Hi If I understand the emails going back and forth on Friday correct, we agreed on the changes I proposed in my Email below including David's proposal on Section 5.2.1.
Hendrik >-----Ursprüngliche Nachricht----- >Von: Brockhaus, Hendrik (FT RPD CST SEA-DE) >Gesendet: Freitag, 11. Juli 2025 14:38 >An: Alanna Paloma <apal...@staff.rfc-editor.org>; John Gray ><john.g...@entrust.com>; von Oheimb, David (FT RPD CST SEA-DE) ><david.von.ohe...@siemens.com>; Mike Ounsworth ><mike.ounswo...@entrust.com> >Cc: debcool...@gmail.com; rfc-edi...@rfc-editor.org; lamps-...@ietf.org; lamps- >cha...@ietf.org; hous...@vigilsec.com; auth48archive@rfc-editor.org >Betreff: AW: [EXTERNAL] [AD] Re: AUTH48: RFC-to-be 9810 <draft-ietf-lamps- >rfc4210bis-18> for your review > >Alanna > >Thank you for providing this update. >I took a close look at the diff https://www.rfc-editor.org/authors/rfc9810- >auth48diff.html >I have the following final proposals if my coauthors agree. > >The abbreviation pvno is not introduced in Section 2 and I support that. It is >basically not an abbreviation but an ASN.1 filed name. To differentiate between >‘protocol version number’, a concrete pvno value, and the pvno field I propose >the >following changes: >Sections 5.2.2, 5.2.8.3, and 5.3.13 >OLD > Details on the usage of the pvno are described in > Section 7. >NEW > Details on the usage of the protocol version number > are described in Section 7. >Section 7 >OLD > Note: Using cmp2000 as the default pvno is done to avoid extra > message exchanges for version negotiation and to foster compatibility > with cmp2000 implementations. >NEW > Note: Using cmp2000 as the default pvno value is done to avoid extra > message exchanges for version negotiation and to foster compatibility > with cmp2000 implementations. >Section 7.1.1 >OLD > If, after sending a message with a pvno higher than cmp1999, a client > receives an ErrorMsgContent with a version of cmp1999, then it MUST > abort the current transaction. >NEW > If, after sending a message with a pvno value higher than cmp1999, a > client receives an ErrorMsgContent with a version of cmp1999, then it > MUST abort the current transaction. >Appendix C.1 >OLD > The pvno MUST be set as specified in Section 7). >NEW > The protocol version number MUST be set as specified in Section 7. > > >You changed from ‘end entity’ to ‘EE’. Below you find some remaining places >where >'end entity' could be replaced. >Section 3.1.3 >OLD > | | <--------------------- | End Entity | <------- >NEW > | | <--------------------- | EE | <-------------- >Section 4.2.2.2. >OLD > End entity RA/CA > ========== ============= >NEW > EE RA/CA > ========== ============= >Appendix C.4 >OLD > Step# End entity PKI >NEW > Step# EE PKI >Appendix D.5 >OLD > Step# End entity PKI >NEW > Step# EE PKI > > >Here are some minor fixes I would like to propose. >Section 3.1.3 >OLD > various environments (e.g., offline: file-based; online: mail, HTTP >NEW > various environments (e.g., offline: file-based; online: email, HTTP >Section 5.1.3.4, can you indent the four line by two characters. >OLD > Encapsulate(pk) -> (ct, ss) >... > Decapsulate(ct, sk) -> (ss) >... > KDF(ss, len, context)->(ssk) >... > KDF(ss, len, context)->(ssk) >NEW > Encapsulate(pk) -> (ct, ss) >... > Decapsulate(ct, sk) -> (ss) >... > KDF(ss, len, context)->(ssk) >... > KDF(ss, len, context)->(ssk) > >Section 5.2.1, I support David’s proposal. >OLD > The CertTemplate structure allows an EE or RA to > specify as many data fields as the structure wishes for the requested > certificate. The structure also allows an EE or RA to include any > other necessary data, such as the publicKey field, when it is > required for the certificate. A CertTemplate structure is identical > to a TBSCertificate structure (see [RFC5280]) but with all fields > optional/situational. [HB] Added David's final proposal. NEW The CertTemplate structure allows entities requesting a certificate to specify the data fields that they want to be included. Typically, they are required to provide at least the publicKey field. A CertTemplate structure is identical to a TBSCertificate structure (see [RFC 5280]) but with all fields optional/situational. >Section 6.6.1 >OLD > This is done by generating a symmetric key based on the > authorization code and using the symmetric key for generating > MACs) on all messages exchanged. >NEW > This is done by generating a symmetric key based on the > authorization code and using the symmetric key for generating > MACs on all messages exchanged. > > >Hendrik > >>-----Ursprüngliche Nachricht----- >>Von: Alanna Paloma <apal...@staff.rfc-editor.org> >>Gesendet: Donnerstag, 10. Juli 2025 23:16 >>An: John Gray <john.g...@entrust.com> >>Cc: debcool...@gmail.com; Brockhaus, Hendrik (FT RPD CST SEA-DE) >><hendrik.brockh...@siemens.com>; von Oheimb, David (FT RPD CST SEA-DE) >><david.von.ohe...@siemens.com>; Mike Ounsworth >><mike.ounswo...@entrust.com>; rfc-edi...@rfc-editor.org; lamps-...@ietf.org; >>lamps-cha...@ietf.org; hous...@vigilsec.com; auth48archive@rfc-editor.org >>Betreff: Re: [EXTERNAL] [AD] Re: AUTH48: RFC-to-be 9810 <draft-ietf-lamps- >>rfc4210bis-18> for your review >> >>Hi John, >> >>We have updated the files to include both expansions of “LRA”. >> >>The files have been posted here (please refresh): >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810.txt&data=05%7C02%7Chendrik.brockhaus%40s >iem >>ens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab42 >e14 >>95d55a%7C1%7C0%7C638877790756055380%7CUnknown%7CTWFpbGZsb3d8e >yJF >>bXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWF >pbC >>IsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=S2NpSsG6z0LtBwRwXs% >2F >>MwU2VXQbzQ%2Fhs438l30O8JI8%3D&reserved=0 >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810.pdf&data=05%7C02%7Chendrik.brockhaus%40 >sie >>mens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab4 >2e1 >>495d55a%7C1%7C0%7C638877790756103392%7CUnknown%7CTWFpbGZsb3d8 >eyJ >>FbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTW >Fpb >>CIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=tfXaayc%2BlOp5z%2Bn2 >AX >>LuMcn26li3IZnCDVfX0nK5PWg%3D&reserved=0 >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810.html&data=05%7C02%7Chendrik.brockhaus%4 >0sie >>mens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab4 >2e1 >>495d55a%7C1%7C0%7C638877790756133357%7CUnknown%7CTWFpbGZsb3d8 >eyJ >>FbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTW >Fpb >>CIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=bRacv5RAs9W9Cazk%2 >Bu8 >>hvM4DdsI1ZhL804s4JbpR%2B3g%3D&reserved=0 >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810.xml&data=05%7C02%7Chendrik.brockhaus%40 >sie >>mens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab4 >2e1 >>495d55a%7C1%7C0%7C638877790756155919%7CUnknown%7CTWFpbGZsb3d8 >eyJ >>FbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTW >Fpb >>CIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=mDEdK020OnfOChAiqXa >jV9 >>oM5pjwdnAPgV88Ux0UahQ%3D&reserved=0 >> >>The relevant diff files are posted here: >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810- >>diff.html&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7C0dd94ff63e >0a4 >>7ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C >638 >>877790756177065%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd >WUsI >>lYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D% >7C6 >>0000%7C%7C%7C&sdata=r4zABxR3wg4QUg%2BBw5mc65noqpmVbLigvlLZPsz >SN9 >>0%3D&reserved=0 (comprehensive diff) >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810- >>auth48diff.html&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7C0dd9 >4ff6 >>3e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C >0%7 >>C638877790756196029%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOn >Ryd >>WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D >%3D >>%7C60000%7C%7C%7C&sdata=bmYOiu0i%2BhqfU9ivPvSKO0ILKaj%2B30%2F >YT1 >>pRsDCWi6k%3D&reserved=0 (all AUTH48 changes) >>https://www.rfc-/ >>editor.org%2Fauthors%2Frfc9810- >>auth48rfcdiff.html&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7C0d >d94 >>ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7 >C0 >>%7C638877790756214570%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGki >On >>RydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ% >3D >>%3D%7C60000%7C%7C%7C&sdata=xh5weZO%2B0lZ0R6dfJOGdCykUbo4QLX4 >KM >>Wdow4hT5O0%3D&reserved=0 (AUTH48 changes side by side) >> >>Thank you, >>RFC Editor/ap >> >>> On Jul 10, 2025, at 12:17 PM, John Gray <john.g...@entrust.com> wrote: >>> >>> Thanks Alanna, >>> >>> Given its sparse usage in the document, expanding it in both places makes >sense >>to me. >>> >>> Thanks, >>> >>> John Gray >>> >>> >>> >>> From: Alanna Paloma <apal...@staff.rfc-editor.org> >>> Sent: Thursday, July 10, 2025 3:05 PM >>> To: John Gray <john.g...@entrust.com> >>> Cc: debcool...@gmail.com <debcool...@gmail.com>; Brockhaus, Hendrik >><hendrik.brockhaus=40siemens....@dmarc.ietf.org>; von Oheimb, David >><david.von.ohe...@siemens.com>; Mike Ounsworth >><mike.ounswo...@entrust.com>; rfc-edi...@rfc-editor.org <rfc-editor@rfc- >editor.org>; >>lamps-...@ietf.org <lamps-...@ietf.org>; lamps-cha...@ietf.org <lamps- >>cha...@ietf.org>; hous...@vigilsec.com<hous...