<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ediint-rfc4130bis-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>AS2 Specification Modernization</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ediint-rfc4130bis-01"/>
    <author fullname="Debra Petta">
      <organization>Drummond Group, LLC</organization>
      <address>
        <email>debrap@drummondgroup.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="14"/>
    <keyword>AS2</keyword>
    <keyword>EDIINT</keyword>
    <keyword>B2B</keyword>
    <abstract>
      <?line 68?>

<t>This document provides an applicability statement (RFC 2026, Section 3.2)
describing how to securely exchange structured business data over HTTP.
Structured business data may be XML; Electronic Data Interchange (EDI)
in either the American National Standards Committee (ANSI) X12 format or
the UN Electronic Data Interchange for Administration, Commerce, and
Transport (UN/EDIFACT) format; or other structured data formats. The data
is packaged using standard MIME structures. Authentication and data
confidentiality are obtained by using Cryptographic Message Syntax with
S/MIME security body parts (see <xref target="https-tls-reqs"/>).
Authenticated acknowledgements make use of multipart/signed
Message Disposition Notification (MDN) responses to the original HTTP message.
This applicability statement is informally referred to as "AS2" because
it is the second applicability statement, produced after "AS1" (RFC 3335).
This document obsoletes RFC 4130 and stands on its own without reference to AS1
or SMTP, except where required for IANA registry updates.</t>
      <t>This document also updates IANA registries originally created by RFC
3335 and RFC 4130.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://DrummondGroup.github.io/draft-ietf-ediint-rfc4130bis/draft-ietf-ediint-rfc4130bis.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-ediint-rfc4130bis/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/DrummondGroup/draft-ietf-ediint-rfc4130bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document is a revision ("bis") of RFC 4130, which defined the
Applicability Statement 2 (AS2) protocol for secure and reliable
transport of business data over HTTP. It obsoletes RFC 4130. The purpose
of this revision is to modernize the specification, clarify ambiguities,
and incorporate implementation experience gathered since the publication
of RFC 4130. Subsequent versions of this draft will refine these updates
based on discussion and consensus in the IETF community. This revision
also adheres to the principle of backward compatibility. Implementations
conformant with RFC 4130 remain valid under this specification, and no
breaking changes are introduced. In addition, this document updates
existing IANA registrations from RFC 3335 and RFC 4130. The specific
IANA actions are described in <xref target="iana-considerations"/>.</t>
      <t>Note to readers: Some contributors have suggested that this work could
eventually be split into two documents: a minimal RFC4130bis for errata and
clarifications, and a separate AS2 v2 specification with a clean
modern baseline. This document currently attempts to balance both
objectives within a single text, but further discussion may refine
the scope.</t>
      <section anchor="applicable-rfcs">
        <name>Applicable RFCs</name>
        <t>Previous work on Internet EDI focused on specifying MIME content types
for EDI data. <xref target="RFC1767"/> expands on this to specify a comprehensive set
of data security features, specifically data confidentiality, data
integrity/authenticity, non-repudiation of origin, and non-repudiation
of receipt over HTTP. This document recognizes contemporary RFCs and
avoids re-inventing mechanisms wherever possible. Although this
document focuses on EDI data, any other data types describable in a
MIME format are also supported.</t>
        <t>Internet MIME-based EDI can be accomplished by using and complying with
the following RFCs:</t>
        <artwork><![CDATA[
  o  RFC 2616 Hyper Text Transfer Protocol (baseline: HTTP/1.1)
  o  RFC 1767 EDI Content Type
  o  RFC 3023 XML Media Types
  o  RFC 1847 Security Multiparts for MIME
  o  RFC 3462 Multipart/Report
  o  RFC 2045 to 2049 MIME RFCs
  o  RFC 8098 Message Disposition Notification (updates RFC 3798)
  o  RFC 5751 S/MIME v3.2 Specification (obsoletes RFC 3851)
  o  RFC 8551 S/MIME v4.0 (obsoletes RFC 5751)
  o  RFC 5652 Cryptographic Message Syntax (CMS) (obsoletes RFC 3852)
]]></artwork>
        <t>This specification references S/MIME Version 4.0 <xref target="RFC8551"/> as the
baseline for algorithm requirements and security message formats.
S/MIME 4.0 introduces AuthEnvelopedData, which provides authenticated
encryption for algorithms such as AES-GCM and AES-CCM. For backward
compatibility with implementations that have not yet migrated to
S/MIME 4.0, this specification also permits the use of EnvelopedData
from S/MIME 3.2 <xref target="RFC5751"/> when using algorithms such as AES-CBC that
require separate integrity protection. The choice between
AuthEnvelopedData and EnvelopedData is determined by the content
encryption algorithm selected (see <xref target="encryption-algorithms"/>
for details).</t>
        <t>Our intent here is to define clearly and precisely how these are used
together, and what is required by user agents to be compliant with this
document. Implementers should note that HTTP/2 and HTTP/3 MAY be used
as transports, but are not required for interoperability.</t>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> and <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>
      </section>
      <section anchor="backward-compatibility-and-interoperability">
        <name>Backward Compatibility and Interoperability</name>
        <t>A central design principle of this specification is "backward
compatibility" with RFC 4130 and with the underlying RFCs it references.
This specification does not redefine or override backward-compatibility
rules established in those RFCs. Implementations MUST rely on the
mechanisms provided in underlying standards.</t>
        <t>Consistent with the Robustness Principle ("be conservative in what you send and liberal in what you receive"),
this document clarifies requirements and aligns terminology but does not introduce breaking changes.
Implementations that conformed to RFC 4130 remain conformant to this specification. Any deviations
are limited to clarifications intended to improve interoperability.</t>
        <t>This specification establishes S/MIME Version 4.0 <xref target="RFC8551"/> as the
baseline for conformant implementations. Implementations MUST support
S/MIME 4.0 message formats (including AuthEnvelopedData) and the
algorithm requirements specified in <xref target="algorithm-requirements"/>.
Implementations SHOULD also support S/MIME Version 3.2 <xref target="RFC5751"/> for
backward compatibility with legacy trading partners that have not yet
migrated to S/MIME 4.0. When both partners support S/MIME 4.0,
implementations SHOULD use AuthEnvelopedData with authenticated
encryption algorithms (AES-GCM, AES-CCM) for improved security.
When interoperating with S/MIME 3.2 systems, implementations SHOULD use
EnvelopedData with algorithms such as AES-CBC that require separate
integrity protection via digital signatures.</t>
        <t>This specification defines requirements for modern AS2 deployments
using contemporary cryptographic algorithms. It does not redefine or
extend the use of weak algorithms such as 3DES or SHA-1. When both
partners support this version of AS2, only modern algorithms are in
scope.</t>
        <t>When interoperability with RFC 4130 systems is required, implementers
SHOULD apply the clarifications provided in <xref target="legacy-interoperability-non-normative"/>
(Legacy Interoperability). <xref target="legacy-interoperability-non-normative"/> is non-normative and does not alter the
algorithm requirements defined in <xref target="algorithm-requirements"/>, but records expected
behavior when communicating with legacy systems.</t>
        <section anchor="legacy-interoperability-non-normative">
          <name>Legacy Interoperability (Non-Normative)</name>
          <t>This section provides the conditions for interoperability with
   legacy AS2 implementations conforming to <xref target="RFC4130"/>. These provisions
   apply only when a modern AS2 implementation communicates with a
   partner that has not migrated to this specification. In such cases,
   both parties are effectively operating under <xref target="RFC4130"/>, not this
   document.</t>
          <t>These notes are provided to reduce ambiguity and ensure consistent
   behavior across implementations. They do not alter the algorithm
   requirements specified in <xref target="algorithm-requirements"/>, nor do they extend the use of
   deprecated algorithms.</t>
          <t>Examples of legacy considerations include:</t>
          <artwork><![CDATA[
     o  **Message Integrity Checks (MICs):** Implementations may continue
        to accept SHA-1 for MIC calculations when required by legacy
        partners. SHA-1 SHOULD NOT be generated by conformant modern
        implementations, but SHA-1 values SHOULD continue to be used to
        maintain backward compatibility.

     o  **Encryption Algorithms:** Implementations may accept inbound
        messages encrypted with 3DES from legacy partners. However, 3DES
        SHOULD NOT be generated by conformant implementations. AES (128-bit
        or stronger) remains the normative requirement in Section 7.2.

        Note: NIST withdrew the 3DES specification on 1 January 2024, and
        disallowed the two-key variant in 2017. Any residual use of 3DES is
        for backward compatibility only and SHOULD NOT be generated by
        conformant implementations.

     o  **Multiple-Recipient Encryption:** RFC 4130 did not clearly
        specify expected behavior for multiple-recipient support. Modern
        implementations SHOULD support recoverable encryption by including
        a copy of the content-encryption key (CEK) for each recipient,
        and SHOULD include one for the originator when feasible. Legacy
        implementations may omit this; modern systems should tolerate it.

     o  **Error Handling:** When encountering unsupported algorithms or
        malformed cryptographic structures in legacy exchanges,
        implementations SHOULD generate a clear error condition (e.g.,
        an unsigned MDN reporting "unsupported-mic-algorithm"). Silent
        fallback to weaker algorithms is NOT RECOMMENDED.

     o  **Profile Selection:** Implementations may provide administrators
        the ability to select profiles (e.g., "AS2-1.2 legacy mode" versus
        "AS2-1.3 modern mode") for specific trading partner agreements,
        ensuring predictable behavior without runtime handshakes.
]]></artwork>
          <t>These clarifications are provided for reference and consistency
   across vendors. They are non-normative and are not intended to
   redefine <xref target="RFC4130"/> or to weaken the algorithm requirements of this
   specification. Refer to <xref target="backward-compatibility-and-interoperability"/>
   for discussion of backward compatibility principles, and Section 7
   for normative algorithm requirements.</t>
        </section>
      </section>
      <section anchor="rationale">
        <name>Rationale</name>
        <t>The updates in this specification reflect community consensus to:</t>
        <artwork><![CDATA[
     o  Preserve backward compatibility with RFC 4130 and the underlying
        RFCs it references.
     o  Provide explicit guidance on which protocol versions form the
        interoperability baseline for certification and testing.
     o  Incorporate de facto updates already widely deployed (e.g., RFC 8098
        for MDNs, migration from SHA-1 to SHA-2 wherever possible).
     o  Document stronger security requirements while allowing
        backward-compatible fallback to enable phased adoption.
     o  Avoid unnecessary disruption by permitting, but not requiring,
        newer transport features such as HTTP/2, and by clarifying rather
        than redefining MDN behavior.
]]></artwork>
        <t>This approach reduces ambiguity, simplifies testing, and ensures interoperability
across implementations.</t>
      </section>
      <section anchor="terms">
        <name>Terms</name>
        <sourcecode type="text"><![CDATA[
   AS2:     Applicability Statement 2 (this document) and [RFC4130]; see RFC 2026
            [RFC2026], Section 3.2

   EDI:     Electronic Data Interchange

   EC:      Electronic Commerce (often referred to as Business to Business, B2B).

   B2B:     Business to Business

   Receipt: The functional message that is sent from a receiver to a
            sender to acknowledge that an EDI/EC interchange has been
            received. This message may be either synchronous or asynchronous
            in nature.

   Signed Receipt: A receipt with a digital signature.

   Synchronous Receipt: A receipt returned to the sender over the same
            HTTP connection as the sender's original message.

   Asynchronous Receipt: A receipt returned to the sender over a different
            HTTP connection than the sender's original message.

   Message Disposition Notification (MDN): The Internet messaging format
            used to convey a receipt. This term is used interchangeably
            with receipt. An MDN is a receipt.

   Non-repudiation of receipt (NRR): A "legal event" that occurs when
            the original sender of an signed EDI/EC interchange has
            verified the signed receipt coming back from the receiver.
            The receipt contains data identifying the original message
            for which it is a receipt, including the message-ID and a
            cryptographic hash (MIC). The original sender must retain
            suitable records providing evidence concerning the message
            content, its message-ID, and its hash value. The original
            sender verifies that the retained hash value is the same as
            the digest of the original message, as reported in the
            signed receipt. NRR is not considered a technical message,
            but instead is thought of as an outcome of possessing
            relevant evidence.

   S/MIME:  A format and protocol for adding cryptographic signature
            and/or encryption services to Internet MIME messages. See
            [RFC8551] for the current S/MIME specification.

   Cryptographic Message Syntax (CMS): An encapsulation syntax used to
            digitally sign, digest, authenticate, or encrypt arbitrary
            messages.

   SHA-1:   A secure, one-way hash algorithm used in conjunction with
            digital signature. This algorithm is retained for backward
            compatibility but is deprecated in this specification.
            Implementations MUST support SHA-256 or stronger where possible,
            and SHOULD prefer these algorithms in production environments
            unless legacy partners cannot yet migrate to SHA-256 or stronger.

   MD5:     A secure, one-way hash algorithm used in conjunction with
            digital signature. This algorithm is obsolete and MUST NOT be generated
            by conformant implementations.

   MIC:     The Message Integrity Check (MIC) is a cryptographic method used
            to verify that a message has not been altered or tampered with during
            transmission or storage, ensuring the data is trustworthy and complete.
            It works by generating a unique hash value from the message's contents,
            which is then transmitted with the message. The recipient recalculates
            the hash on the received message and compares it to the provided MIC;
            if they don't match, the message is discarded, indicating it was modified.

   User Agent (UA): The application that handles and processes the AS2 request.
]]></sourcecode>
      </section>
    </section>
    <section anchor="overview">
      <name>Overview</name>
      <section anchor="overall-operation">
        <name>Overall Operation</name>
        <t>An HTTP POST operation <xref target="RFC2616"/> is used to send appropriately packaged EDI,
   XML, or other business data. The Request-URI (<xref target="RFC2616"/>, Section 10.5)
   identifies a process for unpacking and handling the message data and
   for generating a reply for the client that contains a message
   disposition acknowledgement (MDN), either signed or unsigned. The
   MDN is either returned in the HTTP response message body or by a new
   HTTP POST operation to a URL for the original sender.</t>
        <t>This request/reply transactional interchange can provide secure,
   reliable, and authenticated transport for EDI or other business data
   using HTTP as a transfer protocol. HTTPS is REQUIRED as the default
   transport for modern implementations (see <xref target="https-tls-reqs"/>).</t>
        <t>The security protocols and structures used also support auditable
   records of these document data transmissions, acknowledgements, and
   authentication.</t>
        <t>The message formats and processing requirements described below maintain
   strict backward compatibility (see <xref target="backward-compatibility-and-interoperability"/>).</t>
      </section>
      <section anchor="purpose-of-a-security-guideline-for-mime-edi">
        <name>Purpose of a Security Guideline for MIME EDI</name>
        <t>The purpose of these specifications is to ensure interoperability
   between B2B EC user agents, invoking some or all of the commonly
   expected security features.  This document is not limited to
   strict EDI use; it applies to any electronic commerce application for
   which business data needs to be exchanged securely over the Internet.</t>
      </section>
      <section anchor="definitions">
        <name>Definitions</name>
        <section anchor="the-secure-transmission-loop">
          <name>The Secure Transmission Loop</name>
          <t>This document's focus is on the formats and protocols for exchanging
   EDI/EC content securely over HTTP.</t>
          <t>In the "secure transmission loop" for EDI/EC, one organization sends
   a signed, encrypted and compressed EDI/EC interchange to another organization
   and requests a signed receipt, and later the receiving organization sends
   this signed receipt back to the sending organization. In other words, the
   following transpires:</t>
          <artwork><![CDATA[
     o  The organization sending EDI/EC data signs, encrypts and compresses
        the data using S/MIME. In addition, the message will request that
        a signed receipt be returned to the sender. To support NRR,
        the original sender retains records of the message, message-ID,
        and digest (MIC) value.

     o  The receiving organization decompresses and decrypts the message and
        verifies the signature, resulting in verified integrity of the data and
        authenticity of the sender.

     o  The receiving organization then returns a signed receipt using
        the HTTP reply body or a separate HTTP POST operation to the
        sending organization in the form of a signed message
        disposition notification.  This signed receipt will contain the
        hash of the received message, allowing the original sender to
        have evidence that the received message was authenticated
        and/or decrypted properly by the receiver.
]]></artwork>
          <t>The above describes functionality that, if implemented, will satisfy
   all security requirements and implement non-repudiation of receipt
   for the exchange.  This specification, however, leaves full
   flexibility for users to decide the degree to which they want to
   deploy those security features with their trading partners.</t>
        </section>
        <section anchor="definition-of-receipts">
          <name>Definition of Receipts</name>
          <t>The term used for both the functional activity and the message for
   acknowledging delivery of an EDI/EC interchange is "receipt" or
   "signed receipt". The first term is used if the acknowledgment is
   for an interchange resulting in a receipt that is NOT signed. The
   second term is used if the acknowledgement is for an interchange
   resulting in a receipt that IS signed.</t>
          <t>The term non-repudiation of receipt (NRR) is often used in
   combination with receipts. NRR refers to a legal event that occurs
   only when the original sender of an interchange has verified the
   signed receipt coming back from the recipient of the message, and has
   verified that the returned MIC value inside the MDN matches the
   previously recorded value for the original message.</t>
          <t>NRR is best established when both the original message and the
   receipt make use of digital signatures. See the Security
   Considerations section for some cautions regarding NRR.
   For information on how to format and process receipts in AS2, refer
   to refer to Section 8.</t>
        </section>
      </section>
      <section anchor="assumptions">
        <name>Assumptions</name>
        <section anchor="ediec-process-assumptions">
          <name>EDI/EC Process Assumptions</name>
          <artwork><![CDATA[
  o  Encrypted object is an EDI/EC Interchange.

     This specification assumes that a typical EDI/EC interchange (i.e., the payload)
     is the lowest-level object that will be subject to security services.

     Specifically, in EDI ANSI X12, this means that anything between and
     including, segments ISA and IEA is secured. In EDIFACT, this means
     that anything between, and including, segments UNA/UNB and UNZ is
     secured. In other words, the EDI/EC interchanges including envelope
     segments remain intact and unreadable during fully secured transport.

  o  EDI envelope headers are encrypted.

     Congruent with the above statement, EDI envelope headers are NOT
     visible in the MIME package.

     In order to optimize routing from existing commercial EDI networks
    (called Value Added Networks or VANs) to the Internet, it was previously
    useful to make some envelope information visible. Since the EDI/EC message exchanges
    are routed over the public Internet and not over VANs, this
    specification provides no support for this optimization.

  o  X12.58 and UN/EDIFACT Security Considerations

    The most common EDI standards bodies, ANSI X12 and EDIFACT, have
    defined internal provisions for security. X12.58 is the security
    mechanism for ANSI X12, and AUTACK provides security for EDIFACT.
    This specification does NOT dictate use or non-use of these security
    standards. They are both fully compatible, though possibly
    redundant, with this specification.
]]></artwork>
        </section>
        <section anchor="flexibility-assumptions">
          <name>Flexibility Assumptions</name>
          <artwork><![CDATA[
  o  Encrypted or Unencrypted Data

    This specification allows for EDI/EC message exchange in which the
    EDI/EC data can be either unprotected or protected by means of
    encryption.

  o  Signed or Unsigned Data

    This specification allows for EDI/EC message exchange with or without
    digital signature of the original EDI transmission.

  o  Compressed or Uncompressed Data

    This specification allows for optional compression and MAY be applied alone
    or in combination with signing and/or encryption, as defined in [RFC3274].
    It is supported by AS2-Version: 1.1 and higher.

  o  Optional Use of Receipt

    This specification allows for EDI/EC message transmission with or
    without a request for receipt notification.  A signed receipt
    notification is requested; however, a MIC value is REQUIRED as part
    of the returned receipt, except when a severe error condition
    prevents computation of the digest value. In the exceptional case, a
    signed receipt should be returned with an error message that
    effectively explains why the required MIC value is absent.

  o  Use of Synchronous or Asynchronous Receipts

    In addition to a receipt request, this specification allows for the
    designation of the type of receipt that should be returned. It
    supports synchronous or asynchronous receipts in the MDN format.

  o  Security Formatting

    This specification relies on the guidelines set forth in RFC
    5751/5652  [RFC5751] / [RFC5652] "S/MIME Version 3.2 Message Specification;
    Cryptographic Message Syntax" as well as RFC 8551 [RFC8551] "Secure/Multipurpose Internet
    Mail Extensions (S/MIME) Version 4.0" for modern implementations.

  o  Hash Function, Message Digest Choices

    When a signature is used, implementations MUST support SHA-256 and SHOULD
    support SHA-384 or stronger. SHA-1 MAY be supported for incoming messages
    for backward compatibility, but SHOULD NOT be generated for outgoing messages
    unless it is strictly required for interoperability. MD5 is obsolete
    and MUST NOT be generated by conformant implementations.

  o  Encryption Algorithms

    For content encryption, implementations MUST support AES-128-CBC and
    AES-256-CBC. Implementations are RECOMMENDED to support authenticated
    encryption modes such as AES-GCM and AES-CCM, which use AuthEnvelopedData
    (S/MIME 4.0). When using AES-GCM or AES-CCM, implementations MUST use
    AuthEnvelopedData. When using AES-CBC or other non-authenticated modes,
    implementations MUST use EnvelopedData with separate integrity protection
    via digital signatures. Triple-DES (3DES) and RC2 are deprecated and SHOULD NOT
    be generated by conformant implementations, though they SHOULD be accepted
    for backward compatibility with legacy systems. A single content encryption
    algorithm MUST be used for all recipients of a given message; it is not
    permitted to encrypt the same message with AES-CBC for some recipients and
    AES-GCM for others.

  o  Key Management Algorithms

    For key transport, implementations MUST support RSA with a minimum key
    length of 2048 bits. Implementations MAY support key agreement algorithms such
    as Diffie-Hellman or Elliptic Curve Diffie-Hellman (ECDH) as specified
    in [RFC5753]. When using elliptic curves, implementations SHOULD support
    NIST P-256 (secp256r1) or stronger curves.

  o  Permutation Summary

    The optional use of compression, as defined in [RFC3274] was introduced in AS2-Version 1.1.
    Compression can be applied to the message payload before encryption and either before or
    after signing, reducing transmission size and improving efficiency. Most modern AS2 implementations
    support compression, and it can be used by itself or in combination with signing and encryption.

