Authors,

While reviewing this document during AUTH48, please resolve (as necessary) 
the following questions, which are also in the XML file.

1) <!-- [rfced] To keep the abstract succinct, we suggest
moving some of its content to the Introduction.  Perhaps the third paragraph 
could be worked into the Introduction? 

As noted in 
Section 4.3 of RFC 7322:
  Every RFC must have an Abstract that provides a concise and
  comprehensive overview of the purpose and contents of the entire
  document, to give a technically knowledgeable reader a general
  overview of the function of the document....
  A satisfactory Abstract can often be
  constructed in part from material within the Introduction section,
  but an effective Abstract may be shorter, less detailed, and perhaps
  broader in scope than the Introduction.  

Please review and let us know how/if the text may be updated.
-->


2) <!--[rfced] It is unclear to us how "that has a signature algorithm..." 
fits into the sentence below. Please review and let us know it may be 
updated for clarity.

Original:
   *  Offer an optional hashAlg field in CertStatus supporting cases
      that a certificate needs to be confirmed that has a signature
      algorithm that does not indicate a specific hash algorithm to use
      for computing the certHash.


Perhaps:
   *  Offer an optional hashAlg field in CertStatus supporting cases 
      where a certificate that has a signature algorithm but doesn't 
      specify a hash algorithm to compute the certHash needs to be 
      confirmed.
-->


3) <!-- [rfced] FYI, we have updated the citations in the sentence below
as follows. [RFC9480] does not have an Appendix C.2, but it does have
an Appendix A.2. Please review and confirm that these updates retain
the intended meaning. 

Original:
   This document obsoletes [RFC4210] and [RFC9480].  It includes the
   changes specified by Section 2 and Appendix C.2 of [RFC9480] as
   described in Section 1.2.  

Current:
   This document obsoletes [RFC4210] and [RFC9480].  It includes the
   changes specified by Section 2 and Appendix A.2 of [RFC9480] as
   described in Section 1.2. 
-->


4) <!-- [rfced] For clarity, we recommend adding citations for ISO/IEC 
9594-8/ITU-T X.509".  May we add a citation to the existing reference to 
[X509.2019]? 

Original: 
   1.   PKI management must conform to the ISO/IEC 9594-8/ITU-T X.509
        standards.
-->


5) <!--[rfced] It is unclear what "off-line file-based" refers to in the
sentence below. Does it refer to "transport mechanisms"?

Original:
   PKI management protocols must be usable over a variety of
   "transport" mechanisms, specifically including mail, Hypertext
   Transfer Protocol (HTTP), Message Queuing Telemetry Transport
   (MQTT), Constrained Application Protocol (CoAP), and off-line
   file-based.

Perhaps:
   PKI management protocols must be usable over a variety of
   "transport" mechanisms, specifically including mail, Hypertext
   Transfer Protocol (HTTP), Message Queuing Telemetry Transport
   (MQTT), Constrained Application Protocol (CoAP), and off-line
   file-based transport mechanisms.
-->


6) <!--[rfced] For the nested lists in Section 3.1.3, we have updated the 
numbering to letters and converted "Notes" to a hanging list to help with 
readability. Please review and let us know of any objections. 

Original:
   1.  CA establishment: When establishing a new CA, certain steps are
       required (e.g., production of initial CRLs, export of CA public
       key).
    ...
       1.  initial registration/certification: This is the process
           whereby an end entity first makes itself known to a CA or RA,
           prior to the CA issuing a certificate or certificates for
           that end entity.         
   ...
           1.  Note 1.  The above definition of "cross-certificate"
               aligns with the defined term "CA-certificate" in X.509.

Current:
   1.  CA establishment: When establishing a new CA, certain steps are
       required (e.g., production of initial CRLs, export of CA public
       key).
    ...
       a.  initial registration/certification: This is the process
           whereby an end entity first makes itself known to a CA or RA,
           prior to the CA issuing a certificate or certificates for
           that end entity.         
   ...
           Note 1.  The above definition of "cross-certificate"
             aligns with the defined term "CA-certificate" in X.509.
-->


7) <!--[rfced] May we update the phrasing of "Rail Automation adopted CMP"
to improve readability?

