<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-lamps-rfc7030est-clarify-10" indexInclude="true" ipr="trust200902" number="8951" prepTime="2020-11-19T15:00:12" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" updates="7030" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc7030est-clarify-10" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8951" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Clarification of EST">Clarification of Enrollment over Secure Transport (EST): Transfer Encodings and ASN.1</title>
    <seriesInfo name="RFC" value="8951" stream="IETF"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization showOnFrontPage="true">Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization showOnFrontPage="true">Siemens</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization showOnFrontPage="true">Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <date month="11" year="2020"/>
    <area>Internet</area>
    <workgroup>LAMPS Working Group</workgroup>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document updates RFC 7030: Enrollment over Secure Transport
      to resolve some errata that were reported and that have proven to
      cause interoperability issues when RFC 7030 was extended.</t>
      <t indent="0" pn="section-abstract-2">This document deprecates the specification of
      "Content-Transfer-Encoding" headers for Enrollment over Secure Transport
      (EST) endpoints. This document
      fixes some syntactical errors in ASN.1 that were present.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8951" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-to-est-endpoint-pro">Changes to EST Endpoint Processing</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-white-space-processing">White Space Processing</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t indent="0" pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-changes-to-section-4-of-rfc">Changes to Section 4 of RFC 7030</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2.2.2">
                  <li pn="section-toc.1-1.3.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.1.1"><xref derivedContent="3.2.1" format="counter" sectionFormat="of" target="section-3.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-section-413">Section 4.1.3</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.2.1"><xref derivedContent="3.2.2" format="counter" sectionFormat="of" target="section-3.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-section-431">Section 4.3.1</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.3.1"><xref derivedContent="3.2.3" format="counter" sectionFormat="of" target="section-3.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-section-432">Section 4.3.2</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.4">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.4.1"><xref derivedContent="3.2.4" format="counter" sectionFormat="of" target="section-3.2.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-section-442">Section 4.4.2</xref></t>
                  </li>
                  <li pn="section-toc.1-1.3.2.2.2.5">
                    <t indent="0" pn="section-toc.1-1.3.2.2.2.5.1"><xref derivedContent="3.2.5" format="counter" sectionFormat="of" target="section-3.2.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-section-452">Section 4.5.2</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-clarification-of-asn1-for-c">Clarification of ASN.1 for Certificate Attribute Set</xref></t>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-clarification-of-error-mess">Clarification of Error Messages for Certificate Enrollment Operations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-updating-section-423-simple">Updating Section 4.2.3: Simple Enroll and Re-enroll Response</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-updating-section-442-server">Updating Section 4.4.2: Server-Side Key Generation Response</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-asn1-module">ASN.1 Module</xref></t>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">Enrollment over Secure Transport (EST) is defined in <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/>. The EST specification defines a
      number of HTTP endpoints for certificate enrollment and management. The
      details of the transaction were defined in terms of MIME headers, as
      defined in <xref target="RFC2045" format="default" sectionFormat="of" derivedContent="RFC2045"/>, rather than in
      terms of the HTTP protocol, as defined in <xref target="RFC7230" format="default" sectionFormat="of" derivedContent="RFC7230"/> and <xref target="RFC7231" format="default" sectionFormat="of" derivedContent="RFC7231"/>.</t>
      <t indent="0" pn="section-1-2"><xref target="RFC2616" format="default" sectionFormat="of" derivedContent="RFC2616"/> and later <xref target="RFC7231" sectionFormat="of" section="A.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7231#appendix-A.5" derivedContent="RFC7231"/> have text
      specifically deprecating Content-Transfer-Encoding. However, <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/> incorrectly uses this header.</t>
      <t indent="0" pn="section-1-3">Any updates to <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/> to bring it
      in line with HTTP processing risk changing the on-wire protocol in a way
      that is not backwards compatible. However, reports from implementers
      suggest that many implementations do not send the
      Content-Transfer-Encoding, and many of them ignore it. The consequence
      is that simply deprecating the header would remain compatible with
      current implementations.</t>
      <t indent="0" pn="section-1-4"><xref target="I-D.ietf-anima-bootstrapping-keyinfra" format="default" sectionFormat="of" derivedContent="BRSKI"/> extends <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/>,