@vigilsec.com>; >>auth48archive@rfc-editor.org <auth48archive@rfc-editor.org> >>> Subject: Re: [EXTERNAL] [AD] Re: AUTH48: RFC-to-be 9810 <draft-ietf-lamps- >>rfc4210bis-18> for your review >>> >>> WARNING: This email originated outside of Entrust. >>> DO NOT CLICK links or attachments unless you trust the sender and know the >>content is safe. >>> Hi John, >>> >>> Thank you for your reply. >>> >>> > I'm okay with the suggested updated text (I agree it is much clearer), >>> > however >>there is a typo in it 🙂 >>> > >>> > It should be "when it is" instead of "when t is" >>> > The CertTemplate structure allows an end entity or RA to specify as many >>> > data fields as the structure wishes for the requested certificate. The >>> > structure also allows an end entity or RA to include any other necessary >>> > data, >>> > such as the publicKey field, when it is required for the certificate. A >>> > CertTemplate structure is identical to a TBSCertificate structure (see >>> > [RFC >5280]) >>> > but with all fields optional/situational. >>> >>> Thanks for spotting this! We have updated the text accordingly. >>> >>> > For the LRA line, I am fine with your suggestion. If the document use >>> > you >show >>is the first usage, should it include the full name with the acronym in >>brackets? I >>thought that was the convention used in the rest of the document (or am I >mistaken)? >>> >>> The first occurrence of “LRA” is expanded in "Terminology and Abbreviations” >>(Section 2), so we have not expanded it in the sentence in Section 5.2.8.3.3. >Please >>let us know if you would like it expanded in both places. >>> >>> Current: >>> LRA: Local Registration Authority >>> … >>> This protocol is obviously much longer than the exchange given in >>> Section 5.2.8.3.2 above but allows an LRA to be involved and has the >>> property that the certificate itself is not actually created until >>> the POP is complete. >>> >>> --- >>> The files have been posted here (please refresh): >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.txt__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhAZLN09tA%24&data=05%7C02%7Chendrik.brockha >us >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756234085%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=8tkrq39EDsph4Hk >I13 >>nqPElKc2mtbPqsOwdnVXCi7Ko%3D&reserved=0 >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.pdf__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhDbDiHL1Q%24&data=05%7C02%7Chendrik.brockh >aus >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756253480%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=0EwYvqAYSe9xP >41D >>ozH%2Fg%2Boo4%2F8EYzSoLkV1%2BHY7AXA%3D&reserved=0 >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.html__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhCj8eRoGQ%24&data=05%7C02%7Chendrik.brockh >aus >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756272895%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=6TywVtqiTvLp%2 >Bcw >>8L4ERhOjDSgZj9ibItStpYblzIbc%3D&reserved=0 >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.xml__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhC4AtGOwg%24&data=05%7C02%7Chendrik.brockh >aus >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756292982%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=yeTNIHbN1p1Sb >mea >>eu1etDjm2j6sbQcrodTwQjbK52c%3D&reserved=0 >>> >>> The relevant diff files are posted here: >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>diff.html__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhAC4Nr_wg%24&data=05%7C02%7Chendrik.brockh >aus >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756313124%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=wm0rPGtGPuYU0 >7V >>VA3%2BGRz3v8RadjW%2BAK0onMFlTWYU%3D&reserved=0 (comprehensive >diff) >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>auth48diff.html__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhCj0k_R2Q%24&data=05%7C02%7Chendrik.brockh >aus >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756332804%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=WlL6iRoy1tabOux >Lo >>%2FDz5U6LEB2t%2BvbKXddlOXVTUqo%3D&reserved=0 (all AUTH48 changes) >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>auth48rfcdiff.html__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhB9PiDdIA%24&data=05%7C02%7Chendrik.brockha >us >>%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4 >add >>ab42e1495d55a%7C1%7C0%7C638877790756351714%7CUnknown%7CTWFpbG >Zsb >>3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkF >OIjoi >>TWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=xomqj7rC4x1Hns >T4U >>6YDkiF6%2BzZM%2BW4z8%2BM8A34ro68%3D&reserved=0 (AUTH48 changes >side >>by side) >>> >>> We will await any further changes you may have and approvals from each >author >>and Deb (AD) prior to moving forward in the publication process. >>> >>> Please see the AUTH48 status page for this document here: >>> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauth48%2Frfc9810__%3B!!FJ- >>Y8qCqXTj2!bXrlG1IXABCRn7pLgU1MtD1k2kJ7iEbtFjY_XaaXiHbAsKIGwNDvltLJV >d5 >>osfPCr_dVa5HKOCVzagAeUhArr- >>tV2w%24&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7C0dd94ff63 >e0a >>47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7 >C63 >>8877790756370839%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRyd >WU >>sIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D >%7 >>C60000%7C%7C%7C&sdata=qTukJ%2BEhwJgcK4pXxjeHCfhn41%2Bhs%2F5%2 >Fa >>cnxg2mhKCc%3D&reserved=0 >>> >>> Thank you, >>> RFC Editor/ap >>> >>> > On Jul 10, 2025, at 9:20 AM, John Gray <john.g...@entrust.com> wrote: >>> > >>> > Thanks for the comments: >>> > >>> > These are my comments, I hope my fellow RFC authors agree as well: >>> > >>> > >>> > I'm okay with the suggested updated text (I agree it is much clearer), >>> > however >>there is a typo in it 🙂 >>> > >>> > It should be "when it is" instead of "when t is" >>> > The CertTemplate structure allows an end entity or RA to specify as many >>> > data fields as the structure wishes for the requested certificate. The >>> > structure also allows an end entity or RA to include any other necessary >>> > data, >>> > such as the publicKey field, when it is required for the certificate. A >>> > CertTemplate structure is identical to a TBSCertificate structure (see >>> > [RFC >5280]) >>> > but with all fields optional/situational. >>> > For the LRA line, I am fine with your suggestion. If the document use >>> > you >show >>is the first usage, should it include the full name with the acronym in >>brackets? I >>thought that was the convention used in the rest of the document (or am I >mistaken)? >>> > >>> > Perhaps: >>> > This protocol is obviously much longer than the exchange given in >>> > Section 5.2.8.3.2 above, but allows a local Registration Authority (LRA) >>> > to >>> > be involved and has the property that the certificate itself is not >>> > actually created until the proof-of-possession is complete. >>> > >>> > >>> > Thanks, >>> > >>> > John Gray >>> > >>> > From: Alanna Paloma <apal...@staff.rfc-editor.org> >>> > Sent: Thursday, July 10, 2025 11:52 AM >>> > To: debcool...@gmail.com <debcool...@gmail.com>; Brockhaus, Hendrik >><hendrik.brockhaus=40siemens....@dmarc.ietf.org>; von Oheimb, David >><david.von.ohe...@siemens.com>; Mike Ounsworth >><mike.ounswo...@entrust.com>; John Gray <john.g...@entrust.com> >>> > Cc: rfc-edi...@rfc-editor.org <rfc-edi...@rfc-editor.org>; >>> > lamps-...@ietf.org >><lamps-...@ietf.org>; lamps-cha...@ietf.org <lamps-cha...@ietf.org>; >>hous...@vigilsec.com<hous...@vigilsec.com>; auth48archive@rfc-editor.org >><auth48archive@rfc-editor.org> >>> > Subject: [EXTERNAL] [AD] Re: AUTH48: RFC-to-be 9810 <draft-ietf-lamps- >>rfc4210bis-18> for your review >>> > >>> > WARNING: This email originated outside of Entrust. >>> > DO NOT CLICK links or attachments unless you trust the sender and know >the >>content is safe. >>> > Hi Authors and Deb*, >>> > >>> > *Deb - As the AD, please review and approve of the following: >>> > - Appendix C.4: removal of BCP14 key word (“OPTIONALLY” to “optionally”) >>> > - Appendix F: added sentence at the end of the first paragraph >>> > >>> > See this diff file for the changes: >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810-ad- >>diff.