Re: [Anima-bootstrap] Voucher signing method

peter van der Stok <stokcons@xs4all.nl> Wed, 19 April 2017 07:01 UTC

Return-Path: <stokcons@xs4all.nl>
X-Original-To: anima-bootstrap@ietfa.amsl.com
Delivered-To: anima-bootstrap@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44401131530 for <anima-bootstrap@ietfa.amsl.com>; Wed, 19 Apr 2017 00:01:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.62
X-Spam-Level:
X-Spam-Status: No, score=-2.62 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cj0eNcNcJmDv for <anima-bootstrap@ietfa.amsl.com>; Wed, 19 Apr 2017 00:01:10 -0700 (PDT)
Received: from lb1-smtp-cloud6.xs4all.net (lb1-smtp-cloud6.xs4all.net [194.109.24.24]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5AA5C131527 for <anima-bootstrap@ietf.org>; Wed, 19 Apr 2017 00:01:06 -0700 (PDT)
Received: from webmail.xs4all.nl ([IPv6:2001:888:0:22:194:109:20:213]) by smtp-cloud6.xs4all.net with ESMTP id A7141v00B4R9iYA01714bT; Wed, 19 Apr 2017 09:01:04 +0200
Received: from 2001:983:a264:1:a5b0:349e:f112:fc74 by webmail.xs4all.nl with HTTP (HTTP/1.1 POST); Wed, 19 Apr 2017 09:01:04 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Date: Wed, 19 Apr 2017 09:01:04 +0200
From: peter van der Stok <stokcons@xs4all.nl>
To: "Max Pritikin (pritikin)" <pritikin@cisco.com>
Cc: anima@ietf.org, anima-bootstrap@ietf.org
Organization: vanderstok consultancy
Reply-To: consultancy@vanderstok.org
Mail-Reply-To: consultancy@vanderstok.org
In-Reply-To: <AD8F4360-02A4-4F22-9695-5A5CF2F6F8F0@cisco.com>
References: <AD8F4360-02A4-4F22-9695-5A5CF2F6F8F0@cisco.com>
Message-ID: <5b19d45c2e756292e6ae85bd2dc00ea1@xs4all.nl>
X-Sender: stokcons@xs4all.nl
User-Agent: XS4ALL Webmail
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima-bootstrap/x1tWbX4NsS5aFKpChLjOs7Do0SA>
Subject: Re: [Anima-bootstrap] Voucher signing method
X-BeenThere: anima-bootstrap@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Mailing list for the bootstrap design team of the ANIMA WG <anima-bootstrap.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima-bootstrap>, <mailto:anima-bootstrap-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima-bootstrap/>
List-Post: <mailto:anima-bootstrap@ietf.org>
List-Help: <mailto:anima-bootstrap-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima-bootstrap>, <mailto:anima-bootstrap-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 07:01:25 -0000

Hi Max,

thanks for the examples.
During IETF98, I was the one to speak up in favour of #pkcs7;
One reason only: It is transported by EST that is used by BRSKI.
All the code is already present.
Doing JWS/COSE or JWT/CWT needs additional code.
I am sensitive to the payload size argument though.

But, suppose the JWS or JWT is adopted to reduce the payload,
where will the optimizations stop?
Will you envisage to optimize the EST payloads as well?

Cheerio,

Peter



Max Pritikin (pritikin) schreef op 2017-04-18 20:08:
> Folks, in Chicago we discussed the signing method for vouchers.
> 
> Because the voucher is JSON, and there is expectation of a CBOR
> encoding for future work, there is an open discussion point about
> using the JWS/COSE signing methods; if not JWT/CWT. There was brief
> discussion of this at IETF98 and one person indicated they liked
> PKCS7, others indicates JWT and others did not speak up. Fully meeting
> minutes might provide more information but my recollection was that
> we’d move the discussion to the list. This thread is for that
> discussion.
> 
> The current text of draft-ietf-anima-voucher-02 is:
> 
>> The voucher is signed a PKCS#7 SignedData structure, as specified by 
>> Section 9.1
>> of [RFC2315], encoded using ASN.1 distinguished encoding rules (DER), 
>> as specified in ITU-T X.690.
> 
> 
> For concrete discussion, the proposed change is:
> 
>> The voucher is a JWT [RFC7519] signed token.
