End-to-End Signing and Object Encryption for the Extensible Messaging and Presence Protocol (XMPP)Jabber Software Foundationstpeter@jabber.org
Applications
XMPP Working GroupRFCRequest for CommentsI-DInternet-DraftXMPPExtensible Messaging and Presence ProtocolJabberIMInstant MessagingPresenceXMLExtensible Markup LanguageThis memo defines methods of end-to-end signing and object encryption for the Extensible Messaging and Presence Protocol (XMPP).This memo defines methods of end-to-end signing and object encryption for the Extensible Messaging and Presence Protocol (XMPP). (For information about XMPP, see and .) The method specified herein enables a sender to sign and/or encrypt an instant message sent to a specific recipient, sign and/or encrypt presence information that is directed to a specific user, and sign and/or encrypt any arbitrary XMPP stanza directed to a specific user. This memo thereby helps the XMPP specifications meet the requirements specified in .This document inherits terminology defined in , , , and .The capitalized key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, RFC 2119.For the purposes of this memo, we stipulate the following requirements:The method defined MUST address signing and encryption requirements for minimal instant messaging and presence, as those are defined in . In particular, the method MUST address the following requirements, which are copied here verbatim from :
The protocol MUST provide means to ensure confidence that a received message (NOTIFICATION or INSTANT MESSAGE) has not been corrupted or tampered with. (Section 2.5.1)The protocol MUST provide means to ensure confidence that a received message (NOTIFICATION or INSTANT MESSAGE) has not been recorded and played back by an adversary. (Section 2.5.2)The protocol MUST provide means to ensure that a sent message (NOTIFICATION or INSTANT MESSAGE) is only readable by ENTITIES that the sender allows. (Section 2.5.3)The protocol MUST allow any client to use the means to ensure non-corruption, non-playback, and privacy, but the protocol MUST NOT require that all clients use these means at all times. (Section 2.5.4)When A establishes a SUBSCRIPTION to B's PRESENCE INFORMATION, the protocol MUST provide A means of verifying the accurate receipt of the content B chooses to disclose to A. (Section 5.1.4)The protocol MUST provide A means of verifying that the presence information is accurate, as sent by B. (Section 5.3.1)The protocol MUST provide A means of ensuring that no other PRINCIPAL C can see the content of M. (Section 5.4.6)The protocol MUST provide A means of ensuring that no other PRINCIPAL C can tamper with M, and B means to verify that no tampering has occurred. (Section 5.4.7)The method defined MUST enable interoperability with non-XMPP messaging systems that support the Common Presence and Instant Messaging (CPIM) specifications published by the Instant Messaging and Presence (IMPP) Working Group. Two corollaries of this requirement are: Prior to signing and/or encrypting, the format of an instant message MUST conform to the CPIM Message Format defined in .Prior to signing and/or encrypting, the format of presence information MUST conform to the CPP Presence Information Data Format defined in .The method MUST follow the required procedures (including the specific algorithms) defined in and . In particular, these documents specify: Signing MUST use signatures with SignedData.Encryption MUST use encryption with EnvelopeData.In order to enable interoperable implementations, sending and receiving applications MUST implement the algorithms specified under Mandatory-to-Implement Cryptographic Algorithms.We further stipulate that the following functionality is out of scope for this memo:Discovery of support for this protocol. An entity could discover whether another entity supports this protocol by (1) attempting to send signed or encrypted stanzas and receiving an error stanza ("technical" discovery) or a textual message in reply ("social" discovery) if the protocol is not supported, or (2) using a dedicated service discovery protocol, such as or . However, the definition of a service discovery protocol is out of scope for this memo.Signing or encryption of XMPP groupchat messages, which are mentioned in but not defined therein since they are not required by ; such messages are best specified in .Signing or encryption of broadcasted presence as described in (the methods defined herein apply to directed presence only).Signing or encryption of communications that occur within the context of applications other than instant messaging and presence as those are described in and .In order to sign and/or encrypt a message, a sending agent MUST use the following procedure:Generate a "Message/CPIM" object as defined in .Sign and/or encrypt both the headers and content of the "Message/CPIM" object as specified in Requirement 3 of above.Provide the resulting signed and/or encrypted object within an XML CDATA section (see Section 2.7 of ) contained in an <e2e/> child of a <message/> stanza, where the <e2e/> element is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace as specified more fully in below.The following example illustrates the defined steps for signing a message.First, the sending agent generates a "Message/CPIM" object in accordance with the rules and formats specified in .Once the sending agent has generated the "Message/CPIM" object, the sending agent may sign it. The result is a multipart object (see ) that has a Content-Type of "multipart/signed" and includes two parts: one whose Content-Type is "Message/CPIM" and another whose Content-Type is "application/pkcs7-signature".The sending agent now wraps the "multipart/signed" object in an XML CDATA section, which is contained in an <e2e/> element that is included as a child element of the XMPP message stanza and that is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace.The following example illustrates the defined steps for encrypting a message.First, the sending agent generates a "Message/CPIM" object in accordance with the rules and formats specified in .Once the sending agent has generated the "Message/CPIM" object, the sending agent may encrypt it.The sending agent now wraps the encrypted object in an XML CDATA section, which is contained in an <e2e/> element that is included as a child element of the XMPP message stanza and that is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace.In order to sign and/or encrypt presence information, a sending agent MUST use the following procedure:Generate an "application/pidf+xml" object as defined in .Sign and/or encrypt the "application/pidf+xml" object as specified in Requirement 3 of above.Provide the resulting signed and/or encrypted object within an XML CDATA section (see Section 2.7 of ) contained in an <e2e/> child of a <presence/> stanza, where the <e2e/> element is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace. The <presence/> stanza MUST include a 'to' attribute, i.e., it must be an instance of directed presence as defined in .The following example illustrates the defined steps for signing presence information.First, the sending agent generates an "application/pidf+xml" object in accordance with the rules and formats specified in .Once the sending agent has generated the "application/pidf+xml" object, the sending agent may sign it. The result is a multipart object (see ) that has a Content-Type of "multipart/signed" and includes two parts: one whose Content-Type is "application/pidf+xml" and another whose Content-Type is "application/pkcs7-signature".The sending agent now wraps the "multipart/signed" object in an XML CDATA section, which is contained in an <e2e/> element that is included as a child element of the XMPP message stanza and that is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace.The following example illustrates the defined steps for encrypting presence information.First, the sending agent generates an "application/pidf+xml" object in accordance with the rules and formats specified in .Once the sending agent has generated the "application/pidf+xml" object, the sending agent may encrypt it.The sending agent now wraps the encrypted object in an XML CDATA section, which is contained in an <e2e/> element that is included as a child element of the XMPP message stanza and that is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace.The foregoing sections of this memo describe how to secure "least common denominator" messaging and presence data of the kind that can be directly translated into the MSGFMT or PIDF formats. However, XMPP possesses a third base-level stanza type (<iq/>) in addition to <message/> and <presence/>, as well as the ability to include extended XML data within arbitrary child elements of the three core stanza types. Therefore, it would be desirable to secure such data if possible.Because specifies the ability to encapsulate any MIME type, the approach taken in this memo is to include arbitrary XMPP data in an XML media type named "application/xmpp+xml" as specified more fully in below.The following examples illustrate the structure of the "application/xmpp+xml" MIME type. (Note: The 'http://jabber.org/protocol/evil' namespace used in these examples is associated with an April Fool's protocol written to be the instant messaging equivalent of RFC 3514; it is included only as an instance of extended information included in an XML stanza and should not be taken seriously as a functional XMPP extension.)Just as with the "Message/CPIM" and "application/pidf+xml" objects, the "application/xmpp+xml" object would be signed and/or encrypted, then encapsulated within an XML CDATA section (see Section 2.7 of ) contained in an <e2e/> child of a <presence/> stanza, where the <e2e/> element is qualified by the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace. does not specify how to obtain a certificate from a certificate authority, but instead mandates that every sending agent must already have a certificate. The PKIX Working Group has, at the time of this writing, produced two separate standards for certificate enrollment: and . Which method to use for certificate enrollment is outside the scope of this memo.A receiving agent MUST provide some certificate retrieval mechanism in order to gain access to certificates for recipients of digital envelopes. This memo does not address how S/MIME agents handle certificates, only what they do after a certificate has been validated or rejected. S/MIME certification issues are covered in .However, at a minimum, for initial S/MIME deployment, a user agent SHOULD automatically generate a message to an intended recipient requesting that recipient's certificate in a signed return message. Receiving and sending agents SHOULD also provide a mechanism to allow a user to "store and protect" certificates for correspondents in such a way so as to guarantee their later retrieval.End-entity certificates used by XMPP entities in the context of this memo SHOULD contain a valid instant messaging and presence address. The address SHOULD be specified as both an 'im:' URI (for instant messaging, as defined in ) and a 'pres:' URI (for presence, as defined in ); each of these URIs SHOULD be specified in a separate GeneralName entry of type uniformResourceIdentifier inside the subjectAltName (i.e., two separate entries). Information in the subject distinguished name SHOULD be ignored.Each URI MUST be of the form <im:address> or <pres:address>, where the "address" portion is an XMPP address (also referred to as a Jabber Identifier or JID) as defined in , prepended with the 'im:' or 'pres:' URI scheme. The address SHOULD be of the form <node@domain> (i.e., a "bare JID"), although any valid JID form MAY be used.The value of the JID contained in the XMPP 'from' attribute MUST match a JID provided in the signer's certificate, with the exception that the resource identifier portion of the JID contained in the 'from' attribute SHOULD be ignored for matching purposes.Receiving agents MUST check that the sending JID matches a JID provided in the signer's certificate, with the exception that the resource identifier portion of the JID contained in the 'from' attribute SHOULD be ignored for matching purposes. A receiving agent SHOULD provide some explicit alternate processing of the stanza if this comparison fails, which may be to display a message informing the recipient of the addresses in the certificate or other certificate details.The subject alternative name extension is used in S/MIME as the preferred means to convey the instant messaging and presence address that corresponds to the entity for this certificate. Any XMPP address present in the certificate MUST be encoded using the ASN.1 Object Identifier "id-on-xmppAddr" as specified in Section 5.1.1 of .Because it is expected that XMPP applications will not interface with older 7-bit systems, the transfer encoding (as defined in Section 3.1.2 of ) MUST be "binary".If a stanza is both signed and encrypted, it SHOULD be signed first, then encrypted.If the sender and recipient are involved in an active messaging session over a period of time, the sending agent SHOULD include the sender's certificate along with at least one encrypted message stanza every five minutes. Outside the context of an active messaging session, the sending agent SHOULD include the sender's certificate along with each encrypted message stanza. A sending agent MAY include the sender's certificate along with each encrypted presence stanza. However, a sending agent SHOULD NOT include a certificate more than once every five minutes.Sending agents SHOULD attach a signature to each encrypted XML stanza. If a signature is attached, a Content-Disposition header field (as defined in ) SHOULD be included to specify how the signature is to be handled by the receiving application.If the receiving agent determines that the signature attached to an encrypted XML stanza is invalid, it SHOULD NOT present the stanza to the intended recipient (human or application), SHOULD provide some explicit alternate processing of the stanza (which may be to display a message informing the recipient that the attached signature is invalid), and MAY return a stanza error to the sender as described under Recipient Error Handling.If the receiving agent is unable to decrypt the encrypted XML stanza, it SHOULD NOT present the stanza to the intended recipient (human or application), SHOULD provide some explicit alternate processing of the stanza (which may be to display a message informing the recipient that it has received a stanza that cannot be decrypted), and MAY return a stanza error to the sender as described under Recipient Error Handling.Timestamps are included in "Message/CPIM" and "application/pidf+xml" objects to help prevent replay attacks. All timestamps MUST conform to and be presented as UTC with no offset, including fractions of a second as appropriate. Absent a local adjustment to the sending agent's perceived time or the underlying clock time, the sending agent MUST ensure that the timestamps it sends to the receiver increase monotonically (if necessary by incrementing the seconds fraction in the timestamp if the clock returns the same time for multiple requests). The following rules apply to the receiving application:It MUST verify that the timestamp received is within five minutes of the current time.It SHOULD verify that the timestamp received is greater than any timestamp received in the last 10 minutes which passed the previous check.If any of the foregoing checks fails, the timestamp SHOULD be presented to the receiving entity (human or application) marked as "old timestamp", "future timestamp", or "decreasing timestamp", and the receiving entity MAY return a stanza error to the sender as described under Recipient Error Handling.All implementations MUST support the following algorithms. Implementations MAY support other algorithms as well.For CMS SignedData:The SHA-1 message digest as specified in section 2.1.The RSA (PKCS #1 v1.5) with SHA-1 signature algorithm, as specified in section 3.2.For CMS EnvelopedData:The RSA (PKCS #1 v1.5) key transport, as specified in section 4.2.1.The AES-128 encryption algorithm in CBC mode, as specified in .When an XMPP entity receives an XML stanza containing data that is signed and/or encrypted using the protocol described herein, several scenarios are possible:The receiving application does not understand the protocol.The receiving application understands the protocol and is able to decrypt the payload and verify the sender's signature.The receiving application understands the protocol and is able to decrypt the payload and verify the sender's signature, but the timestamps fail the checks specified above under Checking of Timestamps.The receiving application understands the protocol and is able to decrypt the payload but is unable to verify the sender's signature.The receiving application understands the protocol but is unable to decrypt the payload.In Case #1, the receiving application MUST do one and only one of the following: (1) ignore the <e2e/> extension, (2) ignore the entire stanza, or (3) return a <service-unavailable/> error to the sender, as described in .In Case #2, the receiving application MUST NOT return a stanza error to the sender, since this is the success case.In Case #3, the receiving application MAY return a <not-acceptable/> error to the sender (as described in ), optionally supplemented by an application-specific error condition element <bad-timestamp/> as shown below:In Case #4, the receiving application SHOULD return a <not-acceptable/> error to the sender (as described in ), optionally supplemented by an application-specific error condition element <unverified-signature/> as shown below:In Case #5, the receiving application SHOULD return a <bad-request/> error to the sender (as described in ), optionally supplemented by an application-specific error condition element <decryption-failed/> as shown below:A common method for achieving interoperability between two disparate services is through the use of a "gateway" that interprets the protocols of each service and translates them into the protocols of the other. The CPIM specifications (specifically and define the common profiles to be used for interoperability between instant messaging and presence services that comply with . In the case of communications between an XMPP service and a non-XMPP service, we can visualize this relationship as follows:The end-to-end encryption method defined herein enables the exchange of encrypted and/or signed instant messages and presence through an XMPP-CPIM gateway. In particular:When a gateway receives a secured XMPP message or presence stanza from the XMPP service that is addressed to a user on the non-XMPP service, it MUST remove the XMPP "wrapper" (everything down to and including the <e2e> and </e2e> tags) in order to reveal the multipart S/MIME object, then route the object to the non-XMPP service (first wrapping it in the protocol used by the non-XMPP service if necessary).When a gateway receives a secured non-XMPP instant message or presence document from the non-XMPP service that is addressed to a user on the XMPP service, it MUST remove the non-XMPP "wrapper" (if any) in order to reveal the multipart S/MIME object, wrap the object in an XMPP message or presence "wrapper" (including the <e2e> and </e2e> tags), and then route the XMPP stanza to the XMPP service.The wrapped S/MIME object MUST be immutable and MUST NOT be modified by an XMPP-CPIM gateway.The <e2e xmlns='urn:ietf:params:xml:ns:xmpp-e2e'/> element is a wrapper for an XML CDATA section (see Section 2.7 of ) that contains a "Message/CPIM", "application/pidf+xml", or "application/xmpp+xml" object. Thus the 'urn:ietf:params:xml:xmpp-e2e' namespace has no inherent semantics, and the semantics of the encapsulated object are defined by one of the following specifications: for "Message/CPIM" for "application/pidf+xml" for "application/xmpp+xml"Although the "application/xmpp+xml" media type is specified in this document, the <xmpp/> element is simply a wrapper for a <message/>, <presence/>, or <iq/> stanza, where the semantics of those stanza types are specified in .Given that the 'urn:ietf:params:xml:ns:xmpp-e2e' namespace has no inherent semantics and specifies a using protocol only, versioning is the responsibility of the protocols that define the encapsulated objects (, , and ).The "application/xmpp+xml" media type adheres to the guidelines specified in . The root element for this MIME type is <xmpp/>, and the root element MUST contain one and only one child element, corresponding to one of the XMPP stanza types (i.e., message, presence, or iq) if the default namespace is 'jabber:client' or 'jabber:server' as defined in . The character encoding for this XML media type MUST be UTF-8, in accordance with Section 11.5 of .This entire memo discusses security. Detailed security considerations for instant messaging and presence protocols are given in (Sections 5.1 through 5.4), and for XMPP in particular are given in (Sections 12.1 through 12.6). In addition, all of the security considerations specified in apply to the "application/xmpp+xml" media type.The end-to-end security method defined here MAY result in exchanging secured instant messages and presence information through a gateway that implements the CPIM specifications. Such a gateway MUST be compliant with the minimum security requirements of the instant messaging and presence protocols with which it interfaces.A URN sub-namespace of signed and encrypted content for the Extensible Messaging and Presence Protocol (XMPP) is defined as follows. (This namespace name adheres to the format defined in .)urn:ietf:params:xml:ns:xmpp-e2eRFC 3923This is an XML namespace name of signed and encrypted content for the Extensible Messaging and Presence Protocol as defined by RFC 3923.IESG, <iesg@ietf.org>To: ietf-types@iana.orgSubject: Registration of MIME media type application/xmpp+xmlSame as charset parameter of application/xml as specified in RFC 3023; per Section 11.5 of , the charset must be UTF-8.Same as encoding considerations of application/xml as specified in RFC 3023; per Section 11.5 of , the encoding must be UTF-8.All of the security considerations specified in RFC 3023 and apply to this XML media type. Refer to of RFC 3923.RFC 3923XMPP-compliant instant messaging and presence systems.IESG, <iesg@ietf.org>COMMONIETF, XMPP Working GroupSecure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Certificate HandlingCryptographic Message Syntax (CMS)Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax (CMS)Cryptographic Message Syntax (CMS) AlgorithmsCommon Profile for Instant Messaging (CPIM)Common Profile for Presence (CPP)Date and Time on the Internet: TimestampsCommunicating Presentation Information in Internet Messages: The Content-Disposition Header FieldNew Century Systems324 East 41st Street #804New YorkNY10017USA+1 (212) 557-2050+1 (212) 557-2049rens@century.comQUALCOMM Incorporated6455 Lusk BoulevardSan DiegoCA 92121USAsdorner@qualcomm.comDepartment of Computer ScienceUniversity of TennesseeKnoxville107 Ayres HallKnoxville TN 37996-1301USA+1 (423) 974-5067+1 (423) 974-8296moore@cs.utk.edu
Applications
MIMEinternet messagemultipurpose internet mail extensions
This memo provides a mechanism whereby messages conforming to the
MIME specifications [RFC 2045, RFC 2046, RFC 2047, RFC 2048, RFC
2049] can convey presentational information. It specifies the
"Content-Disposition" header field, which is optional and valid for
any MIME entity ("message" or "body part"). Two values for this
header field are described in this memo; one for the ordinary linear
presentation of the body part, and another to facilitate the use of
mail to transfer files. It is expected that more values will be
defined in the future, and procedures are defined for extending this
set of values.
This document is intended as an extension to MIME. As such, the
reader is assumed to be familiar with the MIME specifications, and
[RFC 822]. The information presented herein supplements but does not
replace that found in those documents.
This document is a revision to the Experimental protocol defined in
RFC 1806. As compared to RFC 1806, this document contains minor
editorial updates, adds new parameters needed to support the File
Transfer Body Part, and references a separate specification for the
handling of non-ASCII and/or very long parameter values.
A Model for Presence and Instant MessagingSightPath, Inc.mday@alum.mit.edudynamicsoftjdrosen@dynamicsoft.comFujitsu Laboratories Ltd.suga@flab.fujitsu.co.jpInstant Messaging / Presence Protocol RequirementsSightPath, Inc.135 Beaver StreetWalthamMA02452USmday@alum.mit.eduMicrosoft CorporationOne Microsoft WayRedmondWA98052USsonuag@microsoft.comInto Networks, Inc.150 Cambridgepark DriveCambridgeMA02140USjesse@intonet.comPresence and Instant Messaging have recently emerged as a new medium of communications over the Internet. Presence is a means for finding, retrieving, and subscribing to changes in the presence information (e.g. "online" or "offline") of other users. Instant messaging is a means for sending small, simple messages that are delivered immediately to online users.Applications of presence and instant messaging currently use independent, non-standard and non-interoperable protocols developed by various vendors. The goal of the Instant Messaging and Presence Protocol (IMPP) Working Group is to define a standard protocol so that independently developed applications of instant messaging and/or presence can interoperate across the Internet. This document defines a minimal set of requirements that IMPP must meet.Common Presence and Instant Messaging (CPIM): Message FormatSecurity Multiparts for MIME: Multipart/Signed and Multipart/EncryptedTrusted Information Systems3060 Washington RoadGlenwoodMD21738US+1 301 854 6889+1 301 854 5363galvin@tis.comTrusted Information Systems3060 Washington RoadGlenwoodMD21738US+1 301 854 6889+1 301 854 5363sandy@tis.comCyberCash, Inc.2086 Hunters Crest WayViennaVA22181US+1 703 620 1222+1 703 391 2651crocker@cybercash.comInnosoft International, Inc.1050 East Garvey Avenue SouthWest CovinaCA91790US+1 818 919 3600+1 818 919 3614ned@innosoft.comThis document defines a framework within which security services may be applied to MIME body parts. MIME, an acronym for "Multipurpose Internet Mail Extensions", defines the format of the contents of Internet mail messages and provides for multi-part textual and non-textual message bodies. The new content types are subtypes of multipart: signed and encrypted. Each will contain two body parts: one for the protected data and one for the control information necessary to remove the protection. The type and contents of the control information body parts are determined by the value of the protocol parameter of the enclosing multipart/signed or multipart/encrypted content type, which is required to be present.Presence Information Data Format (PIDF)Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message SpecificationKey words for use in RFCs to Indicate Requirement LevelsHarvard University1350 Mass. Ave.CambridgeMA 02138- +1 617 495 3864-
General
keywordIn many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.Note that the force of these words is modified by the requirement level of the document in which they are used.XML Media TypesExtensible Messaging and Presence Protocol (XMPP): CoreJabber Software FoundationExtensible Messaging and Presence Protocol (XMPP): Instant Messaging and PresenceJabber Software FoundationEntity Capabilitiesjhildebrand@jabber.comstpeter@jabber.orgCertificate Management Messages over CMSVeriSign Inc.1350 Charleston RoadMountain ViewCA94043US+1 650 429 3402mmyers@verisign.comcisco Systems170 West Tasman DriveSan JoseCA95134US+1 480 526 7430xliu@cisco.comjimsch@nwlink.comjsw@meer.netThis document defines a Certificate Management protocol using CMS. This protocol addresses two immediate needs within the Internet PKI community:1. The need for an interface to public key certification products and services based onand, and
2. The need infor a certificate enrollment protocol for DSA-signed certificates with Diffie-Hellman public keys.A small number of additional services are defined to supplement the core certificate request service.Throughout this specification the term CMS is used to refer to bothand. For both signedData and envelopedData, CMS is a superset of the PKCS7. In general, the use of PKCS7 in this document is aligned to the Cryptographic Message Syntaxthat provides a superset of the PKCS7 syntax. The term CMC refers to this specification.The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC 2119].Internet X.509 Public Key Infrastructure Certificate Management ProtocolsEntrust Technologies750 Heron RoadSuite E08OttawaOntarioK1V 1A7CAcadams@entrust.comSoftware and Systems Engineering Ltd.Fitzwilliam CourtLeeson CloseDublin2IEstephen.farrell@sse.ieThis document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocols. Protocol messages are defined for all relevant aspects of certificate creation and management. Note that "certificate" in this document refers to an X.509v3 Certificate as defined in,The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document (in uppercase, as shown) are to be interpreted as described in.Service Discoveryjhildebrand@jabber.compgmillard@jabber.orgreatmon@jabber.orgstpeter@jabber.orgMulti-User Chatstpeter@jabber.orgExtensible Markup Language (XML) 1.0 (3rd ed)Textuality and Netscapetbray@textuality.comMicrosoftjeanpa@microsoft.comUniversity of Illinois at Chicago and Text Encoding Initiativecmsmcq@uic.eduSun Microsystemseve.maler@east.sun.comThe IETF XML RegistryThe following XML schema is descriptive, not normative.