    AS2 supports flexible combinations of encryption, signature, compression, and receipt
    options. These combinations are determined by partner agreements and are not mandated
    by this specification. The protocol supports:

        o  Encrypted or unencrypted message transmission
        o  Signed or unsigned message content
        o  Compressed or uncompressed payload
        o  Synchronous or asynchronous MDN delivery
        o  Signed or unsigned MDN responses (when requested)
]]></artwork>
          <t>The specific security posture for any given trading relationship is determined by
   business requirements and partner agreements. For detailed implementation guidance
   on secure configurations, see <xref target="security-considerations"/>.</t>
          <t><strong>Key Notes</strong></t>
          <artwork><![CDATA[
     o  Compression MAY be applied alone or in combination with signing and/or encryption, as defined in [RFC3274] and is supported
        by AS2-Version 1.1 and higher.

     o  Compression is always applied before encryption. However, implementations MAY apply compression
        either before or after signing - that is, an implementation may sign-then-compress or
        compress-then-sign. Conformant implementations MUST be able to decompress messages regardless
        of whether compression was applied before or after signing.

     o  The MIC (Message Integrity Check) computation is always applied to the signed portion of the
        message and includes the inner MIME headers in the signature calculation.

     o  The most secure configuration combines compression, signing, encryption,
        and a signed receipt, offering the full suite of security and efficiency features described in
        Section 2.3.1.

     o  The receipts may be either synchronous or asynchronous, and the choice does not change the nature of
        the secure transmission loop in support of NRR.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="referenced-rfcs-and-their-contributions">
      <name>Referenced RFCs and Their Contributions</name>
      <section anchor="rfc-2616-http-v11">
        <name>RFC 2616 HTTP v1.1</name>
        <t><xref target="RFC2616"/> specifies how data is transferred using HTTP.</t>
      </section>
      <section anchor="rfc-1847-mime-security-multiparts">
        <name>RFC 1847 MIME Security Multiparts</name>
        <t><xref target="RFC1847"/> defines security multipart for MIME:
   multipart/encrypted and multipart/signed.</t>
      </section>
      <section anchor="rfc-3462-multipartreport">
        <name>RFC 3462 Multipart/Report</name>
        <t><xref target="RFC3462"/> defines the use of the multipart/report content type,
   something that the MDN RFC 3798 builds upon.</t>
      </section>
      <section anchor="rfc-1767-edi-content">
        <name>RFC 1767 EDI Content</name>
        <t><xref target="RFC1767"/> defines the use of content type "application" for ANSI X12
   (application/EDI-X12), EDIFACT (application/EDIFACT), and mutually
   defined EDI (application/EDI-Consent).</t>
      </section>
      <section anchor="rfc-2045-2046-and-2049-mime">
        <name>RFC 2045, 2046, and 2049 MIME</name>
        <t><xref target="RFC2045"/>, <xref target="RFC2046"/>, and <xref target="RFC2049"/> are the basic MIME standards, upon
   which all MIME related RFCs build, including this one. Key contributions
   include definitions of "content type", "sub-type", and "multipart", as
   well as encoding guidelines, which establish 7-bit US-ASCII as the
   canonical character set to be used in Internet messaging.</t>
      </section>
      <section anchor="rfc-3798-message-disposition-notification">
        <name>RFC 3798 Message Disposition Notification</name>
        <t><xref target="RFC3798"/> defines how an MDN is requested, and the format and
   syntax of the MDN. The MDN is the basis upon which receipts and
   signed receipts are defined in this specification.</t>
      </section>
      <section anchor="rfc-5751-and-5652-smime-version-32-message-specifications-and-cryptographic-message-syntax-cms">
        <name>RFC 5751 and 5652 S/MIME Version 3.2 Message Specifications and Cryptographic Message Syntax (CMS)</name>
        <t><xref target="RFC5751"/> and <xref target="RFC5652"/> describe how S/MIME carries CMS Objects.</t>
      </section>
      <section anchor="rfc-3023-xml-media-types">
        <name>RFC 3023 XML Media Types</name>
        <t><xref target="RFC3023"/> defines the use of content type "application" for XML
   (application/xml).</t>
      </section>
      <section anchor="rfc-3274-compressed-data-content-type-for-cryptographic-message-syntax-cms">
        <name>RFC 3274 Compressed Data Content Type for Cryptographic Message Syntax (CMS)</name>
        <t><xref target="RFC3274"/> defines a mechanism for compressing data within the Cryptographic Message Syntax (CMS),
   which is the foundation for Secure/Multipurpose Internet Mail Extensions (S/MIME).
   It specifies a CompressedData content type that allows data to be compressed prior to being
   signed or encrypted. This reduces the size of transmitted messages and improves efficiency without
   altering the security services provided by signing or encryption.
   AS2-Version 1.1 incorporated the compression capability described in RFC 3274, enabling trading partners
   to optionally apply compression to message payloads before signing and/or encrypting.
   Most modern AS2 implementations support this feature to reduce bandwidth usage and improve transmission
   performance, particularly for large payloads.</t>
      </section>
    </section>
    <section anchor="structure-of-an-as2-message">
      <name>Structure of an AS2 Message</name>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <t>The basic structure of an AS2 message consists of MIME format inside
   an HTTP message with a few additional specific AS2 headers. The
   structures below are described hierarchically in terms of which RFCs
   are applied to form the specific structure. For details on how to
   code in compliance with all RFCs involved, refer to the specific RFCs.
   Any difference between AS2 implementations and RFCs are mentioned
   specifically in the sections below.</t>
      </section>
      <section anchor="structure-of-an-internet-edi-mime-message">
        <name>Structure of an Internet EDI MIME Message</name>
        <sourcecode type="text"><![CDATA[
   No encryption, no signature, no compression
      - RFC2616/2045
        - RFC1767/RFC3023 (application/EDIxxxx or /xml)

   No encryption, signature, no compression
      - RFC2616/2045
        - RFC1847 (multipart/signed)
          - RFC1767/RFC3023 (application/EDIxxxx or /xml)
          - RFC5751 (application/pkcs7-signature)

   Encryption, no signature, no compression
      - RFC2616/2045
        - RFC5751 (application/pkcs7-mime)
          - RFC1767/RFC3023  (application/EDIxxxx or /xml) (encrypted)

   Encryption, signature, no compression
      - RFC2616/2045
        - RFC5751 (application/pkcs7-mime)
          - RFC1847 (multipart/signed)(encrypted)
            - RFC1767/RFC3023  (application/EDIxxxx or /xml) (encrypted)
            - RFC5751 (application/pkcs7-signature)(encrypted)

   No encryption, no signature (with optional compression)
      - RFC2616/2045
        - RFC3274 (application/pkcs7-mime; CompressedData) [optional]
          - RFC1767/RFC3023 (application/EDIxxxx or /xml)

   No encryption, signature (compression may occur before or after signing)
      - RFC2616/2045
        - [optional RFC3274 (CompressedData) if compress-before-sign]
          - RFC1847 (multipart/signed)
            - [optional RFC3274 (CompressedData) if compress-after-sign]
              - RFC1767/RFC3023 (application/EDIxxxx or /xml)
              - RFC5751 (application/pkcs7-signature)

   Encryption, no signature (with optional compression)
       - RFC2616/2045
         - RFC5751 (application/pkcs7-mime)
           - [optional RFC3274 (CompressedData)]
             - RFC1767/RFC3023 (application/EDIxxxx or /xml) (encrypted)

   Encryption, signature (compression may occur before or after signing)
      - RFC2616/2045
        - RFC5751 (application/pkcs7-mime)
          - [optional RFC3274 (CompressedData) if compress-before-sign]
            - RFC1847 (multipart/signed) (encrypted)
              - [optional RFC3274 (CompressedData) if compress-after-sign]
              - RFC1767/RFC3023 (application/EDIxxxx or /xml) (encrypted)
              - RFC5751 (application/pkcs7-signature) (encrypted)

   MDN over HTTP, no signature
      - RFC2616/2045
        - RFC3798 (message/disposition-notification)

   MDN over HTTP, signature
      - RFC2616/2045
        - RFC1847 (multipart/signed)
         - RFC3798 (message/disposition-notification)
         - RFC5751 (application/pkcs7-signature)
]]></sourcecode>
        <t><strong>Key Notes</strong></t>
        <artwork><![CDATA[
     o  RFC 3274 (CompressedData) is the normative reference for compression.

     o  Compression MAY be combined with signing and/or encryption in either order,
        but the choice affects what the digital signature covers.

     o  Many implementations compress before signing and encrypting to maximize size
        reduction, but compression after signing and before encrypting MUST also be supported.

     o  Although all MIME content types SHOULD be supported, the following
        MIME content types MUST be supported:

            Content-type: multipart/signed
            Content-Type: multipart/report
            Content-type: message/disposition-notification
            Content-Type: application/PKCS7-signature
            Content-Type: application/PKCS7-mime

     o  Implementations SHOULD support the following content types based on
        intended use:

            Content-Type: application/EDI-X12 (for ANSI X12 EDI)
            Content-Type: application/EDIFACT (for UN/EDIFACT EDI)
            Content-Type: application/edi-consent
            Content-Type: application/XML (for XML-based structured data)
]]></artwork>
      </section>
    </section>
    <section anchor="http-considerations">
      <name>HTTP Considerations</name>
      <t>This specification is based on HTTP/1.1 <xref target="RFC2616"/>. Implementations MAY use
HTTP/2 or HTTP/3 as the transport protocol when supported by both trading
partners.</t>
      <section anchor="sending-edi-in-http-post-requests">
        <name>Sending EDI in HTTP POST Requests</name>
        <t>The request line will have the form: "POST Request-URI HTTP/1.1",
   with spaces and followed by a CRLF. The Request URI is typically
   exchanged out of band, as part of setting up a bilateral trading
   partner agreement. Applications SHOULD be prepared to deal with an
   initial reply containing a status indicating a need for
   authentication of the usual types used for authorizing access to the
   Request-URI (<xref target="RFC2616"/>, Section 10.4.2 and elsewhere).</t>
        <t>The request line is followed by entity headers specifying content
   length (<xref target="RFC2616"/>, Section 14.14) and content type (<xref target="RFC2616"/>, Section 14.18).
   The Host request header (<xref target="RFC2616"/>, Sections 9 and 14.23) is also included.</t>
        <t>When using Transport Layer Security (TLS), the request-URI MUST
   indicate the appropriate scheme value, HTTPS. Implementations MUST
   support TLS 1.3 or higher. TLS 1.3 <xref target="RFC8446"/> is the current IETF
   standard and MUST be supported by all implementations. TLS 1.2
   <xref target="RFC5246"/> MAY be used when interoperating with systems that have not
   yet migrated to TLS 1.3. Further guidance on TLS usage is provided
   in <xref target="https-tls-reqs"/>. Encrypted message bodies MAY be used in addition
   to TLS when required by business policy.</t>
        <t>The receiving AS2 system MAY disconnect from the sending AS2 system
   before completing the reception of the entire entity if it determines
   that the entity being sent is too large to process.</t>
        <t>For HTTP version 1.1, TCP persistent connections are the default,
   (<xref target="RFC2616"/> Sections 8.1.2, 8.2, and 19.7.1). A number of other differences
   exist because HTTP does not conform to MIME <xref target="RFC2616"/> as used in SMTP
   transport.  Relevant differences are summarized below.</t>
      </section>
      <section anchor="unused-mime-headers-and-operations">
        <name>Unused MIME Headers and Operations</name>
        <section anchor="content-transfer-encoding-not-used-in-http-transport">
          <name>Content-Transfer-Encoding Not Used in HTTP Transport</name>
          <t>HTTP can handle binary data and so there is no need to use the
   content transfer encodings of MIME <xref target="RFC2616"/>. This difference is discussed
   in <xref target="RFC2616"/>, Section 19.4.5. However, a content transfer encoding value
   of binary or 8-bit is permissible but not required. The absence of
   this header MUST NOT result in transaction failure. Content transfer
   encoding of MIME bodyparts within the AS2 message body is also
   allowed.</t>
        </section>
        <section anchor="message-bodies">
          <name>Message Bodies</name>
          <t>In <xref target="RFC2616"/>, Section 3.7.2, it is explicitly noted that multiparts MUST
   have null epilogues.</t>
          <t>For HTTP transport, large files SHOULD be handled correctly by the TCP layer.
   In addition, <xref target="RFC2616"/>, Sections 3.5 and 3.6 describe options for compressing or
   chunking entities to be transferred, and Section 8.1.2.2 describes a pipelining
   option that is useful for segmenting large amounts of data.
   These clarifications are consistent with existing AS2 practice and maintain full
   backward compatibility (see <xref target="backward-compatibility-and-interoperability"/>).</t>
        </section>
      </section>
      <section anchor="modification-of-mime-or-other-headers-or-parameters-used">
        <name>Modification of MIME or Other Headers or Parameters Used</name>
        <section anchor="content-length">
          <name>Content-Length</name>
          <t>The use of the content-length header MUST follow the guidelines of
   <xref target="RFC2616"/>, specifically Sections 4.4 and 14.13.</t>
        </section>
        <section anchor="final-recipient-and-original-recipient">
          <name>Final Recipient and Original Recipient</name>
          <t>The final and original recipient values SHOULD be the same value.
   These values MUST NOT be aliases or mailing lists.</t>
        </section>
        <section anchor="message-id-and-original-message-id">
          <name>Message-Id and Original-Message-Id</name>
          <t>The <tt>Message-Id</tt> and <tt>Original-Message-Id</tt> headers identify a message
   uniquely and are formatted as defined in <xref target="RFC5322"/>, Section 3.6.4:</t>
          <artwork><![CDATA[
      "<" id-left "@" id-right ">"
]]></artwork>
          <t>The length of a <tt>Message-Id</tt> value MUST NOT exceed 998 characters.
   For maximum interoperability, the length SHOULD be 255 characters or less.</t>
          <t>The <tt>Message-Id</tt> value MUST be globally unique, and the <tt>id-right</tt>
   portion SHOULD be something unique to the sending host environment
   (for example, a fully qualified domain name).</t>
          <t>Implementations that generate <tt>Message-Id</tt> values MUST NOT include
   spaces or control characters. Implementations SHOULD remove spaces
   rather than substitute another character when constructing identifiers
   from other message attributes such as <tt>AS2-From</tt> or <tt>AS2-To</tt>.</t>
          <t>Receivers are not required to accept malformed identifiers. If a
   message is received with a <tt>Message-Id</tt> that contains spaces or
   control characters, the implementation SHOULD treat it as
   syntactically invalid and SHOULD return an MDN with a disposition of
   <tt>processed/error</tt> and a human-readable explanation such as
   "invalid-message-id" (see <xref target="RFC8098"/>). If an implementation chooses
   to proceed despite the malformed identifier, it MUST NOT propagate or
   generate a new message using that malformed value.</t>
          <t>When sending a message, the <tt>Message-Id</tt> field value MUST be enclosed
   in angle brackets (“&lt;” and “&gt;”). The brackets are not part of the
   actual identifier value. For backward compatibility, receiving
   implementations SHOULD NOT reject a message that omits angle brackets.</t>
          <t>When creating the <tt>Original-Message-Id</tt> header in an MDN, always use
   the exact syntax as received on the original message; do not strip or
   add angle brackets.</t>
          <t>See <xref target="RFC5322"/>, Section 3.6.4.</t>
        </section>
        <section anchor="host-header">
          <name>Host Header</name>
          <t>The host request header field MUST be included in the POST request
   made when sending business data. This field is intended to allow one
   server IP address to service multiple hostnames, and potentially to
   conserve IP addresses. See <xref target="RFC2616"/>, Sections 14.23 and 19.5.1.</t>
        </section>
      </section>
      <section anchor="http-response-status-codes">
        <name>HTTP Response Status Codes</name>
        <t>Implementations MUST use standard HTTP response codes to signal the
   outcome of the message transfer.  The meaning of the HTTP status code is
   limited to the success or failure of the transport operation itself,
   not the semantic processing of the AS2 message content. For
   example, the status code 401, together with the WWW-Authenticate
   header, is used to challenge the client to repeat the request with an
   Authorization header. Other explicit status codes are documented in
   <xref target="RFC2616"/>, Section 6.1.1 and throughout Section 10.</t>
        <t>Receiving implementations MAY send an interim 102 (Processing)
   response <xref target="RFC4918"/> under HTTP/1.1 to indicate that the inbound
   message has been fully received and that processing is underway. The
   102 response can help prevent sender-side network timeouts for large
   synchronous transfers by signaling progress while decryption,
   signature verification, or storage continues.</t>
        <t>Use of 102 (Processing) is OPTIONAL.  It has been deprecated in later
   HTTP specifications and <strong>MUST NOT</strong> be used with HTTP/2 or HTTP/3,
   where interim responses have different semantics.  Implementations
   that do not receive a 102 response MUST NOT assume that a failure has
   occurred solely because no interim status was returned. They SHOULD
   continue waiting for the final status response for at least the duration
   of their configured HTTP read timeout or any timeout agreed upon between
   trading partners.</t>
        <t>To minimize the risk of network timeouts during lengthy message
   processing, receivers SHOULD return an appropriate transfer-layer
   response as quickly as possible after receiving the full message
   content. For asynchronous message exchanges, the preferred response is
   <tt>204 No Content</tt>, which indicates that the message has been received
   successfully and that an asynchronous MDN will follow once processing has
   completed. This convention is maintained for interoperability with
   existing AS2 products and certification profiles.</t>
        <t>Some implementations MAY instead use <tt>202 Accepted</tt> to indicate
   successful receipt and deferred processing; however, <tt>204 No Content</tt>
   remains the recommended and most widely deployed response for asynchronous workflows.</t>
        <t>Implementations MAY close the connection immediately after sending this
   response if persistent connections are not required by configuration.</t>
        <t>After processing completes, the receiver MUST return a final HTTP
   status code indicating the success or failure of the message transfer.
   The sender MUST use this final response to determine whether retry is appropriate.</t>
        <t>Retry <strong>MUST NOT</strong> be attempted when:</t>
        <artwork><![CDATA[
     o  the final HTTP response indicates successful receipt (e.g., `200 OK` or
        `204 No Content` for asynchronous transfers, or `202 Accepted` for
        implementations that use deferred processing semantics) **and** a
        valid MDN has been received confirming the message disposition; or
     o  a permanent-failure status code is returned (4xx other than 408), or
]]></artwork>
        <t>Retry <strong>MAY</strong> be attempted when:</t>
        <artwork><![CDATA[
     o  the HTTP connection fails before the final status is received,
     o  a transient error such as 408 (Request Timeout) or 5xx (Server Error)
        occurs, or
     o  no response is received within the configured timeout.
]]></artwork>
        <t>Implementations SHOULD refer to Section 5.5 for additional guidance on
   retry logic, back-off behavior, and use of partial-transfer recovery.
   The 102 (Processing) status code, if used, MUST NOT be treated as a
   trigger for retry.</t>
      </section>
      <section anchor="http-error-recovery-and-reliability">
        <name>HTTP Error Recovery and Reliability</name>
        <t>When an AS2 message transfer fails due to a transient transport-layer
   condition (for example, an HTTP 408 Request Timeout, 425 Too Early,
   500 Internal Server Error, 503 Service Unavailable or network interruption
   before the final response), the sending system SHOULD attempt an automatic retry.</t>
        <t>Each retry attempt MUST reuse the same Message-ID value so that the
   receiving system can identify duplicate transmissions and prevent
   double-processing.  A receiving system detecting a duplicate
   Message-ID MUST NOT treat the message as new and SHOULD return the
   previously generated MDN, if available.</t>
        <t>Implementations SHOULD permit configuration of retry behavior rather
   than enforcing fixed intervals or limits.  The following guidelines
   are RECOMMENDED but not required:</t>
        <artwork><![CDATA[
     o  **Retry intervals** SHOULD increase exponentially (e.g., 5 min,
        10 min, 20 min, 40 min, …) to reduce congestion.
     o  **Retry duration** SHOULD be configurable based on business
        requirements; some environments may continue for several days, while
        others may terminate after one or two attempts.
     o  **Maximum attempts** SHOULD be limited to prevent indefinite
        retries when persistent errors occur.
]]></artwork>
        <t>Implementations SHOULD NOT retry when:</t>
        <artwork><![CDATA[
     o  A final 2xx response and/or valid MDN has been received;
     o  The HTTP response indicates a permanent failure (e.g., 400, 401,
        403, 404);
     o  The partner has explicitly rejected the message by sending a signed
        MDN with a "failed" disposition.
]]></artwork>
        <t>The HTTP 102 (Processing) interim status MAY be used under
   HTTP/1.1 to indicate progress on long-running synchronous operations.
   It MUST NOT be used as a signal to initiate or suppress retries.
   Implementations MUST ignore 102 responses when determining whether a
   retry is required.  The 102 response MUST NOT be used with HTTP/2 or
   HTTP/3.</t>
        <t>Implementations MAY also support <strong>AS2 Restart</strong>, which allows a
   partially uploaded message to resume from the point of interruption
   rather than retransmitting the entire payload.  This optional feature
   is defined in <xref target="I-D.draft-harding-as2-restart-02"/>.  Implementations supporting
   Restart MUST ensure message integrity through signature or checksum
   validation of all resumed segments.</t>
        <t>Additional guidance for retry management, error classification, and
   duplicate detection is described in <xref target="I-D.draft-duker-as2-reliability-16"/>.
   While both of these drafts are expired, they remain widely referenced
   in AS2 interoperability testing and provide a useful operational baseline
   for error-recovery behavior.</t>
        <t>The objective of error recovery is reliability, not speed.  Systems
   SHOULD favor successful delivery over strict timing, provided that
   duplicate protection and security requirements are preserved.</t>
      </section>
      <section anchor="connection-management">
        <name>Connection Management</name>
        <t>HTTP/1.1 persistent connections are the default behavior. Connections remain
   open for subsequent requests unless explicitly closed with the "Connection: close"
   header. Implementations SHOULD use persistent connections when beneficial, particularly
   for HTTPS connections where persistent connections avoid the overhead of repeated
   TLS handshakes.</t>
        <t>The "Connection: close" header is not required and SHOULD NOT be included unless
   the implementation specifically needs to close the connection after the current
   request/response cycle. Earlier versions of this specification included
   "Connection: close" in message examples to reflect HTTP/1.0 behavior, where
   connections closed by default after each transaction. Modern implementations
   using HTTP/1.1 or later benefit from the default persistent connection behavior.</t>
        <t>Connection management practices are governed by the HTTP version in use and
   do not impact AS2's core message security, compression, or receipt features.
   Implementations MAY choose connection management strategies appropriate to their
   deployment scenarios (e.g., closing connections after single messages vs. keeping
   connections open for multiple messages to the same trading partner).</t>
        <t>Note: Persistent connections are particularly beneficial when an implementation
   sends multiple AS2 messages to the same trading partner in succession. However,
   AS2 implementations that use multiple-attachment messages (batch messages) for
   sending multiple business documents in a single AS2 message MAY achieve similar
   or better efficiency even without persistent connections.</t>
      </section>
    </section>
    <section anchor="additional-as2-specific-http-headers">
      <name>Additional AS2-Specific HTTP Headers</name>
      <t>The following headers are to be included in all AS2 messages and all
AS2 MDNs. <xref target="RFC3335"/>.</t>
      <section anchor="as2-version-header">
        <name>AS2 Version Header</name>
        <t>To promote backward compatibility, AS2 includes a version header. The
   major version digit indicates wire-level compatibility; minor version
   digits designate feature sets, clarifications, or extensions that
   remain compatible within the same major version. Thus, all values in
   the "1.x" range are compatible with AS2-Version 1.0, while a potential
   future "2.0" version would indicate a non-backward-compatible revision.</t>
        <t>Receiving systems MUST NOT fail due to the absence of the AS2-Version
   header. Its absence MUST be assumed to be equivalent to the default
   AS2-Version value of 1.0.</t>
        <sourcecode type="text"><![CDATA[
   AS2-Version: 1.0  - All implementations of this specification MUST
                       support and advertise "AS2-Version: 1.0".
                       Versions in the range "1.0" through "1.9" MAY be
                       used. All implementations MUST interpret any value
                       in that range as conforming to this specification,
                       with no differences in baseline behavior. In other
                       words, only the major version digit ("1") defines
                       compatibility for implementations that do not
                       support additional, non-AS2-specified
                       functionality.

