| rfc9608.original | rfc9608.txt | |||
|---|---|---|---|---|
| LAMPS Working Group R. Housley | Internet Engineering Task Force (IETF) R. Housley | |||
| Internet-Draft Vigil Security | Request for Comments: 9608 Vigil Security | |||
| Updates: 5280 (if approved) T. Okubo | Updates: 5280 T. Okubo | |||
| Intended status: Standards Track DigiCert | Category: Standards Track DigiCert | |||
| Expires: 6 October 2024 J. Mandel | ISSN: 2070-1721 J. Mandel | |||
| SecureG | AKAYLA, Inc. | |||
| 4 April 2024 | June 2024 | |||
| No Revocation Available for X.509 Public Key Certificates | No Revocation Available for X.509 Public Key Certificates | |||
| draft-ietf-lamps-norevavail-04 | ||||
| Abstract | Abstract | |||
| X.509v3 public key certificates are profiled in RFC 5280. Short- | X.509v3 public key certificates are profiled in RFC 5280. Short- | |||
| lived certificates are seeing greater use in the Internet. The | lived certificates are seeing greater use in the Internet. The | |||
| Certification Authority (CA) that issues these short-lived | Certification Authority (CA) that issues these short-lived | |||
| certificates do not publish revocation information because the | certificates do not publish revocation information because the | |||
| certificate lifespan that is shorter than the time needed to detect, | certificate lifespan that is shorter than the time needed to detect, | |||
| report, and distribute revocation information. Some long-lived | report, and distribute revocation information. Some long-lived | |||
| X.509v3 public key certificates never expire, and they are never | X.509v3 public key certificates never expire, and they are never | |||
| revoked. This specification defines the noRevAvail certificate | revoked. This specification defines the noRevAvail certificate | |||
| extension so that a relying party can readily determine that the CA | extension so that a relying party can readily determine that the CA | |||
| does not publish revocation information for the certificate, and it | does not publish revocation information for the certificate, and it | |||
| updates the certification path validation algorithm in RFC 5280 to | updates the certification path validation algorithm defined in RFC | |||
| skip revocation checking when the noRevAvail certificate extension is | 5280 so that revocation checking is skipped when the noRevAvail | |||
| present. | certificate extension is present. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
| provisions of BCP 78 and BCP 79. | ||||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 6 October 2024. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9608. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2024 IETF Trust and the persons identified as the | Copyright (c) 2024 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
| extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
| described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
| provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
| in the Revised BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
| 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.1. Terminology | |||
| 1.2. ASN.1 . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1.2. ASN.1 | |||
| 1.3. History . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 1.3. History | |||
| 2. The noRevAvail Certificate Extension . . . . . . . . . . . . 4 | 2. The noRevAvail Certificate Extension | |||
| 3. Other X.509 Certificate Extensions . . . . . . . . . . . . . 5 | 3. Other X.509 Certificate Extensions | |||
| 4. Certification Path Validation . . . . . . . . . . . . . . . . 5 | 4. Certification Path Validation | |||
| 5. ASN.1 Module . . . . . . . . . . . . . . . . . . . . . . . . 5 | 5. ASN.1 Module | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | 6. Security Considerations | |||
| 6.1. Short-lived Certificates . . . . . . . . . . . . . . . . 7 | 6.1. Short-Lived Certificates | |||
| 6.2. Long-lived Certificates . . . . . . . . . . . . . . . . . 7 | 6.2. Long-Lived Certificates | |||
| 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 7. IANA Considerations | |||
