<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-brockhaus-lamps-automation-keyusages-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" tocDepth="3" tocInclude="true" sortRefs="false" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="EKU for Automation">X.509 Certificate Extended Key Usage (EKU) for Automation</title>
    <seriesInfo name="Internet-Draft" value="draft-brockhaus-lamps-automation-keyusages-01"/>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens</organization>
      <address>
        <postal>
          <street>Werner-von-Siemens-Strasse 1</street>
          <city>Munich</city>
          <code>80333</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com</uri>
      </address>
    </author>
    <author initials="D." surname="Goltzsche" fullname="David Goltzsche">
      <organization>Siemens Mobility</organization>
      <address>
        <postal>
          <street>Ackerstrasse 22</street>
          <city>Braunschweig</city>
          <code>38126</code>
          <country>Germany</country>
        </postal>
        <email>david.goltzsche@siemens.com</email>
        <uri>https://www.mobility.siemens.com</uri>
      </address>
    </author>
    <date year="2024"/>
    <area>sec</area>
    <workgroup>LAMPS Working Group</workgroup>
    <keyword>Industrial Automation</keyword>
    <keyword>ERJU</keyword>
    <keyword>extended key usage</keyword>
    <keyword>extension</keyword>
    <keyword>PKI</keyword>
    <abstract>
      <?line 146?>

<t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines KeyPurposeIds for general-purpose and trust anchor configuration files, for software and firmware update packages, and for safety-critical communication to be included in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by industrial automation and the ERJU System Pillar.</t>
    </abstract>
  </front>
  <middle>
    <?line 151?>

<section anchor="Intro">
      <name>Introduction</name>
      <t>Automation hardware and software products will strategically be more safe and secure by fulfilling mandatory, generic system requirements related to cyber security driven by federal offices like the <xref target="EU-CRA">European Union Cyber Resilience Act</xref> governed by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy.
Automation products connected to the internet would bear the CE marking to indicate they comply.
Such regulation was announced in the <xref target="EU-STRATEGY">2020 EU Cybersecurity Strategy</xref>, and complements other legislation in this area, specifically the NIS2 Framework, <xref target="NIS2">Directive on measures for a high common level of cybersecurity across the Union</xref>.
2020 EU Cybersecurity Strategy suggests to implement and extend international standards such as the <xref target="IEC.62443-4-2">Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</xref> and the <xref target="IEC.62443-3-3">Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</xref>. Automation hardware and software products of diverse vendors that are connected on automation networks and the internet build a typical automation solution. Harmonized attributes would allow transparency of security properties and interoperability for vendors in context of secure software and firmware updates, general-purpose configuration, trust anchor configuration and secure safety communication.</t>
      <t>A concrete example for Automation is a Rail Automation system. The <xref target="ERJU">Europe's Rail Joint Undertaking System Pillar</xref> will deliver a unified operational concept and a functional, safe and secure system architecture alongside with system requirements for Rail Automation. The deliverables include due consideration of cyber-security aspects based on the IEC 62443 series of standards, focused on the European railway network to which <xref target="Directive-2016_797">Directive 2016/797 - Interoperability of the rail system within the EU</xref> applies.</t>
      <t>The ERJU System Pillar Cyber Security Working Group makes use of an internal PKI to generate X.509 PKI certificates. The certificates are used for the following purposes, among others:</t>
      <ul spacing="normal">
        <li>
          <t>Validating signatures of general-purpose software configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of trust anchor configuration files.</t>
        </li>
        <li>
          <t>Validating signatures of software and firmware update packages.</t>
        </li>
        <li>
          <t>Authenticating communication endpoints authorized for safety-critical communication.</t>
        </li>
      </ul>
      <t><xref target="RFC5280"/> specifies several key usage extensions, defined via KeyPurposeIds, for X.509 certificates. Key usage extensions added to a certificate are meant to express intent as to the purpose of the named usage, for humans and for complying libraries. In addition, the IANA registry "SMI Security for PKIX Extended Key Purpose" <xref target="RFC7299"/> contains additional KeyPurposeIds. The use of the anyExtendedKeyUsage KeyPurposeId, as defined in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, is generally considered a poor practice. This is especially true for certificates, whether they are multi-purpose or single-purpose, within the context of EURJU System Pillar.</t>
      <t>If the purpose of the issued certificates is not restricted, i.e., the type of operations for which a public key contained in the certificate can be used are not specified, those certificates could be used for another purpose than intended, increasing the risk of cross-protocol attacks. Failure to ensure proper segregation of duties means that an application or system that generates the public/private keys and applies for a certificate to the operator certification authority could obtain a certificate that can be misused for tasks that this application or system is not entitled to perform. For example, management of trust anchor is a particularly critical task. A device could potentially accept a trust anchor configuration file signed by a service that uses a certificate with no EKU or with the is KeyPurposeId id-kp-codeSigning (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) or id-kp-documentSigning <xref target="RFC9336"/>. A device should only accept trust anchor configuration files if the file is signed with a certificate that has been explicitly issued for this purpose.</t>
      <t>The KeyPurposeId id-kp-serverAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS server, and the KeyPurposeId id-kp-clientAuth (<xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>) can be used to identify that the certificate is for a TLS client. However, there are currently no KeyPurposeIds for usage with X.509 certificates in EURJU documents for safety-critical communication.</t>
      <t>This document addresses the above problems by defining the EKU extension of X.509 public key certificates. Certificates are either used for signing files (general-purpose configuration and trust anchor configuration files, software and firmware update packages) or are used for safety-critical communication.</t>
      <t>Vendor-defined KeyPurposeIds used within a PKI governed by the vendor or a group of vendors typically do not pose interoperability concerns, as non-critical extensions can be safely ignored if unrecognized. However, using or misusing KeyPurposeIds outside of their intended vendor-controlled environment can lead to interoperability issues. Therefore, it is advisable not to rely on vendor-defined KeyPurposeIds. Instead, the specification defines standard KeyPurposeIds to ensure interoperability across various implementations.</t>
      <t>Although the specification focuses on use in industrial automation, the definitions are intentionally broad to allow the use of the KeyPurposeIds defined in this document in other deployments as well. Whether and how any of the KeyPurpose OIDs defined in this document must be described in more detail in the technical standards and certificate policies relevant to the application domain.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="EKU">
      <name>Extended Key Purpose for Automation</name>
      <t>This specification defines the KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication and uses these, respectively, for: signing general-purpose or trust anchor configuration files, or signing software or firmware update packages, or authenticating communication peers for safety-critical communication. As described in <xref section="4.2.1.12" sectionFormat="of" target="RFC5280"/>, "[i]f the [extended key usage] extension is present, then the certificate <bcp14>MUST</bcp14> only be used for one of the purposes indicated" and "[i]f multiple [key] purposes are indicated the application need not recognize all purposes indicated, as long as the intended purpose is present".</t>
      <t>Systems or applications that verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication <bcp14>SHOULD</bcp14> require that corresponding KeyPurposeIds be specified by the EKU extension. If the certificate requester knows the certificate users are mandated to use these KeyPurposeIds, it <bcp14>MUST</bcp14> enforce their inclusion. Additionally, such a certificate requester <bcp14>MUST</bcp14> ensure that the KeyUsage extension be set to digitalSignature or nonRepudiation (also designated as contentCommitment) for signature verification and/or to keyEncipherment for secret key encryption.</t>
    </section>
    <section anchor="include-EKU">
      <name>Including the Extended Key Purpose in Certificates</name>
      <t><xref target="RFC5280"/> specifies the EKU X.509 certificate extension for use on end entity certificates. The extension indicates one or more purposes for which the certified public key is valid. The EKU extension can be used in conjunction with the Key Usage (KU) extension, which indicates the set of basic cryptographic operations for which the certified key may be used. The EKU extension syntax is repeated here for convenience:</t>
      <artwork><![CDATA[
ExtKeyUsageSyntax  ::=  SEQUENCE SIZE (1..MAX) OF KeyPurposeId

KeyPurposeId  ::=  OBJECT IDENTIFIER
]]></artwork>
      <t>As described in <xref target="RFC5280"/>, the EKU extension may, at the option of the certificate issuer, be either critical or non-critical. The inclusion of KeyPurposeIds id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication in a certificate indicates that the public key encoded in the certificate has been certified for the following usages:</t>
      <ul spacing="normal">
        <li>
          <t>id-kp-configSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-configSigning may be used for verifying signatures of general-purpose configuration files of various formats (for example XML, YAML or JSON). Configuration files are used to configure hardware or software.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-trustanchorSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-trustanchorSigning may be used for verifying signatures of trust anchor configuration files of various formats (for example XML, YAML or JSON).
Trust anchor configuration files are used to add or remove trust anchors to the trust store of a device.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-updateSigning</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-updateSigning may be used for verifying signatures of secure software or firmware update packages. Update packages are used to install software (including bootloader, firmware, safety-related applications and others) on systems.</t>
        </li>
      </ul>
      <ul spacing="normal">
        <li>
          <t>id-kp-safetyCommunication</t>
        </li>
      </ul>
      <ul empty="true">
        <li>
          <t>A public key contained in a certificate containing the KeyPurposeId id-kp-safetyCommunication may be used to authenticate a communication peer for safety-critical communication based on TLS or other protocols.</t>
        </li>
      </ul>
      <artwork><![CDATA[
id-kp  OBJECT IDENTIFIER  ::=
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) 3 }

