Hi Russ,

Thanks for verifying — we have noted your approval and will continue with 
publication shortly.

Thank you,
RFC Editor/sg

> On Jan 9, 2025, at 11:04 AM, Russ Housley <hous...@vigilsec.com> wrote:
> 
> Sandy:
> 
> I have double checked the ASN.1, and it compiles properly,
> 
> Please proceed with publication.
> 
> Russ
> 
>> On Jan 8, 2025, at 8:48 PM, Sandy Ginoza <sgin...@staff.rfc-editor.org> 
>> wrote:
>> 
>> Hi Russ,
>> 
>> We have updated the document and posted the files here:
>>  https://www.rfc-editor.org/authors/rfc9709.xml
>>  https://www.rfc-editor.org/authors/rfc9709.txt
>>  https://www.rfc-editor.org/authors/rfc9709.pdf
>>  https://www.rfc-editor.org/authors/rfc9709.html
>> 
>> AUTH48 diff: 
>>  https://www.rfc-editor.org/authors/rfc9709-auth48diff.html
>> 
>> Comprehensive diffs: 
>>  https://www.rfc-editor.org/authors/rfc9709-diff.html
>>  https://www.rfc-editor.org/authors/rfc9709-rfcdiff.html
>> 
>> Please review the updates, especially the changes to ASN.1, and let us know 
>> if any additional updates are needed or if you approve the RFC for 
>> publication. 
>> 
>> Thanks,
>> RFC Editor/sg
>> 
>> 
>> 
>>> On Jan 7, 2025, at 11:29 AM, Russ Housley <hous...@vigilsec.com> wrote:
>>> 
>>> Der RFC Editor:
>>> 
>>>> 1) <!-- [rfced] Please insert any keywords (beyond those that appear in
>>>> the title) for use on https://www.rfc-editor.org/search. -->
>>> 
>>> Please add:
>>> * content-encryption key
>>> * content-authenticated-encryption key
>>> 
>>>> 2) <!-- [rfced] Note that we changed "input key material" to "input keying 
>>>> material" here because OKM is introduced as "output keying material (OKM)" 
>>>> and IKM is defined as "input keying material" under Inputs.  Please let us 
>>>> know if this is incorrect. 
>>>> 
>>>> Original:
>>>> The mitigation uses the HMAC-based Extract-and-Expand Key Derivation
>>>> Function (HKDF) [RFC5869] to derive output keying material (OKM) from
>>>> input key material (IKM).
>>>> -->
>>> 
>>> RFC 5869 uses:
>>> *  IKM = input keying material
>>> *  OKM = output keying material
>>> 
>>> So, I think the changes you made are correct.
>>> 
>>>> 3) <!-- [rfced] Section 2: We converted this <artwork> into a <dl> that is 
>>>> followed by <artwork>.  Please review and let us know if this is 
>>>> incorrect.  
>>>> 
>>>> Original XML:
>>>>   <artwork><![CDATA[                                                       
>>>>             
>>>> Inputs:
>>>> IKM      input keying material
>>>> info     DER-encoded AlgoritmIdentifier
>>>> 
>>>> Output: 
>>>> OKM      output keying material (same size as IKM)
>>>> 
>>>> The output OKM is calculated as follows:
>>>> 
>>>> OKM_SIZE = len(IKM)  /* length in octets */
>>>> IF OKM_SIZE > 8160 THEN raise error
>>>> 
>>>> salt = "The Cryptographic Message Syntax"
>>>> PRK = HKDF-Extract(salt, IKM)
>>>> 
>>>> OKM = HKDF-Expand(PRK, info, OKM_SIZE)
>>>> 
>>>> ]]></artwork>
>>>> -->
>>> 
>>> It looks fine to me.
>>> 
>>> 
>>>> 4) <!-- [rfced] Note that we lowercased the following throughout. Please 
>>>> let us know if corrections are needed. 
>>>> 
>>>> Enveloped-data -> enveloped-data (matches RFC 5652)
>>>> Authenticated-Enveloped-Data -> authenticated-enveloped-data (matches RFC 
>>>> 5083)
>>>> -->
>>> 
>>> This works for me.
>>> 
>>> 
>>>> 5) <!-- [rfced] Because the text is quoted from RFC 5652, we marked it as 
>>>> a 
>>>> blockquote and updated it to match RFC 5652 exactly. Note that the HTML 
>>>> and 
>>>> PDF are linked to Section 6.3 of RFC 5652.  However, the TXT only says 
>>>> "see 
>>>> Section 6.3".  Please let us know if this causes any concern. 
>>>> 
>>>> Original (first sentence included for context): 
>>>> The fourth step of constructing an Enveloped-data is repeated below
>>>> from Section 6 of [RFC5652]:
>>>> 
>>>> 4.  The content is encrypted with the content-encryption key.
>>>>    Content encryption may require that the content be padded to a
>>>>    multiple of some block size; see Section 6.3 of [RFC5652].
>>>> 
>>>> Current:
>>>> |  4.  The content is encrypted with the content-encryption key.
>>>> |  Content encryption may require that the content be padded to a
>>>> |  multiple of some block size; see Section 6.3.
>>>> 
>>>> -->
>>> 
>>> This works for me.
>>> 
>>> 
>>>> 6) <!-- [rfced] Similar to above, we have changed the following to a 
>>>> blockquote and updated "Section 6.3 of [RFC5652]" to "Section 6.3 of 
>>>> [CMS]".  "6.3" currently links to Section 6.3 of RFC 3852 to accurately 
>>>> reflect the intent of RFC 5083.  In order to link to RFC 3852, we had to 
>>>> add an informative reference to RFC 3852 and an in-text citation.  
>>>> Therefore, we included a note to highlight that RFC 3852 
>>>> has been obsoleted.  Please review and let us know if you have concerns or 
>>>> have an alternate suggestion. 
>>>> 
>>>> Original (the first sentence is included for context):
>>>> The fifth step of constructing an Authenticated-Enveloped-Data is
>>>> repeated below from Section 2 of [RFC5083]:
>>>> 
>>>> 5.  The attributes collected in step 4 are authenticated and the CMS
>>>>    content is authenticated and encrypted with the content-
>>>>    authenticated-encryption key.  If the authenticated encryption
>>>>    algorithm requires either the additional authenticated data (AAD)
>>>>    or the content to be padded to a multiple of some block size,
>>>>    then the padding is added as described in Section 6.3 of
>>>>    [RFC5652].
>>>> 
>>>> Perhaps: 
>>>> |  5.  The attributes collected in step 4 are authenticated and the
>>>> |      CMS content is authenticated and encrypted with the content-
>>>> |      authenticated-encryption key.  If the authenticated encryption
>>>> |      algorithm requires either the additional authenticated data
>>>> |      (AAD) or the content to be padded to a multiple of some block
>>>> |      size, then the padding is added as described in Section 6.3 of
>>>> |      [CMS].
>>>> 
>>>> Note that [CMS] refers to RFC 3852, which has been obsoleted by RFC 
>>>> 5652, but the text in Section 6.3 was unchanged in RFC 5652.
>>>> -->
>>> 
>>> This works for me.
>>> 
>>> 
>>>> 7) <!-- [rfced] "message content plaintext" reads awkwardly to us.  Would 
>>>> "plaintext message content" also work?  It appears twice in the following 
>>>> text. 
>>>> 
>>>> Original:
>>>> Mitigation strategies for unwanted message traffic involve analysis
>>>> of message content plaintext.  When recipients accept unsolicited
>>>> encrypted messages, they become even more vulnerable to unwanted
>>>> traffic since many mitigation strategies will be unable to access the
>>>> message content plaintext.
>>>> -->
>>> 
>>> Yes, I am fine with "plaintext message content".
>>> 
>>> 
>>>> 8) <!-- [rfced] We replaced TBD0 with value 80 in the ASN.1, but we note a 
>>>> disrepancy in the year:
>>>> 
>>>> Original:
>>>> id-mod-CMS-CEK-HKDF-SHA256-2024(TBD0)
>>>> 
>>>> The description in the IANA Considerations section uses 2023: 
>>>> id-mod-CMS-CEK-HKDF-SHA256-2023
>>>> 
>>>> Please review and let us know if 2023 or 2024 is correct.
>>> 
>>> Please use "2023" to be consistent with the IANA Considerations.
>>> 
>>> 
>>>> In addition, are these slight variations in the ASN.1 correct? 
>>>> 
>>>> pkcs9(9) vs pkcs-9(9)
>>>> id-smime(16) vs smime(16)
>>>> 
>>>> Section 3:
>>>>   id-alg-cek-hkdf-sha256 OBJECT IDENTIFIER ::= { iso(1)
>>>>      member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-9(9)
>>>>      smime(16) alg(3) 31 }
>>>> 
>>>> Appendix A: 
>>>> CMS-CEK-HKDF-SHA256-Module-2024
>>>>  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs9(9)
>>>>    id-smime(16) id-mod(0) id-mod-CMS-CEK-HKDF-SHA256-2024(TBD0) }
>>>> 
>>>> ... 
>>>> 
>>>> id-alg-cek-hkdf-sha256 OBJECT IDENTIFIER ::= { iso(1) member-body(2)
>>>>    us(840) rsadsi(113549) pkcs(1) pkcs-9(9) smime(16) alg(3) 31 }
>>>> -->
>>> 
>>> Good catch.  Please use these in both places:
>>> *  pkcs-9(9)
>>> *  id-smime(16)
>>> 
>>> 
>>>> 9) <!-- [rfced] The ANS.1 refers to RFC 5911, but it does not mention RFC 
>>>> 5912.  Should RFC 5912 be mentioned? 
>>>> 
>>>> Original:
>>>> This ASN.1 module builds upon the conventions established in [RFC5911] 
>>>> and [RFC5912].
>>>> 
>>>> ... 
>>>> 
>>>> FROM AlgorithmInformation-2009 - in [RFC5911]
>>>> 
>>>> (note: double hyphen reduced to a single above so this can be included in 
>>>> a comment.)
>>>> -->
>>> 
>>> It would be fine to drop the reference to RFC 5912.  The reference to RFC  
>>> 5911 is good enough.
>>> 
>>> 
>>>> 10) <!-- [rfced] In B.1 and B.2, we have changed <artwork> to <sourcecode 
>>>> type="test-vectors"> because "test-vectors" are a defined sourcecode type 
>>>> (see https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types).  
>>>> Please review. 
>>>> -->
>>> 
>>> This works for me.
>>> 
>>> 
>>>> 11) <!-- [rfced] Please review the "Inclusive Language" portion of the 
>>>> online Style Guide 
>>>> <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
>>>> and let us know if any changes are needed.  Updates of this nature 
>>>> typically result in more precise language, which is helpful for readers.
>>>> 
>>>> Note that our script did not flag any words in particular, but this should 
>>>> still be reviewed as a best practice.
>>>> -->
>>> 
>>> I do not see any language that needs to be changed.
>>> 
>>> Russ
>>> 
>> 
> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to