<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-li-sidrops-rpki-moasgroup-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="rpki-moasgroup">A Profile for Signed Group of Multiple-Origin Autonomous Systems for Use in the Resource Public Key Infrastructure (RPKI)</title>
    <seriesInfo name="Internet-Draft" value="draft-li-sidrops-rpki-moasgroup-01"/>
    <author fullname="Qi Li">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>liq23@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Jianping Wu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jianping@cernet.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="October" day="10"/>
    <area>Operations and Management</area>
    <workgroup>SIDR Operations</workgroup>
    <abstract>
      <?line 64?>

<t>This document defines a "Signed MOAS Group", a Cryptographic Message Syntax (CMS) protected content type for use with the Resource Public Key Infrastructure (RPKI) to authenticate the collective announcement of IP prefixes by Multiple Origin Autonomous System (MOAS). The Signed MOAS Group mainly includes two parts: an IP prefix and a list of Autonomous Systems (ASes) authorized to announce the prefix. At least one of these ASes <bcp14>SHOULD</bcp14> be authorized to announce the prefix by the prefix owner through a Route Origin Authorization (ROA). The validation of a Signed MOAS Group confirms that the authorized ASes and other listed ASes have collectively agreed to announce the prefix, ensuring that the announcement is legitimate, accurate, and mutually authorized.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a "Signed MOAS Group", a Cryptographic Message Syntax (CMS) <xref target="RFC5652"/> <xref target="RFC626"/> protected content type to carry an IP prefix and a list of Autonomous Systems (ASes) authorized to announce this prefix. The Signed MOAS Group allows multiple ASes to collaboratively and securely announce an IP prefix, supporting scenarios such as business partnerships, traffic engineering, and DDoS protection services.</t>
      <t>A Signed MOAS Group object mainly consists of two components: an IP prefix and a list of Autonomous Systems (ASes) intended to announce the prefix collaboratively, which allows other RPKI-validating routing entities to audit the collection of announcements from multiple originating AS. At least one AS in the AS list <bcp14>SHOULD</bcp14> be authorized to announce the prefix by the prefix owner through a ROA, which means the IP prefix in the ROA <bcp14>SHOULD</bcp14> match the IP prefix in the Signed MOAS Group and the AS number in the ROA <bcp14>SHOULD</bcp14> appear in the AS list. The object is collectively signed by the listed ASes using a multi-signature technique, and the aggregated global signature is attached to the Signed MOAS Group object, ensuring that the announcement could be legitimately proposed by all participating ASes and is verifiable by any RPKI-validating remote routing entities.</t>
      <t>When validating a Signed MoasGroup, a relying party (RP) aggregates the public keys of all ASes in the AS list into a single global public key. This global key is then used to verify the multi-signature of the Signed MoasGroup. There are three possible validation outcomes. First, if the Signed MoasGroup is verified and at least one corresponding ROA is found, it is considered valid. Second, if the Signed MoasGroup is verified but no corresponding ROA is found, it is deemed suspicious. Finally, if the Signed MoasGroup fails verification, it is considered invalid.</t>
      <t>The Signed MOAS Group provides a technical way for securely managing multi-origin AS announcements, offering a robust and flexible solution to handle modern routing requirements. Any prefixes announced by ASes that are not included in a ROA or a validated Signed MOAS Group <bcp14>SHOULD</bcp14> be regarded as invalid, though their handling is subject to local routing policies. The intent is to offer a secure and authenticated method for managing MOAS scenarios, enhancing the overall security and integrity of the routing system.</t>
      <t>Signed MOAS Group objects follow the Signed Object Template for the RPKI <xref target="RFC6488"/>.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="signed-moasgroup-econtenttype">
      <name>Signed MoasGroup eContentType</name>
      <t>The eContentType for a MoasGroup is defined as id-ct-rpkiSignedMoasGroup, with Object Identifier (OID) 1.2.840.113549.1.9.16.1.TBD.</t>
      <t>This OID <bcp14>MUST</bcp14> appear within both the eContentType in the encapContentInfo object and the ContentType signed attribute in the signerInfo object (see <xref target="RFC6488"/>).</t>
    </section>
    <section anchor="sec_econtent">
      <name>Signed MoasGroup eContent</name>
      <t>A MoasGroup is formally defined as follows:</t>
      <artwork><![CDATA[
RpkiSignedMoasGroup-2024
  { iso(1) member-body(2) us(840) rsadsi(113549)
   pkcs(1) pkcs9(9) smime(16) mod(0)
   id-mod-rpkiSignedMoasGroup-2024(TBD) }

   DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  CONTENT-TYPE, DigestAlgorithmIdentifier, Digest
  FROM CryptographicMessageSyntax-2009 -- in [RFC5911]
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
   pkcs-9(9) smime(16) modules(0) id-mod-cms-2004-02(41) }

  ASId, IPAddressFamily
  FROM IPAddrAndASCertExtn -- in [RFC3779]
  { iso(1) identified-organization(3) dod(6) internet(1)
   security(5) mechanisms(5) pkix(7) mod(0)
   id-mod-ip-addr-and-as-ident(30) }
                
        
  ct-rpkiSignedMoasGroup CONTENT-TYPE ::=
  { TYPE RpkiSignedMoasGroup
   IDENTIFIED BY id-ct-rpkiSignedMoasGroup }

  id-ct-rpkiSignedMoasGroup OBJECT IDENTIFIER ::=
  { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)
   pkcs-9(9) id-smime(16) id-ct(1) TBD }

  RpkiSignedMoasGroup ::= SEQUENCE {
   smgo SignedMoasGroupObject,
   digestAlgorithm DigestAlgorithmIdentifier,
   objectDigest Digest
  }

  SignedMoasGroupObject ::= SEQUENCE {
   version [0]          INTEGER DEFAULT 0,
   ipAddressPrefix      IPAddressFamily,
   asList               SEQUENCE (SIZE(0..MAX)) OF ASId,
  }

