Re: [lamps] AD review of draft-ietf-lamps-cmp-algorithms-07

"Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com> Thu, 04 November 2021 18:04 UTC

Return-Path: <hendrik.brockhaus@siemens.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 166033A0C61 for <spasm@ietfa.amsl.com>; Thu, 4 Nov 2021 11:04:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=siemens.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TrW-5z9xfnkN for <spasm@ietfa.amsl.com>; Thu, 4 Nov 2021 11:04:08 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2062b.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1b::62b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A51323A0C90 for <spasm@ietf.org>; Thu, 4 Nov 2021 11:04:07 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R2IwIG3QWJZ29KhKxbQH6GbvKHSvJwxZtN9mrVZjqs3r0QQ/ot3PC7684mYcyOuOXsveXgCHoxxdrS5E9m+phPS8u5j8eltu6GZIl1jS2EDm6pVch/YrVr0PKa7D9mESKv+VtV/dx0cRvKHe4hxBbFgfsHTlVc3q4GS6GflIJVzrODIZmAQ8A3OHeXIVr3W4SEHD3vD2maEqHUMUoZL46hfj6j7QBv62DzckXtrx+Itgz0quA1IGujQfZKDAvfKrGJbJ7rMsRHpT1fUdkxykVbxFCwL0sLhWTlIXyWhJgTcOKpWsUiHkksRNzwFJ80AAi/kkKmWNZxoM3I4cxA6jqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TAnkGQCJbGbwqfdASfRfQw8+N5jAvD9Raiyvuju9lIc=; b=nJrnEWafWeJj0dXR1Y6SJGR1ftS60GFk8bd5i+iwclM29CBjoD1yriAzH6E3MbFmPnUnbF/xOBFOUdqNPmJ+AXblQbZ0ZiqQEt43nCMeT3JMF0VkU8t9j07pEI0imlUS913YEI5SLi6b8WEktV64oWhn6bHAYArs3/oLdTAQAYhm2AFL+zcv6rdhtPJaT3yvw8h5tivLA62DZwF91oMHDzI8zLK6v/EkztDwbwAcPqgYtr7lD+Rbh7guKLNFLXoqqC0yIPfMWWVzGBrAb4SnmtfouL0/hl5IsYq4oUNI8gAaoxHFrvDIWsXB2Otod+Y1t7DoDSThmmJdFBo/sV8TSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TAnkGQCJbGbwqfdASfRfQw8+N5jAvD9Raiyvuju9lIc=; b=wb6IqXZ/NscSlGd8fjrQHFyt8Qg7Un0ZJ3KGB+R7IcjCAtzGy2fRTbpLVuY2Pm1zz6EI0H7bDl5Ulm6FFNfe+gSX4s5KpcQjRiYCIWp3uhCr2g3i5oCbM77cYAt8nFvwHWIrhGhccrq6gNczybohmRP/x1kYsr8dah7XGPQMulZ/Pys33oqMnUH0FxFe7FPS0lqjAvbQinT1+IbykSLkdSLMfv1Fe0oXvJTB4FsJeUafMlIHYmXaFiUqdyM9fHN8Z2o/Z1GcomX8r0mI+7VagYlT7nUym+THZwCtWHHsErqUcrXdPA7kZnwXprZa3gZirKf7/3Fc+VTXYufziKjDgg==
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:dd::17) by AM9PR10MB4371.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:273::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4669.11; Thu, 4 Nov 2021 18:04:02 +0000
Received: from AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::39c3:e100:ecf5:3596]) by AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM ([fe80::39c3:e100:ecf5:3596%7]) with mapi id 15.20.4669.011; Thu, 4 Nov 2021 18:04:02 +0000