                       Implementations MAY use "1.1" through "1.9" to
                       signal extensions of this specification. Any such
                       extensions MUST be fully transparent to
                       implementations that recognize only
                       "AS2-Version: 1.0".

   AS2-Version: 1.1  - Designates those implementations that MUST support
                       compression as defined by RFC 3274.

   AS2-Version: 1.2  - Indicates those implementations that include an
                       EDIINT-Features header as defined in RFC 6017. The
                       values in an EDIINT-Features header specify the
                       features supported by the AS2 implementation.
                       Examples may include CEM, AS2-Reliability and
                       multiple-attachments, however others may also be
                       included. A receiving implementation MUST NOT fail
                       if it does not support or understand any of the
                       supported values contained within an
                       EDIINT-Features header.

   AS2-Version: 1.3  - Indicates those implementations that support the
                       modernization defined by this specification,
                       including updated algorithm requirements (e.g.,
                       SHA-256 for MIC/signatures; AES as the encryption
                       baseline per RFC 8551), alignment with MDN
                       handling as specified in RFC 8098, and support for
                       multiple-recipient encryption as described in
                       Section 7.2 of this specification.

                       When both partners are configured for AS2 version
                       1.3, weak algorithms (e.g., SHA-1, 3DES, RC2, MD5)
                       MUST NOT be generated by conformant implementations.
                       When interoperating with a legacy partner that operates
                       at AS2 version 1.2 or lower, implementations SHOULD
                       apply the legacy interoperability clarifications described
                       in Section 1.2.1 (non-normative).

                       Future minor versions (1.x) may designate
                       additional extensions or clarifications that remain
                       backward-compatible with AS2 version 1.0. A major
                       version update (2.0 or higher) would indicate a
                       non-backward-compatible revision and may come later.
]]></sourcecode>
      </section>
      <section anchor="as2-product-header">
        <name>AS2 Product header</name>
        <t>The <tt>AS2-Product</tt> header value identifies the AS2 product and version
   used by the sender.  This information enables interoperability testing,
   certification, and troubleshooting by allowing trading partners to
   detect known product-specific behaviors or version-related quirks.</t>
        <t>The <tt>AS2-Product</tt> header value is OPTIONAL for AS2-Version 1.x systems
   but MUST be included in messages generated by implementations
   declaring <strong>AS2-Version: 1.3</strong> (or later).</t>
        <t>The header field value MUST follow the format:</t>
        <sourcecode type="text"><![CDATA[
   AS2-Product: [PEN-<number>:]<product-name>:<version>

   Where:
     * PEN-<number>: (OPTIONAL but RECOMMENDED) The vendor's IANA Private
        Enterprise Number. Including the PEN provides unique vendor
        identification and prevents namespace collisions.
     * <product-name>: lowercase alphanumeric and hyphen characters (a–z,
        0–9, "-") without spaces.
     * <version>: version string consistent with the product's release
        version, with one or more numeric components separated by dots
        (semantic versioning format: major.minor[.patch]).

   Examples:

      AS2-Product: PEN-12345:as2gateway:2.1.0
      AS2-Product: biztalk:2025.1
      AS2-Product: PEN-54321:example-connect:4.2.3
]]></sourcecode>
        <t>Implementations <strong>MUST NOT</strong> use arbitrary identifiers or vendor aliases
   that do not reflect the actual product in use.  Implementations <strong>SHOULD</strong>
   include their Private Enterprise Number if registered with IANA.  The value
   is static and determined at build time.  If a product supports multiple AS2
   variants, the version portion MAY include an implementation-specific suffix
   (e.g., "1.2-drummond").</t>
        <t>Implementations MAY use the <tt>AS2-Product</tt> value for automated
   interoperability tuning or to apply compatibility workarounds for known
   product versions.  However, this field is not intended for
   feature-negotiation purposes; supported feature tokens belong in the
   <tt>EDIINT-Features</tt> header, as defined in RFC 6017.</t>
      </section>
      <section anchor="as2-system-identifiers">
        <name>AS2 System Identifiers</name>
        <t>To aid the receiving system in identifying the sending system,
   AS2-From and AS2-To headers are used.</t>
        <artwork><![CDATA[
      AS2-From: < AS2-name >
      AS2-To: < AS2-name >
]]></artwork>
        <t>These AS2 headers contain textual values, as described below,
   identifying the sender/receiver of a data exchange. Their values may
   be company specific, such as Data Universal Numbering System (DUNS)
   numbers, or they may be simply identification strings agreed upon
   between the trading partners.</t>
        <artwork><![CDATA[
  AS2-text = "!" /           ; printable ASCII characters
             %d35-91 /       ; except double-quote (%d34)
             %d93-126        ; or backslash (%d92)

  AS2-qtext = AS2-text / SP  ; allow space only in quoted text

  AS2-quoted-pair = "\" DQUOTE /  ; \" or
                    "\" "\"       ; \\

  AS2-quoted-name = DQUOTE 1*128( AS2-qtext /
                                  AS2-quoted-pair) DQUOTE

  AS2-atomic-name = 1*128AS2-text

  AS2-name = AS2-atomic-name / AS2-quoted-name
]]></artwork>
        <t>The AS2-From header value and the AS2-To header value:</t>
        <artwork><![CDATA[
     o  MUST each be an AS2-name,
     o  MUST each be comprised of from 1 to 128 printable ASCII characters, and
     o  MUST NOT be folded
     o  The value in each of these headers is **case-sensitive**.
]]></artwork>
        <t>The string definitions given above are in ABNF format <xref target="RFC2234"/>.</t>
        <t>The AS2-quoted-name SHOULD be used only if the AS2-name does not
   conform to AS2-atomic-name. This explicitly includes situations where
   embedded spaces are part of the AS2-name.</t>
        <t>The AS2-To and AS2-From header fields MUST be present in all AS2
   messages and AS2 MDNs whether they are synchronous or asynchronous in nature.</t>
        <t>The AS2-name for the AS2-To header in a response or MDN MUST match
   the AS2-name of the AS2-From header in the corresponding request
   message. Likewise, the AS2-name for the AS2-From header in a
   response or MDN MUST match the AS2-name of the AS2-To header in the
   corresponding AS2 request message.</t>
        <t>The sending system may choose to limit the possible AS2-To/AS2-From
   textual values but MUST not exceed them. The receiving system MUST
   make no restrictions on the textual values and SHOULD handle all
   possible implementations. However, implementers must be aware that
   older AS2 products may not adhere to this convention. Trading
   partner agreements should be made to ensure that older products can
   support the system identifiers that are used.</t>
        <t>There is no required response to a client request containing invalid
   or unknown AS2-From or AS2-To header values. The receiving AS2
   system MAY return an unsigned MDN with an explanation of the error,
   such as an MDN error disposition value of "unknown-trading-relationship" or
   "unknown-trading-partner", if the sending system requested an MDN.</t>
      </section>
    </section>
    <section anchor="algorithm-requirements">
      <name>Algorithm Requirements</name>
      <t>This section defines the normative requirements for cryptographic
   algorithms used in AS2. These requirements apply to all conformant
   implementations. Guidance on interoperability with legacy AS2 systems
   that continue to use older algorithms is provided separately in
   <xref target="legacy-interoperability-non-normative"/>.</t>
      <section anchor="lifecycle-management">
        <name>Algorithm Lifecycle Management</name>
        <t>As cryptographic algorithms evolve, implementers should monitor IETF
   security guidance and algorithm lifecycle announcements. Algorithms
   are categorized as:</t>
        <artwork><![CDATA[
     o  **MUST**: Required for conformant implementations
     o  **SHOULD**: Strongly recommended for new implementations
     o  **MAY**: Optional, for specific use cases
     o  **DEPRECATED**: Supported only for legacy interoperability (see Section 1.2.1)
     o  **MUST NOT**: Prohibited in conformant implementations
]]></artwork>
        <t>Algorithm requirements in this specification follow the S/MIME v4.0
   algorithm registry <xref target="RFC8551"/> and the CMS specification <xref target="RFC5652"/>.
   Updates to algorithm requirements may be published as separate RFCs
   that update this specification.</t>
        <t>For current algorithm security guidance, implementers should consult:</t>
        <artwork><![CDATA[
     o  NIST Special Publication 800-57 (Key Management)
     o  NIST Special Publication 800-131A (Transitions: Recommendation for
        Transitioning the Use of Cryptographic Algorithms and Key Lengths)
     o  IETF Security Area Directorate reviews and BCP documents
]]></artwork>
      </section>
      <section anchor="hash-algorithms">
        <name>Hash Algorithms</name>
        <t>Implementations MUST support SHA-256 for message integrity check (MIC)
   calculations and digital signatures. Implementations SHOULD support
   SHA-384 or stronger algorithms. SHA-1 and MD5 are deprecated due to
   known weaknesses and SHOULD NOT be generated by conformant implementations.</t>
        <t>See Section 1.2.1 for clarifications on handling legacy algorithms when
   interoperating with RFC 4130 systems.</t>
      </section>
      <section anchor="encryption-algorithms">
        <name>Encryption Algorithms</name>
        <t>Implementations MUST support AES encryption algorithms as defined in
   S/MIME Version 4.0 <xref target="RFC8551"/>. At a minimum, AES-128-CBC and AES-256-CBC
   MUST be supported. Implementations are also RECOMMENDED to support
   AES-128-GCM and AES-256-GCM. Support for AES-CCM is also RECOMMENDED
   for environments requiring authenticated encryption.</t>
        <t>Triple DES (3DES) and RC2 are deprecated and SHOULD NOT be generated by
   conformant implementations.</t>
        <section anchor="envelopeddata-vs-authenvelopeddata">
          <name>EnvelopedData vs AuthEnvelopedData</name>
          <t>The choice between EnvelopedData and AuthEnvelopedData depends on the
   content encryption algorithm selected:</t>
          <artwork><![CDATA[
     o  **AuthEnvelopedData** MUST be used when employing authenticated
        encryption algorithms such as AES-GCM or AES-CCM. These algorithms
        provide both confidentiality and integrity protection in a single
        cryptographic operation. AuthEnvelopedData was introduced in
        S/MIME 4.0 [RFC8551] specifically to support these modes.

     o  **EnvelopedData** MUST be used when employing non-authenticated
        encryption algorithms such as AES-CBC or when maintaining backward
        compatibility with S/MIME 3.2 implementations [RFC5751]. When using
        EnvelopedData, integrity protection MUST be provided separately
        through digital signatures (multipart/signed).
]]></artwork>
          <t>Implementations MUST NOT mix content encryption algorithms for different
   recipients of the same message. A single content encryption algorithm
   MUST be selected and used for all recipients. For example, if a message
   is encrypted with AES-128-GCM, all recipient information MUST use
   AES-128-GCM; it is not permitted to encrypt the content-encryption
   key with AES-CBC for some recipients and AES-GCM for others.</t>
        </section>
        <section anchor="multiple-recipient-encryption">
          <name>Multiple-Recipient Encryption</name>
          <t>To support recoverable decryption and regulatory requirements,
   implementations SHOULD support multiple-recipient encryption of the
   content-encryption key (CEK), consistent with <xref target="RFC8551"/> Section 3.3.
   A copy of the CEK encrypted for the originator SHOULD also be included in
   the EnvelopedData, and the same principle applies to AuthEnvelopedData
   when using AES-CCM or AES-GCM.</t>
          <t>See Section 1.2.1 for guidance on handling 3DES and other weak algorithms
   when interoperating with legacy AS2 systems.</t>
        </section>
      </section>
    </section>
    <section anchor="structure-and-processing-of-an-mdn-message">
      <name>Structure and Processing of an MDN Message</name>
      <t>This document aligns MDN behavior with RFC 8098, clarifying semantics
for interoperability. It does not redefine the MDN format.
Implementations MUST be able to parse historic MDN forms as described in
RFC 3798 for backward compatibility.</t>
      <section anchor="introduction-2">
        <name>Introduction</name>
        <t>In order to support non-repudiation of receipt, a signed receipt,
   based on digitally signing a message disposition notification, is to
   be implemented by a receiving trading partner's UA. The message
   disposition notification, specified by RFC 3798, is digitally signed
   by a receiving trading partner as part of a multipart/signed MIME
   message.</t>
        <t>The requirements in this section update but do not alter the compatibility
   of MDN formats with existing AS2 implementations (see <xref target="backward-compatibility-and-interoperability"/>).
   This ensures interoperability with both RFC 3798 and RFC 8098 implementations.</t>
        <t>The following support for signed receipts is REQUIRED:</t>
        <artwork><![CDATA[
  1. The ability to create a multipart/report; where the
     report-type = disposition-notification.

  2. The ability to calculate a message integrity check (MIC) on the
     received message. The calculated MIC value will be returned to
     the sender of the message inside the signed receipt.

  3. The ability to create a multipart/signed content with the
     message disposition notification as the first body part, and
     the signature as the second body part.

  4. The ability to return the signed receipt to the sending trading
     partner.

  5. The ability to return either a synchronous or an asynchronous
     receipt as the sending party requests.
]]></artwork>
        <t>The signed receipt is used to notify a sending trading partner that
   requested the signed receipt that:</t>
        <artwork><![CDATA[
  1. The receiving trading partner acknowledges receipt of the sent
     EC Interchange.

  2. If the sent message was signed, then the receiving trading
     partner has authenticated the sender of the EC Interchange.

  3. If the sent message was signed, then the receiving trading
     partner has verified the integrity of the sent EC Interchange.
]]></artwork>
        <t>Regardless of whether the EDI/EC Interchange was sent in S/MIME
   format, the receiving trading partner's UA MUST provide the following
   basic processing:</t>
        <artwork><![CDATA[
  1. If the sent EDI/EC Interchange is encrypted, then the encrypted
     symmetric key and initialization vector (if applicable) is
     decrypted using the receiver's private key.

  2. The decrypted symmetric encryption key is then used to decrypt
     the EDI/EC Interchange.

  3. The receiving trading partner authenticates signatures in a
     message using the sender's public key. The authentication
     algorithm performs the following:

     a. The message integrity check (MIC or Message Digest), is
        decrypted using the sender's public key.

     b. A MIC on the signed contents (the MIME header and encoded
        EDI object, as per RFC 1767) in the message received is
        calculated using the same one-way hash function that the
        sending trading partner used.

     c. The MIC extracted from the message that was sent and the MIC
        calculated using the same one-way hash function that the
        sending trading partner used are compared for equality.

  4. The receiving trading partner formats the MDN and sets the
     calculated MIC into the "Received-content-MIC" extension field.

  5. The receiving trading partner creates a multipart/signed MIME
     message according to RFC 1847.

  6. The MDN is the first part of the multipart/signed message, and
     the digital signature is created over this MDN, including its
     MIME headers.