> 
> 
> I’ve updated my tooling that was used during the IETF98 hackathon to
> support a JWT token format; I did this as homework to be informed for
> the discussion.
> 
> MY POSITION: is that I appreciate the simplicity of the JWS signing
> and feel it is a good match for us. It was easy enough to implement,
> was a refreshing change from the ASN1 complexity of PKCS7, and seems
> to provide a good path toward CBOR/COSE in a future document without
> maintaining PKCS7/CMS technical debt or revisiting/rewriting too much.
> 
> QUESTION FOR THE WORKING GROUP: What is your position? Why?
> 
> What follows is a dump of the raw JWS before signing (the equivalent
> PKCS7/CMS structure would be the SignedData asn1 structures which is
> hard to capture). After that is an encoded and signed voucher. Further
> below is an example of a PKCS7 signed voucher.
> 
> Please note these characteristics:
> 
> a) From JWT RFC7519 "JWTs are always represented using the JWS Compact
> Serialization”. There are some JWT headers that overlap with voucher
> fields. I’m using JWT here; but the distinction between JWS/JWT is not
> fundamental to our discussion. The important point is JWS vs PKCS7.
> 
> b) I’ve added the x5c header to the JWS. This is used to carry the
> certificate chain of the signer. Our current voucher format indicates
> PKCS7 which supports an equivalent field called “CertificateSet
> structure”. Its in the BRSKI document that we specify "The entire
> certificate chain, up to and including the Domain CA, MUST be included
> in the CertificateSet structure”. With the transition to JWT we’d be
> specifying that the x5c header be fully populated up to an including
> the Domain CA etc.
> 
> c) From these examples we can’t directly compare size encodings. I
> don’t think this is a significant aspect of the conversation but can
> create comparable examples if folks feel that is necessary.
> 
> The dumps:
> 
> A debug dump of the JWT form before encoding:
> {
>    "typ": "JWT",
>    "alg": "ES256",
>    "x5c":
> ["MIIBdjCCAR2gAwIBAgIBATAKBggqhkjOPQQDAjArMRYwFAYDVQQKDA1DaXNjbyBTeXN0ZW1zMREwDwYDVQQDDAhWZW5kb3JDQTAeFw0xNzA0MDMxNTE1NDVaFw0xODA0MDMxNTE1NDVaMC0xFjAUBgNVBAoMDUNpc2NvIFN5c3RlbXMxEzARBgNVBAMMClZlbmRvck1BU0EwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT9GTrDd0GWgwcuSy8LCn0waMeknpLznajZzqWlLhrPwshgIPIPvbyY6IyCo4uBYU/e4OO6TQD9UVLlyU5R6cA6ozAwLjALBgNVHQ8EBAMCBaAwHwYDVR0jBBgwFoAUR4oEpb4YFuelkMrQjlnKtM01ovEwCgYIKoZIzj0EAwIDRwAwRAIgAQ8YR2IdLodEE8k+JxpBOIAGuzCeT9BmFOVhFUb8eJMCIC23Goss6manRjNSmh6+2oB9tsRbjmnnwuMlDXR8fzug",
> "MIIBnTCCAUOgAwIBAgIJAK9Pd5G+/r0UMAoGCCqGSM49BAMCMCsxFjAUBgNVBAoMDUNpc2NvIFN5c3RlbXMxETAPBgNVBAMMCFZlbmRvckNBMB4XDTE3MDQwMzE0MTAwNVoXDTE4MDQwMzE0MTAwNVowKzEWMBQGA1UECgwNQ2lzY28gU3lzdGVtczERMA8GA1UEAwwIVmVuZG9yQ0EwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASunsQL2PVOSFWWp0oCjlqF8iVPPpEgJct931CZQ6assp07otmfgZqXsk1JYRTlKCGjROxrAiVRQsB54ioA0yu0o1AwTjAdBgNVHQ4EFgQUR4oEpb4YFuelkMrQjlnKtM01ovEwHwYDVR0jBBgwFoAUR4oEpb4YFuelkMrQjlnKtM01ovEwDAYDVR0TBAUwAwEB/zAKBggqhkjOPQQDAgNIADBFAiEA+SSOhiNQ23RWA76kZ/2u70FCpU8OsU7X9IRiWGDgIAgCIFLu8FnJuqPx10sgHvIzqI5BgOcwCa5vFQZdCDBHIx18"]
> }
> .