END
]]></artwork>
      <section anchor="version">
        <name>version</name>
        <t>The version number of the RpkiSignedMoasGroup <bcp14>MUST</bcp14> be 0.</t>
      </section>
      <section anchor="ipaddressprefix">
        <name>ipAddressPrefix</name>
        <t>This field contains an IPAddressFamily which contains one instance of addressFamily and one instance of prefix.</t>
      </section>
      <section anchor="aslist">
        <name>asList</name>
        <t>This field contains the AS numbers that are intended to originate routes to the given IP address prefixes. The AS numbers that are authorized by ROA <bcp14>SHOULD</bcp14> be put in front of other AS numbers. The AS numbers <bcp14>MUST NOT</bcp14> duplicate.</t>
      </section>
      <section anchor="digestalgorithm">
        <name>digestAlgorithm</name>
        <t>The digest algorithm used to create the message digest of the attested digital object.  This algorithm <bcp14>MUST</bcp14> be a hashing algorithm defined in <xref target="RFC7935"/>.</t>
      </section>
      <section anchor="messagedigest">
        <name>messageDigest</name>
        <t>The message digest of the SignedMoasGroupObject using the algorithm specified in the digestAlgorithm field.</t>
      </section>
      <section anchor="attestation">
        <name>attestation</name>
        <t>The attestation is a CMS detached signature in the SignedData format as defined in <xref target="RFC5485"/>. Each AS listed in the asList signs an individual digital signature of the message digest, and one AS aggregates all individual signatures into a global signature, referred to as the attestation.</t>
      </section>
    </section>
    <section anchor="issuance-of-signed-moasgroup">
      <name>Issuance of Signed MoasGroup</name>
      <t>It is highly <bcp14>RECOMMENDED</bcp14> that the AS initiating the Signed MOAS Group object be authorized by the prefix owner via a ROA. This AS, referred to as the authorized AS, then initiates the creation of the Signed MOAS Group object, selects a digest algorithm, and calculates the digest of the Signed MOAS Group object. The authorized AS shares this Signed MOAS Group object with other ASes listed in the object. Each listed AS (including the authorized AS) signs the digest using its private key and returns the signature to the authorized AS. Upon receiving and verifying all individual signatures, the authorized AS aggregates them into a global signature, i.e. the attestation, and attaches it to the Signed MOAS Group object. After that, the prefix owner <bcp14>MAY</bcp14> verify the Signed MOAS Group. Finally, the prefix owner or the authorized AS uploads the Signed MOAS Group to the RPKI repositories for validation and distribution.</t>
    </section>
    <section anchor="validation-of-signed-moasgroup">
      <name>Validation of Signed MoasGroup</name>
      <t>To validate a Signed MoasGroup, the relying party <bcp14>MUST</bcp14> perform all the validation checks specified in <xref target="RFC6488"/>. In addition, the RP <bcp14>MUST</bcp14> perform the following validation steps:</t>
      <ol spacing="normal" type="1"><li>
          <t>The contents of the CMS eContent field <bcp14>MUST</bcp14> conform to all of the constraints described in <xref target="sec_econtent"/>.</t>
        </li>
        <li>
          <t>The RP <bcp14>MUST</bcp14> verify the attestation of the Signed MOAS Group. This process involves two steps: first, aggregating the public keys of all ASes listed in the AS list to form a global public key; second, using this aggregated global public key to verify the attestation attached to the Signed MOAS Group object.</t>
        </li>
        <li>
          <t>The RP <bcp14>MUST</bcp14> check for the existence of a corresponding ROA for the IP prefix in the Signed MOAS Group. The IP prefix in the ROA <bcp14>MUST</bcp14> match the IP prefix in the Signed MOAS Group, and the AS number in the ROA <bcp14>MUST</bcp14> appear in the AS list.</t>
        </li>
      </ol>
      <t>A Signed MOAS Group has three possible validation results. (1) Valid: If the Signed MOAS Group is verified and at least one corresponding ROA is found, it is considered valid. (2) Suspicious: If the Signed MOAS Group is verified but no corresponding ROA is found, the Signed MOAS Group is considered suspicious. (3) Invalid: If the Signed MOAS Group cannot be verified, it is considered invalid.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>To aggregate the signatures efficiently, the Signed MOAS Group <bcp14>SHOULD</bcp14> use BLS Signatures with BLS12-381 elliptic curve <xref target="I-D.draft-ietf-cose-bls-key-representations-05"/>.</t>
      <t>ROA-authorized ASes <bcp14>SHOULD</bcp14> be placed at the beginning of the AS list to improve RP validation efficiency. It is highly <bcp14>RECOMMENDED</bcp14> that the RP only verifies the first AS and the prefix against the ROA.</t>
      <t>Multiple valid Signed MOAS Group objects may exist for the same IP prefix. However, it is highly <bcp14>RECOMMENDED</bcp14> that an AS participate in only one Signed MOAS Group for a given IP prefix. If changes to the AS list are needed, it is highly <bcp14>RECOMMENDED</bcp14> to revoke the existing Signed MOAS Group and issue a new one.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Despite it is highly <bcp14>RECOMMENDED</bcp14> that a Signed MOAS Group <bcp14>SHOULD</bcp14> be validated by at least one ROA, the data contained in a Signed MOAS Group is still self-asserted by the group of AS holders. This means that the presence of an AS in the Signed MOAS Group does not inherently imply any authority from the IP prefix holder for the AS to originate a route for any prefixes. Such authority is separately conveyed in the RPKI through a ROA.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="smi-security-for-smime-cms-content-type-1284011354919161">
        <name>SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD</td>
              <td align="left">Id-ct-rpkiSignedMoasGroup</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpki-signed-objects">
        <name>RPKI Signed Objects</name>
        <t>IANA is requested to register two OIDs in the "RPKI Signed Objects" registry <xref target="RFC6488"/> as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Name</th>
              <th align="left">OID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Signed MoasGroup</td>
              <td align="left">1.2.840.113549.1.9.16.1.TBD</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rpki-repository-name-schemes">
        <name>RPKI Repository Name Schemes</name>
        <t>IANA is requested to add the Signed MoasGroup file extension to the "RPKI Repository Name Schemes" registry <xref target="RFC6481"/> as follows:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Filename Extension</th>
              <th align="left">RPKI Object</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">.smg</td>
              <td align="left">Signed MoasGroup</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="smi-security-for-smime-module-identifier-1284011354919160">
        <name>SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)</name>
        <t>IANA is requested to allocate the following in the "SMI Security for S/MIME Module Identifier (1.2.840.113549.1.9.16.0)" registry:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">.TBD</td>
              <td align="left">id-mod-rpkiSignedMoasGroup-2024</td>
              <td align="left">draft-li-sidrops-rpki-moasgroup</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC5652">
        <front>
          <title>Cryptographic Message Syntax (CMS)</title>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <date month="September" year="2009"/>
          <abstract>
            <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="70"/>
        <seriesInfo name="RFC" value="5652"/>
        <seriesInfo name="DOI" value="10.17487/RFC5652"/>
      </reference>
      <reference anchor="RFC626">
        <front>
          <title>On a possible lockup condition in IMP subnet due to message sequencing</title>
          <author fullname="L. Kleinrock" initials="L." surname="Kleinrock"/>
          <author fullname="H. Opderbeck" initials="H." surname="Opderbeck"/>
          <date month="March" year="1974"/>
        </front>
        <seriesInfo name="RFC" value="626"/>
        <seriesInfo name="DOI" value="10.17487/RFC0626"/>
      </reference>
      <reference anchor="RFC6488">
        <front>
          <title>Signed Object Template for the Resource Public Key Infrastructure (RPKI)</title>
          <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
          <author fullname="A. Chi" initials="A." surname="Chi"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document defines a generic profile for signed objects used in the Resource Public Key Infrastructure (RPKI). These RPKI signed objects make use of Cryptographic Message Syntax (CMS) as a standard encapsulation format. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6488"/>
        <seriesInfo name="DOI" value="10.17487/RFC6488"/>
      </reference>
      <reference anchor="RFC3779">
        <front>
          <title>X.509 Extensions for IP Addresses and AS Identifiers</title>
          <author fullname="C. Lynn" initials="C." surname="Lynn"/>
          <author fullname="S. Kent" initials="S." surname="Kent"/>
          <author fullname="K. Seo" initials="K." surname="Seo"/>
          <date month="June" year="2004"/>
          <abstract>
            <t>This document defines two X.509 v3 certificate extensions. The first binds a list of IP address blocks, or prefixes, to the subject of a certificate. The second binds a list of autonomous system identifiers to the subject of a certificate. These extensions may be used to convey the authorization of the subject to use the IP addresses and autonomous system identifiers contained in the extensions. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3779"/>
        <seriesInfo name="DOI" value="10.17487/RFC3779"/>
      </reference>
      <reference anchor="RFC6811">
        <front>
          <title>BGP Prefix Origin Validation</title>
          <author fullname="P. Mohapatra" initials="P." surname="Mohapatra"/>
          <author fullname="J. Scudder" initials="J." surname="Scudder"/>
          <author fullname="D. Ward" initials="D." surname="Ward"/>
          <author fullname="R. Bush" initials="R." surname="Bush"/>
          <author fullname="R. Austein" initials="R." surname="Austein"/>
          <date month="January" year="2013"/>
          <abstract>
            <t>To help reduce well-known threats against BGP including prefix mis- announcing and monkey-in-the-middle attacks, one of the security requirements is the ability to validate the origination Autonomous System (AS) of BGP routes. More specifically, one needs to validate that the AS number claiming to originate an address prefix (as derived from the AS_PATH attribute of the BGP route) is in fact authorized by the prefix holder to do so. This document describes a simple validation mechanism to partially satisfy this requirement. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6811"/>
        <seriesInfo name="DOI" value="10.17487/RFC6811"/>
      </reference>
      <reference anchor="RFC7454">
        <front>
          <title>BGP Operations and Security</title>
          <author fullname="J. Durand" initials="J." surname="Durand"/>
          <author fullname="I. Pepelnjak" initials="I." surname="Pepelnjak"/>
          <author fullname="G. Doering" initials="G." surname="Doering"/>
          <date month="February" year="2015"/>
          <abstract>
            <t>The Border Gateway Protocol (BGP) is the protocol almost exclusively used in the Internet to exchange routing information between network domains. Due to this central nature, it is important to understand the security measures that can and should be deployed to prevent accidental or intentional routing disturbances.</t>
            <t>This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Authentication Option (TCP-AO), and control-plane filtering. It also describes measures to better control the flow of routing information, using prefix filtering and automation of prefix filters, max-prefix filtering, Autonomous System (AS) path filtering, route flap dampening, and BGP community scrubbing.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="194"/>
        <seriesInfo name="RFC" value="7454"/>
        <seriesInfo name="DOI" value="10.17487/RFC7454"/>
      </reference>
      <reference anchor="RFC6481">
        <front>
          <title>A Profile for Resource Certificate Repository Structure</title>
          <author fullname="G. Huston" initials="G." surname="Huston"/>
          <author fullname="R. Loomans" initials="R." surname="Loomans"/>
          <author fullname="G. Michaelson" initials="G." surname="Michaelson"/>
          <date month="February" year="2012"/>
          <abstract>
            <t>This document defines a profile for the structure of the Resource Public Key Infrastructure (RPKI) distributed repository. Each individual repository publication point is a directory that contains files that correspond to X.509/PKIX Resource Certificates, Certificate Revocation Lists and signed objects. This profile defines the object (file) naming scheme, the contents of repository publication points (directories), and a suggested internal structure of a local repository cache that is intended to facilitate synchronization across a distributed collection of repository publication points and to facilitate certification path construction. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6481"/>
        <seriesInfo name="DOI" value="10.17487/RFC6481"/>
      </reference>
      <reference anchor="RFC7935">
        <front>
          <title>The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure</title>
          <author fullname="G. Huston" initials="G." surname="Huston"/>
          <author fullname="G. Michaelson" initials="G." role="editor" surname="Michaelson"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>This document specifies the algorithms, algorithms' parameters, asymmetric key formats, asymmetric key size, and signature format for the Resource Public Key Infrastructure (RPKI) subscribers that generate digital signatures on certificates, Certificate Revocation Lists (CRLs), Cryptographic Message Syntax (CMS) signed objects and certification requests as well as for the relying parties (RPs) that verify these digital signatures.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7935"/>
        <seriesInfo name="DOI" value="10.17487/RFC7935"/>
      </reference>
      <reference anchor="RFC5911">
        <front>
          <title>New ASN.1 Modules for Cryptographic Message Syntax (CMS) and S/MIME</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="J. Schaad" initials="J." surname="Schaad"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1. The current ASN.1 modules conform to the 1988 version of ASN.1. This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5911"/>
        <seriesInfo name="DOI" value="10.17487/RFC5911"/>
      </reference>
      <reference anchor="RFC5485">
        <front>
          <title>Digital Signatures on Internet-Draft Documents</title>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document specifies the conventions for digital signatures on Internet-Drafts. The Cryptographic Message Syntax (CMS) is used to create a detached signature, which is stored in a separate companion file so that no existing utilities are impacted by the addition of the digital signature. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5485"/>
        <seriesInfo name="DOI" value="10.17487/RFC5485"/>
      </reference>
      <reference anchor="I-D.draft-ietf-cose-bls-key-representations-05">
        <front>
          <title>Barreto-Lynn-Scott Elliptic Curve Key Representations for JOSE and COSE</title>
          <author fullname="Tobias Looker" initials="T." surname="Looker">
            <organization>Mattr</organization>
          </author>
          <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
            <organization>Self-Issued Consulting</organization>
          </author>
          <date day="17" month="March" year="2024"/>
          <abstract>
            <t>   This specification defines how to represent cryptographic keys for
   the pairing-friendly elliptic curves known as Barreto-Lynn-Scott
   (BLS), for use with the key representation formats of JSON Web Key
   (JWK) and COSE (COSE_Key).

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tplooker/draft-ietf-cose-bls-key-representations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-cose-bls-key-representations-05"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 246?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Shenglin Jiang, Yangfei Guo, Xingang Shi, Shuhe Wang, Xiaoliang Wang, Hui Wang, and Di Ma.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