From: "Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com>
To: Roman Danyliw <rdd@cert.org>
CC: LAMPS WG <spasm@ietf.org>
Thread-Topic: AD review of draft-ietf-lamps-cmp-algorithms-07
Thread-Index: AdfKsmHop5v82zipS+Kei9oAXI0KtQF6h4rQ
Date: Thu, 04 Nov 2021 18:04:02 +0000
Message-ID: <AM0PR10MB2418AFBC3AA679C2371A3175FE8D9@AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM>
References: <BN1P110MB0939774B07F1FF05E5DBBC42DC849@BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <BN1P110MB0939774B07F1FF05E5DBBC42DC849@BN1P110MB0939.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Enabled=true; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SetDate=2021-11-04T18:04:00Z; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Method=Standard; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Name=restricted-default; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ActionId=b683b9ed-ffa3-47d3-ad34-d6022fe05c47; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ContentBits=0
document_confidentiality: Restricted
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=siemens.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a3f0c093-7315-4955-b128-08d99fbd7baf
x-ms-traffictypediagnostic: AM9PR10MB4371:
x-microsoft-antispam-prvs: <AM9PR10MB437184B2F94BB08573626B17FE8D9@AM9PR10MB4371.EURPRD10.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 4CpJEF6sr0rDQknxbJygDnnTh8mvch2WhRhuov9Na2C4UzyhyKpZZCLzLJhcs2pg8Nnqf6fuTWY6heK8z9Lni/tBuXSzjyJchz5e+vhmK5P3cvrfMVQBHR2G7nR0/9aCrm++5ieE3VDE8A67dwldPNfX8TMNfmF09f4l6bvtAbsf2agti6Cj3LYHD+fqLDOROSKH5I7rDoRFJxupNy9f2QPeTRsXdE97VUebkaQu7ai+qJEUTU5vPsTp01nkdCylX5wEs00KRaeM1AudkhMENv89ZFKua/8MhjEgcf/+ooqwxyRSEiXUBTUjWl69XvA1/mgjl7V7CiXKHm95eqE6ZRmQn1VCuVSt+KXexS+fnz3RLFpFMbOI1Cio8rvR/tY4DkrPKsZf2b527hC29kThi0kIDGYpk8bFPpD2zZJERhOIJQbqEdP4uosoxL07rxaolY1tkAIIn8SprHxGnKLqj2lflk0mHM1xZMfQcWVYc/Avi+2C1yqnVBKQw0gQjCWE6OPO3kCewlmV2ZGXOIZkgNabu13yXL9Njs3Hx4d+gkACl2bWiAarmNEFN4NObmZg3A9GjzUCNEKC7bv+sS0g6+wt/pOJHYNtQiYaznp98No+r70+EockO0OkKJrPo690vSwIPKmpCCnpnyyzoBFnymiuSp7KrGB8JUiwfVT8lbCirFFGIc/ewQJC45E8x2jQU7aOJsPFNHbOISOOs7gApg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(83380400001)(30864003)(86362001)(2906002)(9686003)(55016002)(66946007)(82960400001)(66476007)(64756008)(66556008)(66446008)(5660300002)(52536014)(71200400001)(38070700005)(4326008)(316002)(33656002)(7696005)(122000001)(6506007)(8676002)(508600001)(38100700002)(76116006)(26005)(186003)(6916009)(8936002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: lMd+dn/UnQugoeESpLd5tsCxr/3igpprFXjKA7lwf3FL4Dz+ut+Ug6qsNImpOSacx+99ab7VAr6zrba/LYolppcZOVLK4Nqrbz8llZkskoMI5c7+ogs3M4xQvM57GyESu/YEpBwOD4c7TPyPpbFarxEff3ip1Y2gur3bGbJeqYMaEz03X6gHxUnHZoO+iuLc+vOVTB8g1E/LUSbSPaBNRgmY4qCuk0t83zoqboCOJeXseVzUr+LfN7ql/00kbqQpY0iRRgzuvdMVibOwILc/27RqXSJ8vznC9eoPPzqPcq3IYokwuI94rpCcdFR7mZheakn5IJGdUinPA9kVlqnaK6TpssR2cIxTpj4zIKkM0gEVZYmwxRYyJcXL8RWVkIvffQusfHxrZZQ4ax7Ccp4jG4v0ATFxXYTWzKp5MpaabAk9xfQUlbmJkWfFb7NapJg+f6puzFgSXiuphS4St4qWS6LHZ1W8s6u9Rr2+ZHyFeRD3OtJAzwOP5/SLvoCs7En7SOA7q5rsDX+5iyCfPgtzxPYiIliHFRgywapOjsJZkt9B/WrQSKrWFOIHrAjOtoSQjTVHNUnKI1XpUWI30Fy6YNYJkCyDuSqUluj3sNDorf3739hV64svGDjJKdLzdcW7+Md7bEU0AGTzflw44lRfa5ACnB+GVdIrFgoVsPqD1/bM2Tdt67V8IsjiLCTFMJqE2mMn5MuiD+WVw/F91/Fzf2e3ciWzGJkKbJd5szK0QF8fZCSglrcyOaB6+odNh+DJVR5fnThSLJx2mxZoP2L2TZ/vYVPsy2QGiqSqgS6oB0l5JZA4fUZJJV3dfOWraKwISjj4Kns/49D19nC5Xl1Lk/gc9T67U1fPICMIfrHXwTFHJxfj22Y9N0IX3OR0+HvEsfA47j+G4kuSQqbxtt5uEicjNyrgl57XrdzRb8TGUxBZWrH3QTHL+ZjGf5WiQpFRCtQR3m/bPORFtCsEN4aCDs4LsbPC+/IRAxx6thvzsqyQaLmOJepgtNsOIxmZKn2V1JB0Blrm5YjdYJOiVi1S4X8ApqAia1KmYTqOxJFs9se+K/uQ7K3+MlCIAEPzMFBIuVob86ECKs8+negiw7s01AMoG7AwIRNt9o75kr6X6Kpb4hb9yhoh6LDKzNCThKhzF+FjCjHrHv5JJL9+MU5ABRgJ+02oDPmyVCAGaqy/K1N/Oxg+qln3Rwl9KvtazJJjZNZahzqh4UIcqVw2T77ox7PCtlZCRlhVqHDuE/8LYvq6eSH58gji29PT9l+O/cZnAkv5h6gybrjiK4Kq1kVng70HQY+kOtLyUEJ2isiAjEtKuyY/ZvcUw1IpSqBtL/R+vqQdK4OQUHorOekl29UcGKImX9SIjTzE3hoNJG5s7ScWFA0nrkfCY1IKveF0uysg+N+Zr9bCtbchSN5wGAbq10QAQ1Fk7webW+lsGs44wk2e1L2Lo7roiM9OkPABzMtNEYmHKLXxP6/7fMsdUne6sy2EC2nInsOz5WMgBdkbkKzzpytFvty1/uBSVdhdjelw5VwYLSbavsa3hw+LxdaSQaZuNoWCy5vqTf9lGp4NQe8DIjhOKDkpwIRZ2FjmEZBXpio+I+2agwBTvk5syf5B0eX/iEqThQ9nJsi1+u2T2MZGveK2cR3JkBEQN5rfl8mvvW9mwjZq2GXjxvbWcV1Lsw==
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB2418.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: a3f0c093-7315-4955-b128-08d99fbd7baf
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2021 18:04:02.1813 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1OsOUJVWrrgj/H8oQI4T0MqYu59V4TUzW1Vg/C8x79r5aVvEkMwO3Ddymx1MdDja/zuTSUcJLHVVjWb7h4wVwFzLDBZs1CJFM6mPh0fmuMY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR10MB4371
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/PucWacPQTeHRacouWLjPPGCeM44>
Subject: Re: [lamps] AD review of draft-ietf-lamps-cmp-algorithms-07
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Nov 2021 18:04:13 -0000