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wB0AtxDw%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756391415%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=l4A5cNFoTHk9r >2m >>PoEKq4na9dcT5kiOZn1y4DkgZgAE%3D&reserved=0 >>> > >>> > >>> > Authors - Thank you for your reply. We have updated the files accordingly. >Please >>note that we have some follow-up questions: >>> > >>> > > Please Update Section 5.2.1 based on feedback from Quynh Dang. >>> > > OLD >>> > > The CertTemplate structure allows an end entity or >>> > > RA to specify as much as it wishes about the certificate it requires. >>> > > CertTemplate is identical to a Certificate, but with all fields >>> > > optional. >>> > > NEW >>> > > The CertTemplate structure allows an end entity or RA to specify many >>> > > data fields it wishes the certificate it requests to include and to >>> > > include any data it is required to provide such as the publicKey field >>> > > when it is required for the certificate. CertTemplate is identical to >>> > > a >>> > > TBSCertificate structure (see [RFC 5280]) but with all fields >>> > > optional/situational. >>> > >>> > ) We are having trouble parsing the new suggested text. It is unclear what >each of >>the four instances of “it” refer to. May we update the sentence as follows? >>> > >>> > Perhaps: >>> > The CertTemplate structure allows an end entity or RA to specify as many >>> > data fields as the structure wishes for the requested certificate. The >>> > structure also allows an end entity or RA to include any other necessary >>> > data, >>> > such as the publicKey field, when t is required for the certificate. A >>> > CertTemplate structure is identical to a TBSCertificate structure (see >>> > [RFC >5280]) >>> > but with all fields optional/situational. >>> > >>> > >>> > >> a) Both the expansion and the acronym for the following terms are used >>throughout >>> > >> the document. Would you like to update to using the expansion upon >>> > >> first >>usage and >>> > >> the acronym for the rest of the document? >>> > >> >>> > >> Local Registration Authority (LRA) >>> > >>> > > [HB] Yes, please do. >>> > > As the acronym LRA is not used in the document, please remove this line. >>> > >>> > >>> > ) We note that "local Registration Authority” was used in Section >>> > 5.2.8.3.3. We >>have updated this to “LRA” and left the term in the "Terminology and >Abbreviations” >>section. Please let us know if further updates are needed. >>> > >>> > Original: >>> > This protocol is obviously much longer than the exchange given in >>> > Section 5.2.8.3.2 above, but allows a local Registration Authority to >>> > be involved and has the property that the certificate itself is not >>> > actually created until the proof-of-possession is complete. >>> > >>> > Current: >>> > This protocol is obviously much longer than the exchange given in >>> > Section 5.2.8.3.2 above but allows an LRA to be involved and has the >>> > property that the certificate itself is not actually created until >>> > the POP is complete. >>> > >>> > --- >>> > The files have been posted here (please refresh): >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.txt__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wZYZ8gbQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756411618%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=UkiC6F6Ga7E >%2F >>RkeZDuaZzlvb20H6Xync875eQgQJjeU%3D&reserved=0 >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.pdf__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zN3_ROSg%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756430564%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=6%2BNMCniT5 >6eE >>ZdpsxL%2FT03nFP75I%2FSk%2F3mrqUD%2B5CNA%3D&reserved=0 >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wu0CLetQ%24&data=05%7C02%7Chendrik.broc >khau >>s%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd >4ad >>dab42e1495d55a%7C1%7C0%7C638877790756449870%7CUnknown%7CTWFpb >GZs >>b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOIj >>oiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=SDKBOUGQSrT >ZB >>1GQYEBQ6ECy5Kk94Jw18pjr5E%2FUxFo%3D&reserved=0 >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.xml__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wV9HfmPg%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756470523%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=fZT2fFPed4pYD >A4t >>t6%2F2gh5THEcmqybo6Do8eoiatcg%3D&reserved=0 >>> > >>> > The relevant diff files are posted here: >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>diff.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zURljmmA%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756492436%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=rsWZA6lLMPX >WInl >>27z3XD%2BepWetVsi34dGCuH6EIRKw%3D&reserved=0(comprehensive diff) >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>auth48diff.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zey24sgA%24&data=05%7C02%7Chendrik.brock >hau >>s%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd >4ad >>dab42e1495d55a%7C1%7C0%7C638877790756517929%7CUnknown%7CTWFpb >GZs >>b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOIj >>oiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=dKHGs57H7W% >2B >>TGihkddlMFCTdifKNd3nOUgXhlDbr4wQ%3D&reserved=0(all AUTH48 changes) >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>auth48rfcdiff.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wGtPR5Tg%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756538868%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=fS2D0YKTHqj0 >F5a >>dyX52AlJhnhRrRca%2BxiwqhVVgAIU%3D&reserved=0(AUTH48 changes side by >>side) >>> > >>> > Please review the document carefully as documents do not change once >>published as RFCs. >>> > >>> > We will await any further changes you may have and approvals from each >author >>and *Deb prior to moving forward in the publication process. >>> > >>> > Please see the AUTH48 status page for this document here: >>> > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauth48%2Frfc9810__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3w- >>JXp6ug%24&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7C0dd94ff >63e >>0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0% >7C >>638877790756560428%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnR >ydW >>UsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3 >D% >>7C60000%7C%7C%7C&sdata=uowyeBqz8pLkpgR36meVaXlEOJ6u7%2BglED7Q >FGl >>3vKc%3D&reserved=0 >>> > >>> > Thank you, >>> > RFC Editor/ap >>> > >>> > > On Jul 9, 2025, at 3:33 AM, Brockhaus, Hendrik >><hendrik.brockhaus=40siemens....@dmarc.ietf.org> wrote: >>> > > >>> > > Hello >>> > > >>> > > Many thanks for your review and for all valuable changes. >>> > > I aligned the responses to your AUTH48 questions with the co-authors, >>> > > and >we >>propose the following final changes (see inline below). >>> > > Locking at >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>diff.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zURljmmA%24I&data=05%7C02%7Chendrik.bro >ckha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756580202%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=aAZknvDtNsW5 >%2 >>F1379H%2FA0fYtTzGdy%2Byu3ACjKVal3gI%3D&reserved=0 have the following >>additional proposals: >>> > > >>> > > Section 4.2.1.1 >>> > > OLD >>> > > zero touch methods >>> > > NEW >>> > > zero-touch methods >>> > > >>> > > Please Update Section 5.2.1 based on feedback from Quynh Dang. >>> > > OLD >>> > > The CertTemplate structure allows an end entity or >>> > > RA to specify as much as it wishes about the certificate it requires. >>> > > CertTemplate is identical to a Certificate, but with all fields >>> > > optional. >>> > > NEW >>> > > The CertTemplate structure allows an end entity or RA to specify many >>> > > data fields it wishes the certificate it requests to include and to >>> > > include any data it is required to provide such as the publicKey field >>> > > when it is required for the certificate. CertTemplate is identical to >>> > > a >>> > > TBSCertificate structure (see [RFC 5280]) but with all fields >>> > > optional/situational. >>> > > >>> > > In Section 5.3.4 you updated (pvno) to (pvnos) to indicate the plural. >>> > > (pvno) >>refers to the PKIHeader field and this field name has no plural. To circumvent >>confusion, better delete (pvno) in this place. >>> > > OLD >>> > > Note: To indicate support for EnvelopedData, the pvno cmp2021 has >>> > > been introduced. Details on the usage of different protocol version >>> > > numbers (pvno) are described in Section 7. >>> > > NEW >>> > > Note: To indicate support for EnvelopedData, the pvno cmp2021 has >>> > > been introduced. Details on the usage of different protocol version >>> > > numbers are described in Section 7. >>> > > >>> > > >>> > > Hendrik >>> > > >>> > >> -----Ursprüngliche Nachricht----- >>> > >> Von: rfc-edi...@rfc-editor.org <rfc-edi...@rfc-editor.org> >>> > >> Gesendet: Samstag, 21. Juni 2025 02:10 >>> > >> An: Brockhaus, Hendrik (FT RPD CST SEA-DE) >>> > >> <hendrik.brockh...@siemens.com>; von Oheimb, David (FT RPD CST >SEA- >>DE) >>> > >> <david.von.ohe...@siemens.com>; mike.ounswo...@entrust.com; >>> > >> john.g...@entrust.com >>> > >> Cc: rfc-edi...@rfc-editor.org; lamps-...@ietf.org; >>> > >> lamps-cha...@ietf.org; >>> > >> hous...@vigilsec.com; debcool...@gmail.com; auth48archive@rfc- >editor.org >>> > >> Betreff: AUTH48: RFC-to-be 9810 <draft-ietf-lamps-rfc4210bis-18> for >>> > >> your >>review >>> > >> >>> > >> Authors, >>> > >> >>> > >> While reviewing this document during AUTH48, please resolve (as >necessary) >>the >>> > >> following questions, which are also in the XML file. >>> > >> >>> > >> 1) <!-- [rfced] To keep the abstract succinct, we suggest moving some >>> > >> of >its >>content >>> > >> to the Introduction. Perhaps the third paragraph could be worked into >>> > >> the >>> > >> Introduction? >>> > >> >>> > >> As noted in >>> > >> Section 4.3 of RFC 7322: >>> > >> Every RFC must have an Abstract that provides a concise and >>> > >> comprehensive overview of the purpose and contents of the entire >>> > >> document, to give a technically knowledgeable reader a general >>> > >> overview of the function of the document.... >>> > >> A satisfactory Abstract can often be >>> > >> constructed in part from material within the Introduction section, >>> > >> but an effective Abstract may be shorter, less detailed, and perhaps >>> > >> broader in scope than the Introduction. >>> > >> >>> > >> Please review and let us know how/if the text may be updated. >>> > >> --> >>> > > >>> > > [HB] Please remove the third paragraph of the Abstract and update >>> > > Section >1.3 >>as follows: >>> > > >>> > > OLD: >>> > > This document obsoletes [RFC4210] and [RFC9480]. It includes the >>> > > changes specified by Section 2 and Appendix A.2 of [RFC9480] as >>> > > described in Section 1.2. Additionally, this document updates the >>> > > content of [RFC4210] in the following areas: >>> > > >>> > > NEW: >>> > > This document obsoletes [RFC4210] and [RFC9480]. >>> > > >>> > > Backward compatibility with CMP version 2 is maintained >>> > > wherever possible. Updates to CMP version 2 improve crypto >>> > > agility, extend the polling mechanism, add new general message >>> > > types, and add extended key usages (EKUs) to identify special CMP >>> > > server authorizations. CMP version 3 is introduced for changes to >>> > > the ASN.1 syntax, which support EnvelopedData, certConf with hashAlg, >>> > > POPOPrivKey with agreeMAC, and RootCaKeyUpdateContent in ckuann >>> > > messages. >>> > > >>> > > The updates made in this document include the >>> > > changes specified by Section 2 and Appendix A.2 of [RFC9480] as >>> > > described in Section 1.2. Additionally, this document updates the >>> > > content of [RFC4210] in the following areas: >>> > > >>> > >> >>> > >> >>> > >> 2) <!