[要約] RFC 6268は、CMSとPKIXのための追加のASN.1モジュールを提供しています。 目的は、暗号メッセージ構文(CMS)とX.509を使用した公開鍵インフラストラクチャ(PKIX)の機能を拡張することです。
Internet Engineering Task Force (IETF) J. Schaad Request for Comments: 6268 Soaring Hawk Consulting Updates: 5911 S. Turner Category: Informational IECA, Inc. ISSN: 2070-1721 July 2011
Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)
X.509(PKIX)を使用した暗号化メッセージ構文(CMS)および公開鍵インフラストラクチャ用の追加の新しいASN.1モジュール
Abstract
概要
The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.
暗号化メッセージ構文(CMS)形式および関連する多くの形式は、ASN.1を使用して表現されます。現在のASN.1モジュールは、1988バージョンのASN.1に準拠しています。このドキュメントは、ASN.1の2008バージョンに準拠するようにいくつかの補助ASN.1モジュールを更新します。 1988 ASN.1モジュールは標準バージョンのままです。どの形式に対してもビット・オン・ザ・ワイヤーの変更はありません。これは単に構文の変更です。
Status of This Memo
本文書の状態
This document is not an Internet Standards Track specification; it is published for informational purposes.
このドキュメントはInternet Standards Trackの仕様ではありません。情報提供を目的として公開されています。
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741.
このドキュメントは、IETF(Internet Engineering Task Force)の製品です。これは、IETFコミュニティのコンセンサスを表しています。公開レビューを受け、インターネットエンジニアリングステアリンググループ(IESG)による公開が承認されました。 IESGによって承認されたすべてのドキュメントが、あらゆるレベルのインターネット標準の候補になるわけではありません。 RFC 5741のセクション2をご覧ください。
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6268.
このドキュメントの現在のステータス、エラータ、およびフィードバックの提供方法に関する情報は、http://www.rfc-editor.org/info/rfc6268で入手できます。
Copyright Notice
著作権表示
Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved.
Copyright(c)2011 IETF Trustおよびドキュメントの作成者として識別された人物。全著作権所有。
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
この文書は、BCP 78およびこの文書の発行日に有効なIETF文書に関するIETFトラストの法的規定(http://trustee.ietf.org/license-info)の対象となります。これらのドキュメントは、このドキュメントに関するあなたの権利と制限を説明しているため、注意深く確認してください。このドキュメントから抽出されたコードコンポーネントには、Trust Legal Provisionsのセクション4.eに記載されているSimplified BSD Licenseのテキストが含まれている必要があり、Simplified BSD Licenseに記載されているように保証なしで提供されます。
This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.
このドキュメントには、2008年11月10日より前に公開または公開されたIETFドキュメントまたはIETFコントリビューションの素材が含まれている場合があります。この素材の一部で著作権を管理している人が、IETFトラストにそのような素材の変更を許可する権利を付与していない可能性がありますIETF標準プロセス外。このような資料の著作権を管理する人から適切なライセンスを取得せずに、このドキュメントをIETF標準プロセス外で変更したり、その派生物をIETF標準プロセス外で作成したりすることはできません。 RFCとして、またはそれを英語以外の言語に翻訳するための出版物。
Table of Contents
目次
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. ASN.1 Updates (2002 to 2008) . . . . . . . . . . . . . . . 4 1.2. Requirements Terminology . . . . . . . . . . . . . . . . . 4 2. ASN.1 Module RFC 3274 . . . . . . . . . . . . . . . . . . . . 5 3. ASN.1 Module RFC 3779 . . . . . . . . . . . . . . . . . . . . 7 4. ASN.1 Module RFC 6019 . . . . . . . . . . . . . . . . . . . . 10 5. ASN.1 Module RFC 4073 . . . . . . . . . . . . . . . . . . . . 11 6. ASN.1 Module RFC 4231 . . . . . . . . . . . . . . . . . . . . 12 7. ASN.1 Module RFC 4334 . . . . . . . . . . . . . . . . . . . . 15 8. ASN.1 Module RFC 5083 . . . . . . . . . . . . . . . . . . . . 16 9. ASN.1 Module RFC 5652 . . . . . . . . . . . . . . . . . . . . 18 10. ASN.1 Module RFC 5752 . . . . . . . . . . . . . . . . . . . . 29 11. Module Identifiers in ASN.1 . . . . . . . . . . . . . . . . . 30 12. Security Considerations . . . . . . . . . . . . . . . . . . . 32 13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 32 13.1. Normative References . . . . . . . . . . . . . . . . . . . 32 13.2. Informative References . . . . . . . . . . . . . . . . . . 33
Some developers would like the IETF to use the latest version of ASN.1 in its standards. Most of the RFCs that relate to security protocols still use ASN.1 from the 1988 standard, which has been deprecated. This is particularly true for the standards that relate to PKIX, CMS, and Secure/Multipurpose Internet Mail Extensions (S/MIME).
一部の開発者は、IETFの標準でASN.1の最新バージョンを使用することを望んでいます。セキュリティプロトコルに関連するRFCのほとんどは、1988年の標準からのASN.1をまだ使用していますが、これは廃止されました。これは、PKIX、CMS、およびSecure / Multipurpose Internet Mail Extensions(S / MIME)に関連する標準に特に当てはまります。
In this document we have either changed the syntax to use the 2008 ASN.1 standard, or done some updates from previous conversions. The ASN.1 modules updated came from the following RFCs:
このドキュメントでは、2008 ASN.1標準を使用するように構文を変更するか、以前の変換からいくつかの更新を行いました。更新されたASN.1モジュールは、次のRFCからのものです。
o RFC 3274, Compressed Data Content Type for Cryptographic Message Syntax (CMS) [RFC3274].
o RFC 3274、暗号化メッセージ構文(CMS)の圧縮データコンテンツタイプ[RFC3274]。
o RFC 3779, X.509 Extensions for IP Addresses and AS Identifiers [RFC3779].
o RFC 3779、IPアドレスおよびAS識別子のX.509拡張[RFC3779]。
o RFC 6019, BinaryTime: An Alternate Format for Representing Date and Time in ASN.1 [RFC6019].
o RFC 6019、BinaryTime:ASN.1で日付と時刻を表すための代替形式[RFC6019]。
o RFC 4073, Protecting Multiple Contents with the Cryptographic Message Syntax (CMS) [RFC4073].
o RFC 4073、Protecting Multiple Content with Cryptographic Message Syntax(CMS)[RFC4073]。
o RFC 4231, Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 [RFC4231].
o RFC 4231、HMAC-SHA-224、HMAC-SHA-256、HMAC-SHA-384、およびHMAC-SHA-512の識別子とテストベクトル[RFC4231]。
o RFC 4334, Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN) [RFC4334].
o RFC 4334、ポイントツーポイントプロトコル(PPP)およびワイヤレスローカルエリアネットワーク(WLAN)での認証をサポートする証明書の拡張と属性[RFC4334]。
o RFC 5083, Cryptographic Message Syntax (CMS) Authenticated-Enveloped-Data Content Type [RFC5083].
o RFC 5083、Cryptographic Message Syntax(CMS)Authenticated-Enveloped-Data Content Type [RFC5083]。
o RFC 5652, Cryptographic Message Syntax (CMS) [RFC5652].
o RFC 5652、暗号化メッセージ構文(CMS)[RFC5652]。
o RFC 5752, Multiple Signatures in Cryptographic Message Syntax (CMS) [RFC5752].
o RFC 5752、暗号化メッセージ構文(CMS)の複数の署名[RFC5752]。
Note that some of the modules in this document get some of their definitions from places different than the modules in the original RFCs. The idea is that these modules, when combined with the modules in [RFC5911] and [RFC5912], can stand on their own and do not need to import definitions from anywhere else.