Original:
   Also industry standards like [ETSI-3GPP.33.310] for
   mobile networks and [UNISIG.Subset-137] for Rail Automation adopted
   CMP and have specified a set of mandatory schemes for their use case.


Perhaps:
   Also industry standards, like [ETSI-3GPP.33.310] for
   mobile networks and [UNISIG.Subset-137] for CMP that has adopted rail
   automation, have specified a set of mandatory schemes for their use cases.
-->


8) <!--[rfced] We have removed the following from the figure in Section 
4.2.2.2 because it is repetitive with the text introducing the figure.  
However, please review, as it seems like some of the blank space can also 
be removed from the SVG.  

Original:
   In terms of message flow, the basic authenticated scheme is as
   follows:
-->   


9) <!--[rfced] As "CMP" is expanded as "Certificate Management Protocol", 
may we update this text to avoid repetition?

Original:
   As the functionality of a
   CA and RA is not specific to any certificate management protocol
   (such as CMC or CMP), these EKUs are reused by CMP.

Perhaps:
   As the functionality of a
   CA and RA is not specific to any CMP (such as CMC), these EKUs are reused by 
CMP.
-->   


10) <!--[rfced] Should "PKIconf" be updated to "pkiconf", "pkiConf", or
"PKIConf" to reflect usage elsewhere in the document?

Original:
   In response to an ip, cp, kup, krp, or ccp message, an EE will
   send a certConf for all issued certificates and expect a PKIconf
   for each certConf.
-->      


11) <!--[rfced] In the sentence below, does "are typically insufficient..."
refer to "passwords" or "entropy"?

Original:
   If user-generated passwords are used as
   shared secret information, their entropy cannot be measured and are
   typically insufficient for protected delivery of centrally generated
   keys or trust anchors.

Perhaps A (refers to "passwords"):
   If user-generated passwords are used as
   shared secret information, their entropy cannot be measured and the 
   passwords are typically insufficient for protected delivery of centrally 
   generated keys or trust anchors.

Perhaps B (refers to "entropy"):
   If user-generated passwords are used as
   shared secret information, their entropy cannot be measured and is
   typically insufficient for protected delivery of centrally generated
   keys or trust anchors.
-->   


12) <!-- [rfced] We are unable to verify these registrations with Entrust.  
Please ensure the descriptions and values are correct.  In addition, please 
consider whether it is appropriate for this text to appear in the IANA 
Considerations section, as it seemingly does not provide any information 
for IANA and does not require any IANA actions.  

Original:
   The new OID 1.2.840.113533.7.66.16 was registered by Entrust for id-
   KemBasedMac in the arch 1.2.840.113533.7.66.  Entrust registered also
   the OIDs for id-PasswordBasedMac and id-DHBasedMac there.
-->


13) <!-- [rfced] Would you like the references to be alphabetized or left
in their current order?
-->


14) <!-- [rfced] Please review. We found the following URL:
https://cacr.uwaterloo.ca/hac/index.html which is provided by authors
of this handbook and includes open-access PDF files of this
reference. Would you like to add this URL to the reference?

   [MvOV97]   Menezes, A., van Oorschot, P., and S. Vanstone, "Handbook
              of Applied Cryptography", CRC Press ISBN 0-8493-8523-7,
              1996.
-->


15) <!--[rfced] The following text in Appendices C.3, D.3, and D.6 are not 
complete sentences. Please review and let us know how these may be made 
into complete sentences.

Original:
   POP fields for use (in signature field of pop field of
   ProofOfPossession structure) when proving possession of a private
   signing key that corresponds to a public verification key for which a
   certificate has been requested.
   ...
   Profile of how a certificate structure may be "self-signed".
   ...
   Creation of a single cross-certificate (i.e., not two at once).   

