<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-petta-rfc4130bis-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title>AS2 Specification Modernization</title>
    <seriesInfo name="Internet-Draft" value="draft-petta-rfc4130bis-01"/>
    <author fullname="Debra Petta">
      <organization>Drummond Group, LLC</organization>
      <address>
        <email>IETF-Activity@drummondgroup.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="15"/>
    <keyword>AS2</keyword>
    <keyword>EDIINT</keyword>
    <keyword>B2B</keyword>
    <abstract>
      <?line 51?>

<t>This document provides an applicability statement (RFC 2026, Section
3.2) that describes how to exchange structured business data securely
using the HTTP transfer protocol, instead of SMTP; the applicability
statement for SMTP is found in RFC 3335.  Structured business data
may be XML; Electronic Data Interchange (EDI) in either the American
National Standards Committee (ANSI) X12 format or the UN Electronic
Data Interchange for Administration, Commerce, and Transport
(UN/EDIFACT) format; or other structured data formats.  The data is
packaged using standard MIME structures.  Authentication and data
confidentiality are obtained by using Cryptographic Message Syntax
with S/MIME security body parts.  Authenticated acknowledgements make
use of multipart/signed Message Disposition Notification (MDN)
responses to the original HTTP message.  This applicability statement
is informally referred to as "AS2" because it is the second
applicability statement, produced after "AS1", RFC 3335.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://DrummondGroup.github.io/draft-petta-rfc4130bis/draft-petta-rfc4130bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-petta-rfc4130bis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/DrummondGroup/draft-petta-rfc4130bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This draft is a copy of the original RFC4130 draft with only the changes
necessary to render it in markdown. Future versions of this draft will
propose changes, hopefully with the consensus of the IETF community.</t>
      <t>NOTE: This version contains IDENTICAL content of the original (expired)
bis document. The only difference are edits to trigger updates so that
the expiration date could be modified.</t>
      <section anchor="applicable-rfcs">
        <name>Applicable RFCs</name>
        <t>Previous work on Internet EDI focused on specifying MIME content
   types for EDI data <xref target="RFC1767"/> and extending this work to support secure
   EC/EDI transport over SMTP <xref target="RFC3335"/>.  This document expands on RFC 1767 to
   specify a comprehensive set of data security features, specifically
   data confidentiality, data integrity/authenticity, non-repudiation of
   origin, and non-repudiation of receipt over HTTP.  This document also
   recognizes contemporary RFCs and is attempting to "re-invent" as
   little as possible.  Although this document focuses on EDI data, any
   other data types describable in a MIME format are also supported.</t>
        <t>Internet MIME-based EDI can be accomplished by using and complying
   with the following RFCs:</t>
        <artwork><![CDATA[
 o  RFC 2616 Hyper Text Transfer Protocol
 o  RFC 1767 EDI Content Type
 o  RFC 3023 XML Media Types
 o  RFC 1847 Security Multiparts for MIME
 o  RFC 3462 Multipart/Report
 o  RFC 2045 to 2049 MIME RFCs
 o  RFC 3798 Message Disposition Notification
 o  RFC 3851, 3852 S/MIME v3.1 Specification
]]></artwork>
        <t>Our intent here is to define clearly and precisely how these are used
   together, and what is required by user agents to be compliant with
   this document.</t>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 <xref target="RFC3852"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terms</name>
        <t>AS2:     Applicability Statement 2 (this document); see RFC 2026
            <xref target="RFC2026"/>, Section 3.2</t>
        <t>EDI:     Electronic Data Interchange</t>
        <t>EC:      Business-to-Business Electronic Commerce</t>
        <t>B2B:     Business to Business</t>
        <t>Receipt: The functional message that is sent from a receiver to a
            sender to acknowledge receipt of an EDI/EC interchange.
            This message may be either synchronous or asynchronous in
            nature.</t>
        <t>Signed Receipt: A receipt with a digital signature.</t>
        <t>Synchronous Receipt: A receipt returned to the sender during the same
            HTTP session as the sender's original message.</t>
        <t>Asynchronous Receipt: A receipt returned to the sender on a different
            communication session than the sender's original message
            session.</t>
        <t>Message Disposition Notification (MDN): The Internet messaging format
            used to convey a receipt.  This term is used interchangeably
            with receipt.  A MDN is a receipt.</t>
        <t>Non-repudiation of receipt (NRR): A "legal event" that occurs when
            the original sender of an signed EDI/EC interchange has
            verified the signed receipt coming back from the receiver.
            The receipt contains data identifying the original message
            for which it is a receipt, including the message-ID and a
            cryptographic hash (MIC).  The original sender must retain
            suitable records providing evidence concerning the message
            content, its message-ID, and its hash value.  The original
            sender verifies that the retained hash value is the same as
            the digest of the original message, as reported in the
            signed receipt.  NRR is not considered a technical message,
            but instead is thought of as an outcome of possessing
            relevant evidence.</t>
        <t>S/MIME:  A format and protocol for adding cryptographic signature
            and/or encryption services to Internet MIME messages.</t>
        <t>Cryptographic Message Syntax (CMS): An encapsulation syntax used to
            digitally sign, digest, authenticate, or encrypt arbitrary
            messages.</t>
        <t>SHA-1:   A secure, one-way hash algorithm used in conjunction with
            digital signature.  This is the recommended algorithm for
            AS2.</t>
        <t>MD5:     A secure, one-way hash algorithm used in conjunction with
            digital signature.  This algorithm is allowed in AS2.</t>
        <t>MIC:     The message integrity check (MIC), also called the message
            digest, is the digest output of the hash algorithm used by
            the digital signature.  The digital signature is computed
            over the MIC.</t>
        <t>User Agent (UA): The application that handles and processes the AS2
           request.</t>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <section anchor="overall-operation">
        <name>Overall Operation</name>
        <t>A HTTP POST operation <xref target="RFC2616"/> is used to send appropriately packaged EDI,
   XML, or other business data.  The Request-URI (<xref target="RFC2616"/>, Section 9.5)
   identifies a process for unpacking and handling the message data and
   for generating a reply for the client that contains a message
   disposition acknowledgement (MDN), either signed or unsigned.  The
   MDN is either returned in the HTTP response message body or by a new
   HTTP POST operation to a URL for the original sender.</t>
        <t>This request/reply transactional interchange can provide secure,
   reliable, and authenticated transport for EDI or other business data
   using HTTP as a transfer protocol.</t>
        <t>The security protocols and structures used also support auditable
   records of these document data transmissions, acknowledgements, and
   authentication.</t>
      </section>
      <section anchor="purpose-of-a-security-guideline-for-mime-edi">
        <name>Purpose of a Security Guideline for MIME EDI</name>
        <t>The purpose of these specifications is to ensure interoperability
   between B2B EC user agents, invoking some or all of the commonly
   expected security features.  This document is also NOT limited to
   strict EDI use; it applies to any electronic commerce application for
   which business data needs to be exchanged over the Internet in a
   secure manner.</t>
      </section>
      <section anchor="definitions">
        <name>Definitions</name>
        <section anchor="the-secure-transmission-loop">
          <name>The Secure Transmission Loop</name>
          <t>This document's focus is on the formats and protocols for exchanging
   EDI/EC content securely in the Internet's HTTP environment.</t>
          <t>In the "secure transmission loop" for EDI/EC, one organization sends
   a signed and encrypted EDI/EC interchange to another organization and
   requests a signed receipt, and later the receiving organization sends
   this signed receipt back to the sending organization.  In other
   words, the following transpires:</t>
          <artwork><![CDATA[
  o  The organization sending EDI/EC data signs and encrypts the
     data using S/MIME.  In addition, the message will request that
     a signed receipt be returned to the sender.  To support NRR,
     the original sender retains records of the message, message-ID,
     and digest (MIC) value.

  o  The receiving organization decrypts the message and verifies
     the signature, resulting in verified integrity of the data and
     authenticity of the sender.