Roman

I aligned with Mike, John, and Hans. 
Please see our feedback on your comments regarding Section 7 and Section 9 below.

> Von: Spasm <spasm-bounces@ietf.org> Im Auftrag von Roman Danyliw
> Gesendet: Dienstag, 26. Oktober 2021 23:49
> 
> Hi!
> 
> I did an AD review of draft-ietf-lamps-cmp-algorithms-07 with my comments
> below.  Thanks for this work to evolve CMP.
> 
> ** Section 7.  I would have benefit from a bit more clarity on the direction
> provided in this section.
> 
> -- "The following criteria will help implementers choose appropriate algorithms
> for managing certificates"
> 
> The bulleted list seems like only part of the criteria.  As a non-exhaustive list,
> additional considerations might be the capabilities of the end-point (e.g., does
> the target deployment have hardware acceleration for some, are some
> algorithms simply out of reach due to available compute or expected software
> support); or perhaps local policy or compliance requirements?
> 
> -- "The cryptographic strength of the algorithm with the lowest security."
> 
> It seems like some words are missing here.  Is the intent here to guide the
> selection towards the algorithm that provides the minimum amount of strength
> relative to the needed security requirements?

Thank you for this feedback. We propose the following changes.
In addition to that we think another table in the introduction of Section 7 listing the different algorithms sorted by its security level (bits of security) would help. We plan to present such a table during the LAMPS session for further discussion.

Old:
   The following criteria will help implementers choose appropriate
   algorithms for managing certificates:

   *  The cryptographic strength of the algorithm with the lowest
      security.

      Note: To avoid consuming too much computational resources it is
      recommended to choose a set of algorithms offering roughly the
      same level of security.

   *  The entropy of the shared secret information or password when MAC-
      based message protection is used, e.g., MSG_MAC_ALG.

   Finally, the cryptographic strength of the system SHOULD be at least
   as strong as the algorithms and keys used for the certificate being
   managed.

New:
The overall cryptographic strength of a CMP deployment will depend on
several factors, including:
 
* Algorithm profile: The overall strength of the profile will be the strength
   of the weakest algorithm it contains.
 
* Message protection: The overall strength of the CMC message protection 
   - MAC-based protection: The entropy of the shared secret information or
     password when MAC-based message protection is used, e.g.,
     MSG_MAC_ALG.
   - Signature-based protection: The strength of the key pair and signature
     algorithm when signature-based protection is used, e.g., MSG_SIG_ALG
 
* Certificates managed: Finally, the cryptographic strength of the system
   SHOULD be at least as strong as the algorithms and keys used for the
   certificate being managed.
 
To avoid consuming too much computational resources it is
recommended to choose a set of algorithms offering roughly the
same level of security. Below are provided several algorithm profiles 
which are balanced, assuming the implementor chooses MAC secrets 
and / or certificate profiles of at least equivalent strength.

> 
> ** Section 7.1.  The text in this section seems it should explicit say that it is
> updating RFC4210.
> 
> OLD
> The following table contains definitions of algorithms used within
> 
> NEW
> The following table updates the definitions of algorithms used within

I am fine with this change.

> 
> ** Section 7.1.  If an algorithm is listed in the "Change from 4210" column,
> should it be considered the equivalent of being added to the "other" column (per
> Appendix D.2 of RFC4210?  If so, please be explicit about that.

We will delete the column "Changes from 4210" and introduced two columns, "Optional" and "Deprecated". "Deprecated" contains all algorithms define in RFC 4210 Appendix D.2 which SHOLUD NOT be used any more.

> 
> ** Section 7.1.  Table 1.
> 
> -- What does it mean for PasswordBasedMac to be in both the Mandatory and
> Change-from-4210 column for the MSG_MAC_ALG row?  It was already the MTI
> in RFC4210.  Same question and situation with D-H for the PROT_ENC_ALG row.

PBMAC1 became MANDATORY and PasswordBasedMac became OPTIONAL.

> 
> -- Should 3-DES be considered "other" in MSG_MAC_ALG and PROT_SYM_ALG?

3-DES (3-key-EDE, CBC mode) became Deprecated as you proposed below.

> 
> -- Editorial.  In PROT_SYM_ALG and SYM_PENC_ALG, the "3-DES (3-key-EDE),
> CBC Mode" should read "3-DES (3-key-EDE, CBC mode)" per the text in RFC4210.

Thanks for the clarification, we can fix this.

This is the Update we propose for Section 7.1
Old
   Change from 4210: Shows the changes in the Mandatory and Other
   algorithms from RFC 4210 [RFC4210].  These are included for backwards
   compatibility considerations.