Perhaps:
   The table below describes the POP fields for use (in signature field of 
   pop field of ProofOfPossession structure) when proving possession of a 
   private signing key that corresponds to a public verification key for 
   which a certificate has been requested.
   ...   
   The table below is a profile of how a certificate structure may be 
   "self-signed".
   ...
   This section describes the creation of a single cross-certificate (i.e., 
   not two at once).   
-->   


16) <!--[rfced] As "OPTIONALLY" is not a key word in BCP14, may we update 
this sentence to rephrase to use the key word "OPTIONAL"?

Original:
   This transaction established the shared secret, the referenceNumber and
   OPTIONALLY the distinguished name used for both sender and subject
   name in the certificate template.

Perhaps:
   This transaction established the shared secret, the referenceNumber, and
   an OPTIONAL distinguished name used for both the sender and subject
   name in the certificate template.
-->   


17) <!--[rfced] May we update the numbered listed in Appendix C.6 to be a
bulleted list? This would reflect the bulleted list in Appendix C.5.

Appendix C.5:
   *  sender name SHOULD be present

   *  protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG MAY
      also be supported) in request, response, certConfirm, and
      PKIConfirm messages;
   ...

Appendix C.6:
   1.  sender name SHOULD be present

   2.  protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG MAY
       also be supported) in request, response, certConfirm, and
       PKIConfirm messages;
   ...       
-->         


18) <!--[rfced] As the text preceding these figures and the titles of the 
figures are very similar, may we remove the preceding text to avoid 
redundancy?

Original:
   Message Flow when the PKI entity has a KEM key pair and certificate:
   ...
   Figure 3: Message Flow when PKI entity has a KEM key pair


   Message Flow when the PKI entity knows that the PKI management entity
   uses a KEM key pair and has the authentic public key:
   ...
   Figure 4: Message Flow when the PKI entity knows that the PKI
   management entity uses a KEM key pair and has the authentic
   public key


   Message Flow when the PKI entity does not know that the PKI
   management entity uses a KEM key pair:
   ...
   Figure 5: Message Flow when the PKI entity does not know that the PKI
   management entity uses a KEM key pair   
-->     


19) <!--[rfced] We note that the following references have citations only 
in the ASN.1 module in Appendix F.  In order to have a 1:1 matchup between
the references section and the text, please review the text and let us know
where a citation for each of the following may be included.

Alternatively, a sentence can be added before the module stating that it
refers to the following (and then list the citations).

 [RFC3629]
 [RFC6268]
-->


20) <!-- [rfced] Please review each artwork element and let us know if any 
should be marked as sourcecode (or another element) instead.

We updated some artwork to sourcecode throughout the document. Please 
confirm that these are correct.

In addition, please consider whether the "type" attribute of any sourcecode
element should be set and/or has been set correctly.

The current list of preferred values for "type" is available at
<https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types>.
If the current list does not contain an applicable type, feel free to
suggest additions for consideration. Note that it is also acceptable
to leave the "type" attribute not set.
-->


21) <!-- [rfced] Please review whether any of the notes in this document
should be in the <aside> element. It is defined as "a container for 
content that is semantically less important or tangential to the 
content that surrounds it" 
(https://authors.ietf.org/en/rfcxml-vocabulary#aside).
-->


22) <!--[rfced] Acronyms

a) Both the expansion and the acronym for the following terms are used
throughout the document. Would you like to update to using the expansion 
upon first usage and the acronym for the rest of the document?

 Certification Authority (CA)
 Certificate Management Protocol (CMP)
 Certificate Transparency (CT)
 Diffie-Hellman (DH)
 Distinguished Name (DN)
 End Entity (EE)
 extended key usage (EKU)  
 Key Encapsulation Mechansim (KEM)
 Key Generation Authority (KGA)
 Local Registration Authority (LRA)
 Message Authentication Code (MAC)
 one-way function (OWF)
 Public Key Infrastructure (PKI)
 Proof-of-Possession (POP)
 Personal Security Environment (PSE) 
 protocol version number (pvno)
 Registration Authority (RA)
 Trusted Execution Environment (TEE)

b) FYI - We have added expansions for the following abbreviations
per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each
expansion in the document carefully to ensure correctness.

 Initial Device Identifier (IDevID)
 Internet Key Exchange Protocol (IKE)
 Internet of Things (IoT)
 Lightweight Directory Access Protocol (LDAP)
 Organizational Unit (OU)
-->


23) <!--[rfced] Terminology

a) May we update the following terms to the form on the right for consistency?

 certification authority > Certification Authority 
 registration authority > Registration Authority
 boot-strapping > bootstrapping
 key encapsulation mechanism > Key Encapsulation Mechanism
 off-line > offline
 on-line > online

b) We note that the following terms are used inconsistently throughout the
document. Please review and let us know if/how these terms may be made 
consistent.

 Protocol Encryption Key vs. protocl encryption key
 X.509v1 vs. X.509 v1
 X.509v3 vs. X.509 v3
 X.509v3 certificate vs. X.509v3 Certificate
 cross-cert* vs. cross cert* 
-->


24) <!-- [rfced] Please review the "Inclusive Language" portion of the 
online Style Guide 
<https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature 
typically result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.
-->


Thank you.

RFC Editor


On Jun 20, 2025, at 5:06 PM, rfc-edi...@rfc-editor.org wrote:

*****IMPORTANT*****

Updated 2025/06/20

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

   Please review and resolve any questions raised by the RFC Editor 
   that have been included in the XML file as comments marked as 
   follows:

   <!-- [rfced] ... -->

   These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

   Please ensure that you review any changes submitted by your 
   coauthors.  We assume that if you do not speak up that you 
   agree to changes submitted by your coauthors.

*  Content 

   Please review the full content of the document, as this cannot 
   change once the RFC is published.  Please pay particular attention to:
   - IANA considerations updates (if applicable)
   - contact information
   - references

*  Copyright notices and legends

   Please review the copyright notice and legends as defined in
   RFC 5378 and the Trust Legal Provisions 
   (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

   Please review the markup in the XML file to ensure that elements of  
   content are correctly tagged.  For example, ensure that <sourcecode> 
   and <artwork> are set correctly.  See details at 
   <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

   Please review the PDF, HTML, and TXT files to ensure that the 
   formatted output, as generated from the markup in the XML file, is 
   reasonable.  Please note that the TXT will have formatting 
   limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

   *  your coauthors
   
   *  rfc-edi...@rfc-editor.org (the RPC team)

   *  other document participants, depending on the stream (e.g., 
      IETF Stream participants are your working group chairs, the 
      responsible ADs, and the document shepherd).
     
   *  auth48archive@rfc-editor.org, which is a new archival mailing list 
      to preserve AUTH48 conversations; it is not an active discussion 
      list:
     
     *  More info:
        
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
     
     *  The archive itself:
        https://mailarchive.ietf.org/arch/browse/auth48archive/

     *  Note: If only absolutely necessary, you may temporarily opt out 
        of the archiving of messages (e.g., to discuss a sensitive matter).
        If needed, please add a note at the top of the message that you 
        have dropped the address. When the discussion is concluded, 
        auth48archive@rfc-editor.org will be re-added to the CC list and 
        its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
 — OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
   https://www.rfc-editor.org/authors/rfc9810.xml
   https://www.rfc-editor.org/authors/rfc9810.html
   https://www.rfc-editor.org/authors/rfc9810.pdf
   https://www.rfc-editor.org/authors/rfc9810.txt

Diff file of the text:
   https://www.rfc-editor.org/authors/rfc9810-diff.html
   https://www.rfc-editor.org/authors/rfc9810-rfcdiff.html (side by side)

Diff of the XML: 
   https://www.rfc-editor.org/authors/rfc9810-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
   https://www.rfc-editor.org/auth48/rfc9810

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC 9810 (draft-ietf-lamps-rfc4210bis-18)

Title            : Internet X.509 Public Key Infrastructure -- Certificate 
Management Protocol (CMP)
Author(s)        : H. Brockhaus, D. von Oheimb, M. Ounsworth, J. Gray
WG Chair(s)      : Russ Housley, Tim Hollebeek
Area Director(s) : Deb Cooley, Paul Wouters


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to