--[rfced] It is unclear to us how "that has a signature >>> > >> algorithm..." >>> > >> fits into the sentence below. Please review and let us know it may be >updated >>for >>> > >> clarity. >>> > >> >>> > >> Original: >>> > >> * Offer an optional hashAlg field in CertStatus supporting cases >>> > >> that a certificate needs to be confirmed that has a signature >>> > >> algorithm that does not indicate a specific hash algorithm to use >>> > >> for computing the certHash. >>> > >> >>> > >> >>> > >> Perhaps: >>> > >> * Offer an optional hashAlg field in CertStatus supporting cases >>> > >> where a certificate that has a signature algorithm but doesn't >>> > >> specify a hash algorithm to compute the certHash needs to be >>> > >> confirmed. >>> > >> --> >>> > > >>> > > [HB] NEW >>> > > * Offer an optional hashAlg field in CertStatus supporting cases >>> > > when a certificate needs to be confirmed, but the certificate >>> > > was signed using a signature algorithm that does not indicate a >>> > > specific hash algorithm to use for computing the certHash. >>> > > >>> > >> >>> > >> >>> > >> 3) <!-- [rfced] FYI, we have updated the citations in the sentence >>> > >> below as >>follows. >>> > >> [RFC9480] does not have an Appendix C.2, but it does have an Appendix >A.2. >>Please >>> > >> review and confirm that these updates retain the intended meaning. >>> > >> >>> > >> Original: >>> > >> This document obsoletes [RFC4210] and [RFC9480]. It includes the >>> > >> changes specified by Section 2 and Appendix C.2 of [RFC9480] as >>> > >> described in Section 1.2. >>> > >> >>> > >> Current: >>> > >> This document obsoletes [RFC4210] and [RFC9480]. It includes the >>> > >> changes specified by Section 2 and Appendix A.2 of [RFC9480] as >>> > >> described in Section 1.2. >>> > >> --> >>> > >> >>> > > >>> > > [HB] Thank you for spotting this. You are right, we wanted to refer to >>> > > RFC >9480 >>Appendix A.2. This change is also included in my proposal to 1) above. >>> > > >>> > >> >>> > >> 4) <!-- [rfced] For clarity, we recommend adding citations for ISO/IEC >9594- >>8/ITU-T >>> > >> X.509". May we add a citation to the existing reference to >>> > >> [X509.2019]? >>> > >> >>> > >> Original: >>> > >> 1. PKI management must conform to the ISO/IEC 9594-8/ITU-T X.509 >>> > >> standards. >>> > >> --> >>> > > >>> > > [HB] Yes, please add the reference. >>> > > OLD >>> > > 1. PKI management must conform to the ISO/IEC 9594-8/ITU-T X.509 >>> > > standards. >>> > > >>> > > NEW >>> > > 1. PKI management must conform to the ISO/IEC 9594-8/ITU-T X.509 >>> > > standards, in particular [X509.2019]. >>> > > >>> > >> >>> > >> >>> > >> 5) <!--[rfced] It is unclear what "off-line file-based" refers to in >>> > >> the sentence >>below. >>> > >> Does it refer to "transport mechanisms"? >>> > >> >>> > >> Original: >>> > >> PKI management protocols must be usable over a variety of >>> > >> "transport" mechanisms, specifically including mail, Hypertext >>> > >> Transfer Protocol (HTTP), Message Queuing Telemetry Transport >>> > >> (MQTT), Constrained Application Protocol (CoAP), and off-line >>> > >> file-based. >>> > >> >>> > >> Perhaps: >>> > >> PKI management protocols must be usable over a variety of >>> > >> "transport" mechanisms, specifically including mail, Hypertext >>> > >> Transfer Protocol (HTTP), Message Queuing Telemetry Transport >>> > >> (MQTT), Constrained Application Protocol (CoAP), and off-line >>> > >> file-based transport mechanisms. >>> > >> --> >>> > > >>> > > [HB] Yes off-line file-based is one of the transport mechanisms listed. >>> > > NEW >>> > > 8. PKI management protocols must be usable over a variety of >>> > > "transport" mechanisms, specifically including email, Hypertext >>> > > Transfer Protocol (HTTP), Message Queuing Telemetry Transport >>> > > (MQTT), Constrained Application Protocol (CoAP), and various >>> > > off-line and non-networked file transfer methods. >>> > >> >>> > >> >>> > >> 6) <!--[rfced] For the nested lists in Section 3.1.3, we have updated >>> > >> the >>numbering to >>> > >> letters and converted "Notes" to a hanging list to help with >>> > >> readability. >Please >>review >>> > >> and let us know of any objections. >>> > >> >>> > >> Original: >>> > >> 1. CA establishment: When establishing a new CA, certain steps are >>> > >> required (e.g., production of initial CRLs, export of CA public >>> > >> key). >>> > >> ... >>> > >> 1. initial registration/certification: This is the process >>> > >> whereby an end entity first makes itself known to a CA or RA, >>> > >> prior to the CA issuing a certificate or certificates for >>> > >> that end entity. >>> > >> ... >>> > >> 1. Note 1. The above definition of "cross-certificate" >>> > >> aligns with the defined term "CA-certificate" in X.509. >>> > >> >>> > >> Current: >>> > >> 1. CA establishment: When establishing a new CA, certain steps are >>> > >> required (e.g., production of initial CRLs, export of CA public >>> > >> key). >>> > >> ... >>> > >> a. initial registration/certification: This is the process >>> > >> whereby an end entity first makes itself known to a CA or RA, >>> > >> prior to the CA issuing a certificate or certificates for >>> > >> that end entity. >>> > >> ... >>> > >> Note 1. The above definition of "cross-certificate" >>> > >> aligns with the defined term "CA-certificate" in X.509. >>> > >> --> >>> > > >>> > > [HB] I like this layout. >>> > > >>> > >> >>> > >> >>> > >> 7) <!--[rfced] May we update the phrasing of "Rail Automation adopted >CMP" >>> > >> to improve readability? >>> > >> >>> > >> Original: >>> > >> Also industry standards like [ETSI-3GPP.33.310] for >>> > >> mobile networks and [UNISIG.Subset-137] for Rail Automation adopted >>> > >> CMP and have specified a set of mandatory schemes for their use case. >>> > >> >>> > >> >>> > >> Perhaps: >>> > >> Also industry standards, like [ETSI-3GPP.33.310] for >>> > >> mobile networks and [UNISIG.Subset-137] for CMP that has adopted rail >>> > >> automation, have specified a set of mandatory schemes for their use >cases. >>> > >> --> >>> > > >>> > > [HB] I am uncertain if your proposal still has the same meaning. >>> > > Both standards adopt CMP for certificate management. [ETSI-3GPP.33.310] >is >>a standard for mobile network infrastructures. [UNISIG.Subset-137] is a >>standard >for >>rail automation. >>> > > Would this read better? >>> > > NEW >>> > > Industry standards such as [ETSI-3GPP.33.310] for mobile networks and >>> > > [UNISIG.Subset-137] for railroad automation have adopted CMP and >>> > > defined a series of mandatory schemes for their use cases. >>> > > >>> > >> >>> > >> >>> > >> 8) <!--[rfced] We have removed the following from the figure in Section >>> > >> 4.2.2.2 because it is repetitive with the text introducing the figure. >>> > >> However, please review, as it seems like some of the blank space can >also be >>> > >> removed from the SVG. >>> > >> >>> > >> Original: >>> > >> In terms of message flow, the basic authenticated scheme is as >>> > >> follows: >>> > >> --> >>> > > >>> > > [HB] I do not see any change in >><https://urldefense/ >.co >>m%2Fv3%2F__https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9810- >>diff.html__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zURljmmA%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756600102%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=VpTpE7ZKI5U3 >CC >>OlAZC9x%2FeUso9HuLoCnPZSGr6aecw%3D&reserved=0>,but everything looks >>good. >>> > > >>> > >> >>> > >> >>> > >> 9) <!--[rfced] As "CMP" is expanded as "Certificate Management >>> > >> Protocol", >>may we >>> > >> update this text to avoid repetition? >>> > >> >>> > >> Original: >>> > >> As the functionality of a >>> > >> CA and RA is not specific to any certificate management protocol >>> > >> (such as CMC or CMP), these EKUs are reused by CMP. >>> > >> >>> > >> Perhaps: >>> > >> As the functionality of a >>> > >> CA and RA is not specific to any CMP (such as CMC), these EKUs are >>reused by >>> > >> CMP. >>> > >> --> >>> > > >>> > > [HB] Here the term "certificate management protocol" does not >>> > > specifically >refer >>to CMP but refers to any protocol managing certificates. >>> > > Does this rephrasing improve readability? >>> > > NEW >>> > > As the functionality of a >>> > > CA and RA is not specific to any protocol used for managing >>> > > certificates (such as CMC or CMP), these EKUs are reused by CMP. >>> > > >>> > >> >>> > >> >>> > >> 10) <!