このドキュメントの一部のモジュールは、元のRFCのモジュールとは異なる場所からいくつかの定義を取得しています。これらのモジュールは、[RFC5911]と[RFC5912]のモジュールと組み合わせると、独立して機能し、他の場所から定義をインポートする必要がないという考え方です。
This document does not explicitly update the RFCs from which the ASN.1 modules have been extracted. This is because the original 1988 ASN.1 syntax remains the normative version and the modules in this document as well as in [RFC5911] and [RFC5912] are informative (but hopefully useful) annexes.
このドキュメントは、ASN.1モジュールが抽出されたRFCを明示的に更新しません。これは、元の1988 ASN.1構文が標準バージョンのままであり、このドキュメントおよび[RFC5911]と[RFC5912]のモジュールは、参考情報(ただし、うまくいけば役立つ)の付属書であるためです。
The modules defined in this document are compatible with the most current ASN.1 specification published in 2008 (see [ASN1-2008]). The changes between the 2002 specification and the 2008 specification include the creation of additional pre-defined types (DATE, DATE-TIME, DURATION, NOT-A-NUMBER, OID-IRI, RELATIVE-OID-IRI, TIME, TIME-OF-DAY) and the ability to define different encoding rules (ENCODING-CONTROL, INSTRUCTIONS). None of the newly defined tokens are currently used in any of the ASN.1 specifications published here.
このドキュメントで定義されているモジュールは、2008年に公開された最新のASN.1仕様と互換性があります([ASN1-2008]を参照)。 2002仕様と2008仕様の間の変更には、追加の事前定義タイプ(DATE、DATE-TIME、DURATION、NOT-A-NUMBER、OID-IRI、RELATIVE-OID-IRI、TIME、TIME-OF-の作成が含まれます。 DAY)とさまざまなエンコーディングルールを定義する機能(ENCODING-CONTROL、INSTRUCTIONS)。新しく定義されたトークンは、現在ここで公開されているASN.1仕様で使用されていません。
Information on the changes to ASN.1 between the 1988 and 2002 versions can be found in [RFC6025].
1988年と2002年のバージョン間のASN.1への変更に関する情報は、[RFC6025]にあります。
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
このドキュメントのキーワード「MUST」、「MUST NOT」、「REQUIRED」、「SHALL」、「SHALL NOT」、「SHOULD」、「SHOULD NOT」、「RECOMMENDED」、「MAY」、および「OPTIONAL」は、 [RFC2119]で説明されているように解釈されます。
We have updated the ASN.1 module associated with this document to be 2008 compliant and to use the set of classes previously defined in [RFC5911].
このドキュメントに関連するASN.1モジュールを2008準拠に更新し、[RFC5911]で以前に定義されたクラスのセットを使用するようにしました。
CompressedDataContent-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-compressedDataContent(54) }
DEFINITIONS IMPLICIT TAGS ::= BEGIN
IMPORTS CMSVersion, ContentSet, CONTENT-TYPE FROM CryptographicMessageSyntax-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }
AlgorithmIdentifier{}, SMIME-CAPS, ParamOptions FROM AlgorithmInformation-2009 {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-algorithmInformation-02(58)} ;
-- -- ContentTypes contains the set of content types that are -- defined in this module. -- -- The contents of ContentTypes should be added to -- ContentSet defined in [RFC5652] --
ContentTypes CONTENT-TYPE ::= {ct-compressedData}
-- -- SMimeCaps contains the set of S/MIME capabilities that -- are associated with the algorithms defined in this -- document. -- -- SMimeCaps are added to the SMimeCapsSet defined in -- [RFC5751] as updated by [RFC5911].
SMimeCaps SMIME-CAPS ::= {cpa-zlibCompress.&smimeCaps, ...}
-- -- Define the compressed data content type --
--圧縮データのコンテンツタイプを定義します-
ct-compressedData CONTENT-TYPE ::= { TYPE CompressedData IDENTIFIED BY id-ct-compressedData }
CompressedData ::= SEQUENCE { version CMSVersion (v0), -- Always set to 0 compressionAlgorithm CompressionAlgorithmIdentifier, encapContentInfo EncapsulatedContentInfo }
EncapsulatedContentInfo ::= SEQUENCE { eContentType CONTENT-TYPE.&id({ContentSet}), eContent [0] EXPLICIT OCTET STRING OPTIONAL }
CompressionAlgorithmIdentifier ::= AlgorithmIdentifier{COMPRESS-ALGORITHM, {CompressAlgorithmSet}}
CompressAlgorithmSet COMPRESS-ALGORITHM ::= { cpa-zlibCompress, ... }
-- Algorithm Identifiers
-アルゴリズム識別子
id-alg-zlibCompress OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) alg(3) 8 }
cpa-zlibCompress COMPRESS-ALGORITHM ::= { IDENTIFIER id-alg-zlibCompress PARAMS TYPE NULL ARE preferredAbsent SMIME-CAPS {IDENTIFIED BY id-alg-zlibCompress} }
-- Content Type Object Identifiers
-コンテンツタイプオブジェクト識別子
id-ct-compressedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 9 }
-- -- Class defined for compression algorithms -- COMPRESS-ALGORITHM ::= CLASS { &id OBJECT IDENTIFIER UNIQUE, &Params OPTIONAL, ¶mPresence ParamOptions DEFAULT absent, &smimeCaps SMIME-CAPS OPTIONAL } WITH SYNTAX { IDENTIFIER &id [PARAMS [TYPE &Params] ARE ¶mPresence] [SMIME-CAPS &smimeCaps] }
END
終わり
We have updated the ASN.1 module associated with RFC 3779 to be ASN.1 2008 compliant and to use the set of classes previously defined in [RFC5912].