      adding new functionality. Interop testing of the protocol has
      revealed that unusual processing called out in <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/> causes confusion.</t>
      <t indent="0" pn="section-1-5">EST is currently specified as part of <xref target="IEC62351" format="default" sectionFormat="of" derivedContent="IEC62351"/> and is widely used in government, utilities, and
      financial markets today.</t>
      <t indent="0" pn="section-1-6">This document, therefore, revises <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/> to reflect the field reality, deprecating the
      extraneous field.</t>
      <t indent="0" pn="section-1-7">This document deals with errata numbers <xref target="errata4384" format="default" sectionFormat="of" derivedContent="errata4384"/>, <xref target="errata5107" format="default" sectionFormat="of" derivedContent="errata5107"/>, <xref target="errata5108" format="default" sectionFormat="of" derivedContent="errata5108"/>, and <xref target="errata5904" format="default" sectionFormat="of" derivedContent="errata5904"/>.</t>
      <t indent="0" pn="section-1-8">This document deals with <xref target="errata5107" format="default" sectionFormat="of" derivedContent="errata5107"/>
      and <xref target="errata5904" format="default" sectionFormat="of" derivedContent="errata5904"/> in <xref target="estendpoint" format="default" sectionFormat="of" derivedContent="Section 3"/>. <xref target="errata5108" format="default" sectionFormat="of" derivedContent="errata5108"/> is dealt with in <xref target="error" format="default" sectionFormat="of" derivedContent="Section 5"/>.  <xref target="errata4384" format="default" sectionFormat="of" derivedContent="errata4384"/> is
      closed by correcting the ASN.1 Module in <xref target="csrasn1" format="default" sectionFormat="of" derivedContent="Section 4"/>.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", 
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section anchor="estendpoint" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-changes-to-est-endpoint-pro">Changes to EST Endpoint Processing</name>
      <t indent="0" pn="section-3-1">Sections <xref target="RFC7030" sectionFormat="bare" section="4.1.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-4.1.3" derivedContent="RFC7030"/> (CA Certificates Response, /cacerts), <xref target="RFC7030" sectionFormat="bare" section="4.3.1" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-4.3.1" derivedContent="RFC7030"/> and <xref target="RFC7030" sectionFormat="bare" section="4.3.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-4.3.2" derivedContent="RFC7030"/> (Full CMC,
      /fullcmc), <xref target="RFC7030" sectionFormat="bare" section="4.4.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-4.4.2" derivedContent="RFC7030"/>
      (Server-Side Key Generation, /serverkeygen), and <xref target="RFC7030" sectionFormat="bare" section="4.5.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-4.5.2" derivedContent="RFC7030"/> (CSR Attributes, /csrattrs) of
      <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/>
      specify the use of base64 encoding with a Content-Transfer-Encoding for
      requests and responses.</t>
      <t indent="0" pn="section-3-2">This document updates <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/> to
      require the POST request and payload response of all endpoints using
      base64 encoding, as specified in  <xref target="RFC4648" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4648#section-4" derivedContent="RFC4648"/>. In both cases, the Distinguished
      Encoding Rules (DER) <xref target="X.690" format="default" sectionFormat="of" derivedContent="X.690"/> are used to
      produce the input for the base64 encoding routine. This format is to
      be used regardless of any Content-Transfer-Encoding header, and any
      value in such a header <bcp14>MUST</bcp14> be ignored.</t>
      <section anchor="whitespace-processing" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-white-space-processing">White Space Processing</name>
        <t indent="0" pn="section-3.1-1">Note that "base64" as used in the HTTP <xref target="RFC2616" format="default" sectionFormat="of" derivedContent="RFC2616"/> does not permit CRLF, while the "base64" used in
	MIME <xref target="RFC2045" format="default" sectionFormat="of" derivedContent="RFC2045"/> does. This
	specification clarifies that despite what <xref target="RFC2616" format="default" sectionFormat="of" derivedContent="RFC2616"/> says, white space including CR, LF, spaces (ASCII
	32), and tabs (ASCII 9) <bcp14>SHOULD</bcp14> be tolerated by
	receivers. Senders are not required to insert any kind of white space.</t>
      </section>
      <section anchor="changes-sections-4-of-rfc7030" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-changes-to-section-4-of-rfc">Changes to Section 4 of RFC 7030</name>
        <section anchor="sect-413" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.1">
          <name slugifiedName="name-section-413">Section 4.1.3</name>
          <t indent="0" pn="section-3.2.1-1">Replace:</t>
          <blockquote pn="section-3.2.1-2">
A successful response <bcp14>MUST</bcp14> be a certs-only CMC Simple PKI Response,
as defined in <xref target="RFC5272" format="default" sectionFormat="of" derivedContent="RFC5272"/>, containing the certificates described in the
following paragraph.  The HTTP content-type of
"application/pkcs7-mime" is used.  The Simple PKI Response is sent
with a Content-Transfer-Encoding of "base64" <xref target="RFC2045" format="default" sectionFormat="of" derivedContent="RFC2045"/>. 
</blockquote>
          <t indent="0" pn="section-3.2.1-3">with:</t>
          <blockquote pn="section-3.2.1-4">
A successful response <bcp14>MUST</bcp14> be a certs-only CMC Simple PKI Response,
as defined in <xref target="RFC5272" format="default" sectionFormat="of" derivedContent="RFC5272"/>, containing the certificates described in the