--[rfced] Should "PKIconf" be updated to "pkiconf", "pkiConf", or >>"PKIConf" to >>> > >> reflect usage elsewhere in the document? >>> > >> >>> > >> Original: >>> > >> In response to an ip, cp, kup, krp, or ccp message, an EE will >>> > >> send a certConf for all issued certificates and expect a PKIconf >>> > >> for each certConf. >>> > >> --> >>> > > >>> > > [HB] Thank you for bringing this up. We also spotted this issue, but >>> > > did not >start >>resolving it. But we can do this now. >>> > > The field name in the ASN.1 syntax of the PKIBody is "pkiconf". >>> > > Therfore, >we >>should consistently use "pkiconf" or "pkiconf message" consistently. >>> > > Next to your examples, we should also update "PKIConfirm" accordingly. >>> > > Overall, there are 29 occurrences of "pkiconf" to be aligned. >>> > > >>> > > Section 5.3.16 >>> > > OLD >>> > > Upon receiving a PKIConfirm for a >>> > > certificate response, the recipient MAY treat it as a certConf with >>> > > all certificates being accepted. >>> > > >>> > > NEW >>> > > Upon receiving a pkiconf for a >>> > > certificate response, the recipient MAY treat it as a certConf with >>> > > all certificates being accepted. >>> > > >>> > > Section 5.3.21 >>> > > OLD >>> > > If the client sends this request, the server MUST respond with a >>> > > PKIConfirm response, or another ErrorMsg if any part of the header is >>> > > not valid. >>> > > NEW >>> > > If the client sends this request, the server MUST respond with a >>> > > pkiconf response or another error message if any part of the header is >>> > > not valid. >>> > > >>> > > Section 5.3.22 >>> > > OLD >>> > > 1 In response to an ip, cp, kup, krp, or ccp message, an EE will >>> > > send a certConf for all issued certificates and expect a PKIconf >>> > > for each certConf. >>> > > NEW >>> > > 1. In response to an ip, cp, kup, krp, or ccp message, an EE will >>> > > send a certConf for all issued certificates and expect a pkiconf >>> > > for each certConf. >>> > > >>> > > OLD >>> > > 23 <-- pkiConf <-- >>> > > NEW >>> > > 23 <-- pkiconf <-- >>> > > >>> > > OLD >>> > > 34 <-- pkiConf <-- >>> > > NEW >>> > > 34 <-- pkiconf <-- >>> > > >>> > > Section 6.6.1 >>> > > OLD >>> > > Upon receipt of the certConf message, the responder CA validates >>> > > the message and the MAC and sends back an acknowledgement using >>> > > the PKIConfirm message. >>> > > NEW >>> > > Upon receipt of the certConf message, the responder CA validates >>> > > the message and the MAC and sends back an acknowledgement using >>> > > the pkiconf message. >>> > > >>> > > Appendix C.1 >>> > > OLD >>> > > 9. All PKI message exchanges in Appendix C.4 to C.6 require a >>> > > certConf message to be sent by the initiating entity and a >>> > > PKIConfirm to be sent by the responding entity. The PKIConfirm >>> > > is not included in some of the profiles given since its body is >>> > > NULL and its header contents are clear from the context. >>> > > NEW >>> > > 9. All PKI message exchanges in Appendices C.4 to C.6 require a >>> > > certConf message to be sent by the initiating entity and a >>> > > pkiconf message to be sent by the responding entity. The pkiconf >>> > > is not included in some of the profiles given since its body is >>> > > NULL and its header contents are clear from the context. >>> > > >>> > > Appendix C.4 >>> > > OLD >>> > > The CA sends >>> > > a PKIConfirm back, closing the transaction. All messages are >>> > > authenticated. >>> > > NEW >>> > > The CA sends >>> > > a pkiconf message back, closing the transaction. All messages are >>> > > authenticated. >>> > > >>> > > OLD >>> > > 10 format PKIConf >>> > > 11 <-- PKIConf <-- >>> > > 12 handle PKIConf >>> > > NEW >>> > > 10 format pkiconf >>> > > 11 <-- pkiconf <-- >>> > > 12 handle pkiconf >>> > > >>> > > OLD >>> > > Confirmation -- PKIConf >>> > > NEW >>> > > Confirmation -- pkiconf >>> > > >>> > > OLD >>> > > body PKIConf >>> > > NEW >>> > > body pkiconf >>> > > >>> > > Appendices C.5 and C.6 >>> > > OLD >>> > > The CA replies with a PKIConfirm, to close the transaction. >>> > > NEW >>> > > The CA replies with a pkiconf message to close the transaction. >>> > > >>> > > OLD >>> > > * protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG >>MAY >>> > > also be supported) in request, response, certConfirm, and >>> > > PKIConfirm messages; >>> > > NEW >>> > > * protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG >>MAY >>> > > also be supported) in request, response, certConf, and >>> > > pkiconf messages; >>> > > >>> > > Appendix D.4 >>> > > OLD >>> > > CA-1 replies >>> > > with a PKIConfirm to close the transaction. >>> > > NEW >>> > > CA-1 replies >>> > > with a pkiconf message to close the transaction. >>> > > >>> > > Appendix F >>> > > OLD >>> > > -- identifies the transaction, i.e., this will be the same in >>> > > -- corresponding request, response, certConf, and PKIConf >>> > > -- messages >>> > > NEW >>> > > -- identifies the transaction, i.e., this will be the same in >>> > > -- corresponding request, response, certConf, and pkiconf >>> > > -- messages >>> > > >>> > >> >>> > >> >>> > >> 11) <!--[rfced] In the sentence below, does "are typically >>> > >> insufficient..." >>> > >> refer to "passwords" or "entropy"? >>> > >> >>> > >> Original: >>> > >> If user-generated passwords are used as >>> > >> shared secret information, their entropy cannot be measured and are >>> > >> typically insufficient for protected delivery of centrally generated >>> > >> keys or trust anchors. >>> > >> >>> > >> Perhaps A (refers to "passwords"): >>> > >> If user-generated passwords are used as >>> > >> shared secret information, their entropy cannot be measured and the >>> > >> passwords are typically insufficient for protected delivery of >>> > >> centrally >>> > >> generated keys or trust anchors. >>> > >> >>> > >> Perhaps B (refers to "entropy"): >>> > >> If user-generated passwords are used as >>> > >> shared secret information, their entropy cannot be measured and is >>> > >> typically insufficient for protected delivery of centrally generated >>> > >> keys or trust anchors. >>> > >> --> >>> > >> >>> > > >>> > > [HB] What do you think of this proposal? >>> > > NEW >>> > > If user-generated passwords are used as shared secret information, >>> > > their entropy cannot be measured. Passwords generated from user >>> > > generated entropy are typically insufficient for protected delivery of >>> > > centrally generated keys or trust anchors. >>> > > >>> > >> >>> > >> 12) <!-- [rfced] We are unable to verify these registrations with >>> > >> Entrust. >>> > >> Please ensure the descriptions and values are correct. In addition, >>> > >> please >>consider >>> > >> whether it is appropriate for this text to appear in the IANA >>> > >> Considerations >>section, as >>> > >> it seemingly does not provide any information for IANA and does not >require >>any IANA >>> > >> actions. >>> > >> >>> > >> Original: >>> > >> The new OID 1.2.840.113533.7.66.16 was registered by Entrust for id- >>> > >> KemBasedMac in the arch 1.2.840.113533.7.66. Entrust registered also >>> > >> the OIDs for id-PasswordBasedMac and id-DHBasedMac there. >>> > >> --> >>> > > >>> > > [HB] These OIDs are registered to the Entrust arc by WG consensus in >order to >>keep it consistent with previous registrations. Entrust is an author of this >>draft and >the >>authors confirm that Entrust's internal (non-public) registry has noted this. >>> > > We added this information to the IANA section as it is about OID >registration. >>As IANA was fine with this section, I tend to leave the sentence as it is or >>just re- >>phrase it for clarity as follows. >>> > > OLD >>> > > The new OID 1.2.840.113533.7.66.16 was registered by Entrust for id- >>> > > KemBasedMac in the arch 1.2.840.113533.7.66. Entrust registered also >>> > > the OIDs for id-PasswordBasedMac and id-DHBasedMac there. >>> > > NEW >>> > > Note that the new OID 1.2.840.113533.7.66.16 was registered by >>> > > Entrust, >>> > > and not by IANA, for id-KemBasedMac in the arch 1.2.840.113533.7.66. >>> > > This was done to match the previous registrations for id- >>> > > PasswordBasedMac and id-DHBasedMac, which are also on the Entrust >>private >>> > > arc. >>> > > >>> > >> >>> > >> >>> > >> 13) <!-- [rfced] Would you like the references to be alphabetized or >>> > >> left in >their >>current >>> > >> order? >>> > >> --> >>> > >> >>> > > >>> > > [HB] Yes please alphabetize them. >>> > > >>> > >> >>> > >> 14) <!-- [rfced] Please review. We found the following URL: >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fcacr.uwaterloo.ca%2Fhac%2Findex.html__%3B!! >FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zKQld8tw%24which&data=05%7C02%7Chendrik. >broc >>khaus%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95 >794f >>d4addab42e1495d55a%7C1%7C0%7C638877790756619696%7CUnknown%7CT >WFp >>bGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zM >iIsI >>kFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=OjfYLQMk >9% >>2FvU4lv9MDoM%2BI0UlVaO6AiTII4sb2q8OY4%3D&reserved=0 is provided by >>authors of this handbook and >>> > >> includes open-access PDF files of this reference. Would you like to add >this >>URL to >>> > >> the reference? >>> > >> >>> > >> [MvOV97] Menezes, A., van Oorschot, P., and S. Vanstone, "Handbook >>> > >> of Applied Cryptography", CRC Press ISBN 0-8493-8523-7, >>> > >> 1996. >>> > >> --> >>> > >> >>> > > >>> > > [HB] This is a great idea. I was not aware of this link. >>> > > BTW, it is sufficient to use >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fcacr.uwaterloo.ca%2Fhac%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zKZgFV8g%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756641536%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=X3V0Rq8NGrJ >WU1 >>Sai33kb6qJsrbTEHp6xWZfqVl3u84%3D&reserved=0 >>> >> >>> > >> >>> > >> 15) <!