rfc9045xml2.original.xml | rfc9045.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="UTF-8"?> | <?xml version='1.0' encoding='utf-8'?> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.2 --> | ||||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | ||||
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.2119.xml"> | ||||
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.8174.xml"> | ||||
<!ENTITY RFC8018 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.8018.xml"> | ||||
<!ENTITY RFC4211 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.4211.xml"> | ||||
<!ENTITY I-D.ietf-lamps-cms-aes-gmac-alg SYSTEM "https://xml2rfc.tools.ietf.org/ | ||||
public/rfc/bibxml3/reference.I-D.ietf-lamps-cms-aes-gmac-alg.xml"> | ||||
<!ENTITY RFC4231 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.4231.xml"> | ||||
<!ENTITY RFC6194 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/refere | ||||
nce.RFC.6194.xml"> | ||||
]> | ||||
<?rfc toc="yes"?> | <!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | |||
<?rfc sortrefs="yes"?> | ||||
<?rfc symrefs="yes"?> | ||||
<rfc ipr="pre5378Trust200902" docName="draft-ietf-lamps-crmf-update-algs-07" cat egory="std" consensus="true" updates="4211"> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="pre5378Trust200902" docName ="draft-ietf-lamps-crmf-update-algs-07" category="std" consensus="true" updates= "4211" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRe fs="true" symRefs="true" version="3" number="9045"> | |||
<front> | <front> | |||
<title abbrev="CRMF Algorithm Requirements Update">Algorithm Requirements Up date to the Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title> | <title abbrev="CRMF Algorithm Requirements Update">Algorithm Requirements Up date to the Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title> | |||
<seriesInfo name="RFC" value="9045"/> | ||||
<author initials="R." surname="Housley" fullname="Russ Housley"> | <author initials="R." surname="Housley" fullname="Russ Housley"> | |||
<organization abbrev="Vigil Security">Vigil Security, LLC</organization> | <organization abbrev="Vigil Security">Vigil Security, LLC</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>516 Dranesville Road</street> | <street>516 Dranesville Road</street> | |||
<city>Herndon, VA</city> | <city>Herndon</city> | |||
<region>VA</region> | ||||
<code>20170</code> | <code>20170</code> | |||
<country>US</country> | <country>United States of America</country> | |||
</postal> | </postal> | |||
<email>housley@vigilsec.com</email> | <email>housley@vigilsec.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2021" month="June"/> | ||||
<date year="2021" month="April" day="08"/> | ||||
<area>Security</area> | <area>Security</area> | |||
<keyword>Internet-Draft</keyword> | <keyword>Authentication</keyword> | |||
<keyword>Message Authentication Code</keyword> | ||||
<keyword>Password-Based Message Authentication Code</keyword> | ||||
<abstract> | <abstract> | |||
<t>This document updates the cryptographic algorithm requirements for the | ||||
<t>This document updates the cryptographic algorithm requirements for the | ||||
Password-Based Message Authentication Code in the Internet X.509 Public | Password-Based Message Authentication Code in the Internet X.509 Public | |||
Key Infrastructure Certificate Request Message Format (CRMF) specified in | Key Infrastructure Certificate Request Message Format (CRMF) specified in | |||
RFC 4211.</t> | RFC 4211.</t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="intro" numbered="true" toc="default"> | ||||
<section anchor="intro"><name>Introduction</name> | <name>Introduction</name> | |||
<t>This document updates the cryptographic algorithm requirements for the | <t>This document updates the cryptographic algorithm requirements for the | |||
Password-Based Message Authentication Code (MAC) in the Internet X.509 | Password-Based Message Authentication Code (MAC) in the Internet X.509 | |||
Public Key Infrastructure Certificate Request Message Format (CRMF) | Public Key Infrastructure Certificate Request Message Format (CRMF) | |||
<xref target="RFC4211"/>. The algorithms specified in <xref target="RFC4211"/> were appropriate in | <xref target="RFC4211" format="default"/>. The algorithms specified in <xref ta rget="RFC4211" format="default"/> were appropriate in | |||
2005; however, these algorithms are no longer considered the best | 2005; however, these algorithms are no longer considered the best | |||
choices:</t> | choices: | |||
<t><list style="symbols"> | ||||
<t>HMAC-SHA1 <xref target="HMAC"/><xref target="SHS"/> is not broken yet, but | ||||
there are much stronger alternatives <xref target="RFC6194"/>.</t> | ||||
<t>DES-MAC <xref target="PKCS11"/> provides 56 bits of security, which is no l | ||||
onger considered secure <xref target="WITHDRAW"/>.</t> | ||||
<t>Triple-DES-MAC <xref target="PKCS11"/> provides 112 bits of security, which | ||||
is now deprecated <xref target="TRANSIT"/>.</t> | ||||
</list></t> | ||||
<t>This update specifies algorithms that are more appropriate today.</t> | ||||
<t>CRMF is defined using Abstract Syntax Notation One (ASN.1) <xref target="X680 | ||||
"/>.</t> | ||||
</section> | ||||
<section anchor="terms"><name>Terminology</name> | ||||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | </t> | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | <ul spacing="normal"> | |||
"OPTIONAL" in this document are to be interpreted as described in | <li>HMAC-SHA1 <xref target="HMAC" format="default"/> <xref target="SHS" | |||
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, th | format="default"/> is not broken yet, but there are much stronger alternatives < | |||
ey appear in | xref target="RFC6194" format="default"/>.</li> | |||
all capitals, as shown here.</t> | <li>DES-MAC <xref target="PKCS11" format="default"/> provides 56 bits of | |||
security, which is no longer considered secure <xref target="WITHDRAW" format=" | ||||
default"/>.</li> | ||||
<li>Triple-DES-MAC <xref target="PKCS11" format="default"/> provides 112 | ||||
bits of security, which is now deprecated <xref target="TRANSIT" format="defaul | ||||
t"/>.</li> | ||||
</ul> | ||||
<t>This update specifies algorithms that are more appropriate today.</t> | ||||
<t>CRMF is defined using Abstract Syntax Notation One (ASN.1) <xref target | ||||
="X680" format="default"/>.</t> | ||||
</section> | ||||
<section anchor="terms" numbered="true" toc="default"> | ||||
<name>Terminology</name> | ||||
</section> | <t> | |||
<section anchor="signature-key-pop"><name>Signature Key POP</name> | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | ||||
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | ||||
RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ||||
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | ||||
be interpreted as | ||||
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | ||||
when, and only when, they appear in all capitals, as shown here. | ||||
</t> | ||||
</section> | ||||
<section anchor="signature-key-pop" numbered="true" toc="default"> | ||||
<name>Signature Key POP</name> | ||||
<t>Section 4.1 of <xref target="RFC4211"/> specifies the Proof-of-Possession (PO P) | <t><xref target="RFC4211" sectionFormat="of" section="4.1"/> specifies the proof -of-possession (POP) | |||
processing. This section is updated to explicitly allow the use | processing. This section is updated to explicitly allow the use | |||
of the PBMAC1 algorithm presented in Section 7.1 of <xref target="RFC8018"/>.</t | of the PBMAC1 algorithm presented in <xref target="RFC8018" sectionFormat="of" s | |||
> | ection="7.1"/>.</t> | |||
<t>OLD:</t> | ||||
<t>OLD:</t> | <blockquote> | |||
algId identifies the algorithm used to compute the MAC value. All | ||||
<t><list style='empty'> | implementations <bcp14>MUST</bcp14> support id-PasswordBasedMAC. The details | |||
on | ||||
<t>algId identifies the algorithm used to compute the MAC value. All | this algorithm are presented in section <xref target="RFC4211" sectionFormat= | |||
implementations MUST support id-PasswordBasedMAC. The details on | "bare" section="4.4"/>. | |||
this algorithm are presented in section 4.4</t> | </blockquote> | |||
</list></t> | <t>NEW:</t> | |||
<blockquote> | ||||
<t>NEW:</t> | algId identifies the algorithm used to compute the MAC value. All | |||
implementations <bcp14>MUST</bcp14> support id-PasswordBasedMAC as presented | ||||
<t><list style='empty'> | in | |||
<xref target="RFC4211" sectionFormat="of" section="4.4"/>. Implementations < | ||||
<t>algId identifies the algorithm used to compute the MAC value. All | bcp14>MAY</bcp14> also support | |||
implementations MUST support id-PasswordBasedMAC as presented in | PBMAC1 as presented in <xref target="RFC8018" sectionFormat="of" section="7.1 | |||
Section 4.4 of <xref target="RFC4211"></xref>. Implementations MAY also supp | "/>. | |||
ort | </blockquote> | |||
PBMAC1 as presented in Section 7.1 of <xref target="RFC8018"></xref>.</t> | </section> | |||
</list></t> | <section anchor="password-based-message-authentication-code" numbered="true" | |||
toc="default"> | ||||
</section> | <name>Password-Based Message Authentication Code</name> | |||
<section anchor="password-based-message-authentication-code"><name>Password-Base | ||||
d Message Authentication Code</name> | ||||
<t>Section 4.4 of <xref target="RFC4211"/> specifies a Password-Based MAC that r elies on | <t><xref target="RFC4211" sectionFormat="of" section="4.4"/> specifies a Passwor d-Based MAC that relies on | |||
a one-way function to compute a symmetric key from the password and a MAC | a one-way function to compute a symmetric key from the password and a MAC | |||
algorithm. This section specifies algorithm requirements for the one-way | algorithm. This section specifies algorithm requirements for the one-way | |||
function and the MAC algorithm.</t> | function and the MAC algorithm.</t> | |||
<section anchor="introduction-paragraph" numbered="true" toc="default"> | ||||
<name>Introduction Paragraph</name> | ||||
<section anchor="introduction-paragraph"><name>Introduction Paragraph</name> | <t>Add guidance about limiting the use of the password as follows:</t> | |||
<t>OLD:</t> | ||||
<t>Add guidance about limiting the use of the password.</t> | <blockquote> | |||
This MAC algorithm was designed to take a shared secret (a password) | ||||
<t>OLD:</t> | ||||
<t><list style='empty'> | ||||
<t>This MAC algorithm was designed to take a shared secret (a password) | ||||
and use it to compute a check value over a piece of information. The | and use it to compute a check value over a piece of information. The | |||
assumption is that, without the password, the correct check value | assumption is that, without the password, the correct check value | |||
cannot be computed. The algorithm computes the one-way function | cannot be computed. The algorithm computes the one-way function | |||
multiple times in order to slow down any dictionary attacks against | multiple times in order to slow down any dictionary attacks against | |||
the password value.</t> | the password value. | |||
</list></t> | </blockquote> | |||
<t>NEW:</t> | ||||
<t>NEW:</t> | <blockquote> | |||
This MAC algorithm was designed to take a shared secret (a password) | ||||
<t><list style='empty'> | ||||
<t>This MAC algorithm was designed to take a shared secret (a password) | ||||
and use it to compute a check value over a piece of information. The | and use it to compute a check value over a piece of information. The | |||
assumption is that, without the password, the correct check value | assumption is that, without the password, the correct check value | |||
cannot be computed. The algorithm computes the one-way function | cannot be computed. The algorithm computes the one-way function | |||
multiple times in order to slow down any dictionary attacks against | multiple times in order to slow down any dictionary attacks against | |||
the password value. The password used to compute this MAC SHOULD NOT | the password value. The password used to compute this MAC <bcp14>SHOULD NOT< | |||
be used for any other purpose.</t> | /bcp14> | |||
</list></t> | be used for any other purpose. | |||
</blockquote> | ||||
</section> | </section> | |||
<section anchor="one-way-function"><name>One-Way Function</name> | <section anchor="one-way-function" numbered="true" toc="default"> | |||
<name>One-Way Function</name> | ||||
<t>Change the paragraph describing the "owf" as follows:</t> | <t>Change the paragraph describing the "owf" as follows:</t> | |||
<t>OLD:</t> | ||||
<blockquote> | ||||
owf identifies the algorithm and associated parameters used to | ||||
compute the key used in the MAC process. All implementations <bcp14>MUST</bc | ||||
p14> | ||||
support SHA-1. | ||||
</blockquote> | ||||
<t>NEW:</t> | ||||
<blockquote> | ||||
owf identifies the algorithm and associated parameters used to | ||||
compute the key used in the MAC process. All implementations <bcp14>MUST</bc | ||||
p14> | ||||
support SHA-256 <xref target="SHS" format="default"/>. | ||||
</blockquote> | ||||
</section> | ||||
<section anchor="iteration-count" numbered="true" toc="default"> | ||||
<name>Iteration Count</name> | ||||
<t>OLD:</t> | <t>Update the guidance on appropriate iteration count values as follows:</t> | |||
<t>OLD:</t> | ||||
<t><list style='empty'> | <blockquote> | |||
iterationCount identifies the number of times the hash is applied | ||||
<t>owf identifies the algorithm and associated parameters used to | during the key computation process. The iterationCount <bcp14>MUST</bcp14> b | |||
compute the key used in the MAC process. All implementations MUST | e a | |||
support SHA-1.</t> | ||||
</list></t> | ||||
<t>NEW:</t> | ||||
<t><list style='empty'> | ||||
<t>owf identifies the algorithm and associated parameters used to | ||||
compute the key used in the MAC process. All implementations MUST | ||||
support SHA-256 <xref target="SHS"></xref>.</t> | ||||
</list></t> | ||||
</section> | ||||
<section anchor="iteration-count"><name>Iteration Count</name> | ||||
<t>Update the guidance on appropriate iteration count values.</t> | ||||
<t>OLD:</t> | ||||
<t><list style='empty'> | ||||
<t>iterationCount identifies the number of times the hash is applied | ||||
during the key computation process. The iterationCount MUST be a | ||||
minimum of 100. Many people suggest using values as high as 1000 | minimum of 100. Many people suggest using values as high as 1000 | |||
iterations as the minimum value. The trade off here is between | iterations as the minimum value. The trade off here is between | |||
protection of the password from attacks and the time spent by the | protection of the password from attacks and the time spent by the | |||
server processing all of the different iterations in deriving | server processing all of the different iterations in deriving | |||
passwords. Hashing is generally considered a cheap operation but | passwords. Hashing is generally considered a cheap operation but | |||
this may not be true with all hash functions in the future.</t> | this may not be true with all hash functions in the future. | |||
</list></t> | </blockquote> | |||
<t>NEW:</t> | ||||
<t>NEW:</t> | <blockquote> | |||
iterationCount identifies the number of times the hash is applied | ||||
<t><list style='empty'> | during the key computation process. The iterationCount <bcp14>MUST</bcp14> b | |||
e a | ||||
<t>iterationCount identifies the number of times the hash is applied | minimum of 100; however, the iterationCount <bcp14>SHOULD</bcp14> be as large | |||
during the key computation process. The iterationCount MUST be a | as | |||
minimum of 100; however, the iterationCount SHOULD be as large as | ||||
server performance will allow, typically at least 10,000 | server performance will allow, typically at least 10,000 | |||
<xref target="DIGALM"/>. There is a trade off between protection of the | <xref target="DIGALM" format="default"/>. There is a trade-off between prote ction of the | |||
password from attacks and the time spent by the server processing | password from attacks and the time spent by the server processing | |||
the iterations. As part of that tradeoff, an iteration count | the iterations. As part of that trade-off, an iteration count | |||
smaller than 10,000 can be used when automated generation produces | smaller than 10,000 can be used when automated generation produces | |||
shared secrets with high entropy.</t> | shared secrets with high entropy. | |||
</list></t> | </blockquote> | |||
</section> | ||||
</section> | <section anchor="mac-algorithm" numbered="true" toc="default"> | |||
<section anchor="mac-algorithm"><name>MAC Algorithm</name> | <name>MAC Algorithm</name> | |||
<t>Change the paragraph describing the "mac" as follows:</t> | <t>Change the paragraph describing the "mac" as follows:</t> | |||
<t>OLD:</t> | ||||
<t>OLD:</t> | <blockquote> | |||
mac identifies the algorithm and associated parameters of the MAC | ||||
<t><list style='empty'> | function to be used. All implementations <bcp14>MUST</bcp14> support HMAC-SH | |||
A1 | ||||
<t>mac identifies the algorithm and associated parameters of the MAC | <xref target="HMAC"/>. All implementations <bcp14>SHOULD</bcp14> support DES | |||
function to be used. All implementations MUST support HMAC-SHA1 | -MAC and Triple-DES-MAC <xref target="PKCS11"/>. | |||
[HMAC]. All implementations SHOULD support DES-MAC and Triple- | </blockquote> | |||
DES-MAC [PKCS11].</t> | <t>NEW:</t> | |||
</list></t> | <blockquote> | |||
mac identifies the algorithm and associated parameters of the MAC | ||||
<t>NEW:</t> | function to be used. All implementations <bcp14>MUST</bcp14> support HMAC-SH | |||
A256 | ||||
<t><list style='empty'> | <xref target="HMAC"/>. All implementations <bcp14>SHOULD</bcp14> support AES | |||
-GMAC <xref target="AES"/> <xref target="GMAC"/> | ||||
<t>mac identifies the algorithm and associated parameters of the MAC | with a 128-bit key. | |||
function to be used. All implementations MUST support HMAC-SHA256 | </blockquote> | |||
[HMAC]. All implementations SHOULD support AES-GMAC [AES][GMAC] | <t>For convenience, the identifiers for these two algorithms are | |||
with a 128-bit key.</t> | ||||
</list></t> | ||||
<t>For convenience, the identifiers for these two algorithms are | ||||
repeated here.</t> | repeated here.</t> | |||
<t>The ASN.1 algorithm identifier for HMAC-SHA256 is defined in <xref ta | ||||
<t>The ASN.1 algorithm identifier for HMAC-SHA256 is defined in <xref target="RF | rget="RFC4231" format="default"/>:</t> | |||
C4231"/>:</t> | <sourcecode name="" type="asn.1"><![CDATA[ | |||
<figure><artwork><![CDATA[ | ||||
id-hmacWithSHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) | id-hmacWithSHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) | |||
us(840) rsadsi(113549) digestAlgorithm(2) 9 } | us(840) rsadsi(113549) digestAlgorithm(2) 9 } | |||
]]></artwork></figure> | ]]></sourcecode> | |||
<t>When this object identifier is used in the ASN.1 algorithm identifier | ||||
<t>When this object identifier is used in the ASN.1 algorithm identifier, the | , the | |||
parameters SHOULD be present. When present, the parameters MUST contain a | parameters <bcp14>SHOULD</bcp14> be present. When present, the parameters <bcp1 | |||
type of NULL as specified in <xref target="RFC4231"/>.</t> | 4>MUST</bcp14> contain a | |||
type of NULL as specified in <xref target="RFC4231" format="default"/>.</t> | ||||
<t>The ASN.1 algorithm identifier for AES-GMAC <xref target="AES"/><xref target= | <t>The ASN.1 algorithm identifier for AES-GMAC <xref target="AES" format | |||
"GMAC"/> with a 128-bit | ="default"/> <xref target="GMAC" format="default"/> with a 128-bit | |||
key is defined in <xref target="I-D.ietf-lamps-cms-aes-gmac-alg"/>:</t> | key is defined in <xref target="RFC9044" format="default"/>:</t> | |||
<figure><artwork><![CDATA[ | <sourcecode name="" type="asn.1"><![CDATA[ | |||
id-aes128-GMAC OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) | id-aes128-GMAC OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) | |||
country(16) us(840) organization(1) gov(101) csor(3) | country(16) us(840) organization(1) gov(101) csor(3) | |||
nistAlgorithm(4) aes(1) 9 } | nistAlgorithm(4) aes(1) 9 } | |||
]]></artwork></figure> | ]]></sourcecode> | |||
<t>When this object identifier is used in the ASN.1 algorithm identifier | ||||
<t>When this object identifier is used in the ASN.1 algorithm identifier, the | , the | |||
parameters MUST be present, and the parameters MUST contain the | parameters <bcp14>MUST</bcp14> be present, and the parameters <bcp14>MUST</bcp14 | |||
> contain the | ||||
GMACParameters structure as follows:</t> | GMACParameters structure as follows:</t> | |||
<sourcecode name="" type="asn.1"><![CDATA[ | ||||
<figure><artwork><![CDATA[ | ||||
GMACParameters ::= SEQUENCE { | GMACParameters ::= SEQUENCE { | |||
nonce OCTET STRING, | nonce OCTET STRING, | |||
length MACLength DEFAULT 12 } | length MACLength DEFAULT 12 } | |||
MACLength ::= INTEGER (12 | 13 | 14 | 15 | 16) | MACLength ::= INTEGER (12 | 13 | 14 | 15 | 16) | |||
]]></artwork></figure> | ]]></sourcecode> | |||
<t>The GMACParameters nonce parameter is the GMAC initialization vector. | ||||
<t>The GMACParameters nonce parameter is the GMAC initialization vector. The | The | |||
nonce may have any number of bits between 8 and (2^64)-1, but it MUST be a | nonce may have any number of bits between 8 and (2^64)-1, but it <bcp14>MUST</bc | |||
p14> be a | ||||
multiple of 8 bits. Within the scope of any GMAC key, the nonce value | multiple of 8 bits. Within the scope of any GMAC key, the nonce value | |||
MUST be unique. A nonce value of 12 octets can be processed more | <bcp14>MUST</bcp14> be unique. A nonce value of 12 octets can be processed more | |||
efficiently, so that length for the nonce value is RECOMMENDED.</t> | efficiently, so that length for the nonce value is <bcp14>RECOMMENDED</bcp14>.</ | |||
t> | ||||
<t>The GMACParameters length parameter field tells the size of the | <t>The GMACParameters length parameter field tells the size of the | |||
message authentication code in octets. GMAC supports lengths between | message authentication code in octets. GMAC supports lengths between | |||
12 and 16 octets, inclusive. However, for use with CRMF, the maximum | 12 and 16 octets, inclusive. However, for use with CRMF, the maximum | |||
length of 16 octets MUST be used.</t> | length of 16 octets <bcp14>MUST</bcp14> be used.</t> | |||
</section> | ||||
</section> | </section> | |||
</section> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<section anchor="iana-considerations"><name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>This document makes no requests of the IANA.</t> | ||||
</section> | <t>This document has no IANA actions.</t> | |||
<section anchor="security-considerations"><name>Security Considerations</name> | </section> | |||
<section anchor="security-considerations" numbered="true" toc="default"> | ||||
<name>Security Considerations</name> | ||||
<t>The security of the password-based MAC relies on the number of times the | <t>The security of the Password-Based MAC relies on the number of times the | |||
hash function is applied as well as the entropy of the shared secret (the | hash function is applied as well as the entropy of the shared secret (the | |||
password). Hardware support for hash calculation is available at very low | password). Hardware support for hash calculation is available at very low | |||
cost <xref target="PHS"/>, which reduces the protection provided by a high itera tionCount | cost <xref target="PHS" format="default"/>, which reduces the protection provide d by a high iterationCount | |||
value. Therefore, the entropy of the password is crucial for the security of | value. Therefore, the entropy of the password is crucial for the security of | |||
the password-based MAC function. In 2010, researchers showed that about half | the Password-Based MAC function. In 2010, researchers showed that about half | |||
of the real-world passwords in a leaked corpus can be broken with less than | of the real-world passwords in a leaked corpus can be broken with less than | |||
150 million trials, indicating a median entropy of only 27 bits <xref target="DM R"/>. Higher | 150 million trials, indicating a median entropy of only 27 bits <xref target="DM R" format="default"/>. Higher | |||
entropy can be achieved by using randomly generated strings. For example, | entropy can be achieved by using randomly generated strings. For example, | |||
assuming an alphabet of 60 characters a randomly chosen password with 10 charact ers | assuming an alphabet of 60 characters, a randomly chosen password with 10 charac ters | |||
offers 59 bits of entropy, and 20 characters offers 118 bits of entropy. Using | offers 59 bits of entropy, and 20 characters offers 118 bits of entropy. Using | |||
a one-time password also increases the security of the MAC, assuming that the | a one-time password also increases the security of the MAC, assuming that the | |||
integrity-protected transaction will complete before the attacker is able to | integrity-protected transaction will complete before the attacker is able to | |||
learn the password with an offline attack.</t> | learn the password with an offline attack.</t> | |||
<t>Please see <xref target="RFC8018" format="default"/> for security consi | ||||
<t>Please see <xref target="RFC8018"/> for security considerations related to PB | derations related to PBMAC1.</t> | |||
MAC1.</t> | <t>Please see <xref target="HMAC" format="default"/> and <xref target="SHS | |||
" format="default"/> for security considerations related to HMAC-SHA256.</t> | ||||
<t>Please see <xref target="HMAC"/> and <xref target="SHS"/> for security consid | <t>Please see <xref target="AES" format="default"/> and <xref target="GMAC | |||
erations related to HMAC-SHA256.</t> | " format="default"/> for security considerations related to AES-GMAC.</t> | |||
<t>Cryptographic algorithms age; they become weaker with time. As new | ||||
<t>Please see <xref target="AES"/> and <xref target="GMAC"/> for security consid | ||||
erations related to AES-GMAC.</t> | ||||
<t>Cryptographic algorithms age; they become weaker with time. As new | ||||
cryptanalysis techniques are developed and computing capabilities | cryptanalysis techniques are developed and computing capabilities | |||
improve, the work required to break a particular cryptographic | improve, the work required to break a particular cryptographic | |||
algorithm will reduce, making an attack on the algorithm more | algorithm will reduce, making an attack on the algorithm more | |||
feasible for more attackers. While it is unknown how cryptoanalytic | feasible for more attackers. While it is unknown how cryptanalytic | |||
attacks will evolve, it is certain that they will get better. It is | attacks will evolve, it is certain that they will get better. It is | |||
unknown how much better they will become or when the advances will | unknown how much better they will become or when the advances will | |||
happen. For this reason, the algorithm requirements for CRMF are | happen. For this reason, the algorithm requirements for CRMF are | |||
updated by this specification.</t> | updated by this specification.</t> | |||
<t>When a Password-Based MAC is used, implementations must protect the | ||||
<t>When a Password-Based MAC is used, implementations must protect the | ||||
password and the MAC key. Compromise of either the password or the MAC | password and the MAC key. Compromise of either the password or the MAC | |||
key may result in the ability of an attacker to undermine authentication.</t> | key may result in the ability of an attacker to undermine authentication.</t> | |||
</section> | ||||
</middle> | ||||
<back> | ||||
<references> | ||||
<name>References</name> | ||||
<references> | ||||
<name>Normative References</name> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
FC.2119.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
FC.8174.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
FC.8018.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
FC.4211.xml"/> | ||||
</section> | <reference anchor="RFC9044" target="https://www.rfc-editor.org/info/rfc90 | |||
<section anchor="acknowledgements"><name>Acknowledgements</name> | 44"> | |||
<front> | ||||
<title>Using the AES-GMAC Algorithm with the Cryptographic Message Syntax (CMS)< | ||||
/title> | ||||
<author initials='R.' surname='Housley' fullname='Russ Housley'> | ||||
<organization/> | ||||
</author> | ||||
<date month='May' year='2021'/> | ||||
</front> | ||||
<seriesInfo name="RFC" value="9044"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC9044"/> | ||||
</reference> | ||||
<t>Many thanks to | <reference anchor="AES"> | |||
Hans Aschauer, | <front> | |||
Hendrik Brockhaus, | <title>Advanced Encryption Standard (AES)</title> | |||
Quynh Dang, | <author> | |||
Roman Danyliw, | <organization>National Institute of Standards and Technology</orga | |||
Lars Eggert, | nization> | |||
Tomas Gustavsson, | </author> | |||
Jonathan Hammell, | <date year="2001" month="November"/> | |||
Tim Hollebeek, | </front> | |||
Ben Kaduk, | <seriesInfo name="FIPS PUB" value="197"/> | |||
Erik Kline, | <seriesInfo name="DOI" value="10.6028/NIST.FIPS.197"/> | |||
Lijun Liao, | </reference> | |||
Mike Ounsworth, | ||||
Francesca Palombini, | ||||
Tim Polk, | ||||
Ines Robles, | ||||
Mike StJohns, and | ||||
Sean Turner | ||||
for their careful review and improvements.</t> | ||||
</section> | <reference anchor="GMAC"> | |||
<front> | ||||
<title>Recommendation for Block Cipher Modes of Operation: Galois/Co | ||||
unter Mode (GCM) and GMAC</title> | ||||
<author surname="Dworkin" initials="M."/> | ||||
<date year="2007" month="November"/> | ||||
</front> | ||||
<seriesInfo name="NIST Special Publication" value="800-38D"/> | ||||
<seriesInfo name="DOI" value="10.6028/NIST.SP.800-38D"/> | ||||
</reference> | ||||
</middle> | <reference anchor='HMAC' target='https://www.rfc-editor.org/info/rfc2104'> | |||
<front> | ||||
<title>HMAC: Keyed-Hashing for Message Authentication</title> | ||||
<author initials='H.' surname='Krawczyk' fullname='H. Krawczyk'><organization /> | ||||
</author> | ||||
<author initials='M.' surname='Bellare' fullname='M. Bellare'><organization /></ | ||||
author> | ||||
<author initials='R.' surname='Canetti' fullname='R. Canetti'><organization /></ | ||||
author> | ||||
<date year='1997' month='February' /> | ||||
</front> | ||||
<seriesInfo name='RFC' value='2104'/> | ||||
<seriesInfo name='DOI' value='10.17487/RFC2104'/> | ||||
</reference> | ||||
<back> | <reference anchor="SHS"> | |||
<front> | ||||
<title>Secure Hash Standard (SHS)</title> | ||||
<author> | ||||
<organization>National Institute of Standards and Technology</orga | ||||
nization> | ||||
</author> | ||||
<date year="2015" month="August"/> | ||||
</front> | ||||
<seriesInfo name="FIPS PUB" value="180-4"/> | ||||
<seriesInfo name="DOI" value="10.6028/NIST.FIPS.180-4"/> | ||||
</reference> | ||||
<references title='Normative References'> | <reference anchor="X680"> | |||
<front> | ||||
<title>Information technology -- Abstract Syntax Notation One (ASN.1 | ||||
): Specification of basic notation</title> | ||||
<author> | ||||
<organization>ITU-T</organization> | ||||
</author> | ||||
<date year="2015" month="August"/> | ||||
</front> | ||||
<seriesInfo name="ITU-T Recommendation" value="X.680"/> | ||||
</reference> | ||||
</references> | ||||
&RFC2119; | <references> | |||
&RFC8174; | <name>Informative References</name> | |||
&RFC8018; | <reference anchor="DMR"> | |||
&RFC4211; | <front> | |||
&I-D.ietf-lamps-cms-aes-gmac-alg; | <title>Password Strength: An Empirical Analysis</title> | |||
<reference anchor="AES" > | <author initials="M." surname="Dell'Amico"> | |||
<front> | <organization/> | |||
<title>Advanced encryption standard (AES)</title> | </author> | |||
<author > | <author initials="P." surname="Michiardi"> | |||
<organization>National Institute of Standards and Technology</organization | <organization/> | |||
> | </author> | |||
</author> | <author initials="Y." surname="Roudier"> | |||
<date year="2001" month="November"/> | <organization/> | |||
</front> | </author> | |||
<seriesInfo name="DOI" value="10.6028/nist.fips.197"/> | <date year="2010" month="March"/> | |||
</reference> | </front> | |||
<reference anchor="GMAC" > | <seriesInfo name="DOI" value="10.1109/INFCOM.2010.5461951"/> | |||
<front> | </reference> | |||
<title>Recommendation for block cipher modes of operation: Galois Counter Mo | ||||
de (GCM) and GMAC</title> | ||||
<author > | ||||
<organization>National Institute of Standards and Technology</organization | ||||
> | ||||
</author> | ||||
<date year="2007"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.6028/nist.sp.800-38d"/> | ||||
</reference> | ||||
<reference anchor="HMAC" > | ||||
<front> | ||||
<title>HMAC: Keyed-Hashing for Message Authentication</title> | ||||
<author initials="H." surname="Krawczyk"> | ||||
<organization></organization> | ||||
</author> | ||||
<author initials="M." surname="Bellare"> | ||||
<organization></organization> | ||||
</author> | ||||
<author initials="R." surname="Canetti"> | ||||
<organization></organization> | ||||
</author> | ||||
<date year="1997" month="February"/> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2104"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2104"/> | ||||
</reference> | ||||
<reference anchor="SHS" > | ||||
<front> | ||||
<title>Secure Hash Standard</title> | ||||
<author > | ||||
<organization>National Institute of Standards and Technology</organization | ||||
> | ||||
</author> | ||||
<date year="2015" month="July"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/> | ||||
</reference> | ||||
<reference anchor="X680" > | ||||
<front> | ||||
<title>Information technology -- Abstract Syntax Notation One (ASN.1): Speci | ||||
fication of basic notation</title> | ||||
<author > | ||||
<organization>ITU-T</organization> | ||||
</author> | ||||
<date year="2015"/> | ||||
</front> | ||||
<seriesInfo name="Recommendation" value="X.680"/> | ||||
</reference> | ||||
</references> | <reference anchor="DIGALM"> | |||
<front> | ||||
<title>Digital Identity Guidelines: Authentication and Lifecycle Man | ||||
agement</title> | ||||
<author> | ||||
<organization>National Institute of Standards and Technology</orga | ||||
nization> | ||||
</author> | ||||
<date year="2017" month="June"/> | ||||
</front> | ||||
<seriesInfo name="NIST Special Publication" value="800-63B"/> | ||||
<seriesInfo name="DOI" value="10.6028/NIST.SP.800-63B"/> | ||||
<references title='Informative References'> | </reference> | |||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
FC.4231.xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
FC.6194.xml"/> | ||||
<reference anchor="PHS"> | ||||
<front> | ||||
<title>Energy Efficient Bitcoin Mining to Maximize the Mining Profit | ||||
: Using Data from 119 Bitcoin Mining Hardware Setups</title> | ||||
<author initials="A." surname="Pathirana" fullname="Amila Pathirana" | ||||
> | ||||
<organization/> | ||||
</author> | ||||
<author initials="M." surname="Halgamuge" fullname="Malka Halgamuge" | ||||
> | ||||
<organization/> | ||||
</author> | ||||
<author initials="A." surname="Syed" fullname="Ali Syed"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2019" month="November"/> | ||||
</front> | ||||
<refcontent>International Conference on Advances in Business Managemen | ||||
t and Information Technology, pp. 1-14</refcontent> | ||||
</reference> | ||||
<reference anchor="DMR" > | <reference anchor="PKCS11"> | |||
<front> | <front> | |||
<title>Password Strength: An Empirical Analysis</title> | <title>PKCS #11 v2.11: Cryptographic Token Interface Standard</title | |||
<author initials="M." surname="Dell'Amico"> | > | |||
<organization></organization> | <author> | |||
</author> | <organization>RSA Laboratories</organization> | |||