following paragraph.  The HTTP content-type of
"application/pkcs7-mime" is used.  The CMC Simple PKI Response is
encoded in base64 <xref target="RFC4648" format="default" sectionFormat="of" derivedContent="RFC4648"/>.
</blockquote>
        </section>
        <section anchor="sect-431" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.2">
          <name slugifiedName="name-section-431">Section 4.3.1</name>
          <t indent="0" pn="section-3.2.2-1">Replace:</t>
          <blockquote pn="section-3.2.2-2">
If the HTTP POST to /fullcmc is not a valid Full PKI Request, the
server <bcp14>MUST</bcp14> reject the message.  The HTTP content-type used is
"application/pkcs7-mime" with an smime-type parameter "CMC-request",
as specified in <xref target="RFC5273" format="default" sectionFormat="of" derivedContent="RFC5273"/>.  The body of the message is the binary
value of the encoding of the PKI Request with a
Content-Transfer-Encoding of "base64" <xref target="RFC2045" format="default" sectionFormat="of" derivedContent="RFC2045"/>.
</blockquote>
          <t indent="0" pn="section-3.2.2-3">with:</t>
          <blockquote pn="section-3.2.2-4">
If the HTTP POST to /fullcmc is not a valid Full PKI Request, the
server <bcp14>MUST</bcp14> reject the message.  The HTTP content-type used is
"application/pkcs7-mime" with an smime-type parameter "CMC-request",
as specified in <xref target="RFC5273" format="default" sectionFormat="of" derivedContent="RFC5273"/>.  The body of the message is encoded
in base64 <xref target="RFC4648" format="default" sectionFormat="of" derivedContent="RFC4648"/>.
</blockquote>
        </section>
        <section anchor="sect-432" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.3">
          <name slugifiedName="name-section-432">Section 4.3.2</name>
          <t indent="0" pn="section-3.2.3-1">Replace:</t>
          <blockquote pn="section-3.2.3-2">
The body of the message is the binary value of the encoding of the
PKI Response with a Content-Transfer-Encoding of "base64" <xref target="RFC2045" format="default" sectionFormat="of" derivedContent="RFC2045"/>.
</blockquote>
          <t indent="0" pn="section-3.2.3-3">with:</t>
          <blockquote pn="section-3.2.3-4">
The body of the message is the base64 <xref target="RFC4648" format="default" sectionFormat="of" derivedContent="RFC4648"/> encoding of the
PKI Response.
</blockquote>
        </section>
        <section anchor="sect-442" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.4">
          <name slugifiedName="name-section-442">Section 4.4.2</name>
          <t indent="0" pn="section-3.2.4-1">Replace:</t>
          <blockquote pn="section-3.2.4-2">
An "application/pkcs8"
part consists of the base64-encoded DER-encoded <xref target="X.690" format="default" sectionFormat="of" derivedContent="X.690"/>
PrivateKeyInfo with a Content-Transfer-Encoding of "base64"
<xref target="RFC2045" format="default" sectionFormat="of" derivedContent="RFC2045"/>.
</blockquote>
          <t indent="0" pn="section-3.2.4-3">with:</t>
          <blockquote pn="section-3.2.4-4">
An "application/pkcs8" part consists of the base64-encoded,
DER-encoded <xref target="X.690" format="default" sectionFormat="of" derivedContent="X.690"/> PrivateKeyInfo.
</blockquote>
          <t indent="0" pn="section-3.2.4-5">Replace:</t>
          <blockquote pn="section-3.2.4-6">
In all three additional encryption cases, the EnvelopedData is
returned in the response as an "application/pkcs7-mime" part with an
smime-type parameter of "server-generated-key" and a Content-
Transfer-Encoding of "base64".
</blockquote>
          <t indent="0" pn="section-3.2.4-7">with:</t>
          <blockquote pn="section-3.2.4-8">
In all three additional encryption cases, the EnvelopedData is
returned in the response as an "application/pkcs7-mime" part
with an smime-type parameter of "server-generated-key". It is
base64 encoded <xref target="RFC4648" format="default" sectionFormat="of" derivedContent="RFC4648"/>.
</blockquote>
        </section>
        <section anchor="sect-452" numbered="true" toc="include" removeInRFC="false" pn="section-3.2.5">
          <name slugifiedName="name-section-452">Section 4.5.2</name>
          <t indent="0" pn="section-3.2.5-1">This section is updated in its entirety in <xref target="csrasn1" format="default" sectionFormat="of" derivedContent="Section 4"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="csrasn1" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-clarification-of-asn1-for-c">Clarification of ASN.1 for Certificate Attribute Set</name>
      <t indent="0" pn="section-4-1"><xref target="RFC7030" sectionFormat="of" section="4.5.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-4.5.2" derivedContent="RFC7030"/> is to be
      replaced with the following text:</t>
      <blockquote pn="section-4-2">
        <t indent="0" pn="section-4-2.1">4.5.2 CSR Attributes Response</t>
        <t indent="0" pn="section-4-2.2">If locally configured policy for an authenticated EST client indicates
a CSR Attributes Response is to be provided, the server response <bcp14>MUST</bcp14>
include an HTTP 200 response code.  An HTTP response code of 204 or 404
indicates that a CSR Attributes Response is not available.  Regardless
of the response code, the EST server and CA <bcp14>MAY</bcp14> reject any subsequent
enrollment requests for any reason, e.g., incomplete CSR attributes in
the request.</t>
        <t indent="0" pn="section-4-2.3">Responses to attribute request messages <bcp14>MUST</bcp14> be encoded as the
content-type of "application/csrattrs" and are to be "base64" <xref target="RFC4648" format="default" sectionFormat="of" derivedContent="RFC4648"/>
encoded.  The syntax for application/csrattrs body is as follows:</t>
        <sourcecode type="asn.1" markers="false" pn="section-4-2.4">
CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID

AttrOrOID ::= CHOICE {
  oid        OBJECT IDENTIFIER,
  attribute  Attribute {{AttrSet}} }

AttrSet ATTRIBUTE ::= { ... }
</sourcecode>
        <t indent="0" pn="section-4-2.5">An EST server includes zero or more OIDs or attributes <xref target="RFC2986" format="default" sectionFormat="of" derivedContent="RFC2986"/> that it requests the client to use
      in the certification request.  The client <bcp14>MUST</bcp14> ignore any
      OID or attribute it does not recognize.  When the server encodes CSR
      attributes as an empty SEQUENCE, it means that the server has no
      specific additional information it desires in a client certification
      request (this is functionally equivalent to an HTTP response code of 204
      or 404).</t>
        <t indent="0" pn="section-4-2.6">If the CA requires a particular cryptographic algorithm or use of a particular
signature scheme (e.g., certification of a public key based on a
certain elliptic curve or signing using a certain hash algorithm), it
<bcp14>MUST</bcp14> provide that information in the CSR Attribute Response.  If an
EST server requires the linking of identity and POP information (see
Section 3.5), it <bcp14>MUST</bcp14> include the challengePassword OID in the CSR
Attributes Response.</t>
        <t indent="0" pn="section-4-2.7">The structure of the CSR Attributes Response <bcp14>SHOULD</bcp14>, to the greatest
extent possible, reflect the structure of the CSR it is requesting.
Requests to use a particular signature scheme (e.g., using a
particular hash function) are represented as an OID to be reflected
in the SignatureAlgorithm of the CSR.  Requests to use a particular
cryptographic algorithm (e.g., certification of a public key based on a certain
elliptic curve) are represented as an attribute, to be reflected as
the AlgorithmIdentifier of the SubjectPublicKeyInfo, with a type
indicating the algorithm and the values indicating the particular
parameters specific to the algorithm.  Requests for descriptive
information from the client are made by an attribute, to be
represented as Attributes of the CSR, with a type indicating the
<xref target="RFC2985" format="default" sectionFormat="of" derivedContent="RFC2985"/> extensionRequest and the values indicating the particular
attributes desired to be included in the resulting certificate's
extensions.</t>
        <t indent="0" pn="section-4-2.8">The sequence is Distinguished Encoding Rules (DER) encoded <xref target="X.690" format="default" sectionFormat="of" derivedContent="X.690"/> and then base64 encoded (<xref target="RFC4648" sectionFormat="of" section="4" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4648#section-4" derivedContent="RFC4648"/>).  The resulting text
      forms the application/csrattr body, without headers.</t>
        <t indent="0" pn="section-4-2.9">For example, if a CA requests that a client a) submit a certification 
   request containing the challengePassword (indicating that linking of
   identity and POP information is requested; see Section <xref target="RFC7030" section="3.5" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc7030#section-3.5" derivedContent="RFC7030"/>), b) submit an 
   extensionRequest with the Media Access Control (MAC) address
   <xref target="RFC2307" format="default" sectionFormat="of" derivedContent="RFC2307"/> of the client, and c) use the secp384r1 elliptic curve
   to sign using the SHA384 hash function, then it takes the
   following: </t>
        <artwork align="left" pn="section-4-2.10">
      OID:        challengePassword (1.2.840.113549.1.9.7)

