| rfc9608.original.xml | rfc9608.xml | |||
|---|---|---|---|---|
| <?xml version='1.0' encoding='utf-8'?> | <?xml version='1.0' encoding='UTF-8'?> | |||
| <!-- draft submitted in xml v3 --> | ||||
| <!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
| <!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
| <!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
| <!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
| <!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
| ]> | ]> | |||
| <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
| <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 2.6.1 | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
| 0) --> | -ietf-lamps-norevavail-04" number="9608" category="std" consensus="true" submiss | |||
| <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | ionType="IETF" updates="5280" obsoletes="" tocInclude="true" sortRefs="true" sym | |||
| -ietf-lamps-norevavail-04" category="std" consensus="true" submissionType="IETF" | Refs="true" version="3" xml:lang="en"> | |||
| updates="5280" tocInclude="true" sortRefs="true" symRefs="true" version="3"> | ||||
| <!-- xml2rfc v2v3 conversion 3.20.1 --> | ||||
| <front> | <front> | |||
| <title abbrev="NoRevAvail for Public Key Certificates">No Revocation Availab le for X.509 Public Key Certificates</title> | <title abbrev="NoRevAvail for Public Key Certificates">No Revocation Availab le for X.509 Public Key Certificates</title> | |||
| <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-norevavail-04"/> | <seriesInfo name="RFC" value="9608"/> | |||
| <author initials="R." surname="Housley" fullname="Russ Housley"> | <author initials="R." surname="Housley" fullname="Russ Housley"> | |||
| <organization abbrev="Vigil Security">Vigil Security, LLC</organization> | <organization abbrev="Vigil Security">Vigil Security, LLC</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <city>Herndon, VA</city> | <city>Herndon</city> | |||
| <country>US</country> | <region>Virginia</region> | |||
| <country>United States of America</country> | ||||
| </postal> | </postal> | |||
| <email>housley@vigilsec.com</email> | <email>housley@vigilsec.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="T." surname="Okubo" fullname="Tomofumi Okubo"> | <author initials="T." surname="Okubo" fullname="Tomofumi Okubo"> | |||
| <organization abbrev="DigiCert">DigiCert, Inc.</organization> | <organization abbrev="DigiCert">DigiCert, Inc.</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <city>Fairfax, VA</city> | <city>Fairfax</city> | |||
| <country>US</country> | <region>Virginia</region> | |||
| <country>United States of America</country> | ||||
| </postal> | </postal> | |||
| <email>tomofumi.okubo+ietf@gmail.com</email> | <email>tomofumi.okubo+ietf@gmail.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="J." surname="Mandel" fullname="Joseph Mandel"> | <author initials="J." surname="Mandel" fullname="Joseph Mandel"> | |||
| <organization abbrev="SecureG">SecureG Inc.</organization> | <organization abbrev="AKAYLA, Inc.">AKAYLA, Inc.</organization> | |||
| <address> | <address> | |||
| <postal> | <postal> | |||
| <city>Tacoma, WA</city> | <city>Tacoma</city> | |||
| <country>USA</country> | <region>Washington</region> | |||
| <country>United States of America</country> | ||||
| </postal> | </postal> | |||
| <email>joe.mandel@secureg.io</email> | <email>joe@akayla.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date year="2024" month="April" day="04"/> | <date year="2024" month="June"/> | |||
| <area>Security</area> | <area>SEC</area> | |||
| <workgroup>LAMPS Working Group</workgroup> | <workgroup>lamps</workgroup> | |||
| <keyword>Internet-Draft</keyword> | ||||
| <abstract> | ||||
| <?line 139?> | ||||
| <keyword>Certificate Revocation</keyword> | ||||
| <abstract> | ||||
| <t>X.509v3 public key certificates are profiled in RFC 5280. Short-lived | <t>X.509v3 public key certificates are profiled in RFC 5280. Short-lived | |||
| certificates are seeing greater use in the Internet. The Certification | certificates are seeing greater use in the Internet. The Certification | |||
| Authority (CA) that issues these short-lived certificates do not publish | Authority (CA) that issues these short-lived certificates do not publish | |||
| revocation information because the certificate lifespan that is shorter than | revocation information because the certificate lifespan that is shorter than | |||
| the time needed to detect, report, and distribute revocation information. Some | the time needed to detect, report, and distribute revocation information. Some | |||
| long-lived X.509v3 public key certificates never expire, and they are never | long-lived X.509v3 public key certificates never expire, and they are never | |||
| revoked. This specification defines the noRevAvail certificate extension so | revoked. This specification defines the noRevAvail certificate extension so | |||
| that a relying party can readily determine that the CA does not publish | that a relying party can readily determine that the CA does not publish | |||
| revocation information for the certificate, and it updates the certification | revocation information for the certificate, and it updates the certification | |||
| path validation algorithm in RFC 5280 to skip revocation checking when the | path validation algorithm defined in RFC 5280 so that revocation checking is ski pped when the | |||
| noRevAvail certificate extension is present.</t> | noRevAvail certificate extension is present.</t> | |||
| </abstract> | </abstract> | |||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <?line 153?> | ||||
| <section anchor="intro"> | <section anchor="intro"> | |||
| <name>Introduction</name> | <name>Introduction</name> | |||
| <t>X.509v3 public key certificates <xref target="RFC5280"/> with short val idity periods are | <t>X.509v3 public key certificates <xref target="RFC5280"/> with short val idity periods are | |||
| seeing greater use in the Internet. For example, Automatic Certificate | seeing greater use in the Internet. For example, Automatic Certificate | |||
| Management Environment (ACME) <xref target="RFC8555"/> provides a straightforwar d way | Management Environment (ACME) <xref target="RFC8555"/> provides a straightforwar d way | |||
| to obtain short-lived certificates. In many cases, no revocation | to obtain short-lived certificates. In many cases, no revocation | |||
| information is made available for short-lived certificates by the | information is made available for short-lived certificates by the | |||
| Certification Authority (CA). This is because short-lived certificates | Certification Authority (CA). This is because short-lived certificates | |||
| have a validity period that is shorter than the time needed to detect, report, | have a validity period that is shorter than the time needed to detect, report, | |||
| skipping to change at line 92 ¶ | skipping to change at line 96 ¶ | |||
| <t>Some long-lived X.509v3 public key certificates never expire, and they are | <t>Some long-lived X.509v3 public key certificates never expire, and they are | |||
| never revoked. For example, a factory might include an IDevID certificate <xref target="IEEE802.1AR"/> | never revoked. For example, a factory might include an IDevID certificate <xref target="IEEE802.1AR"/> | |||
| to bind the factory-assigned device identity to a factory-installed public key. This | to bind the factory-assigned device identity to a factory-installed public key. This | |||
| identity might include the manufacturer, model, and serial number of the device, | identity might include the manufacturer, model, and serial number of the device, | |||
| which never change. To indicate that a certificate has no well-defined expirati on | which never change. To indicate that a certificate has no well-defined expirati on | |||
| date, the notAfter date in the certificate validity period is set to | date, the notAfter date in the certificate validity period is set to | |||
| "99991231235959Z" <xref target="RFC5280"/>.</t> | "99991231235959Z" <xref target="RFC5280"/>.</t> | |||
| <t>This specification defines the noRevAvail certificate extension so that a | <t>This specification defines the noRevAvail certificate extension so that a | |||
| relying party can readily determine that the CA does not publish revocation | relying party can readily determine that the CA does not publish revocation | |||
| information for the end-entity certificate, and it updates the certification | information for the end-entity certificate, and it updates the certification | |||
| path validation algorithm in <xref target="RFC5280"/> to skip revocation checkin g when the | path validation algorithm defined in <xref target="RFC5280"/> so that revocation checking is skipped when the | |||
| noRevAvail certificate extension is present.</t> | noRevAvail certificate extension is present.</t> | |||
| <t>Note that the noRevAvail certificate extension provides similar functio nality | <t>Note that the noRevAvail certificate extension provides similar functio nality | |||
| to the ocsp-nocheck certificate extension <xref target="RFC6960"/>. The ocsp-no check | to the ocsp-nocheck certificate extension <xref target="RFC6960"/>. The ocsp-no check | |||
| certificate extension is appropriate for inclusion only in certificates issued t o | certificate extension is appropriate for inclusion only in certificates issued t o | |||
| OCSP Responders, whereas noRevAvail certificate extension is appropriate in any | Online Certificate Status Protocol (OCSP) responders, whereas the noRevAvail cer tificate extension is appropriate in any | |||
| end-entity certificate for which the CA will not publish revocation information. To | end-entity certificate for which the CA will not publish revocation information. To | |||
| avoid disruption to the OCSP ecosystem, implementers should not think of the | avoid disruption to the OCSP ecosystem, implementers should not think of the | |||
| noRevAvail certificate extension a substitute for the ocsp-nocheck certificate | noRevAvail certificate extension a substitute for the ocsp-nocheck certificate | |||
| extension; however, the noRevAvail certificate extension could be included in | extension; however, the noRevAvail certificate extension could be included in | |||
| certificates issued to OCSP Responders in addition to the ocsp-nocheck | certificates issued to OCSP responders in addition to the ocsp-nocheck | |||
| certificate extension.</t> | certificate extension.</t> | |||
| <section anchor="terms"> | <section anchor="terms"> | |||
| <name>Terminology</name> | <name>Terminology</name> | |||
| <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp | <t> | |||
| 14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", | |||
| NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECO | "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14> | |||
| MMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | ", | |||
| "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be i | "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", | |||
| nterpreted as | "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
| described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
| only when, they | be | |||
| appear in all capitals, as shown here.</t> | interpreted as described in BCP 14 <xref target="RFC2119"/> <xref | |||
| <?line -18?> | target="RFC8174"/> when, and only when, they appear in all capitals, as | |||
| shown here. | ||||
| </t> | ||||
| </section> | </section> | |||
| <section anchor="asn1"> | <section anchor="asn1"> | |||
| <name>ASN.1</name> | <name>ASN.1</name> | |||
| <t>X.509 certificates are generated using ASN.1 <xref target="X.680"/>, using the Basic | <t>X.509 certificates are generated using ASN.1 <xref target="X.680"/>, using the Basic | |||
| Encoding Rules (BER) and the Distinguished Encoding Rules (DER) <xref target="X. 690"/>.</t> | Encoding Rules (BER) and the Distinguished Encoding Rules (DER) <xref target="X. 690"/>.</t> | |||
| </section> | </section> | |||
| <section anchor="history"> | <section anchor="history"> | |||
| <name>History</name> | <name>History</name> | |||
| <t>In 1988, CCITT defined the X.509v1 certificate <xref target="X.509-19 88"/>.</t> | <t>In 1988, CCITT defined the X.509v1 certificate <xref target="X.509-19 88"/>.</t> | |||
| skipping to change at line 141 ¶ | skipping to change at line 149 ¶ | |||
| <t>In 2019, ITU-T published an update to ITU-T Recommendation X.509 | <t>In 2019, ITU-T published an update to ITU-T Recommendation X.509 | |||
| <xref target="X.509-2019"/>.</t> | <xref target="X.509-2019"/>.</t> | |||
| <t>With greater use of short-lived certificates in the Internet, the rec ent | <t>With greater use of short-lived certificates in the Internet, the rec ent | |||
| Technical Corrigendum to ITU-T Recommendation X.509 <xref target="X.509-2019-TC2 "/> allows | Technical Corrigendum to ITU-T Recommendation X.509 <xref target="X.509-2019-TC2 "/> allows | |||
| the noRevAvail certificate extension to be used with public key certificates | the noRevAvail certificate extension to be used with public key certificates | |||
| as well as attribute certificates.</t> | as well as attribute certificates.</t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="the-norevavail-certificate-extension"> | <section anchor="the-norevavail-certificate-extension"> | |||
| <name>The noRevAvail Certificate Extension</name> | <name>The noRevAvail Certificate Extension</name> | |||
| <t>The noRevAvail extension, defined in <xref target="X.509-2019-TC2"/>, a llows an CA to indicate that | <t>The noRevAvail extension, defined in <xref target="X.509-2019-TC2"/>, a llows a CA to indicate that | |||
| no revocation information will be made available for this certificate.</t> | no revocation information will be made available for this certificate.</t> | |||
| <t>This extension <bcp14>MUST NOT</bcp14> be present in CA public key cert ificates.</t> | <t>This extension <bcp14>MUST NOT</bcp14> be present in CA public key cert ificates.</t> | |||
| <t>Conforming CAs <bcp14>MUST</bcp14> include this extension in certificat es for which no | <t>Conforming CAs <bcp14>MUST</bcp14> include this extension in certificat es for which no | |||
| revocation information will be published. When present, conforming CAs | revocation information will be published. When present, conforming CAs | |||
| <bcp14>MUST</bcp14> mark this extension as non-critical.</t> | <bcp14>MUST</bcp14> mark this extension as non-critical.</t> | |||
| <ul empty="true"> | ||||
| <li> | <artwork><![CDATA[ | |||
| <artwork><![CDATA[ | ||||
| name id-ce-noRevAvail | name id-ce-noRevAvail | |||
| OID { id-ce 56 } | OID { id-ce 56 } | |||
| syntax NULL (i.e. '0500'H is the DER encoding) | syntax NULL (i.e. '0500'H is the DER encoding) | |||
| criticality MUST be FALSE | criticality MUST be FALSE | |||
| ]]></artwork> | ]]></artwork> | |||
| </li> | ||||
| </ul> | ||||
| <t>A relying party that does not understand this extension might be able t o | <t>A relying party that does not understand this extension might be able t o | |||
| find a certificate revocation list (CRL) from the CA, but the CRL will | find a Certificate Revocation List (CRL) from the CA, but the CRL will | |||
| never include an entry for the certificate containing this extension.</t> | never include an entry for the certificate containing this extension.</t> | |||
| </section> | </section> | |||
| <section anchor="other-x509-certificate-extensions"> | <section anchor="other-x509-certificate-extensions"> | |||
| <name>Other X.509 Certificate Extensions</name> | <name>Other X.509 Certificate Extensions</name> | |||
| <t>Certificates for CAs <bcp14>MUST NOT</bcp14> include the noRevAvail ext ension. | <t>Certificates for CAs <bcp14>MUST NOT</bcp14> include the noRevAvail ext ension. | |||
| Certificates that include the noRevAvail extension <bcp14>MUST NOT</bcp14> inclu de | Certificates that include the noRevAvail extension <bcp14>MUST NOT</bcp14> inclu de | |||
| certificate extensions that point to Certificate Revocation List (CRL) | certificate extensions that point to CRL | |||
| repositories or provide locations of Online Certificate Status Protocol | repositories or provide locations of OCSP responders. If the noRevAvail extensi | |||
| (OCSP) Responders. If the noRevAvail extension is present in a | on is present in a | |||
| certificate, then:</t> | certificate, then:</t> | |||
| <ul spacing="normal"> | <ul spacing="normal"> | |||
| <li> | <li> | |||
| <t>The certificate <bcp14>MUST NOT</bcp14> also include the basic cons traints certificate extension with the cA BOOLEAN set to TRUE; see Section 4.2.1 .9 of <xref target="RFC5280"/>.</t> | <t>The certificate <bcp14>MUST NOT</bcp14> also include the basic cons traints certificate extension with the cA BOOLEAN set to TRUE; see <xref target= "RFC5280" sectionFormat="of" section="4.2.1.9"/>.</t> | |||
| </li> | </li> | |||
| <li> | <li> | |||
| <t>The certificate <bcp14>MUST NOT</bcp14> also include the CRL Distri bution Points certificate extension; see Section 4.2.1.13 of <xref target="RFC52 80"/>.</t> | <t>The certificate <bcp14>MUST NOT</bcp14> also include the CRL Distri bution Points certificate extension; see <xref target="RFC5280" sectionFormat="o f" section="4.2.1.13"/>.</t> | |||
| </li> | </li> | |||
| <li> | <li> | |||
| <t>The certificate <bcp14>MUST NOT</bcp14> also include the Freshest C RL certificate extension; see Section 4.2.1.15 of <xref target="RFC5280"/>.</t> | <t>The certificate <bcp14>MUST NOT</bcp14> also include the Freshest C RL certificate extension; see <xref target="RFC5280" sectionFormat="of" section= "4.2.1.15"/>.</t> | |||
| </li> | </li> | |||
| <li> | <li> | |||
| <t>The Authority Information Access certificate extension, if present, <bcp14>MUST NOT</bcp14> include an id-ad-ocsp accessMethod; see Section 4.2.2.1 of <xref target="RFC5280"/>.</t> | <t>The Authority Information Access certificate extension, if present, <bcp14>MUST NOT</bcp14> include an id-ad-ocsp accessMethod; see <xref target="R FC5280" sectionFormat="of" section="4.2.2.1"/>.</t> | |||
| </li> | </li> | |||
| </ul> | </ul> | |||
| <t>If any of the above bullets is violated in a certificate, then | <t>If any of the above are violated in a certificate, then | |||
| the relying party <bcp14>MUST</bcp14> consider the certificate invalid.</t> | the relying party <bcp14>MUST</bcp14> consider the certificate invalid.</t> | |||
| </section> | </section> | |||
| <section anchor="certification-path-validation"> | <section anchor="certification-path-validation"> | |||
| <name>Certification Path Validation</name> | <name>Certification Path Validation</name> | |||
| <t><xref section="6.1.3" sectionFormat="of" target="RFC5280"/> describes b asic certificate processing within | <t><xref section="6.1.3" sectionFormat="of" target="RFC5280"/> describes b asic certificate processing within | |||
| the certification path validation procedures. In particular, Step (a)(3) says:< /t> | the certification path validation procedures. In particular, Step (a)(3) says:< /t> | |||
| <ul empty="true"> | <blockquote> | |||
| <li> | ||||
| <artwork><![CDATA[ | ||||
| At the current time, the certificate is not revoked. This | At the current time, the certificate is not revoked. This | |||
| may be determined by obtaining the appropriate CRL | may be determined by obtaining the appropriate CRL | |||
| (Section 6.3), by status information, or by out-of-band | (Section <xref target="RFC5280" section="6.3" sectionFormat="bare"/>), by status information, or by out-of-band | |||
| mechanisms. | mechanisms. | |||
| ]]></artwork> | </blockquote> | |||
| </li> | <t>If the noRevAvail certificate extension specified in this document | |||
| </ul> | ||||
| <t>If the noRevAvail certificate extension that is specified in this docum | ||||
| ent | ||||
| is present or the ocsp-nocheck certificate extension <xref target="RFC6960"/> is present, | is present or the ocsp-nocheck certificate extension <xref target="RFC6960"/> is present, | |||
| then Step (a)(3) is skipped. Otherwise, revocation status determination of | then Step (a)(3) is skipped. Otherwise, revocation status determination of the | |||
| certificate is performed.</t> | certificate is performed.</t> | |||
| </section> | </section> | |||
| <section anchor="asn1-mod"> | <section anchor="asn1-mod"> | |||
| <name>ASN.1 Module</name> | <name>ASN.1 Module</name> | |||
| <t>This section provides an ASN.1 module <xref target="X.680"/> for the no RevAvail | <t>This section provides an ASN.1 module <xref target="X.680"/> for the no RevAvail | |||
| certificate extension, and it follows the conventions established | certificate extension, and it follows the conventions established | |||
| in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t> | in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t> | |||
| <sourcecode type="asn.1" markers="true"><![CDATA[ | <sourcecode type="asn.1" markers="true"><![CDATA[ | |||
| NoRevAvailExtn | NoRevAvailExtn | |||
| { iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
| security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
| id-mod-noRevAvail(TBD) } | id-mod-noRevAvail(110) } | |||
| DEFINITIONS IMPLICIT TAGS ::= | DEFINITIONS IMPLICIT TAGS ::= | |||
| BEGIN | BEGIN | |||
| IMPORTS | IMPORTS | |||
| EXTENSION | EXTENSION | |||
| FROM PKIX-CommonTypes-2009 -- RFC 5912 | FROM PKIX-CommonTypes-2009 -- RFC 5912 | |||
| { iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
| security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
| id-mod-pkixCommon-02(57) } ; | id-mod-pkixCommon-02(57) } ; | |||
| skipping to change at line 247 ¶ | skipping to change at line 248 ¶ | |||
| id-ce-noRevAvail OBJECT IDENTIFIER ::= { id-ce 56 } | id-ce-noRevAvail OBJECT IDENTIFIER ::= { id-ce 56 } | |||
| END | END | |||
| ]]></sourcecode> | ]]></sourcecode> | |||