id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }
]]></artwork>
    </section>
    <section anchor="ca-implication">
      <name>Implications for a Certification Authority</name>
      <t>The procedures and practices employed by a certification authority <bcp14>MUST</bcp14> ensure that the correct values for the EKU extension as well as the KU extension are inserted in each certificate that is issued. The inclusion of the id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds does not preclude the inclusion of other KeyPurposeIds.</t>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <t>The Security Considerations of <xref target="RFC5280"/> are applicable to this document. This extended key purpose does not introduce new security risks but instead reduces existing security risks by providing the means to identify if the certificate is generated to verify the signature of a general-purpose or trust anchor configuration file, the signature of a software or firmware update package, or the authentication of a communication peer for safety-critical communication.</t>
      <t>To reduce the risk of specific cross-protocol attacks, the relying party or the relying party software may additionally prohibit use of specific combinations of KeyPurposeIds. The procedure for allowing or disallowing combinations of KeyPurposeIds using Excluded KeyPurposeId and Permitted KeyPurposeId, as carried out by a relying party, is defined in <xref section="4" sectionFormat="of" target="RFC9336"/>. Examples of Excluded KeyPurposeIds include the presence of the anyExtendedKeyUsage KeyPurposeId or the complete absence of the EKU extension in a certificate. Examples of Permitted KeyPurposeIds include the presence of id-kp-configSigning, id-kp-trustanchorSigning, id-kp-updateSigning, and id-kp-safetyCommunication KeyPurposeIds.</t>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>In some security protocols, such as <xref target="RFC5246">TLS 1.2</xref>, certificates are exchanged in the clear. In other security protocols, such as <xref target="RFC8446">TLS 1.3</xref>, the certificates are encrypted. The inclusion of the EKU extension can help an observer determine the purpose of the certificate. In addition, if the certificate is issued by a public certification authority, the inclusion of an EKU extension can help an attacker to monitor the Certificate Transparency logs <xref target="RFC9162"/> to identify the purpose of the certificate.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA is also requested to register the following ASN.1 <xref target="X.680"/>
module OID in the "SMI Security for PKIX Module Identifier" registry
(1.3.6.1.5.5.7.0). This OID is defined in <xref target="asn1"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left">id-mod-automation-eku</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to register the following OIDs in the "SMI Security
for PKIX Extended Key Purpose" registry (1.3.6.1.5.5.7.3).  These
OIDs are defined in <xref target="include-EKU"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD2</td>
            <td align="left">id-kp-configSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD3</td>
            <td align="left">id-kp-trustanchorSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD4</td>
            <td align="left">id-kp-updateSigning</td>
            <td align="left">This-RFC</td>
          </tr>
          <tr>
            <td align="left">TBD5</td>
            <td align="left">id-kp-safetyCommunication</td>
            <td align="left">This-RFC</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="acknow">
      <name>Acknowledgments</name>
      <t>We would like to thank the authors of <xref target="RFC9336"/> and <xref target="RFC9509"/> for  their excellent template.</t>
      <t>We also thank all reviewers of this document for their valuable feedback.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="X.680" target="https://www.itu.int/rec/T-REC.X.680">
          <front>
            <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.680" value=""/>
        </reference>
        <reference anchor="X.690" target="https://www.itu.int/rec/T-REC.X.690">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690" value=""/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9162">
          <front>
            <title>Certificate Transparency Version 2.0</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="E. Messeri" initials="E." surname="Messeri"/>
            <author fullname="R. Stradling" initials="R." surname="Stradling"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9162"/>
          <seriesInfo name="DOI" value="10.17487/RFC9162"/>
        </reference>
        <reference anchor="RFC9336">
          <front>
            <title>X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing</title>
            <author fullname="T. Ito" initials="T." surname="Ito"/>
            <author fullname="T. Okubo" initials="T." surname="Okubo"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="December" year="2022"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines a general-purpose Document-Signing KeyPurposeId for inclusion in the Extended Key Usage (EKU) extension of X.509 public key certificates. Document-Signing applications may require that the EKU extension be present and that a Document-Signing KeyPurposeId be indicated in order for the certificate to be acceptable to that Document-Signing application.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9336"/>
          <seriesInfo name="DOI" value="10.17487/RFC9336"/>
        </reference>
        <reference anchor="RFC9509">
          <front>
            <title>X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions</title>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Ekman" initials="J." surname="Ekman"/>
            <author fullname="D. Migault" initials="D." surname="Migault"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>RFC 5280 specifies several extended key purpose identifiers (KeyPurposeIds) for X.509 certificates. This document defines encrypting JSON objects in HTTP messages, using JSON Web Tokens (JWTs), and signing the OAuth 2.0 access tokens KeyPurposeIds for inclusion in the Extended Key Usage (EKU) extension of X.509 v3 public key certificates used by Network Functions (NFs) for the 5G System.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9509"/>
          <seriesInfo name="DOI" value="10.17487/RFC9509"/>
        </reference>
        <reference anchor="Directive-2016_797" target="https://eur-lex.europa.eu/eli/dir/2016/797/2020-05-28">
          <front>
            <title>Directive 2016/797 - Interoperability of the rail system within the EU</title>
            <author>
              <organization>European Parliament, Council of the European Union</organization>
            </author>
            <date year="2020" month="May"/>
          </front>
        </reference>
        <reference anchor="ERJU" target="https://rail-research.europa.eu/wp-content/uploads/2023/10/ERJU_SP_CyberSecurity_Review3_Files.zip">
          <front>
            <title>SP-Cybersecurity-SharedCybersecurityServices - Review 3 Final Draft Specs (V0.90)</title>
            <author>
              <organization>Europe's Rail Joint Undertaking</organization>
            </author>
            <date year="2024" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-CRA" target="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act">
          <front>
            <title>Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUCIL on horizontal cybersecurity requirements for products with digital elements and amending Regulation (EU) 2019/1020</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2022" month="September"/>
          </front>
        </reference>
        <reference anchor="EU-STRATEGY" target="https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0">
          <front>
            <title>The EU's Cybersecurity Strategy for the Digital Decade</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2020" month="December"/>
          </front>
        </reference>
        <reference anchor="NIS2" target="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive">
          <front>
            <title>Directive (EU) 2022/2555 of the European Parliament and of the Council</title>
            <author>
              <organization>European Commission</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="IEC.62443-4-2" target="https://webstore.iec.ch/publication/34421">
          <front>
            <title>Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
          <seriesInfo name="IEC 62443-4-2:2019" value=""/>
        </reference>
        <reference anchor="IEC.62443-3-3" target="https://webstore.iec.ch/publication/7033">
          <front>
            <title>Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels</title>
            <author>
              <organization>IEC</organization>
            </author>
            <date year="2013" month="August"/>
          </front>
          <seriesInfo name="IEC 62443-3-3:2013" value=""/>
        </reference>
      </references>
    </references>
    <?line 303?>

<section anchor="asn1">
      <name>ASN.1 Module</name>
      <t>The following module adheres to ASN.1 specifications <xref target="X.680"/> and
<xref target="X.690"/>.</t>
      <sourcecode type="asn1"><![CDATA[
<CODE BEGINS>

Automation-EKU
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-eu-automation-eku (TBD1) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

-- OID Arc

id-kp OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) kp(3) }

-- Extended Key Usage Values

id-kp-configSigning        OBJECT IDENTIFIER ::= { id-kp TBD2 }
id-kp-trustanchorSigning   OBJECT IDENTIFIER ::= { id-kp TBD3 }
id-kp-updateSigning        OBJECT IDENTIFIER ::= { id-kp TBD4 }
id-kp-safetyCommunication  OBJECT IDENTIFIER ::= { id-kp TBD5 }

END


<CODE ENDS>
]]></sourcecode>
    </section>
    <section anchor="history">
      <name>History of Changes</name>
      <t>[RFC Editor: Please remove this appendix in the release version of the document.]</t>
      <t>Changes from 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Updated last paragraph of Section 1 addressing WG adoption comments by Rich and Russ</t>
        </li>
        <li>
          <t>Updated name and OID of ASN.1 module</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-automation-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Broadened the scope to general automation use case and use ERJU as an example.</t>
        </li>
        <li>
          <t>Fixed some nits reported.</t>
        </li>
      </ul>
      <t>draft-brockhaus-lamps-eu-rail-keyusages version 00:</t>
      <ul spacing="normal">
        <li>
          <t>Initial version of the document following best practices from RFC 9336 and RFC 9509</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="S." surname="Fazekas-Zisch" fullname="Szofia Fazekas-Zisch">
        <organization abbrev="Siemens">Siemens AG Digital Industries Factory Automation</organization>
        <address>
          <postal>
            <street>Breslauer Str. 5</street>
            <city>Fuerth</city>
            <code>90766</code>
            <country>Germany</country>
          </postal>
          <email>szofia.fazekas-zisch@siemens.com</email>
          <uri>https://www.siemens.com</uri>
        </address>
      </contact>
      <contact initials="B." surname="Fouques" fullname="Baptiste Fouques">
        <organization>Alstom</organization>
        <address>
          <email>baptiste.fouques@alstomgroup.com</email>
        </address>
      </contact>
      <contact initials="D. G." surname="Orta" fullname="Daniel Gutierrez Orta">
        <organization>CAF Signalling</organization>
        <address>
          <email>daniel.gutierrez@cafsignalling.com</email>
        </address>
      </contact>
      <contact initials="M." surname="Weller" fullname="Martin Weller">
        <organization>Hitachi Rail</organization>
        <address>
          <email>martin.weller@urbanandmainlines.com</email>
        </address>
      </contact>
      <contact initials="N." surname="Poyet" fullname="Nicolas Poyet">
        <organization>SNCF</organization>
        <address>
          <email>nicolas.poyet@sncf.fr</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
