<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-keyusage-crl-validation-04" category="std" consensus="true" submissionType="IETF" updates="5280" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="CRL Validation Clarification">Clarification to Processing Key Usage Values During Certificate Revocation List (CRL) Validation</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-keyusage-crl-validation-04"/>
    <author fullname="Corey Bonnell">
      <organization>DigiCert, Inc.</organization>
      <address>
        <email>corey.bonnell@digicert.com</email>
      </address>
    </author>
    <author fullname="伊藤 忠彦" asciiFullname="Tadahiko Ito">
      <organization>SECOM CO., LTD.</organization>
      <address>
        <email>tadahiko.ito.public@gmail.com</email>
      </address>
    </author>
    <author fullname="大久保 智史" asciiFullname="Tomofumi Okubo">
      <organization>Penguin Securities Pte. Ltd.</organization>
      <address>
        <email>tomofumi.okubo+ietf@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="06"/>
    <keyword>Public Key Infrastructure</keyword>
    <keyword>Certificate validation</keyword>
    <keyword>Security</keyword>
    <abstract>
      <?line 50?>

<t>RFC 5280 (Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile) defines the profile of X.509 certificates and CRLs for use in the Internet. Section 4.2.1.3 of
RFC 5280 requires CRL issuer certificates to contain the <tt>keyUsage</tt>
extension with the <tt>cRLSign</tt> bit asserted. However, the CRL validation
algorithm specified in Section 6.3 of RFC 5280 does not explicitly
include a corresponding check for the presence of the <tt>keyUsage</tt>
certificate extension. This document updates RFC 5280 to require
that check.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://CBonnell.github.io/ietf-lamps-keyusage-crl-validation-clarification/draft-ietf-lamps-keyusage-crl-validation.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-keyusage-crl-validation/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/CBonnell/lamps-keyusage-crl-validation-clarification"/>.</t>
    </note>
  </front>
  <middle>
    <?line 60?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC5280"/> defines the profile of X.509 certificates and certificate
revocation lists (CRLs) for use in the Internet. <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/> requires CRL issuer certificates to contain the <tt>keyUsage</tt>
extension with the <tt>cRLSign</tt> bit asserted. However, the CRL validation
algorithm specified in <xref section="6.3" sectionFormat="of" target="RFC5280"/> does not explicitly
include a corresponding check for the presence of the <tt>keyUsage</tt>
certificate extension. This document updates <xref target="RFC5280"/> to require
that check.</t>
      <t><xref target="the-issue"/> describes the security concern that motivates this update.</t>
      <t><xref target="crl-validation-algo-amendment"/> updates the CRL validation algorithm (<xref section="6.3" sectionFormat="of" target="RFC5280"/>)
to resolve this concern.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-issue">
      <name>The Risk of Trusting CRLs Signed with Non-certified Keys</name>
      <t>In some Public Key Infrastructures, entities are delegated by
Certification Authorities (CAs) to sign CRLs. CRLs whose scope encompasses
certificates that have not been signed by the CRL issuer are known as
"indirect CRLs".</t>
      <t>Applications that consume CRLs follow the validation algorithm as
specified in <xref section="6.3" sectionFormat="of" target="RFC5280"/>. In particular, Section 6.3.3 of that RFC
contains the following step for CRL validation:</t>
      <blockquote>
        <t>(f) Obtain and validate the certification path for the issuer of
    the complete CRL.  The trust anchor for the certification
    path <bcp14>MUST</bcp14> be the same as the trust anchor used to validate
    the target certificate.  If a <tt>keyUsage</tt> extension is present
    in the CRL issuer's certificate, verify that the <tt>cRLSign</tt> bit
    is set.</t>
      </blockquote>
      <t>This step does not explicitly specify a check for the presence of the
<tt>keyUsage</tt> extension itself.</t>
      <t>Similarly, the certificate profile in <xref section="4" sectionFormat="of" target="RFC5280"/> does not require
the inclusion of the <tt>keyUsage</tt> extension in a certificate if the
certified public key is not used for verifying the signatures of other
certificates or CRLs.</t>
      <t>CAs can delegate the issuance of CRLs
to other entities by issuing to the entity a certificate that asserts
the <tt>cRLSign</tt> bit in the <tt>keyUsage</tt> extension. The CA
will then sign certificates that fall within the scope of the
indirect CRL by including the <tt>crlDistributionPoints</tt> extension (<xref section="4.2.1.13" sectionFormat="of" target="RFC5280"/>) and
specifying the distinguished name ("DN") of the CRL issuer in the
<tt>cRLIssuer</tt> field of the corresponding distribution point.</t>
      <t>The CRL issuer signs CRLs that assert the <tt>indirectCRL</tt> boolean within
the <tt>issuingDistributionPoint</tt> extension.</t>
      <t>The allowance for the issuance of certificates without the <tt>keyUsage</tt>
extension and the lack of a check for the inclusion of the <tt>keyUsage</tt>
extension during CRL verification can manifest in a security issue. A
concrete example is described below:</t>
      <ol spacing="normal" type="1"><li>
          <t>The CA signs an end-entity CRL issuer
certificate to subject <tt>X</tt> that certifies key <tt>A</tt> for signing CRLs by
explicitly including the <tt>keyUsage</tt> extension and asserting the
<tt>cRLSign</tt> bit in accordance with <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>.</t>
        </li>
        <li>
          <t>The CA signs one or more certificates that
include the <tt>crlDistributionPoints</tt> extension with the DN for subject
<tt>X</tt> included in the <tt>cRLIssuer</tt> field. This indicates that the
CRL-based revocation information for these certificates will be
provided by subject <tt>X</tt>.</t>
        </li>
        <li>
          <t>The CA signs an end-entity certificate to
subject <tt>X</tt> that certifies key <tt>B</tt>. This certificate contains no key
usage extension, as the certified key is not intended to be used for
signing CRLs and could be a "mundane" certificate of any type (e.g.,
S/MIME, document signing certificate where the corresponding private
key is stored on the filesystem of the secretary's laptop, etc.).</t>
        </li>
        <li>
          <t>Subject <tt>X</tt> signs a CRL using key <tt>B</tt> and publishes the CRL at the
<tt>distributionPoint</tt> field specified in the <tt>crlDistributionPoints</tt>
extension of the certificates signed in step 2.</t>
        </li>
        <li>
          <t>Relying parties download the CRL published in step 4. The CRL
validates successfully according to <xref section="6.3.3" sectionFormat="of" target="RFC5280"/>,
as the CRL issuer DN matches, and the check for the presence of the
<tt>cRLSign</tt> bit in the <tt>keyUsage</tt> extension is skipped because the
<tt>keyUsage</tt> extension is absent.</t>
        </li>
      </ol>
    </section>
    <section anchor="crl-validation-algo-amendment">
      <name>Checking the Presence of the <tt>keyUsage</tt> Extension</name>
      <t>To remediate the security issue described in <xref target="the-issue"/>, this
document specifies the following amendment to step (f) of the CRL
algorithm as specified in <xref section="6.3.3" sectionFormat="of" target="RFC5280"/>.</t>
      <t><em>OLD:</em></t>
      <ul empty="true">
        <li>
          <t>(f) Obtain and validate the certification path for the issuer of
    the complete CRL.  The trust anchor for the certification
    path <bcp14>MUST</bcp14> be the same as the trust anchor used to validate
    the target certificate.  If a <tt>keyUsage</tt> extension is present
    in the CRL issuer's certificate, verify that the <tt>cRLSign</tt> bit
    is set.</t>
        </li>
      </ul>
      <t><em>NEW:</em></t>
      <ul empty="true">
        <li>
          <t>(f) Obtain and validate the certification path for the issuer of
    the complete CRL.  The trust anchor for the certification
    path <bcp14>MUST</bcp14> be the same as the trust anchor used to validate
    the target certificate.  If the version of the CRL issuer’s
    certificate is version 3 (v3), then verify that the keyUsage
    extension is present and verify that the <tt>cRLSign</tt> bit is set.</t>
        </li>
      </ul>
      <t>This change ensures that the CRL issuer's key is certified for
CRL signing. However, this check is not performed if the CRL
issuer's key is certified using a version 1 (v1) or version 2 (v2) X.509
certificate, as these versions do not have an <tt>extensions</tt> field where
the key usage extension can be included.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If a CA has signed certificates to be used for
CRL verification but do not include the <tt>keyUsage</tt> extension in
accordance with <xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>, then relying party
applications that have implemented the modified verification algorithm
as specified in this document will be unable to verify CRLs signed by
the CRL issuer in question.</t>
      <t>It is <bcp14>RECOMMENDED</bcp14> that CAs include the
<tt>keyUsage</tt> extension in certificates to be used for CRL verification to
ensure that there are no interoperability issues where updated
applications are unable to verify CRLs.</t>
      <t>If it is not possible to update the profile of CRL issuer certificates,
then the policy management authority of the affected Public Key
Infrastructure <bcp14>SHOULD</bcp14> update the subject naming requirements to ensure
that certificates to be used for different purposes contain unique DNs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5280">
        <front>
          <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
          <author fullname="D. Cooper" initials="D." surname="Cooper"/>
          <author fullname="S. Santesson" initials="S." surname="Santesson"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <author fullname="W. Polk" initials="W." surname="Polk"/>
          <date month="May" year="2008"/>
          <abstract>
            <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5280"/>
        <seriesInfo name="DOI" value="10.17487/RFC5280"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 220?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the participants on the LAMPS Working Group mailing list for their insightful feedback and comments. In particular, the authors extend sincere appreciation to Carl Wallace, David Hook, Deb Cooley, John Gray, Michael St. Johns, Mike Ounsworth, Mohamed Boucadair, Russ Housley, Serge Mister, and Tomas Gustavsson for their reviews and suggestions, which greatly improved the quality of this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