> {
>    "ietf-voucher:voucher": {
>        "assertion": "logging",
>        "domain-cert-trusted-ca": "-----BEGIN
> CERTIFICATE-----\nMIIBUjCB+qADAgECAgkAwP4qKsGyQlYwCgYIKoZIzj0EAwIwFzEVMBMGA1UEAwwM\nZXN0RXhhbXBsZUNBMB4XDTE3MDMyNTIyMTc1MFoXDTE4MDMyNTIyMTc1MFowFzEV\nMBMGA1UEAwwMZXN0RXhhbXBsZUNBMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nRVrNlEN2ocYscAILBU7NggABo0JgA1rEGdYdCQj1nHKL6xKONJIUfBibe6iMVYd3\nRUmPwaPiHNZJ98kRwHIwnKMvMC0wDAYDVR0TBAUwAwEB/zAdBgNVHQ4EFgQU+dVX\naXoucU1godNF0bycS1U5W54wCgYIKoZIzj0EAwIDRwAwRAIgNsCGjpEjuvz6OKJ/\n3rOvMc2ZfDhD02K+0PCVFJGCQGwCIAzf3BS6x9kKSROJJvxDSpg0QK9+b9LSFkbZ\nM1PW98AN\n-----END
> CERTIFICATE-----\n",
>        "nonce": "ea7102e8e88f119e",
>        "serial-number": "PID:1 SN:widget1",
>        "serial-number-issuer": 
> "36097E3DEA39316EA4CE5C695BE905E78AF2FB5A",
>        "version": "1"
>    }
> }
> .
> [signature goes here]
> 
> As per JWT RFC7519 this is what it looks like after URL-safe encoding.
> You can see that now the signature is included  (look to the second to
> last line to see the second “.” followed by a valid signature):
> 
>
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
Z1Wkc5eVEwRXdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBU3Vuc1FMMlBWT1NGV1dwMG9DamxxRjhpVlBQcEVnSmN0OTMxQ1pRNmFzc3AwN290bWZnWnFYc2sxSllSVGxLQ0dqUk94ckFpVlJRc0I1NGlvQTB5dTBvMUF3VGpBZEJnTlZIUTRFRmdRVVI0b0VwYjRZRnVlbGtNclFqbG5LdE0wMW92RXdId1lEVlIwakJCZ3dGb0FVUjRvRXBiNFlGdWVsa01yUWpsbkt0TTAxb3ZFd0RBWURWUjBUQkFVd0F3RUIvekFLQmdncWhrak9QUVFEQWdOSUFEQkZBaUVBK1NTT2hpTlEyM1JXQTc2a1ovMnU3MEZDcFU4T3NVN1g5SVJpV0dEZ0lBZ0NJRkx1OEZuSnVxUHgxMHNnSHZJenFJNUJnT2N3Q2E1dkZRWmRDREJISXgxOCJdfQ.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
UMwd0RBWURWUjBUQkFVd0F3RUIvekFkQmdOVkhRNEVGZ1FVK2RWWFxuYVhvdWNVMWdvZE5GMGJ5Y1MxVTVXNTR3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnTnNDR2pwRWp1dno2T0tKL1xuM3JPdk1jMlpmRGhEMDJLKzBQQ1ZGSkdDUUd3Q0lBemYzQlM2eDlrS1NST0pKdnhEU3BnMFFLOStiOUxTRmtiWlxuTTFQVzk4QU5cbi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS1cbiIsIm5vbmNlIjoiZWE3MTAyZThlODhmMTE5ZSIsInNlcmlhbC1udW1iZXIiOiJQSUQ6MSBTTjp3aWRnZXQxIiwic2VyaWFsLW51bWJlci1pc3N1ZXIiOiIzNjA5N0UzREVBMzkzMTZFQTRDRTVDNjk1QkU5MDVFNzhBRjJGQjVBIiwidmVyc2lvbiI6IjEifX0.QkTUpcxv6Ng6ylyWYnlqun-5SFhD1XwLIW1kD7Y9dNwioheNMcVnowkELl_EMClyOWuLvvWuoCHAcWz_UA0IGw
> 
> 
> Here is an equivalent PKCS7 voucher via asn1 dump. You’d have to look