      Attribute:  type = extensionRequest (1.2.840.113549.1.9.14)
                  value = macAddress (1.3.6.1.1.1.1.22)

      Attribute:  type = id-ecPublicKey (1.2.840.10045.2.1)
                  value = secp384r1 (1.3.132.0.34)

      OID:        ecdsaWithSHA384 (1.2.840.10045.4.3.3)
      </artwork>
        <t indent="0" pn="section-4-2.11">and encodes them into an ASN.1 SEQUENCE to produce:</t>
        <artwork align="left" pn="section-4-2.12">
 30 41 06 09 2a 86 48 86 f7 0d 01 09 07 30 12 06 07 2a 86 48 ce 3d
 02 01 31 07 06 05 2b 81 04 00 22 30 16 06 09 2a 86 48 86 f7 0d 01
 09 0e 31 09 06 07 2b 06 01 01 01 01 16 06 08 2a 86 48 ce 3d 04 03
 03
      </artwork>
        <t indent="0" pn="section-4-2.13">and then base64 encodes the resulting ASN.1 SEQUENCE to produce:</t>
        <artwork align="left" pn="section-4-2.14">
 MEEGCSqGSIb3DQEJBzASBgcqhkjOPQIBMQcGBSuBBAAiMBYGCSqGSIb3DQEJDjEJ
 BgcrBgEBAQEWBggqhkjOPQQDAw==
      </artwork>
      </blockquote>
    </section>
    <section anchor="error" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-clarification-of-error-mess">Clarification of Error Messages for Certificate Enrollment Operations</name>
      <t indent="0" pn="section-5-1"><xref target="errata5108" format="default" sectionFormat="of" derivedContent="errata5108"/> clarifies what format
      the error messages are to be in. Previously, a client might be confused
      into believing that an error returned with type text/plain was not
      intended to be an error.</t>
      <section anchor="updating-section-423-simple-enroll-and-re-enroll-response" numbered="true" toc="include" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-updating-section-423-simple">Updating Section 4.2.3: Simple Enroll and Re-enroll Response</name>
        <t indent="0" pn="section-5.1-1">Replace:</t>
        <blockquote pn="section-5.1-2">
    If the content-type is not set, the response data <bcp14>MUST</bcp14> be a
    plaintext human-readable error message containing explanatory
    information describing why the request was rejected (for
    example, indicating that CSR attributes are incomplete).
</blockquote>
        <t indent="0" pn="section-5.1-3">with:</t>
        <blockquote pn="section-5.1-4">
    If the content-type is not set, the response data <bcp14>MUST</bcp14> be a
    plaintext human-readable error message containing explanatory
    information describing why the request was rejected (for
    example, indicating that CSR attributes are incomplete).
    Servers <bcp14>MAY</bcp14> use the "text/plain" content-type <xref target="RFC2046" format="default" sectionFormat="of" derivedContent="RFC2046"/>
    for human-readable errors.
</blockquote>
      </section>
      <section anchor="updating-section-442-server-side-key-generation-response" numbered="true" toc="include" removeInRFC="false" pn="section-5.2">
        <name slugifiedName="name-updating-section-442-server">Updating Section 4.4.2: Server-Side Key Generation Response</name>
        <t indent="0" pn="section-5.2-1">Replace:</t>
        <blockquote pn="section-5.2-2">
    If the content-type is not set, the response data <bcp14>MUST</bcp14> be a
    plaintext human-readable error message.
</blockquote>
        <t indent="0" pn="section-5.2-3">with:</t>
        <blockquote pn="section-5.2-4">
    If the content-type is not set, the response data <bcp14>MUST</bcp14> be a
    plaintext human-readable error message.
    Servers <bcp14>MAY</bcp14> use the "text/plain" content-type <xref target="RFC2046" format="default" sectionFormat="of" derivedContent="RFC2046"/>
    for human-readable errors.
</blockquote>
      </section>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
      <t indent="0" pn="section-6-1">This document does not disclose any additional identities that either
      an active or passive observer would see with <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/>.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-7-1">This document clarifies an existing security mechanism.
It does not create any new protocol mechanisms.</t>
      <t indent="0" pn="section-7-2">All security considerations from <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/> also apply to the clarifications described in this document.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-8">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-8-1">The ASN.1 module in <xref target="asn1-module" format="default" sectionFormat="of" derivedContent="Appendix A"/> of
      this document makes use of object identifiers (OIDs).</t>
      <t indent="0" pn="section-8-2">IANA has registered an OID for id-mod-est-2019 (1.3.6.1.5.5.7.0.98)
      in the "SMI Security for PKIX Module Identifier" registry for the ASN.1 module.</t>
      <t indent="0" pn="section-8-3">The OID for the Asymmetric Decryption Key Identifier (1.2.840.113549.1.9.16.2.54)
      was previously defined in <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/>.
      IANA has updated the Reference column for the Asymmetric
      Decryption Key Identifier attribute to also include a reference to this document.</t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-anima-bootstrapping-keyinfra" to="BRSKI"/>
    <references pn="section-9">
      <name slugifiedName="name-references">References</name>
      <references pn="section-9.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="errata4384" target="https://www.rfc-editor.org/errata/eid4384" quoteTitle="false" derivedAnchor="errata4384">
          <front>
            <title>Erratum ID 4384</title>
            <author>
              <organization showOnFrontPage="true">RFC Errata</organization>
            </author>
          </front>
          <refcontent>RFC 7030</refcontent>
        </reference>
        <reference anchor="errata5107" target="https://www.rfc-editor.org/errata/eid5107" quoteTitle="false" derivedAnchor="errata5107">
          <front>
            <title>Erratum ID 5107</title>
            <author>
              <organization showOnFrontPage="true">RFC Errata</organization>
            </author>
          </front>
          <refcontent>RFC 7030</refcontent>
        </reference>
        <reference anchor="errata5108" target="https://www.rfc-editor.org/errata/eid5108" quoteTitle="false" derivedAnchor="errata5108">
          <front>
            <title>Erratum ID 5108</title>
            <author>
              <organization showOnFrontPage="true">RFC Errata</organization>
            </author>
          </front>
          <refcontent>RFC 7030</refcontent>
        </reference>
        <reference anchor="errata5904" target="https://www.rfc-editor.org/errata/eid5904" quoteTitle="false" derivedAnchor="errata5904">
          <front>
            <title>Erratum ID 5904</title>
            <author>
              <organization showOnFrontPage="true">RFC Errata</organization>
            </author>
          </front>
          <refcontent>RFC 7030</refcontent>
        </reference>
        <reference anchor="IEC62351" quoteTitle="true" derivedAnchor="IEC62351">
          <front>
            <title>Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment</title>
            <seriesInfo name="ISO/IEC" value="62351-9:2017"/>
            <author>
              <organization showOnFrontPage="true">International Electrotechnical Commission</organization>