RFC 3779に関連付けられたASN.1モジュールをASN.1 2008準拠に更新し、以前に[RFC5912]で定義されたクラスのセットを使用するようにしました。
IPAddrAndASCertExtn-2010 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) mod(0) id-mod-ip-addr-and-as-ident-2(72) } DEFINITIONS EXPLICIT TAGS ::= BEGIN EXPORTS ALL;
IMPORTS
輸入
-- PKIX specific OIDs and arcs -- id-pe FROM PKIX1Explicit-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51)}
EXTENSION FROM PKIX-CommonTypes-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57)} ;
-- -- Extensions contains the set of extensions defined in this -- module -- -- These are intended to be placed in public key certificates -- and thus should be added to the CertExtensions extension -- set in PKIXImplicit-2009 defined for [RFC5280] --
Extensions EXTENSION ::= { ext-pe-ipAddrBlocks | ext-pe-autonomousSysIds }
-- IP Address Delegation Extension OID --
-IPアドレス委任拡張OID-
ext-pe-ipAddrBlocks EXTENSION ::= { SYNTAX IPAddrBlocks IDENTIFIED BY id-pe-ipAddrBlocks }
id-pe-ipAddrBlocks OBJECT IDENTIFIER ::= { id-pe 7 }
-- IP Address Delegation Extension Syntax --
-IPアドレス委任拡張構文-
IPAddrBlocks ::= SEQUENCE OF IPAddressFamily
IPAddressFamily ::= SEQUENCE { -- AFI & opt SAFI -- addressFamily OCTET STRING (SIZE (2..3)), ipAddressChoice IPAddressChoice }
IPAddressChoice ::= CHOICE { inherit NULL, -- inherit from issuer -- addressesOrRanges SEQUENCE OF IPAddressOrRange }
IPAddressOrRange ::= CHOICE { addressPrefix IPAddress, addressRange IPAddressRange }
IPAddressRange ::= SEQUENCE { min IPAddress, max IPAddress }
IPAddress ::= BIT STRING
-- Autonomous System Identifier Delegation Extension OID --
-自律システム識別子委任拡張OID-
ext-pe-autonomousSysIds EXTENSION ::= { SYNTAX ASIdentifiers IDENTIFIED BY id-pe-autonomousSysIds }
id-pe-autonomousSysIds OBJECT IDENTIFIER ::= { id-pe 8 }
-- Autonomous System Identifier Delegation Extension Syntax --
-自律システム識別子委任拡張構文-
ASIdentifiers ::= SEQUENCE { asnum [0] ASIdentifierChoice OPTIONAL, rdi [1] ASIdentifierChoice OPTIONAL } (WITH COMPONENTS {..., asnum PRESENT} | WITH COMPONENTS {..., rdi PRESENT})
ASIdentifierChoice ::= CHOICE { inherit NULL, -- inherit from issuer -- asIdsOrRanges SEQUENCE OF ASIdOrRange }
ASIdOrRange ::= CHOICE { id ASId, range ASRange }
ASRange ::= SEQUENCE { min ASId, max ASId }
ASId ::= INTEGER
END
終わり
We have updated the ASN.1 module associated with this document to be 2008 compliant and to use the set of classes previously defined in [RFC5911].
このドキュメントに関連するASN.1モジュールを2008準拠に更新し、[RFC5911]で以前に定義されたクラスのセットを使用するようにしました。
BinarySigningTimeModule-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-binSigningTime-2009(55) } DEFINITIONS IMPLICIT TAGS ::= BEGIN IMPORTS
-- From PKIX-CommonTypes-2009 [RFC5912]
-PKIX-CommonTypes-2009 [RFC5912]から
ATTRIBUTE FROM PKIX-CommonTypes-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57) } ;
-- -- BinaryTime Definition -- -- BinaryTime contains the number seconds since -- midnight Jan 1, 1970 UTC. -- Leap seconds are EXCLUDED from the computation. --
BinaryTime ::= INTEGER (0..MAX)
-- -- Signing Binary Time Attribute -- -- The binary signing time should be added to -- SignedAttributeSet and AuthAttributeSet in CMS [RFC5652] -- and to AuthEnvDataAttributeSet in [RFC5083] with the -- new modules in this document, RFC 6268. -- aa-binarySigningTime ATTRIBUTE ::= { TYPE BinarySigningTime IDENTIFIED BY id-aa-binarySigningTime }
id-aa-binarySigningTime OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) aa(2) 46 }
BinarySigningTime ::= BinaryTime
END
終わり
We have updated the ASN.1 module associated with this document to be 2008 compliant and to use the set of classes previously defined in [RFC5911].
このドキュメントに関連するASN.1モジュールを2008準拠に更新し、[RFC5911]で以前に定義されたクラスのセットを使用するようにしました。
ContentCollectionModule-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-context-Collect-2009(56) } DEFINITIONS IMPLICIT TAGS ::= BEGIN IMPORTS
-- From CryptographicMessageSyntax-2010 [RFC6268]
-CryptographicMessageSyntax-2010 [RFC6268]から
CONTENT-TYPE, ContentInfo FROM CryptographicMessageSyntax-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }
AttributeSet{}, ATTRIBUTE FROM PKIX-CommonTypes-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57) } ;
-- -- An object set of all content types defined by this module. -- This is to be added to ContentSet in the CMS module --
ContentSet CONTENT-TYPE ::= { ct-ContentCollection | ct-ContentWithAttributes, ... }
-- -- Content Collection Content Type and Object Identifier --
--コンテンツコレクションのコンテンツタイプとオブジェクト識別子-
ct-ContentCollection CONTENT-TYPE ::= { TYPE ContentCollection IDENTIFIED BY id-ct-contentCollection }
id-ct-contentCollection OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 19 }
ContentCollection ::= SEQUENCE SIZE (1..MAX) OF ContentInfo
-- -- Content With Attributes Content Type and Object Identifier --
--属性を含むコンテンツコンテンツタイプとオブジェクト識別子-
ct-ContentWithAttributes CONTENT-TYPE ::= { TYPE ContentWithAttributes IDENTIFIED BY id-ct-contentWithAttrs }
id-ct-contentWithAttrs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 20 }
ContentWithAttributes ::= SEQUENCE { content ContentInfo, attrs SEQUENCE SIZE (1..MAX) OF AttributeSet {{ ContentAttributeSet }} }
ContentAttributeSet ATTRIBUTE ::= { ... } END
RFC 4231 does not contain an ASN.1 module to be updated. We have therefore created an ASN.1 module to represent the ASN.1 that is present in the document. Note that the parameters are defined as expecting a parameter for the algorithm identifiers in this module; this is different from most of the algorithms used in PKIX and S/MIME. There is no concept of being able to truncate the MAC (Message Authentication Code) value in the ASN.1 unlike the XML definitions. This is reflected by not having a minimum MAC length defined in the ASN.1.
RFC 4231には、更新するASN.1モジュールが含まれていません。したがって、ドキュメントに存在するASN.1を表すASN.1モジュールを作成しました。パラメータは、このモジュールのアルゴリズム識別子のパラメータを期待するものとして定義されていることに注意してください。これは、PKIXおよびS / MIMEで使用されるほとんどのアルゴリズムとは異なります。 XML定義とは異なり、ASN.1のMAC(メッセージ認証コード)値を切り捨てることができるという概念はありません。これは、ASN.1で定義されている最小MAC長がないことによって反映されます。
HMAC-2010 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) mod(0) id-mod-hmac(74) } DEFINITIONS EXPLICIT TAGS ::= BEGIN EXPORTS ALL;
IMPORTS
輸入
MAC-ALGORITHM, SMIME-CAPS FROM AlgorithmInformation-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-algorithmInformation-02(58)};
-- -- This object set contains all of the MAC algorithms that are -- defined in this module. -- One would add it to a constraining set of objects such as the -- MessageAuthenticationCodeAlgorithmSet in [RFC5652] --
MessageAuthAlgs MAC-ALGORITHM ::= { maca-hMAC-SHA224 | maca-hMAC-SHA256 | maca-hMAC-SHA384 | maca-hMAC-SHA512 }
-- -- This object set contains all of the S/MIME capabilities that -- have been defined for all the MAC algorithms in this module. -- One would add this to an object set that is used to restrict -- S/MIME capabilities such as the SMimeCapsSet variable in -- RFC 3851 (obsoleted by RFC 5751) as modified in RFC 5911. --
SMimeCaps SMIME-CAPS ::= { maca-hMAC-SHA224.&smimeCaps | maca-hMAC-SHA256.&smimeCaps | maca-hMAC-SHA384.&smimeCaps | maca-hMAC-SHA512.&smimeCaps }
-- -- Define the base OID for the algorithm identifiers -- rsadsi OBJECT IDENTIFIER ::= {iso(1) member-body(2) us(840) rsadsi(113549)}
digestAlgorithm OBJECT IDENTIFIER ::= {rsadsi 2}
-- -- Define the necessary algorithm identifiers --
--必要なアルゴリズム識別子を定義します-
id-hmacWithSHA224 OBJECT IDENTIFIER ::= {digestAlgorithm 8} id-hmacWithSHA256 OBJECT IDENTIFIER ::= {digestAlgorithm 9} id-hmacWithSHA384 OBJECT IDENTIFIER ::= {digestAlgorithm 10} id-hmacWithSHA512 OBJECT IDENTIFIER ::= {digestAlgorithm 11}
-- -- Define each of the MAC-ALGORITHM objects to describe the -- algorithms defined --
maca-hMAC-SHA224 MAC-ALGORITHM ::= { IDENTIFIER id-hmacWithSHA224 PARAMS TYPE NULL ARE preferredPresent IS-KEYED-MAC TRUE SMIME-CAPS {IDENTIFIED BY id-hmacWithSHA224} }
maca-hMAC-SHA256 MAC-ALGORITHM ::= { IDENTIFIER id-hmacWithSHA256 PARAMS TYPE NULL ARE preferredPresent IS-KEYED-MAC TRUE SMIME-CAPS {IDENTIFIED BY id-hmacWithSHA256} }
maca-hMAC-SHA384 MAC-ALGORITHM ::= { IDENTIFIER id-hmacWithSHA384 PARAMS TYPE NULL ARE preferredPresent IS-KEYED-MAC TRUE SMIME-CAPS {IDENTIFIED BY id-hmacWithSHA384} } maca-hMAC-SHA512 MAC-ALGORITHM ::= { IDENTIFIER id-hmacWithSHA512 PARAMS TYPE NULL ARE preferredPresent IS-KEYED-MAC TRUE SMIME-CAPS {IDENTIFIED BY id-hmacWithSHA512} }
END
終わり
We have updated the ASN.1 module associated with RFC 4334 to be ASN.1 2008 compliant and to use the set of classes previously defined in [RFC5912].
RFC 4334に関連付けられたASN.1モジュールをASN.1 2008準拠に更新し、以前に[RFC5912]で定義されたクラスのセットを使用するようにしました。
WLANCertExtn-2010 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-wlan-extns-2(73) }
DEFINITIONS IMPLICIT TAGS ::= BEGIN EXPORTS ALL;
IMPORTS
輸入
EXTENSION, ATTRIBUTE FROM PKIX-CommonTypes-2009 {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57)}
id-pe, id-kp FROM PKIX1Explicit-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51)}
id-aca FROM PKIXAttributeCertificate-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-attribute-cert-02(47)}
;
;
-- Extended Key Usage Values
-拡張キー使用法の値
KeyUsageValues OBJECT IDENTIFIER ::= { id-kp-eapOverPPP | id-kp-eapOverLAN } id-kp-eapOverPPP OBJECT IDENTIFIER ::= { id-kp 13 }
id-kp-eapOverLAN OBJECT IDENTIFIER ::= { id-kp 14 }
-- Wireless LAN SSID Extension
-ワイヤレスLAN SSID拡張
ext-pe-wlanSSID EXTENSION ::= { SYNTAX SSIDList IDENTIFIED BY id-pe-wlanSSID CRITICALITY {FALSE} }
id-pe-wlanSSID OBJECT IDENTIFIER ::= { id-pe 13 }
SSIDList ::= SEQUENCE SIZE (1..MAX) OF SSID
SSID ::= OCTET STRING (SIZE (1..32))
-- Wireless LAN SSID Attribute Certificate Attribute -- Uses same syntax as the certificate extension: SSIDList
at-aca-wlanSSID ATTRIBUTE ::= { TYPE SSIDList IDENTIFIED BY id-aca-wlanSSID }
id-aca-wlanSSID OBJECT IDENTIFIER ::= { id-aca 7 }
END
終わり
This module is updated from RFC 5911 [RFC5911] by the following changes:
このモジュールは、RFC 5911 [RFC5911]から次の変更により更新されています。
1. Define separate attribute sets for the unprotected attributes used in EnvelopedData, EncryptedData, and AuthenticatedEnvelopedData (RFC 5083).
1. EnvelopedData、EncryptedData、およびAuthenticatedEnvelopedData(RFC 5083)で使用される保護されていない属性に対して個別の属性セットを定義します。
2. Define a parameterized type EncryptedContentInfoType so that the basic type can be used with different algorithm sets (used for EnvelopedData, EncryptedData, and AuthenticatedEnvelopedData (RFC 5083)). The parameterized type is assigned to an unparameterized type of EncryptedContentInfo to minimize the output changes from previous versions.
2.パラメーター化された型EncryptedContentInfoTypeを定義して、基本型をさまざまなアルゴリズムセット(EnvelopedData、EncryptedData、およびAuthenticatedEnvelopedData(RFC 5083)に使用)で使用できるようにします。パラメータ化されたタイプは、パラメータ化されていないタイプのEncryptedContentInfoに割り当てられ、以前のバージョンからの出力の変更を最小限に抑えます。
Protocol designers can make use of the '08 ASN.1 constraints to define different sets of attributes for EncryptedData and EnvelopedData and for AuthenticatedData and AuthEnvelopedData. Previously, attributes could only be constrained based on whether they were in the clear or unauthenticated not on the encapsulating content type.
プロトコル設計者は、'08 ASN.1制約を利用して、EncryptedDataとEnvelopedData、およびAuthenticatedDataとAuthEnvelopedDataのさまざまな属性セットを定義できます。以前は、属性は、カプセル化されたコンテンツタイプではなく、平文であるか認証されていないかに基づいてのみ制約できました。
CMS-AuthEnvelopedData-2010 {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cmsAuthEnvData-2009(57) } DEFINITIONS IMPLICIT TAGS ::= BEGIN IMPORTS
CMSVersion, EncryptedContentInfoType{}, MessageAuthenticationCode, OriginatorInfo, RecipientInfos, CONTENT-TYPE, Attributes{}, ATTRIBUTE, CONTENT-ENCRYPTION, AlgorithmIdentifier{}, aa-signingTime, aa-messageDigest, aa-contentType FROM CryptographicMessageSyntax-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }
ContentEncryptionAlgs FROM CMS-AES-CCM-and-AES-GCM-2009 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-aes-ccm-gcm-02(44) } ;
ContentTypes CONTENT-TYPE ::= {ct-authEnvelopedData, ... }
ct-authEnvelopedData CONTENT-TYPE ::= { TYPE AuthEnvelopedData IDENTIFIED BY id-ct-authEnvelopedData }
id-ct-authEnvelopedData OBJECT IDENTIFIER ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 23}
AuthEnvelopedData ::= SEQUENCE { version CMSVersion, originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, recipientInfos RecipientInfos, authEncryptedContentInfo EncryptedContentInfo, authAttrs [1] IMPLICIT AuthAttributes OPTIONAL, mac MessageAuthenticationCode, unauthAttrs [2] IMPLICIT UnauthAttributes OPTIONAL }
EncryptedContentInfo ::= EncryptedContentInfoType { AuthContentEncryptionAlgorithmIdentifier }
AuthContentEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier {CONTENT-ENCRYPTION, {AuthContentEncryptionAlgorithmSet}}
AuthContentEncryptionAlgorithmSet CONTENT-ENCRYPTION ::= { ContentEncryptionAlgs, ...}
AuthAttributes ::= Attributes{{AuthEnvDataAttributeSet}}
UnauthAttributes ::= Attributes{{UnauthEnvDataAttributeSet}}
AuthEnvDataAttributeSet ATTRIBUTE ::= { aa-contentType | aa-messageDigest | aa-signingTime, ... }
UnauthEnvDataAttributeSet ATTRIBUTE ::= {...}
END
終わり
This module is updated from RFC 5911 [RFC5911] by the following changes:
このモジュールは、RFC 5911 [RFC5911]から次の変更により更新されています。
1. Define separate attribute sets for the unprotected attributes used in EnvelopedData, EncryptedData, and AuthenticatedEnvelopedData (RFC 5083).
1. EnvelopedData、EncryptedData、およびAuthenticatedEnvelopedData(RFC 5083)で使用される保護されていない属性に対して個別の属性セットを定義します。
2. Define a parameterized type EncryptedContentInfoType so that the basic type can be used with algorithm sets (used for EnvelopedData, EncryptedData, and AuthenticatedEnvelopedData (RFC 5083)). The parameterized type is assigned to an unparameterized type of EncryptedContentInfo to minimize the output changes from previous versions.
2. パラメーター化された型EncryptedContentInfoTypeを定義して、基本型をアルゴリズムセットで使用できるようにします(EnvelopedData、EncryptedData、AuthenticatedEnvelopedData(RFC 5083)で使用)。パラメータ化されたタイプは、パラメータ化されていないタイプのEncryptedContentInfoに割り当てられ、以前のバージョンからの出力の変更を最小限に抑えます。
We are anticipating the definition of attributes that are going to be restricted to the use of only EnvelopedData. We are therefore separating the different attribute sets so that protocol designers that need to do this will be able to define attributes that are used for EnvelopedData, but not for EncryptedData. The same separation is also being applied to AuthenticatedData and AuthEnvelopedData.
EnvelopedDataのみの使用に制限される属性の定義を予期しています。したがって、異なる属性セットを分離して、これを行う必要があるプロトコル設計者がEnvelopedDataには使用されるがEncryptedDataには使用されない属性を定義できるようにします。同じ分離がAuthenticatedDataとAuthEnvelopedDataにも適用されています。
CryptographicMessageSyntax-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) } DEFINITIONS IMPLICIT TAGS ::= BEGIN IMPORTS
ParamOptions, DIGEST-ALGORITHM, SIGNATURE-ALGORITHM, PUBLIC-KEY, KEY-DERIVATION, KEY-WRAP, MAC-ALGORITHM, KEY-AGREE, KEY-TRANSPORT, CONTENT-ENCRYPTION, ALGORITHM, AlgorithmIdentifier{} FROM AlgorithmInformation-2009 {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-algorithmInformation-02(58)}
SignatureAlgs, MessageDigestAlgs, KeyAgreementAlgs, MessageAuthAlgs, KeyWrapAlgs, ContentEncryptionAlgs, KeyTransportAlgs, KeyDerivationAlgs, KeyAgreePublicKeys FROM CryptographicMessageSyntaxAlgorithms-2009 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cmsalg-2001-02(37) }
Certificate, CertificateList, CertificateSerialNumber, Name, ATTRIBUTE FROM PKIX1Explicit-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-explicit-02(51) }
AttributeCertificate FROM PKIXAttributeCertificate-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-attribute-cert-02(47) }
AttributeCertificateV1 FROM AttributeCertificateVersion1-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-v1AttrCert-02(49) } ;
-- Cryptographic Message Syntax
-暗号化メッセージの構文
-- The following are used for version numbers using the ASN.1 -- NOTE: The document reference represents where the versioned -- feature was introduced to the module. -- -- idiom "[[n:" -- Version 1 = PKCS #7 -- Version 2 = S/MIME V2 -- Version 3 = RFC 2630 -- Version 4 = RFC 3369 -- Version 5 = RFC 3852
CONTENT-TYPE ::= CLASS { &id OBJECT IDENTIFIER UNIQUE, &Type OPTIONAL } WITH SYNTAX { [TYPE &Type] IDENTIFIED BY &id }
ContentType ::= CONTENT-TYPE.&id
ContentInfo ::= SEQUENCE { contentType CONTENT-TYPE. &id({ContentSet}), content [0] EXPLICIT CONTENT-TYPE. &Type({ContentSet}{@contentType})}
ContentSet CONTENT-TYPE ::= { -- Define the set of content types to be recognized. ct-Data | ct-SignedData | ct-EncryptedData | ct-EnvelopedData | ct-AuthenticatedData | ct-DigestedData, ... }
SignedData ::= SEQUENCE { version CMSVersion, digestAlgorithms SET OF DigestAlgorithmIdentifier, encapContentInfo EncapsulatedContentInfo, certificates [0] IMPLICIT CertificateSet OPTIONAL, crls [1] IMPLICIT RevocationInfoChoices OPTIONAL, signerInfos SignerInfos }
SignerInfos ::= SET OF SignerInfo
EncapsulatedContentInfo ::= SEQUENCE { eContentType CONTENT-TYPE.&id({ContentSet}), eContent [0] EXPLICIT OCTET STRING ( CONTAINING CONTENT-TYPE. &Type({ContentSet}{@eContentType})) OPTIONAL }
SignerInfo ::= SEQUENCE { version CMSVersion, sid SignerIdentifier, digestAlgorithm DigestAlgorithmIdentifier, signedAttrs [0] IMPLICIT SignedAttributes OPTIONAL, signatureAlgorithm SignatureAlgorithmIdentifier, signature SignatureValue, unsignedAttrs [1] IMPLICIT Attributes {{UnsignedAttributes}} OPTIONAL }
SignedAttributes ::= Attributes {{ SignedAttributesSet }}
SignerIdentifier ::= CHOICE { issuerAndSerialNumber IssuerAndSerialNumber, ..., [[3: subjectKeyIdentifier [0] SubjectKeyIdentifier ]] }
SignedAttributesSet ATTRIBUTE ::= { aa-signingTime | aa-messageDigest | aa-contentType, ... }
UnsignedAttributes ATTRIBUTE ::= { aa-countersignature, ... }
SignatureValue ::= OCTET STRING
EnvelopedData ::= SEQUENCE { version CMSVersion, originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, recipientInfos RecipientInfos, encryptedContentInfo EncryptedContentInfo, ..., [[2: unprotectedAttrs [1] IMPLICIT Attributes {{ UnprotectedEnvAttributes }} OPTIONAL ]] }
OriginatorInfo ::= SEQUENCE { certs [0] IMPLICIT CertificateSet OPTIONAL, crls [1] IMPLICIT RevocationInfoChoices OPTIONAL }
RecipientInfos ::= SET SIZE (1..MAX) OF RecipientInfo
EncryptedContentInfo ::= EncryptedContentInfoType { ContentEncryptionAlgorithmIdentifier }
EncryptedContentInfoType { AlgorithmIdentifierType } ::= SEQUENCE { contentType CONTENT-TYPE.&id({ContentSet}), contentEncryptionAlgorithm AlgorithmIdentifierType, encryptedContent [0] IMPLICIT OCTET STRING OPTIONAL }
-- If you want to do constraints, you might use: -- EncryptedContentInfo ::= SEQUENCE { -- contentType CONTENT-TYPE.&id({ContentSet}), -- contentEncryptionAlgorithm ContentEncryptionAlgorithmIdentifier, -- encryptedContent [0] IMPLICIT ENCRYPTED {CONTENT-TYPE. -- &Type({ContentSet}{@contentType}) OPTIONAL } -- ENCRYPTED {ToBeEncrypted} ::= OCTET STRING ( CONSTRAINED BY -- { ToBeEncrypted } )
UnprotectedEnvAttributes ATTRIBUTE ::= { ... } UnprotectedEncAttributes ATTRIBUTE ::= { ... }
RecipientInfo ::= CHOICE { ktri KeyTransRecipientInfo, ..., [[3: kari [1] KeyAgreeRecipientInfo ]], [[4: kekri [2] KEKRecipientInfo]], [[5: pwri [3] PasswordRecipientInfo, ori [4] OtherRecipientInfo ]] }
EncryptedKey ::= OCTET STRING
KeyTransRecipientInfo ::= SEQUENCE { version CMSVersion, -- always set to 0 or 2 rid RecipientIdentifier, keyEncryptionAlgorithm AlgorithmIdentifier {KEY-TRANSPORT, {KeyTransportAlgorithmSet}}, encryptedKey EncryptedKey }
KeyTransportAlgorithmSet KEY-TRANSPORT ::= { KeyTransportAlgs, ... }
RecipientIdentifier ::= CHOICE { issuerAndSerialNumber IssuerAndSerialNumber, ..., [[2: subjectKeyIdentifier [0] SubjectKeyIdentifier ]] } KeyAgreeRecipientInfo ::= SEQUENCE { version CMSVersion, -- always set to 3 originator [0] EXPLICIT OriginatorIdentifierOrKey, ukm [1] EXPLICIT UserKeyingMaterial OPTIONAL, keyEncryptionAlgorithm AlgorithmIdentifier {KEY-AGREE, {KeyAgreementAlgorithmSet}}, recipientEncryptedKeys RecipientEncryptedKeys }
KeyAgreementAlgorithmSet KEY-AGREE ::= { KeyAgreementAlgs, ... } OriginatorIdentifierOrKey ::= CHOICE { issuerAndSerialNumber IssuerAndSerialNumber, subjectKeyIdentifier [0] SubjectKeyIdentifier, originatorKey [1] OriginatorPublicKey }
OriginatorPublicKey ::= SEQUENCE { algorithm AlgorithmIdentifier {PUBLIC-KEY, {OriginatorKeySet}}, publicKey BIT STRING }
OriginatorKeySet PUBLIC-KEY ::= { KeyAgreePublicKeys, ... }
RecipientEncryptedKeys ::= SEQUENCE OF RecipientEncryptedKey
RecipientEncryptedKey ::= SEQUENCE { rid KeyAgreeRecipientIdentifier, encryptedKey EncryptedKey }
KeyAgreeRecipientIdentifier ::= CHOICE { issuerAndSerialNumber IssuerAndSerialNumber, rKeyId [0] IMPLICIT RecipientKeyIdentifier }
RecipientKeyIdentifier ::= SEQUENCE { subjectKeyIdentifier SubjectKeyIdentifier, date GeneralizedTime OPTIONAL, other OtherKeyAttribute OPTIONAL }
SubjectKeyIdentifier ::= OCTET STRING
KEKRecipientInfo ::= SEQUENCE { version CMSVersion, -- always set to 4 kekid KEKIdentifier, keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, encryptedKey EncryptedKey }
KEKIdentifier ::= SEQUENCE { keyIdentifier OCTET STRING, date GeneralizedTime OPTIONAL, other OtherKeyAttribute OPTIONAL } PasswordRecipientInfo ::= SEQUENCE { version CMSVersion, -- always set to 0 keyDerivationAlgorithm [0] KeyDerivationAlgorithmIdentifier OPTIONAL, keyEncryptionAlgorithm KeyEncryptionAlgorithmIdentifier, encryptedKey EncryptedKey }
OTHER-RECIPIENT ::= TYPE-IDENTIFIER OtherRecipientInfo ::= SEQUENCE { oriType OTHER-RECIPIENT. &id({SupportedOtherRecipInfo}), oriValue OTHER-RECIPIENT. &Type({SupportedOtherRecipInfo}{@oriType})}
SupportedOtherRecipInfo OTHER-RECIPIENT ::= { ... }
DigestedData ::= SEQUENCE { version CMSVersion, digestAlgorithm DigestAlgorithmIdentifier, encapContentInfo EncapsulatedContentInfo, digest Digest, ... }
Digest ::= OCTET STRING
EncryptedData ::= SEQUENCE { version CMSVersion, encryptedContentInfo EncryptedContentInfo, ..., [[2: unprotectedAttrs [1] IMPLICIT Attributes {{UnprotectedEncAttributes}} OPTIONAL ]] }
AuthenticatedData ::= SEQUENCE { version CMSVersion, originatorInfo [0] IMPLICIT OriginatorInfo OPTIONAL, recipientInfos RecipientInfos, macAlgorithm MessageAuthenticationCodeAlgorithm, digestAlgorithm [1] DigestAlgorithmIdentifier OPTIONAL, encapContentInfo EncapsulatedContentInfo, authAttrs [2] IMPLICIT AuthAttributes OPTIONAL, mac MessageAuthenticationCode, unauthAttrs [3] IMPLICIT UnauthAttributes OPTIONAL }
AuthAttributes ::= SET SIZE (1..MAX) OF Attribute {{AuthAttributeSet}}
AuthAttributeSet ATTRIBUTE ::= { aa-contentType | aa-messageDigest | aa-signingTime, ...}
MessageAuthenticationCode ::= OCTET STRING
UnauthAttributes ::= SET SIZE (1..MAX) OF Attribute {{UnauthAttributeSet}}
UnauthAttributeSet ATTRIBUTE ::= {...}
-- -- General algorithm definitions --
--一般的なアルゴリズムの定義-
DigestAlgorithmIdentifier ::= AlgorithmIdentifier {DIGEST-ALGORITHM, {DigestAlgorithmSet}}
DigestAlgorithmSet DIGEST-ALGORITHM ::= { CryptographicMessageSyntaxAlgorithms-2009.MessageDigestAlgs, ... }
SignatureAlgorithmIdentifier ::= AlgorithmIdentifier {SIGNATURE-ALGORITHM, {SignatureAlgorithmSet}}
SignatureAlgorithmSet SIGNATURE-ALGORITHM ::= { SignatureAlgs, ... }
KeyEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier {KEY-WRAP, {KeyEncryptionAlgorithmSet}}
KeyEncryptionAlgorithmSet KEY-WRAP ::= { KeyWrapAlgs, ... }
ContentEncryptionAlgorithmIdentifier ::= AlgorithmIdentifier {CONTENT-ENCRYPTION, {ContentEncryptionAlgorithmSet}}
ContentEncryptionAlgorithmSet CONTENT-ENCRYPTION ::= { ContentEncryptionAlgs, ... }
MessageAuthenticationCodeAlgorithm ::= AlgorithmIdentifier {MAC-ALGORITHM, {MessageAuthenticationCodeAlgorithmSet}}
MessageAuthenticationCodeAlgorithmSet MAC-ALGORITHM ::= { MessageAuthAlgs, ... }
KeyDerivationAlgorithmIdentifier ::= AlgorithmIdentifier {KEY-DERIVATION, {KeyDerivationAlgs, ...}}
RevocationInfoChoices ::= SET OF RevocationInfoChoice
RevocationInfoChoice ::= CHOICE { crl CertificateList, ..., [[5: other [1] IMPLICIT OtherRevocationInfoFormat ]] }
OTHER-REVOK-INFO ::= TYPE-IDENTIFIER OtherRevocationInfoFormat ::= SEQUENCE { otherRevInfoFormat OTHER-REVOK-INFO. &id({SupportedOtherRevokInfo}), otherRevInfo OTHER-REVOK-INFO. &Type({SupportedOtherRevokInfo}{@otherRevInfoFormat})}
SupportedOtherRevokInfo OTHER-REVOK-INFO ::= { ... }
CertificateChoices ::= CHOICE { certificate Certificate, extendedCertificate [0] IMPLICIT ExtendedCertificate, -- Obsolete ..., [[3: v1AttrCert [1] IMPLICIT AttributeCertificateV1]], -- Obsolete [[4: v2AttrCert [2] IMPLICIT AttributeCertificateV2]], [[5: other [3] IMPLICIT OtherCertificateFormat]] }
AttributeCertificateV2 ::= AttributeCertificate
OTHER-CERT-FMT ::= TYPE-IDENTIFIER
OtherCertificateFormat ::= SEQUENCE { otherCertFormat OTHER-CERT-FMT. &id({SupportedCertFormats}), otherCert OTHER-CERT-FMT. &Type({SupportedCertFormats}{@otherCertFormat})}
SupportedCertFormats OTHER-CERT-FMT ::= { ... }
CertificateSet ::= SET OF CertificateChoices
IssuerAndSerialNumber ::= SEQUENCE { issuer Name, serialNumber CertificateSerialNumber }
CMSVersion ::= INTEGER { v0(0), v1(1), v2(2), v3(3), v4(4), v5(5) }
UserKeyingMaterial ::= OCTET STRING
KEY-ATTRIBUTE ::= TYPE-IDENTIFIER
OtherKeyAttribute ::= SEQUENCE { keyAttrId KEY-ATTRIBUTE. &id({SupportedKeyAttributes}), keyAttr KEY-ATTRIBUTE. &Type({SupportedKeyAttributes}{@keyAttrId})}
SupportedKeyAttributes KEY-ATTRIBUTE ::= { ... }
-- Content Type Object Identifiers
-コンテンツタイプオブジェクト識別子
id-ct-contentInfo OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) ct(1) 6 }
ct-Data CONTENT-TYPE ::= { IDENTIFIED BY id-data }
id-data OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs7(7) 1 }
ct-SignedData CONTENT-TYPE ::= { TYPE SignedData IDENTIFIED BY id-signedData}
id-signedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs7(7) 2 }
ct-EnvelopedData CONTENT-TYPE ::= { TYPE EnvelopedData IDENTIFIED BY id-envelopedData}
id-envelopedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs7(7) 3 }
ct-DigestedData CONTENT-TYPE ::= { TYPE DigestedData IDENTIFIED BY id-digestedData}
id-digestedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs7(7) 5 }
ct-EncryptedData CONTENT-TYPE ::= { TYPE EncryptedData IDENTIFIED BY id-encryptedData}
id-encryptedData OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs7(7) 6 }
ct-AuthenticatedData CONTENT-TYPE ::= { TYPE AuthenticatedData IDENTIFIED BY id-ct-authData}
id-ct-authData OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) ct(1) 2 }
-- -- The CMS Attributes --
--CMS属性-
MessageDigest ::= OCTET STRING SigningTime ::= Time
Time ::= CHOICE { utcTime UTCTime, generalTime GeneralizedTime }
Countersignature ::= SignerInfo
-- Attribute Object Identifiers
-属性オブジェクト識別子
aa-contentType ATTRIBUTE ::= { TYPE ContentType IDENTIFIED BY id-contentType } id-contentType OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) 3 }
aa-messageDigest ATTRIBUTE ::= { TYPE MessageDigest IDENTIFIED BY id-messageDigest} id-messageDigest OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) 4 }
aa-signingTime ATTRIBUTE ::= { TYPE SigningTime IDENTIFIED BY id-signingTime } id-signingTime OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) 5 }
aa-countersignature ATTRIBUTE ::= { TYPE Countersignature IDENTIFIED BY id-countersignature } id-countersignature OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) 6 }
-- -- Obsolete Extended Certificate syntax from PKCS#6 --
--PKCS#6から廃止された拡張証明書構文-
ExtendedCertificateOrCertificate ::= CHOICE { certificate Certificate, extendedCertificate [0] IMPLICIT ExtendedCertificate }
ExtendedCertificate ::= SEQUENCE { extendedCertificateInfo ExtendedCertificateInfo, signatureAlgorithm SignatureAlgorithmIdentifier, signature Signature }
ExtendedCertificateInfo ::= SEQUENCE { version CMSVersion, certificate Certificate, attributes UnauthAttributes }
Signature ::= BIT STRING
Attribute{ ATTRIBUTE:AttrList } ::= SEQUENCE { attrType ATTRIBUTE. &id({AttrList}), attrValues SET OF ATTRIBUTE. &Type({AttrList}{@attrType}) }
Attributes { ATTRIBUTE:AttrList } ::= SET SIZE (1..MAX) OF Attribute {{ AttrList }}
END
終わり
We have updated the ASN.1 module associated with this document to be 2008 compliant and to use the set of classes previously defined in [RFC5911].
このドキュメントに関連するASN.1モジュールを2008準拠に更新し、[RFC5911]で以前に定義されたクラスのセットを使用するようにしました。
MultipleSignatures-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) smime(16) modules(0) id-mod-multipleSign-2009(59) } DEFINITIONS IMPLICIT TAGS ::= BEGIN -- EXPORTS All -- The types and values defined in this module are exported for use -- in the other ASN.1 modules. Other applications may use them for -- their own purposes.
IMPORTS
輸入
-- Imports from PKIX-Common-Types-2009 [RFC5912]
-PKIX-Common-Types-2009 [RFC5912]からのインポート
ATTRIBUTE FROM PKIX-CommonTypes-2009 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-pkixCommon-02(57)}
-- Imports from CryptographicMessageSyntax-2010 [RFC6268]
-CryptographicMessageSyntax-2010からのインポート[RFC6268]
DigestAlgorithmIdentifier, SignatureAlgorithmIdentifier FROM CryptographicMessageSyntax-2010 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-cms-2009(58) }
-- Imports from ExtendedSecurityServices-2009 [RFC5911]
-ExtendedSecurityServices-2009からのインポート[RFC5911]
ESSCertIDv2 FROM ExtendedSecurityServices-2009 { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) id-mod-ess-2006-02(42) } ;
-- -- Section 3.0 -- -- at-multipleSignatures should be added ONLY to the -- SignedAttributesSet defined in [RFC5652] --
at-multipleSignatures ATTRIBUTE ::= { TYPE MultipleSignatures IDENTIFIED BY id-aa-multipleSignatures }
id-aa-multipleSignatures OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9) id-aa(2) 51 }
MultipleSignatures ::= SEQUENCE { bodyHashAlg DigestAlgorithmIdentifier, signAlg SignatureAlgorithmIdentifier, signAttrsHash SignAttrsHash, cert ESSCertIDv2 OPTIONAL }
SignAttrsHash ::= SEQUENCE { algID DigestAlgorithmIdentifier, hash OCTET STRING }
END
終わり
One potential issue that can occur when updating modules is the fact that a large number of modules may need to be updated if they import from a newly updated module. This section addresses one method that can be used to deal with this problem, but the modules in this document don't currently implement the solution discussed here.
モジュールの更新時に発生する可能性のある1つの問題は、新しく更新されたモジュールからインポートする場合、多数のモジュールを更新する必要がある場合があるという事実です。このセクションでは、この問題に対処するために使用できる1つの方法について説明しますが、このドキュメントのモジュールは現在、ここで説明するソリューションを実装していません。
When looking at an import statement, there are three portions: The list of items imported, a textual name for the module, and an object identifier for the module. Full implementations of ASN.1 do module matching using first the object identifier, and if that is not present, the textual name of the module. Note however that some older implementations used the textual name of the module for the purposes of matching. In a full implementation, the name assigned to the module is scoped to the ASN.1 module that it appears in (and thus the need to match the module it is importing from).
importステートメントを見ると、3つの部分があります。インポートされたアイテムのリスト、モジュールのテキスト名、モジュールのオブジェクト識別子です。 ASN.1の完全な実装は、最初にオブジェクト識別子を使用してモジュール照合を行い、それが存在しない場合は、モジュールのテキスト名を使用します。ただし、一部の古い実装では、照合の目的でモジュールのテキスト名を使用していたことに注意してください。完全な実装では、モジュールに割り当てられた名前は、それが表示されるASN.1モジュールにスコープされます(したがって、インポート元のモジュールと一致する必要があります)。
One can create a module that contains only the module number assignments and import the module assignments from the new module. This means that when a module is replaced, one can replace the previous module, update the module number assignment module, and recompile without having to modify any other modules.
モジュール番号の割り当てのみを含むモジュールを作成し、新しいモジュールからモジュールの割り当てをインポートできます。つまり、モジュールを交換すると、以前のモジュールを交換し、モジュール番号割り当てモジュールを更新して、他のモジュールを変更せずに再コンパイルできます。
A sample module assignment module would be:
モジュール割り当てモジュールの例は次のとおりです。
ModuleNumbers DEFINITIONS TAGS ::= BEGIN id-mod-CMS ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) modules(0) 58 }
id-mod-AlgInfo ::= {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-algorithmInformation-02(58)} END
This would be used in the following import statement:
これは、次のインポートステートメントで使用されます。
IMPORTS id-mod-CMS, id-mod-AlgInfo FROM ModuleNumbers -- Note it will match on the name since no -- OID is provided
IMPORTS id-mod-CMS、id-mod-AlgInfo FROM ModuleNumbers-ないので名前と一致することに注意してください-OIDが提供されます
CMSVersion, EncapsulatedContentInfo, CONTENT-TYPE FROM CryptographicMessageSyntax-2010 id-mod-CMS
CMSVersion、EncapsulatedContentInfo、CONTENT-TYPE FROM CryptographicMessageSyntax-2010 id-mod-CMS
AlgorithmIdentifier{}, SMIME-CAPS, ParamOptions FROM AlgorithmInformation-2009 id-mod-AlgInfo ;
AlgorithmIdentifier {}、SMIME-CAPS、ParamOptions FROM AlgorithmInformation-2009 id-mod-AlgInfo;
This document itself does not have any security considerations. The ASN.1 modules keep the same bits-on-the-wire as the modules that they replace.
このドキュメント自体には、セキュリティに関する考慮事項はありません。 ASN.1モジュールは、交換するモジュールと同じビットオンザワイヤーを維持します。
[ASN1-2008] ITU-T, "ITU-T Recommendations X.680, X.681, X.682, and X.683", 2008.
[ASN1-2008] ITU-T、「ITU-T勧告X.680、X.681、X.682、およびX.683」、2008。
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2119] Bradner、S。、「要件レベルを示すためにRFCで使用するキーワード」、BCP 14、RFC 2119、1997年3月。
[RFC3274] Gutmann, P., "Compressed Data Content Type for Cryptographic Message Syntax (CMS)", RFC 3274, June 2002.
[RFC3274] Gutmann、P。、「暗号化メッセージ構文(CMS)の圧縮データコンテンツタイプ」、RFC 3274、2002年6月。
[RFC3779] Lynn, C., Kent, S., and K. Seo, "X.509 Extensions for IP Addresses and AS Identifiers", RFC 3779, June 2004.
[RFC3779] Lynn, C., Kent, S., and K. Seo, "X.509 Extensions for IP Addresses and AS Identifiers", RFC 3779, June 2004.
[RFC4073] Housley, R., "Protecting Multiple Contents with the Cryptographic Message Syntax (CMS)", RFC 4073, May 2005.
[RFC4073] Housley、R。、「Cryptographic Message Syntax(CMS)による複数のコンテンツの保護」、RFC 4073、2005年5月。
[RFC4231] Nystrom, M., "Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512", RFC 4231, December 2005.
[RFC4231] Nystrom、M。、「HMAC-SHA-224、HMAC-SHA-256、HMAC-SHA-384、およびHMAC-SHA-512の識別子とテストベクトル」、RFC 4231、2005年12月。
[RFC4334] Housley, R. and T. Moore, "Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN)", RFC 4334, February 2006.
[RFC4334] Housley、R。およびT. Moore、「ポイントツーポイントプロトコル(PPP)およびワイヤレスローカルエリアネットワーク(WLAN)での認証をサポートする証明書の拡張と属性」、RFC 4334、2006年2月。
[RFC5083] Housley, R., "Cryptographic Message Syntax (CMS) Authenticated-Enveloped-Data Content Type", RFC 5083, November 2007.
[RFC5083] Housley、R。、「Cryptographic Message Syntax(CMS)Authenticated-Enveloped-Data Content Type」、RFC 5083、2007年11月。
[RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile", RFC 5280, May 2008.
[RFC5280] Cooper、D.、Santesson、S.、Farrell、S.、Boeyen、S.、Housley、R。、およびW. Polk、「Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL)Profile "、RFC 5280、2008年5月。
[RFC5652] Housley, R., "Cryptographic Message Syntax (CMS)", STD 70, RFC 5652, September 2009.
[RFC5652] Housley、R。、「Cryptographic Message Syntax(CMS)」、STD 70、RFC 5652、2009年9月。
[RFC5752] Turner, S. and J. Schaad, "Multiple Signatures in Cryptographic Message Syntax (CMS)", RFC 5752, January 2010.
[RFC5752]ターナーS.およびJ.シャード、「暗号化メッセージ構文(CMS)の複数の署名」、RFC 5752、2010年1月。
[RFC5911] Hoffman, P. and J. Schaad, "New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME", RFC 5911, June 2010.
[RFC5911] Hoffman、P。およびJ. Schaad、「暗号化メッセージ構文(CMS)およびS / MIMEの新しいASN.1モジュール」、RFC 5911、2010年6月。
[RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, June 2010.
[RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, June 2010.
[RFC6019] Housley, R., "BinaryTime: An Alternate Format for Representing Date and Time in ASN.1", RFC 6019, September 2010.
[RFC6019] Housley, R., "BinaryTime: An Alternate Format for Representing Date and Time in ASN.1", RFC 6019, September 2010.
[RFC5751] Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification", RFC 5751, January 2010.
[RFC5751] Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification", RFC 5751, January 2010.
[RFC6025] Wallace, C. and C. Gardiner, "ASN.1 Translation", RFC 6025, October 2010.
[RFC6025] Wallace, C. and C. Gardiner, "ASN.1 Translation", RFC 6025, October 2010.
Authors' Addresses
著者のアドレス
Jim Schaad Soaring Hawk Consulting
ジムシャードソアリングホークコンサルティング
EMail: ietf@augustcellars.com
Sean Turner IECA, Inc. 3057 Nutley Street, Suite 106 Fairfax, VA 22031
Sean Turner IECA、Inc. 3057 Nutley Street、Suite 106 Fairfax、VA 22031
EMail: turners@ieca.com