> at the binary if you really want to decode it. This voucher was
> generated by MCR during the hackathon:
> 
> pritikin@ubuntu:~/src/brski-project/brski_msgs$ openssl asn1parse -in
> mcr.voucher.txt.pkcs7
>     0:d=0  hl=4 l=2706 cons: SEQUENCE
>     4:d=1  hl=2 l=   9 prim: OBJECT            :pkcs7-signedData
>    15:d=1  hl=4 l=2691 cons: cont [ 0 ]
>    19:d=2  hl=4 l=2687 cons: SEQUENCE
>    23:d=3  hl=2 l=   1 prim: INTEGER           :01
>    26:d=3  hl=2 l=  15 cons: SET
>    28:d=4  hl=2 l=  13 cons: SEQUENCE
>    30:d=5  hl=2 l=   9 prim: OBJECT            :sha256
>    41:d=5  hl=2 l=   0 prim: NULL
>    43:d=3  hl=4 l=1644 cons: SEQUENCE
>    47:d=4  hl=2 l=   9 prim: OBJECT            :pkcs7-data
>    58:d=4  hl=4 l=1629 cons: cont [ 0 ]
>    62:d=5  hl=4 l=1625 prim: OCTET STRING
>
:{"ietf-voucher:voucher":{"nonce":"62a2e7693d82fcda2624de58fb6722e5","created-on":"2017-01-01T00:00:00.000Z","device-identifier":"00-d0-e5-f2-00-01","assertion":"logged","owner":"MIIEEzCCAvugAwIBAgIJAK6rFouvk+7YMA0GCSqGSIb3DQEBCwUAMIGfMQsw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\nUY+6b2zA/yQaX
duPrVuxp7xCj11C/Ljlhl1/Hx16MJrV33MCbd+RKW711D/3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\nhNm0BcqdLK+z8ntt\n"}}
>  1691:d=3  hl=4 l= 557 cons: cont [ 0 ]
>  1695:d=4  hl=4 l= 553 cons: SEQUENCE
>  1699:d=5  hl=4 l= 431 cons: SEQUENCE
>  1703:d=6  hl=2 l=   3 cons: cont [ 0 ]
>  1705:d=7  hl=2 l=   1 prim: INTEGER           :02
>  1708:d=6  hl=2 l=   1 prim: INTEGER           :01
>  1711:d=6  hl=2 l=  10 cons: SEQUENCE
>  1713:d=7  hl=2 l=   8 prim: OBJECT            :ecdsa-with-SHA256
>  1723:d=6  hl=2 l=  77 cons: SEQUENCE
>  1725:d=7  hl=2 l=  18 cons: SET
>  1727:d=8  hl=2 l=  16 cons: SEQUENCE
>  1729:d=9  hl=2 l=  10 prim: OBJECT            :domainComponent
>  1741:d=9  hl=2 l=   2 prim: IA5STRING         :ca
>  1745:d=7  hl=2 l=  25 cons: SET
>  1747:d=8  hl=2 l=  23 cons: SEQUENCE
>  1749:d=9  hl=2 l=  10 prim: OBJECT            :domainComponent
>  1761:d=9  hl=2 l=   9 prim: IA5STRING         :sandelman
>  1772:d=7  hl=2 l=  28 cons: SET
>  1774:d=8  hl=2 l=  26 cons: SEQUENCE
>  1776:d=9  hl=2 l=   3 prim: OBJECT            :commonName
>  1781:d=9  hl=2 l=  19 prim: UTF8STRING        :Unstrung Highway CA
>  1802:d=6  hl=2 l=  30 cons: SEQUENCE
>  1804:d=7  hl=2 l=  13 prim: UTCTIME           :160507023655Z