   +============+===============+==================+===================+
   |Name        |Use            | Mandatory        |Change from 4210   |
   +============+===============+==================+===================+
   |MSG_SIG_ALG |protection of  | RSA              |DSA/SHA1           |
   |            |PKI messages   |                  |Others: RSA/MD5,   |
   |            |using signature|                  |ECDSA              |
   +------------+---------------+------------------+-------------------+
   |MSG_MAC_ALG |protection of  | PasswordBasedMac |PasswordBasedMac   |
   |            |PKI messages   | (RECOMMENDED:    |Others: HMAC, X9.9 |
   |            |using MACing   | PBMAC1)          |                   |
   +------------+---------------+------------------+-------------------+
   |SYM_PENC_ALG|symmetric      | AES-wrap         |3-DES(3-key-EDE),  |
   |            |encryption of  |                  |CBC Mode           |
   |            |an end entity's|                  |Others: AES, RC5,  |
   |            |private key    |                  |CAST-128           |
   |            |where symmetric|                  |                   |
   |            |key is         |                  |                   |
   |            |distributed    |                  |                   |
   |            |out-of-band    |                  |                   |
   +------------+---------------+------------------+-------------------+
   |PROT_ENC_ALG|asymmetric     | D-H              |D-H                |
   |            |algorithm used |                  |Others: RSA, ECDH  |
   |            |for encryption |                  |                   |
   |            |of (symmetric  |                  |                   |
   |            |keys for       |                  |                   |
   |            |encryption of) |                  |                   |
   |            |private keys   |                  |                   |
   |            |transported in |                  |                   |
   |            |PKIMessages    |                  |                   |
   +------------+---------------+------------------+-------------------+
   |PROT_SYM_ALG|symmetric      | AES-CBC          |3-DES(3-key-EDE),  |
   |            |encryption     |                  |CBC Mode           |
   |            |algorithm used |                  |Others: AES, RC5,  |
   |            |for encryption |                  |CAST-128           |
   |            |of private key |                  |                   |
   |            |bits (a key of |                  |                   |
   |            |this type is   |                  |                   |
   |            |encrypted using|                  |                   |
   |            |PROT_ENC_ALG)  |                  |                   |
   +------------+---------------+------------------+-------------------+

New
Optional: Algorithms which are OPTIONAL to support

Deprecated: Algorithms from RFC 4210 [RFC4210] which SHOULD NOT be used anymore

+============+===============+==========+=================+=============+
|Name        |Use            |Mandatory |Optional       |Deprecated   |
+============+===============+==========+=================+=============+
|MSG_SIG_ALG |protection of  |RSA       |ECDSA, EdDSA     |combinations |
|            |PKI messages   |          |                 |with MD5 and   |
|            |using signature|          |                 |SHA1         |
+------------+---------------+----------+-----------------+-------------+
|MSG_MAC_ALG |protection of  |PBMAC1    |PasswordBasedMac,|             |
|            |PKI messages   |          |HMAC, X9.9       |             |
|            |using MACing   |          |                 |             |
+------------+---------------+----------+-----------------+-------------+
|SYM_PENC_ALG|symmetric      |AES-wrap  |                 |3-DES        |
|            |encryption of  |          |                 |(3-key-EDE,  |
|            |an end entity's|          |                 |CBC Mode),   |
|            |private key    |          |                 |CAST-128, RC5|
|            |where symmetric|          |                 |             |
|            |key is         |          |                 |             |
|            |distributed    |          |                 |             |
|            |out-of-band    |          |                 |             |
+------------+---------------+----------+-----------------+-------------+
|PROT_ENC_ALG|asymmetric     |D-H       |ECDH, RSA        |             |
|            |algorithm used |          |                 |             |
|            |for encryption |          |                 |             |
|            |of (symmetric  |          |                 |             |
|            |keys for       |          |                 |             |
|            |encryption of) |          |                 |             |
|            |private keys   |          |                 |             |
|            |transported in |          |                 |             |
|            |PKIMessages    |          |                 |             |
+------------+---------------+----------+-----------------+-------------+
|PROT_SYM_ALG|symmetric      |AES-CBC   |                 |3-DES        |
|            |encryption     |          |                 |(3-key-EDE,  |
|            |algorithm used |          |                 |CBC Mode),   |
|            |for encryption |          |                 |CAST-128, RC5|
|            |of private key |          |                 |             |
|            |bits (a key of |          |                 |             |
|            |this type is   |          |                 |             |
|            |encrypted using|          |                 |             |
|            |PROT_ENC_ALG)  |          |                 |             |
+------------+---------------+----------+-----------------+-------------+

Currently we propose a mandatory algorithm use profile with 112bit strength. As recommendations are going from RSA2048 to RSA3072 we discussed, if it is better to make a profile mandatory offering 128 bit strength. 
Currently we also mandate to use AES256 for key-wrap and encryption for delivering centrally generated RSA2048 keys pairs. The encryption is stronger than delivered key pair. Should we mandate AES128 only?
Currently HMAC and X9.9 are listed as OPTIONAL for MSG_MAC_ALG as they were listed in RFC 4210 D.2. We propose to remove x9.9 and keep HMAC. Regarding use of HMAC we would propose adding a Security Consideration as follows.