  o  The receiving organization then returns a signed receipt using
     the HTTP reply body or a separate HTTP POST operation to the
     sending organization in the form of a signed message
     disposition notification.  This signed receipt will contain the
     hash of the received message, allowing the original sender to
     have evidence that the received message was authenticated
     and/or decrypted properly by the receiver.
]]></artwork>
          <t>The above describes functionality that, if implemented, will satisfy
   all security requirements and implement non-repudiation of receipt
   for the exchange.  This specification, however, leaves full
   flexibility for users to decide the degree to which they want to
   deploy those security features with their trading partners.</t>
        </section>
        <section anchor="definition-of-receipts">
          <name>Definition of Receipts</name>
          <t>The term used for both the functional activity and the message for
   acknowledging delivery of an EDI/EC interchange is "receipt" or
   "signed receipt".  The first term is used if the acknowledgment is
   for an interchange resulting in a receipt that is NOT signed.  The
   second term is used if the acknowledgement is for an interchange
   resulting in a receipt that IS signed.</t>
          <t>The term non-repudiation of receipt (NRR) is often used in
   combination with receipts.  NRR refers to a legal event that occurs
   only when the original sender of an interchange has verified the
   signed receipt coming back from recipient of the message, and has
   verified that the returned MIC value inside the MDN matches the
   previously recorded value for the original message.</t>
          <t>NRR is best established when both the original message and the
   receipt make use of digital signatures.  See the Security
   Considerations section for some cautions regarding NRR.
   For information on how to format and process receipts in AS2, refer
   to Section 7.</t>
        </section>
      </section>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <section anchor="ediec-process-assumptions">
          <name>EDI/EC Process Assumptions</name>
          <t>o  Encrypted object is an EDI/EC Interchange.</t>
          <t>This specification assumes that a typical EDI/EC interchange is the
   lowest-level object that will be subject to security services.</t>
          <t>Specifically, in EDI ANSI X12, this means that anything between and
   including, segments ISA and IEA is secured.  In EDIFACT, this means
   that anything between, and including, segments UNA/UNB and UNZ is
   secured.  In other words, the EDI/EC interchanges including envelope
   segments remain intact and unreadable during fully secured transport.</t>
          <t>o  EDI envelope headers are encrypted.</t>
          <t>Congruent with the above statement, EDI envelope headers are NOT
   visible in the MIME package.</t>
          <t>In order to optimize routing from existing commercial EDI networks
   (called Value Added Networks or VANs) to the Internet, it would be
   useful to make some envelope information visible.  This
   specification, however, provides no support for this optimization.</t>
          <t>o  X12.58 and UN/EDIFACT Security Considerations</t>
          <t>The most common EDI standards bodies, ANSI X12 and EDIFACT, have
   defined internal provisions for security.  X12.58 is the security
   mechanism for ANSI X12, and AUTACK provides security for EDIFACT.
   This specification does NOT dictate use or non-use of these security
   standards.  They are both fully compatible, though possibly
   redundant, with this specification.</t>
        </section>
        <section anchor="flexibility-assumptions">
          <name>Flexibility Assumptions</name>
          <t>o  Encrypted or Unencrypted Data</t>
          <t>This specification allows for EDI/EC message exchange in which the
   EDI/EC data can be either unprotected or protected by means of
   encryption.</t>
          <t>o  Signed or Unsigned Data</t>
          <t>This specification allows for EDI/EC message exchange with or without
   digital signature of the original EDI transmission.</t>
          <t>o  Optional Use of Receipt</t>
          <t>This specification allows for EDI/EC message transmission with or
   without a request for receipt notification.  A signed receipt
   notification is requested; however, a MIC value is REQUIRED as part
   of the returned receipt, except when a severe error condition
   prevents computation of the digest value.  In the exceptional case, a
   signed receipt should be returned with an error message that
   effectively explains why the MIC is absent.</t>
          <t>o  Use of Synchronous or Asynchronous Receipts</t>
          <t>In addition to a receipt request, this specification allows the
   specification of the type of receipt that should be returned.  It
   supports synchronous or asynchronous receipts in the MDN format
   specified in Section 7 of this document.</t>
          <t>o  Security Formatting</t>
          <t>This specification relies on the guidelines set forth in RFC
   3851/3852  <xref target="RFC3851"/> / <xref target="RFC3852"/> "S/MIME Version 3.1 Message Specification;
   Cryptographic Message Syntax".</t>
          <t>o  Hash Function, Message Digest Choices</t>
          <t>When a signature is used, it is RECOMMENDED that the SHA-1 hash
   algorithm be used for all outgoing messages, and that both MD5 and
   SHA-1 be supported for incoming messages.</t>
          <t>o  Permutation Summary</t>
          <t>In summary, the following twelve security permutations are possible
   in any given trading relationship:</t>
          <ol spacing="normal" type="1"><li>
              <t>Sender sends un-encrypted data and does NOT request a receipt.</t>
            </li>
            <li>
              <t>Sender sends un-encrypted data and requests an unsigned receipt.
Receiver sends back the unsigned receipt.</t>
            </li>
            <li>
              <t>Sender sends un-encrypted data and requests a signed receipt.
Receiver sends back the signed receipt.</t>
            </li>
            <li>
              <t>Sender sends encrypted data and does NOT request a receipt.</t>
            </li>
            <li>
              <t>Sender sends encrypted data and requests an unsigned receipt.
Receiver sends back the unsigned receipt.</t>
            </li>
            <li>
              <t>Sender sends encrypted data and requests a signed receipt.
Receiver sends back the signed receipt.</t>
            </li>
            <li>
              <t>Sender sends signed data and does NOT request a signed or
unsigned receipt.</t>
            </li>
            <li>
              <t>Sender sends signed data and requests an unsigned receipt.
Receiver sends back the unsigned receipt.</t>
            </li>
            <li>
              <t>Sender sends signed data and requests a signed receipt.
Receiver sends back the signed receipt.</t>
            </li>
            <li>
              <t>Sender sends encrypted and signed data and does NOT request a
signed or unsigned receipt.</t>
            </li>
            <li>
              <t>Sender sends encrypted and signed data and requests an unsigned
receipt.  Receiver sends back the unsigned receipt.</t>
            </li>
            <li>
              <t>Sender sends encrypted and signed data and requests a signed
receipt.  Receiver sends back the signed receipt.</t>
            </li>
          </ol>
          <t>Users can choose any of the twelve possibilities, but only the last
   example (12), when a signed receipt is requested, offers the whole
   suite of security features described in Section 2.3.1, "The Secure
   Transmission Loop".</t>
          <t>Additionally, the receipts discussed above may be either synchronous
   or asynchronous depending on the type requested.  The use of either
   the synchronous or asynchronous receipts does not change the nature
   of the secure transmission loop in support of NRR.</t>
        </section>
      </section>
    </section>
    <section anchor="references-rfcs-and-their-contributions">
      <name>References RFCs and Their Contributions</name>
      <section anchor="rfc-2616-http-v11-rfc2616">
        <name>RFC 2616 HTTP v1.1 <xref target="RFC2616"/></name>
        <t>This document specifies how data is transferred using HTTP.</t>
      </section>
      <section anchor="rfc-1847-mime-security-multiparts-rfc1847">
        <name>RFC 1847 MIME Security Multiparts <xref target="RFC1847"/></name>
        <t>This document defines security multipart for MIME:
   multipart/encrypted and multipart/signed.</t>
      </section>
      <section anchor="rfc-3462-multipartreport-rfc3462">
        <name>RFC 3462 Multipart/Report <xref target="RFC3462"/></name>
        <t>This RFC defines the use of the multipart/report content type,
   something that the MDN RFC 3798 builds upon.</t>
      </section>
      <section anchor="rfc-1767-edi-content-rfc1767">
        <name>RFC 1767 EDI Content <xref target="RFC1767"/></name>
        <t>This RFC defines the use of content type "application" for ANSI X12
   (application/EDI-X12), EDIFACT (application/EDIFACT), and mutually
   defined EDI (application/EDI-Consent).</t>
      </section>
      <section anchor="rfc-2045-2046-and-2049-mime-rfc2045-rfc2046-and-rfc2049">
        <name>RFC 2045, 2046, and 2049 MIME   <xref target="RFC2045"/>, <xref target="RFC2046"/>, and <xref target="RFC2049"/></name>
        <t>These are the basic MIME standards, upon which all MIME related RFCs
   build, including this one.  Key contributions include definitions of
   "content type", "sub-type", and "multipart", as well as encoding
   guidelines, which establish 7-bit US-ASCII as the canonical character
   set to be used in Internet messaging.</t>
      </section>
      <section anchor="rfc-3798-message-disposition-notification-rfc3798">
        <name>RFC 3798 Message Disposition Notification <xref target="RFC3798"/></name>
        <t>This Internet RFC defines how an MDN is requested, and the format and
   syntax of the MDN.  The MDN is the basis upon which receipts and
   signed receipts are defined in this specification.</t>
      </section>
      <section anchor="rfc-3851-and-3852-smime-version-31-message-specifications-and-cryptographic-message-syntax-cms-rfc3851-rfc3852">
        <name>RFC 3851 and 3852 S/MIME Version 3.1 Message Specifications and Cryptographic Message Syntax (CMS) <xref target="RFC3851"/> / <xref target="RFC3852"/></name>
        <t>This specification describes how S/MIME will carry CMS Objects.</t>
      </section>
      <section anchor="rfc-3023-xml-media-types-rfc3023">
        <name>RFC 3023 XML Media Types <xref target="RFC3023"/></name>
        <t>This RFC defines the use of content type "application" for XML
   (application/xml).</t>
      </section>
    </section>
    <section anchor="structure-of-an-as2-message">
      <name>Structure of an AS2 Message</name>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <t>The basic structure of an AS2 message consists of MIME format inside
   an HTTP message with a few additional specific AS2 headers.  The
   structures below are described hierarchically in terms of which RFCs
   are applied to form the specific structure.  For details of how to
   code in compliance with all RFCs involved, turn directly to the RFCs
   referenced.  Any difference between AS2 implementations and RFCs are
   mentioned specifically in the sections below.</t>
      </section>
      <section anchor="structure-of-an-internet-edi-mime-message">
        <name>Structure of an Internet EDI MIME Message</name>
        <t>No encryption, no signature <br/>
      - RFC2616/2045 <br/>
        - RFC1767/RFC3023 (application/EDIxxxx or /xml) <br/></t>
        <t>No encryption, signature <br/>
      - RFC2616/2045 <br/>
        - RFC1847 (multipart/signed) <br/>
          - RFC1767/RFC3023 (application/EDIxxxx or /xml) <br/>
          - RFC3851 (application/pkcs7-signature) <br/></t>
        <t>Encryption, no signature <br/>
      - RFC2616/2045 <br/>
        - RFC3851 (application/pkcs7-mime) <br/>
          - RFC1767/RFC3023  (application/EDIxxxx or /xml)(encrypted) <br/></t>
        <t>Encryption, signature <br/>
      - RFC2616/2045 <br/>
        - RFC3851 (application/pkcs7-mime) <br/>
          - RFC1847 (multipart/signed)(encrypted) <br/>
            - RFC1767/RFC3023  (application/EDIxxxx or /xml)(encrypted) <br/>
            - RFC3851 (application/pkcs7-signature)(encrypted) <br/></t>
        <t>MDN over HTTP, no signature <br/>
      - RFC2616/2045 <br/>
        - RFC3798 (message/disposition-notification) <br/></t>
        <t>MDN over HTTP, signature <br/>
      - RFC2616/2045 <br/>
        - RFC1847 (multipart/signed) <br/>
         - RFC3798 (message/disposition-notification) <br/>
         - RFC3851 (application/pkcs7-signature) <br/></t>
        <t>MDN over SMTP, no signature <br/></t>
        <t>MDN over SMTP, signature <br/>
     Refer to the EDI over SMTP standard <xref target="RFC3335"/>. <br/></t>
        <t>Although all MIME content types SHOULD be supported, the following
   MIME content types MUST be supported:</t>
        <artwork><![CDATA[
         Content-type: multipart/signed
         Content-Type: multipart/report
         Content-type: message/disposition-notification
         Content-Type: application/PKCS7-signature
         Content-Type: application/PKCS7-mime
         Content-Type: application/EDI-X12
         Content-Type: application/EDIFACT
         Content-Type: application/edi-consent
         Content-Type: application/XML
]]></artwork>
      </section>
    </section>
    <section anchor="http-considerations">
      <name>HTTP Considerations</name>
      <section anchor="sending-edi-in-http-post-requests">
        <name>Sending EDI in HTTP POST Requests</name>
        <t>The request line will have the form: "POST Request-URI HTTP/1.1",
   with spaces and followed by a CRLF.  The Request URI is typically
   exchanged out of band, as part of setting up a bilateral trading
   partner agreement.  Applications SHOULD be prepared to deal with an
   initial reply containing a status indicating a need for
   authentication of the usual types used for authorizing access to the
   Request-URI (<xref target="RFC2616"/>, Section 10.4.2 and elsewhere).</t>
        <t>The request line is followed by entity headers specifying content
   length (<xref target="RFC2616"/>, Section 14.14) and content type (<xref target="RFC2616"/>, Section 14.18).
   The Host request header (<xref target="RFC2616"/>, Sections 9 and 14.23) is also included.</t>
        <t>When using Transport Layer Security <xref target="RFC2246"/> or SSLv3, the request-URI
   SHOULD indicate the appropriate scheme value, HTTPS.  Usually only a
   multipart/signed message body would be sent using TLS, as encrypted
   message bodies would be redundant.  However, encrypted message bodies
   are not prohibited.</t>
        <t>The receiving AS2 system MAY disconnect from the sending AS2 system
   before completing the reception of the entire entity if it determines
   that the entity being sent is too large to process.</t>
        <t>For HTTP version 1.1, TCP persistent connections are the default,
   (<xref target="RFC2616"/> Sections 8.1.2, 8.2, and 19.7.1).  A number of other differences
   exist because HTTP does not conform to MIME <xref target="RFC2616"/> as used in SMTP
   transport.  Relevant differences are summarized below.</t>
      </section>
      <section anchor="unused-mime-headers-and-operations">
        <name>Unused MIME Headers and Operations</name>
        <section anchor="content-transfer-encoding-not-used-in-http-transport">
          <name>Content-Transfer-Encoding Not Used in HTTP Transport</name>
          <t>HTTP can handle binary data and so there is no need to use the
   content transfer encodings of MIME <xref target="RFC2616"/>.  This difference is discussed
   in <xref target="RFC2616"/>, Section 19.4.5.  However, a content transfer encoding value
   of binary or 8-bit is permissible but not required.  The absence of
   this header MUST NOT result in transaction failure.  Content transfer
   encoding of MIME bodyparts within the AS2 message body is also
   allowed.</t>
        </section>
        <section anchor="message-bodies">
          <name>Message Bodies</name>
          <t>In <xref target="RFC2616"/>, Section 3.7.2, it is explicitly noted that multiparts MUST
   have null epilogues.</t>
          <t>In <xref target="RFC3335"/>, Section 5.4.1, options for large file processing are
   discussed for SMTP transport.  For HTTP, large files SHOULD be
   handled correctly by the TCP layer.  However, in <xref target="RFC2616"/>, Sections 3.5
   and 3.6 discuss some options for compressing or chunking entities to
   be transferred.  In <xref target="RFC2616"/>, Section 8.1.2.2 discusses a pipelining
   option that is useful for segmenting large amounts of data.</t>
        </section>
      </section>
      <section anchor="modification-of-mime-or-other-headers-or-parameters-used">
        <name>Modification of MIME or Other Headers or Parameters Used</name>
        <section anchor="content-length">
          <name>Content-Length</name>
          <t>The use of the content-length header MUST follow the guidelines of
   <xref target="RFC2616"/>, specifically Sections 4.4 and 14.13.</t>
        </section>
        <section anchor="final-recipient-and-original-recipient">
          <name>Final Recipient and Original Recipient</name>
          <t>The final and original recipient values SHOULD be the same value.
   These values MUST NOT be aliases or mailing lists.</t>
        </section>
        <section anchor="message-id-and-original-message-id">
          <name>Message-Id and Original-Message-Id</name>
          <t>Message-Id and Original-Message-Id is formatted as defined in RFC
   2822 <xref target="RFC2822"/>:</t>
          <artwork><![CDATA[
      "<" id-left "@" id-right ">"        (RFC 2822, 3.6.4)
]]></artwork>
          <t>Message-Id length is a maximum of 998 characters.  For maximum
   backward compatibility, Message-Id length SHOULD be 255 characters or
   less.  Message-Id SHOULD be globally unique, and id-right SHOULD be
   something unique to the sending host environment (e.g., a host name).</t>
          <t>When sending a message, always include the angle brackets.  Angle
   brackets are not part of the Message-Id value.  For maximum backward
   compatibility, when receiving a message, do not check for angle
   brackets.  When creating the Original-Message-Id header in an MDN,
   always use the exact syntax as received on the original message;
   don't strip or add angle brackets.</t>
        </section>
        <section anchor="host-header">
          <name>Host Header</name>
          <t>The host request header field MUST be included in the POST request
   made when sending business data.  This field is intended to allow one
   server IP address to service multiple hostnames, and potentially to
   conserve IP addresses.  See <xref target="RFC2616"/>, Sections 14.23 and 19.5.1.</t>
        </section>
      </section>
      <section anchor="http-response-status-codes">
        <name>HTTP Response Status Codes</name>
        <t>The status codes return status concerning HTTP operations.  For
   example, the status code 401, together with the WWW-Authenticate
   header, is used to challenge the client to repeat the request with an
   Authorization header.  Other explicit status codes are documented in
   <xref target="RFC2616"/>, Section 6.1.1 and throughout Section 10.</t>
        <t>For errors in the request-URI, 400 ("Bad Request"), 404 ("Not
   Found"), and similar codes are appropriate status codes.  These codes
   and their semantics are specified by <xref target="RFC2616"/>.  A careful examination of
   these codes and their semantics should be made before implementing
   any retry functionality.  Retries SHOULD NOT be made if the error is
   not transient or if retries are explicitly discouraged.</t>
      </section>
      <section anchor="http-error-recovery">
        <name>HTTP Error Recovery</name>
        <t>If the HTTP client fails to read the HTTP server response data, the
   POST operation with identical content, including same Message-ID,
   SHOULD be repeated, if the condition is transient.</t>
        <t>The Message-ID on a POST operation can be reused if and only if all
   of the content (including the original Date) is identical.</t>
        <t>Details of the retry process (including time intervals to pause,
   number of retries to attempt, and timeouts for retrying) are
   implementation dependent.  These settings are selected as part of the
   trading partner agreement.</t>
        <t>Servers SHOULD be prepared to receive a POST with a repeated
   Message-ID.  The MIME reply body previously sent SHOULD be resent,
   including the MDN and other MIME parts.</t>
      </section>
    </section>
    <section anchor="additional-as2-specific-http-headers">
      <name>Additional AS2-Specific HTTP Headers</name>
      <t>The following headers are to be included in all AS2 messages and all
AS2 MDNs, except for asynchronous MDNs that are sent using SMTP and
that follow the AS1 semantics<xref target="RFC3335"/>.</t>
      <section anchor="as2-version-header">
        <name>AS2 Version Header</name>
        <t>To promote backward compatibility, AS2 includes a version header:</t>
        <t>AS2-Version: 1.0  - Used in all implementations of this
                       specification.  1.x will be interpreted as 1.0 by
                       all implementations with the "AS2 Version: 1.0"
                       header.  That is, only the most significant digit
                       is used as the version identifier for those not
                       implementing additional non-AS2-specified
                       functionality. "AS2-Version: 1.0 through 1.9" MAY
                       be used.  All implementations MUST interpret "1.0
                       through 1.9" as implementing this specification.
                       However, an implementation MAY extend this
                       specification with additional functionality by
                       specifying versions 1.1 through 1.9.  If this
                       mechanism is used, the additional functionality
                       MUST be completely transparent to implementations
                       with the "AS2-Version:  1.0" designation.</t>
        <t>AS2-Version: 1.1  - Designates those implementations that support
                       compression as defined by RFC 3274.</t>
        <t>Receiving systems MUST NOT fail due to the absence of the AS2-Version
   header.  Its absence would indicate that the message is from an
   implementation based on a previous version of this specification.</t>
      </section>
      <section anchor="as2-system-identifiers">
        <name>AS2 System Identifiers</name>
        <t>To aid the receiving system in identifying the sending system,
   AS2-From and AS2-To headers are used.</t>
        <artwork><![CDATA[
      AS2-From: < AS2-name >
      AS2-To: < AS2-name >
]]></artwork>
        <t>These AS2 headers contain textual values, as described below,
   identifying the sender/receiver of a data exchange.  Their values may
   be company specific, such as Data Universal Numbering System (DUNS)
   numbers, or they may be simply identification strings agreed upon
   between the trading partners.</t>
        <artwork><![CDATA[
  AS2-text = "!" /           ; printable ASCII characters
             %d35-91 /       ; except double-quote (%d34)
             %d93-126        ; or backslash (%d92)