>  1819:d=7  hl=2 l=  13 prim: UTCTIME           :180507023655Z
>  1834:d=6  hl=2 l=  77 cons: SEQUENCE
>  1836:d=7  hl=2 l=  18 cons: SET
>  1838:d=8  hl=2 l=  16 cons: SEQUENCE
>  1840:d=9  hl=2 l=  10 prim: OBJECT            :domainComponent
>  1852:d=9  hl=2 l=   2 prim: IA5STRING         :ca
>  1856:d=7  hl=2 l=  25 cons: SET
>  1858:d=8  hl=2 l=  23 cons: SEQUENCE
>  1860:d=9  hl=2 l=  10 prim: OBJECT            :domainComponent
>  1872:d=9  hl=2 l=   9 prim: IA5STRING         :sandelman
>  1883:d=7  hl=2 l=  28 cons: SET
>  1885:d=8  hl=2 l=  26 cons: SEQUENCE
>  1887:d=9  hl=2 l=   3 prim: OBJECT            :commonName
>  1892:d=9  hl=2 l=  19 prim: UTF8STRING        :Unstrung Highway CA
>  1913:d=6  hl=2 l= 118 cons: SEQUENCE
>  1915:d=7  hl=2 l=  16 cons: SEQUENCE
>  1917:d=8  hl=2 l=   7 prim: OBJECT            :id-ecPublicKey
>  1926:d=8  hl=2 l=   5 prim: OBJECT            :secp384r1
>  1933:d=7  hl=2 l=  98 prim: BIT STRING
>  2033:d=6  hl=2 l=  99 cons: cont [ 3 ]
>  2035:d=7  hl=2 l=  97 cons: SEQUENCE
>  2037:d=8  hl=2 l=  15 cons: SEQUENCE
>  2039:d=9  hl=2 l=   3 prim: OBJECT            :X509v3 Basic 
> Constraints
>  2044:d=9  hl=2 l=   1 prim: BOOLEAN           :255
>  2047:d=9  hl=2 l=   5 prim: OCTET STRING      [HEX DUMP]:30030101FF
>  2054:d=8  hl=2 l=  14 cons: SEQUENCE
>  2056:d=9  hl=2 l=   3 prim: OBJECT            :X509v3 Key Usage
>  2061:d=9  hl=2 l=   1 prim: BOOLEAN           :255
>  2064:d=9  hl=2 l=   4 prim: OCTET STRING      [HEX DUMP]:03020106
>  2070:d=8  hl=2 l=  29 cons: SEQUENCE
>  2072:d=9  hl=2 l=   3 prim: OBJECT            :X509v3 Subject Key 
> Identifier
>  2077:d=9  hl=2 l=  22 prim: OCTET STRING      [HEX
> DUMP]:0414258EDF2D51788F0CEC872A22FBD4FEBE0676EB07
>  2101:d=8  hl=2 l=  31 cons: SEQUENCE
>  2103:d=9  hl=2 l=   3 prim: OBJECT            :X509v3 Authority Key 
> Identifier
>  2108:d=9  hl=2 l=  24 prim: OCTET STRING      [HEX
> DUMP]:30168014258EDF2D51788F0CEC872A22FBD4FEBE0676EB07
>  2134:d=5  hl=2 l=  10 cons: SEQUENCE
>  2136:d=6  hl=2 l=   8 prim: OBJECT            :ecdsa-with-SHA256
>  2146:d=5  hl=2 l= 104 prim: BIT STRING
>  2252:d=3  hl=4 l= 454 cons: SET
>  2256:d=4  hl=4 l= 450 cons: SEQUENCE
>  2260:d=5  hl=2 l=   1 prim: INTEGER           :01
>  2263:d=5  hl=2 l=  82 cons: SEQUENCE
>  2265:d=6  hl=2 l=  77 cons: SEQUENCE
>  2267:d=7  hl=2 l=  18 cons: SET
