Skip to main content

Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure
RFC 8410

Revision differences

Document history

Date Rev. By Action
2021-12-04
10 (System) Received changes through RFC Editor sync (added Verified Errata tag)
2018-08-14
10 (System) Received changes through RFC Editor sync (added Errata tag)
2018-08-06
10 (System)
Received changes through RFC Editor sync (created alias RFC 8410, changed title to 'Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in …
Received changes through RFC Editor sync (created alias RFC 8410, changed title to 'Algorithm Identifiers for Ed25519, Ed448, X25519, and X448 for Use in the Internet X.509 Public Key Infrastructure', changed abstract to 'This document specifies algorithm identifiers and ASN.1 encoding formats for elliptic curve constructs using the curve25519 and curve448 curves.  The signature algorithms covered are Ed25519 and Ed448.  The key agreement algorithms covered are X25519 and X448.  The encoding for public key, private key, and Edwards-curve Digital Signature Algorithm (EdDSA) structures is provided.', changed pages to 20, changed standardization level to Proposed Standard, changed state to RFC, added RFC published event at 2018-08-06, changed IESG state to RFC Published)
2018-08-06
10 (System) RFC published
2018-08-06
10 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2018-06-25
10 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2018-06-24
10 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2018-05-11
10 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2018-05-10
10 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2018-05-10
10 (System) IANA Action state changed to In Progress from Waiting on Authors
2018-05-10
10 (System) IANA Action state changed to Waiting on Authors from In Progress
2018-05-09
10 (System) RFC Editor state changed to EDIT
2018-05-09
10 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2018-05-09
10 (System) Announcement was received by RFC Editor
2018-05-09
10 (System) IANA Action state changed to In Progress
2018-05-09
10 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2018-05-09
10 Amy Vezza IESG has approved the document
2018-05-09
10 Amy Vezza Closed "Approve" ballot
2018-05-09
10 Amy Vezza Ballot approval text was generated
2018-05-09
10 Amy Vezza Ballot writeup was changed
2018-05-09
10 Amy Vezza Ballot writeup was changed
2018-05-08
10 Eric Rescorla IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2018-05-08
10 Jim Schaad New version available: draft-ietf-curdle-pkix-10.txt
2018-05-08
10 (System) New version approved
2018-05-08
10 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2018-05-08
10 Jim Schaad Uploaded new revision
2018-04-20
09 (System) Sub state has been changed to AD Followup from Revised ID Needed
2018-04-20
09 Jim Schaad New version available: draft-ietf-curdle-pkix-09.txt
2018-04-20
09 (System) New version approved
2018-04-20
09 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2018-04-20
09 Jim Schaad Uploaded new revision
2018-04-19
08 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation
2018-04-19
08 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2018-04-19
08 Jim Schaad New version available: draft-ietf-curdle-pkix-08.txt
2018-04-19
08 (System) New version approved
2018-04-19
08 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2018-04-19
08 Jim Schaad Uploaded new revision
2018-04-18
07 Alissa Cooper [Ballot comment]
Please update Section 2 to reference BCP 14 rather than RFC 2119.
2018-04-18
07 Alissa Cooper Ballot comment text updated for Alissa Cooper
2018-04-18
07 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2018-04-18
07 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2018-04-18
07 Martin Vigoureux [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux
2018-04-18
07 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2018-04-17
07 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2018-04-17
07 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2018-04-17
07 Ignas Bagdonas [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas
2018-04-16
07 Adam Roach
[Ballot comment]
Thanks to everyone who contributed to this document.

This is not as much a document comment as a flag for IANA -- the …
[Ballot comment]
Thanks to everyone who contributed to this document.

This is not as much a document comment as a flag for IANA -- the OIDs
1.3.101.114 and 1.3.101.115 show as reserved by this document at
https://www.ietf.org/assignments/smi-numbers/smi-numbers.xml#smi-numbers-1.3.101
but those codepoints no longer appear in this document. We should make sure
they get released by IANA rather than finalized to point to the RFC this will
become.

