Skip to main content

Liaison statement
Reply to "LSout to IETF on “Certificate Management”"

Additional information about IETF liaison relationships is available on the IETF webpage and the Internet Architecture Board liaison webpage.
State Posted
Submitted Date 2025-06-27
From Group lamps
From Contact housley@vigilsec.com
To Group ETSI-ISG-NFV
To Contacts NFVsupport@etsi.org
Cc Paul Wouters <paul.wouters@aiven.io>
Russ Housley <housley@vigilsec.com>
Deb Cooley <debcooley1@gmail.com>
Limited Additional Mechanisms for PKIX and SMIME Discussion List <spasm@ietf.org>
Tim Hollebeek <tim.hollebeek@digicert.com>
Response Contact Russ Housley <housley@vigilsec.com>
Tim Hollebeek <tim.hollebeek@digicert.com>
Purpose In response
Attachments (None)
Liaisons referred by this one LSout to IETF on “Certificate Management”
Body
In January 2025, the documents
https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc6712bis/ and
https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc4210bis/ approved by the
IESG. The two documents are expected to be published as RFCs in mid-2025. They
will obsolete the current RFCs 4210, 6712 and 9480.

RE: Action 1.

In NFV-SOL023:
https://docbox.etsi.org/ISG/NFV/Open/Drafts/SOL023/NFV-SOL023v0011.zip, it is
crucial to understand that the delegation mode features distinct endpoints for
TLS and CMP. The TLS endpoint is designated as the CMF acting as an RA
forwarding a CMP request to the CA if the certificate request was approved.
While the CMP endpoint on the CA requires the message-origin authentication of
the request. This necessitates that the VNFM must be registered with both the
CMF and the CA, making both authentications essential.

It is important to note that the end-to-end authentication capability of CMP is
crucial for the message-origin authentication at the CA. It cannot be replaced
solely by the TLS client authentication as it offers only authentication on the
first hop at the CMF. The senderKID facilitates identification of the CMP
protection credentials. Leaving the senderKID empty only makes sense when
omitting CMP message protection. This would lead to an unprotected certificate
request message, meaning no proof-of-identity of the VNFM requesting the
certificate, being transmitted from the CMF to the CA.

Both TLS and CMP provide comprehensive authentication means. While TLS only
provides authentication to the next TLS hop and CMP can provide end-to-end
authentication to even further hops. For CMP, the two endpoints authenticating
to each other are the VNFM requesting a certificate and the CA/RA. According to
RFC 9483, CMP messages must be authenticated, meaning that the certificate
request message will be generated by the VNFM requesting the certificate, and
will be authenticated by the CA/RA. Authentication is non-negotiable and cannot
be null or left empty; an unprotected CMP message will cause the message to be
rejected by the CA/RA. This is because without message-origin authentication of
the certificate request message the CA/RA has no reliable information to
authorize the certificate request with. The senderKID is used to ease the
identification of the CMP protection certificate and therefore is required to
be set accordingly.

While TLS provides server authentication, in cases of mutually authentication,
both the client and server are authenticated. A single endpoint can utilize the
same identity for both TLS and CMP. This allows an entity requesting the
certificate to send the certificate request message using the same identity on
TLS as well as on CMP level. It is essential to recognize that both TLS and CMP
offer authentication based on certificates and pre-shared keys.

RE: Action 2.

The process of registering or de-registering during the provisioning phase
involves CMP clients being registered with the Certification Authority (CA) to
obtain certificates linked to their accounts. However, CMP does not exactly
encompass this concept as described in ETSI-GS-NFV-IFA 026, which seems to be
related to account management. Typically, these actions are carried out through
proprietary APIs offered by the CA, and there are currently no intentions to
standardize these APIs at the IETF. Consequently, it is highly unlikely that
this will fall within the scope of LAMPS.

When CMP mentions “registration” it is understood as the process where an
entity applies for its first certificate at the PKI and this PKI issues it.
Accordingly, the de-registration of an entity takes place through the
revocation of all still valid certificates that this PKI has issued for this
entity. Details on initial registration/certification using CMP can be found at
https://datatracker.ietf.org/doc/html/draft-ietf-lamps-rfc4210bis-18#section-4.2
and https://datatracker.ietf.org/doc/html/rfc9483#section-4.1.1.
De-registration might be implemented by revocation or expiration of the
certificates. Details on revocation using CMP can be found in
https://datatracker.ietf.org/doc/html/draft-ietf-lamps-rfc4210bis-18#section-5.3.9
and https://datatracker.ietf.org/doc/html/rfc9483#section-4.2.

Because CMP is a flexible protocol, it can easily be extended. If you wish to
perform the registration/de-registration exchanges inband CMP you could either
profile the ir/cr/kur/p10cr/rr messages or specify additional general messages
(genm/genp), see examples for how to extend general messages in
https://datatracker.ietf.org/doc/html/draft-ietf-lamps-rfc4210bis-18#section-5.3.19
and https://datatracker.ietf.org/doc/html/rfc9483#section-4.4. Such extensions
would require specification in an RFC.

RE: Action 3.

ACME offers the Token Authority as outlined in RFC 9447 and RFC 9448. A Token
Authority acts as an RA performing authorization of a certificate request in a
domain separate from the CA.  However, the current architecture is tailored for
specific tokens, which may not align with your particular needs.

As said, CMP is quite flexible. An authorization token could either be carried
in the generalInfo field of the CMP request message header (see
https://datatracker.ietf.org/doc/html/draft-ietf-lamps-rfc4210bis-18#section-5.1.1)
or in the regInfo field of the certificate request (see
https://datatracker.ietf.org/doc/html/rfc4211#section-3, this does not work
with PKCS#10). The respective new syntax would need to be specified in an RFC.

When a CA does not use the Token Authority, note that it will also likely
consider isolating internally the ACME server exposed to the Internet from its
certificate issuing function.

RE: Action 4.

The IETF operates as an open standards organization, welcoming anyone to join
and participate. Currently, the primary groups of concern are LAMPS
https://datatracker.ietf.org/wg/lamps/about/ and ACME
https://datatracker.ietf.org/wg/acme/about/. We strongly encourage you to
participate actively in the LAMPS and ACME Working Groups. In case you plan to
extend the CMP protocol based on the proposals above, there may be support
regarding CMP ASN.1 syntax specification. Participation is the best way to
represent the ETSI requirements in the IETF.

In NFV-SOL023, accessible at
https://docbox.etsi.org/ISG/NFV/Open/Drafts/SOL023/NFV-SOL023v0011.zip, we
recognize that the CMP message is part of a specific protocol outlined in this
document. It is important to clarify that CMP is not just message syntax. Like
many protocols, it includes elements of procedure as well.

We suggest that your protocol be divided into two components: one component is
responsible for the registration/de-registration and the other component is
responsible for the management of the certificates.  If you are using CMP, the
latter must be articulated by using RFC9483.