Re: [stir] x5u

Russ Housley <housley@vigilsec.com> Mon, 18 March 2024 20:49 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B0EEC1D5C78 for <stir@ietfa.amsl.com>; Mon, 18 Mar 2024 13:49:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=vigilsec.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6ryrNsAw7OoH for <stir@ietfa.amsl.com>; Mon, 18 Mar 2024 13:49:09 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2407FC14F696 for <stir@ietf.org>; Mon, 18 Mar 2024 13:49:09 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id EA183150478; Mon, 18 Mar 2024 16:49:07 -0400 (EDT)
Received: from smtpclient.apple (pfs.iad.rg.net [198.180.150.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id DDABD153C54; Mon, 18 Mar 2024 16:49:06 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Message-Id: <8A224C54-0838-4307-AE38-10E9A0A51B55@vigilsec.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A3E267E4-57F6-4FED-8BCA-3249297DBB8A"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
Date: Mon, 18 Mar 2024 16:48:54 -0400
In-Reply-To: <SJ2PR11MB8402048A6AB32F3AED42ACA3992D2@SJ2PR11MB8402.namprd11.prod.outlook.com>
Cc: IETF STIR Mail List <stir@ietf.org>
To: Alec Fenichel <alec.fenichel@transnexus.com>
References: <68E625F9-F114-4B40-AC5B-9F636C32D2AE@vigilsec.com> <SJ2PR11MB8402048A6AB32F3AED42ACA3992D2@SJ2PR11MB8402.namprd11.prod.outlook.com>
X-Mailer: Apple Mail (2.3731.700.6)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vigilsec.com; h=from:message-id:content-type:mime-version:subject:date:in-reply-to:cc:to:references; s=pair-202402141609; bh=5SPXRv0KHzgzXOpVpcDgu4EBWwM6QpFO42ujJR5SmpQ=; b=lAkUZTJA92H7WCJ6EaNmlRm9qzlKH9jTFmiRU0gyZ5IYj+byFVGvwj6+UTR+tJKUPDfj2380UyWfolRnqNrp0s9qG7e+Frj1J3ZHuxjYTwXQPhSv6QwkgifJlDIhgcc7QArxKtXZAe4yMe6UCTlFPXRL4zIbH2nqZk13LzyOCFSiDK4rFakap0qAbVwa1uMO/b5Tl8cOaX7xSVHgnsFiEce7bsjjlNgxyPA8K/mgEpXbMzPvdxlarroXcbjALazCFAjlkROSs+JQhspjI8lgA3cOO9ijTtZiP2WV4xNbJzcUM9qYXp/Xm0Sm4KUlyelAwrpuW4OJJDARguo1K+9kNw==
X-Scanned-By: mailmunge 3.11 on 66.39.134.11
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/JXZp9AnwDqFCsHwvhW0uwnIBvSM>
Subject: Re: [stir] x5u
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Mar 2024 20:49:13 -0000

Alex:

Yes, that is the naming convention that is customary.  I did not have time during ther meeting session to find one.

Russ


> On Mar 18, 2024, at 4:34 AM, Alec Fenichel <alec.fenichel@transnexus.com> wrote:
> 
> The “.cer” file extension is generally (though not always) used for DER certificate format, not PEM certificate format.
>  
> So the example x5u URL here <https://www.ietf.org/archive/id/draft-ietf-stir-certificates-ocsp-07.html#name-ocsp-staple-passport-elemen> should not end in “.cer”. It should end in “.pem”.
>  
> Sincerely,
>  
> Alec Fenichel
> Chief Technology Officer
> TransNexus <https://transnexus.com/>
> alec.fenichel@transnexus.com <mailto:alec.fenichel@transnexus.com>
> +1 (404) 369-2407 <tel:+14043692407>
>  
> From: stir <stir-bounces@ietf.org <mailto:stir-bounces@ietf.org>> on behalf of Russ Housley <housley@vigilsec.com <mailto:housley@vigilsec.com>>
> Date: Monday, March 18, 2024 at 04:10
> To: IETF STIR Mail List <stir@ietf.org <mailto:stir@ietf.org>>
> Subject: [stir] x5u
> 
> RFC 5715 says:
> 
> 4.1.5.  "x5u" (X.509 URL) Header Parameter
> 
>    The "x5u" (X.509 URL) Header Parameter is a URI [RFC3986] that refers
>    to a resource for the X.509 public key certificate or certificate
>    chain [RFC5280] corresponding to the key used to digitally sign the
>    JWS.  The identified resource MUST provide a representation of the
>    certificate or certificate chain that conforms to RFC 5280 [RFC5280]
>    in PEM-encoded form, with each certificate delimited as specified in
>    Section 6.1 of RFC 4945 [RFC4945].  The certificate containing the
>    public key corresponding to the key used to digitally sign the JWS
>    MUST be the first certificate.  This MAY be followed by additional
>    certificates, with each subsequent certificate being the one used to
>    certify the previous one.  The protocol used to acquire the resource
>    MUST provide integrity protection; an HTTP GET request to retrieve
>    the certificate MUST use TLS [RFC2818] [RFC5246]; and the identity of
>    the server MUST be validated, as per Section 6 of RFC 6125 [RFC6125].
>    Also, see Section 8 on TLS requirements.  Use of this Header
>    Parameter is OPTIONAL.
> 
> And, RFC 4945 says:
> 
> 6.1.  Certificates
> 
>    Certificates MUST be Base64 [19] encoded and appear between the
>    following delimiters:
> 
>             -----BEGIN CERTIFICATE-----
>             -----END CERTIFICATE-----
> 
> An example of a file that uses this encoding is here:
> 
> https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fenc%2Fverifybundle.pem&data=05%7C02%7Calec.fenichel%40transnexus.com%7C724b2ed462454d9dddd208dc4722d8cf%7C8e2972a2d21d49acb00518e8ceaadee3%7C0%7C0%7C638463462215154720%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=oH3HoYc03umYi%2Fh1CmpmDuggA3iY9xq%2BUkBgrTS3G2c%3D&reserved=0
> 
> Russ
> 
> _______________________________________________
> stir mailing list
> stir@ietf.org <mailto:stir@ietf.org>
> https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fstir&data=05%7C02%7Calec.fenichel%40transnexus.com%7C724b2ed462454d9dddd208dc4722d8cf%7C8e2972a2d21d49acb00518e8ceaadee3%7C0%7C0%7C638463462215164689%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=nMF1FshBEEtloICfHj3TZkmJhqWI9cNC7I0Cz5pX7o4%3D&reserved=0