--[rfced] The following text in Appendices C.3, D.3, and D.6 are >>> > >> not >>complete >>> > >> sentences. Please review and let us know how these may be made into >>complete >>> > >> sentences. >>> > >> >>> > >> Original: >>> > >> POP fields for use (in signature field of pop field of >>> > >> ProofOfPossession structure) when proving possession of a private >>> > >> signing key that corresponds to a public verification key for which a >>> > >> certificate has been requested. >>> > >> ... >>> > >> Profile of how a certificate structure may be "self-signed". >>> > >> ... >>> > >> Creation of a single cross-certificate (i.e., not two at once). >>> > >> >>> > >> Perhaps: >>> > >> The table below describes the POP fields for use (in signature field >>> > >> of >>> > >> pop field of ProofOfPossession structure) when proving possession of a >>> > >> private signing key that corresponds to a public verification key for >>> > >> which a certificate has been requested. >>> > >> ... >>> > >> The table below is a profile of how a certificate structure may be >>> > >> "self-signed". >>> > >> ... >>> > >> This section describes the creation of a single cross-certificate >>> > >> (i.e., >>> > >> not two at once). >>> > >> --> >>> > > >>> > > [HB] Thank you for these proposals. I like them. >>> > > >>> > >> >>> > >> >>> > >> 16) <!--[rfced] As "OPTIONALLY" is not a key word in BCP14, may we >update >>this >>> > >> sentence to rephrase to use the key word "OPTIONAL"? >>> > >> >>> > >> Original: >>> > >> This transaction established the shared secret, the referenceNumber >>> > >> and >>> > >> OPTIONALLY the distinguished name used for both sender and subject >>> > >> name in the certificate template. >>> > >> >>> > >> Perhaps: >>> > >> This transaction established the shared secret, the referenceNumber, >>> > >> and >>> > >> an OPTIONAL distinguished name used for both the sender and subject >>> > >> name in the certificate template. >>> > >> --> >>> > > >>> > > [HB] You are right. This is not a key word. Let's use lower case >>> > > letters. >>> > > NEW >>> > > This transaction established the shared secret, the referenceNumber, >>> > > and >>> > > optionally the distinguished name used for both sender and subject >>> > > name in the certificate template. >>> > > >>> > >> >>> > >> >>> > >> 17) <!--[rfced] May we update the numbered listed in Appendix C.6 to >>> > >> be a >>bulleted >>> > >> list? This would reflect the bulleted list in Appendix C.5. >>> > >> >>> > >> Appendix C.5: >>> > >> * sender name SHOULD be present >>> > >> >>> > >> * protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG >>MAY >>> > >> also be supported) in request, response, certConfirm, and >>> > >> PKIConfirm messages; >>> > >> ... >>> > >> >>> > >> Appendix C.6: >>> > >> 1. sender name SHOULD be present >>> > >> >>> > >> 2. protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG >>MAY >>> > >> also be supported) in request, response, certConfirm, and >>> > >> PKIConfirm messages; >>> > >> ... >>> > >> --> >>> > > >>> > > [HB] Yes please do that. >>> > > >>> > >> >>> > >> >>> > >> 18) <!--[rfced] As the text preceding these figures and the titles of >>> > >> the >figures >>are very >>> > >> similar, may we remove the preceding text to avoid redundancy? >>> > >> >>> > >> Original: >>> > >> Message Flow when the PKI entity has a KEM key pair and certificate: >>> > >> ... >>> > >> Figure 3: Message Flow when PKI entity has a KEM key pair >>> > >> >>> > >> >>> > >> Message Flow when the PKI entity knows that the PKI management entity >>> > >> uses a KEM key pair and has the authentic public key: >>> > >> ... >>> > >> Figure 4: Message Flow when the PKI entity knows that the PKI >>> > >> management entity uses a KEM key pair and has the authentic >>> > >> public key >>> > >> >>> > >> >>> > >> Message Flow when the PKI entity does not know that the PKI >>> > >> management entity uses a KEM key pair: >>> > >> ... >>> > >> Figure 5: Message Flow when the PKI entity does not know that the PKI >>> > >> management entity uses a KEM key pair >>> > >> --> >>> > > >>> > > [HB] Please go ahead, while using in the first case not "KEM key pair" >>> > > alone >>but "KEM key pair and certificate". >>> > > >>> > >> >>> > >> >>> > >> 19) <!--[rfced] We note that the following references have citations >>> > >> only in >the >>ASN.1 >>> > >> module in Appendix F. In order to have a 1:1 matchup between the >references >>section >>> > >> and the text, please review the text and let us know where a citation >>> > >> for >each >>of the >>> > >> following may be included. >>> > >> >>> > >> Alternatively, a sentence can be added before the module stating that >>> > >> it >refers >>to the >>> > >> following (and then list the citations). >>> > >> >>> > >> [RFC3629] >>> > >> [RFC6268] >>> > >> --> >>> > > >>> > > [HB] Pleas update Appendix F as follows: >>> > > OLD >>> > > The module contains those changes to the >>> > > normative ASN.1 module from Appendix F of [RFC4210] that were >>> > > specified in [RFC9480], as well as changes made in this document. >>> > > NEW >>> > > The module contains those changes to the >>> > > normative ASN.1 module from Appendix F of [RFC4210] that were >>> > > specified in [RFC9480], as well as changes made in this document. >>> > > This module makes reference to ASN.1 structures defined in [RFC6268], >>> > > as well as the UTF-8 encoding defined in [RFC3629]. >>> > > >>> > > >>> > >> >>> > >> >>> > >> 20) <!-- [rfced] Please review each artwork element and let us know if >>> > >> any >>should be >>> > >> marked as sourcecode (or another element) instead. >>> > >> >>> > >> We updated some artwork to sourcecode throughout the document. Please >>confirm >>> > >> that these are correct. >>> > >> >>> > >> In addition, please consider whether the "type" attribute of any >>> > >> sourcecode >>element >>> > >> should be set and/or has been set correctly. >>> > >> >>> > >> The current list of preferred values for "type" is available at >>> > > >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Frpc%2Fwiki%2Fdoku.php%3Fid%3Dsourcecode-types__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wVRJoMWA%24&data=05%7C02%7Chendrik.bro >ckh >>aus%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd9579 >4fd4 >>addab42e1495d55a%7C1%7C0%7C638877790756662931%7CUnknown%7CTWF >pbG >>Zsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIs >IkF >>OIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=chBQyNyqHI >Ge >>N34sjskQvqcfi90rgxSnYsz3RqlSVrg%3D&reserved=0. >>> >>> If the current list does not contain an applicable type, feel free to >>> >>> suggest >>additions for >>> > >> consideration. Note that it is also acceptable to leave the "type" >>> > >> attribute >not >>set. >>> > >> --> >>> > > >>> > > [HB] I reviewed >><https://urldefense/ >.co >>m%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fauthors%2Frfc9810.xml__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wV9HfmPg%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756684507%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=g7vg1IByHrO% >2Fe >>Ewfi2MQVFcQ%2FfWv3yvf5AlO%2FHOEIkM%3D&reserved=0>and propose the >>following changes. >>> > > >>> > > Section 5.1.3.4 after Figure 2; do not use sourcecode, please use plain >>> > > text. >>> > > Encapsulate(pk) -> (ct, ss) >>> > > ... >>> > > Decapsulate(ct, sk) -> (ss) >>> > > ... >>> > > KDF(ss, len, context)->(ssk) >>> > > ... >>> > > KDF(ss, len, context)->(ssk) >>> > > >>> > > Section 5.3.19.1 >>> > > Set the sourcecode element in this and all subsections of 5.3.19 to >>> > > asn.1. >>> > > >>> > >> >>> > >> >>> > >> 21) <!-- [rfced] Please review whether any of the notes in this >>> > >> document >>should be in >>> > >> the <aside> element. It is defined as "a container for content that is >>semantically less >>> > >> important or tangential to the content that surrounds it" >>> > >> >>(https://urldefense/. >co >>m%2Fv3%2F__https%3A%2F%2Fauthors.ietf.org%2Fen%2Frfcxml- >>vocabulary*aside__%3BIw!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wFK99b7A%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756706198%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=tk6TvxZ%2F%2 >Be >>cuFz2Vb45NAzLVa4H3veH0u18MM2HHG70%3D&reserved=0). >>> >>> --> >>> > > >>> > > [HB] I do not see any note that must be tagged <aside>. >>> > > >>> > >> >>> > >> >>> > >> 22) <!