            </author>
            <date month="May" year="2017"/>
          </front>
        </reference>
        <reference anchor="RFC2045" target="https://www.rfc-editor.org/info/rfc2045" quoteTitle="true" derivedAnchor="RFC2045">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
            <author initials="N." surname="Freed" fullname="N. Freed">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Borenstein" fullname="N. Borenstein">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1996" month="November"/>
            <abstract>
              <t indent="0">This initial document specifies the various headers used to describe the structure of MIME messages.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2045"/>
          <seriesInfo name="DOI" value="10.17487/RFC2045"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046" quoteTitle="true" derivedAnchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author initials="N." surname="Freed" fullname="N. Freed">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="N." surname="Borenstein" fullname="N. Borenstein">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1996" month="November"/>
            <abstract>
              <t indent="0">This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC2986" target="https://www.rfc-editor.org/info/rfc2986" quoteTitle="true" derivedAnchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author initials="M." surname="Nystrom" fullname="M. Nystrom">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Kaliski" fullname="B. Kaliski">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2000" month="November"/>
            <abstract>
              <t indent="0">This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4648" target="https://www.rfc-editor.org/info/rfc4648" quoteTitle="true" derivedAnchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author initials="S." surname="Josefsson" fullname="S. Josefsson">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="October"/>
            <abstract>
              <t indent="0">This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5272" target="https://www.rfc-editor.org/info/rfc5272" quoteTitle="true" derivedAnchor="RFC5272">
          <front>
            <title>Certificate Management over CMS (CMC)</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Myers" fullname="M. Myers">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="June"/>
            <abstract>
              <t indent="0">This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
              <t indent="0">1.  The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
              <t indent="0">2.  The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
              <t indent="0">CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5272"/>
          <seriesInfo name="DOI" value="10.17487/RFC5272"/>
        </reference>
        <reference anchor="RFC5273" target="https://www.rfc-editor.org/info/rfc5273" quoteTitle="true" derivedAnchor="RFC5273">
          <front>
            <title>Certificate Management over CMS (CMC): Transport Protocols</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Myers" fullname="M. Myers">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="June"/>
            <abstract>
              <t indent="0">This document defines a number of transport mechanisms that are used to move CMC (Certificate Management over CMS (Cryptographic Message Syntax)) messages.  The transport mechanisms described in this document are HTTP, file, mail, and TCP.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5273"/>
          <seriesInfo name="DOI" value="10.17487/RFC5273"/>
        </reference>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912" quoteTitle="true" derivedAnchor="RFC5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t indent="0">The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268" quoteTitle="true" derivedAnchor="RFC6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author initials="J." surname="Schaad" fullname="J. Schaad">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="July"/>
            <abstract>
              <t indent="0">The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" quoteTitle="true" derivedAnchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Yee" fullname="P. Yee" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="D." surname="Harkins" fullname="D. Harkins" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t indent="0">This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680-201508-I/en" quoteTitle="true" derivedAnchor="X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <seriesInfo name="ITU-T Recommendation X.680," value="ISO/IEC 8824-1:2015"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="August" year="2015"/>
          </front>
        </reference>
        <reference anchor="X.681" target="https://www.itu.int/rec/T-REC-X.681" quoteTitle="true" derivedAnchor="X.681">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Information object specification</title>
            <seriesInfo name="ITU-T Recommendation X.681," value="ISO/IEC 8824-2:2015"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="August" year="2015"/>
          </front>
        </reference>
        <reference anchor="X.682" target="https://www.itu.int/rec/T-REC-X.682" quoteTitle="true" derivedAnchor="X.682">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Constraint specification</title>
            <seriesInfo name="ITU-T Recommendation X.682," value="ISO/IEC 8824-3:2015"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="August" year="2015"/>
          </front>
        </reference>
        <reference anchor="X.683" target="https://www.itu.int/rec/T-REC-X.683" quoteTitle="true" derivedAnchor="X.683">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications</title>
            <seriesInfo name="ITU-T Recommendation X.683," value="ISO/IEC 8824-4:2015"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="August" year="2015"/>
          </front>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690" quoteTitle="true" derivedAnchor="X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1:2015"/>
            <author>
              <organization showOnFrontPage="true">ITU-T</organization>
            </author>
            <date month="August" year="2015"/>
          </front>
        </reference>
      </references>
      <references pn="section-9.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="I-D.ietf-anima-bootstrapping-keyinfra" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-anima-bootstrapping-keyinfra-45" derivedAnchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</title>
            <author fullname="Max Pritikin">
              <organization showOnFrontPage="true">Cisco</organization>
            </author>
            <author fullname="Michael C. Richardson">
              <organization showOnFrontPage="true">Sandelman Software Works</organization>
            </author>
            <author fullname="Toerless Eckert">
              <organization showOnFrontPage="true">Futurewei Technologies Inc.  USA</organization>
            </author>
            <author fullname="Michael H. Behringer">
	 </author>
