<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brockhaus-lamps-automation-keyusages-00" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocDepth="3" tocInclude="true" sortRefs="false" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="EKU for Automation">X.509 Certificate Extended Key Usage (EKU) for Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-brockhaus-lamps-automation-keyusages-00"/>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="D." surname="Goltzsche" fullname="David Goltzsche">
      <organization>Siemens Mobility</organization>
      <address>
        <postal>
          <street>Ackerstraße 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>david.goltzsche@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <date year="2024"/>
    <area>sec</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Automation</keyword>
    <keyword>ERJU</keyword>
    <keyword>extended key usage</keyword>
    <keyword>extension</keyword>
    <keyword>PKI</keyword>
    <abstract>
      <?line 146?>

<t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines KeyPurposeIds for general-purpose and trust anchor configuration files, for software and firmware update packages, and for safety-critical communication to be included in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by Automation and the ERJU System Pillar.</t>
    </abstract>
  </front>
  <middle>
    <?line 151?>

<section anchor="Intro">
      <name>Introduction</name>
      <t>Automation hardware and software products will strategically be more safe and secure by fulfilling mandatory, generic system requirements related to cyber security driven by federal offices like the <xref target="EU-CRA">European Union Cyber Resilience Act</xref> governed by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy.
Automation products connected to the internet would bear the CE marking to indicate they comply.
Such regulation was announced in the <xref target="EU-STRATEGY">2020 EU Cybersecurity Strategy</xref>, and complements other legislation in this area, specifically the NIS2 Framework, <xref target="NIS2">Directive on measures for a high common level of cybersecurity across the Union</xref>.
2020 EU Cybersecurity Strategy suggests to implement and extend international standards such as the <xref target="IEC.62443-4-2">Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components</xref> and the <xref target="IEC.62443-3-3">Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels</xref>. Automation hardware and software products of diverse vendors that are connected on automation networks and the internet build a typical automation solution. Harmonized attributes would allow transparency of security properties and interoperability for vendors in context of secure software and firmware updates, general-purpose configuration, trust anchor configuration and secure safety communication.</t>
      <t>A concrete example for Automation is a Rail Automation system. The <xref target="ERJU">Europe's Rail Joint Undertaking System Pillar</xref> will deliver a unified operational concept and a functional, safe and secure system architecture alongside with system requirements for Rail Automation. The deliverables include due consideration of cyber-security aspects based on the IEC 62443 series of standards, focused on the European railway network to which <xref target="Directive-2016_797">Directive 2016/797 - Interoperability of the rail system within the EU</xref> applies.</t>
      <t>The ERJU System Pillar Cyber Security Working Group makes use of an internal PKI to generate X.509 PKI certificates. The certificates are used for the following purposes, among others:</t>
      <ul spacing="normal">
        <li>
          <t>Validating signatures of general-purpose software configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of trust anchor configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of software and firmware update packages.</t>
        </li>
        <li>
          <t>Authenticating communication endpoints authorized for safety-critical communication.</t>
        </li>
      </ul>
      <t><xref target="RFC5280"/> specifies several key usage extensions, defined via KeyPurposeIds, for X.509 certificates. Key usage extensions added to a certificate are meant to express intent as to the purpose of the named usage, for humans and for complying libraries. In addition, the IANA registry "SMI Security for PKIX Extended Key Purpose" <xref target="RFC7299"/> contains additional KeyPurposeIds. The use of the anyExtendedKeyUsage KeyPurposeId, as defined in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, is generally considered a poor practice. This is especially true for certificates, whether they are multi-purpose or single-purpose, within the context of EURJU System Pillar.</t>
      <t>If the purpose of the issued certificates is not restricted, i.e., the type of operations for which a public key contained in the certificate can be used are not specified, those certificates could be used for another purpose than intended, increasing the risk of cross-protocol attacks. Failure to ensure proper segregation of duties means that an application or system that generates the public/private keys and applies for a certificate to the operator certification authority could obtain a certificate that can be misused for tasks that this application or system is not entitled to perform. For example, management of trust anchor is a particularly critical task. A device could potentially accept a trust anchor configuration file signed by a service that uses a certificate with no EKU or with the is KeyPurposeId id-kp-codeSigning (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) or id-kp-documentSigning <xref target="RFC9336"/>. A device should only accept trust anchor configuration files if the file is signed with a certificate that has been explicitly issued for this purpose.</t>
      <t>The KeyPurposeId id-kp-serverAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS server, and the KeyPurposeId id-kp-clientAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS client. However, there are currently no KeyPurposeIds for usage with X.509 certificates in EURJU documents for safety-critical communication.</t>
      <t>This document addresses the above problems by defining the EKU extension of X.509 public key certificates. Certificates are either used for signing files (general-purpose configuration and trust anchor configuration files, software and firmware update packages) or are used for safety-critical communication.</t>
      <t>Vendor-defined KeyPurposeIds used within a PKI governed by the vendor or a group of vendors typically do not pose interoperability concerns, as non-critical extensions can be safely ignored if unrecognized. However, using or misusing KeyPurposeIds outside of their intended vendor-controlled environment can lead to interoperability issues. Therefore, it is advisable not to rely on vendor-defined KeyPurposeIds. Instead, the specification defines standard KeyPurposeIds to ensure interoperability across various implementations.</t>
      <t>Although the specification focuses on the the use within Automation, the standard KeyPurposeIds defined in this document can be used in other deployments.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="EKU">
      <name>Extended Key Purpose for Automation</name>
      <t>This specification defines the KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication and uses these, respectively, for: signing general-purpose or trust anchor configuration files, or signing software or firmware update packages, or authenticating communication peers for safety-critical communication. As described in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, "[i]f the [extended key usage] extension is present, then the certificate <bcp14>MUST</bcp14> only be used for one of the purposes indicated" and "[i]f multiple [key] purposes are indicated the application need not recognize all purposes indicated, as long as the intended purpose is present".</t>
      <t>Systems or applications that verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication <bcp14>SHOULD</bcp14> require that corresponding KeyPurposeIds be specified by the EKU extension. If the certificate requester knows the certificate users are mandated to use these KeyPurposeIds, it <bcp14>MUST</bcp14> enforce their inclusion. Additionally, such a certificate requester <bcp14>MUST</bcp14> ensure that the KeyUsage extension be set to digitalSignature or nonRepudiation (also designated as contentCommitment) for signature verification and/or to keyEncipherment for secret key encryption.</t>
    </section>
    <section anchor="include-EKU">
      <name>Including the Extended Key Purpose in Certificates</name>
      <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. The EKU extension syntax is repeated here for convenience:</t>
      <artwork><![CDATA[
ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId

KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
      <t>As described in <xref target="RFC5280"/>, the EKU extension may, at the option of the certificate issuer, be either critical or non-critical. The inclusion of KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication in a certificate indicates that the public key encoded in the certificate has been certified for the following usages:</t>
      <ul spacing="normal">
        <li>
          <t>id-kp-configSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-configSigning may be used for verifying signatures of general-purpose configuration files of various formats (for example XML, YAML or JSON). Configuration files are used to configure hardware or software.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-trustanchorSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-trustanchorSigning may be used for verifying signatures of trust anchor configuration files of various formats (for example XML, YAML or JSON). Trust anchor configuration files are used to add or remove trust anchors to the trust store of a device.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-updateSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-updateSigning may be used for verifying signatures of secure software or firmware update packages. Update packages are used to install software (including bootloader, firmware, safety-related applications and others) on systems.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-safetyCommunication</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-safetyCommunication may be used to authenticate a communication peer for safety-critical communication based on TLS or other protocols.</t>
        </li>
      </ul>
      <artwork><![CDATA[
id-kp  OBJECT IDENTIFIER  ::=
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) 3 }

id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }
]]></artwork>
    </section>
    <section anchor="ca-implication">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority <bcp14>MUST</bcp14> ensure that the correct values for the EKU extension as well as the KU extension are inserted in each certificate that is issued. The inclusion of the id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds does not preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document. This extended key purpose does not introduce new security risks but instead reduces existing security risks by providing the means to identify if the certificate is generated to verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party or the relying party software may additionally prohibit use of specific combinations of KeyPurposeIds. The procedure for allowing or disallowing combinations of KeyPurposeIds using Excluded KeyPurposeId and Permitted KeyPurposeId, as carried out by a relying party, is defined in <xref section="4" sectionFormat="of" target="RFC9336"/>. Examples of Excluded KeyPurposeIds include the presence of the anyExtendedKeyUsage KeyPurposeId or the complete absence of the EKU extension in a certificate. Examples of Permitted KeyPurposeIds include the presence of id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds.</t>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>In some security protocols, such as <xref target="RFC5246">TLS 1.2</xref>, certificates are exchanged in the clear. In other security protocols, such as <xref target="RFC8446">TLS 1.3</xref>, the certificates are encrypted. The inclusion of the EKU extension can help an observer determine the purpose of the certificate. In addition, if the certificate is issued by a public certification authority, the inclusion of an EKU extension can help an attacker to monitor the Certificate Transparency logs <xref target="RFC9162"/> to identify the purpose of the certificate.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is also requested to register the following ASN.1 <xref target="X.680"/>
module OID in the "SMI Security for PKIX Module Identifier" registry
(1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">id-mod-eu-rail-eku</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to register the following OIDs in the "SMI Security
for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).  These
OIDs are defined in <xref target="include-EKU"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">id-kp-configSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">id-kp-trustanchorSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">id-kp-updateSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">id-kp-safetyCommunication</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknow">
      <name>Acknowledgments</name>
      <t>We would like to thank the authors of <xref target="RFC9336"/> and <xref target="RFC9509"/> for  their excellent template.</t>
      <t>We also thank all reviewers of this document for their valuable feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC.X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC.X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9336">
          <front>
            <title>X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing</title>
            <author fullname="T. Ito" initials="T." surname="Ito"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines a general-purpose Document-Signing KeyPurposeId for inclusion in the Extended Key Usage (EKU) extension of X.509 public key certificates. Document-Signing applications may require that the EKU extension be present and that a Document-Signing KeyPurposeId be indicated in order for the certificate to be acceptable to that Document-Signing application.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9336"/>
          <seriesInfo name="DOI" value="10.17487/RFC9336"/>
        </reference>
        <reference anchor="RFC9509">
          <front>
            <title>X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Ekman" initials="J." surname="Ekman"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines encrypting JSON objects in HTTP messages, using JSON Web Tokens (JWTs), and signing the OAuth 2.0 access tokens KeyPurposeIds for inclusion in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by Network Functions (NFs) for the 5G System.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9509"/>
          <seriesInfo name="DOI" value="10.17487/RFC9509"/>
        </reference>
        <reference anchor="Directive-2016_797" target="https://eur-lex.europa.eu/eli/dir/2016/797/2020-05-28">
          <front>
            <title>Directive 2016/797 - Interoperability of the rail system within the EU</title>
            <author>
              <organization>European Parliament, Council of the European Union</organization>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="ERJU" target="https://rail-research.europa.eu/wp-content/uploads/2023/10/ERJU_SP_CyberSecurity_Review3_Files.zip">
          <front>
            <title>SP-Cybersecurity-SharedCybersecurityServices - Review 3 Final Draft Specs (V0.90)</title>
            <author>
              <organization>Europe's Rail Joint Undertaking</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-CRA" target="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act">
          <front>
            <title>Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUCIL on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-STRATEGY" target="https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0">
          <front>
            <title>The EU's Cybersecurity Strategy for the Digital Decade</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="NIS2" target="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive">
          <front>
            <title>Directive (EU) 2022/2555 of the European Parliament and of the Council</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="IEC.62443-4-2" target="https://webstore.iec.ch/publication/34421">
          <front>
            <title>Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
          <seriesInfo name="IEC 62443-4-2:2019" value=""/>
        </reference>
        <reference anchor="IEC.62443-3-3" target="https://webstore.iec.ch/publication/7033">
          <front>
            <title>Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2013" month="August"/>
          </front>
          <seriesInfo name="IEC 62443-3-3:2013" value=""/>
        </reference>
      </references>
    </references>
    <?line 300?>

<section anchor="asn1">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and
<xref target="X.690"/>.</t>
      <sourcecode type="asn1"><![CDATA[
<CODE BEGINS>

EU-Rail-EKU
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-eu-rail-eku (TBD1) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- OID Arc

id-kp OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

-- Extended Key Usage Values

id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }

END


<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="history">
      <name>History of Changes</name>
      <t>[RFC Editor: Please remove this appendix in the release version of the document.]</t>
      <t>draft-brockhaus-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Broadened the scope to general automation use case and use ERJU as an example.</t>
        </li>
        <li>
          <t>Fixed some nits reported.</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-eu-rail-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Initial version of the document following best practices from RFC 9336 and RFC 9509</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Fazekas-Zisch" fullname="Szofia Fazekas-Zisch">
        <organization abbrev="Siemens">Siemens AG Digital Industries Factory Automation</organization>
        <address>
          <postal>
            <street>Breslauer Str. 5</street>
            <city>Fuerth</city>
            <code>90766</code>
            <country>Germany</country>
          </postal>
          <email>szofia.fazekas-zisch@siemens.com</email>
          <uri>https://www.siemens.com</uri>
        </address>
      </contact>
      <contact initials="B." surname="Fouques" fullname="Baptiste Fouques">
        <organization>Alstom</organization>
        <address>
          <email>baptiste.fouques@alstomgroup.com</email>
        </address>
      </contact>
      <contact initials="D. G." surname="Orta" fullname="Daniel Gutierrez Orta">
        <organization>CAF Signalling</organization>
        <address>
          <email>daniel.gutierrez@cafsignalling.com</email>
        </address>
      </contact>
      <contact initials="M." surname="Weller" fullname="Martin Weller">
        <organization>Hitachi Rail</organization>
        <address>
          <email>martin.weller@urbanandmainlines.com</email>
        </address>
      </contact>
      <contact initials="N." surname="Poyet" fullname="Nicolas Poyet">
        <organization>SNCF</organization>
        <address>
          <email>nicolas.poyet@sncf.fr</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
