WAP Mime types
Pieter Kasselman
pkasselman@baltimore.com
Mon, 4 Mar 2002 15:13:39 -0000
Hi, apologies for any inconvenience caused.
I include the three mime type definitions as text in the main body of the
mail.
Pieter
-------------------------application/vnd.wap.cert-response------------------
----------
From: pkasselman@baltimore.com
To: ietf-types@iana.org
Subject: Registration of MIME media type application/vnd.wap.cert-response
MIME media type name:
application
MIME subtype name:
vnd.wap.cert-response
Required parameters:
None
Optional parameters:
None
Encoding considerations:
The encoding follows the WTLS encoding rules as specified in
[WTLS]. The content takes the form of a CertResponse
structure. This structure is defined in [WPKI].
Security considerations:
This MIME type is used to install new client certificates on a
WAP client device. The structure allows for a X509
certificate, certificate URL or a referral URL to be returned.
Interpreting the MIME type requires the certificate storage
medium to be accessed and modified. If this medium is accessed
or updated incorrectly existing certificate information may be
corrupted. If an incorrect certificate URL is returned, this
may be used as part of a denial of service attack on a server
at a later stage. Likewise the referral URL may be used to
launch a co-ordinated denial of service attack on a server.
Interoperability considerations:
The WAP Forum Ltd. Interoperability Working Group (WIG)
assesses interoperability for all WAP Forum Ltd.
specifications. See [WAP].
Published specification:
This media type is specified in the WPKI specification that
can be found at http://www.wapforum.org/what/technical.htm
The encoding rules and signature generation are defined in the
WTLS specification that can be found at
http://www.wapforum.org/what/technical.htm
Applications which use this media type:
Any application that conforms with the [WPKI] specification.
Additional information:
Magic number(s): None
File extension(s): None
Macintosh File Type Code(s): None
Person & email address to contact for further information:
Pieter Kasselman
Baltimore Technologies
pkasselman@baltimore.com
Intended usage:
COMMON
Author/Change controller:
The WAP Forum Ltd.
References
[WPKI] Wireless Public Key Infrastructure Definition - WAP-
217-WPKI
[WTLS] Wireless Transport Layer Security Specification - WAP-
261-WTLS
-------------------------application/vnd.wap.hashed-certificate-------------
---------------
From: sjosefsson@rsasecurity.com
To: ietf-types@iana.org
Subject: Registration of MIME media type
application/vnd.wap.hashed-certificate
MIME media type name:
application
MIME subtype name:
vnd.wap.hashed-certificate
Required parameters:
None
Optional parameters:
None
Encoding considerations:
The encoding follows the WTLS encoding rules as specified in
[WTLS]. The content takes the form of a TBHTrustedCAInfo
structure. This structure is defined in [WPKI], reproduced
below for informational purposes. The structure is binary
data, and must be encoded for non-binary transport; in 7-bit
environments the Base64 encoding is suitable.
struct {
CharacterSet character_set;
opaque displayName <1..2^8-1>;
} CertDisplayName;
enum { sha1 (0), 255 } HashAlgorithm ;
struct {
uint8 version;
CertDisplayName displayName;
Certificate trustedCACert;
opaque cainfo_url <0..2^8-1>;
HashAlgorithm hash_alg;
} TBHTrustedCAInfo;
Users must enter exactly 80 "effective" bits of hash, which
extracted from the display form and are the leftmost 80 bits
of the SHA-1 hash of the CA information.
Let "hash" be the SHA-1 hash of the encoding of (the encoding
of) a TBHTrustedCAInfo structure. This consists of 160 bits
(h0,..h159), in network byte order, h0 being the leftmost
bit).
The display form of the hash consists of 30 decimal digits,
constructed of 5 blocks of 6 digits. The leftmost 5 digits of
each block represent 16 bits of the effective hash, (i.e. can
take the value '00000' to '65535' decimal), the sixth digit of
each block is a check digit for the block. Block zero consists
of h0 to h15 (with h0 being the most significant bit),
followed by the associated check digit; block one consists of
h16 to h31; followed by the associated check digit etc. That
is if h0 is '1'B and h1 to h15 are all '0'B, then the sixteen
bits have the value '8000'H or '32678' decimal, and the check
digit is '5' decimal (see below for the check digit
calculation method).
The check digit is calculated using the same mechanism as used
for credit card numbers, that is, the LUHN formula (mod 10) as
described below.
The following steps are required to validate a 6 digit group:
Step 1: Double the value of alternate digits of the number
beginning with the second digit from the right (the first
right--hand digit is the check digit.)
Step 2: Add the individual digits comprising the products
obtained in Step 1 to each of the unaffected digits in the
original number.
Step 3: The total obtained in Step 2 must be a number ending
in zero (30, 40, 50, etc.) for the number to be validated.