  AS2-qtext = AS2-text / SP  ; allow space only in quoted text

  AS2-quoted-pair = "\" DQUOTE /  ; \" or
                    "\" "\"       ; \\

  AS2-quoted-name = DQUOTE 1*128( AS2-qtext /
                                  AS2-quoted-pair) DQUOTE

  AS2-atomic-name = 1*128AS2-text

  AS2-name = AS2-atomic-name / AS2-quoted-name
]]></artwork>
        <t>The AS2-From header value and the AS2-To header value MUST each be an
   AS2-name, MUST each be comprised of from 1 to 128 printable ASCII
   characters, and MUST NOT be folded.  The value in each of these
   headers is case-sensitive.  The string definitions given above are in
   ABNF format <xref target="RFC2234"/>.</t>
        <t>The AS2-quoted-name SHOULD be used only if the AS2-name does not
   conform to AS2-atomic-name.</t>
        <t>The AS2-To and AS2-From header fields MUST be present in all AS2
   messages and AS2 MDNs whether asynchronous or synchronous in nature,
   except for asynchronous MDNs, which are sent using SMTP.</t>
        <t>The AS2-name for the AS2-To header in a response or MDN MUST match
   the AS2-name of the AS2-From header in the corresponding request
   message.  Likewise, the AS2-name for the AS2-From header in a
   response or MDN MUST match the AS2-name of the AS2-To header in the
   corresponding AS2 request message.</t>
        <t>The sending system may choose to limit the possible AS2-To/AS2-From
   textual values but MUST not exceed them.  The receiving system MUST
   make no restrictions on the textual values and SHOULD handle all
   possible implementations.  However, implementers must be aware that
   older AS2 products may not adhere to this convention.  Trading
   partner agreements should be made to ensure that older products can
   support the system identifiers that are used.</t>
        <t>There is no required response to a client request containing invalid
   or unknown AS2-From or AS2-To header values.  The receiving AS2
   system MAY return an unsigned MDN with an explanation of the error,
   if the sending system requested an MDN.</t>
      </section>
    </section>
    <section anchor="structure-and-processing-of-an-mdn-message">
      <name>Structure and Processing of an MDN Message</name>
      <section anchor="introduction-2">
        <name>Introduction</name>
        <t>In order to support non-repudiation of receipt, a signed receipt,
   based on digitally signing a message disposition notification, is to
   be implemented by a receiving trading partner's UA.  The message
   disposition notification, specified by RFC 3798, is digitally signed
   by a receiving trading partner as part of a multipart/signed MIME
   message.</t>
        <t>The following support for signed receipts is REQUIRED:</t>
        <artwork><![CDATA[
  1. The ability to create a multipart/report; where the
     report-type = disposition-notification.

  2. The ability to calculate a message integrity check (MIC) on the
     received message.  The calculated MIC value will be returned to
     the sender of the message inside the signed receipt.

  3. The ability to create a multipart/signed content with the
     message disposition notification as the first body part, and
     the signature as the second body part.

  4. The ability to return the signed receipt to the sending trading
     partner.

  5. The ability to return either a synchronous or an asynchronous
     receipt as the sending party requests.
]]></artwork>
        <t>The signed receipt is used to notify a sending trading partner that
   requested the signed receipt that:</t>
        <artwork><![CDATA[
  1. The receiving trading partner acknowledges receipt of the sent
     EC Interchange.

  2. If the sent message was signed, then the receiving trading
     partner has authenticated the sender of the EC Interchange.

  3. If the sent message was signed, then the receiving trading
     partner has verified the integrity of the sent EC Interchange.
]]></artwork>
        <t>Regardless of whether the EDI/EC Interchange was sent in S/MIME
   format, the receiving trading partner's UA MUST provide the following
   basic processing:</t>
        <artwork><![CDATA[
  1. If the sent EDI/EC Interchange is encrypted, then the encrypted
     symmetric key and initialization vector (if applicable) is
     decrypted using the receiver's private key.

  2. The decrypted symmetric encryption key is then used to decrypt
     the EDI/EC Interchange.

  3. The receiving trading partner authenticates signatures in a
     message using the sender's public key.  The authentication
     algorithm performs the following:

     a. The message integrity check (MIC or Message Digest), is
        decrypted using the sender's public key.

     b. A MIC on the signed contents (the MIME header and encoded
        EDI object, as per RFC 1767) in the message received is
        calculated using the same one-way hash function that the
        sending trading partner used.

     c. The MIC extracted from the message that was sent and the MIC
        calculated using the same one-way hash function that the
        sending trading partner used are compared for equality.

  4. The receiving trading partner formats the MDN and sets the
     calculated MIC into the "Received-content-MIC" extension field.

  5. The receiving trading partner creates a multipart/signed MIME
     message according to RFC 1847.

  6. The MDN is the first part of the multipart/signed message, and
     the digital signature is created over this MDN, including its
     MIME headers.

  7. The second part of the multipart/signed message contains the
     digital signature.  The "protocol" option specified in the
     second part of the multipart/signed is as follows:

           S/MIME: protocol = "application/pkcs-7-signature"

  8. The signature information is formatted according to S/MIME
     specifications.
]]></artwork>
        <t>The EC Interchange and the RFC 1767 MIME EDI content header can
   actually be part of a multi-part MIME content-type.  When the EDI
   Interchange is part of a multi-part MIME content-type, the MIC MUST
   be calculated across the entire multi-part content, including the
   MIME headers.</t>
        <t>The signed MDN, when received by the sender of the EDI Interchange,
   can be used by the sender as follows:</t>
        <artwork><![CDATA[
    o  As an acknowledgement that the EDI Interchange sent was
       delivered and acknowledged by the receiving trading partner.
       The receiver does this by returning the original-message-id
       of the sent message in the MDN portion of the signed receipt.

    o  As an acknowledgement that the integrity of the EDI
       Interchange was verified by the receiving trading partner.
       The receiver does this by returning the calculated MIC of the
       received EC Interchange (and 1767 MIME headers) in the
       "Received-content-MIC" field of the signed MDN.

    o  As an acknowledgement that the receiving trading partner has
       authenticated the sender of the EDI Interchange.

    o  As a non-repudiation of receipt when the signed MDN is
       successfully verified by the sender with the receiving
       trading partner's public key and the returned MIC value
       inside the MDN is the same as the digest of the original
       message.
]]></artwork>
      </section>
      <section anchor="synchronous-and-asynchronous-mdns">
        <name>Synchronous and Asynchronous MDNs</name>
        <t>The AS2-MDN exists in two varieties: synchronous and asynchronous.</t>
        <t>The synchronous AS2-MDN is sent as an HTTP response to an HTTP POST
   or as an HTTPS response to an HTTPS POST.  This form of AS2-MDN is
   called synchronous because the AS2-MDN is returned to the originator
   of the POST on the same TCP/IP connection.</t>
        <t>The asynchronous AS2-MDN is sent on a separate HTTP, HTTPS, or SMTP
   TCP/IP connection.  Logically, the asynchronous AS2-MDN is a response
   to an AS2 message.  However, at the transfer-protocol layer, assuming
   that no HTTP pipelining is utilized, the asynchronous AS2-MDN is
   delivered on a unique TCP/IP connection, distinct from that used to
   deliver the original AS2 message.  When handling an asynchronous
   request, the HTTP response MUST be sent back before the MDN is
   processed and sent on the separate connection.</t>
        <t>When an asynchronous AS2-MDN is requested by the sender of an AS2
   message, the synchronous HTTP or HTTPS response returned to the
   sender prior to terminating the connection MUST be a transfer-layer
   response indicating the success or failure of the data transfer.  The
   format of such a synchronous response MAY be the same as that
   response returned when no AS2-MDN is requested.</t>
        <t>The following diagram illustrates the synchronous versus asynchronous
   varieties of AS2-MDN delivery using HTTP:</t>
        <t>Synchronous AS2-MDN</t>
        <t>{Peer1} ----( connect )----&gt; {Peer2} <br/>
   {Peer1} -----( send )------&gt; {Peer2}   HTTP Request {AS2-Message}  <br/>
   {Peer1} &lt;---( receive )----- {Peer2}  HTTP Response {AS2-MDN} <br/></t>
        <t>Asynchronous AS2-MDN</t>
        <t>{Peer1} ----( connect )----&gt; {Peer2} <br/>
   {Peer1} -----( send )------&gt; {Peer2}   HTTP Request {AS2-Message} <br/>
   {Peer1} &lt;---( receive )----- {Peer2}  HTTP Response <br/></t>
        <t>{Peer1}*&lt;---( connect )----- {Peer2} <br/>
   {Peer1} &lt;--- ( send )------- {Peer2}  HTTP Request {AS2-MDN} <br/>
   {Peer1} ----( receive )----&gt; {Peer2}   HTTP Response <br/></t>
        <ul spacing="normal">
          <li>
            <t>Note: An AS2-MDN may be directed to a host different from that of
   the sender of the AS2 message.  It may utilize a transfer protocol
   different from that used to send the original AS2 message.</t>
          </li>
        </ul>
        <t>The advantage of the synchronous MDN is that it can provide the
   sender of the AS2 Message with a verifiable confirmation of message
   delivery within a synchronous logic flow.  However, if the message is
   relatively large, the time required to process this message and to
   return an AS2-MDN to the sender on the same TCP/IP connection may
   exceed the maximum configured time permitted for an IP connection.</t>
        <t>The advantage of the asynchronous MDN is that it provides for the
   rapid return of a transfer-layer response from the receiver,
   confirming the receipt of data, therefore not requiring that a TCP/IP
   connection necessarily remain open for very long.  However, this
   design requires that the asynchronous AS2-MDN contain enough
   information to identify the original message uniquely so that, when
   received by the AS2 Message originator, the status of the original
   AS2 Message can be properly updated based on the contents of the
   AS2-MDN.</t>
        <t>Synchronous or asynchronous HTTP or HTTPS MDNs are handled according
   to the requirements of this specification.</t>
        <t>However, SMTP MDNs are formatted according to the requirements of RFC
   3335 <xref target="RFC3335"/>.</t>
      </section>
      <section anchor="requesting-a-signed-receipt">
        <name>Requesting a Signed Receipt</name>
        <t>Message disposition notifications are requested as per RFC 3798.  A
   request that the receiving user agent issue a message disposition
   notification is made by placing the following header into the message
   to be sent:</t>
        <artwork><![CDATA[
    MDN-request-header = "Disposition-notification-to"
                        ":"  mail-address
]]></artwork>
        <t>The following example is for requesting an MDN:</t>
        <artwork><![CDATA[
    Disposition-notification-to: xxx@example.com
]]></artwork>
        <t>This syntax is a residue of the use of MDNs using SMTP transfer.
   Because this specification is adjusting the functionality from SMTP
   to HTTP while retaining as much as possible from the <xref target="RFC3335"/>
   functionality, the mail-address MUST be present.  The mail-address
   field is specified as an RFC 2822 localpart@domain (addr-spec)
   address.  However, the address is not used to identify where to
   return the MDN.  Receiving applications MUST ignore the value and
   MUST not complain about RFC 2822 address syntax violations.</t>
        <t>When requesting MDN-based receipts, the originator supplies
   additional extension headers that precede the message body.  These
   header "tags" are as follows:</t>
        <t>A Message-ID header is added to support message reconciliation, so
   that an Original-Message-Id value can be returned in the body part of
   MDN.  Other headers, especially "Subject" and "Date", SHOULD be
   supplied; the values of these headers are often mentioned in the
   human-readable section of a MDN to aid in identifying the original
   message.</t>
        <t>MDNs will be returned in the HTTP response when requested, unless an
   asynchronous return is requested.</t>
        <t>To request an asynchronous message disposition notification, the
   following header is placed into the message that is sent:</t>
        <artwork><![CDATA[
    Receipt-Delivery-Option: return-URL
]]></artwork>
        <t>Here is an example requesting that the MDN be asynchronous:</t>
        <artwork><![CDATA[
    Receipt-Delivery-Option: http://www.example.com/Path
]]></artwork>
        <t>Receipt-delivery-option syntax allows return-url to use some schemes
   other than HTTP using the POST method.</t>
        <t>The "receipt-delivery-option: return-url" string indicates the URL to
   use for an asynchronous MDN.  This header is NOT present if the
   receipt is to be synchronous.  The email value in Disposition-
   notification-to is not used in this specification because it was
   limited to RFC 2822 addresses; the extension header "Receipt-
   delivery-option" has been introduced to provide a URL for the MDN
   return by several transfer options.</t>
        <t>The receipt-delivery-option's value MUST be a URL indicating the
   delivery transport destination for the receipt.</t>
        <t>An example request for an asynchronous MDN via an HTTP transport:</t>
        <artwork><![CDATA[
    Receipt-delivery-option: http://www.example.com
]]></artwork>
        <t>An example request for an asynchronous MDN via an HTTP/S transport:</t>
        <artwork><![CDATA[
    Receipt-delivery-option: https://www.example.com
]]></artwork>
        <t>An example request for an asynchronous MDN via an SMTP transport:</t>
        <artwork><![CDATA[
    Receipt-delivery-option: mailto:as2@example.com
]]></artwork>
        <t>For more information on requesting SMTP MDNs, refer to RFC 3335 <xref target="RFC3335"/>.</t>
        <t>Finally, the header, Disposition-notification-options, identifies
   characteristics of message disposition notification as in <xref target="RFC3798"/>.  The
   most important of these options is for indicating the signing options
   for the MDN, as in the following example:</t>
        <artwork><![CDATA[
    Disposition-notification-options:
         signed-receipt-protocol=optional,pkcs7-signature;
         signed-receipt-micalg=optional,sha1,md5
]]></artwork>
        <t>For signing options, consider the disposition-notification-options
   syntax:</t>
        <artwork><![CDATA[
    Disposition-notification-options =
             "Disposition-Notification-Options" ":"
              disposition-notification-parameters
where
         disposition-notification-parameters =
                           parameter *(";" parameter)

where
         parameter = attribute "=" importance ", " 1#value"

where
         importance = "required" | "optional"
]]></artwork>
        <t>So the Disposition-notification-options string could be:</t>
        <artwork><![CDATA[
    signed-receipt-protocol=optional, <protocol symbol>;
    signed-receipt-micalg=optional, <micalg1>, <micalg2>,...;
]]></artwork>
        <t>The currently used value for &lt;protocol symbol&gt; is "pkcs7-signature"
   for the S/MIME detached signature format.</t>
        <t>The currently supported values for MIC algorithm &lt;micalg&gt; values are:</t>
        <artwork><![CDATA[
    Algorithm   Value Used
    ---------    ---------
     SHA-1        sha-1 or sha1
     MD5          md5
]]></artwork>
        <t>The semantics of the "signed-receipt-protocol" and the "signed-
   receipt-micalg" parameters are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The "signed-receipt-protocol" parameter is used to request a
signed receipt from the recipient trading partner.  The "signed-
receipt-protocol" parameter also specifies the format in which the
signed receipt SHOULD be returned to the requester.  </t>
            <t>
The "signed-receipt-micalg" parameter is a list of MIC algorithms
preferred by the requester for use in signing the returned
receipt.  The list of MIC algorithms SHOULD be honored by the
recipient from left to right.  </t>
            <t>
Both the "signed-receipt-protocol" and the "signed- receipt-
micalg" option parameters are REQUIRED when requesting a signed
receipt.  </t>
            <t>
The lack of the presence of the "Receipt-Delivery-Option"
indicates that a receipt is synchronous in nature.  The presence
of the "Receipt-Delivery-Option: return-url" indicates that an
asynchronous receipt is requested and SHOULD be sent to the
"return-url".</t>
          </li>
          <li>
            <t>The "importance" attribute of "Optional" is defined in RFC 3798,
Section 2.2, and has the following meaning:  </t>
            <t>
Parameters with an importance of "Optional" permit a UA that does
not understand the particular options parameter to still generate
an MDN in response to a request for a MDN.  </t>
            <t>
A UA that does not understand the "signed-receipt-protocol"
parameter or the "signed-receipt-micalg" will obviously not return
a signed receipt.  </t>
            <t>
The importance of "Optional" is used for the signed receipt
parameters because it is RECOMMENDED that an MDN be returned to
the requesting trading partner even if the recipient could not
sign it.  </t>
            <t>
The returned MDN will contain information on the disposition of
the message and on why the MDN could not be signed.  See the
Disposition field in Section 7.5 for more information.  </t>
            <t>
Within an EDI trading relationship, if a signed receipt is
expected and is not returned, then the validity of the transaction
is up to the trading partners to resolve.  </t>
            <t>
In general, if a signed receipt is required in the trading
relationship and is not received, the transaction will likely not
be considered valid.</t>
          </li>
        </ol>
        <section anchor="signed-receipt-considerations">
          <name>Signed Receipt Considerations</name>
          <t>The method used to request a receipt or a signed receipt is defined
   in RFC 3798, "An Extensible Message Format for Message Disposition
   Notifications".</t>
          <t>The "rules" are as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>When a receipt is requested, explicitly specifying that the
receipt be signed, then the receipt MUST be returned with a
signature.</t>
            </li>
            <li>
              <t>When a receipt is requested, explicitly specifying that the
receipt be signed, but the recipient cannot support either the
requested protocol format or the requested MIC algorithms, then
either a signed or unsigned receipt SHOULD be returned.</t>
            </li>
            <li>
              <t>When a signature is not explicitly requested, or if the signed
receipt request parameter is not recognized by the UA, then no
receipt, an unsigned receipt, or a signed receipt MAY be returned
by the recipient.</t>
            </li>
          </ol>
          <t>NOTE: For Internet EDI, it is RECOMMENDED that when a signature is
   not explicitly requested, or if parameters are not recognized, the UA
   send back, at a minimum, an unsigned receipt.  If, however, a signed
   receipt was always returned as a policy, whether requested or not,
   then any false unsigned receipts can be repudiated.</t>
          <t>When a request for a signed receipt is made, but there is an error in
   processing the contents of the message, a signed receipt MUST still
   be returned.  The request for a signed receipt SHALL still be
   honored, though the transaction itself may not be valid.  The reason
   why the contents could not be processed MUST be set in the
   "disposition-field".</t>
          <t>When a signed receipt request is made, the "Received-content-MIC"
   MUST always be returned to the requester (except when corruption
   prevents computation of the digest in accordance with the following
   specification).  The "Received-content-MIC" MUST be calculated as
   follows:</t>
          <artwork><![CDATA[
  o  For any signed messages, the MIC to be returned is calculated
     on the RFC1767/RFC3023 MIME header and content.
     Canonicalization on the MIME headers MUST be performed before
     the MIC is calculated, since the sender requesting the signed
     receipt was also REQUIRED to canonicalize.

  o  For encrypted, unsigned messages, the MIC to be returned is
     calculated on the decrypted RFC 1767/RFC3023 MIME header and
     content.  The content after decryption MUST be canonicalized
     before the MIC is calculated.

  o  For unsigned, unencrypted messages, the MIC MUST be calculated
     over the message contents without the MIME or any other RFC
     2822 headers, since these are sometimes altered or reordered by
     Mail Transport Agents (MTAs).
]]></artwork>
        </section>
      </section>
      <section anchor="mdn-format-and-values">
        <name>MDN Format and Values</name>
        <t>This section defines the format of the AS2 Message Disposition
   Notification (AS2-MDN).</t>
        <section anchor="as2-mdn-general-formats">
          <name>AS2-MDN General Formats</name>
          <t>The AS2-MDN follows the MDN specification <xref target="RFC3798"/> except where noted in
   this section.  The modified ABNF definitions in this document use the
   vertical-bar character, '|', to denote a logical "OR" construction.
   This usage follows RFC 2616 <xref target="RFC2616"/>.  HTTP entities referred to below are
   not further defined in this document.  Refer to RFC 2616 <xref target="RFC2616"/> for
   complete definitions of HTTP entities.  The format of the AS2-MDN is:</t>
          <t>AS2-MDN = AS2-sync-MDN | AS2-async-http-MDN |  <br/>
       AS2-async-smtp-MDN <br/></t>
          <t>AS2-sync-MDN = <br/>
       Status-Line <br/>
       *(( general-header | response-header | entity-header ) <br/>
       CRLF ) <br/>
       CRLF <br/>
       AS2-MDN-body <br/></t>
          <t>Status-Line = <br/>
       HTTP-Version SP Status-Code SP Reason-Phrase CRLF <br/></t>
          <t>AS2-async-http-MDN =  <br/>
       Request-Line <br/>
       *(( general-header | request-header | entity-header ) <br/>
       CRLF ) <br/>
       CRLF <br/>
       AS2-MDN-body <br/></t>
          <t>Request-Line = <br/>
       Method SP Request-URI SP HTTP-Version CRLF <br/></t>
          <t>AS2-async-smtp-MDN = <br/>
       *(( general-header | request-header | entity-header ) <br/>
       CRLF ) <br/>
       CRLF <br/>
       AS2-MDN-body <br/></t>
          <t>AS2-MDN-body = <br/>
       AS2-signed-MDN-body | AS2-unsigned-MDN-body <br/></t>
        </section>
        <section anchor="as2-mdn-construction">
          <name>AS2-MDN Construction</name>
          <t>The AS2-MDN-body is formatted as a MIME multipart/report with a
   report-type of "disposition-notification".  When the message is
   unsigned, the transfer-layer ("outermost") entity-headers of the
   AS2-MDN contain the content-type header that specifies a content-type
   of "multipart/report" and parameters indicating the report-type, and
   the value of the outermost multipart boundary.</t>
          <t>When the AS2-MDN is signed, the transfer-layer ("outermost") entity-
   headers of the AS2-MDN contain a content-type header that specifies a
   content-type of "multipart/signed" and parameters indicating the
   algorithm used to compute the message digest, the signature-
   formatting protocol (e.g., pkcs7-signature), and the value of the
   outermost multipart boundary.  The first part of the MIME
   multipart/signed message is an embedded MIME multipart/report of type
   "disposition-notification".  The second part of the multipart/signed
   message contains a MIME application/pkcs7-signature message.</t>
          <t>The first part of the MIME multipart/report is a "human-readable"
   portion that contains a general description of the message
   disposition.  The second part of the MIME multipart/report is a
   "machine-readable" portion that is defined as:</t>
          <t>AS2-disposition-notification-content =  <br/>
        reporting-ua-field CRLF  <br/>
        mdn-gateway-field CRLF  <br/>
        final-recipient-field CRLF <br/>
        original-message-id-field CRLF ] <br/>
   AS2-disposition-field CRLF <br/>
       *( failure-field CRLF ) <br/>
       *( error-field CRLF ) <br/>
       *( warning-field CRLF ) <br/>
       *( extension-field CRLF ) <br/>
        AS2-received-content-MIC-field CRLF <br/></t>
        </section>
        <section anchor="as2-mdn-fields">
          <name>AS2-MDN Fields</name>
          <t>The rules for constructing the AS2-disposition-notification content
   are identical to the disposition-notification-content rules provided
   in Section 7 of RFC 3798 <xref target="RFC3798"/>, except that the RFC 3798 disposition-
   field has been replaced with the AS2-disposition-field and that the
   AS2-received-content-MIC field has been added.  The differences
   between the RFC 3798 disposition-field and the AS2-disposition-field
   are described below.  Where there are differences between this
   document and RFC 3798, those entity names have been changed by pre-
   pending "AS2-".  Entities that do not differ from RFC 3798 are not
   necessarily further defined in this document; refer to RFC 3798,
   Section 7, "Collected Grammar", for the original grammar.</t>
          <t>AS2-disposition-field = <br/>
       "Disposition" ":" disposition-mode ";" <br/>
       AS2-disposition-type '/' AS2-disposition-modifier  <br/></t>
          <t>disposition-mode = <br/>
       action-mode "/" sending-mode <br/></t>
          <t>action-mode = <br/>
       "manual-action" | "automatic-action" <br/></t>
          <t>sending-mode = <br/>
       "MDN-sent-manually" | "MDN-sent-automatically" <br/></t>
          <t>AS2-disposition-type = <br/>
       "processed" | "failed" <br/></t>
          <t>AS2-disposition-modifier = <br/>
       ( "error" | "warning" ) | AS2-disposition-modifier-extension <br/></t>
          <t>AS2-disposition-modifier-extension = <br/>
       "error: authentication-failed" | <br/>
       "error: decompression-failed" | <br/>
       "error: decryption-failed" | <br/>
       "error: insufficient-message-security" | <br/>
       "error: integrity-check-failed" | <br/>
       "error: unexpected-processing-error" | <br/>
       "warning: " AS2-MDN-warning-description | <br/>
       "failure: " AS2-MDN-failure-description <br/></t>
          <t>AS2-MDN-warning-description = *( TEXT ) <br/></t>
          <t>AS2-MDN-failure-description = *( TEXT ) <br/></t>
          <t>AS2-received-content-MIC-field = <br/>
       "Received-content-MIC" ":" encoded-message-digest "," <br/>
       digest-alg-id CRLF <br/></t>
          <t>encoded-message-digest = <br/>
       1*( 'A'-Z' | 'a'-'z' | '0'-'9' | '/' | '+' | '=' ) <br/>
       (i.e., base64( message-digest ) ) <br/></t>
          <t>digest-alg-id = "sha-1" | <br/>
                    "sha1" | <br/>
                    "md5" <br/>
                 ; The "sha1" is a legacy spelling of the "sha-1" defined hash in the IANA Textual Names Registry
                 ; It should be maintained for backwards compatibility</t>
          <t>"Insufficient-message-security" and "decompression-failed" are new
   error codes that are not mentioned in the AS1 RFC 3335, and may not
   be compatible with earlier implementations of AS2.</t>
          <t>The "Received-content-MIC" extension field is set when the integrity
   of the received message is verified.  The MIC is the base64-encoded
   message-digest computed over the received message with a hash
   function.  This field is required for signed receipts but optional
   for unsigned receipts.  For details defining the specific content
   over which the message digest is to be computed, see Section 7.3.1 of
   this document.</t>
          <t>For signed messages, the algorithm used to calculate the MIC MUST be
   the same as that used on the message that was signed.  If the message
   is not signed, then the SHA-1 algorithm SHOULD be used.  This field
   is set only when the contents of the message are processed
   successfully.  This field is used in conjunction with the recipient's
   signature on the MDN so that the sender can verify non-repudiation of
   receipt.</t>
          <t>AS2-MDN field names (e.g., "Disposition:", "Final-Recipient:") are
   case insensitive (cf. RFC 3798, Section 3.1.1).  AS2-MDN action-
   modes, sending-modes, AS2-disposition-types, and AS2-disposition-
   modifier values, which are defined above, and user-supplied *( TEXT )
   values are also case insensitive.  AS2 implementations MUST NOT make
   assumptions regarding the values supplied for AS2-MDN-warning-
   description or AS2-MDN-failure-description, or for the values of any
   (optional) error, warning, or failure fields.</t>
        </section>
        <section anchor="additional-as2-mdn-programming-notes">
          <name>Additional AS2-MDN Programming Notes</name>
          <t>o  Unlike SMTP, for HTTP transactions, Original-Recipient and Final-
      Recipient SHOULD not be different.  The value in Original-
      Message-ID SHOULD match the original Message-ID header value.</t>
          <t>o  Refer to RFC 3798 for the formatting of the MDN, except for the
      specific deviations mentioned above.</t>
          <t>o  Refer to RFC 3462 and RFC 3798 for the formatting of the content-
      type entity-headers for the MDN.</t>
          <t>o  Use an action-mode of "automatic-action" when the disposition
      described by the disposition type was a result of an automatic
      action rather than that of an explicit instruction by the user for
      this message.</t>
          <t>o  Use an action-mode of "manual-action" when the disposition
      described by the disposition type was a result of an explicit
      instruction by the user rather than some sort of automatically
      performed action.</t>
          <t>o  Use a sending-mode of "MDN-sent-automatically" when the MDN is
      sent because the UA had previously been configured to do so.</t>
          <t>o  Use a sending-mode of "MDN-sent-manually" when the user explicitly
      gave permission for this particular MDN to be sent.</t>
          <t>o  The sending-mode "MDN-sent-manually" is meaningful ONLY with
      "manual-action", not with "automatic-action".</t>
          <t>o  The "failed" disposition type MUST NOT be used for the situation
      in which there is some problem in processing the message other
      than interpreting the request for an MDN.  The "processed" or
      other disposition type with appropriate disposition modifiers is
      to be used in such situations.</t>
        </section>
      </section>
      <section anchor="disposition-mode-type-and-modifier">
        <name>Disposition Mode, Type, and Modifier</name>
        <section anchor="disposition-mode-overview">
          <name>Disposition Mode Overview</name>
          <t>This section provides a brief overview of how "processed", "error",
   "failure", and "warning" are used.</t>
        </section>
        <section anchor="successful-processing-status-indication">
          <name>Successful Processing Status Indication</name>
          <t>When the request for a receipt or signed receipt, and the received
   message contents are successfully processed by the receiving EDI UA,
   a receipt or MDN SHOULD be returned with the disposition-type set to
   "processed".  When the MDN is sent automatically by the EDI UA, and
   there is no explicit way for a user to control the sending of the
   MDN, then the first part of the "disposition-mode" SHOULD be set to
   "automatic-action".  When the MDN is being sent under user-
   configurable control, then the first part of the "disposition-mode"
   SHOULD be set to "manual-action".  Since a request for a signed
   receipt should always be honored, the user MUST not be allowed to
   configure the UA not to send a signed receipt when the sender
   requests one.</t>
          <t>The second part of the disposition-mode is set to "MDN-sent-manually"
   if the user gave explicit permission for the MDN to be sent.  Again,
   the user MUST not be allowed to explicitly refuse to send a signed
   receipt when the sender requests one.  The second part of the
   "disposition-mode" is set to "MDN-sent-automatically" whenever the
   EDI UA sends the MDN automatically, regardless of whether the sending
   was under the control of a user, administrator, or software.</t>
          <t>Because EDI content is generally handled automatically by the EDI UA,
   a request for a receipt or signed receipt will generally return the
   following in the "disposition-field":</t>
          <artwork><![CDATA[
   Disposition: automatic-action/MDN-sent-automatically; processed
]]></artwork>
          <t>Note that this specification does not restrict the use of the
   "disposition-mode" just to automatic actions.  Manual actions are
   valid as long as it is kept in mind that a request for a signed
   receipt MUST be honored.</t>
        </section>
        <section anchor="unsuccessful-processed-content">
          <name>Unsuccessful Processed Content</name>
          <t>The request for a signed receipt requires the use of two
   "disposition-notification-options", which specify the protocol format
   of the returned signed receipt, and the MIC algorithm used to
   calculate the MIC over the message contents.  The "disposition-field"
   values that should be used if the message content is being rejected
   or ignored (for instance, if the EDI UA determines that a signed
   receipt cannot be returned because it does not support the requested
   protocol format, the EDI UA chooses not to process the message
   contents itself) MUST be specified in the MDN "disposition-field" as
   follows:</t>
          <artwork><![CDATA[
   Disposition: "disposition-mode";  failed/Failure: unsupported format
]]></artwork>
          <t>The "failed" AS2-disposition-type MUST be used when a failure occurs
   that prevents the proper generation of an MDN.  For example, this
   disposition-type would apply if the sender of the message requested
   the application of an unsupported message-integrity-check (MIC)
   algorithm.</t>
          <t>The "failure:" AS2-disposition-modifier-extension SHOULD be used with
   an implementation-defined description of the failure.  Further
   information about the failure may be contained in a failure-field.</t>
          <t>The syntax of the "failed" disposition-type is general, allowing the
   sending of any textual information along with the "failed"
   disposition-type.  Implementations MUST support any printable textual
   characters after the Failure disposition-type.  For use in Internet
   EDI, the following "failed" values are pre-defined and MUST be
   supported:</t>
          <artwork><![CDATA[
   "Failure: unsupported format"
   "Failure: unsupported MIC-algorithms"
]]></artwork>
        </section>
        <section anchor="unsuccessful-non-content-processing">
          <name>Unsuccessful Non-Content Processing</name>
          <t>When errors occur in processing the received message (other than
   content), the "disposition-field" MUST be set to the "processed"
   value for disposition-type and the "error" value for disposition-
   modifier.</t>
          <t>The "error" AS2-disposition-modifier with the "processed"
   disposition-type MUST be used to indicate that an error of some sort
   occurred that prevented successful processing of the message.
   Further information may be contained in an error-field.</t>
          <t>An "error:" AS2-disposition-modifier-extension SHOULD be used to
   combine the indication of an error with a predefined description of a
   specific, well-known error.  Further information about the error may
   be contained in an error field.</t>
          <t>For internet EDI use, the following "error" AS2-disposition-modifier
   values are defined:</t>
          <t>o "Error: decryption-failed"           - the receiver could not
                                            decrypt the message
                                            contents.</t>
          <t>o "Error: authentication-failed"       - the receiver could not
                                            authenticate the sender.</t>
          <t>o "Error: integrity-check-failed"      - the receiver could not
                                            verify content integrity.</t>
          <t>o "Error: unexpected-processing-error" - a catch-all for any
                                            additional processing
                                            errors.</t>
          <t>An example of how the "disposition-field" would look when errors
   other than those in content processing are detected is as follows:</t>
          <artwork><![CDATA[
   Disposition: "disposition-mode"; processed/Error: decryption-failed
]]></artwork>
        </section>
        <section anchor="processing-warnings">
          <name>Processing Warnings</name>
          <t>Situations arise in EDI when, even if a trading partner cannot be
   authenticated correctly, the trading partners still agree to continue
   processing the EDI transactions.  Transaction reconciliation is done
   between the trading partners at a later time.  In the content
   processing warning situations as described above, the "disposition-
   field" MUST be set to the "processed" disposition-type value, and the
   "warning" to the "disposition-modifier" value.</t>
          <t>The "warning" AS2-disposition-modifier MUST be used with the
   "processed" disposition-type to indicate that the message was
   successfully processed but that an exceptional condition occurred.
   Further information may be contained in a warning-field.</t>
          <t>A "warning:" AS2-disposition-modifier-extension SHOULD be used to
   combine the indication of a warning with an implementation-defined
   description of the warning.  Further information about the warning
   may be contained in a warning-field.</t>
          <t>For use in Internet EDI, the following "warning"
   disposition-modifier-extension value is defined:</t>
          <artwork><![CDATA[
   "Warning: authentication-failed, processing continued"
]]></artwork>
          <t>An example of how the "disposition-field" would look when warning
   other than those for content processing are detected is as follows:</t>
          <t>Example:</t>
          <artwork><![CDATA[
   Disposition: "disposition-mode"; processed/Warning:
     authentication-failed, processing continued
]]></artwork>
        </section>
        <section anchor="backward-compatibility-with-disposition-type-modifier-and-extension">
          <name>Backward Compatibility with Disposition Type, Modifier, and Extension</name>
          <t>The following set of examples represents typical constructions of the
   Disposition field that have been in use by AS2 implementations.  This
   is NOT an exhaustive list of possible constructions.  However, AS2
   implementations MUST accept constructions of this type to be backward
   compatible with earlier AS2 versions.</t>
          <artwork><![CDATA[
  Disposition: automatic-action/MDN-sent-automatically; processed