            <author fullname="Kent Watsen">
              <organization showOnFrontPage="true">Watsen Networks</organization>
            </author>
            <date month="November" day="11" year="2020"/>
            <abstract>
              <t indent="0">   This document specifies automated bootstrapping of an Autonomic
   Control Plane.  To do this a Secure Key Infrastructure is
   bootstrapped.  This is done using manufacturer-installed X.509
   certificates, in combination with a manufacturer's authorizing
   service, both online and offline.  We call this process the
   Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol.
   Bootstrapping a new device can occur using a routable address and a
   cloud service, or using only link-local connectivity, or on limited/
   disconnected networks.  Support for deployment models with less
   stringent security requirements is included.  Bootstrapping is
   complete when the cryptographic identity of the new key
   infrastructure is successfully deployed to the device.  The
   established secure connection can be used to deploy a locally issued
   certificate to the device as well.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-bootstrapping-keyinfra-45"/>
          <format type="TXT" target="https://www.ietf.org/internet-drafts/draft-ietf-anima-bootstrapping-keyinfra-45.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="RFC2307" target="https://www.rfc-editor.org/info/rfc2307" quoteTitle="true" derivedAnchor="RFC2307">
          <front>
            <title>An Approach for Using LDAP as a Network Information Service</title>
            <author initials="L." surname="Howard" fullname="L. Howard">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1998" month="March"/>
            <abstract>
              <t indent="0">This document describes an experimental mechanism for mapping entities related to TCP/IP and the UNIX system into X.500 entries so that they may be resolved with the Lightweight Directory Access Protocol [RFC2251].  This memo defines an Experimental Protocol for the Internet community.  It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2307"/>
          <seriesInfo name="DOI" value="10.17487/RFC2307"/>
        </reference>
        <reference anchor="RFC2616" target="https://www.rfc-editor.org/info/rfc2616" quoteTitle="true" derivedAnchor="RFC2616">
          <front>
            <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
            <author initials="R." surname="Fielding" fullname="R. Fielding">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Gettys" fullname="J. Gettys">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Mogul" fullname="J. Mogul">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Frystyk" fullname="H. Frystyk">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Masinter" fullname="L. Masinter">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="P." surname="Leach" fullname="P. Leach">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Berners-Lee" fullname="T. Berners-Lee">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1999" month="June"/>
            <abstract>
              <t indent="0">HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1", and is an update to RFC 2068.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2616"/>
          <seriesInfo name="DOI" value="10.17487/RFC2616"/>
        </reference>
        <reference anchor="RFC2985" target="https://www.rfc-editor.org/info/rfc2985" quoteTitle="true" derivedAnchor="RFC2985">
          <front>
            <title>PKCS #9: Selected Object Classes and Attribute Types Version 2.0</title>
            <author initials="M." surname="Nystrom" fullname="M. Nystrom">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Kaliski" fullname="B. Kaliski">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2000" month="November"/>
            <abstract>
              <t indent="0">This memo represents a republication of PKCS #9 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process.  The body of this document, except for the security considerations section, is taken directly from that specification.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2985"/>
          <seriesInfo name="DOI" value="10.17487/RFC2985"/>
        </reference>
        <reference anchor="RFC7230" target="https://www.rfc-editor.org/info/rfc7230" quoteTitle="true" derivedAnchor="RFC7230">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing</title>
            <author initials="R." surname="Fielding" fullname="R. Fielding" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Reschke" fullname="J. Reschke" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t indent="0">The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems.  This document provides an overview of HTTP architecture and its associated terminology, defines the "http" and "https" Uniform Resource Identifier (URI) schemes, defines the HTTP/1.1 message syntax and parsing requirements, and describes related security concerns for implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7230"/>
          <seriesInfo name="DOI" value="10.17487/RFC7230"/>
        </reference>
        <reference anchor="RFC7231" target="https://www.rfc-editor.org/info/rfc7231" quoteTitle="true" derivedAnchor="RFC7231">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
            <author initials="R." surname="Fielding" fullname="R. Fielding" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Reschke" fullname="J. Reschke" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t indent="0">The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems.  This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7231"/>
          <seriesInfo name="DOI" value="10.17487/RFC7231"/>
        </reference>
      </references>
    </references>
    <section anchor="asn1-module" numbered="true" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-asn1-module">ASN.1 Module</name>
      <t indent="0" pn="section-appendix.a-1">This annex provides the normative ASN.1 definitions for the
      structures described in this specification using ASN.1 as defined in
      <xref target="X.680" format="default" sectionFormat="of" derivedContent="X.680"/>, <xref target="X.681" format="default" sectionFormat="of" derivedContent="X.681"/>, <xref target="X.682" format="default" sectionFormat="of" derivedContent="X.682"/>, and <xref target="X.683" format="default" sectionFormat="of" derivedContent="X.683"/>.</t>
      <t indent="0" pn="section-appendix.a-2">The ASN.1 modules makes imports from the ASN.1 modules in <xref target="RFC5912" format="default" sectionFormat="of" derivedContent="RFC5912"/> and <xref target="RFC6268" format="default" sectionFormat="of" derivedContent="RFC6268"/>.</t>
      <t indent="0" pn="section-appendix.a-3">There is no ASN.1 Module in <xref target="RFC7030" format="default" sectionFormat="of" derivedContent="RFC7030"/>.  This module has been created by combining the lines
      that are contained in the document body.</t>
      <sourcecode type="asn.1" markers="false" pn="section-appendix.a-4">
PKIXEST-2019
     { iso(1) identified-organization(3) dod(6)
       internet(1) security(5) mechanisms(5) pkix(7)
       id-mod(0) id-mod-est-2019(98) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- EXPORTS ALL --