---------------------------------------------------------------------------

§3:

>    For this reason, a small
>    number of implementations may still require the field to be
>    present.

I'm surprised that there's no implementation guidance here. Presumably (based
on the text about curve25519 and curve448), the parameter is present but NULL?
Is it recommended to set this for maximum compatiblity? Or is this simply
something that users should be allowed to configure when generating these?

===========================================================================
Nits
===========================================================================

§1:

>  o  The EdDSA algorithms are the only IETF algorithms that currently
>    support the use of contexts, however there is a possibility that
>    there will be confusion between which algorithms need have
>    separate keys and which do not.  This may result in a decrease of

Nit: "...need to have..."

---------------------------------------------------------------------------
§1:

>  o  There are still on going discussions among the cryptographic

Nit: "ongoing"

---------------------------------------------------------------------------

§1:

>  o  There needs to be discussions about the correct way to identify
>    when context strings are to be used.  It is not clear if different
>    OIDs should be used for different contexts, or the OID should
>    merely not that a context string needs to be provided.

Nit: "...merely note..."

---------------------------------------------------------------------------

§2:

Consider use of RFC 8174 boiler plate - the document uses non-normative,
lowercase "should" in some locations.
2018-04-16
07 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2018-04-16
07 Warren Kumari
[Ballot comment]
I'd ballot Yes, but I'm not sufficiently schooled in the art to be able to back that up...

Instead, I offer a nit …
[Ballot comment]
I'd ballot Yes, but I'm not sufficiently schooled in the art to be able to back that up...

Instead, I offer a nit :-) :
1: "There are still on going discussions" -> ongoing.
2018-04-16
07 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2018-04-15
07 Alexey Melnikov [Ballot comment]
Benjamin already spotted s/not/note.
2018-04-15
07 Alexey Melnikov [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov
2018-04-13
07 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2018-04-13
07 Benjamin Kaduk
[Ballot comment]
It's good to see this being done.  I found several nits (and second the genart reviewer's request for the RFC 8174 boilerplate).

Section …
[Ballot comment]
It's good to see this being done.  I found several nits (and second the genart reviewer's request for the RFC 8174 boilerplate).

Section 1

  [...] This RFC defines the ASN.1 Object Identifiers
  (OIDs) for the operations X25519 and X448 along with the parameters.

"the parameters" is not scoped properly; "their parameters", maybe?

  [...] The convention used for identifying
  the algorithm/curve combinations are to use the Ed25519 and Ed448 for
  the PureEdDSA mode. [...]

"the Ed25519" is an overzealous "the"; also singular/plural mismatch
for convention/are.

      [...], or the OID should
      merely not that a context string needs to be provided.

s/not/note/


Section 3

  o  algorithm identifies the cryptographic algorithm with an object
      identifier.  This is one of the OIDs defined below.

"is" may be too restrictive, since there are other possible uses of
AlgorithmIdentifier.

  In this document we defined four new OIDs for identifying the
  different curve/algorithm pairs.  The curves being curve25519 and
  curve448.  The algorithms being ECDH and EdDSA in pure mode.

s/defined/define/, and join the latter sentence fragments into the
former sentence with commas/"and".


Section 4

The public key example immediately follows text about how the
key-exchange and EdDSA usages will produce different public key
encodings for a given private key, but does not say which encoding
it uses.  It would be nice to have that clearly indicated in the
text.


Section 7

  Asymmetric Key Packages [RFC5958] describes how encode a private key

"how to encode"
2018-04-13
07 Benjamin Kaduk [Ballot Position Update] New position, Yes, has been recorded for Benjamin Kaduk
2018-04-13
07 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2018-04-12
07 Spencer Dawkins
[Ballot comment]
Nit:

  o  The EdDSA algorithms are the only IETF algorithms that currently
      support the use of contexts, however there …
[Ballot comment]
Nit:

  o  The EdDSA algorithms are the only IETF algorithms that currently
      support the use of contexts, however there is a possibility that
      there will be confusion between which algorithms need have
                                "need" or "need to have"? ^
      separate keys and which do not.  This may result in a decrease of
      security for those other algorithms.
2018-04-12
07 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2018-03-02
07 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2018-02-24
07 Eric Rescorla Not sure why this showed Internet Standard
2018-02-24
07 Eric Rescorla Intended Status changed to Proposed Standard from Internet Standard
2018-02-24
07 Eric Rescorla IESG state changed to IESG Evaluation from Waiting for Writeup
2018-02-24
07 Eric Rescorla Ballot has been issued
2018-02-24
07 Eric Rescorla [Ballot Position Update] New position, Yes, has been recorded for Eric Rescorla
2018-02-24
07 Eric Rescorla Created "Approve" ballot
2018-02-24
07 Eric Rescorla Ballot writeup was changed
2018-02-24
07 Eric Rescorla Placed on agenda for telechat - 2018-04-19
2018-01-05
07 Daniel Migault
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

The request type for draft-ietf-curdle-pkix is Standard Track. This is the appropriated type as it defined IODs for using Ed25519,  Ed448, X25519 and X448 for X509 with PKI. It is indicated in the header page.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  Relevant content can frequently be found in the abstract
  and/or introduction of the document. If not, this may be
  an indication that there are deficiencies in the abstract
  or introduction.

  This document specifies algorithm identifiers and ASN.1 encoding
  formats for Elliptic Curve constructs using the Curve25519 and
  Curve448 curves.  The signature algorithms covered are Ed25519,
  Ed448.  The key agreement algorithm covered
  are X25519 and X448.  The Encoding for Public Key, Private Key and
  EdDSA digital signature structures is provided.
 
Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
Main discussions that happened regarding the draft were:
      - the use of a context or not. The current agreement was not to use any specific context as this would lead to encourage people to use the same key for different usages. The same discussion appears in IPsec, with the DNSKEY.
    - Names and designation for IOD format. We met in the IETF in Berlin (Benjamin, Jim, Russ as well as Rich and Daniel) and the next version reflected the discussion, and were adopted by the WG. 
    - Use of prehash or pure variant was raised in version 03 that mentioned "CAs MUST NOT use the pre-hash versions".  The main argument for enabling the prehash variant was to be able to sign large amount of data such as CRLs. However this can be addressed by combining CRL distribution points, combined with segmenting the certificates. For the care of simplicity, the consensus was that a single variant should be considered only and the choice was to follow the FCRG recommendations and chose the pure variant. As a result the draft has removed any mention of the purehash variant and stated clearly that only the pure variant is addressed by the draft.
    - OID identifier parameter MUST be absent and a parameter set to NULL MUST NOT be accepted.  Java implementation cannot be currently compatible with this. However, the working group consensus was to have a straight enforcement of the update specification of AlgorithmIdentifier. This is clearly mentioned in the draft so implementation can understand the motivation as well as becoming compliant with the updated spec.
"""
      When the 1997
      syntax for AlgorithmIdentifier was initially defined, it omitted
      the OPTIONAL key word.  The optionality of the parameters field
      was later recovered via a defect report, but by then many people
      thought that the field was mandatory.  For this reason, a small
      number of implementations may still require the field to be
      present.
"""

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

Given the the number of review we received,  I suspect multiple vendors
are willing to implement it, but so far I am only aware of partial implementations.

Jim has a partial implementation, but he is not aware of any other
implementation.

Ilari also mentioned a partial implementation in the context of TLS.
The information provided on the mailing list are copied here.

"""
I do not have/know full implementation, however I do have a partial implementation in context of TLS:

- Ed25519/Ed448 PKIX public keys in certificates.
- (Ed25519/Ed448 TLS exchange signatures -- covered by TLS docs)
- Ed25519/Ed448 PKIX certificate signatures.

And GnuTLS 3.6.1 supports at least:

- Ed25519 PKIX private keys (at least v1)
- Ed25519 PKIX public keys in certificates
- (Ed25519 TLS exchange signatures -- covered by TLS docs)
- Ed25519 PKIX certificate signatures.