  Disposition: automatic-action/MDN-sent-automatically;
  processed/error: authentication-failed

  Disposition: automatic-action/MDN-sent-automatically;
  processed/warning: duplicate-document

  Disposition: automatic-action/MDN-sent-automatically;
  failed/failure: sender-equals-receiver
]]></artwork>
          <t>The following set of examples represents allowable constructions of
   the Disposition field that combine the historic constructions above
   with optional RFC 3798 error, warning, and failure fields.  AS2
   implementations MAY produce these constructions.  However, AS2
   servers are not required to recognize or process optional error,
   warning, or failure fields at this time.  Note that the use of the
   multiple error fields in the second example below provides for the
   indication of multiple error conditions.</t>
          <artwork><![CDATA[
  Disposition: automatic-action/MDN-sent-automatically; processed

  Disposition: automatic-action/MDN-sent-automatically;
    processed/error: decryption-failed
  Error: The signature did not decrypt into a valid PKCS#1
    Type-2 block.
  Error: The length of the decrypted key does not equal the
    octet length of the modulus.

  Disposition: automatic-action/MDN-sent-automatically;
    processed/warning: duplicate-document
  Warning: An identical message already exists at the
    destination server.

  Disposition: automatic-action/MDN-sent-automatically;
    failed/failure: sender-equals-receiver
  Failure: The AS2-To name is identical to the AS2-From name.
]]></artwork>
          <t>The following set of examples represents allowable constructions of
   the Disposition field that employ pure RFC 3798 Disposition-modifiers
   with optional error, warning, and failure fields.  These examples are
   provided as informational only.  These constructions are not
   guaranteed to be backward compatible with AS2 implementations prior
   to version 1.1.</t>
          <artwork><![CDATA[
  Disposition: automatic-action/MDN-sent-automatically; processed

  Disposition: automatic-action/MDN-sent-automatically; processed/error
  Error: authentication-failed
  Error: The signature did not decrypt into a valid PKCS#1 Type-2 block.
  Error: The length of the decrypted key does not equal the octet length of the modulus.

  Disposition: automatic-action/MDN-sent-automatically; processed/warning
  Warning: duplicate-document

  Disposition: automatic-action/MDN-sent-automatically; failed
  Failure: sender-equals-receiver
]]></artwork>
        </section>
      </section>
      <section anchor="receipt-reply-considerations-in-an-http-post">
        <name>Receipt Reply Considerations in an HTTP POST</name>
        <t>The details of the response to the POST command vary depending upon
   whether a receipt has been requested.</t>
        <t>With no extended header requesting a receipt, and with no errors
   accessing the request-URI specified processing, the status line in
   the Response to the POST request SHOULD be in the 200 range.  Status
   codes in the 200 range SHOULD also be used when an entity is returned
   (a signed receipt in a multipart/signed content type or an unsigned
   receipt in a multipart/report).  Even when the disposition of the
   data was an error condition at the authentication, decryption or
   other higher level, the HTTP status code SHOULD indicate success at
   the HTTP level.</t>
        <t>The HTTP server-side application may respond with an unsolicited
   multipart/report as a message body that the HTTP client might not
   have solicited, but the client may discard this.  Applications SHOULD
   avoid emitting unsolicited receipt replies because bandwidth or
   processing limitations might have led administrators to suspend
   asking for acknowledgements.</t>
        <t>Message Disposition Notifications, when used in the HTTP reply
   context, will closely parallel a SMTP MDN.  For example, the
   disposition field is a required element in the machine-readable
   second part of a multipart/report for a MDN.  The final-recipient-
   field (<xref target="RFC3798"/>, Section 3.1) value SHOULD be derived from the entity
   headers of the request.</t>
        <t>In an MDN, the first part of the multipart/report (the human-readable
   part) SHOULD include items such as the subject, the date, and other
   information when those fields are present in entity header fields
   following the POST request.  An application MUST report the Message-
   ID of the request in the second part of the multipart/report (the
   machine-readable part).  Also, an MDN SHOULD have its own unique
   Message-ID HTTP header.  The HTTP reply SHOULD normally omit the
   third optional part of the multipart/report (used to return the
   original message or its headers in the SMTP context).</t>
      </section>
    </section>
    <section anchor="public-key-certificate-handling">
      <name>Public Key Certificate Handling</name>
      <t>In the near term, the exchange of public keys and certification of
   these keys MUST be handled as part of the process of establishing a
   trading partnership.  The UA and/or EDI application interface must
   maintain a database of public keys used for encryption or signatures,
   in addition to the mapping between the EDI trading partner ID and the
   RFC 2822 <xref target="RFC2822"/> email address and HTTP URL/URI.  The procedures for
   establishing a trading partnership and configuring the secure EDI
   messaging system might vary among trading partners and software
   packages.</t>
      <t>X.509 certificates are REQUIRED.  It is RECOMMENDED that trading
   partners self-certify each other if an agreed-upon certification
   authority is not used.  This applicability statement does NOT require
   the use of a certification authority.  The use of a certification
   authority is therefore OPTIONAL.  Certificates may be self-signed.</t>
      <t>It is RECOMMENDED that when trading partners are using S/MIME they
   also exchange public key certificates, considering advice provided in
   <xref target="RFC3850"/>.</t>
      <t>The message formats useful for certificate exchange are found in <xref target="RFC3851"/>
   and <xref target="RFC3852"/>.</t>
      <t>In the long term, additional standards may be developed to simplify
   the process of establishing a trading partnership, including the
   third-party authentication of trading partners, as well as the
   attributes of the trading relationship.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is concerned with secure transport of business
   to business data, and it considers both data confidentiality and
   authentication issues.</t>
      <t>Extracted from RFC 3851 <xref target="RFC3851"/>:
   40-bit encryption is considered weak by most cryptographers.  Using
   weak cryptography in S/MIME offers little actual security over
   sending plaintext.  However, other features of S/MIME, such as the
   specification of Triple DES and the ability to announce stronger
   cryptographic capabilities to parties with whom you communicate,
   allow senders to create messages that use strong encryption.  Using
   weak cryptography is never recommended unless the only alternative is
   no cryptography.  When feasible, sending and receiving agents SHOULD
   inform senders and recipients of the relative cryptographic strength
   of messages.</t>
      <t>Extracted from RFC 3850 <xref target="RFC3850"/>:
   When processing certificates, there are many situations where the
   processing might fail.  Because the processing may be done by a user
   agent, a security gateway, or other program, there is no single way
   to handle such failures.  Just because the methods to handle the
   failures have not been listed, however, the reader should not assume
   that they are not important.  The opposite is true: if a certificate
   is not provably valid and associated with the message, the processing
   software should take immediate and noticeable steps to inform the end
   user about it.</t>
      <t>Some of the many situations in which signature and certificate
   checking might fail include the following:</t>
      <artwork><![CDATA[
  o  No certificate chain leads to a trusted CA.

  o  No ability to check the Certificate Revocation List (CRL) for a certificate.

  o  An invalid CRL was received.

  o  The CRL being checked is expired.

  o  The certificate is expired.

  o  The certificate has been revoked.
]]></artwork>
      <t>There are certainly other instances where a certificate may be
   invalid, and it is the responsibility of the processing software to
   check them all thoroughly, and to decide what to do if the check
   fails.  See RFC 3280 for additional information on certificate path
   validation.</t>
      <t>The following are additional security considerations to those listed
   in <xref target="RFC3851"/>, <xref target="RFC3852"/> and <xref target="RFC3850"/>.</t>
      <section anchor="nrr-cautions">
        <name>NRR Cautions</name>
        <t>This specification seeks to provide multiple mechanisms that can be
   combined in accordance with local policies to achieve a wide range of
   security needs as determined by threat and risk analyses of the
   business peers.  It is required that all these mechanisms be
   implemented by AS2 software so that the software has capabilities
   that promote strong interoperability, no matter what policies are
   adopted.</t>
        <t>One strong cluster of mechanisms (the secure transmission loop) can
   provide good support for meeting the evidentiary needs of non-
   repudiation of receipt by the original sender and by a third party
   supplied with all stated evidence.  However, this specification does
   not itself define non-repudiation of receipt nor enumerate its
   essential properties because NRR is a business analysis and/or legal
   requirement, and not relevantly defined by a technical applicability
   statement.</t>
        <t>Some analyses observe that non-repudiation of receipt presupposes
   that non-repudiation of the sender of the original message is
   obtained, and further that non-repudiation should be implemented by
   means of digital signature on the original message.  To satisfy
   strict NRR evidence, authentication and integrity MUST be provided by
   some mechanism, and the RECOMMENDED mechanism is digital signatures
   on both the original message and the receipt message.</t>
        <t>Given that this specification has selected several mechanisms that
   can be combined in several ways, it is important to realize that if a
   digital signature is omitted from the original message, in order to
   satisfy the preceding analysis of NRR requirements, some
   authentication mechanism MUST accompany the request for a signed
   receipt and its included Received-content-MIC value.  This
   authentication might come from using client-side SSL, authentication
   via IPsec, or HTTP authentication (while using SSL).  In any case,
   records of the message content, its security basis, and the digest
   value need to be retained for the NRR process.</t>
        <t>Therefore, if NRR is one of the goals of the policy that is adopted,
   by using the mechanisms of the secure transmission loop mentioned
   above and by retaining appropriate records of authentication at the
   original message sender site, strong evidentiary requirements
   proposed for NRR can be fulfilled.</t>
        <t>Other ways of proceeding may fall short of fulfilling the most
   stringent sets of evidence required for NRR to obtain, but may
   nevertheless be part of a commercial trading agreement and, as such,
   are good enough for the parties involved.  However, if MDNs are
   returned unsigned, evidentiary requirements for NRR are weak; some
   authentication of the identity of the receiver is needed.</t>
      </section>
      <section anchor="https-remark">
        <name>HTTPS Remark</name>
        <t>The following certificate types MUST be supported for SSL server-side
   certificates:</t>
        <artwork><![CDATA[
  o  with URL in the Distinguished Name Common Name attribute

  o  without URL in the Distinguished Name Common Name attribute

  o  self-signed (self-issued)