>  2269:d=8  hl=2 l=  16 cons: SEQUENCE
>  2271:d=9  hl=2 l=  10 prim: OBJECT            :domainComponent
>  2283:d=9  hl=2 l=   2 prim: IA5STRING         :ca
>  2287:d=7  hl=2 l=  25 cons: SET
>  2289:d=8  hl=2 l=  23 cons: SEQUENCE
>  2291:d=9  hl=2 l=  10 prim: OBJECT            :domainComponent
>  2303:d=9  hl=2 l=   9 prim: IA5STRING         :sandelman
>  2314:d=7  hl=2 l=  28 cons: SET
>  2316:d=8  hl=2 l=  26 cons: SEQUENCE
>  2318:d=9  hl=2 l=   3 prim: OBJECT            :commonName
>  2323:d=9  hl=2 l=  19 prim: UTF8STRING        :Unstrung Highway CA
>  2344:d=6  hl=2 l=   1 prim: INTEGER           :01
>  2347:d=5  hl=2 l=  13 cons: SEQUENCE
>  2349:d=6  hl=2 l=   9 prim: OBJECT            :sha256
>  2360:d=6  hl=2 l=   0 prim: NULL
>  2362:d=5  hl=3 l= 228 cons: cont [ 0 ]
>  2365:d=6  hl=2 l=  24 cons: SEQUENCE
>  2367:d=7  hl=2 l=   9 prim: OBJECT            :contentType
>  2378:d=7  hl=2 l=  11 cons: SET
>  2380:d=8  hl=2 l=   9 prim: OBJECT            :pkcs7-data
>  2391:d=6  hl=2 l=  28 cons: SEQUENCE
>  2393:d=7  hl=2 l=   9 prim: OBJECT            :signingTime
>  2404:d=7  hl=2 l=  15 cons: SET
>  2406:d=8  hl=2 l=  13 prim: UTCTIME           :170325220308Z
>  2421:d=6  hl=2 l=  47 cons: SEQUENCE
>  2423:d=7  hl=2 l=   9 prim: OBJECT            :messageDigest
>  2434:d=7  hl=2 l=  34 cons: SET
>  2436:d=8  hl=2 l=  32 prim: OCTET STRING      [HEX
> DUMP]:552DD2EE5CBC4C7C4D207F98A2519F031EE10074D674265A7DD0CA73E68BE57D
>  2470:d=6  hl=2 l= 121 cons: SEQUENCE
>  2472:d=7  hl=2 l=   9 prim: OBJECT            :S/MIME Capabilities
>  2483:d=7  hl=2 l= 108 cons: SET
>  2485:d=8  hl=2 l= 106 cons: SEQUENCE
>  2487:d=9  hl=2 l=  11 cons: SEQUENCE
>  2489:d=10 hl=2 l=   9 prim: OBJECT            :aes-256-cbc
>  2500:d=9  hl=2 l=  11 cons: SEQUENCE
>  2502:d=10 hl=2 l=   9 prim: OBJECT            :aes-192-cbc
>  2513:d=9  hl=2 l=  11 cons: SEQUENCE
>  2515:d=10 hl=2 l=   9 prim: OBJECT            :aes-128-cbc
>  2526:d=9  hl=2 l=  10 cons: SEQUENCE
>  2528:d=10 hl=2 l=   8 prim: OBJECT            :des-ede3-cbc
>  2538:d=9  hl=2 l=  14 cons: SEQUENCE
>  2540:d=10 hl=2 l=   8 prim: OBJECT            :rc2-cbc
>  2550:d=10 hl=2 l=   2 prim: INTEGER           :80
>  2554:d=9  hl=2 l=  13 cons: SEQUENCE
>  2556:d=10 hl=2 l=   8 prim: OBJECT            :rc2-cbc
>  2566:d=10 hl=2 l=   1 prim: INTEGER           :40