  7. The second part of the multipart/signed message contains the
     digital signature. The "protocol" option specified in the
     second part of the multipart/signed is as follows:

           S/MIME: protocol = "application/pkcs7-signature"

  8. The signature information is formatted according to S/MIME
     specifications.
]]></artwork>
        <t>The EC Interchange and the RFC 1767 MIME EDI content header can
   actually be part of a multi-part MIME content-type. When the EDI
   Interchange is part of a multi-part MIME content-type, the MIC MUST
   be calculated across the entire multi-part content, including the
   MIME headers contained within the multi-part MIME content.</t>
        <t>The signed MDN, when received by the sender of the EDI Interchange,
   can be used by the sender as follows:</t>
        <artwork><![CDATA[
    o  As an acknowledgement that the EDI Interchange sent was
       delivered and acknowledged by the receiving trading partner.
       The receiver does this by returning the original-message-id
       of the sent message in the MDN portion of the signed receipt.

    o  As an acknowledgement that the integrity of the EDI
       Interchange was verified by the receiving trading partner.
       The receiver does this by returning the calculated MIC of the
       received EC Interchange (and 1767 MIME headers) in the
       "Received-content-MIC" field of the signed MDN.

    o  As an acknowledgement that the receiving trading partner has
       authenticated the sender of the EDI Interchange.

    o  As a non-repudiation of receipt when the signed MDN is
       successfully verified by the sender with the receiving
       trading partner's public key and the returned MIC value
       inside the MDN is the same as the digest of the original
       message.
]]></artwork>
      </section>
      <section anchor="synchronous-and-asynchronous-mdns">
        <name>Synchronous and Asynchronous MDNs</name>
        <t>The AS2-MDN exists in two varieties: synchronous and asynchronous.</t>
        <t>The synchronous AS2-MDN is sent as an HTTP response to an HTTP POST
   or as an HTTPS response to an HTTPS POST. This form of AS2-MDN is
   called synchronous because the AS2-MDN is returned to the originator
   of the POST on the same HTTP connection.</t>
        <t>The synchronous response MUST indicate transfer-layer success or
   failure, such as <tt>200 OK</tt> or <tt>202 Accepted</tt>.  The format of this
   response MAY be identical to that used when no AS2-MDN is requested.</t>
        <t>The asynchronous AS2-MDN is sent on a separate HTTP or HTTPS
   connection. Logically, the asynchronous AS2-MDN is a response
   to an AS2 message. However, at the transfer-protocol layer, assuming
   that no HTTP pipelining is utilized, the asynchronous AS2-MDN is
   delivered on a unique HTTP connection, distinct from that used to
   deliver the original AS2 message.</t>
        <t>When handling an asynchronous request, the receiving system <strong>SHOULD</strong>
   return a transfer-layer response (typically <tt>202 Accepted</tt> or <tt>204 No Content</tt>)
   as soon as the last byte of the inbound message has been received, without waiting
   for decryption, signature verification, or message persistence.  This
   minimizes the risk of network timeouts and ensures that the sender can
   begin awaiting the asynchronous MDN promptly. The asynchronous MDN MUST be
   transmitted as an independent HTTP message, separate from the original
   connection used to submit the AS2 message.</t>
        <t>Implementations <strong>MAY</strong> use persistent (keep-alive) HTTP connections.
   Closing the TCP connection immediately after sending the response is
   <strong>RECOMMENDED</strong> for simplicity, but not required.  Some application
   servers and frameworks manage connection lifecycles automatically and
   may keep the socket open.  The AS2 specification does not mandate that
   the AS2 layer explicitly close the connection (see <xref target="connection-management"/>).</t>
        <t>The following diagram illustrates the synchronous versus asynchronous
   varieties of AS2-MDN delivery using HTTP:</t>
        <sourcecode type="text"><![CDATA[
   Synchronous AS2-MDN

   {Peer1} ----( connect )----> {Peer2}
   {Peer1} -----( send )------> {Peer2}   HTTP Request {AS2-Message}
   {Peer1} <---( receive )----- {Peer2}   HTTP Response {AS2-MDN}

   Asynchronous AS2-MDN

   {Peer1} ----( connect )----> {Peer2}
   {Peer1} -----( send )------> {Peer2}   HTTP Request {AS2-Message}
   {Peer1} <---( receive )----- {Peer2}   HTTP Response (e.g., "200 OK" or "204 No Content")
   {Peer1}*<---( connect )----- {Peer2}
   {Peer1} <--- ( send )------- {Peer2}   HTTP Request {AS2-MDN}
   {Peer1} ----( receive )----> {Peer2}   HTTP Response
]]></sourcecode>
        <ul spacing="normal">
          <li>
            <t>Note: An AS2-MDN may be directed to a host different from that of
   the sender of the AS2 message. It may also utilize a transfer protocol
   different from that used to send the original AS2 message.</t>
          </li>
        </ul>
        <t>The advantage of the synchronous MDN is that it provides the
   sender of the AS2 message with a verifiable confirmation of
   delivery within a single synchronous logic flow. However, if the
   message is large, the time required to process it and return the
   AS2-MDN on the same connection may exceed the maximum configured
   time permitted for maintaining an open connection.</t>
        <t>The advantage of the asynchronous MDN is that it provides for the
   rapid return of a transfer-layer acknowledgment from the receiver,
   confirming receipt of data, while allowing full processing to occur
   later. This reduces connection duration and timeout risk.  However,
   the asynchronous AS2-MDN MUST include sufficient identifying
   information (for example, <tt>Original-Message-ID</tt> and <tt>Final-Recipient</tt>)
   so that the message originator can correlate the MDN with its original
   message and update the processing status accordingly.</t>
        <t>Synchronous and asynchronous HTTP or HTTPS MDNs are both valid under
   this specification.  Implementations MUST support receiving both
   types and SHOULD support sending both.</t>
      </section>
      <section anchor="requesting-a-signed-receipt">
        <name>Requesting a Signed Receipt</name>
        <t>Message disposition notifications are requested as per RFC 3798. A
   request that the receiving user agent issue a message disposition
   notification is made by placing the following header into the message
   to be sent:</t>
        <artwork><![CDATA[
    MDN-request-header = "Disposition-notification-to"
                        ":"  mail-address
]]></artwork>
        <t>The following example is for requesting an MDN:</t>
        <artwork><![CDATA[
    Disposition-notification-to: xxx@example.com
]]></artwork>
        <t>The "Disposition-notification-to" header field is retained for compatibility
   with the MDN specification <xref target="RFC3798"/>, but its value is not used by AS2 implementations
   to determine where to return the MDN. Its presence just indicates that an MDN receipt is
   to be returned to the originator. In AS2, the field value may be an email address, a URL,
   a fully qualified domain name, an AS2 identifier, or any other implementation-specific string.
   Implementations MUST NOT reject a message based on the syntax of this field. This document
   relaxes the original requirement from RFC 4130, which mandated an email address, in order to
   reflect current AS2 practice while maintaining backward compatibility (see <xref target="backward-compatibility-and-interoperability"/>).</t>
        <t>When requesting MDN-based receipts, the originator supplies
   additional extension headers that precede the message body.  These
   header "tags" are as follows:</t>
        <t>A Message-ID header is added to support message reconciliation, so
   that an Original-Message-Id value can be returned in the body part of
   MDN. Other headers, especially "Subject" and "Date", SHOULD be
   supplied; the values of these headers are often mentioned in the
   human-readable portion of a MDN to aid in identifying the original
   message.</t>
        <t>MDNs will be returned in the HTTP response when requested, unless an
   asynchronous MDN is requested.</t>
        <t>To request an asynchronous message disposition notification, the
   following header is placed into the message that is sent:</t>
        <artwork><![CDATA[
    Receipt-Delivery-Option: return-URL
]]></artwork>
        <t>This is an example requesting that the MDN be asynchronous:</t>
        <artwork><![CDATA[
    Receipt-Delivery-Option: http://www.example.com/Path
]]></artwork>
        <t>Receipt-delivery-option syntax allows the return-url to use some schemes
   other than HTTP using the POST method.</t>
        <t>The "receipt-delivery-option: return-url" string indicates the URL to
   use for an asynchronous MDN. This header is NOT present if the
   receipt is to be synchronous. The email value in Disposition-
   notification-to is not used in this specification because it was
   limited to RFC 2822 addresses (now replaced by <xref target="RFC5322"/>); the extension
   header "Receipt-delivery-option" has been introduced to provide a
   URL for the MDN return by several transfer options.</t>
        <t>The receipt-delivery-option's value MUST be a URL indicating the
   delivery transport destination for the receipt.</t>
        <t>An example request for an asynchronous MDN via an HTTP transport:</t>
        <artwork><![CDATA[
    Receipt-delivery-option: http://www.example.com
]]></artwork>
        <t>An example request for an asynchronous MDN via an HTTP/S transport:</t>
        <artwork><![CDATA[
    Receipt-delivery-option: https://www.example.com
]]></artwork>
        <t>Finally, the header, Disposition-notification-options, identifies
   characteristics of message disposition notification as in <xref target="RFC3798"/>. The
   most important of these options is for indicating the signing options
   for the MDN, as in the following example:</t>
        <artwork><![CDATA[
    Disposition-notification-options:
         signed-receipt-protocol=optional,pkcs7-signature;
         signed-receipt-micalg=optional,sha-256,sha1
]]></artwork>
        <t>For signing options, consider the disposition-notification-options
   syntax:</t>
        <artwork><![CDATA[
    Disposition-notification-options =
             "Disposition-Notification-Options" ":"
              disposition-notification-parameters
where
         disposition-notification-parameters =
                           parameter *(";" parameter)

where
         parameter = attribute "=" importance ", " 1#value"

where
         importance = "required" | "optional"
]]></artwork>
        <t>So the Disposition-notification-options string could be:</t>
        <artwork><![CDATA[
    signed-receipt-protocol=optional, <protocol symbol>;
    signed-receipt-micalg=optional, <micalg1>, <micalg2>,...;
]]></artwork>
        <t>The currently used value for &lt;protocol symbol&gt; is "pkcs7-signature"
   for the S/MIME detached signature format.</t>
        <t>The signed-receipt-micalg parameter specifies which message integrity
   check (MIC) algorithm should be used when generating the signed receipt.
   Values are defined by the S/MIME specification <xref target="RFC8551"/> and MUST use
   the algorithm identifiers registered in the SMI Security for S/MIME
   registries.</t>
        <sourcecode type="text"><![CDATA[
   Supported values:
      SHA-256      sha-256 (REQUIRED)
      SHA-384      sha-384 (RECOMMENDED)
      SHA-512      sha-512 (OPTIONAL)
      SHA-1        sha-1 or sha1 (DEPRECATED - legacy deployments only)
]]></sourcecode>
        <t>See <xref target="lifecycle-management"/> for current algorithm requirements and lifecycle guidance.</t>
        <t>The semantics of the "signed-receipt-protocol" and the "signed-receipt-micalg"
   parameters are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>The "signed-receipt-protocol" parameter is used to request a
signed receipt from the recipient trading partner. The "signed-receipt-protocol"
parameter also specifies the format in which the signed receipt SHOULD be returned
to the requester.  </t>
            <t>
The "signed-receipt-micalg" parameter identifies one or more message
integrity check (MIC) algorithms, in order of preference, that the
requester supports for signing the returned receipt. Although multiple
values MAY be listed to indicate fallback options, only a single MIC
algorithm is used in the returned MDN because the "Received-content-MIC"
field conveys exactly one digest value.  </t>
            <t>
Recipients MUST select the first algorithm in the list that they also
support and MUST compute the Received-content-MIC using that algorithm.
Senders SHOULD list the strongest algorithm first. Modern
implementations SHOULD include only a single value unless multiple
values are needed to support phased migration away from weaker
algorithms. Implementations MUST accept messages that contain multiple
values and MUST ignore unsupported values.  </t>
            <t>
When a sender lists multiple algorithms, recipients MUST NOT fall back
to an algorithm that is not explicitly listed by the sender.
Trading partners typically pre-configure acceptable MIC algorithms
through bilateral agreement, and runtime negotiation is not needed.
If none of the algorithms listed is supported, the recipient SHOULD
reject the message and MAY return an unsigned MDN indicating
"unsupported-mic-algorithm" rather than silently selecting a weaker
algorithm.  When the header is absent (e.g., unsigned messages), an
implementation MUST use a locally configured default algorithm; SHA-256
SHOULD be preferred, but SHA-1 MAY be used when required for legacy partners.</t>
          </li>
        </ol>
        <t><strong>The following algorithm requirements apply to all implementations:</strong></t>
        <artwork><![CDATA[
     o  Implementations **MUST** support SHA-256.

     o  Implementations **SHOULD** support SHA-384 or stronger.

     o  SHA-1 **MAY** be accepted only when required for interoperability
        with legacy partners and SHOULD NOT be generated for modern
        implementations once both parties support stronger algorithms.

     o  MD5 is obsolete and MUST NOT be generated.

  See Section 10 for additional algorithm requirements
  and deprecation timelines.

  Both the "signed-receipt-protocol" and the "signed-receipt-micalg"
  option parameters are REQUIRED when requesting a signed receipt.

  The lack of the presence of the "Receipt-Delivery-Option"
  indicates that a receipt is synchronous in nature. The presence
  of the "Receipt-Delivery-Option: return-url" indicates that an
  asynchronous receipt is requested and SHOULD be sent to the
  "return-url".
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>The "importance" attribute of "Optional" is defined in RFC 3798,
Section 2.2, and has the following meaning:  </t>
            <t>
Parameters with an importance of "Optional" permit a UA that does
not understand the particular options parameter to still generate
an MDN in response to a request for a MDN.  </t>
            <t>
A UA that does not understand the "signed-receipt-protocol"
parameter or the "signed-receipt-micalg" will obviously not return
a signed receipt.  </t>
            <t>
The importance of "Optional" is used for the signed receipt
parameters because it is RECOMMENDED that an MDN be returned to
the requesting trading partner even if the recipient could not
sign it.  </t>
            <t>
The returned MDN will contain information on the disposition of
the message and on why the MDN could not be signed. See the
Disposition field in <xref target="structure-and-processing-of-an-mdn-message"/>.5
for more information.  </t>
            <t>
Within an EDI trading relationship, if a signed receipt is
expected and is not returned, then the validity of the transaction
is up to the trading partners to resolve.  </t>
            <t>
In general, if a signed receipt is required in the trading
relationship and is not received, the transaction will likely
be considered invalid.</t>
          </li>
        </ol>
        <section anchor="signed-receipt-considerations">
          <name>Signed Receipt Considerations</name>
          <t>The method used to request a receipt or a signed receipt is defined
   in RFC 3798, "An Extensible Message Format for Message Disposition
   Notifications".</t>
          <t>The "rules" are as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>When a receipt is requested, explicitly specifying that the
receipt be signed, then the receipt MUST be returned with a
signature.</t>
            </li>
            <li>
              <t>When a receipt is requested, explicitly specifying that the
receipt be signed, but the recipient cannot support either the
requested protocol format or the requested MIC algorithms, then
either a signed or unsigned receipt SHOULD be returned.</t>
            </li>
            <li>
              <t>When a signature is not explicitly requested (indicated by the
absence of the Disposition-Notification-Options header), or if the
signed receipt request parameter is not recognized by the UA, then no
receipt, an unsigned receipt, or a signed receipt MAY be returned
by the recipient.</t>
            </li>
          </ol>
          <t>NOTE: It is RECOMMENDED that when a signature is not explicitly requested,
   or if parameters are not recognized, the UA send back, at a minimum,
   an unsigned receipt. If, however, a signed receipt was always returned
   as a policy, whether requested or not, then any false unsigned receipts
   can be repudiated.</t>
          <t>When a request for a signed receipt is made, but there is an error in
   processing the contents of the message, a signed receipt MUST still
   be returned. The request for a signed receipt SHALL still be
   honored, though the transaction itself may not be valid. The reason
   why the contents could not be processed MUST be set in the
   "disposition-field".</t>
          <t>When a signed receipt request is made, the "Received-content-MIC"
   MUST always be returned to the requester (except when corruption
   prevents computation of the digest in accordance with the following
   specification). The "Received-content-MIC" MUST be calculated as
   follows:</t>
          <artwork><![CDATA[
     o  For any signed messages, the MIC to be returned is calculated
        on the RFC1767/RFC3023 MIME header and content.
        Canonicalization on the MIME headers MUST be performed before
        the MIC is calculated, since the sender requesting the signed
        receipt was also REQUIRED to canonicalize.

     o  For encrypted, unsigned messages, the MIC to be returned is
        calculated on the decrypted RFC 1767/RFC3023 MIME header and
        content. The content after decryption MUST be canonicalized
        before the MIC is calculated.

     o  For unsigned, unencrypted messages, the MIC MUST be calculated
        over the message contents without the outer MIME or any other RFC
        5322 headers, since these may sometimes be altered or reordered by
        intermediary user agents or proxies.
]]></artwork>
        </section>
      </section>
      <section anchor="mdn-format-and-values">
        <name>MDN Format and Values</name>
        <t>This section defines the format of the AS2 Message Disposition
   Notification (AS2-MDN).</t>
        <section anchor="as2-mdn-general-formats">
          <name>AS2-MDN General Formats</name>
          <sourcecode type="abnf"><![CDATA[
AS2-MDN = AS2-sync-MDN | AS2-async-http-MDN

AS2-sync-MDN =
   Status-Line
   *(( general-header | response-header | entity-header )
     CRLF )
   CRLF
   AS2-MDN-body

Status-Line =
   HTTP-Version SP Status-Code SP Reason-Phrase CRLF

AS2-async-http-MDN =
   Request-Line
   *(( general-header | request-header | entity-header )
     CRLF )
   CRLF
   AS2-MDN-body

Request-Line =
   Method SP Request-URI SP HTTP-Version CRLF

AS2-MDN-body =
   AS2-signed-MDN-body | AS2-unsigned-MDN-body
]]></sourcecode>
        </section>
        <section anchor="as2-mdn-construction">
          <name>AS2-MDN Construction</name>
          <t>The AS2-MDN-body is formatted as a MIME multipart/report with a
   report-type of "disposition-notification". When the message is
   unsigned, the transfer-layer ("outermost") entity-headers of the
   AS2-MDN contain the content-type header that specifies a content-type
   of "multipart/report" and parameters indicating the report-type, and
   the value of the outermost multipart boundary.</t>
          <t>When the AS2-MDN is signed, the transfer-layer ("outermost") entity-
   headers of the AS2-MDN contain a content-type header that specifies a
   content-type of "multipart/signed" and parameters indicating the
   algorithm used to compute the message digest, the signature-
   formatting protocol (e.g., pkcs7-signature), and the value of the
   outermost multipart boundary. The first part of the MIME
   multipart/signed message is an embedded MIME multipart/report of type
   "disposition-notification". The second part of the multipart/signed
   message contains a MIME application/pkcs7-signature message.</t>
          <t>The first part of the MIME multipart/report is a "human-readable"
   portion containing a general description of the message
   disposition. The second part of the MIME multipart/report is a
   "machine-readable" portion that is defined as:</t>
          <sourcecode type="abnf"><![CDATA[
AS2-disposition-notification-content =
    reporting-ua-field CRLF
    mdn-gateway-field CRLF
    final-recipient-field CRLF
    original-message-id-field CRLF
    AS2-disposition-field CRLF
    *( failure-field CRLF )
    *( error-field CRLF )
    *( warning-field CRLF )
    *( extension-field CRLF )
    AS2-received-content-MIC-field CRLF
]]></sourcecode>
        </section>
        <section anchor="as2-mdn-fields">
          <name>AS2-MDN Fields</name>
          <t>The rules for constructing the AS2-disposition-notification content
   are identical to the disposition-notification-content rules provided
   in <xref target="algorithm-requirements"/> of RFC 3798 <xref target="RFC3798"/>, except that the RFC 3798 disposition-
   field has been replaced with the AS2-disposition-field and that the
   AS2-received-content-MIC field has been added. The differences
   between the RFC 3798 disposition-field and the AS2-disposition-field
   are described below. Where there are differences between this
   document and RFC 3798, those entity names have been changed by
   pre-pending "AS2-". Entities that do not differ from RFC 3798 are not
   necessarily further defined in this document; refer to RFC 3798,
   Section 7, "Collected Grammar", for the original grammar.</t>
          <sourcecode type="abnf"><![CDATA[
AS2-disposition-field =
    "Disposition" ":" disposition-mode ";"
    AS2-disposition-type "/" AS2-disposition-modifier

disposition-mode =
    action-mode "/" sending-mode

action-mode =
    "manual-action" | "automatic-action"

sending-mode =
    "MDN-sent-manually" | "MDN-sent-automatically"

AS2-disposition-type =
    "processed" | "failed"

AS2-disposition-modifier =
    ( "error" | "warning" ) | AS2-disposition-modifier-extension

AS2-disposition-modifier-extension =
    "error: authentication-failed" |
    "error: decompression-failed" |
    "error: decryption-failed" |
    "error: duplicate-filename" |
    "error: illegal-filename" |
    "error: insufficient-message-security" |
    "error: integrity-check-failed" |
    "error: invalid-message-id" |
    "error: unexpected-processing-error" |
    "error: unknown-trading-relationship" |
    "error: unknown-trading-partner" |
    "warning: " AS2-MDN-warning-description |
    "failure: " AS2-MDN-failure-description

AS2-MDN-warning-description = *( TEXT )

AS2-MDN-failure-description = *( TEXT )

