Network Working Group Sean Turner, IECA Internet Draft March 4, 2009 Intended Status: Informational Track Expires: September 4, 2009 Clearance Sponsor Attribute draft-turner-clearancesponsor-attribute-01.txt Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire on September 4, 2009. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Turner Expires September 4, 2009 [Page 1] Internet-Draft Clearance Sponsor Attribute March 2009 Abstract This document defines the clearance sponsor attribute. This attribute may be carried in a public key certificate in the Subject Directory Attributes extension, in an attribute certificate in the attribute field, in a directory as an attribute, or in protocols that support attributes. 1. Introduction This document specifies the clearance sponsor attribute. This attribute may be included in public key certificates [RFC5280], attribute certificates [RFC3281bis], directories [X.500]/[RFC4512], or locations that support attributes. These attributes may be used in authorization decisions. 1.1. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 1.2. ASN.1 Syntax Notation The attributes are defined using ASN.1 [X.680]. 2. Clearance Sponsor The clearance sponsor attribute indicates the sponsor of the clearance of the object with which this attribute is associated. This attribute is only meaningful if the clearance attribute [RFC3281bis] is also present. The clearance sponsor attribute is a DirectoryString [RFC5280], which MUST use the UTF8String CHOICE, string with a minimum size of 1 characters and a maximum of 32 characters. The following object identifier identifies the sponsor attribute: id-aa-KP-clearanceSponsor OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) dod(2) infosec(1) attributes(5) 68 } Turner Expires September 4, 2009 [Page 2] Internet-Draft Clearance Sponsor Attribute March 2009 The ASN.1 syntax for the clearance sponsor attribute is as follows: clearanceSponsor ATTRIBUTE ::= { WITH SYNTAX DirectoryString { ub-clearance-sponsor } EQUALITY-MATCHING RULE caseIgnoreMatch SINGLE VALUE TRUE IDENTIFIED BY id-clearanceSponsor } ub-clearance-sponsor INTEGER ::= 32 There must only be one value of clearanceSponsor associated with a particular object. 3. Security Considerations If this attribute is used as part of an authorization process, the procedures employed by the entity that assigns each value must ensure that the correct value is applied. Further, once applied to the object it must be bound to the object; this binding is normally performed by digitally signing over the object and the attribute to ensure data integrity. 4. IANA Considerations None: All identifiers are already registered. Please remove this section prior to publication as an RFC. 5. References 5.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC5280] Cooper, D., et.al., "Internet X.509 Public Key Infrastructure Certificate and Certification Revocation List (CRL) Profile", RFC 5280, May 2008. [RFC3281bis]Farrell, S., Housley, R., and S. Turner, "An Internet Attribute Certificate Profile for Authorization", draft- ietf-pkix-3281bis-04.txt, work-in-progress. /** RFC Edit: Please replace "RFC3281bis" with "RFC####" where #### is the number of the published RFC in both the references and Turner Expires September 4, 2009 [Page 3] Internet-Draft Clearance Sponsor Attribute March 2009 the text. **/ [X.680] ITU-T Recommendation X.680 (2002) | ISO/IEC 8824-1:2002, Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation. [X.520] ITU-T Recommendation X.520 (2005) | ISO/IEC 9594-6:2005, Information technology - Open Systems Interconnection - The Directory: Selected attribute types. 5.2. Informative References [RFC4512] Sermersheim, J., "Lightweight Directory Access Protocol (LDAP): Directory Information Models", RFC 4512, June 2006. [X.500] ITU-T Recommendation X.500 (2005) | ISO/IEC 9594-1:2005, Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services. Appendix A. ASN.1 Module This appendix provides the normative ASN.1 [X.680] definition for the structure described in this specification. ClearanceSponsorAttribute-2008 { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) dod(2) infosec(1) modules(0) id-clearanceSponsorAttribute-2008(35) } DEFINITIONS IMPLICT TAGS ::= BEGIN -- EXPORTS ALL -- IMPORTS -- Imports from RFC 5280 [RFC5280]. DirectoryString PKIX1Explicit88 { iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) id-mod(0) id-pkix1-explicit(18) } Turner Expires September 4, 2009 [Page 4] Internet-Draft Clearance Sponsor Attribute March 2009 -- Imports from ITU-T X.520 [X.520]. caseIgnoreMatch FROM SelectedAttributeTypes { joint-iso-itu-t ds(5) module(1) selectedAttributeTypes(5) 4 } ; -- sponsor attribute OID and syntax id-clearanceSponsor OBJECT IDENTIFIER ::= { joint-iso-ccitt(2) country(16) us(840) organization(1) gov(101) dod(2) infosec(1) attributes(5) 68 } clearanceSponsor ATTRIBUTE ::= { WITH SYNTAX DirectoryString { ub-clearance-sponsor } EQUALITY-MATCHING RULE caseIgnoreMatch SINGLE VALUE TRUE IDENTIFIED BY id-clearanceSponsor } ub-clearance-sponsor INTEGER ::= 32 Turner Expires September 4, 2009 [Page 5] Internet-Draft Clearance Sponsor Attribute March 2009 ATTRIBUTE ::= CLASS { &derivation ATTRIBUTE OPTIONAL, &Type OPTIONAL, -- either &Type or &derivation required &equality-match MATCHING-RULE OPTIONAL, &ordering-match MATCHING-RULE OPTIONAL, &substrings-match MATCHING-RULE OPTIONAL, &single-valued BOOLEAN DEFAULT FALSE, &collective BOOLEAN DEFAULT FALSE, -- operational extensions &no-user-modification BOOLEAN DEFAULT FALSE, &usage AttributeUsage DEFAULT userApplications, &id OBJECT IDENTIFIER UNIQUE } WITH SYNTAX { [ SUBTYPE OF &derivation ] [ WITH SYNTAX &Type ] [ EQUALITY MATCHING RULE &equality-match ] [ ORDERING MATCHING RULE &ordering-match ] [ SUBSTRINGS MATCHING RULE &substrings-match ] [ SINGLE VALUE &single-valued ] [ COLLECTIVE &collective ] [ NO USER MODIFICATION &no-user-modification ] [ USAGE &usage ] ID &id } MATCHING-RULE ::= CLASS { &AssertionType OPTIONAL, &id OBJECT IDENTIFIER UNIQUE } WITH SYNTAX { [ SYNTAX &AssertionType ] ID &id } AttributeType ::= ATTRIBUTE.&id AttributeValue ::= ATTRIBUTE.&Type AttributeUsage ::= ENUMERATED { userApplications (0), directoryOperation (1), distributedOperation (2), dSAOperation (3) } END Turner Expires September 4, 2009 [Page 6] Internet-Draft Clearance Sponsor Attribute March 2009 Author's Addresses Sean Turner IECA, Inc. 3057 Nutley Street, Suite 106 Fairfax, VA 22031 USA Email: turners@ieca.com Turner Expires September 4, 2009 [Page 7]