>  2569:d=9  hl=2 l=   7 cons: SEQUENCE
>  2571:d=10 hl=2 l=   5 prim: OBJECT            :des-cbc
>  2578:d=9  hl=2 l=  13 cons: SEQUENCE
>  2580:d=10 hl=2 l=   8 prim: OBJECT            :rc2-cbc
>  2590:d=10 hl=2 l=   1 prim: INTEGER           :28
>  2593:d=5  hl=2 l=  10 cons: SEQUENCE
>  2595:d=6  hl=2 l=   8 prim: OBJECT            :ecdsa-with-SHA256
>  2605:d=5  hl=2 l= 103 prim: OCTET STRING      [HEX
> DUMP]:3065023100E60EAF73A69826077CF6B760AF9BD1C9BF723D0E84812B06B5A8B7C252362394D98E1B5B4C02D8ACD8DA5BD2248D51EA02306B5BDBDFFBB022A1E039A1847259D2E0AA332E12D24053B3E7ECA6D18EA821E29A53D93EE3BA4DE7D8C594C51736511C
> 
> And this is the “encoded” form:
> -----BEGIN PKCS7-----
> MIIKkgYJKoZIhvcNAQcCoIIKgzCCCn8CAQExDzANBglghkgBZQMEAgEFADCCBmwG
> CSqGSIb3DQEHAaCCBl0EggZZeyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJub25j
> ZSI6IjYyYTJlNzY5M2Q4MmZjZGEyNjI0ZGU1OGZiNjcyMmU1IiwiY3JlYXRlZC1v
> biI6IjIwMTctMDEtMDFUMDA6MDA6MDAuMDAwWiIsImRldmljZS1pZGVudGlmaWVy
> IjoiMDAtZDAtZTUtZjItMDAtMDEiLCJhc3NlcnRpb24iOiJsb2dnZWQiLCJvd25l
> ciI6Ik1JSUVFekNDQXZ1Z0F3SUJBZ0lKQUs2ckZvdXZrKzdZTUEwR0NTcUdTSWIz
> RFFFQkN3VUFNSUdmTVFzd1xuQ1FZRFZRUUdFd0pEUVRFUU1BNEdBMVVFQ0F3SFQy
> NTBZWEpwYnpFUE1BMEdBMVVFQnd3R1QzUjBZWGRoXG5NUm93R0FZRFZRUUtEQkZQ
> ZDI1bGNpQkZlR0Z0Y0d4bElFOXVaVEVSTUE4R0ExVUVDd3dJVG05MElGWmxcbmNu
> a3hHekFaQmdOVkJBTU1FbTkzYm1WeU1TNWxlR0Z0Y0d4bExtTnZiVEVoTUI4R0NT
> cUdTSWIzRFFFSlxuQVJZU2IzZHVaWEl4UUdWNFlXMXdiR1V1WTI5dE1CNFhEVEUz
> TURNeU5URTJNamt6TkZvWERURTNNRFF5XG5OREUyTWprek5Gb3dnWjh4Q3pBSkJn
> TlZCQVlUQWtOQk1SQXdEZ1lEVlFRSURBZFBiblJoY21sdk1ROHdcbkRRWURWUVFI
> REFaUGRIUmhkMkV4R2pBWUJnTlZCQW9NRVU5M2JtVnlJRVY0WVcxd2JHVWdUMjVs
> TVJFd1xuRHdZRFZRUUxEQWhPYjNRZ1ZtVnllVEViTUJrR0ExVUVBd3dTYjNkdVpY
> SXhMbVY0WVcxd2JHVXVZMjl0XG5NU0V3SHdZSktvWklodmNOQVFrQkZoSnZkMjVs
> Y2pGQVpYaGhiWEJzWlM1amIyMHdnZ0VpTUEwR0NTcUdcblNJYjNEUUVCQVFVQUE0
> SUJEd0F3Z2dFS0FvSUJBUUM0UVlBRW5UdFhnaUtxc2ZTVllrZ2tIZGRGY1AzNFxu
> T1UzWVA3aWJyc2d4MGk5Y3lqN3hPeldIT0YyUHNvS0JnVFJINzVNU01oVGw1VWlk
> ckNzemxsdUsrcXA0XG5kM1pnMzFvUU0vSERteVJKeVJwWStQQzFuNVZ4L01qNVZh
> Z1JRYnFHN1hURFFDZkNyaHFJS3JLQlR1UFFcbjR2WUtlTDB0UWs0VUpsUElvWlhF
> bUJrNWRrbi9Gemw5QWZJWlN2VXpRMVFBaFE5b2FMejVOZjVNV0hQS1xuVVkrNmIy
> ekEveVFhWGR1UHJWdXhwN3hDajExQy9MamxobDEvSHgxNk1KclYzM01DYmQrUktX
> NzExRC8zXG4wWGxXU3FFcHJkYkticXc4V01QanVKMWFvWDhhUUVXb0wreGJvbVJR
> UUpKb0ZhTVBsemdkRGNmb0FIRFVcblRzeGQwK0ZOOHBGSEFnTUJBQUdqVURCT01C