AS2-received-content-MIC-field =
    "Received-content-MIC" ":" encoded-message-digest ","
    digest-alg-id CRLF

encoded-message-digest =
    1*( 'A'-'Z' | 'a'-'z' | '0'-'9' | '/' | '+' | '=' )
    ; i.e., base64(message-digest)

digest-alg-id = "sha-256" | "sha-384" | "sha-512" | "sha-1" | "sha1"
                 ; The "sha1" is a legacy representation of the "sha-1"
                 ; defined hash in the IANA Textual Names Registry.
                 ; It should be maintained for backwards compatibility;
                 ; sha1 | sha-1 should only be used by legacy deployments
                 ; that cannot support sha-256 or greater
]]></sourcecode>
          <t>To improve error reporting and interoperability, this specification
   introduces additional standardized disposition modifiers beyond those
   defined in <xref target="RFC4130"/> and <xref target="RFC8098"/>.</t>
          <t>These modifiers are used to indicate specific failure conditions that
   cannot be adequately represented by the existing error codes and may
   not be compatible with earlier implementations of AS2.
   Implementations MUST include a human-readable explanation in the MDN
   <tt>Explanation</tt> field when returning these modifiers.</t>
          <t>Future modifiers may be registered through the IANA registry for
   AS2 Disposition Values and Modifiers (see <xref target="iana-considerations"/>).</t>
          <t>The "Received-content-MIC" extension field is set when the integrity
   of the received message is verified. The MIC value is the base64-encoded
   message-digest computed over the received message using a hash
   function. This field is required for signed receipts but optional
   for unsigned receipts. For details defining the specific content
   over which the message digest is to be computed, see <xref target="structure-and-processing-of-an-mdn-message"/>.3.1
   of this document.</t>
          <t>For signed messages, the algorithm used to calculate the MIC MUST be
   the same as that used on the message that was signed. If the message
   is not signed, then the SHA-256 algorithm SHOULD be used. SHA-1 MAY be
   used only for legacy interoperability (see <xref target="backward-compatibility-and-interoperability"/>.1). This field
   is set only when the content of the message is processed
   successfully. This field is used in conjunction with the recipient's
   signature on the MDN so that the sender can verify non-repudiation of
   receipt.</t>
          <t>AS2-MDN field names (e.g., "Disposition:", "Final-Recipient:") are
   case insensitive (cf. RFC 3798, Section 3.1.1). AS2-MDN action-
   modes, sending-modes, AS2-disposition-types, and AS2-disposition-
   modifier values, which are defined above, and user-supplied *( TEXT )
   values are also case-insensitive. AS2 implementations MUST NOT make
   assumptions regarding the values supplied for AS2-MDN-warning-
   description or AS2-MDN-failure-description, or for the values of any
   (optional) error, warning, or failure fields.</t>
        </section>
        <section anchor="as2-mdn-field-requirements">
          <name>AS2-MDN Field Requirements</name>
          <t>The following fields have clarified requirements for interoperability:</t>
          <artwork><![CDATA[
     o  **Final-Recipient** — This field **MUST** always be present in an MDN
         and MUST identify the AS2-To value of the original message.

     o  **Original-Message-ID** — This field is **REQUIRED** and MUST exactly
         match the `Message-ID` of the original message as transmitted.
        `Message-ID` in the MDN itself is optional.

     o  **Disposition-Notification-To** — Implementations **MAY** include this
         field using an email address, URL, hostname, or other identifier as
         appropriate to the system.  However, as specified in [RFC4130], receiving
         applications **MUST** ignore this field and **MUST NOT** reject a message
         due to syntax or address format violations. The field is retained for
         compatibility with prior implementations.
]]></artwork>
        </section>
        <section anchor="additional-as2-mdn-programming-notes">
          <name>Additional AS2-MDN Programming Notes</name>
          <artwork><![CDATA[
     o  For HTTP transactions, Original-Recipient and Final-Recipient
        SHOULD not be different.  The value in Original-Message-ID SHOULD
        match the original Message-ID header value.

     o  Refer to RFC 3798 for the formatting of the MDN, except for the
        specific deviations mentioned above.

     o  Refer to RFC 3462 and RFC 3798 for the formatting of the content-
        type entity-headers for the MDN.

     o  Use an action-mode of "automatic-action" when the disposition
        described by the disposition type was a result of an automatic
        action rather than that of an explicit instruction by the user for
        this message.

     o  Use an action-mode of "manual-action" when the disposition
        described by the disposition type was a result of an explicit
        instruction by the user rather than some sort of automatically
        performed action.

     o  Use a sending-mode of "MDN-sent-automatically" when the MDN is
        sent because the UA had previously been configured to do so.

     o  Use a sending-mode of "MDN-sent-manually" when the user explicitly
        gave permission for this particular MDN to be sent.

     o  The sending-mode "MDN-sent-manually" is meaningful ONLY with
        "manual-action", not with "automatic-action".

     o  The "failed" disposition type MUST NOT be used for the situation
        in which there is some problem in processing the message other
        than interpreting the request for an MDN. The "processed" or
        other disposition type with appropriate disposition modifiers is
        to be used in such situations.
]]></artwork>
        </section>
      </section>
      <section anchor="disposition-mode-type-and-modifier">
        <name>Disposition Mode, Type, and Modifier</name>
        <section anchor="disposition-mode-overview">
          <name>Disposition Mode Overview</name>
          <t>This section provides a brief overview of how "processed", "error",
   "failure", and "warning" are used.</t>
        </section>
        <section anchor="successful-processing-status-indication">
          <name>Successful Processing Status Indication</name>
          <t>When the request for a receipt or signed receipt, and the received
   message contents are successfully processed by the receiving EDI UA,
   a receipt or MDN SHOULD be returned with the disposition-type set to
   "processed". When the MDN is sent automatically by the EDI UA, and
   there is no explicit way for a user to control the sending of the
   MDN, then the first part of the "disposition-mode" SHOULD be set to
   "automatic-action". When the MDN is being sent under user-
   configurable control, then the first part of the "disposition-mode"
   SHOULD be set to "manual-action". Since a request for a signed
   receipt should always be honored, the user MUST not be allowed to
   configure the UA to disallow sending of a signed receipt when the sender
   requests one.</t>
          <t>The second part of the disposition-mode is set to "MDN-sent-manually"
   if the user gave explicit permission for the MDN to be sent. Again,
   the user MUST not be allowed to explicitly refuse to send a signed
   receipt when the sender requests one. The second part of the
   "disposition-mode" is set to "MDN-sent-automatically" whenever the
   EDI UA sends the MDN automatically, regardless of whether the sending
   was under the control of a user, administrator, or the software.</t>
          <t>Because EDI content is generally handled automatically by the EDI UA,
   a request for a receipt or signed receipt will generally return the
   following in the "disposition-field":</t>
          <artwork><![CDATA[
   Disposition: automatic-action/MDN-sent-automatically; processed
]]></artwork>
          <t>Note that this specification does not restrict the use of the
   "disposition-mode" just to automatic actions. Manual actions are
   valid as long as it is kept in mind that a request for a signed
   receipt MUST be honored.</t>
        </section>
        <section anchor="unsuccessful-processed-content">
          <name>Unsuccessful Processed Content</name>
          <t>The request for a signed receipt requires the use of two
   "disposition-notification-options", which specify the protocol format
   of the returned signed receipt, and the MIC algorithm used to
   calculate the MIC over the message content. The "disposition-field"
   values that should be used if the message content is being rejected
   or ignored (for instance, if the EDI UA determines that a signed
   receipt cannot be returned because it does not support the requested
   protocol format, the EDI UA chooses not to process the message
   contents itself) MUST be specified in the MDN "disposition-field" as
   follows:</t>
          <artwork><![CDATA[
   Disposition: "disposition-mode";  failed/Failure: unsupported format
]]></artwork>
          <t>The "failed" AS2-disposition-type MUST be used when a failure occurs
   that prevents the proper generation of an MDN. For example, this
   disposition-type would apply if the sender of the message requested
   the application of an unsupported message-integrity-check (MIC)
   algorithm.</t>
          <t>The "failure:" AS2-disposition-modifier-extension SHOULD be used with
   an implementation-defined description of the failure. Further
   information about the failure may be contained in a failure-field.</t>
          <t>The syntax of the "failed" disposition-type is general, allowing the
   sending of any textual information along with the "failed"
   disposition-type. Implementations MUST support any printable textual
   characters after the Failure disposition-type. For use in Internet
   EDI, the following "failed" values are pre-defined and MUST be
   supported:</t>
          <artwork><![CDATA[
   "Failure: unsupported format"
   "Failure: unsupported MIC-algorithms"
]]></artwork>
        </section>
        <section anchor="unsuccessful-non-content-processing">
          <name>Unsuccessful Non-Content Processing</name>
          <t>When errors occur in processing the received message (other than
   content), the "disposition-field" MUST be set to the "processed"
   value for disposition-type and the "error" value for disposition-
   modifier.</t>
          <t>The "error" AS2-disposition-modifier with the "processed"
   disposition-type MUST be used to indicate that an error of some sort
   occurred that prevented successful processing of the message.
   Further information may be contained in an error-field.</t>
          <t>An "error:" AS2-disposition-modifier-extension SHOULD be used to
   combine the indication of an error with a predefined description of a
   specific, well-known error. Further information about the error may
   be contained in an error field.</t>
          <t>For AS2 implementations, the following "error" AS2-disposition-modifier
   values are defined:</t>
          <sourcecode type="text"><![CDATA[
   o "Error: authentication-failed"         - the receiver could not
                                              authenticate the sender.

   o "Error: decompression-failed"          - the receiver could not
                                              decompress the message
                                              contents.

   o "Error: decryption-failed"             - the receiver could not
                                              decrypt the message
                                              contents.
   o "Error: duplicate-filename"            - the message payload contained
                                              a filename already received
                                              by the backend server.

   o "Error: illegal-filename"              - the message payload contained
                                              a filename that could nor be
                                              processed by the backend server.

   o "Error: insufficient-message-security" - the content of the message
                                              was not appropriately enveloped
                                              according to the agreed-upon
                                              message security.

   o "Error: integrity-check-failed"        - the receiver could not
                                              verify content integrity.

   o "Error: invalid-message-id"            - the receiver could not
                                              parse the value of the
                                              Message-ID header because it
                                              was not syntactically correct.

   o "Error: unexpected-processing-error"   - a catch-all for any
                                              additional processing
                                              errors.

   o "Error: unknown-trading-relationship"  - the receiver could not
      or "Error: unknown-trading-partner"     correlate the AS2-To/AS2-From
                                              header values to values known
                                              to the system.
]]></sourcecode>
          <t>An example of how the "disposition-field" would look when errors
   other than those in content processing are detected is as follows:</t>
          <artwork><![CDATA[
   Disposition: "disposition-mode"; processed/Error: decryption-failed
]]></artwork>
        </section>
        <section anchor="processing-warnings">
          <name>Processing Warnings</name>
          <t>Situations arise in EDI when, even if a trading partner cannot be
   authenticated correctly, the trading partners still agree to continue
   processing the EDI transactions. Transaction reconciliation is done
   between the trading partners at a later time. In the content
   processing warning situations as described above, the "disposition-
   field" MUST be set to the "processed" disposition-type value, and the
   "warning" to the "disposition-modifier" value.</t>
          <t>The "warning" AS2-disposition-modifier MUST be used with the
   "processed" disposition-type to indicate that the message was
   successfully processed but that an exceptional condition occurred.
   Further information may be contained in a warning-field.</t>
          <t>A "warning:" AS2-disposition-modifier-extension SHOULD be used to
   combine the indication of a warning with an implementation-defined
   description of the warning.  Further information about the warning
   may be contained in a warning-field.</t>
          <t>For use in Internet EDI, the following "warning"
   disposition-modifier-extension value is defined:</t>
          <artwork><![CDATA[
   "Warning: authentication-failed, processing continued"
]]></artwork>
          <t>An example of how the "disposition-field" would look when warning
   other than those for content processing are detected is as follows:</t>
          <t>Example:</t>
          <artwork><![CDATA[
   Disposition: "disposition-mode"; processed/warning:
     authentication-failed, processing continued
]]></artwork>
        </section>
        <section anchor="backward-compatibility-with-disposition-type-modifier-and-extension">
          <name>Backward Compatibility with Disposition Type, Modifier, and Extension</name>
          <t>The following set of examples represents typical constructions of the
   Disposition field that have been in use by AS2 implementations.  This
   is NOT an exhaustive list of possible constructions. However, AS2
   implementations MUST accept constructions of this type to be backward
   compatible with earlier AS2 versions.</t>
          <artwork><![CDATA[
  Disposition: automatic-action/MDN-sent-automatically; processed

  Disposition: automatic-action/MDN-sent-automatically;
    processed/error: authentication-failed

  Disposition: automatic-action/MDN-sent-automatically;
    processed/warning: duplicate-document

  Disposition: automatic-action/MDN-sent-automatically;
    failed/failure: sender-equals-receiver
]]></artwork>
          <t>The following set of examples represents allowable constructions of
   the Disposition field that combine the historic constructions above
   with optional RFC 3798 error, warning, and failure fields. AS2
   implementations MAY produce these constructions. However, AS2
   servers are not required to recognize or process optional error,
   warning, or failure fields at this time. Note that the use of the
   multiple error fields in the second example below provides for the
   indication of multiple error conditions.</t>
          <artwork><![CDATA[
     Disposition: automatic-action/MDN-sent-automatically; processed

     Disposition: automatic-action/MDN-sent-automatically;
       processed/error: decryption-failed
     Error: The signature did not decrypt into a valid PKCS#1 Type-2 block.
     Error: The length of the decrypted key does not equal the octet length of the modulus.

     Disposition: automatic-action/MDN-sent-automatically;
       processed/warning: duplicate-document
     Warning: An identical message already exists at the destination server.

     Disposition: automatic-action/MDN-sent-automatically;
          failed/failure: sender-equals-receiver
     Failure: The AS2-To name is identical to the AS2-From name.
]]></artwork>
          <t>The following set of examples represents allowable constructions of
   the Disposition field that employ pure RFC 3798 Disposition-modifiers
   with optional error, warning, and failure fields. These examples are
   provided as informational only. These constructions are not
   guaranteed to be backward compatible with AS2 implementations prior
   to version 1.1.</t>
          <artwork><![CDATA[
     Disposition: automatic-action/MDN-sent-automatically; processed

     Disposition: automatic-action/MDN-sent-automatically; processed/error
     Error: authentication-failed
     Error: The signature did not decrypt into a valid PKCS#1 Type-2 block.
     Error: The length of the decrypted key does not equal the octet length of the modulus.

     Disposition: automatic-action/MDN-sent-automatically; processed/warning
     Warning: duplicate-document

     Disposition: automatic-action/MDN-sent-automatically; failed
     Failure: sender-equals-receiver
]]></artwork>
        </section>
      </section>
      <section anchor="receipt-reply-considerations-in-an-http-post">
        <name>Receipt Reply Considerations in an HTTP POST</name>
        <t>The details of the response to the POST command vary depending upon
   whether a receipt has been requested.</t>
        <t>With no extended header requesting a receipt, and with no errors
   accessing the request-URI specified processing, the status line in
   the Response to the POST request SHOULD be in the 200 range. Status
   codes in the 200 range SHOULD also be used when an entity is returned
   (a signed receipt in a multipart/signed content type or an unsigned
   receipt in a multipart/report). Even when the disposition of the
   data was an error condition at the authentication, decryption or
   other higher level, the HTTP status code SHOULD indicate success at
   the HTTP level.</t>
        <t>The HTTP server application may respond with an unsolicited
   multipart/report as a message body that the HTTP client might not
   have solicited, but the client may discard this. Applications SHOULD
   avoid emitting unsolicited receipt replies because bandwidth or
   processing limitations might have led administrators to suspend
   asking for acknowledgements.</t>
        <t>Message Disposition Notifications, when used in the HTTP reply context,
   follow the same semantics as those defined in <xref target="RFC3798"/>. For example, the
   disposition field is a required element in the machine-readable second
   part of a multipart/report for a MDN. The final-recipient-field (<xref target="RFC3798"/>,
   Section 3.1) value SHOULD be derived from the entity headers of the request.</t>
        <t>In an MDN, the first part of the multipart/report (the human-readable
   portion) SHOULD include items such as the subject, the date, and other
   information when those fields are present in entity header fields
   following the POST request. An application MUST report the Message-ID
   of the request in the second part of the multipart/report (the
   machine-readable portion). Also, an MDN SHOULD have its own unique
   Message-ID HTTP header. The HTTP reply SHOULD normally omit the
   third optional part of the multipart/report (this was historically
   used to return the original message or its headers within the SMTP context).</t>
      </section>
    </section>
    <section anchor="public-key-certificate-handling">
      <name>Public Key Certificate Handling</name>
      <t>The initial exchange and certification of public keys are essential
   steps in establishing a secure trading partnership.  This process MAY
   occur manually during partner onboarding or automatically through
   supported mechanisms such as the <strong>AS2 GET</strong> method (see <xref target="certificate-exchange-and-renewal"/>).
   Implementations MUST maintain a database of public keys used for encryption
   and signature verification, together with the mapping between the EDI
   trading partner identifier and its associated RFC 5322 <xref target="RFC5322"/> email
   address and HTTP URL/URI. The exact procedures for establishing and
   configuring secure AS2 messaging can vary among trading partners and
   software implementations.</t>
      <t>X.509 certificates are REQUIRED. It is RECOMMENDED that trading
   partners self-certify each other if an agreed-upon certification
   authority is not used. This applicability statement does NOT require
   the use of a certification authority (CA) and the use of a CA
   is therefore OPTIONAL. Certificates MAY be self-signed.</t>
      <t>It is RECOMMENDED that when trading partners are using S/MIME they
   also exchange public key certificates, considering the advice provided in
   <xref target="RFC3850"/>.</t>
      <t>The message formats useful for certificate exchange are found in <xref target="RFC5751"/>
   and <xref target="RFC5652"/>.</t>
      <section anchor="certificate-roles-and-requirements">
        <name>Certificate Roles and Requirements</name>
        <t>While TLS certificates and AS2 message-signing certificates both use the
   X.509 standard, they serve distinct purposes and MUST be managed
   separately:</t>
        <artwork><![CDATA[
     o  **TLS Certificates** are used solely to secure the HTTPS transport
        channel. They establish session-level confidentiality and integrity and
        SHOULD be issued by a trusted certification authority (CA) in production
        environments. For public-facing servers, TLS certificates SHOULD comply
        with the CA/Browser Forum Baseline Requirements
        (https://cabforum.org/baseline-requirements-documents/). Self-signed
        TLS certificates MAY be used for testing or by explicit agreement
        between trading partners, provided they include a **Subject Alternative
        Name (SAN)** extension containing the DNS name and/or IP address. The
        SAN extension MUST be marked as non-critical.

     o  **AS2 Certificates** are used for signing and encrypting AS2 messages
        and MUST NOT be the same as the TLS certificate. Separation ensures that
        a compromise of the transport layer does not affect message-level
        security, and vice versa. Using the same certificate for both purposes
        creates security dependencies and operational risks that MUST be avoided.
        AS2 certificates MAY be CA-issued or self-signed, depending on
        organizational policy and trading-partner agreements.