Example 1: to validate the group 398719, corresponding to
'9BBF'H as the sixteen bits of hash:
Step 1:
3 9 8 7 1 9
x2 x2 x2
------------
6 16 2
Step 2: (6) + 9 +(1+6) + 7 + (2) + 9
Step 3: Sum is 40 = 0 (mod 10): group is validated
Example 2: to validate the group 326785, corresponding to
'8000'H as the sixteen bits of hash:
Step 1:
3 2 6 7 8 5
x2 x2 x2
------------
6 12 16
Step 2: (6) + 2 +(1+2) + 7 + (1+6) + 5
Step 3: Sum is 30 = 0 (mod 10): group is validated
Security considerations:
This MIME type is used to install new CA certificates on a WAP
client device. The TBHTrustedCAInfo structure contains the
new CA certificate, without protection. Due to the sensitive
nature of CA certificates the client uses a checksum value
entered by the user, received "out of band" of the CA
certificate delivery response (e.g. via paper mail), to
guarantee the integrity of the CA certificate. The client
must calculate the checksum of the received TBHTrustedCAInfo
structure and verify it against the manually entered checksum
value.
Interoperability considerations:
The WAP Forum Ltd. Interoperability Working Group (WIG)
assesses interoperability for all WAP Forum
Ltd. specifications. See [WAP].
Published specification:
This media type is specified in the WPKI specification that
can be found at http://www.wapforum.org/what/technical.htm
The encoding rules and signature generation are defined in the
WTLS specification that can be found at
http://www.wapforum.org/what/technical.htm
Applications which use this media type:
Any application that conforms with the [WPKI] specification.
Additional information:
Magic number(s): None
File extension(s): None
Macintosh File Type Code(s): None
Person & email address to contact for further information:
Simon Josefsson
RSA Security
sjosefsson@rsasecurity.com
Intended usage:
COMMON
Author/Change controller:
The WAP Forum Ltd.
References:
[WPKI] Wireless Public Key Infrastructure Definition - WAP-217-WPKI
[WTLS] Wireless Transport Layer Security Specification -
WAP-261-WTLS
[WAP] WAP Forum Certification Program and Policy -
http://www.wapforum.org/cert/go-cert.html
-------------------------vnd.wap.signed-certificate-------------------------
---
From: pkasselman@baltimore.com
To: ietf-types@iana.org
Subject: Registration of MIME media type
application/vnd.wap.signed-certificate
MIME media type name:
application
MIME subtype name:
vnd.wap.signed-certificate
Required parameters:
None
Optional parameters:
None
Encoding considerations:
The encoding follows the WTLS encoding rules as specified in
[WTLS]. The content takes the form of a SignedTrustedCAInfo
structure. This structure is defined in [WPKI].
Security considerations:
This MIME type is used to install new CA certificates on a WAP
client device. The SignedTrustedCAInfo structure contains both
the new CA certificate and the certificate of the signer that
introduces the new CA certificate. The structure is signed as
specified in [WPKI] and [WTLS]. Due to the sensitive nature of
CA certificates the client device must be able to trust the
signer of this structure before the contained certificate is
used. The client must verify the signature contained in the
SignedTrustedCAInfo structure, verify the certificate of the
signer as well as the signature on the new self-signed CA
certificate. If the signer CA is independent of the newly
introduced CA there may be implications for the certification
policies of the two CAs.
Interoperability considerations:
The WAP Forum Ltd. Interoperability Working Group (WIG)
assesses interoperability for all WAP Forum Ltd.
specifications. See [WAP].
Published specification:
This media type is specified in the WPKI specification that
can be found at http://www.wapforum.org/what/technical.htm
The encoding rules and signature generation are defined in the
WTLS specification that can be found at
http://www.wapforum.org/what/technical.htm
Applications which use this media type:
Additional information:
Magic number(s): None
File extension(s): None
Macintosh File Type Code(s): None
Person & email address to contact for further information:
Pieter Kasselman
Baltimore Technologies
pkasselman@baltimore.com
Intended usage:
COMMON
Author/Change controller:
The WAP Forum Ltd.
References:
[WPKI] Wireless Public Key Infrastructure Definition - WAP-
217-WPKI
[WTLS] Wireless Transport Layer Security Specification - WAP-
261-WTLS
> -----Original Message-----
> From: Keith Moore [SMTP:moore@cs.utk.edu]
> Sent: 04 March 2002 14:43
> To: Pieter Kasselman
> Cc: 'ietf-types@iana.org'
> Subject: Re: WAP Mime types
>
> I can't read the proposed type registrations because they are mislabeled
> as application/octet-stream. Perhaps you could repost them with proper
> labelling?
>
> Keith
-----------------------------------------------------------------------------
Baltimore Technologies plc will not be liable for direct, special, indirect
or consequential damages arising from alteration of the contents of this
message by a third party or as a result of any virus being passed on.
This footnote confirms that this email message has been swept by
Baltimore MIMEsweeper for Content Security threats, including
computer viruses.
http://www.baltimore.com