My implementation interoperates with GnuTLS 3.6.1 on TLS handshake with both Ed25519 server signature and  certificate signature.

- Server: My implementation, all settings at defaults.
- Client: GnuTLS 3.6, all settings at defaults except trustpile
  replaced with custom one.
- Certificate 0: EE, Ed25519 key, Ed25519 signature.
- Certificate 1: CA, Ed25519 key, RSA-PSS-SHA256 signature.
- Certificate 2: CA, RSAEncryption key, RSA-PKCS1-SHA256 signature.
- Certificate 3: CA, RSAEncryption key, self-signed. [Not sent].
- Negotiated TLS versionn: TLS 1.2 + RENEGO + EMS.

(The key exchange used is ECDHE_ECDSA for technical reasons, however, there are no actual ECDSA used anywhere).


Client status at end of handshake:

- Description: (TLS1.2)-(ECDHE-X25519)-(EdDSA-Ed25519)-(CHACHA20-POLY1305)
- Session ID: (empty)
- Ephemeral EC Diffie-Hellman parameters
- Using curve: X25519
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-ECDSA
- Server Signature: EdDSA-Ed25519
- Cipher: CHACHA20-POLY1305
- MAC: AEAD
- Options: extended master secret, safe renegotiation,
- Handshake was completed


Server status at end of handshake:


Handshake complete, crypto parameters:
- TLS version:              1.2
- Encryption:              Chacha20-Poly1305
- PRF:                      SHA-256
- Key Exchange:            X25519
- Server Signature:        Ed25519
- Triple Handshake attack:  Fixed
- OCSP stapling:            No
- Certificate Transparency: No
"""



Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Daniel Migault is the document shepherd.
  Eric Rescola is the AD.
 
(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  I review the document, and think it is ready.
 
(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

    I believe the document has been deeply reviewed, discussed, and we have multiple implementations.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The draft concerns PKI and the people involved in the topic have either authored or reviewed the draft.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

Chairs added Jim Schaad to co-author the draft as an insurance for the draft to meet requirements and expectation from the X509 community.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.


Jim Schaad and Simon Josefsson mention they are not aware of any IPR raised from the draft itself. They have no statement to make on the IPR for the algorithm itself.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

The draft has been discussed by co-authors, co chairs and more than 5 participants. Comments are based on multiple implementation.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Running the nits provides:

Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

  ** Downref: Normative reference to an Informational RFC: RFC 7748

  ** Downref: Normative reference to an Informational RFC: RFC 8032

RFC8032 describes the elliptic curve signature scheme
Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is
instantiated with recommended parameters for the edwards25519 and edwards448 curves.
RFC 7748 specifies two elliptic curves over prime fields that offer
a high level of practical security in cryptographic applications: Curve25519 and Curve448.

RFC 8032 is from the IRTF which does not define standards. The current document describes the use of this algorithm.  The draft is in the RFC Editor Queue and has been approved by the IESG.

The Downref is justified by RFC3967 as it falls into the following case:
  o  A standards track document may need to refer to a protocol or
      algorithm developed by an external body but modified, adapted, or
      profiled by an IETF informational RFC.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

I reviewed the draft and the document seems ready. 

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

There are no IANA considerations.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

ASN1 has not been reviewed by anyone except by Jim and maybe Russ Hussley.
2018-01-02
07 Daniel Migault
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

The request type for draft-ietf-curdle-pkix is Standard Track. This is the appropriated type as it defined IODs for using Ed25519,  Ed448, X25519 and X448 for X509 with PKI. It is indicated in the header page.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  Relevant content can frequently be found in the abstract
  and/or introduction of the document. If not, this may be
  an indication that there are deficiencies in the abstract
  or introduction.

  This document specifies algorithm identifiers and ASN.1 encoding
  formats for Elliptic Curve constructs using the Curve25519 and
  Curve448 curves.  The signature algorithms covered are Ed25519,
  Ed448.  The key agreement algorithm covered
  are X25519 and X448.  The Encoding for Public Key, Private Key and
  EdDSA digital signature structures is provided.
 
Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
Main discussions that happened regarding the draft were:
      - the use of a context or not. The current agreement was not to use any specific context as this would lead to encourage people to use the same key for different usages. The same discussion appears in IPsec, with the DNSKEY.
    - Names and designation for IOD format. We met in the IETF in Berlin (Benjamin, Jim, Russ as well as Rich and Daniel) and the next version reflected the discussion, and were adopted by the WG. 
    - Use of prehash or pure variant was raised in version 03 that mentioned "CAs MUST NOT use the pre-hash versions".  The main argument for enabling the prehash variant was to be able to sign large amount of data such as CRLs. However this can be addressed by combining CRL distribution points, combined with segmenting the certificates. For the care of simplicity, the consensus was that a single variant should be considered only and the choice was to follow the FCRG recommendations and chose the pure variant. As a result the draft has removed any mention of the purehash variant and stated clearly that only the pure variant is addressed by the draft.
    - OID identifier parameter MUST be absent and a parameter set to NULL MUST NOT be accepted.  Java implementation cannot be currently compatible with this. However, the working group consensus was to have a straight enforcement of the update specification of AlgorithmIdentifier. This is clearly mentioned in the draft so implementation can understand the motivation as well as becoming compliant with the updated spec.
"""
      When the 1997
      syntax for AlgorithmIdentifier was initially defined, it omitted
      the OPTIONAL key word.  The optionality of the parameters field
      was later recovered via a defect report, but by then many people
      thought that the field was mandatory.  For this reason, a small
      number of implementations may still require the field to be
      present.
"""

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

Jim has a partial implementation, but he is not aware of any other
implementation. Given the the number of review we received,
I suspect multiple vendors are willing to implement it, but so far
I am not aware of any.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Daniel Migault is the document shepherd.
  Eric Rescola is the AD.
 
(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  I review the document, and think it is ready.
 
(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

    I believe the document has been deeply reviewed, discussed, and we have multiple implementations.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The draft concerns PKI and the people involved in the topic have either authored or reviewed the draft.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

Chairs added Jim Schaad to co-author the draft as an insurance for the draft to meet requirements and expectation from the X509 community.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.


Jim Schaad and Simon Josefsson mention they are not aware of any IPR raised from the draft itself. They have no statement to make on the IPR for the algorithm itself.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

The draft has been discussed by co-authors, co chairs and more than 5 participants. Comments are based on multiple implementation.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Running the nits provides:

Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

  ** Downref: Normative reference to an Informational RFC: RFC 7748

  ** Downref: Normative reference to an Informational RFC: RFC 8032

RFC8032 describes the elliptic curve signature scheme
Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is
instantiated with recommended parameters for the edwards25519 and edwards448 curves.
RFC 7748 specifies two elliptic curves over prime fields that offer
a high level of practical security in cryptographic applications: Curve25519 and Curve448.

RFC 8032 is from the IRTF which does not define standards. The current document describes the use of this algorithm.  The draft is in the RFC Editor Queue and has been approved by the IESG.

The Downref is justified by RFC3967 as it falls into the following case:
  o  A standards track document may need to refer to a protocol or
      algorithm developed by an external body but modified, adapted, or
      profiled by an IETF informational RFC.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

I reviewed the draft and the document seems ready. 

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

There are no IANA considerations.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

