[dispatch] [art] [AS2 Specification Modernization] draft-petta-rfc4130bis-00 - Proposed Updates
Debra Petta <debrap@drummondgroup.com> Thu, 10 July 2025 17:01 UTC
Return-Path: <debrap@drummondgroup.com>
X-Original-To: dispatch@mail2.ietf.org
Delivered-To: dispatch@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 3B4984287F70; Thu, 10 Jul 2025 10:01:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.866
X-Spam-Level:
X-Spam-Status: No, score=-1.866 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.232, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=drummondgroup.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fwoZo9MLsxHn; Thu, 10 Jul 2025 10:01:57 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2092.outbound.protection.outlook.com [40.107.93.92]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 1FCE64287F3A; Thu, 10 Jul 2025 10:01:56 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jpyGHuj57sd/h1sU/MCfaNl8MfQx3p4g/9Ak7N1hF8LvmNDQI2PaxrQwxai1kNl2q2fdtS9zFC9SGuIZNB4K5fpFb6fPboXzsMNnMnTHVg9UPsyiyF0myM25C6GwWTWJj7ewnvTAnzMyEMbkPDTOtQ64xe0U8Z6z3iU/hXWBVHwhsN4JNGreoZkpS5hdsy7O7H8qP/0OBwTj0EskaQcUUCyDpRy8r1FG6A466LmnWMEvBeij73cC3ndwLTHhbq/Jo6LStkI4v9gS28+J52jmcmxPtBgi3YX1O5+e9F11vI+lnDAQ/CMwXdiKwdEcBwphsX5sc9M5+zrAPf3VRu63Cw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NzMQBt1rpZsWAIuoo6D96rmCv9cbDeFH3nDpOhvyf5w=; b=v6SJ3YFH6AvLLAQLeCzpA3wUrRk2Gh4YJcRAfgYJ0uT2/Nn3Ka7lR4Xb0TguaWnM2ePz1qThDUk5AOyEpnlhncIoXyeMSIlirxZRRqXz2JATIm7ycLw0JSuU9yyar536RgO/kd4QfRpG03Y0X8jajIsjfZ5RnQGBeT7963S8aSxbeTm50Z8r8mZJ2jijpCoYoHhSvrRO+CwQaP0sU0OPYyPg/NqEsfK98oBlOegnc99mAyaJzbvmik7l/sEOK1W9K3nRyiQjwn8H5UNJbHUmSkeWDWIY8r+QbEhIz2gqhLvnPm6iDonPrXsucquqYl/LKpqnfqq2GG/MksVjIj0klw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=drummondgroup.com; dmarc=pass action=none header.from=drummondgroup.com; dkim=pass header.d=drummondgroup.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=drummondgroup.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NzMQBt1rpZsWAIuoo6D96rmCv9cbDeFH3nDpOhvyf5w=; b=lm3GlYHzBc6snfE7SahnpAHUv8MTP7xeIvplZk8Bq/ROBq9TDGh4JO5nj9UZIT7X9BDJQLMPESpCVOoA47YIvFLHyXkqMmrCVvgjLtjP+pcDZZLg1ixXJT/AjJdZQDYkA9i0Oe+Kh/Otubxh3IBcrCXnJ0XOZu0xKtl6GME0SZMV+J1Jza2DiQkYMpN1aWV6+gwzs0iITbo3K+VF8vyZLmIsC6c5aNCKwjkOkkZ+Gvu72OatRJs9ILVYDamuwhaQYgomHVbjati26khGx6KmqFKY3fke38XfJGrIx+tMwdnVnTKLN6BBP15fZYaTgDJmETx4PJiEqQiga92T2YvOCQ==
Received: from BL3PR11MB6386.namprd11.prod.outlook.com (2603:10b6:208:3b6::13) by IA0PR11MB7743.namprd11.prod.outlook.com (2603:10b6:208:401::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8901.23; Thu, 10 Jul 2025 17:01:51 +0000
Received: from BL3PR11MB6386.namprd11.prod.outlook.com ([fe80::8980:8e55:319c:6085]) by BL3PR11MB6386.namprd11.prod.outlook.com ([fe80::8980:8e55:319c:6085%7]) with mapi id 15.20.8901.024; Thu, 10 Jul 2025 17:01:50 +0000
From: Debra Petta <debrap@drummondgroup.com>
To: ART Area <art@ietf.org>
Thread-Topic: [art] [AS2 Specification Modernization] draft-petta-rfc4130bis-00 - Proposed Updates
Thread-Index: AdvxqIBIsoWDA8+1Q+W94RdI1xEg8Q==
Date: Thu, 10 Jul 2025 17:01:50 +0000
Message-ID: <BL3PR11MB63865505DB68EFC77DB43992CC48A@BL3PR11MB6386.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=drummondgroup.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BL3PR11MB6386:EE_|IA0PR11MB7743:EE_
x-ms-office365-filtering-correlation-id: 9e767d89-6aec-405d-6977-08ddbfd37676
x-ld-processed: 97a396e6-e1ec-420f-a7be-5063bf6273a2,ExtAddr
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|376014|7416014|13003099007|8096899003|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BL3PR11MB6386.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(7416014)(13003099007)(8096899003)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BL3PR11MB63865505DB68EFC77DB43992CC48ABL3PR11MB6386namp_"
MIME-Version: 1.0
X-OriginatorOrg: drummondgroup.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BL3PR11MB6386.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9e767d89-6aec-405d-6977-08ddbfd37676
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jul 2025 17:01:50.2348 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 97a396e6-e1ec-420f-a7be-5063bf6273a2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6tk/4Di/OMfPD62Asok/WQbAI3rxlt0nQ3wZR0edTn71c15T/ZRCZEogYUViXFh6mgBof5Rbs7V6SvOWi25EawWJM24V+k92LBFOAItFuQ4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR11MB7743
Message-ID-Hash: WWXWMAG6GBILOAYUSZDHCUJRRIN2EFE2
X-Message-ID-Hash: WWXWMAG6GBILOAYUSZDHCUJRRIN2EFE2