        AS2 certificates MUST use a key length of at least **2048 bits for RSA
        keys**.  For elliptic-curve certificates, the selected curve MUST provide
        equivalent or stronger security (e.g., P-256 or higher).
]]></artwork>
        <t>Although short certificate lifetimes are now common in the TLS ecosystem due to
   CA/Browser Forum requirements and industry regulations, AS2 certificates generally
   do not require the same frequency of renewal. AS2 systems handle far fewer encrypted
   transactions than high-volume web servers, and certificate rollover can be
   operationally complex.  Implementations SHOULD allow independent lifetime policies
   for AS2 and TLS certificates.</t>
      </section>
      <section anchor="certificate-exchange-and-renewal">
        <name>Certificate Exchange and Renewal</name>
        <t>Automated certificate management significantly reduces operational risk.
   Implementations SHOULD support <strong>Certificate Exchange Messaging (CEM)</strong>
          <xref target="I-D.draft-meadors-certificate-exchange-14"/> to enable secure, automated
   exchange of AS2 certificates between trading partners. When CEM is not
   available, manual exchange processes MUST ensure integrity and authentication
   of keys prior to activation.</t>
        <t>The <strong>AS2 GET</strong> method MAY be used for initial retrieval of partner
   certificates. Implementations using AS2 GET MUST ensure that certificate
   retrieval is authenticated (to verify the requester's identity) and
   authorized (to ensure only legitimate trading partners can access
   certificates). While certificates themselves are digitally signed by their
   issuer and thus tamper-evident, authentication and authorization are
   required to prevent unauthorized parties from obtaining certificates and
   using them to identify legitimate trading partners or map relationships.
   For self-signed certificates, additional out-of-band verification (such as
   fingerprint confirmation via secure channel) is REQUIRED to establish
   initial trust before use in production.</t>
      </section>
      <section anchor="operational-guidance">
        <name>Operational Guidance</name>
        <artwork><![CDATA[
     o  TLS and AS2 certificates MUST be managed separately and MUST NOT be
        the same certificate.
     o  CEM SHOULD be supported to reduce manual errors and configuration drift.
     o  Self-signed certificates SHOULD include SAN extensions for clarity and
        validation consistency.
     o  Implementations SHOULD support configurable expiration and notification
        mechanisms for certificate renewal.
     o  Administrators MUST NOT reuse TLS certificates as AS2 certificates to
        maintain separation of security domains.
]]></artwork>
        <t>For security and algorithm lifecycle considerations, see <xref target="algorithm-requirements"/> and
   Section 10.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is concerned with secure transport of business data,
   covering confidentiality, authentication, and non-repudiation.</t>
      <t>Cryptographic algorithms used for signatures, MIC calculations, and
   encryption are subject to modernization and deprecation guidance.
   The definitive algorithm requirements (for hash functions and
   encryption) are specified in <xref target="algorithm-requirements"/>.
   This section provides security rationale and additional guidance.</t>
      <t>Legacy algorithms such as SHA-1, MD5, 3DES, and RC2 are deprecated
   due to known weaknesses. Implementations SHOULD NOT generate these
   algorithms in modern implementations. However, legacy use cases may still be
   encountered when interoperating with older systems conforming to
   <xref target="RFC4130"/>. See Section 1.2.1 for clarifications on legacy interoperability.</t>
      <t>Modern implementations are expected to support strong algorithms such
   as SHA-256 or stronger for MIC calculations, and AES (128-bit or
   greater) for encryption. Implementations SHOULD also support advanced
   AES modes such as AES-GCM and AES-CCM for improved efficiency and
   authenticated encryption. See <xref target="RFC8551"/> for details.</t>
      <t>Implementations must ensure robust handling of all cryptographic
   failures. Administrators are encouraged to monitor IETF and NIST
   publications for algorithm lifecycle updates and to update deployed
   systems accordingly. These compatibility allowances are described in
   more detail in Section 1.2 and Section 1.2.1.</t>
      <t>When processing certificates, failures such as expired, revoked, or
   untrusted certificates MUST result in immediate and noticeable error
   reporting. See <xref target="RFC3280"/> and <xref target="RFC8551"/> for guidance on certificate
   path validation. For guidance on certificate management, key exchange,
   and renewal, including use of Certificate Exchange Messaging (CEM) and
   AS2 GET, see <xref target="public-key-certificate-handling"/> and <xref target="certificate-exchange-and-renewal"/>.</t>
      <section anchor="https-tls-reqs">
        <name>HTTPS and TLS Requirements</name>
        <t><strong>Consensus Update:</strong>
   Implementations <strong>MUST</strong> support TLS 1.3 <xref target="RFC8446"/> or higher and <strong>MAY</strong> support TLS 1.2 <xref target="RFC5246"/>
   when interoperating with systems that have not yet migrated to TLS 1.3.
   Products SHOULD allow administrators to configure which TLS versions are enabled to allow support
   for older versions of TLS where needed for backward compatibility.</t>
        <t>Administrators SHOULD use only cipher suites listed as “Recommended (Y)” in the
   <eref target="https://www.iana.org/assignments/tls-parameters">IANA TLS Parameters</eref> registry.
   Implementations SHOULD provide configurable cipher selection rather than hardcoding cipher lists.</t>
        <t>New implementations of AS2 <strong>MUST</strong> use HTTPS as the default transport
   protocol to provide confidentiality and integrity in transit. Plain HTTP
   remains permitted to support message-level encryption and backward
   compatibility with existing deployments.</t>
        <t>This guidance promotes strong encryption, aligns with current best practices,
   and ensures that AS2 remains interoperable with existing deployments while
   allowing administrators to phase out weaker protocols and cipher suites over time.</t>
      </section>
      <section anchor="tls-server-certificates">
        <name>TLS Server Certificates</name>
        <t>The following certificate types MUST be supported for TLS server
   certificates:</t>
        <artwork><![CDATA[
  o  with URL in the Distinguished Name Common Name attribute

  o  without URL in the Distinguished Name Common Name attribute

  o  self-signed (self-issued)

  o  issued by a certification authority (CA)
]]></artwork>
        <t>The URL, which matches the source server identity, SHOULD be carried
   in the certificate. However, it is not required that DNS checks or
   reverse lookups to vouch for the accuracy of the URL or server value.</t>
        <t>The complete certification chain MUST be included in all
   certificates.  All certificate verifications MUST "chain to root" or
   to an accepted trust anchor. Additionally, the certificate hash
   SHOULD match the hash recomputed by the receiver.</t>
        <t>Because server certificates are exchanged, and also trust is
   established during the configuration of the trading partner
   relationship, runtime validation (including hostname matching and
   certificate path validation) SHOULD be performed unless an out-of-band
   trust model has been explicitly agreed upon by trading partners.
   If a self-signed TLS certificate is used, it SHOULD contain a Subject Alternative Name (SAN)
   extension that includes the DNS name and/or IP address of the sender.
   If included, this certificate extension MUST be marked as non-critical.</t>
        <t><strong>Note:</strong> Although not restricted by this specification, self-signed TLS certificates should
   be used with great care, especially in production environments.</t>
      </section>
      <section anchor="nrr-cautions">
        <name>NRR Cautions</name>
        <t>This specification seeks to provide multiple mechanisms that can be
   combined in accordance with local policies to achieve a wide range of
   security needs as determined by threat and risk analyses of the
   business peers. It is required that all these mechanisms be
   implemented by AS2 software so that the software has capabilities
   that promote strong interoperability, no matter what policies are
   adopted.</t>
        <t>One strong cluster of mechanisms (the secure transmission loop) can
   provide good support for meeting the evidentiary needs of non-
   repudiation of receipt by the original sender and by a third party
   supplied with all stated evidence. However, this specification does
   not itself define non-repudiation of receipt nor enumerate its
   essential properties because NRR is a business analysis and/or legal
   requirement, and not relevantly defined by a technical applicability
   statement.</t>
        <t>Some analyses observe that non-repudiation of receipt presupposes
   that non-repudiation of the sender of the original message is
   obtained, and further that non-repudiation should be implemented by
   means of digital signature on the original message. To satisfy
   strict NRR evidence, authentication and integrity MUST be provided by
   some mechanism, and the RECOMMENDED mechanism is digital signatures
   on both the original message and the receipt message.</t>
        <t>Given that this specification has selected several mechanisms that
   can be combined in several ways, it is important to realize that if a
   digital signature is omitted from the original message, in order to
   satisfy the preceding analysis of NRR requirements, some
   authentication mechanism MUST accompany the request for a signed
   receipt and its included Received-content-MIC value. This
   authentication might come from using client-side SSL, authentication
   via IPsec, or HTTP authentication (while using SSL). In any case,
   records of the message content, its security basis, and the digest
   value need to be retained for the NRR process.</t>
        <t>Therefore, if NRR is one of the goals of the policy that is adopted,
   by using the mechanisms of the secure transmission loop mentioned
   above and by retaining appropriate records of authentication at the
   original message sender site, strong evidentiary requirements
   proposed for NRR can be fulfilled.</t>
        <t>Other ways of proceeding may fall short of fulfilling the most
   stringent sets of evidence required for NRR to obtain, but may
   nevertheless be part of a commercial trading agreement and, as such,
   are good enough for the parties involved. However, if MDNs are
   returned unsigned, evidentiary requirements for NRR are weak; some
   authentication of the identity of the receiver is needed.</t>
        <t>If TLS is used for transport, the guidance in <xref target="https-tls-reqs"/> applies.</t>
      </section>
      <section anchor="replay-remark">
        <name>Replay Remark</name>
        <t>Because business data documents normally contain transaction ids,
   replays (such as resends of not-yet-acknowledged messages) are
   discarded as part of the normal process of duplicate detection.
   Detection of duplicates by Message-Id or by business transaction
   identifiers is recommended.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to update the following registries:</t>
      <artwork><![CDATA[
     o  MDN Disposition Modifier Names
        https://www.iana.org/assignments/mdn/mdn.xhtml#disposition-modifier

     o  Message Disposition Notification Parameters
        https://www.iana.org/assignments/mdn/mdn.xhtml#parameters

     o  Hypertext Transfer Protocol (HTTP) Field Name Registry
        https://www.iana.org/assignments/http-fields/http-fields.xhtml
]]></artwork>
      <section anchor="http-field-name-registrations">
        <name>HTTP Field Name Registrations</name>
        <t>IANA is requested to register the following field names in the "Hypertext
   Transfer Protocol (HTTP) Field Name Registry" as defined in <xref target="RFC9110"/>:</t>
        <artwork><![CDATA[
 **Field Name:** AS2-Version
 **Status:**     permanent
 **Reference:**  rfc4130bis, Section 6.1

 **Field Name:** AS2-Product
 **Status:**     permanent
 **Reference:**  rfc4130bis, Section 6.2

 **Field Name:** AS2-From
 **Status:**     permanent
 **Reference:**  rfc4130bis, Section 6.3

 **Field Name:** AS2-To
 **Status:**     permanent
 **Reference:**  rfc4130bis, Section 6.3
]]></artwork>
        <t>The following AS2 headers were previously defined in RFC 4130 and are
   already registered or are standard HTTP/MIME headers:</t>
        <artwork><![CDATA[
     o  Subject (standard MIME header)
     o  Disposition-Notification-To (RFC 3798)
     o  Disposition-Notification-Options (RFC 3798)
     o  Receipt-Delivery-Option (RFC 4130)
]]></artwork>
      </section>
      <section anchor="as2-mdn-disposition-modifier-registry">
        <name>AS2 MDN Disposition Modifier Registry</name>
        <t>IANA is requested to create a new registry titled "AS2 MDN Disposition
   Modifiers" under the "Multipurpose Internet Mail Extensions (MIME) and
   Media Types" registry group.</t>
        <t><strong>Registration Procedure:</strong> Specification Required (per RFC 8126)</t>
        <t><strong>Initial Registry Contents:</strong></t>
        <table>
          <thead>
            <tr>
              <th align="left">Modifier Value</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">error: authentication-failed</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error: decompression-failed</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error: decryption-failed</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error: insufficient-message-security</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error: integrity-check-failed</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error: unexpected-processing-error</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error:duplicate-filename</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error:illegal-filename</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error:invalid-message-id</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error:unknown-trading-relationship</td>
              <td align="left">rfc4130bis</td>
            </tr>
            <tr>
              <td align="left">error:unknown-trading-partner</td>
              <td align="left">rfc4130bis</td>
            </tr>
          </tbody>
        </table>
        <t>Note: The base disposition types "processed" and "failed" are defined
   in RFC 8098 and are not part of this AS2-specific registry.</t>
      </section>
      <section anchor="registration">
        <name>Registration</name>
        <t>RFC 4130 originally defined an extension to the Message Disposition Notification (MDN)
   protocol for a disposition-modifier in the Disposition field of a body of
   content-type "message/disposition-notification".</t>
        <t>This document updates that definition, and IANA is requested to replace RFC 4130 with this
   document as the reference for the MDN Disposition Modifier Names registry.</t>
        <section anchor="disposition-modifier-warning">
          <name>Disposition Modifier 'warning'</name>
          <artwork><![CDATA[
  Parameter-name:  warning
  Semantics: See section 8.4.3 and
             section 8.5.5 in this document.
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Carl Hage, Karen Rosenfeld, Chuck Fenton, Russ Housley, Marc Blanchet,
   Erik Wrammer, and many others provided valuable suggestions during both
   the initial review of RFC 4130 that improved that applicability statement
   and this bis specification. The authors would also like to thank the past
   and current vendors who have participated in the Drummond AS2 interoperability
   testing. Their contributions have ultimately led to great improvement in the
   clarity of this document.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4130">
          <front>
            <title>MIME-Based Secure Peer-to-Peer Business Data Interchange Using HTTP, Applicability Statement 2 (AS2)</title>
            <author fullname="D. Moberg" initials="D." surname="Moberg"/>
            <author fullname="R. Drummond" initials="R." surname="Drummond"/>
            <date month="July" year="2005"/>
            <abstract>
              <t>This document provides an applicability statement (RFC 2026, Section 3.2) that describes how to exchange structured business data securely using the HTTP transfer protocol, instead of SMTP; the applicability statement for SMTP is found in RFC 3335. Structured business data may be XML; Electronic Data Interchange (EDI) in either the American National Standards Committee (ANSI) X12 format or the UN Electronic Data Interchange for Administration, Commerce, and Transport (UN/EDIFACT) format; or other structured data formats. The data is packaged using standard MIME structures. Authentication and data confidentiality are obtained by using Cryptographic Message Syntax with S/MIME security body parts. Authenticated acknowledgements make use of multipart/signed Message Disposition Notification (MDN) responses to the original HTTP message. This applicability statement is informally referred to as "AS2" because it is the second applicability statement, produced after "AS1", RFC 3335. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4130"/>
          <seriesInfo name="DOI" value="10.17487/RFC4130"/>
        </reference>
        <reference anchor="RFC2045">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This initial document specifies the various headers used to describe the structure of MIME messages. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2045"/>
          <seriesInfo name="DOI" value="10.17487/RFC2045"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC2049">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages. This fifth and final document describes MIME conformance criteria as well as providing some illustrative examples of MIME message formats, acknowledgements, and the bibliography. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2049"/>
          <seriesInfo name="DOI" value="10.17487/RFC2049"/>
        </reference>
        <reference anchor="RFC1767">
          <front>
            <title>MIME Encapsulation of EDI Objects</title>
            <author fullname="D. Crocker" initials="D." surname="Crocker"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>Since there are many different EDI specifications, the current document defines three distinct categories as three different MIME content-types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1767"/>
          <seriesInfo name="DOI" value="10.17487/RFC1767"/>
        </reference>
        <reference anchor="RFC2616">
          <front>
            <title>Hypertext Transfer Protocol -- HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="J. Gettys" initials="J." surname="Gettys"/>
            <author fullname="J. Mogul" initials="J." surname="Mogul"/>
            <author fullname="H. Frystyk" initials="H." surname="Frystyk"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <author fullname="P. Leach" initials="P." surname="Leach"/>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <date month="June" year="1999"/>
            <abstract>
              <t>HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol referred to as "HTTP/1.1", and is an update to RFC 2068. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2616"/>
          <seriesInfo name="DOI" value="10.17487/RFC2616"/>
        </reference>
        <reference anchor="RFC3335">
          <front>
            <title>MIME-based Secure Peer-to-Peer Business Data Interchange over the Internet</title>
            <author fullname="T. Harding" initials="T." surname="Harding"/>
            <author fullname="R. Drummond" initials="R." surname="Drummond"/>
            <author fullname="C. Shih" initials="C." surname="Shih"/>
            <date month="September" year="2002"/>
          </front>
          <seriesInfo name="RFC" value="3335"/>
          <seriesInfo name="DOI" value="10.17487/RFC3335"/>
        </reference>
        <reference anchor="RFC3798">
          <front>
            <title>Message Disposition Notification</title>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="G. Vaudreuil" initials="G." role="editor" surname="Vaudreuil"/>
            <date month="May" year="2004"/>
            <abstract>
              <t>This memo defines a MIME content-type that may be used by a mail user agent (MUA) or electronic mail gateway to report the disposition of a message after it has been successfully delivered to a recipient. This content-type is intended to be machine-processable. Additional message headers are also defined to permit Message Disposition Notifications (MDNs) to be requested by the sender of a message. The purpose is to extend Internet Mail to support functionality often found in other messaging systems, such as X.400 and the proprietary "LAN-based" systems, and often referred to as "read receipts," "acknowledgements", or "receipt notifications." The intention is to do this while respecting privacy concerns, which have often been expressed when such functions have been discussed in the past. Because many messages are sent between the Internet and other messaging systems (such as X.400 or the proprietary "LAN-based" systems), the MDN protocol is designed to be useful in a multi-protocol messaging environment. To this end, the protocol described in this memo provides for the carriage of "foreign" addresses, in addition to those normally used in Internet Mail. Additional attributes may also be defined to support "tunneling" of foreign notifications through Internet Mail. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3798"/>
          <seriesInfo name="DOI" value="10.17487/RFC3798"/>
        </reference>
        <reference anchor="RFC8098">
          <front>
            <title>Message Disposition Notification</title>
            <author fullname="T. Hansen" initials="T." role="editor" surname="Hansen"/>
            <author fullname="A. Melnikov" initials="A." role="editor" surname="Melnikov"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This memo defines a MIME content type that may be used by a Mail User Agent (MUA) or electronic mail gateway to report the disposition of a message after it has been successfully delivered to a recipient. This content type is intended to be machine processable. Additional message header fields are also defined to permit Message Disposition Notifications (MDNs) to be requested by the sender of a message. The purpose is to extend Internet Mail to support functionality often found in other messaging systems, such as X.400 and the proprietary "LAN-based" systems, and are often referred to as "read receipts," "acknowledgements," or "receipt notifications." The intention is to do this while respecting privacy concerns, which have often been expressed when such functions have been discussed in the past.</t>
              <t>Because many messages are sent between the Internet and other messaging systems (such as X.400 or the proprietary "LAN-based" systems), the MDN protocol is designed to be useful in a multiprotocol messaging environment. To this end, the protocol described in this memo provides for the carriage of "foreign" addresses, in addition to those normally used in Internet Mail. Additional attributes may also be defined to support "tunneling" of foreign notifications through Internet Mail.</t>
              <t>This document is an Internet Standard. It obsoletes RFC 3798 and updates RFC 2046 (message/partial media type handling) and RFC 3461 (Original-Recipient header field generation requirement).</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="85"/>
          <seriesInfo name="RFC" value="8098"/>
          <seriesInfo name="DOI" value="10.17487/RFC8098"/>
        </reference>
        <reference anchor="RFC1847">
          <front>
            <title>Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted</title>
            <author fullname="J. Galvin" initials="J." surname="Galvin"/>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <author fullname="S. Crocker" initials="S." surname="Crocker"/>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <date month="October" year="1995"/>
            <abstract>
              <t>This document defines a framework within which security services may be applied to MIME body parts. [STANDARDS-TRACK] This memo defines a new Simple Mail Transfer Protocol (SMTP) [1] reply code, 521, which one may use to indicate that an Internet host does not accept incoming mail. This memo defines an Experimental Protocol for the Internet community. This memo defines an extension to the SMTP service whereby an interrupted SMTP transaction can be restarted at a later time without having to repeat all of the commands and message content sent prior to the interruption. This memo defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1847"/>
          <seriesInfo name="DOI" value="10.17487/RFC1847"/>
        </reference>
        <reference anchor="RFC5751">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification</title>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 3.2. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 3851. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5751"/>
          <seriesInfo name="DOI" value="10.17487/RFC5751"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC3462">
          <front>
            <title>The Multipart/Report Content Type for the Reporting of Mail System Administrative Messages</title>
            <author fullname="G. Vaudreuil" initials="G." surname="Vaudreuil"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>The Multipart/Report Multipurpose Internet Mail Extensions (MIME) content-type is a general "family" or "container" type for electronic mail reports of any kind. Although this memo defines only the use of the Multipart/Report content-type with respect to delivery status reports, mail processing programs will benefit if a single content-type is used to for all kinds of reports. This document is part of a four document set describing the delivery status report service. This collection includes the Simple Mail Transfer Protocol (SMTP) extensions to request delivery status reports, a MIME content for the reporting of delivery reports, an enumeration of extended status codes, and a multipart container for the delivery report, the original message, and a human-friendly summary of the failure. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3462"/>
          <seriesInfo name="DOI" value="10.17487/RFC3462"/>
        </reference>
        <reference anchor="RFC3023">
          <front>
            <title>XML Media Types</title>
            <author fullname="M. Murata" initials="M." surname="Murata"/>
            <author fullname="S. St. Laurent" initials="S." surname="St. Laurent"/>
            <author fullname="D. Kohn" initials="D." surname="Kohn"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This document standardizes five new media types -- text/xml, application/xml, text/xml-external-parsed-entity, application/xml- external-parsed-entity, and application/xml-dtd -- for use in exchanging network entities that are related to the Extensible Markup Language (XML). This document also standardizes a convention (using the suffix '+xml') for naming media types outside of these five types when those media types represent XML MIME (Multipurpose Internet Mail Extensions) entities. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3023"/>
          <seriesInfo name="DOI" value="10.17487/RFC3023"/>
        </reference>
        <reference anchor="RFC2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC3850">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Certificate Handling</title>
            <author fullname="B. Ramsdell" initials="B." role="editor" surname="Ramsdell"/>
            <date month="July" year="2004"/>
            <abstract>
              <t>This document specifies conventions for X.509 certificate usage by Secure/Multipurpose Internet Mail Extensions (S/MIME) agents. S/MIME provides a method to send and receive secure MIME messages, and certificates are an integral part of S/MIME agent processing. S/MIME agents validate certificates as described in RFC 3280, the Internet X.509 Public Key Infrastructure Certificate and CRL Profile. S/MIME agents must meet the certificate processing requirements in this document as well as those in RFC 3280. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3850"/>
          <seriesInfo name="DOI" value="10.17487/RFC3850"/>
        </reference>
        <reference anchor="RFC2234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="November" year="1997"/>
            <abstract>
              <t>In the early days of the Arpanet, each specification contained its own definition of ABNF. This included the email specifications, RFC733 and then RFC822 which have come to be the common citations for defining ABNF. The current document separates out that definition, to permit selective reference. Predictably, it also provides some modifications and enhancements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2234"/>
          <seriesInfo name="DOI" value="10.17487/RFC2234"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3274">
          <front>
            <title>Compressed Data Content Type for Cryptographic Message Syntax (CMS)</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document defines a format for using compressed data as a Cryptographic Message Syntax (CMS) content type. Compressing data before transmission provides a number of advantages, including the elimination of data redundancy which could help an attacker, speeding up processing by reducing the amount of data to be processed by later steps (such as signing or encryption), and reducing overall message size. Although there have been proposals for adding compression at other levels (for example at the MIME or SSL level), these don't address the problem of compression of CMS content unless the compression is supplied by an external means (for example by intermixing MIME and CMS). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3274"/>
          <seriesInfo name="DOI" value="10.17487/RFC3274"/>
        </reference>
        <reference anchor="RFC3280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <author fullname="W. Ford" initials="W." surname="Ford"/>
            <author fullname="D. Solo" initials="D." surname="Solo"/>
            <date month="April" year="2002"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 Certificate Revocation List (CRL) for use in the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3280"/>
          <seriesInfo name="DOI" value="10.17487/RFC3280"/>
        </reference>
        <reference anchor="RFC8551">
          <front>
            <title>Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 4.0 Message Specification</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="B. Ramsdell" initials="B." surname="Ramsdell"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document defines Secure/Multipurpose Internet Mail Extensions (S/MIME) version 4.0. S/MIME provides a consistent way to send and receive secure MIME data. Digital signatures provide authentication, message integrity, and non-repudiation with proof of origin. Encryption provides data confidentiality. Compression can be used to reduce data size. This document obsoletes RFC 5751.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8551"/>
          <seriesInfo name="DOI" value="10.17487/RFC8551"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC6017">
          <front>
            <title>Electronic Data Interchange - Internet Integration (EDIINT) Features Header Field</title>
            <author fullname="K. Meadors" initials="K." role="editor" surname="Meadors"/>
            <date month="September" year="2010"/>
            <abstract>
              <t>With the maturity of the Electronic Data Interchange - Internet Integration (EDIINT) standards of AS1, AS2, and AS3, applications and additional features are being built upon the basic secure transport functionality. These features are not necessarily supported by all EDIINT applications and could cause potential problems with implementations. The EDIINT-Features header field provides a means to resolve these problems and support new functionality. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6017"/>
          <seriesInfo name="DOI" value="10.17487/RFC6017"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC2246">
          <front>
            <title>The TLS Protocol Version 1.0</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="C. Allen" initials="C." surname="Allen"/>
            <date month="January" year="1999"/>
            <abstract>
              <t>This document specifies Version 1.0 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2246"/>
          <seriesInfo name="DOI" value="10.17487/RFC2246"/>
        </reference>
        <reference anchor="RFC4918">
          <front>
            <title>HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV)</title>
            <author fullname="L. Dusseault" initials="L." role="editor" surname="Dusseault"/>
            <date month="June" year="2007"/>
            <abstract>
              <t>Web Distributed Authoring and Versioning (WebDAV) consists of a set of methods, headers, and content-types ancillary to HTTP/1.1 for the management of resource properties, creation and management of resource collections, URL namespace manipulation, and resource locking (collision avoidance).</t>
              <t>RFC 2518 was published in February 1999, and this specification obsoletes RFC 2518 with minor revisions mostly due to interoperability experience. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4918"/>
          <seriesInfo name="DOI" value="10.17487/RFC4918"/>
        </reference>
        <reference anchor="RFC5753">
          <front>
            <title>Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS)</title>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <author fullname="D. Brown" initials="D." surname="Brown"/>
            <date month="January" year="2010"/>
            <abstract>
              <t>This document describes how to use Elliptic Curve Cryptography (ECC) public key algorithms in the Cryptographic Message Syntax (CMS). The ECC algorithms support the creation of digital signatures and the exchange of keys to encrypt or authenticate content. The definition of the algorithm processing is based on the NIST FIPS 186-3 for digital signature, NIST SP800-56A and SEC1 for key agreement, RFC 3370 and RFC 3565 for key wrap and content encryption, NIST FIPS 180-3 for message digest, SEC1 for key derivation, and RFC 2104 and RFC 4231 for message authentication code standards. This document obsoletes RFC 3278. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5753"/>
          <seriesInfo name="DOI" value="10.17487/RFC5753"/>
        </reference>
        <reference anchor="I-D.draft-duker-as2-reliability-16">
          <front>
            <title>Operational Reliability for EDIINT AS2</title>
            <author fullname="John Duker" initials="J." surname="Duker">
              <organization>Procter &amp; Gamble</organization>
            </author>
            <author fullname="dale.moberg@gmail.com" initials="" surname="dale.moberg@gmail.com">
              <organization>Orion Health</organization>
            </author>
            <date day="21" month="October" year="2014"/>
            <abstract>
              <t>One goal of this document is to define approaches to achieve a "once
and only once" delivery of messages. The EDIINT AS2 protocol is
implemented by a number of software tools on a variety of platforms
with varying capabilities and with varying network service quality.
Although the AS2 protocol defines a unique "Message-ID", current
implementations of AS2 do not provide a standard method to prevent
the same message (re-transmitted by the initial sender) from reaching
back-end business applications at the initial receiver.