ASN1 has not been reviewed by anyone except by Jim and maybe Russ Hussley.
2017-11-14
07 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2017-11-14
07 Jim Schaad New version available: draft-ietf-curdle-pkix-07.txt
2017-11-14
07 (System) New version approved
2017-11-14
07 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2017-11-14
07 Jim Schaad Uploaded new revision
2017-11-12
06 Eric Rescorla Oops, I pushed the wrong button previously. This is waiting for me.
2017-11-12
06 Eric Rescorla IESG state changed to Waiting for Writeup from Last Call Requested
2017-11-12
06 Eric Rescorla Last call was requested
2017-11-12
06 Eric Rescorla Please issue this last call next week.
2017-11-12
06 Eric Rescorla IESG state changed to Last Call Requested from AD Evaluation
2017-11-12
06 Eric Rescorla IESG state changed to AD Evaluation from Waiting for Writeup
2017-10-23
06 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Scott Bradner.
2017-10-19
06 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Shawn Emery.
2017-10-09
06 Francis Dupont Request for Last Call review by GENART Completed: Ready. Reviewer: Francis Dupont.
2017-10-09
06 (System) IESG state changed to Waiting for Writeup from In Last Call
2017-10-04
06 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2017-10-04
06 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-curdle-pkix-06. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-curdle-pkix-06. If any part of this review is inaccurate, please let us know.

The IANA Services Operator has a question about one of the actions requested in the IANA Considerations section of this document.

The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete.

In the SMI Security for PKIX Module Identifier registry located on the Structure of Management Information (SMI) Numbers (MIB Module Registrations) registry page located at:

https://www.iana.org/assignments/smi-numbers/

a single, new registration will be made as follows:

Decimal: [ TBD-at-registration ]
Description: [ see question below ]
Reference: [ RFC-to-be ]

What is the Description to be used for this module OID? In the SMI Security for PKIX Module Identifier registry, the module OID Descriptions begin with "id-mod" or "id-pkix1"

Because this registry requires Expert Review [RFC5226] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC.

The IANA Services Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.


Thank you,

Sabrina Tanamal
IANA Services Specialist
2017-09-28
06 Jean Mahoney Request for Last Call review by GENART is assigned to Francis Dupont
2017-09-28
06 Jean Mahoney Request for Last Call review by GENART is assigned to Francis Dupont
2017-09-28
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to Shawn Emery
2017-09-28
06 Tero Kivinen Request for Last Call review by SECDIR is assigned to Shawn Emery
2017-09-26
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Scott Bradner
2017-09-26
06 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Scott Bradner
2017-09-25
06 Cindy Morgan IANA Review state changed to IANA - Review Needed
2017-09-25
06 Cindy Morgan
The following Last Call announcement was sent out (ends 2017-10-09):

From: The IESG
To: IETF-Announce
CC: ekr@rtfm.com, Daniel Migault , curdle-chairs@ietf.org, curdle@ietf.org, …
The following Last Call announcement was sent out (ends 2017-10-09):

From: The IESG
To: IETF-Announce
CC: ekr@rtfm.com, Daniel Migault , curdle-chairs@ietf.org, curdle@ietf.org, daniel.migault@ericsson.com, draft-ietf-curdle-pkix@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Algorithm Identifiers for Ed25519, Ed448, X25519 and X448 for use in the Internet X.509 Public Key Infrastructure) to Internet Standard


The IESG has received a request from the CURves, Deprecating and a Little
more Encryption WG (curdle) to consider the following document: - 'Algorithm
Identifiers for Ed25519, Ed448, X25519 and X448 for use in
  the Internet X.509 Public Key Infrastructure'
  as Internet Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2017-10-09. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  This document specifies algorithm identifiers and ASN.1 encoding
  formats for Elliptic Curve constructs using the curve25519 and
  curve448 curves.  The signature algorithms covered are Ed25519 and
  Ed448.  The key agreement algorithm covered are X25519 and X448.  The
  encoding for Public Key, Private Key and EdDSA digital signature
  structures is provided.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-curdle-pkix/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-curdle-pkix/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc5480: Elliptic Curve Cryptography Subject Public Key Information (Proposed Standard - IETF stream)