X-MailFrom: debrap@drummondgroup.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dispatch.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "dispatch@ietf.org" <dispatch@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [dispatch] [art] [AS2 Specification Modernization] draft-petta-rfc4130bis-00 - Proposed Updates
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/RMl_5w7beTNfnV_D9MAtSAImktA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Owner: <mailto:dispatch-owner@ietf.org>
List-Post: <mailto:dispatch@ietf.org>
List-Subscribe: <mailto:dispatch-join@ietf.org>
List-Unsubscribe: <mailto:dispatch-leave@ietf.org>
I have been working with a group of AS2 vendors over the past several months to establish a list of proposed changes to the original AS2 specification, RFC 4130. As RFC 4130 is used as the authoritative standard for AS2 designers, developers, and quality assurance engineers, we believe that the following proposed updates would make it less ambiguous and would provide better guidance on the use of updated algorithms, security standards and best practices. Please use this draft https://datatracker.ietf.org/doc/draft-petta-rfc4130bis/ as a reference. It is currently an exact copy of the original RFC 4130 draft, but it is where all updates will be made. 1. First and foremost: backward compatibility is essential to interoperability. Note Postel's Law (i.e., the Robustness Principle): "Be conservative in what you send and liberal in what you accept". We MUST *not* include any breaking changes in the updated AS2 Draft. 1. Since support of AS1 is rare and this document is specifically used for AS2, remove the references to AS1 and SMTP that are included throughout this draft. AS2 is mature enough to stand on its own and doesn't need the references to AS1. 1. Although RFCs referenced in the AS2 Draft may have been deprecated, it is important that these specifications continue to be used to maintain backward compatibility. 1. Although the general transport of AS2 over HTTP is still acceptable, unless the payload content is encrypted, many AS2 implementations now require transport over HTTPS. (Include this statement in section 5.1). 1. When sending over HTTPS using TLS, TLS 1.2 or greater SHOULD be used for security purposes. Insecure SSL versions and cipher suites SHOULD be prohibited. (Section 5.1) 1. The usage of SHA-1 and MD5 (referenced in Section 1.2, 7.3, and 7.4.2) should either be replaced or used in addition to the SHA2 algorithms, minimally SHA-256. Usage of SHA-384 and SHA-512 should be optional. SHA-224 is generally not used. 1. Expand on the usage of the "signed-receipt-micalg" header value in section 7.3. If it contains a list of multiple algorithms, the order of the supported algorithms is from left to right. Is it necessary to include more than one algorithm in that list? Wouldn't this require computation and internal storage of the MIC value(s) using the list of multiple algorithms? Does any AS2 implementation currently do this? If not, we should change the draft to only include one algorithm instead for simplification of the signing and MIC computations. 1. Since the sha1 algorithm is deprecated and is being phased out, it should only be used in real-world scenarios in those situations where a trading partner cannot support SHA2 algorithms. It is up to the sender to determine the value in the "signed-receipt-micalg" header and in real-world scenarios, this value SHOULD be a SHA2 algorithm, unless SHA2 is not supported. 1. Security Considerations (Section 9) needs to be modified to remove the references to Triple DES (3DES) in favor of AES algorithms (AES-128 supported at a minimum, with AES-192 and AES-256 optionally supported). 1. When encrypting the payload, multiple recipients SHOULD be supported. This is needed for recoverable decryption (where the sender also encrypts using its own certificate). It is also needed to handle the EU rule that may require a back door for the authorities. (Add to section 7.1). Refer to RFC 2630 Section 6 (https://datatracker.ietf.org/doc/html/rfc2630#section-6) for more details. 1. In section 4.2, we should also include "application/octet-stream" as an acceptable content-type for transmitting binary content and as a fallback for other content that does not have a supported content-type. Should we also include support for JSON content, or would this break existing implementations? 1. Add a note in section 4.1 that MIME header names are *not* case sensitive. 1. Also note that MIME headers SHOULD *not* be folded because they cause interoperability issues in some web servers (e.g., IIS) and in other back-end servers (e.g., Jetty). 