IMPORTS

Attribute
FROM CryptographicMessageSyntax-2010  -- [RFC6268]
      { iso(1) member-body(2) us(840) rsadsi(113549)
        pkcs(1) pkcs-9(9) smime(16) modules(0)
         id-mod-cms-2009(58) }

ATTRIBUTE
FROM PKIX-CommonTypes-2009 -- [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;


-- CSR Attributes

CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID

AttrOrOID ::= CHOICE {
   oid        OBJECT IDENTIFIER,
   attribute  Attribute {{AttrSet}} }

AttrSet ATTRIBUTE ::= { ... }


-- Asymmetric Decrypt Key Identifier Attribute

aa-asymmDecryptKeyID ATTRIBUTE ::=
    { TYPE AsymmetricDecryptKeyIdentifier
      IDENTIFIED BY id-aa-asymmDecryptKeyID }

id-aa-asymmDecryptKeyID OBJECT IDENTIFIER ::= { iso(1)
    member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
    smime(16) aa(2) 54 }

AsymmetricDecryptKeyIdentifier ::= OCTET STRING

END
</sourcecode>
    </section>
    <section anchor="acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.b">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.b-1">Huawei Technologies supported the efforts of <contact fullname="Wei Pan"/> and <contact fullname="Michael Richardson"/>.</t>
      <t indent="0" pn="section-appendix.b-2">The ASN.1 Module was assembled by <contact fullname="Russ Housley"/>
      and formatted by <contact fullname="Sean Turner"/>. <contact fullname="Russ Housley"/> provided editorial review.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author initials="M." surname="Richardson" fullname="Michael Richardson">
        <organization showOnFrontPage="true">Sandelman Software Works</organization>
        <address>
          <email>mcr+ietf@sandelman.ca</email>
        </address>
      </author>
      <author initials="T." surname="Werner" fullname="Thomas Werner">
        <organization showOnFrontPage="true">Siemens</organization>
        <address>
          <email>thomas-werner@siemens.com</email>
        </address>
      </author>
      <author initials="W." surname="Pan" fullname="Wei Pan">
        <organization showOnFrontPage="true">Huawei Technologies</organization>
        <address>
          <email>william.panwei@huawei.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
