<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.1 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ito-documentsigning-eku-01" category="info">

  <front>
    <title abbrev="EKU for Document Signing">General Purpose Extended Key Usage (EKU) for Document Signing X.509 Certificates</title>

    <author initials="T." surname="Ito" fullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Okubo" fullname="Tomofumi Okubo">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2021" month="July" day="12"/>

    <area>Security</area>
    <workgroup>Individual</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t><xref target="RFC5280"/> specifies several extended key usages for X.509 certificates. This document defines a general purpose document signing extended key usage for X.509 public key certificates which restricts the usage of the certificates for document signing.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC5280"/> specifies several extended key usages for X.509 certificates. In addition, 
several extended key usage had been added<xref target="RFC7299"/> as public OID under the IANA repository.
While usage of any extended key usage is bad practice for publicly trusted certificates, 
there are no public and general extended key usage explicitly assigned for Document Signing certificates. 
The current practice is to use id-kp-emailProtection, id-kp-codeSigning or vendor defined Object ID 
for general document signing purposes.</t>

<t>In circumstances where code signing and S/MIME certificates are also widely used for document signing, 
the technical or policy changes that are made to code signing and S/MIME certificates may cause 
unexpected behaviors or have an adverse impact such as 
decreased cryptographic agility on the document signing ecosystem and vice versa.</t>

<t>There is no issue if the vendor defined OIDs are used in a PKI (or a trust program) governed by the vendor.
However, if the OID is used outside of the vendor governance, the usage can easily become out of control
(e.g. - When the end user encounters vendor defined OIDs, they might want to ask that vendor about use of the certificate, however, the vendor may not know about the particular use. - If the issuance of the cert is not under the control of the OID owner, there is no way for the OID owner to know what the impact will be if any change is made to the OID in question, and it would restrict vendor's choice of OID management. etc.).
<!--何が問題かを、上に書いた。--></t>

<t>Therefore, it is not favorable to use a vendor defined EKU for signing a document that is not governed by the vendor.</t>

<t>This document defines a general Document Signing extended key usage.</t>

</section>
<section anchor="conventions-and-definitions" title="Conventions and Definitions">

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="extended-key-usage-for-documentsigning" title="Extended Key usage for DocumentSigning">
<t>This specification defines the KeyPurposeId id-kp-documentSigning.
Inclusion of this KeyPurposeId in a certificate indicates that the
use of any Subject names in the certificate is restricted to use by a document signing.</t>

<t>Term of "Document Sign" in this paper is digitaly signing human readable data or data that is intended to be human readable by means of services and software.</t>

<section anchor="ext" title="Extended Key Usage Values for Document Signing">
<t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use in the Internet.  The extension indicates one or more purposes for which the certified public key is valid.  The EKU extension can be used in conjunction with the key usage extension, which indicates how the public key in the certificate is used, in a more basic cryptographic way.</t>

<t>The EKU extension syntax is repeated here for convenience:</t>

<figure><artwork><![CDATA[
    ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId
    KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork></figure>

<t>This specification defines the KeyPurposeId id-kp-documentSigning. Inclusion of this KeyPurposeId in a certificate indicates that the use of any Subject names in the certificate is restricted to use by a document signing service or a software (along with any usages allowed by other EKU values).</t>

<!-- the use of any Subject names in the certificate is restricted to use by a document signing service or a software. これはそのままでいいと思う？-->

<figure><artwork><![CDATA[
    id-kp  OBJECT IDENTIFIER  ::=
        { iso(1) identified-organization(3) dod(6) internet(1)
          security(5) mechanisms(5) pkix(7) 3 }
    id-kp-documentSigning  OBJECT IDENTIFIER  ::=  { id-kp XX }
]]></artwork></figure>

</section>
</section>
<section anchor="implications-for-a-certification-authority" title="Implications for a Certification Authority">
<t>The procedures and practices employed by a certification authority MUST ensure that the correct values for the EKU extension are inserted in each certificate that is issued.
Unless certificates are governed by a vendor specific PKI (or trust program), certificates that indicate usage for document signing MAY include the id-kp-documentSigning EKU extension. This does not encompass the mandatory usage of the id-kp-documentSigning EKU in conjunction with the vendor specific EKU. However, this does not restrict the CA from including multiple EKUs related to document signing.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">
<t>The Use of id-kp-documentSigning EKU can prevents the usage of id-kp-emailProtection for none-email purposes and  id-kp-codeSigning for signing objects other than binary codes. An id-kp-documentSigning EKU value does not introduce any new security or privacy concerns.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests that IANA make two assignments. One for the id-kp-documentSigning object identifier (OID), as defined in <xref target="ext"/>, for the EKU from the "SMI Security for PKIX Extended Key Purpose" (1.3.6.1.5.5.7.3) registry.  Another for the id-mod-docsign-eku, as defined in Appendix A, for the ASN.1 module <xref target="X.680"/> from the in the "SMI Security for PKIX Module Identifier" (1.3.6.1.5.5.7.0) registry.  No further action is necessary by IANA.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

<reference anchor="X.680" >
  <front>
    <title>Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
    <author >
      <organization>ITU-T</organization>
    </author>
    <date year="2015" month="November"/>
  </front>
  <seriesInfo name="ISO/IEC" value="8824-1:2015"/>
</reference>




<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC7299' target='https://www.rfc-editor.org/info/rfc7299'>
<front>
<title>Object Identifier Registry for the PKIX Working Group</title>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='July' year='2014'/>
<abstract><t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group.  This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t></abstract>
</front>
<seriesInfo name='RFC' value='7299'/>
<seriesInfo name='DOI' value='10.17487/RFC7299'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>



<section numbered="false" anchor="acknowledgments" title="Acknowledgments">

<t>We would like to thank Russ Housley for verifying the ASN.1 module.</t>

</section>
<section numbered="false" anchor="appendix-a-asn1-module" title="Appendix A. ASN.1 Module">

<t>The following ASN.1 module provides the complete definition of the
Document Signing EKU.</t>

<figure><artwork><![CDATA[
DocSignEKU { iso(1) identified-organization(3) dod(6) internet(1)
   security(5) mechanisms(5) pkix(7) id-mod(0) id-mod-docsign-eku(TBD1) }

   DEFINITIONS EXPLICIT TAGS ::=

   BEGIN

   -- EXPORTS ALL --

   -- IMPORTS NOTHING --

   -- OID Arc --

   id-kp  OBJECT IDENTIFIER  ::= {
     iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) kp(3) }

   -- Document Signing Extended Key Usage --

   id-kp-documentSigning OBJECT IDENTIFIER ::= { id-kp TBD2 }

   END
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