1. The AS2 System Identifier, i.e., AS2-To and AS2-From values, MUST be quoted if the value contains an embedded space, and MUST *not* be quoted if it does not contain an embedded space. This is already stated in section 6.2, but it needs to be clarified because it is often an interoperability issue in real-world scenarios. 1. Although MIME header names, i.e., that portion of the headers to the left of the colon (:) are *not* case sensitive, values for AS2 System Identifiers (that portion to the right of the colon) *are* case sensitive. Make sure that this distinction is specifically stated in section 6.2. 1. If Message Identifiers are composed using AS2 identifiers or other identifiers that include embedded spaces, those embedded spaces MUST be replaced with other characters (such as an underscore) when creating the Message-ID since some AS2 implementations include conformance checking of the value of this field based on RFC 2822, section 3.6.4 (https://datatracker.ietf.org/doc/html/rfc2822#section-3.6.4).<https://datatracker.ietf.org/doc/html/rfc2822%23section-3.6.4).> Add this to section 5.3.3. 1. Section 7.3 currently states that the "Disposition-Notification-To" value MUST include an email address, but this is no longer true. This was originally required for AS1 over SMTP, but in AS2 this value may be a URL, a fully qualified host name, an AS2 identifier or some other implementation-specific value. 1. When an asynchronous MDN is requested, the receiver MUST return the "200 OK" response and close the initial connection before returning the MDN over a new/separate HTTP or HTTPS connection. Add this to section 7. 1. The Message-ID in the MDN is *not* a required header however the Original-Message-ID header *is* required. Include this statement in section 7. 1. The Final-Recipient field MUST always be present in the human-readable portion of the MDN. Add this statement to section 7.4.3. 1. In section 7.4.3 (and/or 7.5.3 and 7.5.4 ), add "unknown-trading-relationship" as an additional, valid MDN AS2-disposition-modifier-extension type. Also include: * "Duplicate-filename-encountered, unique filename generated" * "Illegal filename, unique filename generated" * "Filename for payload not provided, unique filename generated" These are used by AS2 implementations that support FN-MDN, i.e., the error/warning checking of the file names and returning of the responses through the MDN disposition. 1. It was suggested that the "unsupported content-type" be added as another MDN "Error" or "Failure" disposition modifier, however this is already addressed in section 7.5.3 (as "Failure: unsupported format"). Should we include it or is it redundant? 1. In section 7.5.4, also include "Error: decompression-failed" as a valid disposition-modifier. (The original AS2 Draft was created before compression was fully supported.) 1. Currently the AS2-Version header value specified in section 6.1 only includes version 1.0 for initial AS2 implementations, and version 1.1 that includes support for compression. Version 1.2 has since been added for support of the EDIINT-features header (https://datatracker.ietf.org/doc/rfc6017/) and also needs to be included in this draft for the sake of completeness. 1. Also include a reference to the optional "EDIINT-Features" Header (https://datatracker.ietf.org/doc/rfc6017/) in Section 6 and include an expansion on the other features that have since been added. Note that CEM, multiple-attachments, and AS2-Reliability were included in the initial list of possible supported features, but we should also include them again to make sure all features are referenced. Also include AES, SHA2 and BA (Authentication using the Authorization MIME header) to let trading partners know that those features are also supported: * Certificate Exchange Messaging (CEM) - https://datatracker.ietf.org/doc/html/draft-meadors-certificate-exchange-12 (expired) * AS2 Reliability - also includes AS2 Restart - https://datatracker.ietf.org/doc/draft-duker-as2-reliability/ (expired) and http://tools.ietf.org/html/draft-harding-as2-restart-02 (expired) * Multipart-Attachments (MA) - https://datatracker.ietf.org/doc/rfc6362/ * Chunked-Transfer-Encoding (CTE) - https://datatracker.ietf.org/doc/html/rfc9112#name-chunked-transfer-coding * Filename Preservation (FN) - https://datatracker.ietf.org/doc/draft-harding-ediint-filename-preservation/ (expired) * Filename Preservation with Multipart Attachments (FN-MA) - applies both FN and MA specifications * Filename Preservation and Error Checking with MDN error/warning notification (FN-MDN) (https://www.rfc-editor.org/rfc/rfc3798) 1. Add a new (optional) "AS2-Product" header to section 6 that includes the product name and version of the sender's AS2 engine. Some AS2 implementations need this for their back-end systems to activate special settings in support of a given trading partner's product. Expand on the reasoning for this a little more. If we include all supported capabilities in the "EDIINT-Features" header, is this header still necessary? 