Re: [lamps] I-D Action: draft-ietf-lamps-documentsigning-eku-05.txt
Sean Turner <sean@sn3rd.com> Wed, 24 August 2022 14:19 UTC
Return-Path: <sean@sn3rd.com>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A326FC1526FC for <spasm@ietfa.amsl.com>; Wed, 24 Aug 2022 07:19:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id opRrvaWEeG5Q for <spasm@ietfa.amsl.com>; Wed, 24 Aug 2022 07:18:55 -0700 (PDT)
Received: from mail-qt1-x832.google.com (mail-qt1-x832.google.com [IPv6:2607:f8b0:4864:20::832]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51F51C1527AB for <spasm@ietf.org>; Wed, 24 Aug 2022 07:18:14 -0700 (PDT)
Received: by mail-qt1-x832.google.com with SMTP id cr9so12781825qtb.13 for <spasm@ietf.org>; Wed, 24 Aug 2022 07:18:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:from:to:cc; bh=6hrA2YBebbXEZUBHt/QNW23LhuCoEJloxnqtC7rsv5M=; b=Aa0WwnPktDTRTdqmqDKf1Fxy0qgaWUpJhDyuUnrIBv9zdEiCSRCdPvg8i/ZiLLkupX 5CwFUcJx4oKeYsfbqt/BqeKz4txU0mkMT0UGZMv6KEnEFI9owtXg31odvx1nIUlxesEA uyQFTjRhU+a3WsRRxwAq67dnBy3r2IlnsiWl4=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:x-gm-message-state:from:to:cc; bh=6hrA2YBebbXEZUBHt/QNW23LhuCoEJloxnqtC7rsv5M=; b=olG7Ynny+sC/JReO+TIil6w/8QsmY6Qc+myJ2P+p0gSxHPo2orlxLGx47YcpqK0ZZr MTCYZzHwAulzxG69Dpnrn7N/U4NwD1FhAY7zzylNHn5RTL4UgCFXlN2W3xpcMGtfEp8y ZnvhtxcfYAZoTfSCt1kwHGif8ppVMafxbOnSY7MbWtK8E3gj//oHwcdsz7EBuCDcAdAL Sk6uot37QSGQvTclHkdEPjbIiTRXQHpvfpLM20CVXwHV9WkA1FE/5fJo2vyvs3w2yA0c Ys8ldZQ/cNp7oqwFVEzQCskcP87yXvxD2qfqR0j0hxekQMVAzBEEQKSDmlJfmz5OxrCy TVcw==
X-Gm-Message-State: ACgBeo0Lbqp3BUNCsm/n7mcc9M7/jmP1k3mbor+HUKt7BJSzCyxppCzo rIG+P9kVQG5MKknoa1QaGJRIMA==
X-Google-Smtp-Source: AA6agR4CIZke8Ok8RBUmRO91Y8H3uYD3nTYyDL/oUOYtuhtbbMNn2QtKLAn/sO9yaPVW3cwiT635rA==
X-Received: by 2002:a05:622a:552:b0:342:f82f:c389 with SMTP id m18-20020a05622a055200b00342f82fc389mr23852846qtx.646.1661350692821; Wed, 24 Aug 2022 07:18:12 -0700 (PDT)
Received: from smtpclient.apple ([2600:4040:253b:7300:d961:5490:c007:8919]) by smtp.gmail.com with ESMTPSA id dm33-20020a05620a1d6100b006b5f8f32a8fsm16548015qkb.114.2022.08.24.07.18.11 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 24 Aug 2022 07:18:11 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <E0A7C975-F0AC-4CD3-9E51-321ED532AD59@vigilsec.com>
Date: Wed, 24 Aug 2022 10:18:10 -0400
Cc: LAMPS <spasm@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <84EBD9DA-6E5B-4841-B36A-B36AD3F329D0@sn3rd.com>
References: <166112703257.16042.13362183097595694464@ietfa.amsl.com> <E0A7C975-F0AC-4CD3-9E51-321ED532AD59@vigilsec.com>
To: Russ Housley <housley@vigilsec.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/fg_owgwZf0RTc0SOW0N4X5-DW_s>
Subject: Re: [lamps] I-D Action: draft-ietf-lamps-documentsigning-eku-05.txt
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Aug 2022 14:19:00 -0000
OID assignments now in the editors copy: https://github.com/lamps-wg/documentsigning-eku/pull/19 I suspect there will be some additional tweaks as a result of Paul’s review so the OIDs will appear in -06. spt > On Aug 22, 2022, at 09:21, Russ Housley <housley@vigilsec.com> wrote: > > IANA assigned the EKU value for document signing: > > https://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-numbers-1.3.6.1.5.5.7.3 > > I was surprised to see this version not incorporate that value into the text. > > Russ > > >> On Aug 21, 2022, at 8:10 PM, internet-drafts@ietf.org wrote: >> >> A New Internet-Draft is available from the on-line Internet-Drafts directories. >> This draft is a work item of the Limited Additional Mechanisms for PKIX and SMIME WG of the IETF. >> >> Title : General Purpose Extended Key Usage (EKU) for Document Signing X.509 Certificates >> Authors : Tadahiko Ito >> Tomofumi Okubo >> Sean Turner >> Filename : draft-ietf-lamps-documentsigning-eku-05.txt >> Pages : 9 >> Date : 2022-08-21 >> >> Abstract: >> RFC5280 specifies several extended key purpose identifiers >> (KeyPurposeIds) for X.509 certificates. This document defines a >> general purpose document signing KeyPurposeId for inclusion in the >> Extended Key Usage (EKU) extension of X.509 public key certificates. >> Document Signing applications may require that the EKU extension be >> present and that a document signing KeyPurposeId be indicated in >> order for the certificate to be acceptable to that Document Signing >> application. >> >> >> The IETF datatracker status page for this draft is: >> https://datatracker.ietf.org/doc/draft-ietf-lamps-documentsigning-eku/ >> >> There is also an HTML version available at: >> https://www.ietf.org/archive/id/draft-ietf-lamps-documentsigning-eku-05.html >> >> A diff from the previous version is available at: >> https://www.ietf.org/rfcdiff?url2=draft-ietf-lamps-documentsigning-eku-05 > > _______________________________________________ > Spasm mailing list > Spasm@ietf.org > https://www.ietf.org/mailman/listinfo/spasm
- [lamps] I-D Action: draft-ietf-lamps-documentsign… internet-drafts
- Re: [lamps] I-D Action: draft-ietf-lamps-document… Russ Housley
- Re: [lamps] I-D Action: draft-ietf-lamps-document… Sean Turner