  o  certification authority certified
]]></artwork>
        <t>The URL, which matches the source server identity, SHOULD be carried
   in the certificate.  However, it is not required that DNS checks or
   reverse lookups to vouch for the accuracy of the URL or server value.</t>
        <t>Because server-side certificates are exchanged, and also trust is
   established during the configuration of the trading partner
   relationship, runtime checks are not required by implementations of
   this specification.</t>
        <t>The complete certification chain MUST be included in all
   certificates.  All certificate verifications MUST "chain to root" or
   to an accepted trust anchor.  Additionally, the certificate hash
   SHOULD match the hash recomputed by the receiver.</t>
      </section>
      <section anchor="replay-remark">
        <name>Replay Remark</name>
        <t>Because business data documents normally contain transaction ids,
   replays (such as resends of not-yet-acknowledged messages) are
   discarded as part of the normal process of duplicate detection.
   Detection of duplicates by Message-Id or by business transaction
   identifiers is recommended.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>RFC 3335 registered two Disposition-Notification-Options parameters</t>
      <artwork><![CDATA[
  Parameter-name: signed-receipt-protocol
  Parameter-name: signed-receipt-micalg
]]></artwork>
      <t>that are also used by this specification (see Section 7.3).</t>
      <t>RFC 3335 also registered on MDN Extension field name</t>
      <artwork><![CDATA[
  Extension field name: Received-content-MIC
]]></artwork>
      <t>that is also used by this specification (see Section 7.4.3).
   Registration of the above is therefore NOT needed.</t>
      <section anchor="registration">
        <name>Registration</name>
        <t>This specification defines an extension to the Message Disposition
   Notification (MDN) protocol for a disposition-modifier in the
   Disposition field of a body of content-type "message/disposition-
   notification".</t>
        <section anchor="disposition-modifier-warning">
          <name>Disposition Modifier 'warning'</name>
          <t>Parameter-name:  warning
   Semantics: See Sections 7.4.3 and 7.5.5 of this document.</t>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Carl Hage, Karen Rosenfeld, Chuck Fenton, and many others have
   provided valuable suggestions that improved this applicability
   statement.  The authors would also like to thank the vendors who
   participated in the Drummond Group Inc. AS2 interoperability testing.
   Their contributions led to great improvement in the clarity of this
   document.</t>
    </section>
    <section anchor="appendix-a-message-examples">
      <name>Appendix A:  Message Examples</name>
      <t>NOTE: All examples are provided for illustration only, and are not
   considered part of the protocol specification.  If an example
   conflicts with the protocol definitions specified above or in the
   other referenced RFCs, the example is wrong.</t>
      <section anchor="a1-signed-message-requesting-a-signed-synchronous-receipt">
        <name>A.1.  Signed Message Requesting a Signed, Synchronous Receipt</name>
        <t>POST /receive HTTP/1.0 <br/>
   Host: 10.234.160.12:80 <br/>
   User-Agent: AS2 Company Server <br/>
   Date: Wed, 31 Jul 2002 13:34:50 GMT <br/>
   From: mrAS2@example.com <br/>
   AS2-Version: 1.1 <br/>
   AS2-From: "  as2Name  " <br/>
   AS2-To: 0123456780000 <br/>
   Subject: Test Case <br/>
   Message-Id: &lt;200207310834482A70BF63@"~~foo~~"&gt; <br/>
   Disposition-Notification-To: mrAS2@example.com <br/>
   Disposition-Notification-Options: signed-receipt-protocol=optional, <br/>
     pkcs7-signature; signed-receipt-micalg=optional,sha1 <br/>
   Content-Type: multipart/signed; boundary="as2BouNdary1as2"; <br/>
     protocol="application/pkcs7-signature"; micalg=sha1 <br/>
   Content-Length: 2464 <br/></t>
        <t>--as2BouNdary1as2 <br/>
   Content-Type: application/edi-x12 <br/>
   Content-Disposition: Attachment; filename=rfc1767.dat <br/></t>
        <artwork><![CDATA[
 {ISA ...EDI transaction data...IEA...} <br>
]]></artwork>
        <t>--as2BouNdary1as2 <br/>
   Content-Type: application/pkcs7-signature <br/></t>
        <artwork><![CDATA[
 {omitted binary pkcs7 signature data}
]]></artwork>
        <t>--as2BouNdary1as2-- <br/></t>
      </section>
      <section anchor="a2-mdn-for-message-a1-above">
        <name>A.2.  MDN for Message A.1, Above</name>
        <t>HTTP/1.0 200 OK <br/>
   AS2-From: 0123456780000 <br/>
   AS2-To: "  as2Name  " <br/>
   AS2-Version: 1.1 <br/>
   Message-ID: &lt;709700825.1028122454671.JavaMail@ediXchange&gt; <br/>
   Content-Type: multipart/signed; micalg=sha1; <br/>
        protocol="application/pkcs7-signature"; <br/>
        boundary="----=_Part_57_648441049.1028122454671" <br/>
   Connection: Close <br/>
   Content-Length: 1980 <br/></t>
        <t>------=_Part_57_648441049.1028122454671  <br/></t>
        <t>&amp; Content-Type: multipart/report;  <br/>
   &amp; Report-Type=disposition-notification; <br/>
   &amp;    boundary="----=_Part_56_1672293592.1028122454656" <br/>
   &amp;<br/>
   &amp;------=_Part_56_1672293592.1028122454656 <br/>
   &amp;Content-Type: text/plain <br/>
   &amp;Content-Transfer-Encoding: 7bit <br/>
   &amp; <br/>
   &amp;MDN for - <br/>
   &amp; Message ID: &lt;200207310834482A70BF63@"~~foo~~"&gt; <br/>
   &amp;  From: "  as2Name  " <br/>
   &amp;  To: "0123456780000" <br/>
   &amp;  Received on: 2002-07-31 at 09:34:14 (EDT) <br/>
   &amp; Status: processed <br/>
   &amp; Comment: This is not a guarantee that the message has <br/>
   &amp;  been completely processed or &amp;understood by the receiving <br/>
   &amp;  translator <br/>
   &amp;<br/>
   &amp;------=_Part_56_1672293592.1028122454656 <br/>
   &amp;Content-Type: message/disposition-notification <br/>
   &amp;Content-Transfer-Encoding: 7bit <br/>
   &amp;<br/>
   &amp;Reporting-UA: AS2 Server <br/>
   &amp;Original-Recipient: rfc822; 0123456780000 <br/>
   &amp;Final-Recipient: rfc822; 0123456780000 <br/>
   &amp;Original-Message-ID: &lt;200207310834482A70BF63@"~~foo~~"&gt; <br/>
   &amp;Received-content-MIC: 7v7F++fQaNB1sVLFtMRp+dF+eG4=, sha1 <br/>
   &amp;Disposition: automatic-action/MDN-sent-automatically; <br/>
   &amp;  processed <br/>
   &amp;<br/>
   &amp;------=_Part_56_1672293592.1028122454656-- <br/></t>
        <t>------=_Part_57_648441049.1028122454671 <br/>
   Content-Type: application/pkcs7-signature; name=smime.p7s <br/>
   Content-Transfer-Encoding: base64 <br/>
   Content-Disposition: attachment; filename=smime.p7s <br/></t>
        <t>MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQ <br/>
   cp24hMJNbxDKHnlB9jTiQzLwSwo+/90Pc87x+Sc6EpFSUYWGAAAAAAAA <br/>
   ------=_Part_57_648441049.1028122454671-- <br/></t>
        <t>Notes:</t>
        <ol spacing="normal" type="1"><li>
            <t>The lines proceeded with "&amp;" are what the signature is calculated
over.</t>
          </li>
          <li>
            <t>For details on how to prepare the multipart/signed with protocol =
"application/pkcs7-signature", see the "S/MIME Message
Specification, PKCS Security Services for MIME".)</t>
          </li>
          <li>
            <t>Note that the textual first body part of the multipart/report can
be used to include a more detailed explanation of the error
conditions reported by the disposition headers.  The first body
part of the multipart/report, when used in this way, allows a
person to better diagnose a problem in detail.</t>
          </li>
          <li>
            <t>As specified by RFC 3462 <xref target="RFC3462"/>, returning the original or portions
of the original message in the third body part of the
multipart/report is not required.  This is an optional body part.
However, it is RECOMMENDED that this body part be omitted or left
blank.</t>
          </li>
        </ol>
      </section>
      <section anchor="a3-signed-encrypted-message-requesting-a-signed-asynchronous-receipt">
        <name>A.3.  Signed, Encrypted Message Requesting a Signed, Asynchronous Receipt</name>
        <t>Message-ID: &lt;#as2_company#01#a4260as2_companyout#&gt; <br/>
   Date: Thu, 19 Dec 2002 15:04:18 GMT <br/>
   From: me@example.com <br/>
   Subject: Async MDN request <br/>
   Mime-Version: 1.0 <br/>
   Content-Type: application/pkcs7-mime; <br/>
     smime-type=enveloped-data; name=smime.p7m <br/>
   Content-Transfer-Encoding: binary <br/>
   Content-Disposition: attachment; filename=smime.p7m <br/>
   Recipient-Address: 10.240.1.2// <br/>
   Disposition-Notification-To: http://10.240.1.2:58201/exchange/as2_company <br/>
   Disposition-Notification-Options: signed-receipt-protocol=optional, <br/>
    pkcs7-signature; signed-receipt-micalg=optional,sha1 <br/>
   Receipt-Delivery-Option: http://10.240.1.2:58201/exchange/as2_company  <br/>
   AS2-From: as2_company <br/>
   AS2-To: "AS2 Test" <br/>
   AS2-Version: 1.1 <br/>
   Host: 10.240.1.2:58101 <br/>
   Connection: close <br/>
   Content-Length: 3428 <br/></t>
        <artwork><![CDATA[
 {omitted binary encrypted data}   <br>
]]></artwork>
      </section>
      <section anchor="a4-asynchronous-mdn-for-message-a3-above">
        <name>A.4.  Asynchronous MDN for Message A.3, Above</name>
        <t>POST / HTTP/1.1 <br/>
   Host: 10.240.1.2:58201 <br/>
   Connection: close, TE <br/>
   TE: trailers, deflate, gzip, compress <br/>
   User-Agent: RPT-HTTPClient/0.3-3I (Windows 2000) <br/>
   Date: Thu, 19 Dec 2002 15:03:38 GMT <br/>
   Message-ID: &lt;AS2-20021219_030338@as2_company.dgi_th&gt; <br/>
   AS2-Version: 1.1 <br/>
   Mime-Version: 1.0 <br/>
   Recipient-Address: http://10.240.1.2:58201/exchange/as2_company <br/>
   AS2-To: as2_company <br/>
   AS2-From: "AS2 Test" <br/>
   Subject: Your Requested MDN Response <br/>
   From: as2debug@example.com <br/>
   Accept-Encoding: deflate, gzip, x-gzip, compress, x-compress <br/>
   Content-Type: multipart/signed; micalg=sha1; <br/>
     protocol="application/pkcs7-signature"; <br/>
     boundary="----=_Part_337_6452266.1040310218750" <br/>
   Content-Length: 3103 <br/></t>
        <t>------=_Part_337_6452266.1040310218750 <br/>
   Content-Type: multipart/report; <br/>
     report-type=disposition-notification; <br/>
     boundary="----=_Part_336_6069110.1040310218718" <br/></t>
        <t>------=_Part_336_6069110.1040310218718 <br/>
   Content-Type: text/plain; charset=us-ascii <br/>
   Content-Transfer-Encoding: 7bit <br/></t>
        <t>The message &lt;x12.edi&gt; sent to Recipient &lt;AS2 Test&gt; on Thu, 19 Dec <br/>
   2002 15:04:18 GMT with Subject &lt;async MDN request&gt; has been received. <br/>
   The EDI Interchange was successfully decrypted, and its integrity was <br/>
   verified.  In addition, the sender of the message, Sender <br/>
   &lt;as2_company&gt; at Location http://10.240.1.2:58201/exchange/as2_company <br/>
   was authenticated as the originator of the message.  There is no <br/>
   guarantee, however, that the EDI interchange was syntactically <br/>
   correct, or that it was received by the EDI application/translator. <br/></t>
        <t>------=_Part_336_6069110.1040310218718 <br/>
   Content-Type: message/disposition-notification <br/>
   Content-Transfer-Encoding: 7bit <br/></t>
        <t>Reporting-UA: AS2@test:8101 <br/>
   Original-Recipient: rfc822; "AS2 Test" <br/>
   Final-Recipient: rfc822; "AS2 Test" <br/>
   Original-Message-ID: &lt;#as2_company#01#a4260as2_companyout#&gt; <br/>
   Disposition: automatic-action/MDN-sent-automatically; <br/>
     processed <br/>
   Received-Content-MIC: Hes6my+vIxIYxmvsA+MNpEOTPAc=, sha1 <br/></t>
        <t>------=_Part_336_6069110.1040310218718-- <br/></t>
        <t>------=_Part_337_6452266.1040310218750 <br/>
   Content-Type: application/pkcs7-signature; name=smime.p7s <br/>
   Content-Transfer-Encoding: base64 <br/>
   Content-Disposition: attachment; filename=smime.p7s <br/></t>
        <t>BhbWjEfbyXoTAS/H0zpnEqLqbaBh29y2v82b8bdeGw8pipBQWmf53hIcqHGM <br/>
   4ZBF3CHw5Wrf1JIE+8TwOzdbal30zeChw88WfRfD7c/j1fIA8sxsujvf2d9j <br/>
   UxCUga8BVdVB9kH0Geexytyt0KvWQXfaEEcgZGUAAAAAAAA= <br/></t>
        <t>------=_Part_337_6452266.1040310218750- <br/></t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2045">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2045"/>
          <seriesInfo name="DOI" value="10.17487/RFC2045"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC2049">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages. This fifth and final document describes MIME conformance criteria as well as providing some illustrative examples of MIME message formats, acknowledgements, and the bibliography. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2049"/>
          <seriesInfo name="DOI" value="10.17487/RFC2049"/>
        </reference>
        <reference anchor="RFC1767">
          <front>
            <title>MIME Encapsulation of EDI Objects</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>Since there are many different EDI specifications, the current document defines three distinct categories as three different MIME content-types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1767"/>
          <seriesInfo name="DOI" value="10.17487/RFC1767"/>
        </reference>
        <reference anchor="RFC2616">
          <front>
            <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="J. Gettys" initials="J." surname="Gettys"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="H. Frystyk" initials="H." surname="Frystyk"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <date month="June" year="1999"/>
            <abstract>
              <t>HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1", and is an update to RFC 2068. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2616"/>
          <seriesInfo name="DOI" value="10.17487/RFC2616"/>
        </reference>
        <reference anchor="RFC3335">
          <front>
            <title>MIME-based Secure Peer-to-Peer Business Data Interchange over the Internet</title>
            <author fullname="T. Harding" initials="T." surname="Harding"/>
            <author fullname="R. Drummond" initials="R." surname="Drummond"/>
            <author fullname="C. Shih" initials="C." surname="Shih"/>
            <date month="September" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3335"/>
          <seriesInfo name="DOI" value="10.17487/RFC3335"/>
        </reference>
        <reference anchor="RFC3798">
          <front>
            <title>Message Disposition Notification</title>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="G. Vaudreuil" initials="G." role="editor" surname="Vaudreuil"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo defines a MIME content-type that may be used by a mail user agent (MUA) or electronic mail gateway to report the disposition of a message after it has been successfully delivered to a recipient. This content-type is intended to be machine-processable. Additional message headers are also defined to permit Message Disposition Notifications (MDNs) to be requested by the sender of a message. The purpose is to extend Internet Mail to support functionality often found in other messaging systems, such as X.400 and the proprietary "LAN-based" systems, and often referred to as "read receipts," "acknowledgements", or "receipt notifications." The intention is to do this while respecting privacy concerns, which have often been expressed when such functions have been discussed in the past. Because many messages are sent between the Internet and other messaging systems (such as X.400 or the proprietary "LAN-based" systems), the MDN protocol is designed to be useful in a multi-protocol messaging environment. To this end, the protocol described in this memo provides for the carriage of "foreign" addresses, in addition to those normally used in Internet Mail. Additional attributes may also be defined to support "tunneling" of foreign notifications through Internet Mail. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3798"/>
          <seriesInfo name="DOI" value="10.17487/RFC3798"/>
        </reference>
        <reference anchor="RFC1847">
          <front>
            <title>Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted</title>
            <author fullname="J. Galvin" initials="J." surname="Galvin"/>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <date month="October" year="1995"/>
            <abstract>
              <t>This document defines a framework within which security services may be applied to MIME body parts. [STANDARDS-TRACK] This memo defines a new Simple Mail Transfer Protocol (SMTP) [1] reply code, 521, which one may use to indicate that an Internet host does not accept incoming mail. This memo defines an Experimental Protocol for the Internet community. This memo defines an extension to the SMTP service whereby an interrupted SMTP transaction can be restarted at a later time without having to repeat all of the commands and message content sent prior to the interruption. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1847"/>
          <seriesInfo name="DOI" value="10.17487/RFC1847"/>
        </reference>
        <reference anchor="RFC3851">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification</title>
            <author fullname="B. Ramsdell" initials="B." role="editor" surname="Ramsdell"/>
            <date month="July" year="2004"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.1. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 2633. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3851"/>
          <seriesInfo name="DOI" value="10.17487/RFC3851"/>
        </reference>
        <reference anchor="RFC3852">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2004"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3852"/>
          <seriesInfo name="DOI" value="10.17487/RFC3852"/>
        </reference>
        <reference anchor="RFC3462">
          <front>
            <title>The Multipart/Report Content Type for the Reporting of Mail System Administrative Messages</title>
            <author fullname="G. Vaudreuil" initials="G." surname="Vaudreuil"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>The Multipart/Report Multipurpose Internet Mail Extensions (MIME) content-type is a general "family" or "container" type for electronic mail reports of any kind. Although this memo defines only the use of the Multipart/Report content-type with respect to delivery status reports, mail processing programs will benefit if a single content-type is used to for all kinds of reports. This document is part of a four document set describing the delivery status report service. This collection includes the Simple Mail Transfer Protocol (SMTP) extensions to request delivery status reports, a MIME content for the reporting of delivery reports, an enumeration of extended status codes, and a multipart container for the delivery report, the original message, and a human-friendly summary of the failure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3462"/>
          <seriesInfo name="DOI" value="10.17487/RFC3462"/>
        </reference>
        <reference anchor="RFC3023">
          <front>
            <title>XML Media Types</title>
            <author fullname="M. Murata" initials="M." surname="Murata"/>
            <author fullname="S. St. Laurent" initials="S." surname="St. Laurent"/>
            <author fullname="D. Kohn" initials="D." surname="Kohn"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document standardizes five new media types -- text/xml, application/xml, text/xml-external-parsed-entity, application/xml- external-parsed-entity, and application/xml-dtd -- for use in exchanging network entities that are related to the Extensible Markup Language (XML). This document also standardizes a convention (using the suffix '+xml') for naming media types outside of these five types when those media types represent XML MIME (Multipurpose Internet Mail Extensions) entities. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3023"/>
          <seriesInfo name="DOI" value="10.17487/RFC3023"/>
        </reference>
        <reference anchor="RFC2822">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="April" year="2001"/>
            <abstract>
              <t>This document specifies a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2822"/>
          <seriesInfo name="DOI" value="10.17487/RFC2822"/>
        </reference>
        <reference anchor="RFC2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC3850">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Certificate Handling</title>
            <author fullname="B. Ramsdell" initials="B." role="editor" surname="Ramsdell"/>
            <date month="July" year="2004"/>
            <abstract>
              <t>This document specifies conventions for X.509 certificate usage by Secure/Multipurpose Internet Mail Extensions (S/MIME) agents. S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing. S/MIME agents validate certificates as described in RFC 3280, the Internet X.509 Public Key Infrastructure Certificate and CRL Profile. S/MIME agents must meet the certificate processing requirements in this document as well as those in RFC 3280. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3850"/>
          <seriesInfo name="DOI" value="10.17487/RFC3850"/>
        </reference>
        <reference anchor="RFC2234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="November" year="1997"/>
            <abstract>
              <t>In the early days of the Arpanet, each specification contained its own definition of ABNF. This included the email specifications, RFC733 and then RFC822 which have come to be the common citations for defining ABNF. The current document separates out that definition, to permit selective reference. Predictably, it also provides some modifications and enhancements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2234"/>
          <seriesInfo name="DOI" value="10.17487/RFC2234"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2246">
          <front>
            <title>The TLS Protocol Version 1.0</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="C. Allen" initials="C." surname="Allen"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2246"/>
          <seriesInfo name="DOI" value="10.17487/RFC2246"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