A second goal is to reduce retransmissions and failures when AS2 is used
in a synchronous mode for transmitting MDNs.  There can be a large
latency between receipt of the POSTed entity body and the MDN response
caused by the operations of decompressing, decrypting, and signature
checks. Uncoordinated timeout policies and intermediate devices dropping
connections have interfered with reliable data exchange. The use of an
HTTP 102(Processing) status code is described to mitigate these
difficulties. Use of these reliability features is indicated by
presence of the "AS2-Reliability" value in the EDIINT-Features header.

Intended Status

The intent of this document is to be placed on the RFC track as an
Informational RFC.

Feedback Instructions:
NOTE TO RFC EDITOR:  This section should be removed by the RFC editor
prior to publication.

If you want to provide feedback on this draft, follow these
guidelines:

-Send feedback via e-mail to the ietf-ediint list for discussion,
with "AS2 Reliability" in the Subject field. To enter or follow the
discussion, you need to subscribe to ietf-ediint@imc.org.

-Be specific as to what section you are referring to, preferably
quoting the portion that needs modification, after which you state
your comments.

-If you are recommending some text to be replaced with your suggested
text, again, quote the section to be replaced, and be clear on the
section in question.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-duker-as2-reliability-16"/>
        </reference>
        <reference anchor="I-D.draft-harding-as2-restart-02">
          <front>
            <title>AS2 Restart for Very Large Messages</title>
            <author fullname="Terry Harding" initials="T." surname="Harding">
         </author>
            <date day="26" month="January" year="2011"/>
            <abstract>
              <t>AS2 Restart provides a method for AS2 clients and servers to restart
payload transfers from the point of failure without requiring the
entire document to be resent.

Keywords

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-harding-as2-restart-02"/>
        </reference>
        <reference anchor="I-D.draft-meadors-certificate-exchange-14">
          <front>
            <title>Certificate Exchange Messaging for EDIINT draft-meadors-certificate-exchange-14.txt Abstract</title>
            <author fullname="Kyle Meadors" initials="K." surname="Meadors">
              <organization>Drummond Group Inc.</organization>
            </author>
            <author fullname="Dale Moberg" initials="D." surname="Moberg">
              <organization>Axway, Inc.</organization>
            </author>
            <date day="22" month="December" year="2011"/>
            <abstract>
              <t>   The EDIINT AS1, AS2 and AS3 message formats do not currently contain
   any neutral provisions for transporting and exchanging trading
   partner profiles or digital certificates. EDIINT Certificate Exchange
   Messaging provides the format and means to effectively exchange
   certificates for use within trading partner relationships. The
   messaging consists of two types of messages, Request and Response,
   which allow trading partners to communicate certificates, their
   intended usage and their acceptance through XML. Certificates can be
   specified for use in digital signatures, data encryption or SSL/TLS
   over HTTP (HTTPS).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-meadors-certificate-exchange-14"/>
        </reference>
      </references>
    </references>
    <?line 2628?>

<section anchor="message-examples">
      <name>Message Examples</name>
      <t>Note to Readers: All examples are provided for illustration only, and are not
   part of the protocol specification. If an example conflicts with the
   protocol definitions, the example is wrong. Email addresses in the
   examples (e.g., in the <tt>Disposition-Notification-To</tt> field) reflect
   one valid option but are not required. In AS2, this field may also
   contain a URL, a fully qualified host name, an AS2 identifier, or
   another implementation-specific string, as described in <xref target="structure-and-processing-of-an-mdn-message"/>.3.</t>
      <section anchor="signed-message-requesting-a-signed-synchronous-receipt">
        <name>Signed Message Requesting a Signed, Synchronous Receipt</name>
        <sourcecode type="text"><![CDATA[
   POST /receive HTTP/1.1
   Host: 10.234.160.12:80
   User-Agent: AS2 Company Server
   Date: Wed, 31 Jul 2025 13:34:50 GMT
   AS2-Version: 1.3
   AS2-From: "as2 Name"
   AS2-To: 0123456780000
   Subject: Test Case
   Message-Id: <200207310834482A70BF63@\"~~foo~~\">
   Disposition-Notification-To: mrAS2@example.com
   Disposition-Notification-Options: signed-receipt-protocol=optional,
        pkcs7-signature; signed-receipt-micalg=optional,sha-256
   Content-Type: multipart/signed; boundary="as2BouNdary1as2";
        protocol="application/pkcs7-signature"; micalg=sha-256
   Content-Length: 2464

   --as2BouNdary1as2
   Content-Type: application/edi-x12
   Content-Disposition: attachment; filename=rfc1767.dat

     {ISA ...EDI transaction data...IEA...}

   --as2BouNdary1as2
   Content-Type: application/pkcs7-signature

     {omitted binary pkcs7 signature data}

   --as2BouNdary1as2--
]]></sourcecode>
      </section>
      <section anchor="mdn-for-message-in-a1-above">
        <name>MDN for Message in A.1, Above</name>
        <sourcecode type="text"><![CDATA[
   HTTP/1.1 200 OK
   AS2-From: 0123456780000
   AS2-To: "as2 Name"
   AS2-Version: 1.3
   Message-ID: <709700825.1028122454671.JavaMail@ediXchange>
   Content-Type: multipart/signed; micalg=sha-256;
        protocol="application/pkcs7-signature";
        boundary="----=_Part_57_648441049.1028122454671"
   Connection: Close
   Content-Length: 1980

   ------=_Part_57_648441049.1028122454671

   & Content-Type: multipart/report;
   &    report-type=disposition-notification;
   &    boundary="----=_Part_56_1672293592.1028122454656"
   &
   &------=_Part_56_1672293592.1028122454656
   &Content-Type: text/plain
   &Content-Transfer-Encoding: 7bit
   &
   &MDN for -
   & Message ID: <200207310834482A70BF63@\"~~foo~~\">
   &  From: "as2 Name"
   &  To: 0123456780000
   &  Received on: 2025-07-31 at 09:34:14 (EDT)
   & Status: processed
   & Comment: This is not a guarantee that the message has
   &  been completely processed or &understood by the receiving
   &  translator
   &
   &------=_Part_56_1672293592.1028122454656
   &Content-Type: message/disposition-notification
   &Content-Transfer-Encoding: 7bit
   &
   &Reporting-UA: AS2 Server
   &Original-Recipient: rfc822; 0123456780000
   &Final-Recipient: rfc822; 0123456780000
   &Original-Message-ID: <200207310834482A70BF63@\"~~foo~~\">
   &Received-content-MIC: 43d9tGY3gNSGuFaut4PAGvuc+48VgW6USgXLDPTxsBU=, sha-256
   &Disposition: automatic-action/MDN-sent-automatically; processed
   &
   &------=_Part_56_1672293592.1028122454656--

   ------=_Part_57_648441049.1028122454671
   Content-Type: application/pkcs7-signature; name=smime.p7s
   Content-Transfer-Encoding: base64
   Content-Disposition: attachment; filename=smime.p7s

   MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQ
   cp24hMJNbxDKHnlB9jTiQzLwSwo+/90Pc87x+Sc6EpFSUYWGAAAAAAAA
   ------=_Part_57_648441049.1028122454671--

   Notes:

   1. The lines proceeded with "&" are what the signature is calculated
      over.

   2. For details on how to prepare the multipart/signed with protocol =
      "application/pkcs7-signature", see the "S/MIME Message
      Specification, PKCS Security Services for MIME".

   3. Note that the textual first body part of the multipart/report can
      be used to include a more detailed explanation of the error
      conditions reported by the disposition headers. The first body
      part of the multipart/report, when used in this way, allows a
      person to better diagnose a problem in detail.

   4. As specified by RFC 3462 [RFC3462], returning the original or portions
      of the original message in the third body part of the
      multipart/report is not required.  This is an optional body part.
      However, it is RECOMMENDED that this body part be omitted or left
      blank.
]]></sourcecode>
      </section>
      <section anchor="signed-encrypted-message-requesting-a-signed-asynchronous-receipt">
        <name>Signed, Encrypted Message Requesting a Signed, Asynchronous Receipt</name>
        <sourcecode type="text"><![CDATA[
   POST /trading_partner HTTP/1.1
   Host: 10.240.1.2:58101
   User-Agent: AS2 Company Server
   Message-ID: <#as2_company#01#a4260as2_companyout#>
   Date: Thu, 19 Dec 2024 15:04:18 GMT
   Subject: Signed and encrypted message with async MDN request
   Mime-Version: 1.0
   Content-Type: application/pkcs7-mime;
       smime-type=enveloped-data; name=smime.p7m
   Content-Transfer-Encoding: binary
   Content-Disposition: attachment; filename=smime.p7m
   Recipient-Address: 10.240.1.2//
   Disposition-Notification-To: http://10.240.1.2:58201/exchange/as2_company
   Disposition-Notification-Options: signed-receipt-protocol=optional,
        pkcs7-signature; signed-receipt-micalg=optional,sha-256
   Receipt-Delivery-Option: http://10.240.1.2:58201/exchange/as2_company
   AS2-From: as2_company
   AS2-To: "AS2 Test"
   AS2-Version: 1.3
   Content-Length: 3428

     {omitted binary encrypted data}
]]></sourcecode>
      </section>
      <section anchor="asynchronous-mdn-for-message-in-a3-above">
        <name>Asynchronous MDN for Message in A.3, Above</name>
        <sourcecode type="text"><![CDATA[
   POST / HTTP/1.1
   Host: 10.234.160.12:80
   TE: trailers, deflate, gzip, compress
   User-Agent: AS2 Company Server
   Date: Thu, 19 Dec 2024 15:05:38 GMT
   Message-ID: <AS2-20021219_030338@as2_company.dgi_th>
   AS2-Version: 1.3
   Mime-Version: 1.0
   Recipient-Address: http://10.240.1.2:58201/exchange/as2_company
   AS2-To: as2_company
   AS2-From: "AS2 Test"
   Subject: Your Requested MDN Response
   From: as2debug@example.com
   Accept-Encoding: deflate, gzip, x-gzip, compress, x-compress
   Content-Type: multipart/signed; micalg=sha-256;
        protocol="application/pkcs7-signature";
        boundary="----=_Part_337_6452266.1040310218750"
   Content-Length: 3103

   ------=_Part_337_6452266.1040310218750
   Content-Type: multipart/report;
        report-type=disposition-notification;
        boundary="----=_Part_336_6069110.1040310218718"

   ------=_Part_336_6069110.1040310218718
   Content-Type: text/plain; charset=us-ascii
   Content-Transfer-Encoding: 7bit

   The message <x12.edi> sent to Recipient <AS2 Test> on Thu, 19 Dec
   2024 15:04:18 GMT with Subject <Signed and encrypted message with async
   MDN request> has been received. The EDI Interchange was successfully
   decrypted, and its integrity was verified. In addition, the sender of
   the message, Sender <as2_company> at Location http://10.240.1.2:58201/exchange/as2_company
   was authenticated as the originator of the message. There is no
   guarantee, however, that the EDI interchange was syntactically
   correct, or that it was received by the EDI application/translator.

   ------=_Part_336_6069110.1040310218718
   Content-Type: message/disposition-notification
   Content-Transfer-Encoding: 7bit

   Reporting-UA: AS2@test:8101
   Original-Recipient: rfc822; "AS2 Test"
   Final-Recipient: rfc822; "AS2 Test"
   Original-Message-ID: <#as2_company#01#a4260as2_companyout#>
   Disposition: automatic-action/MDN-sent-automatically; processed
   Received-Content-MIC: Hes6my+vIxIYxmvsA+MNpEOTPAc=, sha1

   ------=_Part_336_6069110.1040310218718--

   ------=_Part_337_6452266.1040310218750
   Content-Type: application/pkcs7-signature; name=smime.p7s
   Content-Transfer-Encoding: base64
   Content-Disposition: attachment; filename=smime.p7s

   BhbWjEfbyXoTAS/H0zpnEqLqbaBh29y2v82b8bdeGw8pipBQWmf53hIcqHGM
   4ZBF3CHw5Wrf1JIE+8TwOzdbal30zeChw88WfRfD7c/j1fIA8sxsujvf2d9j
   UxCUga8BVdVB9kH0Geexytyt0KvWQXfaEEcgZGUAAAAAAAA=

   ------=_Part_337_6452266.1040310218750-
]]></sourcecode>
      </section>
    </section>
    <section anchor="change-log-non-normative">
      <name>Change Log (Non-Normative)</name>
      <t>This appendix records the substantive changes made during the revision
from the original RFC 4130 draft toward the current version of this document.</t>
      <section anchor="general">
        <name>General</name>
        <ul spacing="normal">
          <li>
            <t>Removed all references to AS1/SMTP throughout the draft.</t>
          </li>
          <li>
            <t>Included descriptions and references for compressed content, which was previously supported since AS2 version 1.1.</t>
          </li>
          <li>
            <t>This draft explicitly allows negotiation of newer RFCs while retaining legacy support, where necessary.</t>
          </li>
          <li>
            <t>Updated formatting and cross-references so that all internal "Section X.Y"
references are properly linked in HTML and XML output.</t>
          </li>
          <li>
            <t>Moved legacy interoperability clarifications to Section 1.2.1
to avoid confusion with normative text.</t>
          </li>
          <li>
            <t>Clarified that appendices are non-normative unless otherwise indicated.</t>
          </li>
          <li>
            <t>Replaced all references to RFC 3851 with RFC 5751.</t>
          </li>
          <li>
            <t>Replaced all references to RFC 3852 with RFC 5652.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-12-backward-compatibility-and-interoperability">
        <name>Changes affecting Section 1.2 - Backward Compatibility and Interoperability</name>
        <ul spacing="normal">
          <li>
            <t>Expanded to explicitly state the dual-reference policy:
            </t>
            <ul spacing="normal">
              <li>
                <t>Implementations MAY interoperate with S/MIME v3.2 (RFC 5751, which
obsoletes RFC 3851/3852).</t>
              </li>
              <li>
                <t>Conformant implementations MUST also support S/MIME v4.0 (RFC 8551,
which obsoletes RFC 5751).</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>UPDATED (Technical Review)</strong>: Clarified that S/MIME 4.0 is the baseline
for conformant implementations, with explicit guidance on when to use
AuthEnvelopedData (S/MIME 4.0 with AES-GCM/AES-CCM) versus EnvelopedData
(S/MIME 3.2 with AES-CBC or for backward compatibility).</t>
          </li>
          <li>
            <t>Added explicit pointer to Section 1.2.1 for legacy interoperability
clarifications.</t>
          </li>
          <li>
            <t>Clarified that RFC 8551 forms the baseline for new implementations.</t>
          </li>
          <li>
            <t>Added new <strong>Section 1.2.1</strong>: Legacy Interoperability (non-normative clarifications):
            </t>
            <ul spacing="normal">
              <li>
                <t>Captures behavior when interoperating with RFC 4130 systems.</t>
              </li>
              <li>
                <t>Explicit note: 3DES withdrawn by NIST in 2024; MAY only be accepted for
backward compatibility, SHOULD NOT be generated.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-51-as2-version-header">
        <name>Changes affecting Section 5.1 - AS2-Version Header</name>
        <ul spacing="normal">
          <li>
            <t>Retained definitions for AS2-Version 1.0, 1.1, and included the previously supported version 1.2.</t>
          </li>
          <li>
            <t>Added <strong>AS2-Version: 1.3</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Defines modernization requirements (SHA-256, AES baseline per RFC 8551).</t>
              </li>
              <li>
                <t>Aligns MDN behavior with RFC 8098.</t>
              </li>
              <li>
                <t>Requires support for multiple-recipient encryption (Section 7.2).</t>
              </li>
              <li>
                <t>States weak algorithms (SHA-1, MD5, 3DES, RC2) SHOULD NOT be generated
by conformant 1.3 implementations.</t>
              </li>
              <li>
                <t>Points to Section 1.2.1 for legacy interoperability when communicating
with 1.2 or earlier partners.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Added note about future versioning: minor versions (1.x) remain backward
compatible; major version (2.0+) would indicate non-backward-compatible
revisions.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-533-message-id-and-original-message-id">
        <name>Changes affecting Section 5.3.3 — Message-Id and Original-Message-Id</name>
        <ul spacing="normal">
          <li>
            <t>Prohibit spaces and control characters in newly generated <tt>Message-Id</tt>
values; recommend removal (not substitution) when constructing from
other attributes.</t>
          </li>
          <li>
            <t>Clarify receiver behavior: implementations are not required to accept
malformed <tt>Message-Id</tt> values; they SHOULD return an MDN with
<tt>processed/error</tt> and a human-readable explanation (per <xref target="RFC8098"/>).</t>
          </li>
          <li>
            <t>Keep angle-bracket guidance; brackets are required on send and are not
part of the identifier value. Receivers SHOULD NOT reject solely for
missing brackets.</t>
          </li>
          <li>
            <t>Update normative reference to <xref target="RFC5322"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-sections-54-and-55-reliability-and-restart">
        <name>Changes affecting Sections 5.4 and 5.5 — Reliability and Restart</name>
        <ul spacing="normal">
          <li>
            <t>Expanded Section 5.4 to clarify that HTTP 102 (Processing) MAY be used
under HTTP/1.1 for progress indication but MUST NOT be used under
HTTP/2 or HTTP/3.</t>
          </li>
          <li>
            <t>Changed previous requirement to close connections before retry to
optional behavior; clarified that 102 is deprecated but still
permitted for backward compatibility.</t>
          </li>
          <li>
            <t>Expanded Section 5.5 to reference the AS2 Reliability
(<xref target="I-D.draft-duker-as2-reliability-16"/>) and AS2 Restart (<xref target="I-D.draft-harding-as2-restart-02"/>) drafts.</t>
          </li>
          <li>
            <t>Clarified that implementations SHOULD support configurable retry logic
and MAY implement restart for large or interrupted transfers.</t>
          </li>
          <li>
            <t>Added explicit normative language about duplicate detection using
Message-ID.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-6-additional-as2-specific-http-headers">
        <name>Changes affecting Section 6 — Additional AS2-Specific HTTP Headers</name>
        <ul spacing="normal">
          <li>
            <t>Added new <tt>AS2-Product</tt> header to identify the sending product and version.</t>
          </li>
          <li>
            <t>Defined header format as <tt>&lt;product-name&gt;:&lt;major.minor[.patch]&gt;</tt>.</t>
          </li>
          <li>
            <t>Required inclusion for AS2-Version 1.3 and possibly 2.0 later.</t>
          </li>
          <li>
            <t>Clarified that the header enables interoperability diagnostics and
implementation-specific workarounds, not capability negotiation.</t>
          </li>
          <li>
            <t>Explicitly stated that arbitrary or misleading product names MUST NOT be used.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-7-algorithm-requirements">
        <name>Changes affecting Section 7 - Algorithm Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Introduced a new dedicated section consolidating algorithm requirements.</t>
          </li>
          <li>
            <t><strong>Hash Algorithms</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>MUST support SHA-256.</t>
              </li>
              <li>
                <t>SHOULD support SHA-384 or stronger.</t>
              </li>
              <li>
                <t>SHA-1 and MD5 deprecated; SHOULD NOT be generated by conformant implementations.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Encryption Algorithms</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>MUST support AES-128-CBC; SHOULD support AES-256-CBC.</t>
              </li>
              <li>
                <t>RECOMMENDED to support AES-GCM and AES-CCM modes.</t>
              </li>
              <li>
                <t>3DES and RC2 deprecated; SHOULD NOT be generated.</t>
              </li>
              <li>
                <t>SHOULD support multiple-recipient encryption (per RFC 8551 §3.3).</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>UPDATED (Technical Review)</strong>: Added comprehensive key management algorithm
requirements:
            </t>
            <ul spacing="normal">
              <li>
                <t>MUST support RSA with minimum 2048-bit key length</t>
              </li>
              <li>
                <t>MAY support ECDH and Diffie-Hellman (RFC 5753)</t>
              </li>
              <li>
                <t>For elliptic curves, SHOULD support NIST P-256 or stronger</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>UPDATED (Technical Review)</strong>: Added new Section 7.2 subsections:
            </t>
            <ul spacing="normal">
              <li>
                <t>"EnvelopedData vs AuthEnvelopedData" - Explicit rules for when to use each:
                </t>
                <ul spacing="normal">
                  <li>
                    <t>AuthEnvelopedData MUST be used with AES-GCM and AES-CCM</t>
                  </li>
                  <li>
                    <t>EnvelopedData MUST be used with AES-CBC and for S/MIME 3.2 compatibility</t>
                  </li>
                  <li>
                    <t>Single content encryption algorithm MUST be used for all recipients</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>"Multiple-Recipient Encryption" - Explains support for multiple recipients
of the same content-encryption key</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Added explicit cross-references to Section 1.2.1 for legacy interoperability.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-8-mdn-processing">
        <name>Changes affecting Section 8 - MDN Processing</name>
        <ul spacing="normal">
          <li>
            <t>Updated to align MDN behavior with RFC 8098 (superseding RFC 3798).</t>
          </li>
          <li>
            <t>Clarified semantics for signed-receipt-micalg:
            </t>
            <ul spacing="normal">
              <li>
                <t>Allow multiple algorithms in header for backward compatibility.</t>
              </li>
              <li>
                <t>Conformance requires selecting one algorithm in Received-content-MIC.</t>
              </li>
              <li>
                <t>SHA-256 set as the default minimum; SHA-1 only permitted for legacy use.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Relaxed constraints on the content of the Disposition-notification-to header.</t>
          </li>
          <li>
            <t>Definitions have been included for additional supported error dispositions.</t>
          </li>
          <li>
            <t>Clarified required MDN fields:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>Final-Recipient</tt> — MUST always be present.</t>
              </li>
              <li>
                <t><tt>Original-Message-ID</tt> — REQUIRED and must match the original message exactly.</t>
              </li>
              <li>
                <t><tt>Message-ID</tt> in the MDN — optional.</t>
              </li>
              <li>
                <t><tt>Disposition-Notification-To</tt> — MAY use any format (email, URL, hostname);
receiving systems MUST ignore syntax issues per RFC 4130.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Updated asynchronous MDN handling to reflect practical implementation realities:
            </t>
            <ul spacing="normal">
              <li>
                <t>HTTP 200-level responses SHOULD be sent immediately after receiving the last byte,
before full decryption or validation, to minimize timeout risk.</t>
              </li>
              <li>
                <t>Persistent (keep-alive) connections MAY be used; closing is optional and
implementation-dependent.</t>
              </li>
              <li>
                <t>Receipt of a 200-level response only acknowledges receipt, not successful processing.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Emphasized that asynchronous MDNs are sent as independent HTTP messages per
Section 7.3, and clarified that connection handling should not be mandated at
the application layer.</t>
          </li>
          <li>
            <t>Added standardized <tt>disposition-modifier</tt> extensions to improve error
reporting.</t>
          </li>
          <li>
            <t>New recommended modifiers:
            </t>
            <ul spacing="normal">
              <li>
                <t><tt>error: decompression-failed</tt></t>
              </li>
              <li>
                <t><tt>error:duplicate-filename</tt></t>
              </li>
              <li>
                <t><tt>error:illegal-filename</tt></t>
              </li>
              <li>
                <t><tt>error: insufficient-message-security</tt></t>
              </li>
              <li>
                <t><tt>error:invalid-message-id</tt></t>
              </li>
              <li>
                <t><tt>error:unknown-trading-relationship</tt></t>
              </li>
              <li>
                <t><tt>error: unknown-trading-partner</tt></t>
              </li>
            </ul>
          </li>
          <li>
            <t>Clarified that implementations returning these modifiers MUST include a
human-readable explanation in the MDN <tt>Explanation</tt> field.</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-9-public-key-certificate-handling">
        <name>Changes affecting Section 9 — Public Key Certificate Handling</name>
        <ul spacing="normal">
          <li>
            <t>Revised the opening paragraph to reference the optional <strong>AS2 GET</strong> method,
in addition to manual partner onboarding.</t>
          </li>
          <li>
            <t>Expanded the section to clarify separate roles and lifecycle management
for <strong>TLS certificates</strong> (transport security) and <strong>AS2 certificates</strong>
(message signing and encryption).</t>
          </li>
          <li>
            <t><strong>UPDATED (Technical Review)</strong>: Strengthened requirement that TLS and AS2
certificates <strong>MUST NOT</strong> be the same certificate (changed from SHOULD NOT).
Using the same certificate for both purposes creates security dependencies
and operational risks that must be avoided.</t>
          </li>
          <li>
            <t>Required a <strong>minimum RSA key length of 2048 bits</strong> (or equivalent elliptic-curve
strength such as P-256).</t>
          </li>
          <li>
            <t>Clarified that:
            </t>
            <ul spacing="normal">
              <li>
                <t><strong>TLS certificates</strong> SHOULD be CA-signed in production; self-signed
certificates MAY be used in test environments or by partner agreement,
provided they include a <strong>Subject Alternative Name (SAN)</strong> extension
with hostname and/or IP address.</t>
              </li>
              <li>
                <t><strong>UPDATED (Technical Review)</strong>: Added reference to CA/Browser Forum
Baseline Requirements (https://cabforum.org/baseline-requirements-documents/)
for public-facing TLS certificates.</t>
              </li>
              <li>
                <t><strong>AS2 certificates</strong> MAY be CA-issued or self-signed per partner policy.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Added guidance that <strong>AS2 certificate lifetimes</strong> need not mirror the
short renewal cycles of TLS certificates; renewal policies SHOULD be
independent.</t>
          </li>
          <li>
            <t>Recommended <strong>CEM</strong> for automated certificate exchange between partners
to reduce manual errors and downtime.</t>
          </li>
          <li>
            <t><strong>UPDATED (Technical Review)</strong>: Clarified AS2 GET certificate retrieval
requirements to focus on authentication (verify requester identity) and
authorization (ensure only legitimate partners can access certificates)
rather than just integrity protection. While certificates are digitally
signed and thus tamper-evident, authentication and authorization prevent
unauthorized parties from obtaining certificates and mapping trading
partner relationships. For self-signed certificates, added requirement
for out-of-band fingerprint verification before production use.</t>
          </li>
          <li>
            <t>Added operational recommendations:
            </t>
            <ul spacing="normal">
              <li>
                <t>Maintain separate TLS / AS2 certificates.</t>
              </li>
              <li>
                <t>Include SAN extensions in all self-signed certificates.</t>
              </li>
              <li>
                <t>Support configurable expiry-notification mechanisms.</t>
              </li>
              <li>
                <t><strong>UPDATED (Technical Review)</strong>: Administrators MUST NOT (strengthened
from SHOULD NOT) reuse TLS certificates for AS2 message security.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-10-security-considerations">
        <name>Changes affecting Section 10 - Security Considerations</name>
        <ul spacing="normal">
          <li>
            <t>Provided guidance for the usage of HTTPS and the minimum and recommended usage of TLS versions.</t>
          </li>
          <li>
            <t>Expanded discussion of algorithm lifecycle:
            </t>
            <ul spacing="normal">
              <li>
                <t>SHA-1 and MD5 deprecated; 3DES formally withdrawn by NIST (2024).</t>
              </li>
              <li>
                <t>Implementations SHOULD NOT generate deprecated algorithms.</t>
              </li>
              <li>
                <t>Migration guidance provided for interoperability.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Added explicit references back to Section 7 (Algorithm Requirements) and
Section 1.2.1 (Legacy Interoperability).</t>
          </li>
        </ul>
      </section>
      <section anchor="changes-affecting-section-11-iana-considerations">
        <name>Changes affecting Section 11 - IANA Considerations</name>
        <ul spacing="normal">
          <li>
            <t>Clarified that IANA must update existing MDN registries to reference this
specification (replacing RFC 4130).</t>
          </li>
          <li>
            <t>Added direct links to IANA registry pages for clarity.</t>
          </li>
        </ul>
      </section>
      <section anchor="updated-message-examples">
        <name>Updated Message Examples</name>
        <ul spacing="normal">
          <li>
            <t><strong>Appendix A</strong>: Updated Message Examples with newer algorithms.</t>
          </li>
        </ul>
      </section>
      <section anchor="formatting-and-editorial-updates-technical-review">
        <name>Formatting and Editorial Updates (Technical Review)</name>
        <t>The following formatting and editorial improvements were made based on
technical review feedback:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Section 1.1 (Applicable RFCs)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Updated RFC references to reflect proper obsolescence chain (RFC 3851 -&gt;
RFC 5751 -&gt; RFC 8551)</t>
              </li>
              <li>
                <t>Added RFC 5751 and RFC 5652 to normative references</t>
              </li>
              <li>
                <t>Added explicit explanation of when to use AuthEnvelopedData vs
EnvelopedData based on encryption algorithm choice</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 1.3 (Algorithm Coverage)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Expanded hash function section to include encryption algorithms</t>
              </li>
              <li>
                <t>Added key management algorithm requirements for ECDH</t>
              </li>
              <li>
                <t>Added RFC 5753 to informative references</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 6 (AS2-Specific HTTP Headers)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Reformatted AS2-Version header descriptions to comply with RFC
formatting requirements (72-character line limit)</t>
              </li>
              <li>
                <t>Removed markdown artifacts <tt>{:format="none"}</tt> from all cross-references
throughout the document (24 instances)</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>RFC Reference Sections</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Moved RFC citations from section titles to first sentence of each
section (9 sections in "Referenced RFCs and Their Contributions")</t>
              </li>
              <li>
                <t>Example: "## RFC 2616 HTTP v1.1 <xref target="RFC2616"/>" became
"## RFC 2616 HTTP v1.1" with "<xref target="RFC2616"/> specifies..." in text</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Capitalization</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Corrected "internet" to "Internet" (2 instances)</t>
              </li>
              <li>
                <t>Ensured consistent capitalization throughout document</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Cross-References</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Standardized all internal section references to use plain markdown
format without formatting directives</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Bullet Formatting</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Standardized all sections requiring bullets to use the same type and
and same spacing and margins.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="editorial-corrections">
        <name>Editorial Corrections</name>
        <ul spacing="normal">
          <li>
            <t><strong>Terminology Updates</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Changed all instances of "TCP/IP connection" to "HTTP connection" (3 locations)
to properly reflect the protocol layer and accommodate HTTP/2, HTTP/3, and QUIC</t>
              </li>
              <li>
                <t>Added RFC reference to S/MIME definition in Section 1.4 (Terms)</t>
              </li>
              <li>
                <t>Simplified "Internet's HTTP environment" to "over HTTP" in Section 2 (Overview)</t>
              </li>
              <li>
                <t>Removed outdated "Internet EDI" terminology (2 instances in Sections 8.3 and 8.5.4)</t>
              </li>
              <li>
                <t>Fixed typos in Appendix B change log ("dispositions.0" and "usgae")</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Cross-Reference Fixes</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Removed problematic forward reference to structure-and-processing-of-an-mdn-message
from Section 2.4.2 (reference was not resolving in kramdown-rfc)</t>
              </li>
              <li>
                <t>Replaced three anchor references with explicit section numbers due to kramdown-rfc
limitations with third-level explicit heading anchors:
                </t>
                <ul spacing="normal">
                  <li>
                    <t><tt>{{the-secure-transmission-loop}}</tt> -&gt; Section 2.3.1</t>
                  </li>
                  <li>
                    <t><tt>{{backward-compatibility-and-interoperability}}.1</tt> -&gt; Section 1.2.1</t>
                  </li>
                  <li>
                    <t><tt>{{legacy-interoperability-non-normative}}</tt> -&gt; Section 1.2.1 (in bullet list context)</t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="substantive-technical-changes">
        <name>Substantive Technical Changes</name>
        <ul spacing="normal">
          <li>
            <t><strong>Section 2.4.2 (Security Permutations)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Replaced exhaustive 24-permutation enumeration with concise capability summary</t>
              </li>
              <li>
                <t>Added clarification that security combinations are determined by partner agreements</t>
              </li>
              <li>
                <t>Addresses reviewer concern about unnecessary implementation complexity</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 2.4.2 (Compression and Signature Ordering)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Added explicit guidance that compression is always applied before encryption</t>
              </li>
              <li>
                <t>Clarified that implementations MAY apply compression before or after signing</t>
              </li>
              <li>
                <t>Added requirement that conformant implementations MUST handle decompression
regardless of compression/signing order</t>
              </li>
              <li>
                <t>Added note that MIC computation is always applied to the signed portion and
includes inner MIME headers</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 2.4.2 (MIME Type Requirements)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Distinguished between protocol-level MIME types (MUST support) and
content-specific types (SHOULD support based on use case)</t>
              </li>
              <li>
                <t>Moved EDI-specific MIME types (application/EDI-X12, application/EDIFACT) to
SHOULD category to avoid unnecessary requirements for non-EDI implementations</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 5 (HTTP Considerations)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Updated to clarify that HTTP/1.1 is the baseline, with HTTP/2 and HTTP/3 as
optional when supported by both partners</t>
              </li>
              <li>
                <t>Clarified that certification programs define their own conformance profiles</t>
              </li>
              <li>
                <t>Addresses concern about IETF/RFC overreach into certification scope</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 5 (Connection Management) - NEW SUBSECTION</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Added comprehensive guidance on HTTP persistent connections</t>
              </li>
              <li>
                <t>Clarified that Connection: close is not required and SHOULD NOT be used
unless specifically needed</t>
              </li>
              <li>
                <t>Explained that HTTP/1.1 persistent connections are the default behavior</t>
              </li>
              <li>
                <t>Noted performance benefits of persistent connections, particularly for HTTPS</t>
              </li>
              <li>
                <t>Removed Connection: close header from message examples (2 instances in Appendix A)</t>
              </li>
              <li>
                <t>Addresses working group discussion about unnecessary connection closing</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 5.1 (TLS Requirements)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Updated to acknowledge TLS 1.3 <xref target="RFC8446"/> as current IETF standard</t>
              </li>
              <li>
                <t>Maintained TLS 1.2 <xref target="RFC5246"/> as baseline requirement for backward compatibility</t>
              </li>
              <li>
                <t>Provided clear migration guidance</t>
              </li>
              <li>
                <t>Added RFC8446 and RFC5246 to normative references</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 6.2 (AS2-Product Header)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Updated format to support optional Private Enterprise Number (PEN) prefix</t>
              </li>
              <li>
                <t>Format: <tt>[PEN-&lt;number&gt;:]&lt;product-name&gt;:&lt;version&gt;</tt></t>
              </li>
              <li>
                <t>PEN usage is RECOMMENDED but not required</t>
              </li>
              <li>
                <t>Addresses concern about vendor identification without requiring PEN registration</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 7 (Algorithm Lifecycle Management) - NEW SUBSECTION</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Added formal algorithm lifecycle management guidance</t>
              </li>
              <li>
                <t>Defined algorithm categories (MUST, SHOULD, MAY, DEPRECATED, MUST NOT)</t>
              </li>
              <li>
                <t>Referenced existing S/MIME v4.0 and CMS algorithm registries rather than
creating redundant AS2-specific registry</t>
              </li>
              <li>
                <t>Provided references to NIST SP 800-57 and 800-131A for implementer guidance</t>
              </li>
              <li>
                <t>Establishes update pathway without requiring constant RFC revisions</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Section 11 (IANA Considerations)</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Added HTTP Field Name Registry section requesting registration of AS2 headers
(AS2-Version, AS2-Product, AS2-From, AS2-To) per RFC9110</t>
              </li>
              <li>
                <t>Created new AS2 MDN Disposition Modifier Registry with Specification Required
registration procedure</t>
              </li>
              <li>
                <t>Initial registry includes 10 error disposition modifiers</t>
              </li>
              <li>
                <t>Added RFC9110 to normative references</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="normative-references-added">
        <name>Normative References Added</name>
        <ul spacing="normal">
          <li>
            <t>RFC5246 (TLS 1.2)</t>
          </li>
          <li>
            <t>RFC8446 (TLS 1.3)</t>
          </li>
          <li>
            <t>RFC9110 (HTTP Semantics)</t>
          </li>
        </ul>
        <t>These updates improve RFC formatting compliance and document clarity while
maintaining all technical content and backward compatibility requirements.</t>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