| </section> | </section> | |||
| <section anchor="sec-cons"> | <section anchor="sec-cons"> | |||
| <name>Security Considerations</name> | <name>Security Considerations</name> | |||
| <t>The Security Considerations in <xref target="RFC5280"/> are relevant.</ t> | <t>The Security Considerations in <xref target="RFC5280"/> are relevant.</ t> | |||
| <t>When the noRevAvail certificate extension is included in a certificate, | <t>When the noRevAvail certificate extension is included in a certificate, | |||
| all revocation checking is bypassed. CA policies and practices <bcp14>MUST</bcp 14> ensure | all revocation checking is bypassed. CA policies and practices <bcp14>MUST</bcp 14> ensure | |||
| that the noRevAvail is included only when appropriate, as any misuse or | that the noRevAvail certificate extension is included only when appropriate, as any misuse or | |||
| misconfiguration could result in a relying party continuing to trust | misconfiguration could result in a relying party continuing to trust | |||
| a revoked certificate. When such mis-use is discovered, the only possible | a revoked certificate. When such misuse is discovered, the only possible | |||
| remediation is the revocation of the CA.</t> | remediation is the revocation of the CA.</t> | |||
| <t>Some applications may have dependencies on revocation information or as sume | <t>Some applications may have dependencies on revocation information or as sume | |||
| its availability. The absence of revocation information may require modification s | its availability. The absence of revocation information may require modification s | |||
| or alternative configuration settings to ensure proper application security and | or alternative configuration settings to ensure proper application security and | |||
| functionality.</t> | functionality.</t> | |||
| <t>The absence of revocation information limits the ability of relying | <t>The absence of revocation information limits the ability of relying | |||
| parties to detect compromise of end-entity keying material or malicious | parties to detect compromise of end-entity keying material or malicious | |||
| certificates. It also limits the ability to detect CAs not following | certificates. It also limits their ability to detect CAs that are not following | |||
| the security practices, certificate issuance policies, and operational | the security practices, certificate issuance policies, and operational | |||
| controls that are specified in the Certificate Policy (CP) or the | controls that are specified in the Certificate Policy (CP) or the | |||
| Certification Practices Statement (CPS) <xref target="RFC3647"/>.</t> | Certification Practices Statement (CPS) <xref target="RFC3647"/>.</t> | |||
| <t>Since the absence of revocation information may limit the ability to | <t>Since the absence of revocation information may limit the ability to | |||
| detect compromised keying material or malicious certificates, relying | detect compromised keying material or malicious certificates, relying | |||
| parties need confidence that the CA is following security practices, | parties need confidence that the CA is following security practices, | |||
| implementing certificate issuance policies, and properly using | implementing certificate issuance policies, and properly using | |||
| operational controls. Relying parties may evaluate CA reliability, | operational controls. Relying parties may evaluate CA reliability, | |||
| monitoring CA performance, and observe CA incident response capabilities.</t> | monitor CA performance, and observe CA incident response capabilities.</t> | |||
| <section anchor="short-lived-certificates"> | <section anchor="short-lived-certificates"> | |||
| <name>Short-lived Certificates</name> | <name>Short-Lived Certificates</name> | |||
| <t>No revocation information is made available for short-lived certifica tes | <t>No revocation information is made available for short-lived certifica tes | |||
| because the certificate validity period is shorter than the time needed to | because the certificate validity period is shorter than the time needed to | |||
| detect, report, and distribute revocation information. If the noRevAvail | detect, report, and distribute revocation information. If the noRevAvail | |||
| certificate extension is incorrectly used for a certificate validity | certificate extension is incorrectly used for a certificate validity | |||
| period that is not adequately short, it creates a window of opportunity for | period that is not adequately short, it creates a window of opportunity for | |||
| attackers to exploit a compromised private key. Therefore, it is crucial | attackers to exploit a compromised private key. Therefore, it is crucial | |||
| to carefully assess and set an appropriate certificate validity period | to carefully assess and set an appropriate certificate validity period | |||
| before implementing the noRevAvail certificate extension.</t> | before implementing the noRevAvail certificate extension.</t> | |||
| </section> | </section> | |||
| <section anchor="long-lived-certificates"> | <section anchor="long-lived-certificates"> | |||
| <name>Long-lived Certificates</name> | <name>Long-Lived Certificates</name> | |||
| <t>No revocation information is made available for some long-lived certi ficates | <t>No revocation information is made available for some long-lived certi ficates | |||
| that contain information that never changes. For example, IDevID certificates | that contain information that never changes. For example, IDevID certificates | |||
| <xref target="IEEE802.1AR"/> are included in devices at the factory, and they ar e used to | <xref target="IEEE802.1AR"/> are included in devices at the factory, and they ar e used to | |||
| obtain LDevID certificates <xref target="IEEE802.1AR"/> in an operational enviro nment. In this | obtain LDevID certificates <xref target="IEEE802.1AR"/> in an operational enviro nment. In this | |||
| case, cryptographic algorithms need to be chosen that are expected to remain sec | case, cryptographic algorithms that are expected to remain secure | |||
| ure | for the expected lifetime of the device need to be chosen. If the noRevAvail cer | |||
| to the expected lifetime of the device. If the noRevAvail certificate extension | tificate extension is | |||
| is | ||||
| used, the CA has no means of notifying the relying party about compromise of the | used, the CA has no means of notifying the relying party about compromise of the | |||
| factory-installed keying material.</t> | factory-installed keying material.</t> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section anchor="iana"> | <section anchor="iana"> | |||
| <name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
| <t>For the ASN.1 Module in <xref target="asn1-mod"/>, IANA is requested to | <t>IANA has assigned the following object identifier (OID) for the ASN.1 m | |||
| assign an | odule (see <xref target="asn1-mod"/>) within the "SMI Security for PKIX Module I | |||
| object identifier (OID) for the module identifier. The OID for the module | dentifier" | |||
| should be allocated in the "SMI Security for PKIX Module Identifier" | (1.3.6.1.5.5.7.0) registry:</t> | |||
| registry (1.3.6.1.5.5.7.0), and the Description for the new OID should be set | ||||
| to "id-mod-noRevAvail".</t> | <table anchor="iana-table"> | |||
| </section> | <name></name> | |||
| <section anchor="acknowledgements"> | <thead> | |||
| <name>Acknowledgements</name> | <tr> | |||
| <t>Many thanks to Erik Anderson for his efforts to make the noRevAvail | <th>Decimal</th> | |||
| certificate extension available for use with public key end-entity | <th>Description</th> | |||
| certificates as well as attribute certificates.</t> | </tr> | |||
| <t>Many thanks to (in alphabetical order) | </thead> | |||
| Corey Bonnell, | <tbody> | |||
| Hendrik Brockhaus, | <tr> | |||
| Tim Hollebeek, | <td>110</td> | |||
| Mike Ounsworth, | <td>id-mod-noRevAvail</td> | |||
| Seo Suchan, | </tr> | |||
| Carl Wallace, | </tbody> | |||
| Éric Vyncke, and | </table> | |||
| Paul Wouters | ||||
| for their review and insightful comments.</t> | ||||
| </section> | </section> | |||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references> | <references> | |||
| <name>References</name> | <name>References</name> | |||
| <references anchor="sec-normative-references"> | <references anchor="sec-normative-references"> | |||
| <name>Normative References</name> | <name>Normative References</name> | |||
| <reference anchor="RFC5280"> | ||||
| <front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.52 | |||
| <title>Internet X.509 Public Key Infrastructure Certificate and Cert | 80.xml"/> | |||
| ificate Revocation List (CRL) Profile</title> | ||||
| <author fullname="D. Cooper" initials="D." surname="Cooper"/> | ||||
| <author fullname="S. Santesson" initials="S." surname="Santesson"/> | ||||
| <author fullname="S. Farrell" initials="S." surname="Farrell"/> | ||||
| <author fullname="S. Boeyen" initials="S." surname="Boeyen"/> | ||||
| <author fullname="R. Housley" initials="R." surname="Housley"/> | ||||
| <author fullname="W. Polk" initials="W." surname="Polk"/> | ||||
| <date month="May" year="2008"/> | ||||
| <abstract> | ||||
| <t>This memo profiles the X.509 v3 certificate and X.509 v2 certif | ||||
| icate revocation list (CRL) for use in the Internet. An overview of this approac | ||||
| h and model is provided as an introduction. The X.509 v3 certificate format is d | ||||
| escribed in detail, with additional information regarding the format and semanti | ||||
| cs of Internet name forms. Standard certificate extensions are described and two | ||||
| Internet-specific extensions are defined. A set of required certificate extensi | ||||
| ons is specified. The X.509 v2 CRL format is described in detail along with stan | ||||
| dard and Internet-specific extensions. An algorithm for X.509 certification path | ||||
| validation is described. An ASN.1 module and examples are provided in the appen | ||||
| dices. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="5280"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC5280"/> | ||||
| </reference> | ||||
| <reference anchor="X.509-2019-TC2" target="https://www.itu.int/rec/T-REC -X.509-202310-I!Cor2"> | <reference anchor="X.509-2019-TC2" target="https://www.itu.int/rec/T-REC -X.509-202310-I!Cor2"> | |||
| <front> | <front> | |||
| <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks -- Technical Corrige ndum 2</title> | <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks -- Technical Corrige ndum 2</title> | |||
| <author> | <author> | |||
| <organization>ITU-T</organization> | <organization>ITU-T</organization> | |||
| </author> | </author> | |||
| <date year="2023" month="October"/> | <date year="2023" month="October"/> | |||
| </front> | </front> | |||
| <seriesInfo name="ITU-T Recommendation" value="X.509-2019/Cor.2-2023"/ > | <seriesInfo name="ITU-T Recommendation" value="X.509-2019/Cor.2-2023"/ > | |||
| </reference> | </reference> | |||
| skipping to change at line 358 ¶ | skipping to change at line 345 ¶ | |||
| <front> | <front> | |||
| <title>Information technology -- Abstract Syntax Notation One (ASN.1 ): Specification of basic notation</title> | <title>Information technology -- Abstract Syntax Notation One (ASN.1 ): Specification of basic notation</title> | |||
| <author> | <author> | |||
| <organization>ITU-T</organization> | <organization>ITU-T</organization> | |||
| </author> | </author> | |||
| <date year="2021" month="February"/> | <date year="2021" month="February"/> | |||
| </front> | </front> | |||
| <seriesInfo name="ITU-T Recommendation" value="X.680"/> | <seriesInfo name="ITU-T Recommendation" value="X.680"/> | |||
| <seriesInfo name="ISO/IEC" value="8824-1:2021"/> | <seriesInfo name="ISO/IEC" value="8824-1:2021"/> | |||
| </reference> | </reference> | |||
| <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690"> | <reference anchor="X.690" target="https://www.itu.int/rec/T-REC-X.690"> | |||
| <front> | <front> | |||
| <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title> | <title>Information technology -- ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title> | |||
| <author> | <author> | |||
| <organization>ITU-T</organization> | <organization>ITU-T</organization> | |||
| </author> | </author> | |||
| <date year="2021" month="February"/> | <date year="2021" month="February"/> | |||
| </front> | </front> | |||
| <seriesInfo name="ITU-T Recommendation" value="X.690"/> | <seriesInfo name="ITU-T Recommendation" value="X.690"/> | |||
| <seriesInfo name="ISO/IEC" value="8825-1-2021"/> | <seriesInfo name="ISO/IEC" value="8825-1-2021"/> | |||
| </reference> | </reference> | |||
| <reference anchor="RFC2119"> | ||||
| <front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | |||
| <title>Key words for use in RFCs to Indicate Requirement Levels</tit | 119.xml"/> | |||
| le> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | |||
| <author fullname="S. Bradner" initials="S." surname="Bradner"/> | 174.xml"/> | |||
| <date month="March" year="1997"/> | ||||
| <abstract> | ||||
| <t>In many standards track documents several words are used to sig | ||||
| nify the requirements in the specification. These words are often capitalized. T | ||||
| his document defines these words as they should be interpreted in IETF documents | ||||
| . This document specifies an Internet Best Current Practices for the Internet Co | ||||
| mmunity, and requests discussion and suggestions for improvements.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="BCP" value="14"/> | ||||
| <seriesInfo name="RFC" value="2119"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC2119"/> | ||||
| </reference> | ||||
| <reference anchor="RFC8174"> | ||||
| <front> | ||||
| <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
| tle> | ||||
| <author fullname="B. Leiba" initials="B." surname="Leiba"/> | ||||
| <date month="May" year="2017"/> | ||||
| <abstract> | ||||
| <t>RFC 2119 specifies common key words that may be used in protoco | ||||
| l specifications. This document aims to reduce the ambiguity by clarifying that | ||||
| only UPPERCASE usage of the key words have the defined special meanings.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="BCP" value="14"/> | ||||
| <seriesInfo name="RFC" value="8174"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
| </reference> | ||||
| </references> | </references> | |||
| <references anchor="sec-informative-references"> | <references anchor="sec-informative-references"> | |||
| <name>Informative References</name> | <name>Informative References</name> | |||
| <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/docu ment/8423794"> | <reference anchor="IEEE802.1AR" target="https://ieeexplore.ieee.org/docu ment/8423794"> | |||
| <front> | <front> | |||
| <title>IEEE Standard for Local and Metropolitan Area Networks - Secu re Device Identity</title> | <title>IEEE Standard for Local and Metropolitan Area Networks - Secu re Device Identity</title> | |||
| <author> | <author> | |||
| <organization>IEEE</organization> | <organization>IEEE</organization> | |||
| </author> | </author> | |||
| <date year="2018" month="July" day="31"/> | <date year="2018" month="August" day="02"/> | |||
| </front> | </front> | |||
| <seriesInfo name="IEEE" value="802.1AR-2018"/> | <seriesInfo name="IEEE" value="802.1AR-2018"/> | |||
| <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8423794"/> | ||||
| </reference> | </reference> | |||
| <reference anchor="RFC2459"> | ||||
| <front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2 | |||
| <title>Internet X.509 Public Key Infrastructure Certificate and CRL | 459.xml"/> | |||
| Profile</title> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3 | |||
| <author fullname="R. Housley" initials="R." surname="Housley"/> | 281.xml"/> | |||
| <author fullname="W. Ford" initials="W." surname="Ford"/> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3 | |||
| <author fullname="W. Polk" initials="W." surname="Polk"/> | 647.xml"/> | |||
| <author fullname="D. Solo" initials="D." surname="Solo"/> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5 | |||
| <date month="January" year="1999"/> | 912.xml"/> | |||
| <abstract> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6 | |||
| <t>This memo profiles the X.509 v3 certificate and X.509 v2 CRL fo | 268.xml"/> | |||
| r use in the Internet. [STANDARDS-TRACK]</t> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6 | |||
| </abstract> | 960.xml"/> | |||
| </front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8 | |||
| <seriesInfo name="RFC" value="2459"/> | 555.xml"/> | |||
| <seriesInfo name="DOI" value="10.17487/RFC2459"/> | ||||
| </reference> | ||||
| <reference anchor="RFC3281"> | ||||
| <front> | ||||
| <title>An Internet Attribute Certificate Profile for Authorization</ | ||||
| title> | ||||
| <author fullname="S. Farrell" initials="S." surname="Farrell"/> | ||||
| <author fullname="R. Housley" initials="R." surname="Housley"/> | ||||
| <date month="April" year="2002"/> | ||||
| <abstract> | ||||
| <t>This specification defines a profile for the use of X.509 Attri | ||||
| bute Certificates in Internet Protocols. Attribute certificates may be used in a | ||||
| wide range of applications and environments covering a broad spectrum of intero | ||||
| perability goals and a broader spectrum of operational and assurance requirement | ||||
| s. The goal of this document is to establish a common baseline for generic appli | ||||
| cations requiring broad interoperability as well as limited special purpose requ | ||||
| irements. The profile places emphasis on attribute certificate support for Inter | ||||
| net electronic mail, IPSec, and WWW security applications. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="3281"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC3281"/> | ||||
| </reference> | ||||
| <reference anchor="RFC3647"> | ||||
| <front> | ||||
| <title>Internet X.509 Public Key Infrastructure Certificate Policy a | ||||
| nd Certification Practices Framework</title> | ||||
| <author fullname="S. Chokhani" initials="S." surname="Chokhani"/> | ||||
| <author fullname="W. Ford" initials="W." surname="Ford"/> | ||||
| <author fullname="R. Sabett" initials="R." surname="Sabett"/> | ||||
| <author fullname="C. Merrill" initials="C." surname="Merrill"/> | ||||
| <author fullname="S. Wu" initials="S." surname="Wu"/> | ||||
| <date month="November" year="2003"/> | ||||
| <abstract> | ||||
| <t>This document presents a framework to assist the writers of cer | ||||
| tificate policies or certification practice statements for participants within p | ||||
| ublic key infrastructures, such as certification authorities, policy authorities | ||||
| , and communities of interest that wish to rely on certificates. In particular, | ||||
| the framework provides a comprehensive list of topics that potentially (at the w | ||||
| riter's discretion) need to be covered in a certificate policy or a certificatio | ||||
| n practice statement. This document supersedes RFC 2527.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="3647"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC3647"/> | ||||
| </reference> | ||||
| <reference anchor="RFC5912"> | ||||
| <front> | ||||
| <title>New ASN.1 Modules for the Public Key Infrastructure Using X.5 | ||||
| 09 (PKIX)</title> | ||||
| <author fullname="P. Hoffman" initials="P." surname="Hoffman"/> | ||||
| <author fullname="J. Schaad" initials="J." surname="Schaad"/> | ||||
| <date month="June" year="2010"/> | ||||
| <abstract> | ||||
| <t>The Public Key Infrastructure using X.509 (PKIX) certificate fo | ||||
| rmat, and many associated formats, are expressed using ASN.1. The current ASN.1 | ||||
| modules conform to the 1988 version of ASN.1. This document updates those ASN.1 | ||||
| modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire c | ||||
| hanges to any of the formats; this is simply a change to the syntax. This docume | ||||
| nt is not an Internet Standards Track specification; it is published for informa | ||||
| tional purposes.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="5912"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC5912"/> | ||||
| </reference> | ||||
| <reference anchor="RFC6268"> | ||||
| <front> | ||||
| <title>Additional New ASN.1 Modules for the Cryptographic Message Sy | ||||
| ntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title> | ||||
| <author fullname="J. Schaad" initials="J." surname="Schaad"/> | ||||
| <author fullname="S. Turner" initials="S." surname="Turner"/> | ||||
| <date month="July" year="2011"/> | ||||
| <abstract> | ||||
| <t>The Cryptographic Message Syntax (CMS) format, and many associa | ||||
| ted formats, are expressed using ASN.1. The current ASN.1 modules conform to the | ||||
| 1988 version of ASN.1. This document updates some auxiliary ASN.1 modules to co | ||||
| nform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative | ||||
| version. There are no bits- on-the-wire changes to any of the formats; this is s | ||||
| imply a change to the syntax. This document is not an Internet Standards Track s | ||||
| pecification; it is published for informational purposes.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="6268"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC6268"/> | ||||
| </reference> | ||||
| <reference anchor="RFC6960"> | ||||
| <front> | ||||
| <title>X.509 Internet Public Key Infrastructure Online Certificate S | ||||
| tatus Protocol - OCSP</title> | ||||
| <author fullname="S. Santesson" initials="S." surname="Santesson"/> | ||||
| <author fullname="M. Myers" initials="M." surname="Myers"/> | ||||
| <author fullname="R. Ankney" initials="R." surname="Ankney"/> | ||||
| <author fullname="A. Malpani" initials="A." surname="Malpani"/> | ||||
| <author fullname="S. Galperin" initials="S." surname="Galperin"/> | ||||
| <author fullname="C. Adams" initials="C." surname="Adams"/> | ||||
| <date month="June" year="2013"/> | ||||
| <abstract> | ||||
| <t>This document specifies a protocol useful in determining the cu | ||||
| rrent status of a digital certificate without requiring Certificate Revocation L | ||||
| ists (CRLs). Additional mechanisms addressing PKIX operational requirements are | ||||
| specified in separate documents. This document obsoletes RFCs 2560 and 6277. It | ||||
| also updates RFC 5912.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="6960"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC6960"/> | ||||
| </reference> | ||||
| <reference anchor="RFC8555"> | ||||
| <front> | ||||
| <title>Automatic Certificate Management Environment (ACME)</title> | ||||
| <author fullname="R. Barnes" initials="R." surname="Barnes"/> | ||||
| <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman | ||||
| -Andrews"/> | ||||
| <author fullname="D. McCarney" initials="D." surname="McCarney"/> | ||||
| <author fullname="J. Kasten" initials="J." surname="Kasten"/> | ||||
| <date month="March" year="2019"/> | ||||
| <abstract> | ||||
| <t>Public Key Infrastructure using X.509 (PKIX) certificates are u | ||||
| sed for a number of purposes, the most significant of which is the authenticatio | ||||
| n of domain names. Thus, certification authorities (CAs) in the Web PKI are trus | ||||
| ted to verify that an applicant for a certificate legitimately represents the do | ||||
| main name(s) in the certificate. As of this writing, this verification is done t | ||||
| hrough a collection of ad hoc mechanisms. This document describes a protocol tha | ||||
| t a CA and an applicant can use to automate the process of verification and cert | ||||
| ificate issuance. The protocol also provides facilities for other certificate ma | ||||
| nagement functions, such as certificate revocation.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="8555"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8555"/> | ||||
| </reference> | ||||
| <reference anchor="X.509-1988" target="https://www.itu.int/rec/T-REC-X.5 09-198811-S"> | <reference anchor="X.509-1988" target="https://www.itu.int/rec/T-REC-X.5 09-198811-S"> | |||
| <front> | <front> | |||
| <title>Series X: Data Communication Networks: Directory -- The Direc tory -- Authentication Framework</title> | <title>The Directory - Authentication Framework</title> | |||
| <author> | <author> | |||
| <organization>CCITT</organization> | <organization>CCITT</organization> | |||
| </author> | </author> | |||
| <date year="1988" month="November"/> | <date year="1988" month="November"/> | |||
| </front> | </front> | |||
| <seriesInfo name="CCITT Recommendation" value="X.509-1988"/> | <seriesInfo name="CCITT Recommendation" value="X.509-1988"/> | |||
| </reference> | </reference> | |||
| <reference anchor="X.509-1997" target="https://www.itu.int/rec/T-REC-X.5 09-199708-S"> | <reference anchor="X.509-1997" target="https://www.itu.int/rec/T-REC-X.5 09-199708-S"> | |||
| <front> | <front> | |||
| <title>Information Technology -- Open Systems Interconnection -- The Directory: Authentication framework</title> | <title>Information technology -- Open Systems Interconnection -- The Directory: Authentication framework</title> | |||
| <author> | <author> | |||
| <organization>ITU-T</organization> | <organization>ITU-T</organization> | |||
| </author> | </author> | |||
| <date year="1997" month="August"/> | <date year="1997" month="August"/> | |||
| </front> | </front> | |||
| <seriesInfo name="ITU-T Recommendation" value="X.509-1997"/> | <seriesInfo name="ITU-T Recommendation" value="X.509-1997"/> | |||
| </reference> | </reference> | |||
| <reference anchor="X.509-2000" target="https://www.itu.int/rec/T-REC-X.5 09-200003-S"> | <reference anchor="X.509-2000" target="https://www.itu.int/rec/T-REC-X.5 09-200003-S"> | |||
| <front> | <front> | |||
| <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks</title> | <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks</title> | |||
| <author> | <author> | |||
| <organization>ITU-T</organization> | <organization>ITU-T</organization> | |||
| </author> | </author> | |||
| <date year="2000" month="March"/> | <date year="2000" month="March"/> | |||
| </front> | </front> | |||
| <seriesInfo name="ITU-T Recommendation" value="X.509-2000"/> | <seriesInfo name="ITU-T Recommendation" value="X.509-2000"/> | |||
| </reference> | </reference> | |||
| skipping to change at line 550 ¶ | skipping to change at line 428 ¶ | |||
| <reference anchor="X.509-2019" target="https://www.itu.int/rec/T-REC-X.5 09-201910-I"> | <reference anchor="X.509-2019" target="https://www.itu.int/rec/T-REC-X.5 09-201910-I"> | |||
| <front> | <front> | |||
| <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks</title> | <title>Information Technology -- Open Systems Interconnection -- The Directory: Public-key and attribute certificate frameworks</title> | |||
| <author> | <author> | |||
| <organization>ITU-T</organization> | <organization>ITU-T</organization> | |||
| </author> | </author> | |||
| <date year="2019" month="October"/> | <date year="2019" month="October"/> | |||
| </front> | </front> | |||
| <seriesInfo name="ITU-T Recommendation" value="X.509-2019"/> | <seriesInfo name="ITU-T Recommendation" value="X.509-2019"/> | |||
| </reference> | </reference> | |||
| </references> | </references> | |||
| </references> | </references> | |||
| <section anchor="acknowledgements" numbered="false"> | ||||
| <name>Acknowledgements</name> | ||||
| <t>Many thanks to <contact fullname="Erik Anderson"/> for his efforts to m | ||||
| ake the noRevAvail | ||||
| certificate extension available for use with public key end-entity | ||||
| certificates as well as attribute certificates.</t> | ||||
| <t>Many thanks to (in alphabetical order) | ||||
| <contact fullname="Corey Bonnell"/>, | ||||
| <contact fullname="Hendrik Brockhaus"/>, | ||||
| <contact fullname="Tim Hollebeek"/>, | ||||
| <contact fullname="Mike Ounsworth"/>, | ||||
| <contact fullname="Seo Suchan"/>, | ||||
| <contact fullname="Carl Wallace"/>, | ||||
| <contact fullname="Éric Vyncke"/>, and | ||||
| <contact fullname="Paul Wouters"/> | ||||
| for their review and insightful comments.</t> | ||||
| </section> | ||||
| </back> | </back> | |||
| <!-- ##markdown-source: | ||||
| H4sIAFDXDmYAA9Vb63IbyXX+30/Rpn6IjDEQAIoigbXXC4HgCjZvIaDVblKp | ||||
| VGOmQfRyMA1PzxDLsLj//RZ5luTF8p3uueIiUlo7lcguezDTl3O+Pvc+9DyP | ||||
| mUREwb+LUEeyx5M4lUwtY/tkkk6r1W11WKD9SCzwOYjFLPGUTGZeKBZL40U6 | ||||
| lvfiXqjQa71l6TIQiTQ9ftQ5aTFfJD1ukoD5OjIyMik+vKYNXrOl6jHOE+3j | ||||
| zYM0r/HD6DiJ5cxU3jwsqi8SlYQg4fWl5jfyXmN1pSPep73FNJR8pmP+Y/Oo | ||||
| 1eXX6TRUPv+LfOADGSdqpnwi6zUT0ynI7fFLjRXsTDtrx3hm0ulCGYNtJg9L | ||||
| bD0aTs7Y6rbHz/sX12P+Scd3Krrl38c6XTIRS9HjY+mnsUoe2N0K46NExpFM | ||||
| vFOCjRE2Pd5pdd4CK4KLiTSZ67jHPO7gvUmN4R90akL5AAB0jL1+ULcgM1+3 | ||||
| wc/PB/iUc1L/ig8+/q/HP2DfQEcN/kOf3uk0SmK8/jjGL7kA3z0+d9t8d08r | ||||
| GOk3fb0oCJnohZ6lC8Wv7tKpzkk5xVACqAHO/GaFivxDsf+ZUPFM/PK5/ZNs | ||||
| i6amLX5PMvXdLX2qEfJnbeRyzi8gojLM6bDsyu/XqcheF0RMBFYSDf5pjYZ+ | ||||
| ScTPWjYXdu3vjJ1921SaMRVBLBYQsHtJcjoaDocnrU6z3b+hnxBcEd9KCPc8 | ||||
| SZam9+aNklL+sgyhC016bILKN9CZdCGj5M3J287hcfetm+hkeI9W5GNSPBEH | ||||
| VgbPIdAhxwt+IZNYL3Wo8Jn3IVX8UiYryJrhXsYjP5X3ypd8FGAD8LpnF8+l | ||||
| iZ49hxTtY3/nstc+8VrH3mHbvjQyVtIQs26SHd7jGasejcb7m7NB5+1Rt+ce | ||||
| Dzsn7fzx3dvj7PGo2+5kj+86707yx+67VvZ4cnR0RI9WQb129+RkO5Kr1aqp | ||||
| krSpAFws/TcT72Y48MpZ7bY3riL5rSMcuBAr/EfIokgEH+jFIo1UZiNy/EhQ | ||||
| sWii4wcOw+dmTuay9pr3ASPBmk0+iyGINH0XxoPBaDKpgExkeu0dCLvRMGAQ | ||||
| TUhHYPfoVWCpYNQ9/hqMusetk+0YjXKpBlcT6c8jHerbChJXSxnx8YNJ5MI4 | ||||
| 2wXDHQEYmrAdr946WrPn0BpNPnp1tLrHXutkB1p29E60uscFWnBUrS9Hi2a1 | ||||
| Dv8X0XKexruDpyFVF0kSq2maSO6XfqfE0LwUROLDax1+BYg0swJiu/s1ILa7 | ||||
| 7ZY3+v8PYhtC1foqENtdxqKqyyCbiBioV8PWmww6X4Nv55Dw/d1Ax53/qyBX | ||||
| 1iEKFDkz0BurW4CVLnjn5afQOfz6U3iDPZsdC5lF/t3JF1oFTHgO4mQLxP2p | ||||
| SWLhJ4A5SsQvCDATN/gqkny/P75stg9yHsZL6TsAaYCe8akwiD6jbMoXANX2 | ||||
| Wp0vBCrnDyPGV29GwwHc/QkC0naP1nOYdb8Us+7XYUaocBn5OqAoOk5Dyhw2 | ||||
| 0Hlv0Rnmw25oGN9/P7w5aOQuVUTaSdz6qAFGWfE9VSbB+1SZuQw2hp1i2D8Y | ||||
| 9u422I+8tmdhZx7iDpHJEGNWnu8P+dLlJaSDFa0zHKkGX8Z6pkIwoyIyNjbj | ||||
| akK4QH/ihbBCSLvW5xgpietbxJQwAjw1kmbDfxeZStPZgTILIoHsW1QQZgLQ | ||||
| /gHGi4QjLUqxKuZiEVNuWic00CTWjg8zZ3GZtqmKcEylL4gWIqRqXUI1k2Yp | ||||
| onxHtw8Ix++I0ehELSSPpAywcaJ5ICFnyE5iudSUpdDJBzj5zHJt355A0wvJ | ||||
| kP/eZjw8h38k70EFIn6YS7cLiHmwENtPltE7GVg0ie6aTAdypiKHHdApEtEq | ||||
| 5/KXBPkyDTaaWe4FqA8f6PSWIsZJ+IAFxxio8MGyHS+wpgOK1h30gT1R+jz6 | ||||
| lHysIe94UgnP8vm17yQTS5HM+b0IlZNxLsJbEpH5oiqPdCbmTi2ryPtz6dus | ||||
| eYWwkRZmz2IABJcx5CxKmk5TFioIQsnYK5LbWAepc2WPrxT9fHpegR4fM//8 | ||||
| 9MRXoNpJluOH5HwJxdaBVRr2IqU50yQPYrEMAR70RRO4frWawJDCiltJGSHs | ||||
| z72KdWSf9/uDi+GBo4iSJFAE1b5XAeksJ4ugbucJDmlFmeJKPDCAqqeJABG7 | ||||
| 9K5JxpcjryU5MdI0IAeVM2DV4we4CxFILmp1lJ0aPX2wZ1YzELxuIHKpx39z | ||||
| zd61HJuLe2y9DvxWhefPKzx7qcL3jVUok4Z2MpSVjlhU6axaz4Ie8OKydVHP | ||||
| evCGZGxRHjENphhLGiPiB0vYUkM84W/oeK4cOxr/E3MwF9TIqG4tjNG+wlPg | ||||
| JFVUDZVRt5FIUrJCJvXxkUyuKzvYb7QcaIO3k/nvRilehsyeWhB0gkiuSIWY | ||||
| 6jRxKgpy9AJzFgoHuaIdlPE1rBzsG2NkOvnfxXQy96kwnTWVEnwmXIK+IHUA | ||||
| rX6YktRGfHQq70enNcweHysVm6cn0pipclvl63jAFYCA4sCVUlRWSiGxKnbz | ||||
| VGQSEZKbLRlqWvFmxYQ6RbQH5CClFXAwcYMvgH7oeKWAAWFKlC6mYBXBDY12 | ||||
| BDTYaq5whA4FHzJxK0mTNFYOKlJYl465IBvPVzIMPedXAgeuU/TAGnPnaJL+ | ||||
| jFSJXuUGrLrSugqS9kk4E832uvjXRg7SOTzqHnX/Za9qPiECv93FZZyx3+ri | ||||
| dtm43MUhIvOyQ/s7eruqM/kHODykEhWun51bardawKDHfJZG1j2C+sQ6D2t4 | ||||
| fLP0Im1p27GQZYsqeDhkFxVWJ7GdlIslSFjGyuaHAN4qhv2oI5wkAKsZBBtI | ||||
| kjFnV4PxNUJns9RRIGM4LQCG8zfP87y2K7aA62PbT9vS5FQtk6KVCsMdUrTm | ||||
| NiaaiXutrI+J06XLbByglniE/cam2Q2uyG6RHQYn5FbSMLB7JHMV3WWa/7wg | ||||
| wCOlyAqQdGWEf+7sWDHvGz7XK7IjjZfJjG/Jm8rciFFSwbafEl87JQt2AMNR | ||||
| weJ5OYFYv3rFJ1alXVb4+IoU3DyROZHWbax0jAhs7+LjeLLXcP/PL6/s883w | ||||
| nz+Oboan9Dz+0D8/Lx5YNmL84erj+Wn5VM4cXF1cDC9P3WS85bVXbO+i/9Oe | ||||
| swh7V9eT0dVl/3zP2UtVca4U6pNXIchAOLSVHLQwDJrnI/pwedn7wfV//Wf7 | ||||
| LVTpd1REb7e7MBHux0n7+C0Fn7AJbjerHO4neUQGgZYitvBCPH2xVHBEUAph | ||||
| xWkVcVIO4PhP/0rI/FuP/2HqL9tvv81eEMO1lzlmtZcWs803G5MdiFtebdmm | ||||
| QLP2fg3pOr39n2q/c9wrL//wp5CMv9c++dO3zAqPrR5kkf5mdnwrIxnboAmm | ||||
| B7bX1RoeH20B5Ompkb0mabX1BbatvpCHJy+oHrilu84hgroPmIH4gTHE4VTV | ||||
| b2R1/9xH06ouVGqvRS7lTYBdy87vHjeyysLm/MN6tJhRXJTr2PbVu8eV1bvO | ||||
| TNDtJp+p2CRlcWHXPmSLykyI5ZmQcxp0W5QvT/XlbcQ/a5PyHSjoZVurj6bg | ||||
| hzapbNj5PD87Spmf44guvUhqHLzWPdsFS4Np0iXF0bmRfta058S2uzk6mfch | ||||
| MxJloQiZmG0VJXckrGS/7fD+RAlCNVGFn9mZya0lsQ6zGBlLlLDtNdzPUsOr | ||||
| 1FChG9YNlkuvDHvReTtrahMsm+fsSCAY7B9Fu2QHt0sFKaANVypbVvJwPsy3 | ||||
| dK6mMqogplGIqg3v1vlqZIzRQSF+SNZCdFZLtmtplQ01pnJbxm3FqsJHHliX | ||||
| COVmnRbIwkOiDxTswApLDLTdnazVAEmvXaLMVGrLrwdmZZwU6V21o5yfQnYR | ||||
| JH2iMDejr4HQokoAswQsRHy3vrsN8yIPvpOS6hCkf8t+/fVXRl0AvPynAs+X | ||||
| Xnlm7AqpX+XfoxvBj97xJ2ZcLT7/d/kRnm1fNZFWvW4dtVqvP1DgaO378Kao | ||||
| Qx+wnAYKHPHPkgwez/rn46GlifXXinE2Oi+SkdQGRklhK0omXaaIteypI+Sd | ||||
| UVZaz+gqSAPShO8Pbs4P+Az5dxavNjhE3j3fnNsTyDLnSk4sqdVhW2WPzoNK | ||||
| R875VYmzanNl6xFOn7fqjGGV0k8mJIVgkWxW0+BtqtWsz3eFlWfmbKy+PajM | ||||
| VrNlFlLKKgOVhqHzAlVGZSOj4KipdQCcZLkTD7OxhgzoVWRDj+pq40QkqeHX | ||||
| sU60r0O2T0HxQSUqpgLcbDc/ZX5n47sqO9YMRz3EddaGVRktUEAcqGuguQsk | ||||
| 6rKicmGUmB021hpWKxF9/v7q6nzYv8ySfD65+Tj8hi4IqMPE4vS22Wm2m12C | ||||
| oJ7vfwllJKKneUGOVr3Wu+nbtn/78LcRcAac5xInTpS8fNejXbuWpc7q9Vbf | ||||
| p0Lf9vWRC85Ke7ihKNBWmCwReJQ1cWEXupDYJNgkDKRt0gVBo0JvVkwSU30P | ||||
| gUjDUCa2BHuvdGgDYRXVLY2TNOa8ftWaWRJJmKAKmwZERbYOYs1FvQp8TUWS | ||||
| H4oiCUN8khP/DpjagywrJXmiZHLprewBPSQYbNFEUcbMNkoyfL0kY+cEaZxX | ||||
| v4kX5aehQBI8TuSS74uD/cMDbsSD6eXepe8MqZ/GMSkjVZcbmxw7s16/02EL | ||||
| 8UCWvChMBVQad3X5PLOo1iQgfmy/hOPwoEHjjTMkFZfaIDtEK6WJp2feFF6E | ||||
| LSSVA5VZwKNb/7NpW3bEVHkZ3RXnnBDUEllWMUXPlBe2l4YqtqxBpxTVwKa9 | ||||
| 7xQyWYLNOpeVMrJRdXIZBDmO+bUvWzuBpYwJI+kEz6VzFzpABsYfXwkTtb2F | ||||
| Dp7yYmSGc3mREmVTFtmUPBEsfGQlpNihxVmRcKZd7GelREf3VGEiTwEbI7Ig | ||||
| iBVFwW7bhsGY6SDrvHNZHU7xV4Q8UZNu3MtmVLhZd/2PMMbo/fZBVpWmo/N0 | ||||
| fAsh+A8LEGEb6GD/3YGrPyB+x+jshtlkzaD7Rwe8FB36tbxTv+wf06qE1n4r | ||||
| n+F+V8Kq/cn70wNEUPh+OjwbXY4oIR/z0cX1+Qh5LJ/0vx/zXu+P+P5++P3o | ||||
| kgbi49XNxLVSDX+cDC/HmGN/nd1cXfDrv4x+9KgtzzXTGkraupz67extIZBi | ||||
| RQj39bx/DfcF/zTAUei1OvtHGPrEvyHWQOTzyQQnYalgWIJASPFHu9v4p8tJ | ||||
| /0cbitrfo9Ph5WR0Nhqe8vc/bUa3trvhBugP+uejyU/AxkahoOvphXRxBMg0 | ||||
| 1IXFV+//PBxMyl1vHGn8Z/LKHnD3fF8lyX4HEFvMOl230zplO1eqhN8c84aX | ||||
| p1bY2WOPG53GvqS7KI8yAIRJf3Td4E+k0nkLMzJO53myCOzxFU7UI3eU1QZ3 | ||||
| DVyrxFMVCH5N3gtbRf+UFd9fVEyulEHXfCajYty24j5ddj4shTHW1FFOppGS | ||||
| KWt7AhgiAYsEn+acK/XCx5JtK+pXdy9KglVPYiuA5PAXytgUP2YLupCLZuo2 | ||||
| jTOqbD3X3W86HtZuVpAEqCi1fkq7Rn8mcgdXS0KzdM5eLmIbz1ZIqleAzl1a | ||||
| ShFLG4XEBmE17LQqrpddhFFAlgUqg35+ewjmQpUH3ORW7aVwIJcSsXRkMdTR | ||||
| roya7mKNSekiE/FOllIryt2aNl4TU7gm31ZCdqxAO8byr6mCwMAKFBGGYbR2 | ||||
| SBbGdvXxOsaIm6kmaAhBd57kbuCmqvwU1oikgNVuYppOmp+nL1QLYs0Fd5Yz | ||||
| N9geKLNhjjTlZXj1thbjKpcgd9KKwIKqQ3QLCfYWgoRUp6ZW7W/yUeIi6S17 | ||||
| lxtR3keBkfOIRAyNKzguZL6xFk2ZVBDHuYJk5e9lpsgipD8XSWIdZvmcbVyq | ||||
| BzD1bOyaFqLWA6RgWfVtLTAttI8SN3c/j9HjrOuC2titVx4roit5sdRYdNbA | ||||
| YRunEHwW+FrNpbFxrNTq4AQvkI648vZTmRL6bbCz4g6KBrzgDJz8QpNtcZxV | ||||
| joTnRwKDcFMxJUQiIQErG6Y2zLWlEZXh0WDwpTa/tuWfPIijrbNTB87xveMG | ||||
| mk4On8zWkv5eiO483DrKFfVeVZvb6n+owy53lty+rL+F7epF23Y9/vnmFPaV | ||||
| 3Wgbwf3uq1ZgpmPq2LVnlrembKWbrXXWkOIClr/SqWG25aVB8a1vy8fUHwO5 | ||||
| CvSKdEDb2nYaEf/YgsrxwicHbo0f/eGLSmp9IiRL6p72z/ol4CowUdodqM4Z | ||||
| pz40gW6jfej3DOnqA9lxSqJdn0RCMXs1gfrMYeDQaHFek/eX+HonVedl98pv | ||||
| FKq1XpiaYFngs+pbbS37odr1Ydb7yTY7XAxba3GxVrIatrimEqqRV7te1poV | ||||
| rcxAUrN2svPNfdZbadzdetVaw8MUzWxNSrwpv2TUdga7Hz8sE30bi+UcGX7R | ||||
| NJGZNVfx9+fayKg09RAnCLT7HNNfaWVOVOatC8UAag+1Klfro9miQDsDPUYA | ||||
| NHJ7mvXSLKRwhT+oiJo95LJUj6Bcf1Td1ZLj2ewbWjP+Nn0d9S/7m3GuEpFA | ||||
| jHuWZaS1HNcGt0Wa+9RwS0AMKXJB6unwcj1NOCCc6M/khYoUKub7SAQOinQ3 | ||||
| y4PL7y5aomp6fQjLeheoaB3aumjphPfGF6MyHLd/SIkkLyd5VKy9h4jwlgwf | ||||
| nHS7edikatAR/nPcbB00yktWWxBa1hp2IrmyNJVEwDKQIOxtpKx7rjDg30V6 | ||||
| BdxdGx6U+IJiZTLRd9ZaDWN1x/u2SJvtY6vgMzwldsBC3K1XoncY4Lry53eV | ||||
| 1cuYMvha68V+wR3WGt37thFgORdTaS8nEESAhwM2gOF74O/p7znCsME+YEvi | ||||
| 8H2s/bs5PFmDTdSCf0CcIKdS3jXYhQJ/V2lkVuB43mBjqfk4JcvTYAMRh/wT | ||||
| zllQP9p//y0GHz88RDD17pjYtUgxAKIP+Fh2SMr27CmclK2QABvqV00pZljY | ||||
| M8iadqdwGex/AP67+U9wPAAA | ||||
| </rfc> | </rfc> | |||
| End of changes. 54 change blocks. | ||||
| 425 lines changed or deleted | 146 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||