| 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | 8. References | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 | 8.1. Normative References | |||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . 8 | 8.2. Informative References | |||
| 9.2. Informative References . . . . . . . . . . . . . . . . . 9 | Acknowledgements | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| X.509v3 public key certificates [RFC5280] with short validity periods | X.509v3 public key certificates [RFC5280] with short validity periods | |||
| are seeing greater use in the Internet. For example, Automatic | are seeing greater use in the Internet. For example, Automatic | |||
| Certificate Management Environment (ACME) [RFC8555] provides a | Certificate Management Environment (ACME) [RFC8555] provides a | |||
| straightforward way to obtain short-lived certificates. In many | straightforward way to obtain short-lived certificates. In many | |||
| cases, no revocation information is made available for short-lived | cases, no revocation information is made available for short-lived | |||
| certificates by the Certification Authority (CA). This is because | certificates by the Certification Authority (CA). This is because | |||
| short-lived certificates have a validity period that is shorter than | short-lived certificates have a validity period that is shorter than | |||
| skipping to change at page 3, line 19 ¶ | skipping to change at line 106 ¶ | |||
| IDevID certificate [IEEE802.1AR] to bind the factory-assigned device | IDevID certificate [IEEE802.1AR] to bind the factory-assigned device | |||
| identity to a factory-installed public key. This identity might | identity to a factory-installed public key. This identity might | |||
| include the manufacturer, model, and serial number of the device, | include the manufacturer, model, and serial number of the device, | |||
| which never change. To indicate that a certificate has no well- | which never change. To indicate that a certificate has no well- | |||
| defined expiration date, the notAfter date in the certificate | defined expiration date, the notAfter date in the certificate | |||
| validity period is set to "99991231235959Z" [RFC5280]. | validity period is set to "99991231235959Z" [RFC5280]. | |||
| This specification defines the noRevAvail certificate extension so | This specification defines the noRevAvail certificate extension so | |||
| that a relying party can readily determine that the CA does not | that a relying party can readily determine that the CA does not | |||
| publish revocation information for the end-entity certificate, and it | publish revocation information for the end-entity certificate, and it | |||
| updates the certification path validation algorithm in [RFC5280] to | updates the certification path validation algorithm defined in | |||
| skip revocation checking when the noRevAvail certificate extension is | [RFC5280] so that revocation checking is skipped when the noRevAvail | |||
| present. | certificate extension is present. | |||
| Note that the noRevAvail certificate extension provides similar | Note that the noRevAvail certificate extension provides similar | |||
| functionality to the ocsp-nocheck certificate extension [RFC6960]. | functionality to the ocsp-nocheck certificate extension [RFC6960]. | |||
| The ocsp-nocheck certificate extension is appropriate for inclusion | The ocsp-nocheck certificate extension is appropriate for inclusion | |||
| only in certificates issued to OCSP Responders, whereas noRevAvail | only in certificates issued to Online Certificate Status Protocol | |||
| certificate extension is appropriate in any end-entity certificate | (OCSP) responders, whereas the noRevAvail certificate extension is | |||
| for which the CA will not publish revocation information. To avoid | appropriate in any end-entity certificate for which the CA will not | |||
| disruption to the OCSP ecosystem, implementers should not think of | publish revocation information. To avoid disruption to the OCSP | |||
| the noRevAvail certificate extension a substitute for the ocsp- | ecosystem, implementers should not think of the noRevAvail | |||
| nocheck certificate extension; however, the noRevAvail certificate | certificate extension a substitute for the ocsp-nocheck certificate | |||
| extension could be included in certificates issued to OCSP Responders | extension; however, the noRevAvail certificate extension could be | |||
| in addition to the ocsp-nocheck certificate extension. | included in certificates issued to OCSP responders in addition to the | |||
| ocsp-nocheck certificate extension. | ||||
| 1.1. Terminology | 1.1. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
| BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 1.2. ASN.1 | 1.2. ASN.1 | |||
| skipping to change at page 4, line 32 ¶ | skipping to change at line 164 ¶ | |||
| In 2019, ITU-T published an update to ITU-T Recommendation X.509 | In 2019, ITU-T published an update to ITU-T Recommendation X.509 | |||
| [X.509-2019]. | [X.509-2019]. | |||
| With greater use of short-lived certificates in the Internet, the | With greater use of short-lived certificates in the Internet, the | |||
| recent Technical Corrigendum to ITU-T Recommendation X.509 | recent Technical Corrigendum to ITU-T Recommendation X.509 | |||
| [X.509-2019-TC2] allows the noRevAvail certificate extension to be | [X.509-2019-TC2] allows the noRevAvail certificate extension to be | |||
| used with public key certificates as well as attribute certificates. | used with public key certificates as well as attribute certificates. | |||
| 2. The noRevAvail Certificate Extension | 2. The noRevAvail Certificate Extension | |||
| The noRevAvail extension, defined in [X.509-2019-TC2], allows an CA | The noRevAvail extension, defined in [X.509-2019-TC2], allows a CA to | |||
| to indicate that no revocation information will be made available for | indicate that no revocation information will be made available for | |||
| this certificate. | this certificate. | |||
| This extension MUST NOT be present in CA public key certificates. | This extension MUST NOT be present in CA public key certificates. | |||
| Conforming CAs MUST include this extension in certificates for which | Conforming CAs MUST include this extension in certificates for which | |||
| no revocation information will be published. When present, | no revocation information will be published. When present, | |||
| conforming CAs MUST mark this extension as non-critical. | conforming CAs MUST mark this extension as non-critical. | |||
| name id-ce-noRevAvail | name id-ce-noRevAvail | |||
| OID { id-ce 56 } | OID { id-ce 56 } | |||
| syntax NULL (i.e. '0500'H is the DER encoding) | syntax NULL (i.e. '0500'H is the DER encoding) | |||
| criticality MUST be FALSE | criticality MUST be FALSE | |||
| A relying party that does not understand this extension might be able | A relying party that does not understand this extension might be able | |||
| to find a certificate revocation list (CRL) from the CA, but the CRL | to find a Certificate Revocation List (CRL) from the CA, but the CRL | |||
| will never include an entry for the certificate containing this | will never include an entry for the certificate containing this | |||
| extension. | extension. | |||
| 3. Other X.509 Certificate Extensions | 3. Other X.509 Certificate Extensions | |||
| Certificates for CAs MUST NOT include the noRevAvail extension. | Certificates for CAs MUST NOT include the noRevAvail extension. | |||
| Certificates that include the noRevAvail extension MUST NOT include | Certificates that include the noRevAvail extension MUST NOT include | |||
| certificate extensions that point to Certificate Revocation List | certificate extensions that point to CRL repositories or provide | |||
| (CRL) repositories or provide locations of Online Certificate Status | locations of OCSP responders. If the noRevAvail extension is present | |||
| Protocol (OCSP) Responders. If the noRevAvail extension is present | ||||
| in a certificate, then: | in a certificate, then: | |||
| * The certificate MUST NOT also include the basic constraints | * The certificate MUST NOT also include the basic constraints | |||
| certificate extension with the cA BOOLEAN set to TRUE; see | certificate extension with the cA BOOLEAN set to TRUE; see | |||
| Section 4.2.1.9 of [RFC5280]. | Section 4.2.1.9 of [RFC5280]. | |||
| * The certificate MUST NOT also include the CRL Distribution Points | * The certificate MUST NOT also include the CRL Distribution Points | |||
| certificate extension; see Section 4.2.1.13 of [RFC5280]. | certificate extension; see Section 4.2.1.13 of [RFC5280]. | |||
| * The certificate MUST NOT also include the Freshest CRL certificate | * The certificate MUST NOT also include the Freshest CRL certificate | |||
| extension; see Section 4.2.1.15 of [RFC5280]. | extension; see Section 4.2.1.15 of [RFC5280]. | |||
| * The Authority Information Access certificate extension, if | * The Authority Information Access certificate extension, if | |||
| present, MUST NOT include an id-ad-ocsp accessMethod; see | present, MUST NOT include an id-ad-ocsp accessMethod; see | |||
| Section 4.2.2.1 of [RFC5280]. | Section 4.2.2.1 of [RFC5280]. | |||
| If any of the above bullets is violated in a certificate, then the | If any of the above are violated in a certificate, then the relying | |||
| relying party MUST consider the certificate invalid. | party MUST consider the certificate invalid. | |||
| 4. Certification Path Validation | 4. Certification Path Validation | |||
| Section 6.1.3 of [RFC5280] describes basic certificate processing | Section 6.1.3 of [RFC5280] describes basic certificate processing | |||
| within the certification path validation procedures. In particular, | within the certification path validation procedures. In particular, | |||
| Step (a)(3) says: | Step (a)(3) says: | |||
| At the current time, the certificate is not revoked. This | | At the current time, the certificate is not revoked. This may be | |||
| may be determined by obtaining the appropriate CRL | | determined by obtaining the appropriate CRL (Section 6.3), by | |||
| (Section 6.3), by status information, or by out-of-band | | status information, or by out-of-band mechanisms. | |||
| mechanisms. | ||||
| If the noRevAvail certificate extension that is specified in this | If the noRevAvail certificate extension specified in this document is | |||
| document is present or the ocsp-nocheck certificate extension | present or the ocsp-nocheck certificate extension [RFC6960] is | |||
| [RFC6960] is present, then Step (a)(3) is skipped. Otherwise, | present, then Step (a)(3) is skipped. Otherwise, revocation status | |||
| revocation status determination of certificate is performed. | determination of the certificate is performed. | |||
| 5. ASN.1 Module | 5. ASN.1 Module | |||
| This section provides an ASN.1 module [X.680] for the noRevAvail | This section provides an ASN.1 module [X.680] for the noRevAvail | |||
| certificate extension, and it follows the conventions established in | certificate extension, and it follows the conventions established in | |||
| [RFC5912] and [RFC6268]. | [RFC5912] and [RFC6268]. | |||
| <CODE BEGINS> | <CODE BEGINS> | |||
| NoRevAvailExtn | NoRevAvailExtn | |||
| { iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
| security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
| id-mod-noRevAvail(TBD) } | id-mod-noRevAvail(110) } | |||
| DEFINITIONS IMPLICIT TAGS ::= | DEFINITIONS IMPLICIT TAGS ::= | |||
| BEGIN | BEGIN | |||
| IMPORTS | IMPORTS | |||
| EXTENSION | EXTENSION | |||
| FROM PKIX-CommonTypes-2009 -- RFC 5912 | FROM PKIX-CommonTypes-2009 -- RFC 5912 | |||
| { iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
| security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
| id-mod-pkixCommon-02(57) } ; | id-mod-pkixCommon-02(57) } ; | |||
| skipping to change at page 6, line 43 ¶ | skipping to change at line 268 ¶ | |||
| END | END | |||
| <CODE ENDS> | <CODE ENDS> | |||
| 6. Security Considerations | 6. Security Considerations | |||
| The Security Considerations in [RFC5280] are relevant. | The Security Considerations in [RFC5280] are relevant. | |||
| When the noRevAvail certificate extension is included in a | When the noRevAvail certificate extension is included in a | |||
| certificate, all revocation checking is bypassed. CA policies and | certificate, all revocation checking is bypassed. CA policies and | |||
| practices MUST ensure that the noRevAvail is included only when | practices MUST ensure that the noRevAvail certificate extension is | |||
| appropriate, as any misuse or misconfiguration could result in a | included only when appropriate, as any misuse or misconfiguration | |||
| relying party continuing to trust a revoked certificate. When such | could result in a relying party continuing to trust a revoked | |||
| mis-use is discovered, the only possible remediation is the | certificate. When such misuse is discovered, the only possible | |||
| revocation of the CA. | remediation is the revocation of the CA. | |||
| Some applications may have dependencies on revocation information or | Some applications may have dependencies on revocation information or | |||
| assume its availability. The absence of revocation information may | assume its availability. The absence of revocation information may | |||
| require modifications or alternative configuration settings to ensure | require modifications or alternative configuration settings to ensure | |||
| proper application security and functionality. | proper application security and functionality. | |||
| The absence of revocation information limits the ability of relying | The absence of revocation information limits the ability of relying | |||
| parties to detect compromise of end-entity keying material or | parties to detect compromise of end-entity keying material or | |||
| malicious certificates. It also limits the ability to detect CAs not | malicious certificates. It also limits their ability to detect CAs | |||
| following the security practices, certificate issuance policies, and | that are not following the security practices, certificate issuance | |||
| operational controls that are specified in the Certificate Policy | policies, and operational controls that are specified in the | |||
| (CP) or the Certification Practices Statement (CPS) [RFC3647]. | Certificate Policy (CP) or the Certification Practices Statement | |||
| (CPS) [RFC3647]. | ||||
| Since the absence of revocation information may limit the ability to | Since the absence of revocation information may limit the ability to | |||
| detect compromised keying material or malicious certificates, relying | detect compromised keying material or malicious certificates, relying | |||
| parties need confidence that the CA is following security practices, | parties need confidence that the CA is following security practices, | |||
| implementing certificate issuance policies, and properly using | implementing certificate issuance policies, and properly using | |||
| operational controls. Relying parties may evaluate CA reliability, | operational controls. Relying parties may evaluate CA reliability, | |||
| monitoring CA performance, and observe CA incident response | monitor CA performance, and observe CA incident response | |||
| capabilities. | capabilities. | |||
| 6.1. Short-lived Certificates | 6.1. Short-Lived Certificates | |||
| No revocation information is made available for short-lived | No revocation information is made available for short-lived | |||
| certificates because the certificate validity period is shorter than | certificates because the certificate validity period is shorter than | |||
| the time needed to detect, report, and distribute revocation | the time needed to detect, report, and distribute revocation | |||
| information. If the noRevAvail certificate extension is incorrectly | information. If the noRevAvail certificate extension is incorrectly | |||
| used for a certificate validity period that is not adequately short, | used for a certificate validity period that is not adequately short, | |||
| it creates a window of opportunity for attackers to exploit a | it creates a window of opportunity for attackers to exploit a | |||
| compromised private key. Therefore, it is crucial to carefully | compromised private key. Therefore, it is crucial to carefully | |||
| assess and set an appropriate certificate validity period before | assess and set an appropriate certificate validity period before | |||
| implementing the noRevAvail certificate extension. | implementing the noRevAvail certificate extension. | |||
| 6.2. Long-lived Certificates | 6.2. Long-Lived Certificates | |||
| No revocation information is made available for some long-lived | No revocation information is made available for some long-lived | |||
| certificates that contain information that never changes. For | certificates that contain information that never changes. For | |||
| example, IDevID certificates [IEEE802.1AR] are included in devices at | example, IDevID certificates [IEEE802.1AR] are included in devices at | |||
| the factory, and they are used to obtain LDevID certificates | the factory, and they are used to obtain LDevID certificates | |||
| [IEEE802.1AR] in an operational environment. In this case, | [IEEE802.1AR] in an operational environment. In this case, | |||
| cryptographic algorithms need to be chosen that are expected to | cryptographic algorithms that are expected to remain secure for the | |||
| remain secure to the expected lifetime of the device. If the | expected lifetime of the device need to be chosen. If the noRevAvail | |||
| noRevAvail certificate extension is used, the CA has no means of | certificate extension is used, the CA has no means of notifying the | |||
| notifying the relying party about compromise of the factory-installed | relying party about compromise of the factory-installed keying | |||
| keying material. | material. | |||
| 7. IANA Considerations | 7. IANA Considerations | |||
| For the ASN.1 Module in Section 5, IANA is requested to assign an | IANA has assigned the following object identifier (OID) for the ASN.1 | |||
| object identifier (OID) for the module identifier. The OID for the | module (see Section 5) within the "SMI Security for PKIX Module | |||
| module should be allocated in the "SMI Security for PKIX Module | Identifier" (1.3.6.1.5.5.7.0) registry: | |||
| Identifier" registry (1.3.6.1.5.5.7.0), and the Description for the | ||||
| new OID should be set to "id-mod-noRevAvail". | ||||
| 8. Acknowledgements | ||||
| Many thanks to Erik Anderson for his efforts to make the noRevAvail | +=========+===================+ | |||
| certificate extension available for use with public key end-entity | | Decimal | Description | | |||
| certificates as well as attribute certificates. | +=========+===================+ | |||
| | 110 | id-mod-noRevAvail | | ||||
| +---------+-------------------+ | ||||
| Many thanks to (in alphabetical order) Corey Bonnell, Hendrik | Table 1 | |||
| Brockhaus, Tim Hollebeek, Mike Ounsworth, Seo Suchan, Carl Wallace, | ||||
| Éric Vyncke, and Paul Wouters for their review and insightful | ||||
| comments. | ||||
| 9. References | 8. References | |||
| 9.1. Normative References | 8.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/rfc/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | |||
| Housley, R., and W. Polk, "Internet X.509 Public Key | Housley, R., and W. Polk, "Internet X.509 Public Key | |||
| Infrastructure Certificate and Certificate Revocation List | Infrastructure Certificate and Certificate Revocation List | |||
| (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | |||
| <https://www.rfc-editor.org/rfc/rfc5280>. | <https://www.rfc-editor.org/info/rfc5280>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/rfc/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [X.509-2019-TC2] | [X.509-2019-TC2] | |||
| ITU-T, "Information Technology -- Open Systems | ITU-T, "Information Technology -- Open Systems | |||
| Interconnection -- The Directory: Public-key and attribute | Interconnection -- The Directory: Public-key and attribute | |||
| certificate frameworks -- Technical Corrigendum 2", ITU-T | certificate frameworks -- Technical Corrigendum 2", ITU-T | |||
| Recommendation X.509-2019/Cor.2-2023, October 2023, | Recommendation X.509-2019/Cor.2-2023, October 2023, | |||
| <https://www.itu.int/rec/T-REC-X.509-202310-I!Cor2>. | <https://www.itu.int/rec/T-REC-X.509-202310-I!Cor2>. | |||
| [X.680] ITU-T, "Information technology -- Abstract Syntax Notation | [X.680] ITU-T, "Information technology -- Abstract Syntax Notation | |||
| One (ASN.1): Specification of basic notation", ITU-T | One (ASN.1): Specification of basic notation", ITU-T | |||
| Recommendation X.680, ISO/IEC 8824-1:2021, February 2021, | Recommendation X.680, ISO/IEC 8824-1:2021, February 2021, | |||
| <https://www.itu.int/rec/T-REC-X.680>. | <https://www.itu.int/rec/T-REC-X.680>. | |||
| [X.690] ITU-T, "Information technology -- ASN.1 encoding rules: | [X.690] ITU-T, "Information technology -- ASN.1 encoding rules: | |||
| Specification of Basic Encoding Rules (BER), Canonical | Specification of Basic Encoding Rules (BER), Canonical | |||
| Encoding Rules (CER) and Distinguished Encoding Rules | Encoding Rules (CER) and Distinguished Encoding Rules | |||
| (DER)", ITU-T Recommendation X.690, ISO/IEC 8825-1-2021, | (DER)", ITU-T Recommendation X.690, ISO/IEC 8825-1-2021, | |||
| February 2021, <https://www.itu.int/rec/T-REC-X.690>. | February 2021, <https://www.itu.int/rec/T-REC-X.690>. | |||
| 9.2. Informative References | 8.2. Informative References | |||
| [IEEE802.1AR] | [IEEE802.1AR] | |||
| IEEE, "IEEE Standard for Local and Metropolitan Area | IEEE, "IEEE Standard for Local and Metropolitan Area | |||
| Networks - Secure Device Identity", IEEE 802.1AR-2018, 31 | Networks - Secure Device Identity", IEEE 802.1AR-2018, | |||
| July 2018, <https://ieeexplore.ieee.org/document/8423794>. | DOI 10.1109/IEEESTD.2018.8423794, 2 August 2018, | |||
| <https://ieeexplore.ieee.org/document/8423794>. | ||||
| [RFC2459] Housley, R., Ford, W., Polk, W., and D. Solo, "Internet | [RFC2459] Housley, R., Ford, W., Polk, W., and D. Solo, "Internet | |||
| X.509 Public Key Infrastructure Certificate and CRL | X.509 Public Key Infrastructure Certificate and CRL | |||
| Profile", RFC 2459, DOI 10.17487/RFC2459, January 1999, | Profile", RFC 2459, DOI 10.17487/RFC2459, January 1999, | |||
| <https://www.rfc-editor.org/rfc/rfc2459>. | <https://www.rfc-editor.org/info/rfc2459>. | |||
| [RFC3281] Farrell, S. and R. Housley, "An Internet Attribute | [RFC3281] Farrell, S. and R. Housley, "An Internet Attribute | |||
| Certificate Profile for Authorization", RFC 3281, | Certificate Profile for Authorization", RFC 3281, | |||
| DOI 10.17487/RFC3281, April 2002, | DOI 10.17487/RFC3281, April 2002, | |||
| <https://www.rfc-editor.org/rfc/rfc3281>. | <https://www.rfc-editor.org/info/rfc3281>. | |||
| [RFC3647] Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S. | [RFC3647] Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S. | |||
| Wu, "Internet X.509 Public Key Infrastructure Certificate | Wu, "Internet X.509 Public Key Infrastructure Certificate | |||
| Policy and Certification Practices Framework", RFC 3647, | Policy and Certification Practices Framework", RFC 3647, | |||
| DOI 10.17487/RFC3647, November 2003, | DOI 10.17487/RFC3647, November 2003, | |||
| <https://www.rfc-editor.org/rfc/rfc3647>. | <https://www.rfc-editor.org/info/rfc3647>. | |||
| [RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the | [RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the | |||
| Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, | Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, | |||
| DOI 10.17487/RFC5912, June 2010, | DOI 10.17487/RFC5912, June 2010, | |||
| <https://www.rfc-editor.org/rfc/rfc5912>. | <https://www.rfc-editor.org/info/rfc5912>. | |||
| [RFC6268] Schaad, J. and S. Turner, "Additional New ASN.1 Modules | [RFC6268] Schaad, J. and S. Turner, "Additional New ASN.1 Modules | |||
| for the Cryptographic Message Syntax (CMS) and the Public | for the Cryptographic Message Syntax (CMS) and the Public | |||
| Key Infrastructure Using X.509 (PKIX)", RFC 6268, | Key Infrastructure Using X.509 (PKIX)", RFC 6268, | |||
| DOI 10.17487/RFC6268, July 2011, | DOI 10.17487/RFC6268, July 2011, | |||
| <https://www.rfc-editor.org/rfc/rfc6268>. | <https://www.rfc-editor.org/info/rfc6268>. | |||
| [RFC6960] Santesson, S., Myers, M., Ankney, R., Malpani, A., | [RFC6960] Santesson, S., Myers, M., Ankney, R., Malpani, A., | |||
| Galperin, S., and C. Adams, "X.509 Internet Public Key | Galperin, S., and C. Adams, "X.509 Internet Public Key | |||
| Infrastructure Online Certificate Status Protocol - OCSP", | Infrastructure Online Certificate Status Protocol - OCSP", | |||
| RFC 6960, DOI 10.17487/RFC6960, June 2013, | RFC 6960, DOI 10.17487/RFC6960, June 2013, | |||
| <https://www.rfc-editor.org/rfc/rfc6960>. | <https://www.rfc-editor.org/info/rfc6960>. | |||
| [RFC8555] Barnes, R., Hoffman-Andrews, J., McCarney, D., and J. | [RFC8555] Barnes, R., Hoffman-Andrews, J., McCarney, D., and J. | |||
| Kasten, "Automatic Certificate Management Environment | Kasten, "Automatic Certificate Management Environment | |||
| (ACME)", RFC 8555, DOI 10.17487/RFC8555, March 2019, | (ACME)", RFC 8555, DOI 10.17487/RFC8555, March 2019, | |||
| <https://www.rfc-editor.org/rfc/rfc8555>. | <https://www.rfc-editor.org/info/rfc8555>. | |||
| [X.509-1988] | [X.509-1988] | |||
| CCITT, "Series X: Data Communication Networks: Directory | CCITT, "The Directory - Authentication Framework", CCITT | |||
| -- The Directory -- Authentication Framework", CCITT | ||||
| Recommendation X.509-1988, November 1988, | Recommendation X.509-1988, November 1988, | |||
| <https://www.itu.int/rec/T-REC-X.509-198811-S>. | <https://www.itu.int/rec/T-REC-X.509-198811-S>. | |||
| [X.509-1997] | [X.509-1997] | |||
| ITU-T, "Information Technology -- Open Systems | ITU-T, "Information technology -- Open Systems | |||
| Interconnection -- The Directory: Authentication | Interconnection -- The Directory: Authentication | |||
| framework", ITU-T Recommendation X.509-1997, August 1997, | framework", ITU-T Recommendation X.509-1997, August 1997, | |||
| <https://www.itu.int/rec/T-REC-X.509-199708-S>. | <https://www.itu.int/rec/T-REC-X.509-199708-S>. | |||
| [X.509-2000] | [X.509-2000] | |||
| ITU-T, "Information Technology -- Open Systems | ITU-T, "Information Technology -- Open Systems | |||
| Interconnection -- The Directory: Public-key and attribute | Interconnection -- The Directory: Public-key and attribute | |||
| certificate frameworks", ITU-T Recommendation X.509-2000, | certificate frameworks", ITU-T Recommendation X.509-2000, | |||
| March 2000, | March 2000, | |||
| <https://www.itu.int/rec/T-REC-X.509-200003-S>. | <https://www.itu.int/rec/T-REC-X.509-200003-S>. | |||
| [X.509-2019] | [X.509-2019] | |||
| ITU-T, "Information Technology -- Open Systems | ITU-T, "Information Technology -- Open Systems | |||
| Interconnection -- The Directory: Public-key and attribute | Interconnection -- The Directory: Public-key and attribute | |||
| certificate frameworks", ITU-T Recommendation X.509-2019, | certificate frameworks", ITU-T Recommendation X.509-2019, | |||
| October 2019, | October 2019, | |||
| <https://www.itu.int/rec/T-REC-X.509-201910-I>. | <https://www.itu.int/rec/T-REC-X.509-201910-I>. | |||
| Acknowledgements | ||||
| Many thanks to Erik Anderson for his efforts to make the noRevAvail | ||||
| certificate extension available for use with public key end-entity | ||||
| certificates as well as attribute certificates. | ||||
| Many thanks to (in alphabetical order) Corey Bonnell, Hendrik | ||||
| Brockhaus, Tim Hollebeek, Mike Ounsworth, Seo Suchan, Carl Wallace, | ||||
| Éric Vyncke, and Paul Wouters for their review and insightful | ||||
| comments. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Russ Housley | Russ Housley | |||
| Vigil Security, LLC | Vigil Security, LLC | |||
| Herndon, VA, | Herndon, Virginia | |||
| United States of America | United States of America | |||
| Email: housley@vigilsec.com | Email: housley@vigilsec.com | |||
| Tomofumi Okubo | Tomofumi Okubo | |||
| DigiCert, Inc. | DigiCert, Inc. | |||
| Fairfax, VA, | Fairfax, Virginia | |||
| United States of America | United States of America | |||
| Email: tomofumi.okubo+ietf@gmail.com | Email: tomofumi.okubo+ietf@gmail.com | |||
| Joseph Mandel | Joseph Mandel | |||
| SecureG Inc. | AKAYLA, Inc. | |||
| Tacoma, WA, | Tacoma, Washington | |||
| United States of America | United States of America | |||
| Email: joe.mandel@secureg.io | Email: joe@akayla.com | |||
| End of changes. 48 change blocks. | ||||
| 132 lines changed or deleted | 135 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||