006-07-20
|
02 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded for Lisa Dusseault by Lisa Dusseault |
2006-07-18
|
02 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded for Ross Callon by Ross Callon |
2006-07-18
|
02 | (System) | State Changes to IESG Evaluation from IESG Evaluation - Defer by system |
2006-07-17
|
02 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded for Cullen Jennings by Cullen Jennings |
2006-07-17
|
02 | Ted Hardie | [Ballot discuss] The discussion of the HTTP 1.1 binding has a number of issues. The cache-control header description, for example, says: o If the value … [Ballot discuss] The discussion of the HTTP 1.1 binding has a number of issues. The cache-control header description, for example, says: o If the value of the Cache-Control header field is not set to no- store, then the CT-KIP server must not include the Cache-Control header field in the response. o If a Cache-Control header field with a value of no-store does not disable the Expires response header field, then the Expires field should not be included. I believe that the first bullet means to say "Always include a cache-control directive with no-store as its value", but the wording is odd; it seems that the second means "Omit the expires header, unless the cache-control header is missing". If that is the case, what is the expected setting when cache-control is missing? This does ignore the case of an HTTP 1.0 proxy in-between the client and server, but this does not seem likely in this case (adding a pragma: no-cache would otherwise be necessary). The draft says: No support for HTTP/1.1 authentication is assumed. Does this just mean that any HTTP/1.1 authentication is not part of the CT-KIP mapping? The "initialization message" in 4.2.7 (and in the example in 4.2.8) do not mention or reflect a client POST, as 4.2.4 indicates. The draft says: In all other cases, the CT-KIP HTTP responder must respond with 200 (OK) and a suitable CT-KIP message (possibly with CT-KIP-related error information) in the HTTP body. Does this mean that the CT-KIP message can take the place of the 3xx series of messages? The examples use non-standard domain names ("tokens-r-us.com"). |
2006-07-17
|
02 | Ted Hardie | [Ballot Position Update] New position, Discuss, has been recorded for Ted Hardie by Ted Hardie |
2006-07-07
|
02 | (System) | Removed from agenda for telechat - 2006-07-06 |
2006-07-06
|
02 | Yoshiko Fong | IANA Evaluation Comment: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2006-07-06
|
02 | Brian Carpenter | [Ballot comment] Points from Gen-ART review by Eric Gray that could usefully be clarified: In section 3.7.1 - you say: "The XML format for CT-KIP … [Ballot comment] Points from Gen-ART review by Eric Gray that could usefully be clarified: In section 3.7.1 - you say: "The XML format for CT-KIP messages have been designed to be extensible. However, it is possible that the use of extensions will harm interoperability and therefore any use of extensions should be carefully considered." Can we say anything about what "harm interoperability" or "carefully considered" means? What are the risks? How can they be avoided? Is there a reference you can point to that talks about the issues? --------------------------------------------------------------------- In section 3.8.6 (CT-KIP server's second PDU), on pages 27 and 28, I am having trouble matching message fields (shown on page 27) with descriptions (given on pages 27 and 28). --------------------------------------------------------------------- NITs: ---- In section 5.2.1, the last sentence would be better worded as: "Sections 5.2.2 through 5.2.7 analyze these attack scenarios." --------------------------------------------------------------------- In section 6 (IANA Considerations), you say: "None at this point; the MIME type is already registered." The document mentions several MIME types. I assume you meant: "application/vnd.otps.ct-kip+xml" in this case (as opposed to - for instance - "image/jpeg" or "image/gif"). I would change the section to read either - "None at this point; the MIME type (section 4.2.2) is already registered." OR "IANA has no action with respect to this document." |
2006-07-06
|
02 | Brian Carpenter | [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter |
2006-07-05
|
02 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley |
2006-07-05
|
02 | Sam Hartman | State Changes to IESG Evaluation - Defer from IESG Evaluation by Sam Hartman |
2006-07-05
|
02 | Dan Romascanu | [Ballot comment] idnits says that reference [11] is not used. Looks like it's right. |
2006-07-05
|
02 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded for Dan Romascanu by Dan Romascanu |
2006-07-05
|
02 | Magnus Westerlund | [Ballot discuss] Abstract: This document represents a republication of CT-KIP Version 1.0 from RSA Laboratories' One-Time Password Specifications (OTPS) series, and change … [Ballot discuss] Abstract: This document represents a republication of CT-KIP Version 1.0 from RSA Laboratories' One-Time Password Specifications (OTPS) series, and change control is retained within the OTPS process. To my understanding this note has no impact on having the OTPS maintain change controll over their specification. The primary way of achieving that for them would have been to include Statement a in section 5.2 of RFC 3978: a. "This document may not be modified, and derivative works of it may not be created, except to publish it as an RFC and to translate it into languages other than English." There is need for some clarification on this issue. If it is intended that OTPS should maintain change control the correct statement needs to be included. If that can be fixed with RFC-editor note or not I don't know. 7. Intellectual property considerations RSA Security has filed an IETF IPR Disclosure for IPR related to this document. The IETF IPR Disclosure number is 714 and it can be found at the IETF IPR Disclosure page. RSA Security makes no representations regarding intellectual property claims by other parties. Such determination is the responsibility of the user. RSA, RSA Security and SecurID are registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. The names of other products and services mentioned may be the trademarks of their respective owners. This section is included contrary to Section 11 of RFC 3979 (BCP 79). |
2006-07-05
|
02 | Magnus Westerlund | [Ballot Position Update] New position, Discuss, has been recorded for Magnus Westerlund by Magnus Westerlund |
2006-07-05
|
02 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko by Jari Arkko |
2006-06-30
|
02 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert by Lars Eggert |
2006-06-24
|
02 | Russ Housley | [Ballot Position Update] New position, Yes, has been recorded for Russ Housley |
2006-06-24
|
02 | Russ Housley | Ballot has been issued by Russ Housley |
2006-06-24
|
02 | Russ Housley | Created "Approve" ballot |
2006-06-24
|
02 | (System) | Ballot writeup text was added |
2006-06-24
|
02 | (System) | Last call text was added |
2006-06-24
|
02 | (System) | Ballot approval text was added |
2006-06-24
|
02 | Russ Housley | Placed on agenda for telechat - 2006-07-06 by Russ Housley |
2006-06-24
|
02 | Russ Housley | State Changes to IESG Evaluation from AD Evaluation by Russ Housley |
2006-06-24
|
02 | Russ Housley | State Changes to AD Evaluation from Publication Requested by Russ Housley |
2006-05-23
|
02 | Russ Housley | Draft Added by Russ Housley in state Publication Requested |
2006-05-23
|
01 | (System) | New version available: draft-nystrom-ct-kip-01.txt |
2006-05-23
|
(System) | Posted related IPR disclosure: RSA Security Inc.'s statement about IPR claimed in draft-nystrom-ct-kip-00.txt | |
2006-03-01
|
00 | (System) | New version available: draft-nystrom-ct-kip-00.txt |