2017-09-25
06 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2017-09-25
06 Cindy Morgan Last call announcement was generated
2017-09-23
06 Eric Rescorla Last call was requested
2017-09-23
06 Eric Rescorla Last call announcement was generated
2017-09-23
06 Eric Rescorla Ballot approval text was generated
2017-09-23
06 Eric Rescorla Ballot writeup was generated
2017-09-23
06 Eric Rescorla IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2017-09-12
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2017-09-12
06 Jim Schaad New version available: draft-ietf-curdle-pkix-06.txt
2017-09-12
06 (System) New version approved
2017-09-12
06 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2017-09-12
06 Jim Schaad Uploaded new revision
2017-09-03
05 Eric Rescorla IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2017-08-29
05 Eric Rescorla IESG state changed to AD Evaluation from AD is watching::External Party
2017-07-03
05 Jim Schaad New version available: draft-ietf-curdle-pkix-05.txt
2017-07-03
05 (System) New version approved
2017-07-03
05 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2017-07-03
05 Jim Schaad Uploaded new revision
2017-05-05
04 Eric Rescorla IESG state changed to AD is watching::External Party from AD Evaluation::External Party
2017-05-05
04 Eric Rescorla IESG state changed to AD Evaluation::External Party from AD Evaluation
2017-04-21
04 Eric Rescorla IESG state changed to AD Evaluation from Publication Requested
2017-04-07
04 Daniel Migault
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

The request type for draft-ietf-curdle-pkix is Standard Track. This is the appropriated type as it defined IODs for using Ed25519,  Ed448, X25519 and X448 for X509 with PKI. It is indicated in the header page.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  Relevant content can frequently be found in the abstract
  and/or introduction of the document. If not, this may be
  an indication that there are deficiencies in the abstract
  or introduction.

  This document specifies algorithm identifiers and ASN.1 encoding
  formats for Elliptic Curve constructs using the Curve25519 and
  Curve448 curves.  The signature algorithms covered are Ed25519,
  Ed448.  The key agreement algorithm covered
  are X25519 and X448.  The Encoding for Public Key, Private Key and
  EdDSA digital signature structures is provided.
 
Working Group Summary

  Was there anything in WG process that is worth noting? For
  example, was there controversy about particular points or
  were there decisions where the consensus was particularly
  rough?
Main discussions that happened regarding the draft were:
      - the use of a context or not. The current agreement was not to use any specific context as this would lead to encourage people to use the same key for different usages. The same discussion appears in IPsec, with the DNSKEY.
    - Names and designation for IOD format. We met in the IETF in Berlin (Benjamin, Jim, Russ as well as Rich and Daniel) and the next version reflected the discussion, and were adopted by the WG. 
    - Use of prehash or pure variant was raised in version 03 that mentioned "CAs MUST NOT use the pre-hash versions".  The main argument for enabling the prehash variant was to be able to sign large amount of data such as CRLs. However this can be addressed by combining CRL distribution points, combined with segmenting the certificates. For the care of simplicity, the consensus was that a single variant should be considered only and the choice was to follow the FCRG recommendations and chose the pure variant. As a result the draft has removed any mention of the purehash variant and stated clearly that only the pure variant is addressed by the draft.
    - OID identifier parameter MUST be absent and a parameter set to NULL MUST NOT be accepted.  Java implementation cannot be currently compatible with this. However, the working group consensus was to have a straight enforcement of the update specification of AlgorithmIdentifier. This is clearly mentioned in the draft so implementation can understand the motivation as well as becoming compliant with the updated spec.
"""
      When the 1997
      syntax for AlgorithmIdentifier was initially defined, it omitted
      the OPTIONAL key word.  The optionality of the parameters field
      was later recovered via a defect report, but by then many people
      thought that the field was mandatory.  For this reason, a small
      number of implementations may still require the field to be
      present.
"""

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Daniel Migault is the document shepherd.
  Eric Rescola is the AD.
 
(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  I review the document, and think it is ready.
 
(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

    I believe the document has been deeply reviewed, discussed, and we have multiple implementations.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The draft concerns PKI and the people involved in the topic have either authored or reviewed the draft.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

Chairs added Jim Schaad to co-author the draft as an insurance for the draft to meet requirements and expectation from the X509 community.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.


Jim Schaad and Simon Josefsson mention they are not aware of any IPR raised from the draft itself. They have no statement to make on the IPR for the algorithm itself.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

The draft has been discussed by co-authors, co chairs and more than 5 participants. Comments are based on multiple implementation.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

Running the nits provides:

Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

  ** Downref: Normative reference to an Informational RFC: RFC 7748

  ** Downref: Normative reference to an Informational RFC: RFC 8032

RFC8032 describes the elliptic curve signature scheme
Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is
instantiated with recommended parameters for the edwards25519 and edwards448 curves.
RFC 7748 specifies two elliptic curves over prime fields that offer
a high level of practical security in cryptographic applications: Curve25519 and Curve448.

RFC 8032 is from the IRTF which does not define standards. The current document describes the use of this algorithm.  The draft is in the RFC Editor Queue and has been approved by the IESG.

The Downref is justified by RFC3967 as it falls into the following case:
  o  A standards track document may need to refer to a protocol or
      algorithm developed by an external body but modified, adapted, or
      profiled by an IETF informational RFC.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

No.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

I reviewed the draft and the document seems ready. 

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

There are no IANA considerations.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

ASN1 has not been reviewed by anyone except by Jim and maybe Russ Hussley.
2017-04-07
04 Daniel Migault Responsible AD changed to Eric Rescorla
2017-04-07
04 Daniel Migault IETF WG state changed to Submitted to IESG for Publication from In WG Last Call
2017-04-07
04 Daniel Migault IESG state changed to Publication Requested
2017-04-07
04 Daniel Migault IESG process started in state Publication Requested
2017-04-07
04 Daniel Migault Changed document writeup
2017-03-30
04 Daniel Migault Changed document writeup
2017-03-28
04 Jim Schaad New version available: draft-ietf-curdle-pkix-04.txt
2017-03-28
04 (System) New version approved
2017-03-28
04 (System) Request for posting confirmation emailed to previous authors: Jim Schaad , Simon Josefsson
2017-03-28
04 Jim Schaad Uploaded new revision
2016-11-23
03 Jim Schaad New version available: draft-ietf-curdle-pkix-03.txt
2016-11-23
03 (System) New version approved
2016-11-23
03 (System) Request for posting confirmation emailed to previous authors: "Simon Josefsson" , "Jim Schaad"
2016-11-23
03 Jim Schaad Uploaded new revision
2016-11-17
02 Rich Salz Has been in WGLC, just updating the tracker.
2016-11-17
02 Rich Salz IETF WG state changed to In WG Last Call from WG Document
2016-11-17
02 Rich Salz Changed consensus to Yes from Unknown
2016-11-17
02 Rich Salz Intended Status changed to Internet Standard from None
2016-11-17
02 Daniel Migault Notification list changed to "Daniel Migault" <daniel.migault@ericsson.com>
2016-11-17
02 Daniel Migault Document shepherd changed to Daniel Migault
2016-11-17
02 Daniel Migault Changed document writeup
2016-10-31
02 Jim Schaad New version available: draft-ietf-curdle-pkix-02.txt
2016-10-31
02 (System) New version approved
2016-10-31
01 (System) Request for posting confirmation emailed to previous authors: "Simon Josefsson" , "Jim Schaad"
2016-10-31
01 Jim Schaad Uploaded new revision
2016-08-19
01 Rich Salz This document now replaces draft-ietf-curdle-pkix-newcurves, draft-ietf-curdle-pkix-eddsa instead of None
2016-08-19
01 Rich Salz Reviewed suggested replacement relationships: draft-ietf-curdle-pkix-newcurves, draft-ietf-curdle-pkix-eddsa
2016-08-19
01 (System) Added suggested replacement relationships: draft-ietf-curdle-pkix-eddsa, draft-ietf-curdle-pkix-newcurves
2016-08-19
01 (System) This document now replaces None instead of None
2016-08-19
01 Jim Schaad New version available: draft-ietf-curdle-pkix-01.txt
2016-07-22
00 Russ Housley Added to session: IETF-96: lamps  Fri-1220
2016-04-08
00 Simon Josefsson New version available: draft-ietf-curdle-pkix-00.txt