1. Include the suggestion that only binary encoding SHOULD be used for simplification (section 5.2.1). Base64 encoding of the entire payload content only adds more processing overhead to the message. Quoted-printable and 7-bit encoding are carry-overs from AS1/SMTP implementations and is unnecessary for transport over HTTP, however for the sake of backward compatibility, we can't enforce this. 1. Since the content sent over HTTP should not change in transit, receiving AS2 servers may compute the MIC value without first canonicalizing the content. To avoid MIC computation issues and to maintain backward compatibility, 8-bit binary encoding SHOULD be used, or if that is not possible canonicalization MUST still be performed by the sender *before* computing any signature or MIC and the canonical content being sent. Add this statement to section 7.3.1 where the MIC computation is discussed. 1. Certificate serial numbers MUST *not* be negative, per RFC 3280. (https://datatracker.ietf.org/doc/html/rfc3280#section-4.1.2.2) Add this statement to section 8. 1. Certificates used for enveloping the message or for secure transport (over SSL/TLS) SHOULD have a minimum key length of 2048 bits. (Many AS2 implementations now require this for security purposes.) Add this to section 8. 1. Section 9.2 needs to be updated to state that if a self-signed certificate is used for SSL/TLS, it SHOULD contain a Subject Alternative Name (SAN) extension that includes the hostname and/or IP address of the sender. This is another security requirement in some AS2 implementations. If included, this certificate extension MUST be marked as non-critical. 1. Section 8 needs to be reworked to discuss a method for automatically exchanging revoked or expired certificates using Certificate Exchange Messaging (CEM) (refer to https://datatracker.ietf.org/doc/html/draft-meadors-certificate-exchange-12) - expired draft. * Background: Twenty-five years ago, a certificate could have a validity range of up to five years. More and more, security requirements in big organizations limit the validity period of certificates to one year or less. However, the manual exchange and installation of updated certificates becomes unsustainable when the number of trading partners is large and the validity period is short. * It has also been suggested that an AS2 GET operation could be used during the initial setup to retrieve the signing, encryption, and SSL/TLS certificates for a new trading relationship, although I'm not sure if this is secure because it may allow "bad actors" to gain access to the trading relationship, unless we specifically state that the pre-exchanged AS2-To/AS2-From identifiers (and/or possibly some other security mechanism) first be used to validate the trading relationship. If this is a valid option, we would need to expand on this new/optional feature. Maybe we could also include the EDIINT-Features header in the initial AS2 GET to let the trading partner know about the sender's supported capabilities during the initial setup phase. Then the receiver's capabilities could also be returned as part of the response. 1. Retry functionality and behavior needs to be explicitly defined in section 5.5 and/or a reference to that link should be included (https://datatracker.ietf.org/doc/draft-duker-as2-reliability/) - also an expired draft. We've already had internal discussions that some of the content in that document is out of date and is not relevant anymore, specifically the return of the HTTP 102 (Processing) status code, so we should also include a statement about this in the updated AS2 Draft. 1. HTTP Error Recovery through AS2 Restart functionality (also in section 5.5) needs to be explicitly defined and/or include a reference to that link (http://tools.ietf.org/html/draft-harding-as2-restart-02) -- also an expired draft. 1. All examples should be modernized with up-to-date headers, encryption/signature examples and common payload types. (Section 12 / Appendix A) Please reply with any comments or suggestions about any items in this list or if you have any additions, feel free to add them. Once we have an agreement on the list of updates, we can start making changes to the original draft. Thanks, Debra Petta Drummond Group www.drummondgroup.com