rfc9399.original | rfc9399.txt | |||
---|---|---|---|---|
Network Working Group S. Santesson | Internet Engineering Task Force (IETF) S. Santesson | |||
Internet-Draft IDsec Solutions | Request for Comments: 9399 IDsec Solutions | |||
Obsoletes: 3709, 6170 (if approved) R. Housley | Obsoletes: 3709, 6170 R. Housley | |||
Intended status: Standards Track Vigil Security | Category: Standards Track Vigil Security | |||
Expires: 14 June 2023 T. Freeman | ISSN: 2070-1721 T. Freeman | |||
Amazon Web Services | Amazon Web Services | |||
L. Rosenthol | L. Rosenthol | |||
Adobe | Adobe | |||
11 December 2022 | April 2023 | |||
Internet X.509 Public Key Infrastructure: Logotypes in X.509 | Internet X.509 Public Key Infrastructure: Logotypes in X.509 | |||
Certificates | Certificates | |||
draft-ietf-lamps-rfc3709bis-10 | ||||
Abstract | Abstract | |||
This document specifies a certificate extension for including | This document specifies a certificate extension for including | |||
logotypes in public key certificates and attribute certificates. | logotypes in public key certificates and attribute certificates. | |||
This document obsoletes RFC 3709 and RFC 6170. | This document obsoletes RFCs 3709 and 6170. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
Internet Standards is available in Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on 14 June 2023. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9399. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
in the Revised BSD License. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
1.1. Certificate-based Identification . . . . . . . . . . . . 4 | 1.1. Certificate-Based Identification | |||
1.2. Selection of Certificates . . . . . . . . . . . . . . . . 5 | 1.2. Selection of Certificates | |||
1.3. Combination of Verification Techniques . . . . . . . . . 5 | 1.3. Combination of Verification Techniques | |||
1.4. Terminology . . . . . . . . . . . . . . . . . . . . . . . 6 | 1.4. Requirements Language | |||
2. Different Types of Logotypes in Certificates . . . . . . . . 6 | 2. Different Types of Logotypes in Certificates | |||
3. Logotype Data . . . . . . . . . . . . . . . . . . . . . . . . 7 | 3. Logotype Data | |||
4. Logotype Extension . . . . . . . . . . . . . . . . . . . . . 8 | 4. Logotype Certificate Extension | |||
4.1. Extension Format . . . . . . . . . . . . . . . . . . . . 8 | 4.1. Extension Format | |||
4.2. Conventions for LogotypeImageInfo . . . . . . . . . . . . 12 | 4.2. Conventions for LogotypeImageInfo | |||
4.3. Embedded Images . . . . . . . . . . . . . . . . . . . . . 13 | 4.3. Embedded Images | |||
4.4. Other Logotypes . . . . . . . . . . . . . . . . . . . . . 13 | 4.4. Other Logotypes | |||
4.4.1. Loyalty Logotype . . . . . . . . . . . . . . . . . . 14 | 4.4.1. Loyalty Logotype | |||
4.4.2. Certificate Background Logotype . . . . . . . . . . . 14 | 4.4.2. Certificate Background Logotype | |||
4.4.3. Certificate Image Logotype . . . . . . . . . . . . . 14 | 4.4.3. Certificate Image Logotype | |||
5. Type of Certificates . . . . . . . . . . . . . . . . . . . . 16 | 5. Type of Certificates | |||
6. Use in Clients . . . . . . . . . . . . . . . . . . . . . . . 16 | 6. Use in Clients | |||
7. Image Formats . . . . . . . . . . . . . . . . . . . . . . . . 17 | 7. Image Formats | |||
8. Audio Formats . . . . . . . . . . . . . . . . . . . . . . . . 19 | 8. Audio Formats | |||
9. Security Considerations . . . . . . . . . . . . . . . . . . . 20 | 9. Security Considerations | |||
10. Privacy Considerations . . . . . . . . . . . . . . . . . . . 22 | 10. Privacy Considerations | |||
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 24 | 11. IANA Considerations | |||
12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25 | 12. References | |||
12.1. Acknowledgments from RFC 3709 . . . . . . . . . . . . . 25 | 12.1. Normative References | |||
12.2. Acknowledgments from RFC 6170 . . . . . . . . . . . . . 25 | 12.2. Informative References | |||
12.3. Additional Acknowledgments . . . . . . . . . . . . . . . 25 | Appendix A. ASN.1 Modules | |||
13. References . . . . . . . . . . . . . . . . . . . . . . . . . 25 | A.1. ASN.1 Modules with 1988 Syntax | |||
13.1. Normative References . . . . . . . . . . . . . . . . . . 25 | A.2. ASN.1 Module with 2002 Syntax | |||
13.2. Informative References . . . . . . . . . . . . . . . . . 27 | Appendix B. Examples | |||
Appendix A. ASN.1 Modules . . . . . . . . . . . . . . . . . . . 29 | B.1. Example from RFC 3709 | |||
A.1. ASN.1 Modules with 1988 Syntax . . . . . . . . . . . . . 29 | B.2. Issuer Organization Logotype Example | |||
A.2. ASN.1 Module with 2002 Syntax . . . . . . . . . . . . . . 32 | B.3. Embedded Image Example | |||
Appendix B. Examples . . . . . . . . . . . . . . . . . . . . . . 35 | B.4. Embedded Certificate Image Example | |||
B.1. Example from RFC 3709 . . . . . . . . . . . . . . . . . . 35 | B.5. Full Certificate Example | |||
B.2. Issuer Logotype Example . . . . . . . . . . . . . . . . . 36 | Appendix C. Changes since RFCs 3709 and 6170 | |||
B.3. Embedded Image Example . . . . . . . . . . . . . . . . . 37 | Acknowledgments | |||
B.4. Embedded Certificate Image Example . . . . . . . . . . . 39 | Authors' Addresses | |||
B.5. Full Certificate Example . . . . . . . . . . . . . . . . 42 | ||||
Appendix C. Changes Since RFC 3709 and RFC 6170 . . . . . . . . 45 | ||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 46 | ||||
1. Introduction | 1. Introduction | |||
This specification supplements [RFC5280], which profiles public-key | This specification supplements [RFC5280], which profiles public key | |||
certificates and certificate revocation lists (CRLs) for use in the | certificates and certificate revocation lists (CRLs) for use in the | |||
Internet, and it supplements [RFC5755] which profiles attribute | Internet, and it supplements [RFC5755], which profiles attribute | |||
certificates for use in the Internet. | certificates for use in the Internet. | |||
This document obsoletes RFC 3709 [RFC3709] and RFC 6170 [RFC6170]. | This document obsoletes [RFC3709] and [RFC6170]. Appendix C provides | |||
Appendix C provides a summary of the changes since the publication of | a summary of the changes since the publication of [RFC3709] and | |||
RFC 3709 and RFC 6170. | [RFC6170]. | |||
The basic function of a certificate is to bind a public key to the | The basic function of a certificate is to bind a public key to the | |||
identity of an entity (the subject). From a strictly technical | identity of an entity (the subject). From a strictly technical | |||
viewpoint, this goal could be achieved by signing the identity of the | viewpoint, this goal could be achieved by signing the identity of the | |||
subject together with its public key. However, the art of Public Key | subject together with its public key. However, the art of Public Key | |||
Infrastructure (PKI) has developed certificates far beyond this | Infrastructure (PKI) has developed certificates far beyond this | |||
functionality in order to meet the needs of modern global networks | functionality in order to meet the needs of modern global networks | |||
and heterogeneous information and operational technology structures. | and heterogeneous information and operational technology structures. | |||
Certificate users must be able to determine certificate policies, | Certificate users must be able to determine certificate policies, | |||
skipping to change at page 3, line 43 ¶ | skipping to change at line 128 ¶ | |||
Much of the information contained in certificates is appropriate and | Much of the information contained in certificates is appropriate and | |||
effective for machine processing; however, this information is not | effective for machine processing; however, this information is not | |||
suitable for a corresponding human trust and recognition process. | suitable for a corresponding human trust and recognition process. | |||
Humans prefer to structure information into categories and symbols. | Humans prefer to structure information into categories and symbols. | |||
Most humans associate complex structures of reality with easily | Most humans associate complex structures of reality with easily | |||
recognizable logotypes and marks. Humans tend to trust things that | recognizable logotypes and marks. Humans tend to trust things that | |||
they recognize from previous experiences. Humans may examine | they recognize from previous experiences. Humans may examine | |||
information to confirm their initial reaction. Very few consumers | information to confirm their initial reaction. Very few consumers | |||
actually read all terms and conditions they agree to in accepting a | actually read all terms and conditions they agree to in accepting a | |||
service, rather they commonly act on trust derived from previous | service; instead, they commonly act on trust derived from previous | |||
experience and recognition. | experience and recognition. | |||
A big part of this process is branding. Service providers and | A big part of this process is branding. Service providers and | |||
product vendors invest a lot of money and resources into creating a | product vendors invest a lot of money and resources into creating a | |||
strong relation between positive user experiences and easily | strong relation between positive user experiences and easily | |||
recognizable trademarks, servicemarks, and logotypes. | recognizable trademarks, servicemarks, and logotypes. | |||
Branding is also pervasive in identification instruments, including | Branding is also pervasive in identification instruments, including | |||
identification cards, passports, driver's licenses, credit cards, | identification cards, passports, driver's licenses, credit cards, | |||
gasoline cards, and loyalty cards. Identification instruments are | gasoline cards, and loyalty cards. Identification instruments are | |||
skipping to change at page 4, line 20 ¶ | skipping to change at line 151 ¶ | |||
service or any other group. Identification instruments, in physical | service or any other group. Identification instruments, in physical | |||
form, commonly use logotypes and symbols, solely to enhance human | form, commonly use logotypes and symbols, solely to enhance human | |||
recognition and trust in the identification instrument itself. They | recognition and trust in the identification instrument itself. They | |||
may also include a registered trademark to allow legal recourse for | may also include a registered trademark to allow legal recourse for | |||
unauthorized duplication. | unauthorized duplication. | |||
Since certificates play an equivalent role in electronic exchanges, | Since certificates play an equivalent role in electronic exchanges, | |||
we examine the inclusion of logotypes in certificates. We consider | we examine the inclusion of logotypes in certificates. We consider | |||
certificate-based identification and certificate selection. | certificate-based identification and certificate selection. | |||
1.1. Certificate-based Identification | 1.1. Certificate-Based Identification | |||
The need for human recognition depends on the manner in which | The need for human recognition depends on the manner in which | |||
certificates are used and whether certificates need to be visible to | certificates are used and whether certificates need to be visible to | |||
human users. If certificates are to be used in open environments and | human users. If certificates are to be used in open environments and | |||
in applications that bring the user in conscious contact with the | in applications that bring the user in conscious contact with the | |||
result of a certificate-based identification process, then human | result of a certificate-based identification process, then human | |||
recognition is highly relevant, and may be a necessity. | recognition is highly relevant and may be a necessity. | |||
Examples of such applications include: | Examples of such applications include: | |||
* Web server identification where a user identifies the owner of the | * Web server identification where a user identifies the owner of the | |||
website. | website. | |||
* Peer e-mail exchange in business-to-business (B2B), business-to- | * Peer email exchange in business-to-business (B2B), business-to- | |||
consumer (B2C), and private communications. | consumer (B2C), and private communications. | |||
* Exchange of medical records, and system for medical prescriptions. | * Exchange of medical records and system for medical prescriptions. | |||
* Unstructured e-business applications (i.e., non-EDI applications). | * Unstructured e-business applications (i.e., non-EDI applications). | |||
* Wireless client authenticating to a service provider. | * Wireless client authenticating to a service provider. | |||
Most applications provide the human user with an opportunity to view | Most applications provide the human user with an opportunity to view | |||
the results of a successful certificate-based identification process. | the results of a successful certificate-based identification process. | |||
When the user takes the steps necessary to view these results, the | When the user takes the steps necessary to view these results, the | |||
user is presented with a view of a certificate. This solution has | user is presented with a view of a certificate. This solution has | |||
two major problems. First, the function to view a certificate is | two major problems. First, the function to view a certificate is | |||
skipping to change at page 5, line 21 ¶ | skipping to change at line 200 ¶ | |||
1.2. Selection of Certificates | 1.2. Selection of Certificates | |||
One situation where software applications must expose human users to | One situation where software applications must expose human users to | |||
certificates is when the user must select a single certificate from a | certificates is when the user must select a single certificate from a | |||
portfolio of certificates. In some cases, the software application | portfolio of certificates. In some cases, the software application | |||
can use information within the certificates to filter the list for | can use information within the certificates to filter the list for | |||
suitability; however, the user must be queried if more than one | suitability; however, the user must be queried if more than one | |||
certificate is suitable. The human user must select one of them. | certificate is suitable. The human user must select one of them. | |||
This situation is comparable to a person selecting a suitable plastic | This situation is comparable to a person selecting a suitable plastic | |||
card from his wallet. In this situation, substantial assistance is | card from their wallet. In this situation, substantial assistance is | |||
provided by card color, location, and branding. | provided by card color, location, and branding. | |||
In order to provide similar support for certificate selection, the | In order to provide similar support for certificate selection, the | |||
users need tools to easily recognize and distinguish certificates. | users need tools to easily recognize and distinguish certificates. | |||
Introduction of logotypes into certificates provides the necessary | Introduction of logotypes into certificates provides the necessary | |||
graphic. | graphic. | |||
1.3. Combination of Verification Techniques | 1.3. Combination of Verification Techniques | |||
The use of logotypes will, in many cases, affect the users decision | The use of logotypes will, in many cases, affect the user's decision | |||
to trust and use a certificate. It is therefore important that there | to trust and use a certificate. It is therefore important that there | |||
be a distinct and clear architectural and functional distinction | be a distinct and clear architectural and functional distinction | |||
between the processes and objectives of the automated certificate | between the processes and objectives of the automated certificate | |||
verification and human recognition. | verification and human recognition. | |||
Since logotypes are only aimed for human interpretation and contain | Since logotypes are only aimed for human interpretation and contain | |||
data that is inappropriate for computer based verification schemes, | data that is inappropriate for computer-based verification schemes, | |||
the logotype extension MUST NOT be an active component in automated | the logotype certificate extension MUST NOT be an active component in | |||
certification path validation as specified in Section 6 of [RFC5280]. | automated certification path validation, as specified in Section 6 of | |||
[RFC5280]. | ||||
Automated certification path verification determines whether the end- | Automated certification path verification determines whether the end | |||
entity certificate can be verified according to defined policy. The | entity certificate can be verified according to defined policy. The | |||
algorithm for this verification is specified in [RFC5280]. | algorithm for this verification is specified in [RFC5280]. | |||
The automated processing provides assurance that the certificate is | The automated processing provides assurance that the certificate is | |||
valid. It does not indicate whether the subject is entitled to any | valid. It does not indicate whether the subject is entitled to any | |||
particular information, or whether the subject ought to be trusted to | particular information or whether the subject ought to be trusted to | |||
perform a particular service. These are authorization decisions. | perform a particular service. These are authorization decisions. | |||
Automatic processing will make some authorization decisions, but | Automatic processing will make some authorization decisions, but | |||
others, depending on the application context, involve the human user. | others, depending on the application context, involve the human user. | |||
In some situations, where automated procedures have failed to | In some situations, where automated procedures have failed to | |||
establish the suitability of the certificate to the task, the human | establish the suitability of the certificate to the task, the human | |||
user is the final arbitrator of the post certificate verification | user is the final arbitrator of the post certificate verification | |||
authorization decisions. In the end, the human will decide whether | authorization decisions. In the end, the human will decide whether | |||
or not to accept an executable email attachment, to release personal | or not to accept an executable email attachment, to release personal | |||
information, or follow the instructions displayed by a web browser. | information, or to follow the instructions displayed by a web | |||
This decision will often be based on recognition and previous | browser. This decision will often be based on recognition and | |||
experience. | previous experience. | |||
The distinction between systematic processing and human processing is | The distinction between systematic processing and human processing is | |||
rather straightforward. They can be complementary. While the | rather straightforward. They can be complementary. While the | |||
systematic process is focused on certification path construction and | systematic process is focused on certification path construction and | |||
verification, the human acceptance process is focused on recognition | verification, the human acceptance process is focused on recognition | |||
and related previous experience. | and related previous experience. | |||
There are some situations where systematic processing and human | There are some situations where systematic processing and human | |||
processing interfere with each other. These issues are discussed in | processing interfere with each other. These issues are discussed in | |||
the Section 9. | the Section 9. | |||
1.4. Terminology | 1.4. Requirements Language | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in BCP | |||
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
capitals, as shown here. | capitals, as shown here. | |||
2. Different Types of Logotypes in Certificates | 2. Different Types of Logotypes in Certificates | |||
This specification defines the inclusion of three standard logotype | This specification defines the inclusion of three standard logotype | |||
types: | types: | |||
* Community logotype | * community logotype | |||
* Issuer organization logotype | * issuer organization logotype | |||
* Subject organization logotype | * subject organization logotype | |||
The community logotype is the general mark for a community. It | The community logotype is the general mark for a community. It | |||
identifies a service concept for entity identification and | identifies a service concept for entity identification and | |||
certificate issuance. Many issuers may use a community logotype to | certificate issuance. Many issuers may use a community logotype to | |||
co-brand with a global community in order to gain global recognition | co-brand with a global community in order to gain global recognition | |||
of its local service provision. This type of community branding is | of its local service provision. This type of community branding is | |||
very common in the credit card business, where local independent card | very common in the credit card business, where local independent card | |||
issuers include a globally recognized brand (such as VISA and | issuers include a globally recognized brand (such as Visa and | |||
MasterCard). Certificate issuers may include more than one community | Mastercard). Certificate issuers may include more than one community | |||
logotype to indicate participation in more than one global community. | logotype to indicate participation in more than one global community. | |||
Issuer organization logotype is a logotype representing the | The issuer organization logotype is a logotype representing the | |||
organization identified as part of the issuer name in the | organization identified as part of the issuer name in the | |||
certificate. | certificate. | |||
Subject organization logotype is a logotype representing the | The subject organization logotype is a logotype representing the | |||
organization identified in the subject name in the certificate. | organization identified in the subject name in the certificate. | |||
In addition to the standard logotype types, this specification | In addition to the standard logotype types, this specification | |||
accommodates inclusion of other logotype types where each class of | accommodates inclusion of other logotype types where each class of | |||
logotype is defined by an object identifier. The object identifier | logotype is defined by an object identifier. The object identifier | |||
can be either locally defined or an identifier defined in Section 4.4 | can be either locally defined or an identifier defined in Section 4.4 | |||
of this document. | of this document. | |||
3. Logotype Data | 3. Logotype Data | |||
skipping to change at page 8, line 5 ¶ | skipping to change at line 326 ¶ | |||
different formats, sizes, and color palates, may represent each | different formats, sizes, and color palates, may represent each | |||
logotype image. At least one of the image objects representing a | logotype image. At least one of the image objects representing a | |||
logotype SHOULD contain an image with a width between 60 pixels and | logotype SHOULD contain an image with a width between 60 pixels and | |||
200 pixels and a height between 45 pixels and 150 pixels. | 200 pixels and a height between 45 pixels and 150 pixels. | |||
Several instances of audio data may further represent the same audio | Several instances of audio data may further represent the same audio | |||
sequence in different formats, resolutions, and languages. At least | sequence in different formats, resolutions, and languages. At least | |||
one of the audio objects representing a logotype SHOULD provide text- | one of the audio objects representing a logotype SHOULD provide text- | |||
based audio data suitable for processing by text-to-speech software. | based audio data suitable for processing by text-to-speech software. | |||
A typical use of text based audio data is inclusion in web | A typical use of text-based audio data is inclusion in web | |||
applications where the audio text is placed as the "alt" atttribute | applications where the audio text is placed as the "alt" attribute | |||
value of an HTML image (img) element and the language value obtained | value of an HTML image (img) element, and the language value obtained | |||
from LogotypeAudioInfo is included as the "lang" attribute of that | from LogotypeAudioInfo is included as the "lang" attribute of that | |||
image. | image. | |||
If a logotype of a certain type (as defined in Section 2) is | If a logotype of a certain type (as defined in Section 2) is | |||
represented by more than one image object, then each image object | represented by more than one image object, then each image object | |||
MUST contain variants of roughly the same visual content. Likewise, | MUST contain variants of roughly the same visual content. Likewise, | |||
if a logotype of a certain type is represented by more than one audio | if a logotype of a certain type is represented by more than one audio | |||
object, then the audio objects MUST contain variants of the same | object, then the audio objects MUST contain variants of the same | |||
audio information. A spoken message in different languages is | audio information. A spoken message in different languages is | |||
considered a variation of the same audio information. When more than | considered a variation of the same audio information. When more than | |||
skipping to change at page 8, line 36 ¶ | skipping to change at line 357 ¶ | |||
logotype types. For example, it may display one subject organization | logotype types. For example, it may display one subject organization | |||
logotype while also displaying a community logotype, but it MUST NOT | logotype while also displaying a community logotype, but it MUST NOT | |||
display multiple image variants of the same community logotype. | display multiple image variants of the same community logotype. | |||
Each logotype present in a certificate MUST be represented by at | Each logotype present in a certificate MUST be represented by at | |||
least one image data object. | least one image data object. | |||
Client applications SHOULD enhance processing and off-line | Client applications SHOULD enhance processing and off-line | |||
functionality by caching logotype data. | functionality by caching logotype data. | |||
4. Logotype Extension | 4. Logotype Certificate Extension | |||
This section specifies the syntax and semantics of the logotype | This section specifies the syntax and semantics of the logotype | |||
certificate extension. | certificate extension. | |||
4.1. Extension Format | 4.1. Extension Format | |||
The logotype extension MAY be included in public key certificates | The logotype certificate extension MAY be included in public key | |||
[RFC5280] or attribute certificates [RFC5755]. The logotype | certificates [RFC5280] or attribute certificates [RFC5755]. The | |||
extension MUST be identified by the following object identifier: | logotype certificate extension MUST be identified by the following | |||
object identifier: | ||||
id-pe-logotype OBJECT IDENTIFIER ::= | id-pe-logotype OBJECT IDENTIFIER ::= | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-pe(1) 12 } | security(5) mechanisms(5) pkix(7) id-pe(1) 12 } | |||
This extension MUST NOT be marked critical. | This extension MUST NOT be marked critical. | |||
Logotype data may be referenced through either direct or indirect | Logotype data may be referenced through either direct or indirect | |||
addressing. Client applications SHOULD support both direct and | addressing. Client applications SHOULD support both direct and | |||
indirect addressing. Certificate issuing applications MUST support | indirect addressing. Certificate issuing applications MUST support | |||
skipping to change at page 9, line 30 ¶ | skipping to change at line 400 ¶ | |||
external hashed data structure that contains information on the type, | external hashed data structure that contains information on the type, | |||
content, and location of each image and audio object. Indirect | content, and location of each image and audio object. Indirect | |||
addressing supports cases where each logotype is represented by many | addressing supports cases where each logotype is represented by many | |||
alternative audio or image objects. | alternative audio or image objects. | |||
Both direct and indirect addressing accommodate alternative URIs to | Both direct and indirect addressing accommodate alternative URIs to | |||
obtain exactly the same logotype data. This opportunity for | obtain exactly the same logotype data. This opportunity for | |||
replication is intended to improve availability. Therefore, if a | replication is intended to improve availability. Therefore, if a | |||
client is unable to fetch the item from one URI, the client SHOULD | client is unable to fetch the item from one URI, the client SHOULD | |||
try another URI in the sequence. All direct addressing URIs SHOULD | try another URI in the sequence. All direct addressing URIs SHOULD | |||
use the HTTPS scheme (https://...) or the HTTP scheme (http://...) or | use the HTTPS scheme (https://...), the HTTP scheme (http://...), or | |||
the DATA scheme (data://...) [RFC3986]. However, the "data" URI | the DATA scheme (data://...) [RFC3986]. However, the "data" URI | |||
scheme MUST NOT be used with the indirect addressing. Clients MUST | scheme MUST NOT be used with the indirect addressing. Clients MUST | |||
support retrieval of referenced LogoTypeData with the HTTP [RFC9110] | support retrieval of the referenced LogotypeData with HTTP [RFC9110], | |||
and the HTTP with TLS [RFC8446], or subsequent versions of these | HTTP with TLS [RFC8446], or subsequent versions of these protocols. | |||
protocols. Client applications SHOULD also support the "data" URI | Client applications SHOULD also support the "data" URI scheme | |||
scheme [RFC2397] for direct addressing with embedded logotype data | [RFC2397] for direct addressing with embedded logotype data within | |||
within the extension. | the extension. | |||
Note that the HTTPS scheme (https://...) requires the validation of | Note that the HTTPS scheme (https://...) requires the validation of | |||
other certificates to establish a secure connection. For this | other certificates to establish a secure connection. For this | |||
reason, the HTTP scheme (http://...) may be easier for a client to | reason, the HTTP scheme (http://...) may be easier for a client to | |||
handle. Also, the hash of the logotype data provides data integrity. | handle. Also, the hash of the logotype data provides data integrity. | |||
The logotype extension MUST have the following syntax: | The logotype certificate extension MUST have the following syntax: | |||
LogotypeExtn ::= SEQUENCE { | LogotypeExtn ::= SEQUENCE { | |||
communityLogos [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL, | communityLogos [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL, | |||
issuerLogo [1] EXPLICIT LogotypeInfo OPTIONAL, | issuerLogo [1] EXPLICIT LogotypeInfo OPTIONAL, | |||
subjectLogo [2] EXPLICIT LogotypeInfo OPTIONAL, | subjectLogo [2] EXPLICIT LogotypeInfo OPTIONAL, | |||
otherLogos [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo | otherLogos [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo | |||
OPTIONAL } | OPTIONAL } | |||
LogotypeInfo ::= CHOICE { | LogotypeInfo ::= CHOICE { | |||
direct [0] LogotypeData, | direct [0] LogotypeData, | |||
skipping to change at page 10, line 22 ¶ | skipping to change at line 440 ¶ | |||
LogotypeImage ::= SEQUENCE { | LogotypeImage ::= SEQUENCE { | |||
imageDetails LogotypeDetails, | imageDetails LogotypeDetails, | |||
imageInfo LogotypeImageInfo OPTIONAL } | imageInfo LogotypeImageInfo OPTIONAL } | |||
LogotypeAudio ::= SEQUENCE { | LogotypeAudio ::= SEQUENCE { | |||
audioDetails LogotypeDetails, | audioDetails LogotypeDetails, | |||
audioInfo LogotypeAudioInfo OPTIONAL } | audioInfo LogotypeAudioInfo OPTIONAL } | |||
LogotypeDetails ::= SEQUENCE { | LogotypeDetails ::= SEQUENCE { | |||
mediaType IA5String, -- MIME media type name and optional | mediaType IA5String, -- Media type name and optional | |||
-- parameters | -- parameters | |||
logotypeHash SEQUENCE SIZE (1..MAX) OF HashAlgAndValue, | logotypeHash SEQUENCE SIZE (1..MAX) OF HashAlgAndValue, | |||
logotypeURI SEQUENCE SIZE (1..MAX) OF IA5String } | logotypeURI SEQUENCE SIZE (1..MAX) OF IA5String } | |||
LogotypeImageInfo ::= SEQUENCE { | LogotypeImageInfo ::= SEQUENCE { | |||
type [0] LogotypeImageType DEFAULT color, | type [0] LogotypeImageType DEFAULT color, | |||
fileSize INTEGER, -- In octets, 0=unspecified | fileSize INTEGER, -- In octets, 0=unspecified | |||
xSize INTEGER, -- Horizontal size in pixels | xSize INTEGER, -- Horizontal size in pixels | |||
ySize INTEGER, -- Vertical size in pixels | ySize INTEGER, -- Vertical size in pixels | |||
resolution LogotypeImageResolution OPTIONAL, | resolution LogotypeImageResolution OPTIONAL, | |||
skipping to change at page 11, line 27 ¶ | skipping to change at line 493 ¶ | |||
the DER-encoded data with the syntax LogotypeData. | the DER-encoded data with the syntax LogotypeData. | |||
At least one of the optional elements in the LogotypeExtn structure | At least one of the optional elements in the LogotypeExtn structure | |||
MUST be present. | MUST be present. | |||
When using direct addressing, at least one of the optional elements | When using direct addressing, at least one of the optional elements | |||
in the LogotypeData structure MUST be present. | in the LogotypeData structure MUST be present. | |||
The LogotypeReference and LogotypeDetails structures explicitly | The LogotypeReference and LogotypeDetails structures explicitly | |||
identify one or more one-way hash functions employed to authenticate | identify one or more one-way hash functions employed to authenticate | |||
referenced image or audio objects. CAs MUST include a hash value for | referenced image or audio objects. Certification Authorities (CAs) | |||
each referenced object, calculated on the whole object. CAs MUST use | MUST include a hash value for each referenced object, calculated on | |||
the one-way hash function that is associated with the certificate | the whole object. CAs MUST use the one-way hash function that is | |||
signature to compute one hash value, and CAs MAY include other hash | associated with the certificate signature to compute one hash value, | |||
values. Clients MUST compute a one-way hash value using one of the | and CAs MAY include other hash values. Clients MUST compute a one- | |||
identified functions, and clients MUST discard the logotype data if | way hash value using one of the identified functions, and clients | |||
the computed hash value does not match the hash value in the | MUST discard the logotype data if the computed hash value does not | |||
certificate extension. | match the hash value in the certificate extension. | |||
A MIME type is used to specify the format of the image or audio | A media type is used to specify the format of the image or audio | |||
object containing the logotype data. The mediaType field MUST | object containing the logotype data. The mediaType field MUST | |||
contain a string that is constructed according to the ABNF [RFC5234] | contain a string that is constructed according to the ABNF [RFC5234] | |||
provided in Section 4.2 of [RFC6838]. MIME types MAY include | rule for media-type provided in Section 8.3.1 of [RFC9110]. Media | |||
parameters. | types MAY include parameters. To keep the mediaType field as small | |||
as possible, optional whitespace SHOULD NOT be included. | ||||
Image format requirements are specified in Section 7, and audio | Image format requirements are specified in Section 7, and audio | |||
format requirements are specified in Section 8. | format requirements are specified in Section 8. | |||
When language is specified, the language tag MUST use the [RFC5646] | When language is specified, the language tag MUST use the syntax in | |||
syntax. | [RFC5646]. | |||
Logotype types defined in this specification are: | The following logotype types are defined in this specification: | |||
Community Logotype: If communityLogos is present, the logotypes | * community logotype: If communityLogos is present, the logotypes | |||
MUST represent one or more communities with which the certificate | MUST represent one or more communities with which the certificate | |||
issuer is affiliated. The communityLogos MAY be present in an end | issuer is affiliated. The communityLogos MAY be present in an end | |||
entity certificate, a CA certificate, or an attribute certificate. | entity certificate, a CA certificate, or an attribute certificate. | |||
The communityLogos contains a sequence of Community Logotypes, | The communityLogos contains a sequence of community logotypes, | |||
each representing a different community. If more than one | each representing a different community. If more than one | |||
Community logotype is present, they MUST be placed in order of | community logotype is present, they MUST be placed in order of | |||
preferred appearance. Some clients MAY choose to display a subset | preferred appearance. Some clients MAY choose to display a subset | |||
of the present community logos; therefore the placement within the | of the present community logos; therefore, the placement within | |||
sequence aids the client selection. The most preferred logotype | the sequence aids the client selection. The most preferred | |||
MUST be first in the sequence, and the least preferred logotype | logotype MUST be first in the sequence, and the least preferred | |||
MUST be last in the sequence. | logotype MUST be last in the sequence. | |||
Issuer Organization Logotype: If issuerLogo is present, the | * issuer organization logotype: If issuerLogo is present, the | |||
logotype MUST represent the issuer's organization. The logotype | logotype MUST represent the issuer's organization. The logotype | |||
MUST be consistent with, and require the presence of, an | MUST be consistent with, and require the presence of, an | |||
organization name stored in the organization attribute in the | organization name stored in the organization attribute in the | |||
issuer field (for either a public key certificate or attribute | issuer field (for either a public key certificate or attribute | |||
certificate). The issuerLogo MAY be present in an end entity | certificate). The issuerLogo MAY be present in an end entity | |||
certificate, a CA certificate, or an attribute certificate. | certificate, a CA certificate, or an attribute certificate. | |||
Subject Organization Logotype: If subjectLogo is present, the | * subject organization logotype: If subjectLogo is present, the | |||
logotype MUST represent the subject's organization. The logotype | logotype MUST represent the subject's organization. The logotype | |||
MUST be consistent with, and require the presence of, an | MUST be consistent with, and require the presence of, an | |||
organization name stored in the organization attribute in the | organization name stored in the organization attribute in the | |||
subject field (for either a public key certificate or attribute | subject field (for either a public key certificate or attribute | |||
certificate). The subjectLogo MAY be present in an end entity | certificate). The subjectLogo MAY be present in an end entity | |||
certificate, a CA certificate, or an attribute certificate. | certificate, a CA certificate, or an attribute certificate. | |||
The relationship between the subject organization and the subject | The relationship between the subject organization and the subject | |||
organization logotype, and the relationship between the issuer and | organization logotype, and the relationship between the issuer and | |||
either the issuer organization logotype or the community logotype, | either the issuer organization logotype or the community logotype, | |||
are relationships asserted by the issuer. The policies and practices | are relationships asserted by the issuer. The policies and practices | |||
employed by the issuer to check subject organization logotypes or | employed by the issuer that check subject organization logotypes or | |||
claims its issuer and community logotypes is outside the scope of | claims about its issuer and community logotypes are outside the scope | |||
this document. | of this document. | |||
4.2. Conventions for LogotypeImageInfo | 4.2. Conventions for LogotypeImageInfo | |||
When the optional LogotypeImageInfo is included with a logotype | When the optional LogotypeImageInfo is included with a logotype | |||
image, the parameters MUST be used with the following semantics and | image, the parameters MUST be used with the following semantics and | |||
restrictions. | restrictions. | |||
The xSize and ySize fields represent the recommended display size for | The xSize and ySize fields represent the recommended display size for | |||
the logotype image. When a value of 0 (zero) is present, no | the logotype image. When a value of 0 (zero) is present, no | |||
recommended display size is specified. When non-zero values are | recommended display size is specified. When non-zero values are | |||
present and these values differ from corresponding size values in the | present and these values differ from corresponding size values in the | |||
referenced image object, then the referenced image SHOULD be scaled | referenced image object, then the referenced image SHOULD be scaled | |||
to fit within the size parameters of LogotypeImageInfo, while | to fit within the size parameters of LogotypeImageInfo while | |||
preserving the x and y ratio. Dithering may produce a more | preserving the x and y ratio. Dithering may produce a more | |||
appropriate image than linear scaling. | appropriate image than linear scaling. | |||
The resolution field is redundant for all logotype image formats | The resolution field is redundant for all logotype image formats | |||
listed in Section 7. The optional resolution field SHOULD be omitted | listed in Section 7. The optional resolution field SHOULD be omitted | |||
when the image format already contains this information. | when the image format already contains this information. | |||
4.3. Embedded Images | 4.3. Embedded Images | |||
If the logotype image is provided through direct addressing, then the | If the logotype image is provided through direct addressing, then the | |||
image MAY be stored within the logotype certificate extension using | image MAY be stored within the logotype certificate extension using | |||
the "data" scheme [RFC2397]. The syntax of the "data" URI scheme | the "data" scheme [RFC2397]. The syntax of the "data" URI scheme is | |||
defined is included here for convenience: | shown below, which incorporates Errata ID 2045 and uses modern ABNF | |||
[RFC5234]: | ||||
dataurl := "data:" [ mediatype ] [ ";base64" ] "," data | dataurl = "data:" [ media-type ] [ ";base64" ] "," data | |||
mediatype := [ type "/" subtype ] *( ";" parameter ) | data = *(reserved / unreserved / escaped) | |||
data := *urlchar | reserved = ";" / "/" / "?" / ":" / "@" / "&" / "=" / "+" / | |||
parameter := attribute "=" value | "$" / "," | |||
unreserved = alphanum / mark | ||||
alphanum = ALPHA / DIGIT | ||||
mark = "-" / "_" / "." / "!" / "~" / "*" / "'" / "(" / ")" | ||||
escaped = "%" hex hex | ||||
hex = HEXDIG / "a" / "b" / "c" / "d" / "e" / "f" | ||||
When including the image data in the logotype extension using the | where media-type is defined in Section 8.3.1 of [RFC9110] and ALPHA, | |||
"data" URI scheme, the following conventions apply: | DIGIT, and HEXDIG are defined in Appendix B.1 of [RFC5234]. | |||
When including the image data in the logotype certificate extension | ||||
using the "data" URI scheme, the following conventions apply: | ||||
* The value of mediaType in LogotypeDetails MUST be identical to the | * The value of mediaType in LogotypeDetails MUST be identical to the | |||
media type value in the "data" URL. | media type value in the "data" URL. | |||
* The hash of the image MUST be included in logotypeHash and MUST be | * The hash of the image MUST be included in logotypeHash and MUST be | |||
calculated over the same data as it would have been, had the image | calculated over the same data as it would have been if the image | |||
been referenced through a link to an external resource. | had been referenced through a link to an external resource. | |||
NOTE: As the "data" URI scheme is processed as a data source rather | ||||
than as a URL, the image data is typically not limited by any URL | ||||
length limit settings that otherwise apply to URLs in general. | ||||
NOTE: Implementations need to be cautious about the size of images | | NOTE: As the "data" URI scheme is processed as a data source | |||
included in a certificate in order to ensure that the size of the | | rather than as a URL, the image data is typically not limited | |||
certificate does not prevent the certificate from being used as | | by any URL length limit settings that otherwise apply to URLs | |||
intended. | | in general. | |||
| | ||||
| NOTE: Implementations need to be cautious about the size of | ||||
| images included in a certificate in order to ensure that the | ||||
| size of the certificate does not prevent the certificate from | ||||
| being used as intended. | ||||
4.4. Other Logotypes | 4.4. Other Logotypes | |||
Logotypes identified by otherLogos (as defined in Section 4.1) can be | Logotypes identified by otherLogos (as defined in Section 4.1) can be | |||
used to enhance the display of logotypes and marks that represent | used to enhance the display of logotypes and marks that represent | |||
partners, products, services, or any other characteristic associated | partners, products, services, or any other characteristic associated | |||
with the certificate or its intended application environment when the | with the certificate or its intended application environment when the | |||
standard logotype types are insufficient. | standard logotype types are insufficient. | |||
The conditions and contexts of the intended use of these logotypes | The conditions and contexts of the intended use of these logotypes | |||
are defined at the discretion of the local client application. | are defined at the discretion of the local client application. | |||
Three other logotype types are defined in the follow subsections. | Three other logotype types are defined in the follow subsections. | |||
4.4.1. Loyalty Logotype | 4.4.1. Loyalty Logotype | |||
When a loyalty logotype appears in the otherLogos, it MUST be | When a loyalty logotype appears in otherLogos, it MUST be identified | |||
identified by the id-logo-loyalty object identifier. | by the id-logo-loyalty object identifier. | |||
id-logo OBJECT IDENTIFIER ::= { id-pkix 20 } | id-logo OBJECT IDENTIFIER ::= { id-pkix 20 } | |||
id-logo-loyalty OBJECT IDENTIFIER ::= { id-logo 1 } | id-logo-loyalty OBJECT IDENTIFIER ::= { id-logo 1 } | |||
A loyalty logotype, if present, MUST contain a logotype associated | A loyalty logotype, if present, MUST contain a logotype associated | |||
with a loyalty program related to the certificate or its use. The | with a loyalty program related to the certificate or its use. The | |||
relation between the certificate and the identified loyalty program | relation between the certificate and the identified loyalty program | |||
is beyond the scope of this document. The logotype extension MAY | is beyond the scope of this document. The logotype certificate | |||
contain more than one Loyalty logotype. | extension MAY contain more than one loyalty logotype. | |||
If more than one loyalty logotype is present, they MUST be placed in | If more than one loyalty logotype is present, they MUST be placed in | |||
order of preferred appearance. Some clients MAY choose to display a | order of preferred appearance. Some clients MAY choose to display a | |||
subset of the present loyalty logotype data; therefore the placement | subset of the present loyalty logotype data; therefore, the placement | |||
within the sequence aids the client selection. The most preferred | within the sequence aids the client selection. The most preferred | |||
loyalty logotype data MUST be first in the sequence, and the least | loyalty logotype data MUST be first in the sequence, and the least | |||
preferred loyalty logotype data MUST be last in the sequence. | preferred loyalty logotype data MUST be last in the sequence. | |||
4.4.2. Certificate Background Logotype | 4.4.2. Certificate Background Logotype | |||
When a certificate background logotype appears in the otherLogos, it | When a certificate background logotype appears in otherLogos, it MUST | |||
MUST be identified by the id-logo-background object identifier. | be identified by the id-logo-background object identifier. | |||
id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 } | id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 } | |||
The certificate background logotype, if present, MUST contain a | The certificate background logotype, if present, MUST contain a | |||
graphical image intended as a background image for the certificate, | graphical image intended as a background image for the certificate | |||
and/or a general audio sequence for the certificate. The background | and/or a general audio sequence for the certificate. The background | |||
image MUST allow black text to be clearly read when placed on top of | image MUST allow black text to be clearly read when placed on top of | |||
the background image. The logotype extension MUST NOT contain more | the background image. The logotype certificate extension MUST NOT | |||
than one certificate background logotype. | contain more than one certificate background logotype. | |||
4.4.3. Certificate Image Logotype | 4.4.3. Certificate Image Logotype | |||
When a certificate image logotype appears in the otherLogos, it MUST | When a certificate image logotype appears in otherLogos, it MUST be | |||
be identified by the id-logo-certImage object identifier. | identified by the id-logo-certImage object identifier. | |||
id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 } | id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 } | |||
The certificate image logotype, if present, aids human interpretation | The certificate image logotype, if present, aids human interpretation | |||
of a certificate by providing meaningful visual information to the | of a certificate by providing meaningful visual information to the | |||
user interface (UI). The logotype extension MUST NOT contain more | user interface (UI). The logotype certificate extension MUST NOT | |||
than one certificate image logotype. | contain more than one certificate image logotype. | |||
Typical situations when a human needs to examine the visual | Typical situations when a human needs to examine the visual | |||
representation of a certificate are: | representation of a certificate are: | |||
* A person establishes a secured channel with an authenticated | * A person establishes a secured channel with an authenticated | |||
service. The person needs to determine the identity of the | service. The person needs to determine the identity of the | |||
service based on the authenticated credentials. | service based on the authenticated credentials. | |||
* A person validates the signature on critical information, such as | * A person validates the signature on critical information, such as | |||
signed executable code, and needs to determine the identity of the | signed executable code, and needs to determine the identity of the | |||
signer based on the signer's certificate. | signer based on the signer's certificate. | |||
* A person is required to select an appropriate certificate to be | * A person is required to select an appropriate certificate to be | |||
used when authenticating to a service or Identity Management | used when authenticating to a service or identity management | |||
infrastructure. The person needs to see the available | infrastructure. The person needs to see the available | |||
certificates in order to distinguish between them in the selection | certificates in order to distinguish between them in the selection | |||
process. | process. | |||
The display of certificate information to humans is challenging due | The display of certificate information to humans is challenging due | |||
to lack of well-defined semantics for critical identity attributes. | to lack of well-defined semantics for critical identity attributes. | |||
Unless the application has out-of-band knowledge about a particular | Unless the application has out-of-band knowledge about a particular | |||
certificate, the application will not know the exact nature of the | certificate, the application will not know the exact nature of the | |||
data stored in common identification attributes such as serialNumber, | data stored in common identification attributes, such as | |||
organizationName, country, etc. Consequently, the application can | serialNumber, organizationName, country, etc. Consequently, the | |||
display the actual data, but faces the problem of labeling that data | application can display the actual data but faces the problem of | |||
in the UI and informing the human about the exact nature (semantics) | labeling that data in the UI and informing the human about the exact | |||
of that data. It is also challenging for the application to | nature (semantics) of that data. It is also challenging for the | |||
determine which identification attributes are important to display | application to determine which identification attributes are | |||
and how to organize them in a logical order. | important to display and how to organize them in a logical order. | |||
When present, the certificate image MUST be a complete visual | When present, the certificate image MUST be a complete visual | |||
representation of the certificate. This means that the display of | representation of the certificate. This means that the display of | |||
this certificate image represents all information about the | this certificate image represents all information about the | |||
certificate that the issuer subjectively defines as relevant to show | certificate that the issuer subjectively defines as relevant to show | |||
to a typical human user within the typical intended use of the | to a typical human user within the typical intended use of the | |||
certificate, giving adequate information about at least the following | certificate, giving adequate information about at least the following | |||
three aspects of the certificate: | three aspects of the certificate: | |||
* Certificate Context | * certificate context | |||
* Certificate Issuer | * certificate issuer | |||
* Certificate Subject | * certificate subject | |||
Certificate Context information is visual marks and/or textual | Certificate context information is visual marks and/or textual | |||
information that helps the typical user to understand the typical | information that helps the typical user to understand the typical | |||
usage and/or purpose of the certificate. | usage and/or purpose of the certificate. | |||
It is up to the issuer to decide what information -- in the form of | It is up to the issuer to decide what information -- in the form of | |||
text, graphical symbols, and elements -- represents a complete visual | text, graphical symbols, and elements -- represents a complete visual | |||
representation of the certificate. However, the visual | representation of the certificate. However, the visual | |||
representation of Certificate Subject and Certificate Issuer | representation of certificate subject and certificate issuer | |||
information from the certificate MUST have the same meaning as the | information from the certificate MUST have the same meaning as the | |||
textual representation of that information in the certificate itself. | textual representation of that information in the certificate itself. | |||
Applications providing a Graphical User Interface (GUI) to the | Applications providing a Graphical User Interface (GUI) to the | |||
certificate user MAY present a certificate image as the only visual | certificate user MAY present a certificate image as the only visual | |||
representation of a certificate; however, the certificate user SHOULD | representation of a certificate; however, the certificate user SHOULD | |||
be able to easily obtain the details of the certificate content. | be able to easily obtain the details of the certificate content. | |||
5. Type of Certificates | 5. Type of Certificates | |||
Logotypes MAY be included in public key certificates and attribute | Logotypes MAY be included in public key certificates and attribute | |||
certificates at the discretion of the certificate issuer; however, | certificates at the discretion of the certificate issuer; however, | |||
the relying party MUST NOT use the logotypes as part of certification | the relying party MUST NOT use the logotypes as part of certification | |||
path validation or automated trust decision. The sole purpose of | path validation or automated trust decisions. The sole purpose of | |||
logotypes is to enhance the display of a particular certificate, | logotypes is to enhance the display of a particular certificate, | |||
regardless of its position in a certification path. | regardless of its position in a certification path. | |||
6. Use in Clients | 6. Use in Clients | |||
All PKI implementations require relying party software to have some | All PKI implementations require relying party software to have some | |||
mechanism to determine whether a trusted CA issues a particular | mechanism to determine whether a trusted CA issues a particular | |||
certificate. This is an issue for certification path validation, | certificate. This is an issue for certification path validation, | |||
including consistent policy and name checking. | including consistent policy and name checking. | |||
After a certification path is successfully validated, the replying | After a certification path is successfully validated, the replying | |||
party trusts the information that the CA includes in the certificate, | party trusts the information that the CA includes in the certificate, | |||
including any certificate extensions. The client software can choose | including any certificate extensions. The client software can choose | |||
to make use of such information, or the client software can ignore | to make use of such information, or the client software can ignore | |||
it. If the client is unable to support a provided logotype, the | it. If the client is unable to support a provided logotype, the | |||
client MUST NOT report an error, rather the client MUST behave as | client MUST NOT report an error; instead, the client MUST behave as | |||
though no logotype extension was included in the certificate. | though no logotype certificate extension was included in the | |||
Current standards do not provide any mechanism for cross-certifying | certificate. Current standards do not provide any mechanism for | |||
CAs to constrain subordinate CAs from including private extensions | cross-certifying CAs to constrain subordinate CAs from including | |||
(see Section 9). | private extensions (see Section 9). | |||
Consequently, if relying party software accepts a CA, then it should | Consequently, if relying party software accepts a CA, then it should | |||
be prepared to (unquestioningly) display the associated logotypes to | be prepared to (unquestioningly) display the associated logotypes to | |||
its human user, given that it is configured to do so. Information | its human user, given that it is configured to do so. Information | |||
about the logotypes is provided so that the replying party software | about the logotypes is provided so that the replying party software | |||
can select the one that will best meet the needs of the human user. | can select the one that will best meet the needs of the human user. | |||
This choice depends on the abilities of the human user, as well as | This choice depends on the abilities of the human user, as well as | |||
the capabilities of the platform on which the replaying party | the capabilities of the platform on which the replaying party | |||
software is running. If none of the provided logotypes meets the | software is running. If none of the provided logotypes meets the | |||
needs of the human user or matches the capabilities of the platform, | needs of the human user or matches the capabilities of the platform, | |||
then the logotypes can be ignored. | then the logotypes can be ignored. | |||
A client MAY, subject to local policy, choose to display none, one, | A client MAY, subject to local policy, choose to display none, one, | |||
or any number of the logotypes in the logotype extension. In many | or any number of the logotypes in the logotype certificate extension. | |||
cases, a client will be used in an environment with a good network | In many cases, a client will be used in an environment with a good | |||
connection and also used in an environment with little or no network | network connection and also used in an environment with little or no | |||
connectivity. For example, a laptop computer can be docked with a | network connectivity. For example, a laptop computer can be docked | |||
high-speed LAN connection, or it can be disconnected from the network | with a high-speed LAN connection, or it can be disconnected from the | |||
altogether. In recognition of this situation, the client MUST | network altogether. In recognition of this situation, the client | |||
include the ability to disable the fetching of logotypes. However, | MUST include the ability to disable the fetching of logotypes. | |||
locally cached logotypes can still be displayed when the user | However, locally cached logotypes can still be displayed when the | |||
disables the fetching of additional logotypes. | user disables the fetching of additional logotypes. | |||
A client MAY, subject to local policy, choose any combination of | A client MAY, subject to local policy, choose any combination of | |||
audio and image presentation for each logotype. That is, the client | audio and image presentation for each logotype. That is, the client | |||
MAY display an image with or without playing a sound, and it MAY play | MAY display an image with or without playing a sound, and it MAY play | |||
a sound with or without displaying an image. A client MUST NOT play | a sound with or without displaying an image. A client MUST NOT play | |||
more than one logotype audio sequence at the same time. | more than one logotype audio sequence at the same time. | |||
The logotype is to be displayed in conjunction with other identity | The logotype is to be displayed in conjunction with other identity | |||
information contained in the certificate. The logotype is not a | information contained in the certificate. The logotype is not a | |||
replacement for this identity information. | replacement for this identity information. | |||
skipping to change at page 18, line 5 ¶ | skipping to change at line 807 ¶ | |||
other audio streams are being played. | other audio streams are being played. | |||
If the relying party software is unable to successfully validate a | If the relying party software is unable to successfully validate a | |||
particular certificate, then it MUST NOT display any logotype data | particular certificate, then it MUST NOT display any logotype data | |||
associated with that certificate. | associated with that certificate. | |||
7. Image Formats | 7. Image Formats | |||
Animated images SHOULD NOT be used. | Animated images SHOULD NOT be used. | |||
The following table lists many common image formats and the | The following table lists common image formats and the corresponding | |||
corresponding MIME type. The table also indicates the support | media type. The table also indicates the support requirements for | |||
requirements for these image formats. The filename extensions | these image formats. The file name extensions commonly used for each | |||
commonly used for each of these formats is also provided. | of these formats is also provided. Implementations MAY support other | |||
Implementations MAY support other image formats. | image formats. | |||
+========+==============+===========+============+============+ | +========+==============+===========+============+============+ | |||
| Format | MIME Type | Extension | References | Implement? | | | Format | Media Type | Extension | References | Implement? | | |||
+========+==============+===========+============+============+ | +========+==============+===========+============+============+ | |||
| JPEG | image/jpeg | .jpg | [JPEG] | MUST | | | JPEG | image/jpeg | .jpg | [JPEG] | MUST | | |||
| | | .jpeg | [RFC2046] | support | | | | | .jpeg | [RFC2046] | support | | |||
+--------+--------------+-----------+------------+------------+ | +--------+--------------+-----------+------------+------------+ | |||
| GIF | image/gif | .gif | [GIF] | MUST | | | GIF | image/gif | .gif | [GIF] | MUST | | |||
| | | | [RFC2046] | support | | | | | | [RFC2046] | support | | |||
+--------+--------------+-----------+------------+------------+ | +--------+--------------+-----------+------------+------------+ | |||
| SVG | image/ | .svg | [SVGT] | SHOULD | | | SVG | image/ | .svg | [SVGT] | SHOULD | | |||
| | svg+xml | | [SVGR] | support | | | | svg+xml | | [SVGR] | support | | |||
+--------+--------------+-----------+------------+------------+ | +--------+--------------+-----------+------------+------------+ | |||
skipping to change at page 18, line 36 ¶ | skipping to change at line 838 ¶ | |||
| PNG | image/png | .png | [ISO15948] | SHOULD | | | PNG | image/png | .png | [ISO15948] | SHOULD | | |||
| | | | [PNGR] | support | | | | | | [PNGR] | support | | |||
+--------+--------------+-----------+------------+------------+ | +--------+--------------+-----------+------------+------------+ | |||
| PDF | application/ | .pdf | [ISO32000] | MAY | | | PDF | application/ | .pdf | [ISO32000] | MAY | | |||
| | pdf | | [ISO19005] | support | | | | pdf | | [ISO19005] | support | | |||
| | | | [RFC8118] | | | | | | | [RFC8118] | | | |||
+--------+--------------+-----------+------------+------------+ | +--------+--------------+-----------+------------+------------+ | |||
Table 1: Image Formats | Table 1: Image Formats | |||
NOTE: The image/svg+xml-compressed media type is widely implemented, | | NOTE: The image/svg+xml-compressed media type is widely | |||
but it has not yet been registered with IANA. | | implemented, but it has not yet been registered with IANA. | |||
When a Scalable Vector Graphics (SVG) image is used, whether the | When a Scalable Vector Graphics (SVG) image is used, whether the | |||
image is compressed or not, the SVG Tiny profile [SVGT] MUST be | image is compressed or not, the SVG Tiny profile [SVGT] MUST be | |||
followed, with these additional restrictions: | followed, with these additional restrictions: | |||
* The SVG image MUST NOT contain any Internationalized Resource | * The SVG image MUST NOT contain any Internationalized Resource | |||
Identifier (IRI) references to information stored outside of the | Identifier (IRI) references to information stored outside of the | |||
SVG image of type B, C, or D, according to Section 14.1.4 of | SVG image of type B, C, or D, according to Section 14.1.4 of | |||
[SVGT]. | [SVGT]. | |||
* The SVG image MUST NOT contain any 'script' element, according to | * The SVG image MUST NOT contain any script element, according to | |||
Section 15.2 of [SVGT]. | Section 15.2 of [SVGT]. | |||
* The XML structure in the SVG file MUST use linefeed (0x0A) as the | * The XML structure in the SVG file MUST use linefeed (0x0A) as the | |||
end-of-line (EOL) character when calculating a hash over the SVG | end-of-line (EOL) character when calculating a hash over the SVG | |||
image. | image. | |||
When a GZIP-compressed SVG image is fetched with HTTP, the client | When a GZIP-compressed SVG image is fetched with HTTP, the client | |||
will receive a response that includes these headers: | will receive a response that includes these headers: | |||
Content-Type: image/svg+xml | Content-Type: image/svg+xml | |||
Content-Encoding: gzip | Content-Encoding: gzip | |||
In this case, the octet stream of type image/svg+xml is compressed | In this case, the octet stream of type image/svg+xml is compressed | |||
with GZIP [RFC1952] as specified in [SVGR]. | with GZIP [RFC1952], as specified in [SVGR]. | |||
When an uncompressed SVG image is fetched with HTTP, the client will | When an uncompressed SVG image is fetched with HTTP, the client will | |||
receive a response with the same Content-Type header, but no Content- | receive a response with the same Content-Type header but no Content- | |||
Encoding header. | Encoding header. | |||
Whether the SVG image is GZIP-compressed or uncompressed, the hash | Whether the SVG image is GZIP-compressed or uncompressed, the hash | |||
value for the SVG image is calculated over the uncompressed SVG | value for the SVG image is calculated over the uncompressed SVG | |||
content with canonicalized EOL characters as specified above. | content with canonicalized EOL characters, as specified above. | |||
When an SVG image is embedded in the certificate extension using the | When an SVG image is embedded in the certificate extension using the | |||
"data" URL scheme, the SVG image data MUST be provided in GZIP- | "data" URL scheme, the SVG image data MUST be provided in GZIP- | |||
compressed form, and the XML structure, prior to compression, SHOULD | compressed form, and the XML structure, prior to compression, SHOULD | |||
use linefeed (0x0A) as the end-of-line (EOL) character. | use linefeed (0x0A) as the end-of-line (EOL) character. | |||
When a bitmap image is used, the PNG [ISO15948] format SHOULD be | When a bitmap image is used, the PNG [ISO15948] format SHOULD be | |||
used. | used. | |||
When a Portable Document Format (PDF) document according to | According to [ISO32000], when a Portable Document Format (PDF) | |||
[ISO32000] is used, it MUST also be formatted according to the | document is used, it MUST also be formatted according to the profile | |||
profile PDF/A [ISO19005]. | PDF/A [ISO19005]. | |||
8. Audio Formats | 8. Audio Formats | |||
Implementations that support audio MUST support the MP3 audio format | Implementations that support audio MUST support the MP3 audio format | |||
[MP3] with a MIME type of "audio/mpeg" [RFC3003]. Implementations | [MP3] with a media type of "audio/mpeg" [RFC3003]. Implementations | |||
SHOULD support text-based audio data with a MIME type of "text/ | SHOULD support text-based audio data with a media type of "text/ | |||
plain;charset=UTF-8". Implementations MAY support other audio | plain;charset=UTF-8". Implementations MAY support other audio | |||
formats. | formats. | |||
Text-based audio data using the MIME type of "text/plain;charset=UTF- | Text-based audio data using the media type of "text/ | |||
8" is intended to be used by text-to-speech software. When this | plain;charset=UTF-8" is intended to be used by text-to-speech | |||
audio type is used, the following requirements apply: | software. When this audio type is used, the following requirements | |||
apply: | ||||
* LogotypeAudioInfo MUST be present and specify the language of the | * LogotypeAudioInfo MUST be present and specify the language of the | |||
text. | text. | |||
* The fileSize, playTime, and channels elements of LogotypeAudioInfo | * The fileSize, playTime, and channels elements of LogotypeAudioInfo | |||
MUST have the value of 0. | MUST have the value of 0. | |||
* The sampleRate element of LogotypeAudioInfo MUST be absent. | * The sampleRate element of LogotypeAudioInfo MUST be absent. | |||
9. Security Considerations | 9. Security Considerations | |||
Implementations that simultaneously display multiple logotype types | Implementations that simultaneously display multiple logotype types | |||
(subject organization, issuer, community, or other), MUST ensure that | (subject organization, issuer organization, community, or other) MUST | |||
there is no ambiguity as to the binding between the image and the | ensure that there is no ambiguity as to the binding between the image | |||
type of logotype that the image represents. "Logotype type" is | and the type of logotype that the image represents. "Logotype type" | |||
defined in Section 1.1, and it refers to the type of entity or | is defined in Section 1.1, and it refers to the type of entity or | |||
affiliation represented by the logotype, not the of binary format of | affiliation represented by the logotype, not the of binary format of | |||
the image or audio. | the image or audio. | |||
Logotypes are very difficult to securely and accurately define. | Logotypes are very difficult to securely and accurately define. | |||
Names are also difficult in this regard, but logotypes are even | Names are also difficult in this regard, but logotypes are even | |||
worse. It is quite difficult to specify what is, and what is not, a | worse. It is quite difficult to specify what is, and what is not, a | |||
legitimate logotype of an organization. There is an entire legal | legitimate logotype of an organization. There is an entire legal | |||
structure around this issue, and it will not be repeated here. | structure around this issue, and it will not be repeated here. | |||
However, issuers should be aware of the implications of including | However, issuers should be aware of the implications of including | |||
images associated with a trademark or servicemark before doing so. | images associated with a trademark or servicemark before doing so. | |||
skipping to change at page 21, line 5 ¶ | skipping to change at line 948 ¶ | |||
dishonest or badly performing issuers, containing names and logotypes | dishonest or badly performing issuers, containing names and logotypes | |||
that the issuer has no claim to or has failed to check correctly. | that the issuer has no claim to or has failed to check correctly. | |||
Such certificates could be created in an attempt to socially engineer | Such certificates could be created in an attempt to socially engineer | |||
a user into accepting a certificate. The premise used for the | a user into accepting a certificate. The premise used for the | |||
logotype work is thus that logotype graphics in a certificate are | logotype work is thus that logotype graphics in a certificate are | |||
trusted only if the certificate is successfully validated within a | trusted only if the certificate is successfully validated within a | |||
valid path. It is thus imperative that the representation of any | valid path. It is thus imperative that the representation of any | |||
certificate that fails to validate is not enhanced in any way by | certificate that fails to validate is not enhanced in any way by | |||
using the logotype data. | using the logotype data. | |||
This underlines the necessity for CAs to provide reliable services, | This underlines the necessity for CAs to provide reliable services | |||
and the relying party's responsibility and need to carefully select | and the relying party's responsibility and need to carefully select | |||
which CAs are trusted to provide public key certificates. | which CAs are trusted to provide public key certificates. | |||
This also underlines the general necessity for relying parties to use | This also underlines the general necessity for relying parties to use | |||
up-to-date software libraries to render or dereference data from | up-to-date software libraries to render or dereference data from | |||
external sources, including logotype data in certificates, to | external sources, including logotype data in certificates, to | |||
minimize risks related to processing potentially malicious data | minimize risks related to processing potentially malicious data | |||
before it has been adequately verified and validated. Implementers | before it has been adequately verified and validated. Implementers | |||
should review the guidance in Section 7 of [RFC3986]. | should review the guidance in Section 7 of [RFC3986]. | |||
Referenced image objects are hashed in order to bind the image to the | Referenced image objects are hashed in order to bind the image to the | |||
signature of the certificate. Some image types, such as SVG, allow | signature of the certificate. Some image types, such as SVG, allow | |||
part of the image to be collected from an external source by | part of the image to be collected from an external source by | |||
incorporating a reference to an external file that contains the | incorporating a reference to an external file that contains the | |||
image. If this feature were used within a logotype image, the hash | image. If this feature were used within a logotype image, the hash | |||
of the image would only cover the URI reference to the external image | of the image would only cover the URI reference to the external image | |||
file, but not the referenced image data. Clients SHOULD verify that | file but not the referenced image data. Clients SHOULD verify that | |||
SVG images meet all requirements listed in Section 7 and reject | SVG images meet all requirements listed in Section 7 and reject | |||
images that contain references to external data. | images that contain references to external data. | |||
CAs issuing certificates with embedded logotype images should be | CAs issuing certificates with embedded logotype images should be | |||
cautious when accepting graphics from the certificate requestor for | cautious when accepting graphics from the certificate requester for | |||
inclusion in the certificate if the hash algorithm used to sign the | inclusion in the certificate if the hash algorithm used to sign the | |||
certificate is vulnerable to collision attacks such as [RFC6151]. In | certificate is vulnerable to collision attacks, as described in | |||
such a case, the accepted image may contain data that could help an | [RFC6151]. In such a case, the accepted image may contain data that | |||
attacker to obtain colliding certificates with identical certificate | could help an attacker to obtain colliding certificates with | |||
signatures. | identical certificate signatures. | |||
Certification paths may also impose name constraints that are | Certification paths may also impose name constraints that are | |||
systematically checked during certification path processing, which, | systematically checked during certification path processing, which, | |||
in theory, may be circumvented by logotypes. | in theory, may be circumvented by logotypes. | |||
Certificate path processing as defined in [RFC5280] does not | Certificate path processing, as defined in [RFC5280], does not | |||
constrain the inclusion of logotype data in certificates. A parent | constrain the inclusion of logotype data in certificates. A parent | |||
CA can constrain certification path validation such that subordinate | CA can constrain certification path validation such that subordinate | |||
CAs cannot issue valid certificates to end-entities outside a limited | CAs cannot issue valid certificates to end entities outside a limited | |||
name space or outside specific certificate polices. A malicious CA | name space or outside specific certificate policies. A malicious CA | |||
can comply with these name and policy requirements and still include | can comply with these name and policy requirements and still include | |||
inappropriate logotypes in the certificates that it issues. These | inappropriate logotypes in the certificates that it issues. These | |||
certificates will pass the certification path validation algorithm, | certificates will pass the certification path validation algorithm, | |||
which means the client will trust the logotypes in the certificates. | which means the client will trust the logotypes in the certificates. | |||
Since there is no technical mechanism to prevent or control | Since there is no technical mechanism to prevent or control | |||
subordinate CAs from including the logotype extension or its | subordinate CAs from including the logotype certificate extension or | |||
contents, where appropriate, a parent CA could employ a legal | its contents, where appropriate, a parent CA could employ a legal | |||
agreement to impose a suitable restriction on the subordinate CA. | agreement to impose a suitable restriction on the subordinate CA. | |||
This situation is not unique to the logotype extension. | This situation is not unique to the logotype certificate extension. | |||
When a relying party fetches remote logotype data, a mismatch between | When a relying party fetches remote logotype data, a mismatch between | |||
the media type provided in the mediaType field of the LogotypeDetails | the media type provided in the mediaType field of the LogotypeDetails | |||
and the Content-Type HTTP header of the retrieved object MUST be | and the Content-Type HTTP header of the retrieved object MUST be | |||
treated as a failure and the fetched logotype data should not be | treated as a failure, and the fetched logotype data should not be | |||
presented to the user. However, if more than one location for the | presented to the user. However, if more than one location for the | |||
remote logotype data is provided in the certificate extension, the | remote logotype data is provided in the certificate extension, the | |||
relying party MAY try to fetch the remote logotype data from an | relying party MAY try to fetch the remote logotype data from an | |||
alternate location to resolve the failure. | alternate location to resolve the failure. | |||
When a subscriber requests the inclusion of remote logotype data in a | When a subscriber requests the inclusion of remote logotype data in a | |||
certificate, the CA cannot be sure that any logotype data will be | certificate, the CA cannot be sure that any logotype data will be | |||
available at the provided URI for the entire validity period of the | available at the provided URI for the entire validity period of the | |||
certificate. To mitigate this concern, the CA may provide the | certificate. To mitigate this concern, the CA may provide the | |||
logotype data from a server under its control, rather than a | logotype data from a server under its control, rather than a | |||
skipping to change at page 23, line 31 ¶ | skipping to change at line 1068 ¶ | |||
Similarly, when fetching logotype data from a server, the server | Similarly, when fetching logotype data from a server, the server | |||
operator can determine which clients are making use of certificates | operator can determine which clients are making use of certificates | |||
that contain particular logotype data. As above, locally caching | that contain particular logotype data. As above, locally caching | |||
logotype data will eliminate the need to fetch the logotype data each | logotype data will eliminate the need to fetch the logotype data each | |||
time the certificate is used, and lack of caching would reveal usage | time the certificate is used, and lack of caching would reveal usage | |||
frequency. Even when implementations cache logotype data, regardless | frequency. Even when implementations cache logotype data, regardless | |||
of whether direct or indirect addressing is employed, the server | of whether direct or indirect addressing is employed, the server | |||
operator could observe when logotype data is fetched for the first | operator could observe when logotype data is fetched for the first | |||
time. | time. | |||
In addition, the use of an encrypted DNS mechanism, such as DoT | In addition, the use of an encrypted DNS mechanism, such as DNS over | |||
[RFC7858] or DoH [RFC9230], hides the name resolution traffic | TLS (DoT) [RFC7858] or DNS over HTTPS (DoH) [RFC9230], hides the name | |||
associated fetching remote logotype objects from third parties. | resolution traffic, which is usually a first step in fetching remote | |||
logotype objects. | ||||
When the "data" URI scheme is used with direct addressing, there is | When the "data" URI scheme is used with direct addressing, there is | |||
no network traffic to fetch logotype data, which avoids the | no network traffic to fetch logotype data, which avoids the | |||
observations of network traffic or server operations described above. | observations of network traffic or server operations described above. | |||
To obtain this benefit, the certificate will be larger than one that | To obtain this benefit, the certificate will be larger than one that | |||
contains a URL. Due to the improved privacy posture, the "data" URI | contains a URL. Due to the improved privacy posture, the "data" URI | |||
scheme with direct addressing will be the only one that is supported | scheme with direct addressing will be the only one that is supported | |||
by some CAs. Privacy-aware certificate subscribers MAY wish to | by some CAs. Privacy-aware certificate subscribers MAY wish to | |||
insist that logotype data is embedded in the certificate with the | insist that logotype data is embedded in the certificate with the | |||
"data" URI scheme with direct addressing. | "data" URI scheme with direct addressing. | |||
skipping to change at page 24, line 23 ¶ | skipping to change at line 1101 ¶ | |||
certificate extension. | certificate extension. | |||
When the "data" URI scheme is used, the relying party MAY add the | When the "data" URI scheme is used, the relying party MAY add the | |||
embedded logotype data to the local cache, which could avoid the need | embedded logotype data to the local cache, which could avoid the need | |||
to fetch the logotype data if it is referenced by a URL in another | to fetch the logotype data if it is referenced by a URL in another | |||
certificate. | certificate. | |||
When fetching remote logotype data, relying parties should use the | When fetching remote logotype data, relying parties should use the | |||
most privacy-preserving options that are available to minimize the | most privacy-preserving options that are available to minimize the | |||
opportunities for servers to "fingerprint" clients. For example, | opportunities for servers to "fingerprint" clients. For example, | |||
avoid cookies, e-tags, and client certificates. | avoid cookies, ETags, and client certificates. | |||
When a relying party encounters a new certificate, the lack of | When a relying party encounters a new certificate, the lack of | |||
network traffic to fetch logotype data might indicate that a | network traffic to fetch logotype data might indicate that a | |||
certificate with references to the same logotype data has been | certificate with references to the same logotype data has been | |||
previously processed and cached. | previously processed and cached. | |||
TLS 1.3 [RFC8446] includes the ability to encrypt the server's | TLS 1.3 [RFC8446] includes the ability to encrypt the server's | |||
certificate in the TLS handshake, which helps hide the server's | certificate in the TLS handshake, which helps hide the server's | |||
identity from anyone that is watching activity on the network. If | identity from anyone that is watching activity on the network. If | |||
the server's certificate includes remote logotype data, the client | the server's certificate includes remote logotype data, the client | |||
fetching that data might disclose the otherwise protected server | fetching that data might disclose the otherwise protected server | |||
identity. | identity. | |||
11. IANA Considerations | 11. IANA Considerations | |||
For the new ASN.1 Module in Appendix A.2, IANA is requested to assign | For the new ASN.1 module in Appendix A.2, IANA has assigned the | |||
an object identifier (OID) for the module identifier. The OID for | following OID in the "SMI Security for PKIX Module Identifier" | |||
the module should be allocated in the "SMI Security for PKIX Module | registry (1.3.6.1.5.5.7.0): | |||
Identifier" registry (1.3.6.1.5.5.7.0). | ||||
For the existing entries in the Structure of Management Information | +=========+======================+============+ | |||
(SMI) Numbers registry that refer to RFC 3709 or RFC 6170, IANA is | | Decimal | Description | References | | |||
requested update the entries to refer to this document. These | +=========+======================+============+ | |||
entries are: | | 107 | id-mod-logotype-2022 | RFC 9399 | | |||
+---------+----------------------+------------+ | ||||
1.3.6.1.5.5.7.0.22 id-mod-logotype | Table 2 | |||
1.3.6.1.5.5.7.0.68 id-mod-logotype-certimage | ||||
1.3.6.1.5.5.7.1.12 id-pe-logotype | ||||
1.3.6.1.5.5.7.20.1 id-logo-loyalty | ||||
1.3.6.1.5.5.7.20.2 id-logo-background | ||||
1.3.6.1.5.5.7.20.3 id-logo-certImage | ||||
12. Acknowledgments | IANA has updated the entries in the "Structure of Management | |||
Information (SMI) Numbers" registry that referred to [RFC3709] or | ||||
[RFC6170] to refer to this document. These entries are noted in the | ||||
tables below. | ||||
12.1. Acknowledgments from RFC 3709 | From the "SMI Security for PKIX Module Identifier" registry | |||
(1.3.6.1.5.5.7.0): | ||||
This document is the result of contributions from many professionals. | +=========+===========================+============+ | |||
The authors appreciate contributions from all members of the IETF | | Decimal | Description | References | | |||
PKIX Working Group. We extend a special thanks to Al Arsenault, | +=========+===========================+============+ | |||
David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex Deacon, | | 22 | id-mod-logotype | RFC 9399 | | |||
Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan Hurst, | +---------+---------------------------+------------+ | |||
and Phil Griffin for their efforts and support. | | 68 | id-mod-logotype-certimage | RFC 9399 | | |||
+---------+---------------------------+------------+ | ||||
Russ Housley thanks the management at RSA Laboratories, especially | Table 3 | |||
Burt Kaliski, who supported the development of this specification. | ||||
The vast majority of the work on this specification was done while | ||||
Russ was employed at RSA Laboratories. | ||||
12.2. Acknowledgments from RFC 6170 | From the "SMI Security for PKIX Certificate Extension" registry | |||
(1.3.6.1.5.5.7.1): | ||||
The authors recognize valuable contributions from members of the PKIX | +=========+================+============+ | |||
working group, the CA Browser Forum, and James Manger, for their | | Decimal | Description | References | | |||
review and sample data. | +=========+================+============+ | |||
| 12 | id-pe-logotype | RFC 9399 | | ||||
+---------+----------------+------------+ | ||||
12.3. Additional Acknowledgments | Table 4 | |||
Combining RFC 3709 and RFC 6170 has produced an improved | From the "SMI Security for PKIX Other Logotype Identifiers" registry | |||
specification. The authors appreciate contributions from all members | (1.3.6.1.5.5.7.20): | |||
of the IETF LAMPS Working Group. We extend a special thanks to | ||||
Alexey Melnikov for his guidance on media types. We extend a special | ||||
thanks to Tim Geiser for his careful checking of the new examples in | ||||
Appendix B.4 and B.5. We extend a special thanks to Corey Bonnell, | ||||
Daniel Kahn Gillmor, Roman Danyliw, Paul Wouters, Paul Kyzivat, | ||||
Shuping Peng, Sheng Jiang, Rob Wilton, Eric Vyncke, Donald Eastlake, | ||||
and Dan Harkins for their careful review and helpful comments. | ||||
13. References | +=========+====================+============+ | |||
| Decimal | Description | References | | ||||
+=========+====================+============+ | ||||
| 1 | id-logo-loyalty | RFC 9399 | | ||||
+---------+--------------------+------------+ | ||||
| 2 | id-logo-background | RFC 9399 | | ||||
+---------+--------------------+------------+ | ||||
| 3 | id-logo-certImage | RFC 9399 | | ||||
+---------+--------------------+------------+ | ||||
13.1. Normative References | Table 5 | |||
12. References | ||||
12.1. Normative References | ||||
[GIF] CompuServe Incorporated, "Graphics Interchange Format", | [GIF] CompuServe Incorporated, "Graphics Interchange Format", | |||
Version 89a, 31 July 1990, | Version 89a, July 1990, | |||
<https://www.w3.org/Graphics/GIF/spec-gif89a.txt>. | <https://www.w3.org/Graphics/GIF/spec-gif89a.txt>. | |||
[ISO15948] ISO/IEC, "Information technology -- Computer graphics and | [ISO15948] ISO/IEC, "Information technology -- Computer graphics and | |||
image processing -- Portable Network Graphics (PNG): | image processing -- Portable Network Graphics (PNG): | |||
Functional specification", ISO/IEC 15948:2004, 2004. | Functional specification", ISO/IEC 15948:2004, March 2004. | |||
[JPEG] ITU-T, "Information technology -- Digital compression and | [JPEG] ITU-T, "Information technology -- Digital compression and | |||
coding of continuous-tone still images: JPEG File | coding of continuous-tone still images: JPEG File | |||
Interchange Format (JFIF)", ITU-T Recommendation T.871, | Interchange Format (JFIF)", ITU-T Recommendation T.871, | |||
ISO/IEC 10918-5:2013, May 2011. | ISO/IEC 10918-5:2013, May 2013. | |||
[MP3] ISO/IEC, "Information technology -- Generic coding of | [MP3] ISO/IEC, "Information technology -- Generic coding of | |||
moving pictures and associated audio information -- Part | moving pictures and associated audio information -- Part | |||
3: Audio", ISO/IEC 13818-3:1998, 1998. | 3: Audio", ISO/IEC 13818-3:1998, April 1998. | |||
[NEW-ASN1] ITU-T, "Information technology -- Abstract Syntax Notation | [NEW-ASN1] ITU-T, "Information technology -- Abstract Syntax Notation | |||
One (ASN.1): Specification of basic notation", ITU-T | One (ASN.1): Specification of basic notation", ITU-T | |||
Recommendation X.680, ISO/IEC 8824-1:2021, February 2021, | Recommendation X.680, ISO/IEC 8824-1:2021, February 2021, | |||
<https://www.itu.int/rec/T-REC-X.680>. | <https://www.itu.int/rec/T-REC-X.680>. | |||
[RFC1952] Deutsch, P., "GZIP file format specification version 4.3", | [RFC1952] Deutsch, P., "GZIP file format specification version 4.3", | |||
RFC 1952, DOI 10.17487/RFC1952, May 1996, | RFC 1952, DOI 10.17487/RFC1952, May 1996, | |||
<https://www.rfc-editor.org/info/rfc1952>. | <https://www.rfc-editor.org/info/rfc1952>. | |||
skipping to change at page 27, line 25 ¶ | skipping to change at line 1246 ¶ | |||
[RFC5646] Phillips, A., Ed. and M. Davis, Ed., "Tags for Identifying | [RFC5646] Phillips, A., Ed. and M. Davis, Ed., "Tags for Identifying | |||
Languages", BCP 47, RFC 5646, DOI 10.17487/RFC5646, | Languages", BCP 47, RFC 5646, DOI 10.17487/RFC5646, | |||
September 2009, <https://www.rfc-editor.org/info/rfc5646>. | September 2009, <https://www.rfc-editor.org/info/rfc5646>. | |||
[RFC5755] Farrell, S., Housley, R., and S. Turner, "An Internet | [RFC5755] Farrell, S., Housley, R., and S. Turner, "An Internet | |||
Attribute Certificate Profile for Authorization", | Attribute Certificate Profile for Authorization", | |||
RFC 5755, DOI 10.17487/RFC5755, January 2010, | RFC 5755, DOI 10.17487/RFC5755, January 2010, | |||
<https://www.rfc-editor.org/info/rfc5755>. | <https://www.rfc-editor.org/info/rfc5755>. | |||
[RFC6838] Freed, N., Klensin, J., and T. Hansen, "Media Type | ||||
Specifications and Registration Procedures", BCP 13, | ||||
RFC 6838, DOI 10.17487/RFC6838, January 2013, | ||||
<https://www.rfc-editor.org/info/rfc6838>. | ||||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | |||
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | |||
<https://www.rfc-editor.org/info/rfc8446>. | <https://www.rfc-editor.org/info/rfc8446>. | |||
[RFC9110] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, | [RFC9110] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke, | |||
Ed., "HTTP Semantics", STD 97, RFC 9110, | Ed., "HTTP Semantics", STD 97, RFC 9110, | |||
DOI 10.17487/RFC9110, June 2022, | DOI 10.17487/RFC9110, June 2022, | |||
<https://www.rfc-editor.org/info/rfc9110>. | <https://www.rfc-editor.org/info/rfc9110>. | |||
[SVGT] World Wide Web Consortium, "Scalable Vector Graphics (SVG) | [SVGT] World Wide Web Consortium, "Scalable Vector Graphics (SVG) | |||
Tiny 1.2 Specification", W3C PR-SVGTiny12-20081117, 17 | Tiny 1.2 Specification", W3C REC-SVGTiny12-20081222, | |||
November 2008, | December 2008, | |||
<https://www.w3.org/TR/2008/PR-SVGTiny12-20081117>. | <http://www.w3.org/TR/2008/REC-SVGTiny12-20081222/>. | |||
13.2. Informative References | 12.2. Informative References | |||
[ISO19005] ISO, "Document management -- Electronic document file | [ISO19005] ISO, "Document management -- Electronic document file | |||
format for long-term preservation -- Part 1: Use of PDF | format for long-term preservation -- Part 1: Use of PDF | |||
1.4 (PDF/A-1)", ISO 19005-1:2005, 2005. | 1.4 (PDF/A-1)", ISO 19005-1:2005, October 2005. | |||
[ISO32000] ISO, "Document management -- Portable document format -- | [ISO32000] ISO, "Document management -- Portable document format -- | |||
Part 1: PDF 1.7", ISO 32000-1:2008, 2008. | Part 1: PDF 1.7", ISO 32000-1:2008, July 2008. | |||
[OLD-ASN1] CCITT, "Specification of Abstract Syntax Notation One | [OLD-ASN1] CCITT, "Specification of Abstract Syntax Notation One | |||
(ASN.1)", CCITT Recommendation X.208, November 1988, | (ASN.1)", CCITT Recommendation X.208, November 1988, | |||
<https://www.itu.int/rec/T-REC-X.208/en>. | <https://www.itu.int/rec/T-REC-X.208/en>. | |||
[PNGR] World Wide Web Consortium, "Media Type Registration for | [PNGR] World Wide Web Consortium, "Media Type Registration for | |||
image/png", | image/png", | |||
<https://www.iana.org/assignments/media-types/image/png>. | <https://www.iana.org/assignments/media-types/image/png>. | |||
[RFC3709] Santesson, S., Housley, R., and T. Freeman, "Internet | [RFC3709] Santesson, S., Housley, R., and T. Freeman, "Internet | |||
skipping to change at page 29, line 32 ¶ | skipping to change at line 1344 ¶ | |||
[SVGZR] "A separate MIME type for svgz files is needed", | [SVGZR] "A separate MIME type for svgz files is needed", | |||
<https://github.com/w3c/svgwg/issues/701>. | <https://github.com/w3c/svgwg/issues/701>. | |||
Appendix A. ASN.1 Modules | Appendix A. ASN.1 Modules | |||
A.1. ASN.1 Modules with 1988 Syntax | A.1. ASN.1 Modules with 1988 Syntax | |||
This appendix contains two ASN.1 modules, both using the old syntax | This appendix contains two ASN.1 modules, both using the old syntax | |||
[OLD-ASN1]. | [OLD-ASN1]. | |||
The first ASN.1 module provides the syntax for the Logotype | The first ASN.1 module provides the syntax for the logotype | |||
certificate extension. Only comments have changed in the module from | certificate extension. Only comments have changed in the module from | |||
RFC 3709, and the IMPORTS now come from [RFC5280]. | [RFC3709] and the IMPORTS now come from [RFC5280]. | |||
The second ASN.1 module provides the Certificate Image object | The second ASN.1 module provides the certificate image object | |||
identifier. The module is unchanged from RFC 6170. | identifier. The module is unchanged from [RFC6170]. | |||
<CODE BEGINS> | <CODE BEGINS> | |||
LogotypeCertExtn | LogotypeCertExtn | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
id-mod-logotype(22) } | id-mod-logotype(22) } | |||
DEFINITIONS IMPLICIT TAGS ::= | DEFINITIONS IMPLICIT TAGS ::= | |||
BEGIN | BEGIN | |||
IMPORTS | IMPORTS | |||
AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280 | AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280 | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
id-pkix1-explicit(18) }; | id-pkix1-explicit(18) }; | |||
-- Logotype Extension OID | -- Logotype Certificate Extension OID | |||
id-pe-logotype OBJECT IDENTIFIER ::= | id-pe-logotype OBJECT IDENTIFIER ::= | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-pe(1) 12 } | security(5) mechanisms(5) pkix(7) id-pe(1) 12 } | |||
-- Logotype Extension Syntax | -- Logotype Certificate Extension Syntax | |||
LogotypeExtn ::= SEQUENCE { | LogotypeExtn ::= SEQUENCE { | |||
communityLogos [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL, | communityLogos [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL, | |||
issuerLogo [1] EXPLICIT LogotypeInfo OPTIONAL, | issuerLogo [1] EXPLICIT LogotypeInfo OPTIONAL, | |||
subjectLogo [2] EXPLICIT LogotypeInfo OPTIONAL, | subjectLogo [2] EXPLICIT LogotypeInfo OPTIONAL, | |||
otherLogos [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo | otherLogos [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo | |||
OPTIONAL } | OPTIONAL } | |||
-- Note: At least one of the OPTIONAL components MUST be present | -- Note: At least one of the OPTIONAL components MUST be present | |||
skipping to change at page 30, line 41 ¶ | skipping to change at line 1402 ¶ | |||
LogotypeImage ::= SEQUENCE { | LogotypeImage ::= SEQUENCE { | |||
imageDetails LogotypeDetails, | imageDetails LogotypeDetails, | |||
imageInfo LogotypeImageInfo OPTIONAL } | imageInfo LogotypeImageInfo OPTIONAL } | |||
LogotypeAudio ::= SEQUENCE { | LogotypeAudio ::= SEQUENCE { | |||
audioDetails LogotypeDetails, | audioDetails LogotypeDetails, | |||
audioInfo LogotypeAudioInfo OPTIONAL } | audioInfo LogotypeAudioInfo OPTIONAL } | |||
LogotypeDetails ::= SEQUENCE { | LogotypeDetails ::= SEQUENCE { | |||
mediaType IA5String, -- MIME media type name and optional | mediaType IA5String, -- Media type name and optional | |||
-- parameters | -- parameters | |||
logotypeHash SEQUENCE SIZE (1..MAX) OF HashAlgAndValue, | logotypeHash SEQUENCE SIZE (1..MAX) OF HashAlgAndValue, | |||
logotypeURI SEQUENCE SIZE (1..MAX) OF IA5String } | logotypeURI SEQUENCE SIZE (1..MAX) OF IA5String } | |||
LogotypeImageInfo ::= SEQUENCE { | LogotypeImageInfo ::= SEQUENCE { | |||
type [0] LogotypeImageType DEFAULT color, | type [0] LogotypeImageType DEFAULT color, | |||
fileSize INTEGER, -- In octets, 0=unspecified | fileSize INTEGER, -- In octets, 0=unspecified | |||
xSize INTEGER, -- Horizontal size in pixels | xSize INTEGER, -- Horizontal size in pixels | |||
ySize INTEGER, -- Vertical size in pixels | ySize INTEGER, -- Vertical size in pixels | |||
resolution LogotypeImageResolution OPTIONAL, | resolution LogotypeImageResolution OPTIONAL, | |||
skipping to change at page 32, line 24 ¶ | skipping to change at line 1480 ¶ | |||
END | END | |||
<CODE ENDS> | <CODE ENDS> | |||
A.2. ASN.1 Module with 2002 Syntax | A.2. ASN.1 Module with 2002 Syntax | |||
Some developers like to use the latest version of ASN.1 standards. | Some developers like to use the latest version of ASN.1 standards. | |||
This appendix provides an ASN.1 module to assist in that goal. It | This appendix provides an ASN.1 module to assist in that goal. It | |||
uses the ASN.1 syntax defined in [NEW-ASN1], and it follows the | uses the ASN.1 syntax defined in [NEW-ASN1], and it follows the | |||
conventions established in [RFC5912] and [RFC6268]. | conventions established in [RFC5912] and [RFC6268]. | |||
This ASN.1 module incorporates the module from RFC 3709 and the | This ASN.1 module incorporates the module from [RFC3709] and the | |||
module from RFC 6170. | module from [RFC6170]. | |||
Note that [NEW-ASN1] was published in 2021, and all of the features | Note that [NEW-ASN1] was published in 2021, and all of the features | |||
used in this module are backward compatible with the specification | used in this module are backward compatible with the specification | |||
that was published in 2002. | that was published in 2002. | |||
<CODE BEGINS> | <CODE BEGINS> | |||
LogotypeCertExtn | LogotypeCertExtn-2022 | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
id-mod-logotype(TBD) } | id-mod-logotype-2022(107) } | |||
DEFINITIONS IMPLICIT TAGS ::= | DEFINITIONS IMPLICIT TAGS ::= | |||
BEGIN | BEGIN | |||
IMPORTS | IMPORTS | |||
EXTENSION | EXTENSION | |||
FROM PKIX-CommonTypes-2009 -- RFC 5912 | FROM PKIX-CommonTypes-2009 -- RFC 5912 | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
id-mod-pkixCommon-02(57) } | id-mod-pkixCommon-02(57) } | |||
AlgorithmIdentifier{}, DIGEST-ALGORITHM | AlgorithmIdentifier{}, DIGEST-ALGORITHM | |||
FROM AlgorithmInformation-2009 | FROM AlgorithmInformation-2009 | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-mod(0) | security(5) mechanisms(5) pkix(7) id-mod(0) | |||
id-mod-algorithmInformation-02(58) } ; | id-mod-algorithmInformation-02(58) } ; | |||
-- Logotype Extension | -- Logotype Certificate Extension | |||
ext-logotype EXTENSION ::= { | ext-logotype EXTENSION ::= { | |||
SYNTAX LogotypeExtn | SYNTAX LogotypeExtn | |||
IDENTIFIED BY id-pe-logotype } | IDENTIFIED BY id-pe-logotype } | |||
-- Logotype Extension OID | -- Logotype Certificate Extension OID | |||
id-pe-logotype OBJECT IDENTIFIER ::= | id-pe-logotype OBJECT IDENTIFIER ::= | |||
{ iso(1) identified-organization(3) dod(6) internet(1) | { iso(1) identified-organization(3) dod(6) internet(1) | |||
security(5) mechanisms(5) pkix(7) id-pe(1) 12 } | security(5) mechanisms(5) pkix(7) id-pe(1) 12 } | |||
-- Logotype Extension Syntax | -- Logotype Certificate Extension Syntax | |||
LogotypeExtn ::= SEQUENCE { | LogotypeExtn ::= SEQUENCE { | |||
communityLogos [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL, | communityLogos [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL, | |||
issuerLogo [1] EXPLICIT LogotypeInfo OPTIONAL, | issuerLogo [1] EXPLICIT LogotypeInfo OPTIONAL, | |||
subjectLogo [2] EXPLICIT LogotypeInfo OPTIONAL, | subjectLogo [2] EXPLICIT LogotypeInfo OPTIONAL, | |||
otherLogos [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo | otherLogos [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo | |||
OPTIONAL } | OPTIONAL } | |||
-- At least one of the OPTIONAL components MUST be present | -- At least one of the OPTIONAL components MUST be present | |||
( WITH COMPONENTS { ..., communityLogos PRESENT } | | ( WITH COMPONENTS { ..., communityLogos PRESENT } | | |||
WITH COMPONENTS { ..., issuerLogo PRESENT } | | WITH COMPONENTS { ..., issuerLogo PRESENT } | | |||
skipping to change at page 33, line 50 ¶ | skipping to change at line 1554 ¶ | |||
LogotypeImage ::= SEQUENCE { | LogotypeImage ::= SEQUENCE { | |||
imageDetails LogotypeDetails, | imageDetails LogotypeDetails, | |||
imageInfo LogotypeImageInfo OPTIONAL } | imageInfo LogotypeImageInfo OPTIONAL } | |||
LogotypeAudio ::= SEQUENCE { | LogotypeAudio ::= SEQUENCE { | |||
audioDetails LogotypeDetails, | audioDetails LogotypeDetails, | |||
audioInfo LogotypeAudioInfo OPTIONAL } | audioInfo LogotypeAudioInfo OPTIONAL } | |||
LogotypeDetails ::= SEQUENCE { | LogotypeDetails ::= SEQUENCE { | |||
mediaType IA5String, -- MIME media type name and optional | mediaType IA5String, -- Media type name and optional | |||
-- parameters | -- parameters | |||
logotypeHash SEQUENCE SIZE (1..MAX) OF HashAlgAndValue, | logotypeHash SEQUENCE SIZE (1..MAX) OF HashAlgAndValue, | |||
logotypeURI SEQUENCE SIZE (1..MAX) OF IA5String } | logotypeURI SEQUENCE SIZE (1..MAX) OF IA5String } | |||
LogotypeImageInfo ::= SEQUENCE { | LogotypeImageInfo ::= SEQUENCE { | |||
type [0] LogotypeImageType DEFAULT color, | type [0] LogotypeImageType DEFAULT color, | |||
fileSize INTEGER, -- In octets, 0=unspecified | fileSize INTEGER, -- In octets, 0=unspecified | |||
xSize INTEGER, -- Horizontal size in pixels | xSize INTEGER, -- Horizontal size in pixels | |||
ySize INTEGER, -- Vertical size in pixels | ySize INTEGER, -- Vertical size in pixels | |||
resolution LogotypeImageResolution OPTIONAL, | resolution LogotypeImageResolution OPTIONAL, | |||
skipping to change at page 35, line 4 ¶ | skipping to change at line 1604 ¶ | |||
HashAlgAndValue ::= SEQUENCE { | HashAlgAndValue ::= SEQUENCE { | |||
hashAlg AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}, | hashAlg AlgorithmIdentifier{DIGEST-ALGORITHM, {...}}, | |||
hashValue OCTET STRING } | hashValue OCTET STRING } | |||
-- Other logotype type OIDs | -- Other logotype type OIDs | |||
id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) | id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) | |||
dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 } | dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 } | |||
id-logo-loyalty OBJECT IDENTIFIER ::= { id-logo 1 } | id-logo-loyalty OBJECT IDENTIFIER ::= { id-logo 1 } | |||
id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 } | id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 } | |||
id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 } | id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 } | |||
END | END | |||
<CODE ENDS> | <CODE ENDS> | |||
Appendix B. Examples | Appendix B. Examples | |||
B.1. Example from RFC 3709 | B.1. Example from RFC 3709 | |||
The following example displays a logotype extension containing one | The following example displays a logotype certificate extension | |||
Issuer logotype using direct addressing. The issuer logotype image | containing one issuer organization logotype using direct addressing. | |||
is of the type image/gif. The logotype image is referenced through | The issuer organization logotype image is of the type image/gif. The | |||
one URI and the image is hashed with SHA-256. This example is | logotype image is referenced through one URI, and the image is hashed | |||
changed from RFC 3709 to use SHA-256 instead of SHA-1. | with SHA-256. This example is changed from [RFC3709] to use SHA-256 | |||
instead of SHA-1. | ||||
The values on the left are the ASN.1 tag (in hexadecimal) and the | The values on the left are the ASN.1 tag (in hexadecimal) and the | |||
length (in decimal). | length (in decimal). | |||
30 122: SEQUENCE { | 30 122: SEQUENCE { | |||
06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | 06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | |||
04 110: OCTET STRING, encapsulates { | 04 110: OCTET STRING, encapsulates { | |||
30 108: SEQUENCE { | 30 108: SEQUENCE { | |||
A1 106: [1] { | A1 106: [1] { | |||
A0 104: [0] { | A0 104: [0] { | |||
skipping to change at page 36, line 38 ¶ | skipping to change at line 1659 ¶ | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
B.2. Issuer Logotype Example | B.2. Issuer Organization Logotype Example | |||
The following example displays a logotype extension containing one | The following example displays a logotype certificate extension | |||
Issuer logotype using direct addressing. The issuer logotype image | containing one issuer organization logotype using direct addressing. | |||
is of the type image/jpeg. The logotype image is referenced through | The issuer organization logotype image is of the type image/jpeg. | |||
one URI and the image is hashed with SHA-256. | The logotype image is referenced through one URI, and the image is | |||
hashed with SHA-256. | ||||
The values on the left are the ASN.1 tag (in hexadecimal) and the | The values on the left are the ASN.1 tag (in hexadecimal) and the | |||
length (in decimal). | length (in decimal). | |||
30 124: SEQUENCE { | 30 124: SEQUENCE { | |||
06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | 06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | |||
04 112: OCTET STRING, encapsulates { | 04 112: OCTET STRING, encapsulates { | |||
30 110: SEQUENCE { | 30 110: SEQUENCE { | |||
A1 108: [1] { | A1 108: [1] { | |||
A0 106: [0] { | A0 106: [0] { | |||
skipping to change at page 37, line 40 ¶ | skipping to change at line 1705 ¶ | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
B.3. Embedded Image Example | B.3. Embedded Image Example | |||
The following example displays a logotype extension containing one | The following example displays a logotype certificate extension | |||
Subject logotype using direct addressing. The subject logotype image | containing one subject organization logotype using direct addressing. | |||
uses image/svg+xml-compressed. The logotype image is embedded in the | The subject organization logotype image uses image/svg+xml+gzip. The | |||
certificate extension with a "data:" URI and the image is hashed by | logotype image is embedded in the certificate extension with a | |||
SHA-256. This technique produces a large certificate extension, but | "data:" URI, and the image is hashed by SHA-256. This technique | |||
offers reduced latency and improved privacy. | produces a large certificate extension but offers reduced latency and | |||
improved privacy. | ||||
The values on the left are the ASN.1 tag (in hexadecimal) and the | The values on the left are the ASN.1 tag (in hexadecimal) and the | |||
length (in decimal). | length (in decimal). | |||
30 2160: SEQUENCE { | 30 2148: SEQUENCE { | |||
06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | 06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | |||
04 2146: OCTET STRING, encapsulates { | 04 2134: OCTET STRING, encapsulates { | |||
30 2142: SEQUENCE { | 30 2130: SEQUENCE { | |||
A2 2138: [2] { | A2 2126: [2] { | |||
A0 2134: [0] { | A0 2122: [0] { | |||
30 2130: SEQUENCE { | 30 2118: SEQUENCE { | |||
30 2126: SEQUENCE { | 30 2114: SEQUENCE { | |||
30 2122: SEQUENCE { | 30 2110: SEQUENCE { | |||
16 24: IA5String 'image/svg+xml-compressed' | 16 18: IA5String 'image/svg+xml+gzip' | |||
30 49: SEQUENCE { | 30 49: SEQUENCE { | |||
30 47: SEQUENCE { | 30 47: SEQUENCE { | |||
30 11: SEQUENCE { | 30 11: SEQUENCE { | |||
06 9: OBJECT IDENTIFIER | 06 9: OBJECT IDENTIFIER | |||
: sha-256 (2 16 840 1 101 3 4 2 1) | : sha-256 (2 16 840 1 101 3 4 2 1) | |||
: } | : } | |||
04 32: OCTET STRING | 04 32: OCTET STRING | |||
: C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49 | : C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49 | |||
: 9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7 | : 9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7 | |||
: } | : } | |||
: } | : } | |||
30 2041: SEQUENCE { | 30 2035: SEQUENCE { | |||
16 2037: IA5String | 16 2031: IA5String | |||
: 'data:image/svg+xml-compressed;base64,H4sICIGpy2E' | : 'data:image/svg+xml+gzip;base64,H4sICIGpy2EAA2xvZ' | |||
: 'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe' | : '28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLewHDROU' | |||
: 'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt' | : 'BRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUktyLmfOz' | |||
: 'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5' | : 'PD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5cmPNvX' | |||
: 'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/' | : 'v16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/7j+Ktd' | |||
: '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6' | : 'Xawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t69vmxxo' | |||
: '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy' | : 'n08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKyW082s8' | |||
: 'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35' | : 'SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly3553ARpd' | |||
: '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d' | : '7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8dpvpxP8' | |||
: 'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d' | : 'wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8dp3Mn7c' | |||
: 'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf' | : 'b3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwfbnj9a+' | |||
: 'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT' | : 'Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqThd/PpR' | |||
: 'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H' | : 'paz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3Hp+B4In' | |||
: 'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU' | : 'jVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VUFfYC01' | |||
: 'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7' | : 'pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS74DANjg' | |||
: '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK' | : 'uwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxKExEEWM' | |||
: 'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1' | : 'JLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1Qsr6IU' | |||
: 'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ' | : 'xlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQM63xoP' | |||
: 'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt' | : 'lWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gtWWm4M1' | |||
: 'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr' | : 'rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr1idG0g' | |||
: '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0' | : 'ahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0eB6DRA' | |||
: 'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC' | : '10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHCMNM0ql' | |||
: 'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI' | : 'DRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAItTABTk' | |||
: 'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI' | : 'p5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI0QQ8Cb' | |||
: '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL' | : 'zCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpLvsJbCA' | |||
: 'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H' | : 'LUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4HmYGKai' | |||
: 'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD' | : 'iJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXDYr/aTq' | |||
: 'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V' | : 'fxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V6JZhh/' | |||
: '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el' | : 'lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el0NJWO8' | |||
: '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI' | : 'mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyIp4ljDk' | |||
: 'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68' | : 'oaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68bPF3uS' | |||
: 'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH' | : '1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH+yQxhz' | |||
: '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b' | : 'QsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4breSaxZ' | |||
: 'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R' | : '/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1Rfn/xQX' | |||
: 'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU' | : 'ywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiUtQZAWz' | |||
: 'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ' | : 'mkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQFiYcqv' | |||
: 'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE' | : 'iSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPEVu6HaN' | |||
: 'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3' | : '6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3Dlf3Aj' | |||
: 'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa' | : '70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUapsK2T8' | |||
: 'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5' | : 'SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5ZFerdj' | |||
: 'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H' | : 'ksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9HK5B3EL' | |||
: 'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6' | : 'jSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6401+Yf' | |||
: '401+YfwDria4WoQwAAA==' | : 'wDria4WoQwAAA==' | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
B.4. Embedded Certificate Image Example | B.4. Embedded Certificate Image Example | |||
The following example displays a logotype extension containing one | The following example displays a logotype certificate extension | |||
Certificate Image logotype using direct addressing. The Certificate | containing one certificate image logotype using direct addressing. | |||
Image logotype uses image/svg+xml-compressed. The logotype image is | The certificate image logotype uses image/svg+xml+gzip. The logotype | |||
embedded in the certificate extension with a "data:" URI and the | image is embedded in the certificate extension with a "data:" URI, | |||
image is hashed by SHA-256. This example contains the image from | and the image is hashed by SHA-256. This example contains the image | |||
Appendix B of RFC 6170, however, the media type used here is explicit | from Appendix B of [RFC6170]; however, the media type used here is | |||
about the use of GZIP compression [RFC1952]. | explicit about the use of GZIP compression [RFC1952]. | |||
The values on the left are the ASN.1 tag (in hexadecimal) and the | The values on the left are the ASN.1 tag (in hexadecimal) and the | |||
length (in decimal). | length (in decimal). | |||
30 2914: SEQUENCE { | 30 2902: SEQUENCE { | |||
06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | 06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | |||
04 2900: OCTET STRING, encapsulates { | 04 2888: OCTET STRING, encapsulates { | |||
30 2896: SEQUENCE { | 30 2884: SEQUENCE { | |||
A3 2892: [3] { | A3 2880: [3] { | |||
30 2888: SEQUENCE { | 30 2876: SEQUENCE { | |||
30 2884: SEQUENCE { | 30 2872: SEQUENCE { | |||
06 8: OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3' | 06 8: OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3' | |||
A0 2870: [0] { | A0 2858: [0] { | |||
30 2866: SEQUENCE { | 30 2854: SEQUENCE { | |||
30 2862: SEQUENCE { | 30 2850: SEQUENCE { | |||
30 2858: SEQUENCE { | 30 2846: SEQUENCE { | |||
16 24: IA5String 'image/svg+xml-compressed' | 16 18: IA5String 'image/svg+xml+gzip' | |||
30 49: SEQUENCE { | 30 49: SEQUENCE { | |||
30 47: SEQUENCE { | 30 47: SEQUENCE { | |||
30 11: SEQUENCE { | 30 11: SEQUENCE { | |||
06 9: OBJECT IDENTIFIER | 06 9: OBJECT IDENTIFIER | |||
: sha-256 (2 16 840 1 101 3 4 2 1) | : sha-256 (2 16 840 1 101 3 4 2 1) | |||
: } | : } | |||
04 32: OCTET STRING | 04 32: OCTET STRING | |||
: 83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57 | : 83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57 | |||
: 7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6 | : 7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6 | |||
: } | : } | |||
: } | : } | |||
30 2777: SEQUENCE { | 30 2771: SEQUENCE { | |||
16 2773: IA5String | 16 2767: IA5String | |||
: 'data:image/svg+xml-compressed;base64,H4sICLXutU0' | : 'data:image/svg+xml+gzip;base64,H4sICLXutU0AA0Nlc' | |||
: 'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo' | : 'nRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdoS7xK9j' | |||
: 'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em' | : 'meapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em8C9d9i' | |||
: '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt' | : 'ERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJteOv/66' | |||
: 'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS' | : '1M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySSJwkqj2' | |||
: 'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP' | : '1k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysPUo7QPK' | |||
: 'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj' | : '/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDjGiGHQ9' | |||
: 'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm' | : '14n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKmSbLVWN' | |||
: 'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m' | : 'oo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06me6awqP' | |||
: 'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb' | : 'eISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkbR4Gtef' | |||
: 'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u' | : 'ENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5uF1Wqu7' | |||
: 'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br' | : 'R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9BrFrMbeV' | |||
: 'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo' | : 'uWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo5xb7Yu' | |||
: '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8' | : 'svFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8IF2WZh' | |||
: 'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo' | : 'NlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1boUJvQFs' | |||
: 'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5' | : 'vi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5Ls2ORf' | |||
: 'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR' | : 'wM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hARSXDR6F' | |||
: 'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc' | : 'zqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpcOcOb9u' | |||
: 'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL' | : '63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZLH96SH4' | |||
: 'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn' | : 'R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMnWOqZJp' | |||
: 'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI' | : 'msXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLIil470z' | |||
: 'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM' | : 'fSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KMk+l0SO' | |||
: 'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP' | : 'XlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXPoTe0pn' | |||
: 'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB' | : 'u4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekBcAUFPS' | |||
: 'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq' | : 'GkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIqxT4CKs' | |||
: 'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq' | : 'PlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugqzb7c3Q' | |||
: 'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz' | : '89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITzOH5uZS' | |||
: 'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6' | : 'ThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd61WtUhD' | |||
: '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX' | : 'VJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAXNB8sm9' | |||
: 'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs' | : 'Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs8C1Okb' | |||
: '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf' | : '2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf6BC4Sy' | |||
: '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY' | : 'lWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LYsFzpGV' | |||
: 'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X' | : 'Y5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53XStSh1e' | |||
: 'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam' | : 'ogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7OamhjU1HB' | |||
: 'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA' | : '3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA3Ne3P8' | |||
: '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE' | : 'lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjEEd9EUh' | |||
: 'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i' | : 'kwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8iHPud16' | |||
: 'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+' | : 'wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+Ydaj6i' | |||
: 'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp' | : 'wJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujpA2+wPm' | |||
: 'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb' | : 'QR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGebcMg7Og' | |||
: 'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW' | : 'QKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwWY1F0Hl' | |||
: 'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy' | : 'BUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAyGuEB3V' | |||
: 'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G' | : 'R59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0GXECqed' | |||
: 'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3' | : 'QQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3+av4Jc' | |||
: '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR' | : 'j78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfRVjwfmO' | |||
: 'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo' | : 'nNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo6J2iYx' | |||
: '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB' | : 'P4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkBYwETNP' | |||
: 'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk' | : 't/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjkji8quL' | |||
: 'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh' | : '3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7ShSev4oX' | |||
: 'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF' | : 'icPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YFUp+Yn7' | |||
: 'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT' | : 'WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnTW61zjQ' | |||
: 'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T' | : '7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9TeNGUHi' | |||
: 'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe' | : 'bE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe6sHxR3' | |||
: '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u' | : 'KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8uR0R+LD' | |||
: 'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz' | : 'EqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz31cuoc' | |||
: '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD' | : 'voO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlDpE/oyl' | |||
: 'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol' | : 'py+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol74Z+eH' | |||
: '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA=' | : 'fpHNc7OjffQ/HeV0X8BopoDkGEkAAA=' | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
B.5. Full Certificate Example | B.5. Full Certificate Example | |||
The following example contains a certificate for Alice; it is | The following example contains a certificate for Alice; it is | |||
essentially a renewal of the certificate that appears in [RFC9216]. | essentially a renewal of the certificate that appears in [RFC9216]. | |||
Of course, the serial number and issue dates are different. In | Of course, the serial number and issue dates are different. In | |||
addition, Alice's certificate now has a logotype extension. The | addition, Alice's certificate now has a logotype certificate | |||
extension contains URLs for two community logotype images, both at | extension. The extension contains URLs for two community logotype | |||
fictional URLs. The extension also contains URLs for two subject | images, both at fictional URLs. The extension also contains URLs for | |||
logotype images, both at fictional URLs. An implementation would | two subject organization logotype images, both at fictional URLs. An | |||
display at most three of these images, both of the community logotype | implementation would display at most three of these images, both of | |||
images and one of the subject logotype images. Direct addressing is | the community logotype images and one of the subject organization | |||
used for all of the images, and the images are hashed by SHA-256. | logotype images. Direct addressing is used for all of the images, | |||
and the images are hashed by SHA-256. | ||||
-----BEGIN CERTIFICATE----- | -----BEGIN CERTIFICATE----- | |||
MIIFpTCCBI2gAwIBAgITN0EFee11f0Kpolw69Phqzpqx1zANBgkqhkiG9w0BAQ0F | MIIFpTCCBI2gAwIBAgITN0EFee11f0Kpolw69Phqzpqx1zANBgkqhkiG9w0BAQ0F | |||
ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | ADBVMQ0wCwYDVQQKEwRJRVRGMREwDwYDVQQLEwhMQU1QUyBXRzExMC8GA1UEAxMo | |||
U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0yMjA2 | U2FtcGxlIExBTVBTIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAgFw0yMjA2 | |||
MTUxODE4MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G | MTUxODE4MThaGA8yMDUyMDkyNzA2NTQxOFowOzENMAsGA1UEChMESUVURjERMA8G | |||
A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq | A1UECxMITEFNUFMgV0cxFzAVBgNVBAMTDkFsaWNlIExvdmVsYWNlMIIBIjANBgkq | |||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtPSJ6Fg4Fj5Nmn9PkrYo0jTkfCv4TfA/ | hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtPSJ6Fg4Fj5Nmn9PkrYo0jTkfCv4TfA/ | |||
pdO/KLpZbJOAEr0sI7AjaO7B1GuMUFJeSTulamNfCwDcDkY63PQWl+DILs7GxVwX | pdO/KLpZbJOAEr0sI7AjaO7B1GuMUFJeSTulamNfCwDcDkY63PQWl+DILs7GxVwX | |||
urhYdZlaV5hcUqVAckPvedDBc/3rz4D/esFfs+E7QMFtmd+K04s+A8TCNO12DRVB | urhYdZlaV5hcUqVAckPvedDBc/3rz4D/esFfs+E7QMFtmd+K04s+A8TCNO12DRVB | |||
skipping to change at page 43, line 4 ¶ | skipping to change at line 1948 ¶ | |||
bXBsZS9sb2dvLmdpZjBmMGQWCmltYWdlL2pwZWcwMTAvMAsGCWCGSAFlAwQCAQQg | bXBsZS9sb2dvLmdpZjBmMGQWCmltYWdlL2pwZWcwMTAvMAsGCWCGSAFlAwQCAQQg | |||
vct7dXJtjBszpCzerHly2krZ8nmEClhYas4vAoDq16UwIxYhaHR0cDovL3d3dy5z | vct7dXJtjBszpCzerHly2krZ8nmEClhYas4vAoDq16UwIxYhaHR0cDovL3d3dy5z | |||
bWltZS5leGFtcGxlL2xvZ28uanBnMA0GCSqGSIb3DQEBDQUAA4IBAQBbjdCNVFA/ | bWltZS5leGFtcGxlL2xvZ28uanBnMA0GCSqGSIb3DQEBDQUAA4IBAQBbjdCNVFA/ | |||
emCc5uKX5WSPrdvRFZSs57SEhE0odxvhTrOs13VM8Om0TxhNJ0Pl6d9CJdbUxtFw | emCc5uKX5WSPrdvRFZSs57SEhE0odxvhTrOs13VM8Om0TxhNJ0Pl6d9CJdbUxtFw | |||
SSnSu9fnghDO7OZDJnPiIYLNY5eTTzY6sx85mde9TLaBTE7RZf0W7NV0hqDqcfM+ | SSnSu9fnghDO7OZDJnPiIYLNY5eTTzY6sx85mde9TLaBTE7RZf0W7NV0hqDqcfM+ | |||
9HnQrU4TtPSvtPS5rr5SvqkaMM0k89bpbkgZlh9HH14+x+DIeT0dLythiXJvkVod | 9HnQrU4TtPSvtPS5rr5SvqkaMM0k89bpbkgZlh9HH14+x+DIeT0dLythiXJvkVod | |||
qEfyZTcdplQHQ4szWO7lsjmvHrUIbS1tdAJnah8AZRZfqiJEFeiUp06hvAWnPc3y | qEfyZTcdplQHQ4szWO7lsjmvHrUIbS1tdAJnah8AZRZfqiJEFeiUp06hvAWnPc3y | |||
1TMwYI8onfwPIVzyT6YLgjiT6PuLwSB/wtlhI+vWfdINaHdotegjawLm/3jZ+ceN | 1TMwYI8onfwPIVzyT6YLgjiT6PuLwSB/wtlhI+vWfdINaHdotegjawLm/3jZ+ceN | |||
tu39FvbV0uKJ | tu39FvbV0uKJ | |||
-----END CERTIFICATE----- | -----END CERTIFICATE----- | |||
The following displays the logotype extension from Alice's | ||||
certificate. The values on the left are the ASN.1 tag (in | The following displays the logotype certificate extension from | |||
Alice's certificate. The values on the left are the ASN.1 tag (in | ||||
hexadecimal) and the length (in decimal). | hexadecimal) and the length (in decimal). | |||
30 464: SEQUENCE { | 30 464: SEQUENCE { | |||
06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | 06 8: OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12) | |||
04 450: OCTET STRING, encapsulates { | 04 450: OCTET STRING, encapsulates { | |||
30 446: SEQUENCE { | 30 446: SEQUENCE { | |||
A0 227: [0] { | A0 227: [0] { | |||
30 224: SEQUENCE { | 30 224: SEQUENCE { | |||
A0 111: [0] { | A0 111: [0] { | |||
30 109: SEQUENCE { | 30 109: SEQUENCE { | |||
skipping to change at page 45, line 14 ¶ | skipping to change at line 2055 ¶ | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
: } | : } | |||
Appendix C. Changes Since RFC 3709 and RFC 6170 | Appendix C. Changes since RFCs 3709 and 6170 | |||
This appendix summarizes the changes since RFC 3709. The changes | This appendix summarizes the changes since [RFC3709]. The changes | |||
are: | are: | |||
* Combine RFC 3709 and RFC 6170 into one document, and encourage | * Combine RFCs 3709 and 6170 into one document, and encourage | |||
implementers to support the "data" URI scheme (data:...) that was | implementers to support the "data" URI scheme (data:...) that was | |||
originally specified in RFC 6170. Merging RFC 3709 and RFC 6170 | originally specified in RFC 6170. Merging RFCs 3709 and 6170 led | |||
lead to many editoral changes throughout the document. | to many editorial changes throughout the document. | |||
* Drop SHA-1 as the mandatory-to-implement hash algorithm, and | * Drop SHA-1 as the mandatory-to-implement hash algorithm, and | |||
encourage use of the one-way hash function that is employed by the | encourage use of the one-way hash function that is employed by the | |||
certificate signature algorithm. | certificate signature algorithm. | |||
* RFC 3709 required client applications to support both direct and | * RFC 3709 required client applications to support both direct and | |||
indirect addressing. This requirement is changed to SHOULD | indirect addressing. This requirement is changed to SHOULD | |||
support both direct and indirect addressing to allow | support both direct and indirect addressing to allow | |||
implementations to be more privacy preserving. | implementations to be more privacy preserving. | |||
skipping to change at page 45, line 47 ¶ | skipping to change at line 2088 ¶ | |||
instead of the now obsolete RFC 2396. | instead of the now obsolete RFC 2396. | |||
* Update the reference for the application/pdf media type to be RFC | * Update the reference for the application/pdf media type to be RFC | |||
8118 instead of the now obsolete RFC 3778. | 8118 instead of the now obsolete RFC 3778. | |||
* No longer require support for the FTP scheme (ftp://...) URI. | * No longer require support for the FTP scheme (ftp://...) URI. | |||
* Require support for the HTTP scheme (http://...) URI and the HTTPS | * Require support for the HTTP scheme (http://...) URI and the HTTPS | |||
scheme (https://...) URI. | scheme (https://...) URI. | |||
* Provide syntax of the "data" URI scheme using modern ABNF. | ||||
* Require support for the compressed SVG image format with the | * Require support for the compressed SVG image format with the | |||
image/svg+xml+gzip media type. | image/svg+xml+gzip media type. | |||
* Media types MUST follow the ABNF [RFC5234] that is provided in | * Media types MUST follow the ABNF [RFC5234] that is provided in | |||
Section 4.2 of [RFC6838]. This change resolves Errata ID 2679. | Section 8.3.1 of [RFC9110]. This change resolves Errata ID 2679. | |||
* Remove the requirement that the LogotypeData file name have a file | * Remove the requirement that the LogotypeData file name have a file | |||
extension of ".LTD". This change resolves Errata ID 2325. | extension of ".LTD". This change resolves Errata ID 2325. | |||
* Encourage, instead of requiring, each logotype to be represented | * Encourage, instead of requiring, each logotype to be represented | |||
by at least one image. | by at least one image. | |||
* Encourage the inclusion of text-based audio data suitable for | * Encourage the inclusion of text-based audio data suitable for | |||
processing by a text-to-speech software using the MIME type of | processing by a text-to-speech software using the media type of | |||
"text/plain;charset=UTF-8". | "text/plain;charset=UTF-8". | |||
* Encourage the use of dithering if an image needs to be scaled. | * Encourage the use of dithering if an image needs to be scaled. | |||
* Require that the logotype extension not contain more than one | * Require that the logotype certificate extension not contain more | |||
certificate image logotype. | than one certificate image logotype. | |||
* Privacy-related topics that were previously discussed in the | * Privacy-related topics that were previously discussed in the | |||
Security Considerations section are now covered in a separate | Security Considerations section are now covered in a separate | |||
Privacy Considerations section. Additional topics are covered in | Privacy Considerations section. Additional topics are covered in | |||
both sections. | both sections. | |||
* Provide ASN.1 modules for both the older syntax [OLD-ASN1] and the | * Provide ASN.1 modules for both the older syntax [OLD-ASN1] and the | |||
most recent ASN.1 syntax [NEW-ASN1]. | most recent ASN.1 syntax [NEW-ASN1]. | |||
* Provide additional references. | * Provide additional references. | |||
* Provide additional examples. | * Provide additional examples. | |||
* Several editorial changes to improve clarity. | * Several editorial changes to improve clarity. | |||
* The example in Appendix B.1 was changed to use SHA-256 instead of | * The example in Appendix B.1 was changed to use SHA-256 instead of | |||
SHA-1. | SHA-1. | |||
Acknowledgments | ||||
* Acknowledgments from RFC 3709 | ||||
This document is the result of contributions from many | ||||
professionals. The authors appreciate contributions from all | ||||
members of the IETF PKIX Working Group. We extend a special | ||||
thanks to Al Arsenault, David Cross, Tim Polk, Russel Weiser, | ||||
Terry Hayes, Alex Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, | ||||
Magnus Nystrom, Ryan Hurst, and Phil Griffin for their efforts and | ||||
support. | ||||
Russ Housley thanks the management at RSA Laboratories, especially | ||||
Burt Kaliski, who supported the development of this specification. | ||||
The vast majority of the work on this specification was done while | ||||
Russ was employed at RSA Laboratories. | ||||
* Acknowledgments from RFC 6170 | ||||
The authors recognize valuable contributions from members of the | ||||
PKIX working group, the CA Browser Forum, and James Manger, for | ||||
their review and sample data. | ||||
* Additional Acknowledgments | ||||
Combining RFCs 3709 and 6170 has produced an improved | ||||
specification. The authors appreciate contributions from all | ||||
members of the IETF LAMPS Working Group. We extend a special | ||||
thanks to Alexey Melnikov for his guidance on media types. We | ||||
extend a special thanks to Tim Geiser for his careful checking of | ||||
the new examples in Appendices B.4 and B.5. We extend a special | ||||
thanks to Corey Bonnell, Daniel Kahn Gillmor, Roman Danyliw, Paul | ||||
Wouters, Paul Kyzivat, Shuping Peng, Sheng Jiang, Rob Wilton, Éric | ||||
Vyncke, Donald Eastlake 3rd, and Dan Harkins for their careful | ||||
review and helpful comments. | ||||
Authors' Addresses | Authors' Addresses | |||
Stefan Santesson | Stefan Santesson | |||
IDsec Solutions AB | IDsec Solutions AB | |||
Forskningsbyn Ideon | Forskningsbyn Ideon | |||
SE-223 70 Lund | SE-223 70 Lund | |||
Sweden | Sweden | |||
Email: sts@aaa-sec.com | Email: sts@aaa-sec.com | |||
Russ Housley | Russ Housley | |||
Vigil Security, LLC | Vigil Security, LLC | |||
516 Dranesville Road | 516 Dranesville Road | |||
Herndon, VA, 20170 | Herndon, VA 20170 | |||
United States of America | United States of America | |||
Email: housley@vigilsec.com | Email: housley@vigilsec.com | |||
Trevor Freeman | Trevor Freeman | |||
Amazon Web Services | Amazon Web Services | |||
1918 8th Ave | 1918 8th Ave | |||
Seattle, WA, 98101 | Seattle, WA 98101 | |||
United States of America | United States of America | |||
Email: frtrevor@amazon.com | Email: frtrevor@amazon.com | |||
Leonard Rosenthol | Leonard Rosenthol | |||
Adobe | Adobe | |||
345 Park Avenue | 345 Park Avenue | |||
San Jose, CA, 95110 | San Jose, CA 95110 | |||
United States of America | United States of America | |||
Email: lrosenth@adobe.com | Email: lrosenth@adobe.com | |||
End of changes. 160 change blocks. | ||||
483 lines changed or deleted | 537 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |