This repository has been archived by the owner on Mar 28, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
draft-brown-eppsig.xml
497 lines (358 loc) · 15 KB
/
draft-brown-eppsig.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
There has to be one entity for each item to be referenced.
An alternate method (rfc include) is described in the references. -->
<!ENTITY I-D.narten-iana-considerations-rfc2434bis SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.narten-iana-considerations-rfc2434bis.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2818 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2818.xml">
<!ENTITY RFC3275 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3275.xml">
<!ENTITY RFC3688 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3688.xml">
<!ENTITY RFC5321 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5321.xml">
<!ENTITY RFC5730 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5730.xml">
<!ENTITY RFC6120 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6120.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-Ds might want to use.
(Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
(using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<?rfc comments="yes" ?>
<!-- show cref output -->
<?rfc inline="yes" ?>
<!-- inline cref output -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="exp" docName="draft-brown-eppsig" ipr="trust200902">
<!-- category values: std, bcp, info, exp, and historic
ipr values: full3667, noModification3667, noDerivatives3667
you can add the attributes updates="NNNN" and obsoletes="NNNN"
they will automatically be output with "(if approved)" -->
<!-- ***** FRONT MATTER ***** -->
<front>
<title abbrev="Launch Phase Mapping for EPP">XML Digital Signatures Extension for the Extensible Provisioning Protocol</title>
<author fullname="Gavin Brown" initials="G.B." surname="Brown">
<organization>CentralNic Ltd</organization>
<address>
<postal>
<street>35-39 Mooregate</street>
<city>London</city>
<region>England</region>
<code>EC2R 6AR</code>
<country>GB</country>
</postal>
<phone>+44 8700 170 900</phone>
<email>[email protected]</email>
<uri>http://www.centralnic.com</uri>
</address>
</author>
<date month="September" year="2011" />
<!-- Meta-data Declarations -->
<area>Applications</area>
<workgroup>Internet Engineering Task Force</workgroup>
<keyword>EPP, XML, Signatures, Cryptography</keyword>
<abstract>
<t>This document describes an Extensible Provisioning Protocol (EPP)
extension mapping for the use of XML Digital Signatures.
</t>
</abstract>
</front>
<middle>
<section title="Introduction">
<t>This document describes an extension mapping for version 1.0 of the
<xref target="RFC5730">Extensible Provisioning Protocol (EPP)</xref>.
This EPP mapping provides a mechanism by which <xref target="RFC3275">digital
signatures</xref> may be incorporated into EPP frames.</t>
<t>While EPP provides a number of security features, such as strong client-server
authentication, it provides no mechanism for non-repudiation or authentication
of origin. This extension provides a means by which the contents of an EPP frame
may be digitally signed, preventing future repudiation by the client or server
which produced them.</t>
<section title="Conventions Used in This Document">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in
<xref target="RFC2119">RFC 2119</xref>.</t>
<t>
XML is case sensitive. Unless stated otherwise, XML specifications
and examples provided in this document MUST be interpreted in the
character case presented in order to develop a conforming
implementation.
</t>
<t>
"eppSig-1.0" is used as an abbreviation for "urn:centralnic:params:xml:ns:eppSig-1.0".
The XML namespace prefix "eppSig" is used, but implementations MUST NOT depend on it and
instead employ a proper namespace-aware XML parser and serializer to interpret and output
the XML documents.
</t>
</section>
</section>
<section title="Use Cases">
<t>Digital signatures may be useful in a number of scenarios, such as:</t>
<t><list style="format %d.">
<t>a registry which charges a very high fee for object provisioning, where the
cost of refunds and chargebacks is sufficiently high that it is necessary to deter
frivolous registration requests.</t>
<t>a registry operating at a high level of security, where defence-in-depth
and the need to provide a full audit trail require strong authenticity of provisioning
requests.</t>
<t>future extensions to EPP may permit use of transport protocols such as
<xref target="RFC5321">SMTP</xref> or <xref target="RFC6120">XMPP</xref>, which
cannot provide end-to-end authenticity of frames.</t>
</list></t>
</section>
<section title="Extension Elements">
<t>This extension defines a single element, <eppSig:signature>, which may
appear in the <extension> element of <command> and <result>
frames.</t>
<t>The <eppSig:signature> element may contain any element permitted in
<xref target="RFC3275"/>.</t>
<section title="Example Frames">
<t>Example <command> frame containing an XML digital signature:</t>
<figure>
<artwork><![CDATA[
<?xml version="1.0" encoding="utf-8" standalone="no"?>
<epp
xmlns="urn:ietf:params:xml:ns:epp-1.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<command>
<create>
<domain:create
xmlns:domain="urn:ietf:params:xml:ns:domain-1.0">
<domain:name>example.com</domain:name>
<domain:period unit="y">2</domain:period>
<domain:ns>
<domain:hostObj>ns1.example.com</domain:hostObj>
<domain:hostObj>ns2.example.com</domain:hostObj>
</domain:ns>
<domain:registrant>jd1234</domain:registrant>
<domain:contact type="admin">sh8013</domain:contact>
<domain:contact type="tech">sh8013</domain:contact>
<domain:authInfo>
<domain:pw>2fooBAR</domain:pw>
</domain:authInfo>
</domain:create>
</create>
<extension>
<eppSig:signature
xmlns:eppSig="urn:centralnic:params:xml:ns:eppSig-1.0">
<ds:Signature
xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod
Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" />
<ds:SignatureMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
<ds:Reference>
<ds:Transforms>
<ds:Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</ds:Transforms>
<ds:DigestMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<ds:DigestValue>
UJEib8S59LmAwI9z1imSEKVn/D4=
</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>
iqnL15xs5AoaNxjqtmekYevtCblgZhLAio...
</ds:SignatureValue>
</ds:Signature>
</eppSig:signature>
</extension>
<clTRID>ABC-12345</clTRID>
</command>
</epp>
]]></artwork>
</figure>
<t>Example <result> frame containing an XML digital signature:</t>
<figure><artwork><![CDATA[
<?xml version="1.0" encoding="utf-8" standalone="no"?>
<epp xmlns="urn:ietf:params:xml:ns:epp-1.0">
<response>
<result code="1000">
<msg>Command completed successfully</msg>
</result>
<resData>
<domain:creData xmlns:domain="urn:ietf:params:xml:ns:domain-1.0">
<domain:name>example.com</domain:name>
<domain:crDate>1999-04-03T22:00:00.0Z</domain:crDate>
<domain:exDate>2001-04-03T22:00:00.0Z</domain:exDate>
</domain:creData>
</resData>
<extension>
<eppSig:signature
xmlns:eppSig="urn:centralnic:params:xml:ns:eppSig-1.0">
<ds:Signature
xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod
Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" />
<ds:SignatureMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
<ds:Reference>
<ds:Transforms>
<ds:Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</ds:Transforms>
<ds:DigestMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<ds:DigestValue>
EEijkGTFZEbgbOnZ/XIR/VSKPAM=
</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>
iqnL15xs5AoaNxjqtmekYevtCblgZhLAio...
</ds:SignatureValue>
</ds:Signature>
</eppSig:signature>
</extension>
<trID>
<clTRID>ABC-12345</clTRID>
<svTRID>54321-XYZ</svTRID>
</trID>
</response>
</epp>
]]></artwork></figure>
</section>
</section>
<section title="Use of Signatures">
<t>
Servers which support this extension MUST include the extension namespace in an
<extURI> element in the the <svcExtension> element of the
<greeting> frame sent to the client at the beginning of a session (and in
response to a <hello> command). The server MUST include an
<eppSig:signature> element, containing a valid XML digital signature, in
the <extension> element of all <result> frames.</t>
<t>
Clients which support this extension MUST include the extension namespace in an
<objURI> element in the the <svcs> element of the
<login> frame sent to the server at the beginning of each session, if that
server also supports the extension. The client MUST include an
<eppSig:signature> element, containing a valid XML digital
signature, in the <extension> element of all <command> frames.</t>
</section>
<section title="Verification of Signatures">
<t>
If a server which supports this extension receives a signed <command>
frame from a client, it MUST verify the signature of the frame. If the signature
is successfully verified, the server MUST proceed with the processing of the
<command> frame as normal. If the signature cannot be successfully
verified, the server MUST not proceed with the processing of the <command>
frame, and MUST return a 2200 authentication error to the client.
</t>
<t>
If a client which supports this extension receives a signed <result>
frame from a server, it MUST verify the signature of the frame. If the signature
cannot be successfully verified, the client MAY notify the end user of an error,
but SHOULD notify an operator or system administrator for subsequent investigation.
</t>
</section>
<section title="Formal Syntax">
<figure>
<artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<schema
targetNamespace="urn:centralnic:params:xml:ns:eppSig-1.0"
xmlns:eppSig="urn:centralnic:params:xml:ns:eppSig-1.0"
xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
xmlns="http://www.w3.org/2001/XMLSchema"
elementFormDefault="qualified">
<import namespace="http://www.w3.org/2000/09/xmldsig#" />
<annotation>
<documentation>
Extensible Provisioning Protocol v1.0
XML digital signature extension schema
</documentation>
</annotation>
<!--
Child elements found in EPP commands.
-->
<element name="signature" type="eppSig:signatureType"/>
<complexType name="signatureType">
<sequence>
<any namespace="http://www.w3.org/2000/09/xmldsig#" />
</sequence>
</complexType>
</schema>
]]></artwork>
</figure>
</section>
<section anchor="Security" title="Security Considerations">
<t>XML Digital Signatures use a Public Key Infrastructure. To verify a digital
signature, one must use the signer's public key: to ensure the authenticity of
the signature, this key must be obtained via a secure, out-of-band channel.</t>
<t>Clients and servers which support this extension MUST exchange public key
information using a facility that provides privacy and integrity services to
protect against unintended disclosure and modification while in transit. For
example, a server might publish its public key as a self-signed certificate in a
<xref target="DANE">TLSA</xref> resource record in the DNS. Alternatively, both
clients and servers may exchange keys via a <xref target="RFC2818">HTTPS</xref>
service which securely authenticates both parties.</t>
</section>
<section anchor="IANA" title="IANA Considerations">
<t>This document uses URNs to describe XML namespaces and XML schemas
conforming to a registry mechanism described in <xref target="RFC3688"/>. Two
URI assignments were requested and have been registered by the IANA.</t>
<t>Registration request for the digital signature namespace:</t>
<t>URI: urn:centralnic:params:xml:ns:eppSig-1.0</t>
<t>Registrant Contact: See the "Author's Address" section of this
document.</t>
<t>XML: None. Namespace URIs do not represent an XML specification.</t>
<t>Registration request for the registry grace period XML schema:</t>
<t>URI: urn:centralnic:params:xml:ns:eppSig-1.0</t>
<t>Registrant Contact: See the "Author's Address" section of this
document.</t>
<t>XML: See the "Formal Syntax" section of this document.</t>
</section>
</middle>
<back>
<!-- References split into informative and normative -->
<!-- There are 2 ways to insert reference entries from the citation libraries:
1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
(for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")
Both are cited textually in the same manner: by using xref elements.
If you use the PI option, xml2rfc will, by default, try to find included files in the same
directory as the including file. You can also define the XML_LIBRARY environment variable
with a value containing a set of directories to search. These can be either in the local
filing system or remote ones accessed by http (http://domain/dir/... ).-->
<references title="Normative References">
&RFC2119;
&RFC2818;
&RFC3275;
&RFC3688;
&RFC5321;
&RFC5730;
&RFC6120;
<reference anchor="DANE">
<front>
<title>Using Secure DNS to Associate Certificates with Domain Names For TLS</title>
<author fullname="Paul Hoffman" initials="P.H." surname="Hoffman" />
<author fullname="Jakob Schlyter" initials="J.S." surname="Schlyter" />
<date month="September" year="2011" day="7" />
</front>
</reference>
</references>
</back>
</rfc>