--[rfced] Acronyms >>> > >> >>> > >> a) Both the expansion and the acronym for the following terms are used >>throughout >>> > >> the document. Would you like to update to using the expansion upon >>> > >> first >>usage and >>> > >> the acronym for the rest of the document? >>> > >> >>> > >> Certification Authority (CA) >>> > >> Certificate Management Protocol (CMP) >>> > >> Certificate Transparency (CT) >>> > >> Diffie-Hellman (DH) >>> > >> Distinguished Name (DN) >>> > >> End Entity (EE) >>> > >> extended key usage (EKU) >>> > >> Key Encapsulation Mechansim (KEM) >>> > >> Key Generation Authority (KGA) >>> > >> Local Registration Authority (LRA) >>> > >> Message Authentication Code (MAC) >>> > >> one-way function (OWF) >>> > >> Public Key Infrastructure (PKI) >>> > >> Proof-of-Possession (POP) >>> > >> Personal Security Environment (PSE) >>> > >> protocol version number (pvno) >>> > >> Registration Authority (RA) >>> > >> Trusted Execution Environment (TEE) >>> > >> >>> > >> b) FYI - We have added expansions for the following abbreviations per >Section >>3.6 of >>> > >> RFC 7322 ("RFC Style Guide"). Please review each expansion in the >>document >>> > >> carefully to ensure correctness. >>> > >> >>> > >> Initial Device Identifier (IDevID) >>> > >> Internet Key Exchange Protocol (IKE) >>> > >> Internet of Things (IoT) >>> > >> Lightweight Directory Access Protocol (LDAP) Organizational Unit (OU) >>> > >> --> >>> > > >>> > > [HB] Yes, please do. >>> > > As the acronym LRA is not used in the document, please remove this line. >>> > > >>> > >> >>> > >> >>> > >> 23) <!--[rfced] Terminology >>> > >> >>> > >> a) May we update the following terms to the form on the right for >consistency? >>> > >> >>> > >> certification authority > Certification Authority registration >>> > >> authority > >>Registration >>> > >> Authority boot-strapping > bootstrapping key encapsulation mechanism >>> > >> > >>Key >>> > >> Encapsulation Mechanism off-line > offline on-line > online >>> > >> >>> > >> b) We note that the following terms are used inconsistently throughout >>> > >> the >>document. >>> > >> Please review and let us know if/how these terms may be made >consistent. >>> > >> >>> > >> Protocol Encryption Key vs. protocl encryption key >>> > >> X.509v1 vs. X.509 v1 >>> > >> X.509v3 vs. X.509 v3 >>> > >> X.509v3 certificate vs. X.509v3 Certificate >>> > >> cross-cert* vs. cross cert* >>> > >> --> >>> > >> >>> > > >>> > > [HB] >>> > > a) Yes, please do. >>> > > >>> > > b) Please use the following: >>> > > protocol encryption key >>> > > X.509v1 >>> > > X.509v3 >>> > > X.509v3 certificate >>> > > cross-cert * (Please do not change the ASN.1 module.) >>> > > >>> > >> >>> > >> 24) <!-- [rfced] Please review the "Inclusive Language" portion of the >>> > >> online >>Style >>> > >> Guide >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc- >>editor.org%2Fstyleguide%2Fpart2%2F*inclusive_language__%3BIw!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3zRe_saTw%24&data=05%7C02%7Chendrik.broc >khau >>s%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd >4ad >>dab42e1495d55a%7C1%7C0%7C638877790756726961%7CUnknown%7CTWFpb >GZs >>b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOIj >>oiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=cprq7pdgr0wpqt >wYB >>Zbo7j%2F9CAHU3e25rx4WpKM7E0w%3D&reserved=0 >>> >>> and let us know if any changes are needed. Updates of this nature >typically >>result in >>> > >> more precise language, which is helpful for readers. >>> > >> >>> > >> Note that our script did not flag any words in particular, but this >>> > >> should still >be >>> > >> reviewed as a best practice. >>> > >> --> >>> > > >>> > > [HB] I do not see any need for further changes. >>> > > >>> > >> >>> > >> >>> > >> Thank you. >>> > >> >>> > >> RFC Editor >>> > >> >>> > >> >>> > >> On Jun 20, 2025, at 5:06 PM, rfc-edi...@rfc-editor.org wrote: >>> > >> >>> > >> *****IMPORTANT***** >>> > >> >>> > >> Updated 2025/06/20 >>> > >> >>> > >> RFC Author(s): >>> > >> -------------- >>> > >> >>> > >> Instructions for Completing AUTH48 >>> > >> >>> > >> Your document has now entered AUTH48. Once it has been reviewed and >>> > >> approved by you and all coauthors, it will be published as an RFC. >>> > >> If an author is no longer available, there are several remedies >>> > >> available as listed in the FAQ >>> > >> >>(https://urldefense/. >co >>m%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756746788%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=4qt2VhqfZuEqq >zlN >>gpa%2B5xPlTyrb1T1B3TD9qqmNdIk%3D&reserved=0 >>> >>> >>editor.org%2Ffaq%2F&data=05%7C02%7Chendrik.brockhaus%40siemens.com% >7 >>> > >> >>Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d55 >a >>> > >> >>%7C1%7C0%7C638860614551309675%7CUnknown%7CTWFpbGZsb3d8eyJFbX >B >>> > >> >>0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbC >I >>> > >> >>sIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=v%2FfFjv9cJJYNu9WUenH6OO >>> > >> %2BeHs9mPSs5TxzaRl%2FGOcQ%3D&reserved=0). >>> > >> >>> > >> You and you coauthors are responsible for engaging other parties >>> > >> (e.g., Contributors or Working Group) as necessary before providing >>> > >> your approval. >>> > >> >>> > >> Planning your review >>> > >> --------------------- >>> > >> >>> > >> Please review the following aspects of your document: >>> > >> >>> > >> * RFC Editor questions >>> > >> >>> > >> Please review and resolve any questions raised by the RFC Editor >>> > >> that have been included in the XML file as comments marked as >>> > >> follows: >>> > >> >>> > >> <!-- [rfced] ... --> >>> > >> >>> > >> These questions will also be sent in a subsequent email. >>> > >> >>> > >> * Changes submitted by coauthors >>> > >> >>> > >> Please ensure that you review any changes submitted by your >>> > >> coauthors. We assume that if you do not speak up that you >>> > >> agree to changes submitted by your coauthors. >>> > >> >>> > >> * Content >>> > >> >>> > >> Please review the full content of the document, as this cannot >>> > >> change once the RFC is published. Please pay particular attention to: >>> > >> - IANA considerations updates (if applicable) >>> > >> - contact information >>> > >> - references >>> > >> >>> > >> * Copyright notices and legends >>> > >> >>> > >> Please review the copyright notice and legends as defined in >>> > >> RFC 5378 and the Trust Legal Provisions >>> > >> (TLP - >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Ftrustee.ietf.or%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3wvMegLOA%24&data=05%7C02%7Chendrik.bro >ckha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756766839%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=GkZrJt6KfYh7T >kC >>Hk4htZFVNwhPw1Z1eSyTndOSdmv0%3D&reserved=0 >>> >>> g%2Flicense- >>> > >> >>info&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7Cd25dca9b7ada4 >b >>> > >> >>54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C >6 >>> > >> >>38860614551334722%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy >d >>> > >> >>WUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D >% >>> > >> >>3D%7C0%7C%7C%7C&sdata=ypZMrC2pHXFDv4035ptPDCE5OQgiOeyNaAmjRT >>> > >> HWnhQ%3D&reserved=0). >>> > >> >>> > >> * Semantic markup >>> > >> >>> > >> Please review the markup in the XML file to ensure that elements of >>> > >> content are correctly tagged. For example, ensure that <sourcecode> >>> > >> and <artwork> are set correctly. See details at >>> > >> >>> > >> >><https://urldefense/ >.co >>m%2Fv3%2F__https%3A%2F%2Fauthors.ietf%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3xnb53Egg%24&data=05%7C02%7Chendrik.brock >hau >>s%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794fd >4ad >>dab42e1495d55a%7C1%7C0%7C638877790756786038%7CUnknown%7CTWFpb >GZs >>b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOIj >>oiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=gYqJtxwcZuIew >OTjj >>c4yZKIgWP5dLmcH0sef4orHSKk%3D&reserved=0. >>> >>> org%2Frfcxml- >>> > >> >>vocabulary&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7Cd25dca9 >b >>> > >> >>7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7 >C >>> > >> >>0%7C638860614551358701%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcG >ki >>> > >> >>OnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf >Q >>> > >> >>%3D%3D%7C0%7C%7C%7C&sdata=4KEKvd%2F9HcDmuK1H9u9SLkiZFp7R0Pj >B >>> > >> yXlrFebQ8B0%3D&reserved=0>. >>> > >> >>> > >> * Formatted output >>> > >> >>> > >> Please review the PDF, HTML, and TXT files to ensure that the >>> > >> formatted output, as generated from the markup in the XML file, is >>> > >> reasonable. Please note that the TXT will have formatting >>> > >> limitations compared to the PDF and HTML. >>> > >> >>> > >> >>> > >> Submitting changes >>> > >> ------------------ >>> > >> >>> > >> To submit changes, please reply to this email using 'REPLY ALL' as all >>> > >> the parties CCed on this message need to see your changes. The parties >>> > >> include: >>> > >> >>> > >> * your coauthors >>> > >> >>> > >> * rfc-edi...@rfc-editor.org (the RPC team) >>> > >> >>> > >> * other document participants, depending on the stream (e.g., >>> > >> IETF Stream participants are your working group chairs, the >>> > >> responsible ADs, and the document shepherd). >>> > >> >>> > >> * auth48archive@rfc-editor.org, which is a new archival mailing list >>> > >> to preserve AUTH48 conversations; it is not an active discussion >>> > >> list: >>> > >> >>> > >> * More info: >>> > >> >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fmailarchive.i%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3weKQu31Q%24&data=05%7C02%7Chendrik.bro >ckha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756805590%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=C6bCVPTfwHZ >dTe >>4tBwfH6laugUBSj%2B7dZ68GoAr22XA%3D&reserved=0 >>> >>> etf.org%2Farch%2Fmsg%2Fietf-announce%2Fyb6lpIGh- >>> > >> >>4Q9l2USxIAe6P8O4Zc&data=05%7C02%7Chendrik.brockhaus%40siemens.com >% >>> > >> >>7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d5 >5 >>> > >> >>a%7C1%7C0%7C638860614551381593%7CUnknown%7CTWFpbGZsb3d8eyJFb >X >>> > >> >>B0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpb >C >>> > >> >>IsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=W3nbLk6%2B4%2FLyd5eikaD >m >>> > >> YcJ1rMZRpHFznRBvsQHXWNw%3D&reserved=0 >>> > >> >>> > >> * The archive itself: >>> > >> >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fmailarchive.i%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3weKQu31Q%24&data=05%7C02%7Chendrik.bro >ckha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756826297%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=3MZRxzzFeThF >U% >>2B3Pux%2FoC1pc9qUjApkmp%2FPxWZnFI4c%3D&reserved=0 >>> >>> >>etf.org%2Farch%2Fbrowse%2Fauth48archive%2F&data=05%7C02%7Chendrik.br >o >>> > >> >>ckhaus%40siemens.com%7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bc >d >>> > >> >>95794fd4addab42e1495d55a%7C1%7C0%7C638860614551407415%7CUnknown >% >>> > >> >>7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJ >X >>> > >> >>aW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=cTD >% >>> > >> 2FoCScXBBa%2B9G3QXMobdaAYaxyChjhkxXLApUmlrg%3D&reserved=0 >>> > >> >>> > >> * Note: If only absolutely necessary, you may temporarily opt out >>> > >> of the archiving of messages (e.g., to discuss a sensitive >>> > >> matter). >>> > >> If needed, please add a note at the top of the message that you >>> > >> have dropped the address. When the discussion is concluded, >>> > >> auth48archive@rfc-editor.org will be re-added to the CC list and >>> > >> its addition will be noted at the top of the message. >>> > >> >>> > >> You may submit your changes in one of two ways: >>> > >> >>> > >> An update to the provided XML file >>> > >> - OR - >>> > >> An explicit list of changes in this format >>> > >> >>> > >> Section # (or indicate Global) >>> > >> >>> > >> OLD: >>> > >> old text >>> > >> >>> > >> NEW: >>> > >> new text >>> > >> >>> > >> You do not need to reply with both an updated XML file and an explicit >>> > >> list of changes, as either form is sufficient. >>> > >> >>> > >> We will ask a stream manager to review and approve any changes that >seem >>> > >> beyond editorial in nature, e.g., addition of new text, deletion of >>> > >> text, >>> > >> and technical changes. Information about stream managers can be found >in >>> > >> the FAQ. Editorial changes do not require approval from a stream >manager. >>> > >> >>> > >> >>> > >> Approving for publication >>> > >> -------------------------- >>> > >> >>> > >> To approve your RFC for publication, please reply to this email stating >>> > >> that you approve this RFC for publication. Please use 'REPLY ALL', >>> > >> as all the parties CCed on this message need to see your approval. >>> > >> >>> > >> >>> > >> Files >>> > >> ----- >>> > >> >>> > >> The files are available here: >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756852137%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=WT0WR%2BBj >yW >>m0rjdvgITolLcYbUMUnVaEMpb97vybdHA%3D&reserved=0 >>> >>> >>editor.org%2Fauthors%2Frfc9810.xml&data=05%7C02%7Chendrik.brockhaus%40 >s >>> > >> >>iemens.com%7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4ad >d >>> > >> >>ab42e1495d55a%7C1%7C0%7C638860614551432483%7CUnknown%7CTWFpbG >Z >>> > >> >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >F >>> > >> >>OIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=KaOYhlNHFMk5Z >A >>> > >> HZxzbiozmnixhggqPfINdxPE8UDGg%3D&reserved=0 >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756876011%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=QOEZHFOyBg >m% >>2FgrMjMZBEGQtklsBnVNzguFCxpP0TcQU%3D&reserved=0 >>> >>> >>editor.org%2Fauthors%2Frfc9810.html&data=05%7C02%7Chendrik.brockhaus%4 >0 >>> > >> >>siemens.com%7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4a >d >>> > >> >>dab42e1495d55a%7C1%7C0%7C638860614551448828%7CUnknown%7CTWFpb >G >>> > >> >>Zsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIs >Ik >>> > >> >>FOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=IuWYtynoq8I%2 >B >>> > >> Pgv328Iol28iRrml8cUzulftnr7unMs%3D&reserved=0 >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756896933%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=GfhlFJ8cVSoQ >HNV >>1qcANJ0u50MOX%2FsMWQnmPF8VSEjI%3D&reserved=0 >>> >>> >>editor.org%2Fauthors%2Frfc9810.pdf&data=05%7C02%7Chendrik.brockhaus%40 >si >>> > >> >>emens.com%7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4add >a >>> > >> >>b42e1495d55a%7C1%7C0%7C638860614551465544%7CUnknown%7CTWFpbGZ >s >>> > >> >>b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >F >>> > >> >>OIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=DXx2eaB55FufB% >2 >>> > >> F5pdV6p5H2keVC6C5RWwQf9g2oVITc%3D&reserved=0 >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756916571%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=u33SgegqbFXfq >zw >>2Wxu1N8oeHaYEMwD1%2BW0zNyI9Eqg%3D&reserved=0 >>> >>> >>editor.org%2Fauthors%2Frfc9810.txt&data=05%7C02%7Chendrik.brockhaus%40s >i >>> > >> >>emens.com%7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4add >a >>> > >> >>b42e1495d55a%7C1%7C0%7C638860614551481529%7CUnknown%7CTWFpbGZ >s >>> > >> >>b3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >F >>> > >> >>OIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=YwUasxMliK2BL1 >V >>> > >> GwRfgcM6X%2FMPLwE3SHwsAjUVFXBM%3D&reserved=0 >>> > >> >>> > >> Diff file of the text: >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756935628%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=dRbQRf4OjI57 >mqO >>BXscPC0xQ7GGz5i4pWtW88NAjnRU%3D&reserved=0 >>> >>> editor.org%2Fauthors%2Frfc9810- >>> > >> >>diff.html&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7Cd25dca9b7 >a >>> > >> >>da4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0 >% >>> > >> >>7C638860614551496675%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiO >n >>> > >> >>RydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ% >3 >>> > >> >>D%3D%7C0%7C%7C%7C&sdata=UGE071%2B6EDvQWedVY3hAAOCo80bcXNd >g >>> > >> QNdRHJ1JvdQ%3D&reserved=0 >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756955254%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=r%2Bl%2Bq92S >YG >>n8bHhhgcE0F6FYDdpWYFk2CDLinuZzW7Y%3D&reserved=0 >>> >>> editor.org%2Fauthors%2Frfc9810- >>> > >> >>rfcdiff.html&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7Cd25dca9 >b >>> > >> >>7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7 >C >>> > >> >>0%7C638860614551511934%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcG >ki >>> > >> >>OnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf >Q >>> > >> >>%3D%3D%7C0%7C%7C%7C&sdata=BRV2ZGaAlsjhLKTkmxoI%2Bc7IvBUtB7aC >n >>> > >> J5hdXbzg8g%3D&reserved=0 (side by side) >>> > >> >>> > >> Diff of the XML: >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756974174%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=UJgHrH5d2Sq1 >h%2 >>B4ynVsIkEevbdQHMesOvNfQlo5Ojv4%3D&reserved=0 >>> >>> editor.org%2Fauthors%2Frfc9810- >>> > >> >>xmldiff1.html&data=05%7C02%7Chendrik.brockhaus%40siemens.com%7Cd25dc >a >>> > >> >>9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab42e1495d55a%7C1% >7 >>> > >> >>C0%7C638860614551532795%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hc >G >>> > >> >>kiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoy >f >>> > >> >>Q%3D%3D%7C0%7C%7C%7C&sdata=nwoPdp3qSCaj8Eh8jLjWsBYnth60Qtt4Ad >P >>> > >> CxBx7wU8%3D&reserved=0 >>> > >> >>> > >> >>> > >> Tracking progress >>> > >> ----------------- >>> > >> >>> > >> The details of the AUTH48 status of your document are here: >>> > >> >>https://urldefense/. >com >>%2Fv3%2F__https%3A%2F%2Fwww.rfc-%2F__%3B!!FJ- >>Y8qCqXTj2!bvOdlRfDXkgzoTQQMtMPAi2fT_zvqn82oIkk6OeoH2K_FHhr0DchJVTl >NK >>OJbWpkQOaqJrwSG3xa0ndDx3yQjuEqKQ%24&data=05%7C02%7Chendrik.broc >kha >>us%40siemens.com%7C0dd94ff63e0a47ecdbed08ddbff70c69%7C38ae3bcd95794f >d4a >>ddab42e1495d55a%7C1%7C0%7C638877790756992674%7CUnknown%7CTWFp >bGZ >>sb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIk >FOI >>joiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=nfl3d6MtzqIx86 >ckc >>u1uXFMace7V5f07TsIKwffy90w%3D&reserved=0 >>> >>> >>editor.org%2Fauth48%2Frfc9810&data=05%7C02%7Chendrik.brockhaus%40siem >e >>> > >> >>ns.com%7Cd25dca9b7ada4b54eb7908ddb05804ed%7C38ae3bcd95794fd4addab4 >2 >>> > >> >>e1495d55a%7C1%7C0%7C638860614551554676%7CUnknown%7CTWFpbGZsb3 >d >>> > >> >>8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIj >oi >>> > >> >>TWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=ZhCuyKv%2BPSRvvwt >y >>> > >> Rq0URqdUIkO%2FIoSLxuSNYchsOeo%3D&reserved=0 >>> > >> >>> > >> Please let us know if you have any questions. >>> > >> >>> > >> Thank you for your cooperation, >>> > >> >>> > >> RFC Editor >>> > >> >>> > >> -------------------------------------- >>> > >> RFC 9810 (draft-ietf-lamps-rfc4210bis-18) >>> > >> >>> > >> Title : Internet X.509 Public Key Infrastructure -- >>> > >> Certificate >>Management >>> > >> Protocol (CMP) >>> > >> Author(s) : H. Brockhaus, D. von Oheimb, M. Ounsworth, J. Gray >>> > >> WG Chair(s) : Russ Housley, Tim Hollebeek >>> > >> Area Director(s) : Deb Cooley, Paul Wouters >>> > >>> > >>> > >>> > Any email and files/attachments transmitted with it are intended solely >>> > for the >use >>of the individual or entity to whom they are addressed. If this message has >>been >sent >>to you in error, you must not copy, distribute or disclose of the information >>it >contains. >>Please notify Entrust immediately and delete the message from your system. >>> >>> >>> >>> -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org