> MEdBMVVkRGdRV0JCU3FwNVR3UXRIc1F5OW9ZTFpiMEQ1V1xuK2xpY0hEQWZCZ05W
> SFNNRUdEQVdnQlNxcDVUd1F0SHNReTlvWUxaYjBENVcrbGljSERBTUJnTlZIUk1F
> XG5CVEFEQVFIL01BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQmdTUUdhY2p3eG1i
> UnJyQmhXNjNnWTVLYVdcbmltNzZyRzQ1cDN1aDlBOFdVZk1XcnlDVXVmckZPbS9R
> RUpubFVVSzNRWDRLRVZqMmV5d2I5Z3Nma2lDRVxueWFKenhlNjY1UTJCcld3ZTNy
> R1ZrQWhPL2ZuOHVwZWM0RTFBU2MzMUFTYUY4bStwWXFDQ1BTZmxMNWtWXG5NZWZI
> RzRsRXMzWEprSGNlQ2xSenlYdmpiNUtqL3UwMkM1WUNqY0FMWWQ4L2tjU2JmNGpv
> ZTFHdWZ2S0ZcbjV3dlBCUGtSVmZiVzJLYWdMK2p3NjJqKzhVNm9CN0ZieHRGeXFR
> UDFZb1pHaWE5TWtQS25LK3lnNW8vMFxuY1o1N2hnazRtUW1NMWk4MlJyVVpRVm9C
> UDNDRDVMZEJKWmZKb1hzdFJsWGU2ZFg3K1Rpc2RTQXNwcDVlXG5oTm0wQmNxZExL
> K3o4bnR0XG4ifX2gggItMIICKTCCAa+gAwIBAgIBATAKBggqhkjOPQQDAjBNMRIw
> EAYKCZImiZPyLGQBGRYCY2ExGTAXBgoJkiaJk/IsZAEZFglzYW5kZWxtYW4xHDAa
> BgNVBAMME1Vuc3RydW5nIEhpZ2h3YXkgQ0EwHhcNMTYwNTA3MDIzNjU1WhcNMTgw
> NTA3MDIzNjU1WjBNMRIwEAYKCZImiZPyLGQBGRYCY2ExGTAXBgoJkiaJk/IsZAEZ
> FglzYW5kZWxtYW4xHDAaBgNVBAMME1Vuc3RydW5nIEhpZ2h3YXkgQ0EwdjAQBgcq
> hkjOPQIBBgUrgQQAIgNiAASqSixrp/Zj0Omnzho8bLONYgrPsxrL3DTmJkqiyZ4T
> we/LK3+/iwBgWnohKrOVvO1POtaDHdBuiUjX2CBM66Fg18NSyvwzEJEtFLutFL7S
> cjDYA8JzPLClw0zt/YBad+CjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/
> BAQDAgEGMB0GA1UdDgQWBBQljt8tUXiPDOyHKiL71P6+BnbrBzAfBgNVHSMEGDAW
> gBQljt8tUXiPDOyHKiL71P6+BnbrBzAKBggqhkjOPQQDAgNoADBlAjB6dhfujag2
> xQEgOUr19iWwAyOhu9nHUfcqXhGb6i3nDuKfeIU7Am/WzvAAmqAWXyQCMQDTLKaN
> vf2k//JcW+4+xapVhW83t8UdlMk0+Eoe/YnKPj/a1WIOuzzh6zJtCYjlimYxggHG
> MIIBwgIBATBSME0xEjAQBgoJkiaJk/IsZAEZFgJjYTEZMBcGCgmSJomT8ixkARkW
> CXNhbmRlbG1hbjEcMBoGA1UEAwwTVW5zdHJ1bmcgSGlnaHdheSBDQQIBATANBglg
> hkgBZQMEAgEFAKCB5DAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3
> DQEJBTEPFw0xNzAzMjUyMjAzMDhaMC8GCSqGSIb3DQEJBDEiBCBVLdLuXLxMfE0g
> f5iiUZ8DHuEAdNZ0Jlp90Mpz5ovlfTB5BgkqhkiG9w0BCQ8xbDBqMAsGCWCGSAFl
> AwQBKjALBglghkgBZQMEARYwCwYJYIZIAWUDBAECMAoGCCqGSIb3DQMHMA4GCCqG
> SIb3DQMCAgIAgDANBggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIB
> KDAKBggqhkjOPQQDAgRnMGUCMQDmDq9zppgmB3z2t2Cvm9HJv3I9DoSBKwa1qLfC
> UjYjlNmOG1tMAtis2Npb0iSNUeoCMGtb29/7sCKh4DmhhHJZ0uCqMy4S0kBTs+fs
> ptGOqCHimlPZPuO6TefYxZTFFzZRHA==
> -----END PKCS7-----
> 
> 
> _______________________________________________
> Anima-bootstrap mailing list
> Anima-bootstrap@ietf.org
> https://www.ietf.org/mailman/listinfo/anima-bootstrap