   Symmetric key-based MAC algorithms as described in Section 6.2  MAY be 
   used as MSG_MAC_ALG.  The implementor MUST choose a suitable PRF 
   and ensure that the key  has sufficient entropy to match the overall security 
   level of the algorithm  profile. These considerations are outside the scope 
   of the profile.

@Russ and Roman, what is your opinion?

> 
> ** Section 9.  Can a reference be added for the theoretical weakness in
> PasswordBasedMac?

We are not aware of any clear description of PasswordBasedMac weakness. Therefor we propose the following change:

Old
   When using MAC-based message protection the use of PBMAC1 is
   preferable to that of PasswordBasedMac: first, PBMAC1 is a well-known
   scrutinized algorithm, which is not true for PasswordBasedMac and
   second, there exists a theoretical weakness in PasswordBasedMac,
   where the generated MAC key can be easily distinguished from a random
   key.

New
When using MAC-based message protection the use of PBMAC1 is preferable to that of PasswordBasedMac. First, PBMAC1 is a well-known scrutinized algorithm, which is not true for PasswordBasedMac. Second, the PasswordBasedMac algorithm as specified in RFC 4211 section 4.4 is essentially PBKDF1 (as defined in RFC 2898 section 5.1) with an HMAC step at the end. Here we update to use the PBKDF2-HMAC construct defined as PBMAC1 in RFC 8018. PBKDF2 is superior to PBKDF1 in an improved internal construct for iterated hashing, and in removing PBKDF1's limitation of only being able to derive keys up to the size of the underlying hash function. Additionally, PBKDF1 is not recommended for new applications as stated in Section 5 of RFC 8018 and no longer an approved algorithm by most standards bodies, and therefore presents difficulties to implementors who are submitting their CMP implementations for certification, hence moving to a PBKDF2-based mechanism. This change is in alignment with RFC 9045 which updates RFC 4211 to allow the use of PBMAC1 in CRMF.

> 
> ** Section 9.  Editorially, the first paragraph ("RFC 4210 Appendix D.2 ...) and the
> two paragraphs of "In Section 7 ..." and "To keep the list ...", seem to be saying
> the same thing.  Recommend a merge.
> 

Okay, maybe we just remove the paragraph "To keep the list of algorithms"

> ** Section 9.
> In such systems the weakened algorithms should
>    be disabled from further use.
> 
> Can this document make stronger recommendations about deprecating certain
> algorithms such as 3-DES SHA-1 with normative language rather than keeping it
> in the "other" category in the profiles?

We updated Table 1 in Section 7.1 accordingly. Use of MD5, SHA-1, 3-DES, CAST-128, and RC5 is deprecated.
Therefore we propose updating the section as follows.

Old
   It is recognized that there may be older CMP implementations in use
   that conform to the algorithm use profile from Appendix D.2 of
   RFC 4210 [RFC4210].  For example, the use of AES is now mandatory for
   PROT_SYM_ALG but in RFC 4210 [RFC4210] 3-DES was mandatory.  In most
   cases the newer mandatory algorithms were listed as "other"
   algorithms in RFC 4210 [RFC4210].  Therefore, it is expected that
   many CMP systems may already support the recommended algorithms in
   this specification.  In such systems the weakened algorithms should
   be disabled from further use.  If critical systems cannot be
   immediately updated to conform to the recommended algorithm use
   profile, it is recommended a plan to migrate the infrastructure to
   conforming profiles be adopted as soon as possible.

New
   It is recognized that there may be older CMP implementations in use
   that conform to the algorithm use profile from Appendix D.2 of
   RFC 4210 [RFC4210].  For example, the use of AES is now mandatory for
   PROT_SYM_ALG but in RFC 4210 [RFC4210] 3-DES was mandatory. 
   Therefore, it is expected that
   many CMP systems may already support the recommended algorithms in
   this specification.  In such systems the weakened algorithms should
   be disabled from further use.  If critical systems cannot be
   immediately updated to conform to the recommended algorithm use
   profile, it is recommended a plan to migrate the infrastructure to
   conforming profiles be adopted as soon as possible.

Hendrik