<author initials="P." surname="Michiardi"> | </author> | |||
<organization></organization> | <date year="2001" month="November"/> | |||
</author> | </front> | |||
<author initials="Y." surname="Roudier"> | </reference> | |||
<organization></organization> | ||||
</author> | <reference anchor="TRANSIT"> | |||
<date year="2010" month="March"/> | <front> | |||
</front> | <title>Transitioning the Use of Cryptographic Algorithms and Key Len | |||
<seriesInfo name="DOI" value="10.1109/INFCOM.2010.5461951"/> | gths</title> | |||
</reference> | <author> | |||
<reference anchor="DIGALM" > | <organization>National Institute of Standards and Technology</orga | |||
<front> | nization> | |||
<title>Digital identity guidelines: authentication and lifecycle management< | </author> | |||
/title> | <date year="2019" month="March"/> | |||
<author > | </front> | |||
<organization>National Institute of Standards and Technology</organization | <seriesInfo name="NIST Special Publication" value="800-131Ar2"/> | |||
> | <seriesInfo name="DOI" value="10.6028/NIST.SP.800-131Ar2"/> | |||
</author> | </reference> | |||
<date year="2017" month="June"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.6028/nist.sp.800-63b"/> | ||||
</reference> | ||||
&RFC4231; | ||||
&RFC6194; | ||||
<reference anchor="PHS" > | ||||
<front> | ||||
<title>Energy efficient bitcoin mining to maximize the mining profit: Using | ||||
data from 119 bitcoin mining hardware setups</title> | ||||
<author initials="A." surname="Pathirana" fullname="Amila Pathirana"> | ||||
<organization></organization> | ||||
</author> | ||||
<author initials="M." surname="Halgamuge" fullname="Malka Halgamuge"> | ||||
<organization></organization> | ||||
</author> | ||||
<author initials="A." surname="Syed" fullname="Ali Syed"> | ||||
<organization></organization> | ||||
</author> | ||||
<date year="2019" month="November"/> | ||||
</front> | ||||
<seriesInfo name="International Conference on Advances in Business Management | ||||
and Information Technology," value="pp 1-14"/> | ||||
</reference> | ||||
<reference anchor="PKCS11" > | ||||
<front> | ||||
<title>The Public-Key Cryptography Standards - PKCS #11 v2.11: Cryptographi | ||||
c Token Interface Standard</title> | ||||
<author > | ||||
<organization>RSA Laboratories</organization> | ||||
</author> | ||||
<date year="2001" month="June"/> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="TRANSIT" > | ||||
<front> | ||||
<title>Transitioning the use of cryptographic algorithms and key lengths</ti | ||||
tle> | ||||
<author > | ||||
<organization>National Institute of Standards and Technology</organization | ||||
> | ||||
</author> | ||||
<date year="2019" month="March"/> | ||||
</front> | ||||
<seriesInfo name="NIST SP" value="800-131Ar2"/> | ||||
</reference> | ||||
<reference anchor="WITHDRAW" > | ||||
<front> | ||||
<title>NIST Withdraws Outdated Data Encryption Standard</title> | ||||
<author > | ||||
<organization>National Institute of Standards and Technology</organization | ||||
> | ||||
</author> | ||||
<date year="2005" month="June" day="02"/> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="WITHDRAW" target="https://www.nist.gov/news-events/ne | ||||
ws/2005/06/nist-withdraws-outdated-data-encryption-standard"> | ||||
<front> | ||||
<title>NIST Withdraws Outdated Data Encryption Standard</title> | ||||
<author> | ||||
<organization>National Institute of Standards and Technology</orga | ||||
nization> | ||||
</author> | ||||
<date year="2005" month="June"/> | ||||
</front> | ||||
</reference> | ||||
</references> | ||||
</references> | </references> | |||
<section anchor="acknowledgements" numbered="false" toc="default"> | ||||
<name>Acknowledgements</name> | ||||
<t>Many thanks to | ||||
<contact fullname="Hans Aschauer"/>, | ||||
<contact fullname="Hendrik Brockhaus"/>, | ||||
<contact fullname="Quynh Dang"/>, | ||||
<contact fullname="Roman Danyliw"/>, | ||||
<contact fullname="Lars Eggert"/>, | ||||
<contact fullname="Tomas Gustavsson"/>, | ||||
<contact fullname="Jonathan Hammell"/>, | ||||
<contact fullname="Tim Hollebeek"/>, | ||||
<contact fullname="Ben Kaduk"/>, | ||||
<contact fullname="Erik Kline"/>, | ||||
<contact fullname="Lijun Liao"/>, | ||||
<contact fullname="Mike Ounsworth"/>, | ||||
<contact fullname="Francesca Palombini"/>, | ||||
<contact fullname="Tim Polk"/>, | ||||
<contact fullname="Ines Robles"/>, | ||||
<contact fullname="Mike StJohns"/>, and | ||||
<contact fullname="Sean Turner"/> | ||||
for their careful review and improvements.</t> | ||||
</section> | ||||
</back> | </back> | |||
<!-- ##markdown-source: | ||||
H4sIABwUb2AAA+1abXPbRpL+jl8xJVfdSVsEQ8iSLCl1V0dLtMVYbxHp9aZs | ||||
39UQGJIT4W0xABVG6/z2fbpnAII05XXuzrf5cKldiyRmevq9n+6B7/teqctY | ||||
nYp+PMsKXc4Tcaf+WulCJSotjXibR7JUosxEOVdimJaqSFUp/tI97J2I22oS | ||||
61C8UUs8mRbSlEUVllWhxJkqSj3VIe0lesqU4koZI2dKvMqKRJZi9+zu6tWe | ||||
JyeTQi1OBX37MhNelIWpTMBrVMhp6WtVTv1YJrnxwyKZ+hWv8mU8M37vhUdf | ||||
TsV+bz/wewd+79gjZkB+eSpMGXl2tTkVB/tB4IVZalRqKnyHDMrTeXEq8kId | ||||
Pn9xPC4qU+73eie9fU8WSp6KkQorsLn07tXyISui00Yx/jmx5nmmlGn0XzLO | ||||
UvCQZl6uT8X7Mgs7wmRFWaipwadlQh8+ep6synlWnHrC9wT+0ynYuOuKi6wy | ||||
sVryb1bwu8qYtZ+zYnYq/qxnOm6Y6ojLyzN+WKt2/Tk/gqWUKk/FYXAkwHKq | ||||
zELHMWyVyYgXhFh5Ki4gVJSlHfHnvv01i1inwYue+16lJWn07Yi/q0Tq+FTM | ||||
LYf/saCDjQq7YZZ4Xsp21wsFQcXdqzPo/cR9PA5eHNQfe8Gx+0iWoY9D/7zb | ||||
NnZifKmMP0tkSNamJf3B6NTKXKtSNOq5xqFZKmMYycDZK7hkNhUjspAsIiPw | ||||
V4xVOE+zOJtZ9biY2OlHC5mGKhIqDYtlTnSEcRvFLg7d2+H1ta/1Ah/OxApW | ||||
hVZGp9Os5mXnejga74Doq+HtSAQnL3aeWHh+MzwVQa971Ns//i7VpuxOdW66 | ||||
2IEFr6/6Z99A0n93ZO4UTIWgi5iSmGaFmMRZeA9/yOeqEAkcwBDRLFcFr6kZ | ||||
eA1n10ackUdg4RUWit3XZ1d7fCqx3dLUDlT1pPyNoka34rjX858fR1+vKpN3 | ||||
3R4suWiUtSEmP6C8pSL/Qpq5Tmcsa52i+tAtMg/lL4i4Rd2+++uC9aIr3hTy | ||||
Ifx1eb99wVVXvFRxjPSx/Tmi/QxRWJbaa6kpODl54SPrbBceEQKfC3oHbWXs | ||||
QBsIpuMX33GE9Q5IdaOLbxIdnFGUIAU2G9bjITikTPxV8XDc8w9+b0TQHiz5 | ||||
y9Fx70n5huO3/nibD6Bi2YQEPy8bAYXvi/4E6VGGpRgt01L+Iq6z0i67SeHT | ||||
/dF1N9irzxjlKrSFjhZAcxNpUBJTt2VDG09Zci3qTlFdIZGnawZtxjy/utsm | ||||
5IYj7cDTzuFp/9pPdJjtPLHotiuudDjXMJh+as1PXVSDKtKq2NmmvltpDNU+ | ||||
WL5Q6ayc1wz1UzFIcl1AJzG+yHhptFnXQ8/vPX/KK4aDwUAMr1/dnN1c7XCm | ||||
CHritshCpSKEqflHPhIEvZPvsB/bu7S3e3hwFJwcUlY+H77uX159w+x5jnpX | ||||
goCOKHmUSzGr8DHWKK/1SXItszDNWE9VuAxRfROZIvsQ5lnXF5LA0Vcmy6Pn | ||||
k9+dLLGnLrjPA1d7oTOuyLfbU8fKWSwwgbfFEj5RzjXQhFx3pX73syeb+69k | ||||
fC+RSeKZTKqZWt8Pl9588tn5sUa0quizg5sfN0w1SFWBaFdTxK6GwsVEl2Gm | ||||
U5HolKoBAG8if9GJ/lUx8nU/50U21WWthbeGfoOZpJgWWSIAaDbpzOE6D0j7 | ||||
sEdZ5RtxcPIFtGARZe2SZ1k6VYizED6ZCgdLDKQULytD/mWgwtp52Kva6W3l | ||||
tR1ylTwXwCmcbW/fnI0syNoaEnejvriUkwylPiMOt2lyDO3YRsCnRuCMcFI2 | ||||
K2Q+X7aCpzYYHSieBYFY7CNUT0V7PfLmOLtXqUXTUwlhawKbKIvjYXzXvx4N | ||||
x98goMdwVaNpN/sCJKwMbw7XuJV1u2JpoRsQMefCz+z8dL6j+BWjW7ILxWLw | ||||
POgX+2Sad8Pxxfld/903EI/PfAfG0Ug9GHFTlcRqJM7JkwcrqLtd+6jpR4RK | ||||
PB+1Urpa6XnjOeAfWrSKXdC1V6y7J5QminaPR/ALi726rvgvpQFL2xEZ4gHw | ||||
Et7/ZFPq/U+aUmFsVcf5OvWQDblJ7FqJEx1FsfK8Zzi3yCLQJoYen2n6+umf | ||||
oYddoNm97drw/jda9MdH14x9+tS18d5y/LaqRGuleEC+EjJHxswLTYdAleQ9 | ||||
36M9fFALVXSIX7NGjBJlmgm0zTP0ENSUo34WoE2STcChF84zHVI59f5kYbw/ | ||||
uugHOJg+f/r0+Aisi8NhAkAwMSk4nyxV2RGTqiQyxBT+n1ThnLpge5KMXbJd | ||||
wFQsBNU/iMvHnA9GPqjjgU2XoA+pFppaocMjyvjcEpmmAX+AfeeWhy2yGAub | ||||
Hx/rCK/PGRc6j5X/peOCYP/L5z2ISOWFCjmeHx9diuQT2DGtPzZWM23tl3PY | ||||
nJWTbZiuzCK5BAke0pB7qymKTiQqLoBfg5fBC8F0ZuTZWBUojxZvPz6D6hPD | ||||
gaM4hZLXGwDZtwA2HftXXN/w57vBj2+Hd4Nz+gy7X142H+wKD19u3l665/Rp | ||||
tROA8GpwfW4341ex8dNV/yf8QcLzdm5ux8Ob6/7ljg2qdjyTeoANJuTOYByq | ||||
JkVLUokJCz2xKePl2e2/pBOTfx8cWHeiWQfsyJ9p2EHxgTjm81DR46X7Cgdd | ||||
kuaVLIiOjGMRypxApenQKQaxkwryYtLjSM/gtORMFN+3N7eeh56MVX/QDchH | ||||
2gG5sjlFEyB1NvXxv9vMGIQ9bdoFiT0vJ7BtyLIc7ZDeOKKN/0SkA/VLjtSC | ||||
igKO4xie5+qkh3P5hJfw4qCV56AsAx3aVFEz+qLFKM1+2ENuLs8R4YwwsH0Y | ||||
OUTdML+iWRnLDBqonCogPaXgWci4UuC/H8dERSeILDIgOybAEjmVqfI8K0oQ | ||||
9+tsy8kW+12ei1QpdYxo40aOPWF1NLnCmkim0f2B510P3v1zRSB3abNHNFbe | ||||
cUBKf++c4yNOGW6S7/8EHk1WH0Hba4uaL5ryvbPkR3LRry9jbd89eNp3pdgk | ||||
CVE5cxXotBTbSuIf5T/IpZhWqaXZ0q+kyWuiSnSonG8YupPS87qlpaCURNhr | ||||
rLQZClsS6NY6XnPiNZwQ8drEK/JQ1TqguJWFZKjgef0o4k6SMD8AV4ZCFqMz | ||||
KTewaVuE9RhiztfOEw82ZSGBWOcr5T1rBv2KLVFIbGJXNgT32JHTiA/T5bo+ | ||||
w7kK762/imxB9VTkWoXMlV71ITaomJAxVZLXOYWshyIGvjJbo5tTOxY3ZQUq | ||||
Wtk+hoiEMuUar2pOok10Uj8wbUs0PkE0kiouqegCGSe2n8KpEADiGUppEaVb | ||||
mS5FpHmPLJDsylKG9zD8TKLLLG1maHmPjdu1DPD/Bvi/N4Blpfnx8yzrTLLC | ||||
CURoouxKCl86NiPIKPKqyDPDNfcZQI3/DlK8qqXwzuYSGM/x4KK2xgN1jO5k | ||||
D9MdypzTjGolAdhWgOLh0/WBs5ExWai58tIRyF6qMLVMbItW8aCkxo9cS0BS | ||||
uqJuy8nWWkJU6nICSOUH6y78R2RxH+j7PQD/R5s+S3clYS8hPK++uwT9Jn1S | ||||
Am73JM0evsqyrmPWs2ezhsluKiGtkgk8hPIvezD9NqeJOGGFHAjJzp8iQHXn | ||||
CiS71YU9eSU3OezGaVzl4ZQ8OKOZUlIldFjQ62HDFblorjIKIFPNZtTDWUxu | ||||
BSGHm+vZnP5iR29NHH5az7aIbDtuAOgjSh9TBpskzESVD0px0ILj0tXBjbpj | ||||
i2kToK7UkWaoYtKYbcndrZ2FUKZaoU1CkTW9SE953lW22YWvIDXoBdYyF+5M | ||||
0lx9iQM+ZyrFjjhetnsuTpEyX11bUTvYYLoE4ewyGd3+ciZkbtiQdboytbNO | ||||
K8Lc6+HxR3WS9W57c6PLfbTViFgWM/rQNo4quHhQ5DxoKISBPkgtcxrvE/IH | ||||
FlESbhf0Os7BHh/toL2eFlj3kS2Xcq70uR+1zfqVrvS5H9X1YOU5lFIMZaXS | ||||
ngOmmRnwQh3YZhZgBSQQj+oQcruTjepdUx+oXaOhXJZwxrNOV1sKGM7OSteq | ||||
ubF+xfGoCOrlS85blPuaFx++spokMny6muDhfydVu9BzN7Vt5OyE/kJmbtJy | ||||
M5IhGh/e09cPH5/Y6Lyv3lrPPXhuaUchRKT++cN7Ow758HE98v4I0qIQ/X55 | ||||
+xDstZUMHz98/PD+Ne8mSjYDiWD/2J8A7CEbQOhXGc+RFirVdBPgIroWvWh6 | ||||
DgDE8iHbmKt5hcoVK8FOD3AIT1x4PNPS2Ioek2tJ2B78rGZ9z9Ge8Vja++23 | ||||
3zgTRv4cNqHxstt38/KHwdlYDM8H1+Phq+HgTpye/pt4BL1sN9gTiaLk6E+y | ||||
aLm7v+cm3JXZPT7o7YnCyMjo3SB4fnhwsoe6QDWuiRasFyfiEx/tvaOQ5Hye | ||||
TX4muNoSRZs1uPG00KxUr+UnqxTpel4Yl09yXztNpLoN7CAwUwlwioyMVMkw | ||||
/Prt5SVPcLbMS0mHXe9rzNH4zOMjPtK88zXPPTcchl5M+sxc/+A1GjJjy4Z4 | ||||
RMT4sKcM+HOm09KHGX1dVn65sp57L2g3ONprLJkVM5nqXzkWyOyzbLEb9PAh | ||||
NFmx+7zeSheTK/se7AkwQsu/sZnrEtpYtS44T1mW9pNyblfPV7P1tczsdLqx | ||||
mDQ4Gvz4dnB9NhCPtfAZVVr3383ZeDAWo/Hd8Pp1xy2w10tuAQhe2u/ng1f9 | ||||
t5djmB9a8tYe0TnD6/HgNay2i+d/E8Fz+ueA/jmkf472rGLJ/TaYtPw0KrC9 | ||||
ol0FHetSy9hZVCxgiqxwHabdR7BqLheKG6kVBOL5dQ0BjlnRu/v/eXSw5wd2 | ||||
Sq/biKZpELHzmPdSAMKczsYmzGyA0SHMGHzfBqXlwrarNcEq1X+1U7X2YwZL | ||||
+yILSyrTrs47RAF3onm411wVx0t6i8/CCGePetjTJgldtSbM3a36ddtXCoZv | ||||
xvA7FcdW04bunx02StzsbOMVgtBdhVnmu9bR6iJTH7GC7xCTNB4cuQ0d7A1j | ||||
NA0L0spFDRZJIpo0cF6hsb9VKd+JV4nnGCe11YQam3HxpPux/nWfLq4Zg9sS | ||||
uHk7lsh7xbckhb2Aasoy7eUJt7vj2EJHNRcgm02IP2kGg81M8CkY7q1B/BYe | ||||
pxh+UAR5rSUcYqvP2pjT2GziJjXcj9TX/q7Ykz75KMDmsIplc9pC6lhO4N/w | ||||
Jmh+KZA1vDADon58vKW7rPp6B8cRrLSSroCzuxqKCA5LCy7XQb7XausKBT4c | ||||
cNgQqIHdYCpEHkNoN27dUrT3hKJrDdIkOeV3fDqCUqks0HgV9uKC7/HoiolH | ||||
mHMZT+urgkLJ2AfFOFp1deTTkpqLe+wLsyKvmsh013rsmzG9+0Ao3QsOe2h+ | ||||
4phhHNr7mH074jih7hJAI9Ig0BKcb172X9iUhL7l6o6blgtoURVevdCdKsO5 | ||||
RnCwpm2TXSCSsgQkHPwnhyiphaMwJLSmfpGEATsez9uYCwgV53OJcCQGjtBV | ||||
wJNkyOlAriiG88wQyKitwrIG7dXQ3ZQ2HZ40N4KOYVu89tdIu8VBcLy5uuve | ||||
Y3FTc26wVpNwugFAgoCBjPO9zaiD9Tuikc82V4gGuh6b0TrfOStZn16rkNZv | ||||
uZ2kDjdG4oN6yTEteOeOzxYbDowyQ7qRRbruphbwUOM4pRes3DbkjFvqR4lN | ||||
1b5UYl9uWA/XsgllifpSy15xbJKxl8us1vqG+SvptfDzJlEGcI6mQ3FfSbRG | ||||
gXQj++QLKTP1vb1OnNDbhcjkFEmF1RsZ2TbFqUK2IRrSvaln34WkImmv4yO4 | ||||
fIwSa29F7EiCDB3KXE50DAyAVhedDtKQSywwz319F8LsTuA99zSSRgOuKfkV | ||||
669CeK2pOHmFzXQdqg51yLBx6zS+Ws6FeQqdanIU0p69unYuxFBhrmMemBM2 | ||||
TO9Tvj/NHhwHLHVJLLg5AzOgFllM0thdoSoc4rOuvbSLZooGRiWii3IerfTa | ||||
9PkFA/u8tcnZAow+WBgLZuuXuWgBylGeq9SlD0a5FHqZvRr+0l0TX81Tn1ff | ||||
0PJ4RDcNh0ULXYeft96iOfTc+axxTSqUIxfGol3q1i6zqEkVKNTkC4m2d1JK | ||||
8/x8LXJdUaHOm9oUQomoFIB5NWy3frW0oG6VD+BJVRrxqwObIIigQj8k5ccq | ||||
si/BASPwdJRKA+yKzd4Fsg98HlmxAsTxLlQaFfpevATOu8dvpuP9WC1ToGmZ | ||||
zjreXZbgdHxexvqh411KpM/BbAZn6HhjPDPiNdQiF4as4/2QpZJnRRcySQAb | ||||
sEYngFNxrCZK3Xe8l9D6GxlV+DigU99Q1gJZ/XOViksts453pe+VuKlSUlM5 | ||||
73ivCnaMkIwVZ8kEiNuSvc1ikBmmcJq7DJ5v3N5R+UM2T419i2GkwM24KlCZ | ||||
PFfINQIPLjKtKMYWWj2w/VzwstLcO04TaNz7O3sfMqMdNAAA | ||||
</rfc> | </rfc> | |||
End of changes. 63 change blocks. | ||||
526 lines changed or deleted | 400 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |