<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.26 (Ruby 2.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-rfc3709bis-00" category="std" consensus="true" submissionType="IETF" obsoletes="3709, 6170" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.1 -->
  <front>
    <title abbrev="Logotypes in X.509 Certificates">Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-rfc3709bis-00"/>
    <author initials="S." surname="Santesson" fullname="Stefan Santesson">
      <organization abbrev="IDsec Solutions">IDsec Solutions AB</organization>
      <address>
        <postal>
          <postalLine>Forskningsbyn Ideon</postalLine>
          <postalLine>SE-223 70 Lund</postalLine>
          <postalLine>SE</postalLine>
        </postal>
        <email>sts@aaa-sec.com</email>
      </address>
    </author>
    <author initials="R." surname="Housley" fullname="Russ Housley">
      <organization abbrev="Vigil Security">Vigil Security, LLC</organization>
      <address>
        <postal>
          <street>516 Dranesville Road</street>
          <city>Herndon, VA</city>
          <code>20170</code>
          <country>US</country>
        </postal>
        <email>housley@vigilsec.com</email>
      </address>
    </author>
    <author initials="T." surname="Freeman" fullname="Trevor Freeman">
      <organization>Amazon Web Services</organization>
      <address>
        <postal>
          <street>1918 8th Ave</street>
          <city>Seattle, WA</city>
          <code>98101</code>
          <country>US</country>
        </postal>
        <email>frtrevor@amazon.com</email>
      </address>
    </author>
    <author initials="L." surname="Rosenthol" fullname="Leonard Rosenthol">
      <organization>Adobe</organization>
      <address>
        <postal>
          <street>345 Park Avenue</street>
          <city>San Jose, CA</city>
          <code>95110</code>
          <country>US</country>
        </postal>
        <email>lrosenth@adobe.com</email>
      </address>
    </author>
    <date year="2022" month="February" day="15"/>
    <area>Security</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document specifies a certificate extension for including
logotypes in public key certificates and attribute certificates.
This document obsoletes RFC 3709 and RFC 6170.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>This specification supplements <xref target="RFC5280"/>, which profiles
public-key certificates and certificate revocation lists (CRLs) for use in
the Internet, and it supplements <xref target="RFC5755"/> which profiles
attribute certificates for use in the Internet.</t>
      <t>This document obsoletes RFC 3709 and RFC 6170.
<xref target="changes"/> provides a summary of the changes since the publication of
RFC 3709.</t>
      <t>The basic function of a certificate is to bind a public key to the
identity of an entity (the subject).  From a strictly technical
viewpoint, this goal could be achieved by signing the identity of the
subject together with its public key.  However, the art of Public Key
Infrastructure (PKI) has developed certificates far beyond this
functionality in order to meet the needs of modern global networks and
heterogeneous information technology structures.</t>
      <t>Certificate users must be able to determine certificate policies,
appropriate key usage, assurance level, and name form constraints.
Before a relying party can make an informed decision whether a
particular certificate is trustworthy and relevant for its intended
usage, a certificate may be examined from several different
perspectives.</t>
      <t>Systematic processing is necessary to determine whether a particular
certificate meets the predefined prerequisites for an intended
usage.
Much of the information contained in certificates is appropriate and
effective for machine processing; however, this information is not
suitable for a corresponding human trust and recognition process.</t>
      <t>Humans prefer to structure information into categories and
symbols.  Most humans associate complex structures of reality with easily
recognizable logotypes and marks.  Humans tend to trust things that
they recognize from previous experiences.  Humans may examine
information to confirm their initial reaction.  Very few consumers
actually read all terms and conditions they agree to in
accepting a service, rather they commonly act on trust derived from
previous experience and recognition.</t>
      <t>A big part of this process is branding.  Service providers and product
vendors invest a lot of money and resources into creating a strong
relation between positive user experiences and easily recognizable
trademarks, servicemarks, and logotypes.</t>
      <t>Branding is also pervasive in identification instruments, including
identification cards, passports, driver's licenses, credit cards,
gasoline cards, and loyalty cards.  Identification instruments are
intended to identify the holder as a particular person or as a member
of the community.  The community may represent the subscribers of a
service or any other group.  Identification instruments, in physical
form, commonly use logotypes and symbols, solely to enhance human
recognition and trust in the identification instrument itself.  They
may also include a registered trademark to allow legal recourse for
unauthorized duplication.</t>
      <t>Since certificates play an equivalent role in electronic exchanges,
we examine the inclusion of logotypes in certificates.  We consider
certificate-based identification and certificate selection.</t>
      <section anchor="cert-ident">
        <name>Certificate-based Identification</name>
        <t>The need for human recognition depends on the manner in which
certificates are used and whether certificates need to be visible to
human users.  If certificates are to be used in open environments and
in applications that bring the user in conscious contact with the
result of a certificate-based identification process, then human
recognition is highly relevant, and may be a necessity.</t>
        <t>Examples of such applications include:</t>
        <ul spacing="normal">
          <li>Web server identification where a user identifies the owner
of the web site.</li>
          <li>Peer e-mail exchange in B2B, B2C, and private communications.</li>
          <li>Exchange of medical records, and system for medical prescriptions.</li>
          <li>Unstructured e-business applications (i.e., non-EDI applications).</li>
          <li>Wireless client authenticating to a service provider.</li>
        </ul>
        <t>Most applications provide the human user with an opportunity to view
the results of a successful certificate-based identification
process.  When the user takes the steps necessary to view these results,
the
user is presented with a view of a certificate.  This solution has two
major problems.  First, the function to view a certificate is often
rather hard to find for a non-technical user.  Second, the
presentation of the certificate is too technical and is not user
friendly.  It contains no graphic symbols or logotypes to enhance
human recognition.</t>
        <t>Many investigations have shown that users of today's applications do
not take the steps necessary to view certificates.  This could be due
to poor user interfaces.  Further, many applications are structured to
hide certificates from users.  The application designers do not want
to expose certificates to users at all.</t>
      </section>
      <section anchor="cert-select">
        <name>Selection of Certificates</name>
        <t>One situation where software applications must expose human users to
certificates is when the user must select a single certificate from a
portfolio of certificates.  In some cases, the software application
can use information within the certificates to filter the list for
suitability; however, the user must be queried if more than one
certificate is suitable.  The human user must select one of them.</t>
        <t>This situation is comparable to a person selecting a suitable plastic
card from his wallet.  In this situation, substantial assistance is
provided by card color, location, and branding.</t>
        <t>In order to provide similar support for certificate selection, the
users need tools to easily recognize and distinguish
certificates.  Introduction of logotypes into certificates provides
the necessary graphic.</t>
      </section>
      <section anchor="cert-combo">
        <name>Combination of Verification Techniques</name>
        <t>The use of logotypes will, in many cases, affect the users decision to
trust and use a certificate.  It is therefore important that there be
a distinct and clear architectural and functional distinction between
the processes and objectives of the automated certificate
verification and human recognition.</t>
        <t>Since logotypes are only aimed for human interpretation and contain
data that is inappropriate for computer based verification schemes,
the logotype extension <bcp14>MUST NOT</bcp14> be an active component in automated
certification path validation.</t>
        <t>Automated certification path verification determines whether the
end-entity certificate can be verified according to defined
policy.  The algorithm for this verification is specified in <xref target="RFC5280"/>.</t>
        <t>The automated processing provides assurance that the certificate is
valid.  It does not indicate whether the subject is entitled to any
particular information, or whether the subject ought to be trusted to
perform a particular service.  These are access control
decisions.  Automatic processing will make some access control decisions,
but others, depending on the application context, involve the human user.</t>
        <t>In some situations, where automated procedures have failed to
establish the suitability of the certificate to the task, the human
user is the final arbitrator of the post certificate verification
access control decisions.  In the end, the human will decide whether
or not to accept an executable email attachment, to release personal
information, or follow the instructions displayed by a web browser.
This decision will often be based on recognition and previous
experience.</t>
        <t>The distinction between systematic processing and human processing is
rather straightforward.  They can be complementary.  While the
systematic process is focused on certification path construction and
verification, the human acceptance process is focused on recognition
and related previous experience.</t>
        <t>There are some situations where systematic processing and human
processing interfere with each other.  These issues are discussed in
the <xref target="sec-cons"/>.</t>
      </section>
      <section anchor="terms">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="logotypes">
      <name>Different Types of Logotypes in Certificates</name>
      <t>This specification defines the inclusion of three standard logotype types:</t>
      <ul spacing="normal">
        <li>Community logotype</li>
        <li>Issuer organization logotype</li>
        <li>Subject organization logotype</li>
      </ul>
      <t>The community logotype is the general mark for a community.  It
identifies a service concept for entity identification and
certificate issuance.  Many issuers may use a community logotype to
co-brand with a global community in order to gain global recognition
of its local service provision.  This type of community branding is
very common in the credit card business, where local independent card
issuers include a globally recognized brand (such as VISA and
MasterCard).</t>
      <t>Issuer organization logotype is a logotype representing the
organization identified as part of the issuer name in the
certificate.</t>
      <t>Subject organization logotype is a logotype representing the
organization identified in the subject name in the certificate.</t>
      <t>In addition to the standard logotype types, this specification
accommodates inclusion of other logotype types where each class of
logotype is defined by an object identifier.  The object identifier
can be either locally defined or an identifier defined in <xref target="extn-other"/>
of this document.</t>
    </section>
    <section anchor="logotype-data">
      <name>Logotype Data</name>
      <t>This specification defines two types of logotype data: image data and
audio data.  Implementations <bcp14>MUST</bcp14> support image data; however, support
for audio data is <bcp14>OPTIONAL</bcp14>.</t>
      <t>There is no need to significantly increase the size of the
certificate by including image and audio data of logotypes when a
URI identifying the location to the logotype data and a one-way hash
of the referenced data is included in the certificate.  Embedding the
logotype in the certificate (as defined in <xref target="embedded-image"/>)
can significantly increase the size of the certificate.</t>
      <t>Several image objects, representing the same visual content in different
formats, sizes, and color palates, may represent each logotype image.
At least one of the image objects representing a logotype <bcp14>SHOULD</bcp14>
contain an image within the size range of 60 pixels wide by 45 pixels
high, and 200 pixels wide by 150 pixels high.</t>
      <t>Several instances of audio data may further represent the same audio
sequence in different formats, resolutions, and languages.  At least one
of the audio objects representing a logotype <bcp14>SHOULD</bcp14> have a play time
between 1 and 30 seconds.</t>
      <t>If a logotype of a certain type (as defined in Section 1.1) is
represented by more than one image object, then the image objects <bcp14>MUST</bcp14>
contain variants of roughly the same visual content.  Likewise, if a
logotype of a certain type is represented by more than one audio object,
then the audio objects <bcp14>MUST</bcp14> contain variants of the same audio information.
A spoken message in different languages is considered a variation of
the same audio information.  Compliant applications <bcp14>MUST NOT</bcp14> display
more than one of the image objects and <bcp14>MUST NOT</bcp14> play more than one of the
audio object for any logotype type at the same time.</t>
      <t>A client <bcp14>MAY</bcp14> simultaneously display multiple logotypes of different
logotype types.  For example, it may display one subject organization
logotype while also displaying a community logotype, but it <bcp14>MUST NOT</bcp14>
display multiple image variants of the same community logotype.</t>
      <t>Each logotype present in a certificate <bcp14>MUST</bcp14> be represented by at
least one image data object.</t>
      <t>Client applications <bcp14>SHOULD</bcp14> enhance processing and off-line
functionality by caching logotype data.</t>
    </section>
    <section anchor="extn">
      <name>Logotype Extension</name>
      <t>This section specifies the syntax and semantics of the logotype
certificate extension.</t>
      <section anchor="extn-format">
        <name>Extension Format</name>
        <t>The logotype extension <bcp14>MAY</bcp14> be included in public key certificates
<xref target="RFC5280"/> or attribute certificates <xref target="RFC5755"/>.
The logotype extension <bcp14>MUST</bcp14> be identified by the following object
identifier:</t>
        <artwork><![CDATA[
   id-pe-logotype  OBJECT IDENTIFIER  ::=
      { iso(1) identified-organization(3) dod(6) internet(1)
        security(5) mechanisms(5) pkix(7) id-pe(1) 12 }
]]></artwork>
        <t>This extension <bcp14>MUST NOT</bcp14> be marked critical.</t>
        <t>Logotype data may be referenced through either direct or indirect
addressing.  Client applications <bcp14>MUST</bcp14> support both direct and indirect
addressing.  Certificate issuing applications <bcp14>MUST</bcp14> support direct
addressing, and certificate issuing applications <bcp14>SHOULD</bcp14> support
indirect addressing.</t>
        <t>The direct addressing includes information about each logotype in the
certificate, and URIs point to the image and audio data object.  Direct
addressing supports cases where just one or a few alternative images and
audio objects are referenced.</t>
        <t>The indirect addressing includes one reference to an external hashed
data structure that contains information on the type, content, and
location of each image and audio object.  Indirect addressing supports
cases where each logotype is represented by many alternative audio or
image objects.</t>
        <t>Both direct and indirect addressing accommodate alternative URIs to
obtain exactly the same item.  This opportunity for replication is
intended to improve availability.  Therefore, if a client is unable to
fetch the item from one URI, the client <bcp14>SHOULD</bcp14> try another URI in the
sequence.  All direct addressing URIs <bcp14>SHOULD</bcp14> use either the
HTTP scheme (http://...) or the HTTPS scheme (https://...) or the
DATA scheme (data://...) <xref target="RFC2396"/>; however, the "data" URI
scheme <bcp14>MUST NOT</bcp14> be used with the indirect addressing.
Clients <bcp14>MUST</bcp14> support retrieval of referenced LogoTypeData with the
HTTP/2 <xref target="RFC7540"/> and the HTTPS/2 with TLS <xref target="RFC8740"/>.
Client applications <bcp14>SHOULD</bcp14> also support the "data" URI scheme
<xref target="RFC2397"/> for direct addressing with embedded logotype data within the
extension.</t>
        <t>The logotype extension <bcp14>MUST</bcp14> have the following syntax:</t>
        <artwork><![CDATA[
LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets
   playTime        INTEGER,  -- In milliseconds
   channels        INTEGER,  -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }
]]></artwork>
        <t>When using indirect addressing, the URI (refStructURI) pointing to
the external data structure <bcp14>MUST</bcp14> point to a binary file containing
the DER-encoded data with the syntax LogotypeData.</t>
        <t>At least one of the optional elements in the LogotypeExtn structure
<bcp14>MUST</bcp14> be present.  Avoid the use of otherLogos whenever possible.</t>
        <t>When using direct addressing, at least one of the optional elements
in the LogotypeData structure <bcp14>MUST</bcp14> be present.</t>
        <t>The LogotypeReference and LogotypeDetails structures explicitly
identify one or more one-way hash functions employed to authenticate
referenced image or audio objects.  CAs <bcp14>MUST</bcp14> include a hash value for each
referenced object, calculated on the whole object.  CAs <bcp14>SHOULD</bcp14> include
a hash value that computed with the one-way hash function associated
with the certificate signature, and CAs <bcp14>MAY</bcp14> include other hash
values.  Clients <bcp14>MUST</bcp14> compute a one-way hash value using one of the
identified functions, and clients <bcp14>MUST</bcp14> discard the logotype data if
the computed hash value does not match the hash value in the
certificate extension.</t>
        <t>A MIME type is used to specify the format of the image or audio object
containing the logotype data.  The mediaType field <bcp14>MUST</bcp14> contain a string
that is constructed according to the ABNF <xref target="RFC5234"/> provided in
Section 4.2 of <xref target="RFC4288"/>.  MIME types <bcp14>MAY</bcp14> include parameters.</t>
        <t>Image format requirements are specified in <xref target="image-format"/>, and audio
format requirements are specified in <xref target="audio-format"/>.</t>
        <t>When language is specified, the language tag <bcp14>MUST</bcp14> use the <xref target="RFC5646"/> syntax.</t>
        <t>Logotype types defined in this specification are:</t>
        <ul empty="true">
          <li>
            <t>Community Logotype:  If communityLogos is present, the logotypes
  <bcp14>MUST</bcp14> represent one or more communities with which the certificate
  issuer is affiliated.  The communityLogos <bcp14>MAY</bcp14> be present in an end
  entity certificate, a CA certificate, or an attribute
  certificate.  The communityLogos contains a sequence of Community Logotypes,
  each representing a different community.  If more than one Community
  logotype is present, they <bcp14>MUST</bcp14> be placed in order of preferred
  appearance.  Some clients <bcp14>MAY</bcp14> choose to display a subset of the
  present community logos; therefore the placement within the
  sequence aids the client selection.  The most preferred logotype
  <bcp14>MUST</bcp14> be first in the sequence, and the least preferred logotype
  <bcp14>MUST</bcp14> be last in the sequence.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Issuer Organization Logotype:  If issuerLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the issuer's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  issuer field (for either a public key certificate or attribute
  certificate).  The issuerLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <t>Subject Organization Logotype:  If subjectLogo is present, the
  logotype <bcp14>MUST</bcp14> represent the subject's organization.  The logotype
  <bcp14>MUST</bcp14> be consistent with, and require the presence of, an
  organization name stored in the organization attribute in the
  subject field (for either a public key certificate or attribute
  certificate).  The subjectLogo <bcp14>MAY</bcp14> be present in an end entity
  certificate, a CA certificate, or an attribute certificate.</t>
          </li>
        </ul>
        <t>The relationship between the subject organization and the subject
organization logotype, and the relationship between the issuer and
either the issuer organization logotype or the community logotype,
are relationships asserted by the issuer.  The policies and practices
employed by the issuer to check subject organization logotypes or
claims its issuer and community logotypes is outside the scope of
this document.</t>
      </section>
      <section anchor="image-info">
        <name>Conventions for LogotypeImageInfo</name>
        <t>When the optional LogotypeImageInfo is included with a logotype
image, the parameters <bcp14>MUST</bcp14> be used with the following semantics and
restrictions.</t>
        <t>The xSize and ySize fields represent the recommended display size for
the logotype image.  When a value of 0 (zero) is present, no recommended
display size is specified.  When non-zero values are present and these
values differ from corresponding size values in the referenced image object,
then the referenced image <bcp14>SHOULD</bcp14> be scaled to fit within the size parameters
of LogotypeImageInfo, while preserving the x and y ratio.</t>
        <t>The resolution field is redundant for all logotype image formats
listed in <xref target="image-format"/>. The optional resolution field <bcp14>SHOULD</bcp14>
be omitted when the image format already contains this information.</t>
      </section>
      <section anchor="embedded-image">
        <name>Embedded Images</name>
        <t>If the logotype image is provided through direct addressing, then
the image <bcp14>MAY</bcp14> be stored within the logotype certificate extension using the
"data" scheme <xref target="RFC2397"/>.   The syntax of the "data" URI scheme
defined is included here for convenience:</t>
        <artwork><![CDATA[
   dataurl    := "data:" [ mediatype ] [ ";base64" ] "," data
   mediatype  := [ type "/" subtype ] *( ";" parameter )
   data       := *urlchar
   parameter  := attribute "=" value
]]></artwork>
        <t>When including the image data in the logotype extension using the
"data" URI scheme, the following conventions apply:</t>
        <ul spacing="normal">
          <li>The value of mediaType in LogotypeDetails <bcp14>MUST</bcp14> be identical to the
media type value in the "data" URL.</li>
          <li>The hash of the image <bcp14>MUST</bcp14> be included in logotypeHash and <bcp14>MUST</bcp14> be
calculated over the same data as it would have been, had the image
been referenced through a link to an external resource.</li>
        </ul>
        <t>NOTE: As the "data" URI scheme is processed as a data source rather
than as a URL, the image data is typically not limited by any
URL length limit settings that otherwise apply to URLs in general.</t>
        <t>NOTE: Implementations need to be cautious about the size of images
included in a certificate in order to ensure that the size of
the certificate does not prevent the certificate from being
used as intended.</t>
      </section>
      <section anchor="extn-other">
        <name>Other Logotypes</name>
        <t>Logotypes identified by otherLogos (as defined in <xref target="extn-format"/>) can be used to
enhance the display of logotypes and marks that represent partners,
products, services, or any other characteristic associated with the
certificate or its intended application environment when the standard
logotype types are insufficient.</t>
        <t>The conditions and contexts of the intended use of these logotypes
are defined at the discretion of the local client application.</t>
        <t>Three other logotype types are defined in the follow subsections.</t>
        <section anchor="extn-other-1">
          <name>Loyalty Logotype</name>
          <t>When a loyalty logotype appears in the otherLogos, it <bcp14>MUST</bcp14> be identified
by the id-logo-loyalty object identifier.</t>
          <artwork><![CDATA[
   id-logo OBJECT IDENTIFIER ::= { id-pkix 20 }

   id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }
]]></artwork>
          <t>A loyalty logotype, if present, <bcp14>MUST</bcp14> contain a logotype associated
with a loyalty program related to the certificate or its use.  The
relation between the certificate and the identified loyalty program
is beyond the scope of this document.  The logotype extension <bcp14>MAY</bcp14>
contain more than one Loyalty logotype.</t>
        </section>
        <section anchor="extn-other-2">
          <name>Certificate Background Logotype</name>
          <t>When a certificate background logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }
]]></artwork>
          <t>The certificate background logotype, if present, <bcp14>MUST</bcp14> contain a
graphical image intended as a background image for the certificate,
and/or a general audio sequence for the certificate.  The background
image <bcp14>MUST</bcp14> allow black text to be clearly read when placed on top of
the background image.  The logotype extension <bcp14>MUST NOT</bcp14> contain more
than one certificate background logotype.</t>
        </section>
        <section anchor="extn-other-3">
          <name>Certificate Image Logotype</name>
          <t>When a certificate image logotype appears in the otherLogos, it
<bcp14>MUST</bcp14> be identified by the id-logo-background object identifier.</t>
          <artwork><![CDATA[
   id-logo-certImage OBJECT IDENTIFIER ::= { id-logo 3 }
]]></artwork>
          <t>The certificate image logotype, if present, aids human interpretation
of a certificate by providing meaningful visual information to the
user interface (UI).  Typical situations when a human needs to examine
the visual representation of a certificate are:</t>
          <ul spacing="normal">
            <li>A person establishes a secured channel with an authenticated
service.  The person needs to determine the identity of the
service based on the authenticated credentials.</li>
            <li>A person validates the signature on critical information, such as
signed executable code, and needs to determine the identity of the
signer based on the signer's certificate.</li>
            <li>A person is required to select an appropriate certificate to be
used when authenticating to a service or Identity Management
infrastructure.  The person needs to see the available
certificates in order to distinguish between them in the selection
process.</li>
          </ul>
          <t>The display of certificate information to humans is challenging due
to lack of well-defined semantics for critical identity attributes.
Unless the application has out-of-band knowledge about a particular
certificate, the application will not know the exact nature of the
data stored in common identification attributes such as serialNumber,
organizationName, country, etc.  Consequently, the application can
display the actual data, but faces the problem of labeling that data
in the UI and informing the human about the exact nature (semantics)
of that data.  It is also challenging for the application to
determine which identification attributes are important to display
and how to organize them in a logical order.</t>
          <t>When present, the certificate image <bcp14>MUST</bcp14> be a complete visual
representation of the certificate.  This means that the display of
this certificate image represents all information about the
certificate that the issuer subjectively defines as relevant to show
to a typical human user within the typical intended use of the
certificate, giving adequate information about at least the following
three aspects of the certificate:</t>
          <ul spacing="normal">
            <li>Certificate Context</li>
            <li>Certificate Issuer</li>
            <li>Certificate Subject</li>
          </ul>
          <t>Certificate Context information is visual marks and/or textual
information that helps the typical user to understand the typical
usage and/or purpose of the certificate.</t>
          <t>It is up to the issuer to decide what information -- in the form of
text, graphical symbols, and elements -- represents a complete visual
representation of the certificate.  However, the visual
representation of Certificate Subject and Certificate Issuer
information from the certificate <bcp14>MUST</bcp14> have the same meaning as the
textual representation of that information in the certificate itself.</t>
          <t>Applications providing a Graphical User Interface (GUI) to the
certificate user <bcp14>MAY</bcp14> present a certificate image according to this
standard in any given application interface, as the only visual
representation of a certificate.</t>
        </section>
      </section>
    </section>
    <section anchor="cert-types">
      <name>Type of Certificates</name>
      <t>Logotypes <bcp14>MAY</bcp14> be included in public key certificates and attribute
certificates at the discretion of the certificate issuer; however,
logotypes <bcp14>MUST NOT</bcp14> be part of certification path validation or any
type of automated processing.  The sole purpose of logotypes is to
enhance the display of a particular certificate, regardless of its
position in a certification path.</t>
    </section>
    <section anchor="use-in-clients">
      <name>Use in Clients</name>
      <t>All PKI implementations require relying party software to have some
mechanism to determine whether a trusted CA issues a particular
certificate.  This is an issue for certification path validation,
including consistent policy and name checking.</t>
      <t>After a certification path is successfully validated, the replying
party trusts the information that the CA includes in the certificate,
including any certificate extensions.  The client software can choose
to make use of such information, or the client software can ignore
it.  If the client is unable to support a provided logotype, the client
<bcp14>MUST NOT</bcp14> report an error, rather the client <bcp14>MUST</bcp14> behave as though no
logotype extension was included in the certificate.  Current standards
do not provide any mechanism for cross-certifying CAs to constrain
subordinate CAs from including private extensions (see <xref target="sec-cons"/>).</t>
      <t>Consequently, if relying party software accepts a CA, then it should
be prepared to (unquestioningly) display the associated logotypes to
its human user, given that it is configured to do so.  Information
about the logotypes is provided so that the replying party software
can select the one that will best meet the needs of the human
user.  This choice depends on the abilities of the human user, as well as
the
capabilities of the platform on which the replaying party software is
running.  If none of the provided logotypes meets the needs of the
human user or matches the capabilities of the platform, then the
logotypes can be ignored.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose to display none, one, or
any number of the logotypes in the logotype extension.  In many cases,
a client will be used in an environment with a good
network connection and also used in an environment with little or no
network connectivity.  For example, a laptop computer can be docked
with a high-speed LAN connection, or it can be disconnected from the
network altogether.  In recognition of this situation, the client <bcp14>MUST</bcp14>
include the ability to disable the fetching of logotypes.  However,
locally cached logotypes can still be displayed when the user
disables the fetching of additional logotypes.</t>
      <t>A client <bcp14>MAY</bcp14>, subject to local policy, choose any combination of
audio and image presentation for each logotype.  That is, the client
<bcp14>MAY</bcp14> display an image with or without playing a sound, and it <bcp14>MAY</bcp14> play
a sound with or without displaying an image.  A client <bcp14>MUST NOT</bcp14> play
more than one logotype audio sequence at the same time.</t>
      <t>The logotype is to be displayed in conjunction with other identity
information contained in the certificate.  The logotype is not a
replacement for this identity information.</t>
      <t>Care is needed when designing replying party software to ensure that an
appropriate context of logotype information is provided.  This is
especially difficult with audio logotypes.  It is important that the
human user be able to recognize the context of the logotype, even if
other audio streams are being played.</t>
      <t>If the relying party software is unable to successfully validate a
particular certificate, then it <bcp14>MUST NOT</bcp14> display any logotype data
associated with that certificate.</t>
    </section>
    <section anchor="image-format">
      <name>Image Formats</name>
      <t>Animated images <bcp14>SHOULD NOT</bcp14> be used.</t>
      <t>The following table lists many commons image formats and their
corresponding MIME type.  The table also indicates which of the
image formats must be supported by implementations.  The filename
extensions commonly used for each of these formats is also provided.
Implementations <bcp14>MAY</bcp14> support other image formats.</t>
      <table anchor="image-format-table">
        <name>Image Formats</name>
        <thead>
          <tr>
            <th align="left">Format</th>
            <th align="left">MIME Type</th>
            <th align="left">.ext</th>
            <th align="left">References</th>
            <th align="left">Implement?</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">JPEG</td>
            <td align="left">image/jpeg</td>
            <td align="left">.jpg<br/>.jpeg</td>
            <td align="left">
              <xref target="JPEG"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">GIF</td>
            <td align="left">image/gif</td>
            <td align="left">.gif</td>
            <td align="left">
              <xref target="GIF"/><br/><xref target="RFC2046"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG</td>
            <td align="left">image/svg+xml</td>
            <td align="left">.svg</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">SVG + GZIP</td>
            <td align="left">image/svg+xml-compressed</td>
            <td align="left">.svgz<br/>.svg.gz</td>
            <td align="left">
              <xref target="SVGT"/><br/><xref target="SVGZR"/></td>
            <td align="left">
              <bcp14>MUST</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PNG</td>
            <td align="left">image/png</td>
            <td align="left">.png</td>
            <td align="left">
              <xref target="ISO15948"/><br/><xref target="PNGR"/></td>
            <td align="left">
              <bcp14>SHOULD</bcp14> support</td>
          </tr>
          <tr>
            <td align="left">PDF</td>
            <td align="left">application/pdf</td>
            <td align="left">.pdf</td>
            <td align="left">
              <xref target="ISO32000"/><br/><xref target="ISO19005"/><br/><xref target="RFC3778"/></td>
            <td align="left">
              <bcp14>MAY</bcp14> support</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The image/svg+xml-compressed media type is widely implemented, but it
has not yet been registered with IANA.</t>
      <t>When a Scalable Vector Graphics (SVG) image is used, whether the image is
compressed or not, the SVG Tiny profile <xref target="SVGT"/> <bcp14>MUST</bcp14> be followed, with
these additional restrictions:</t>
      <ul spacing="normal">
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any Internationalized Resource
Identifier (IRI) references to information stored outside of the
SVG image of type B, C, or D, according to Section 14.1.4 of <xref target="SVGT"/>.</li>
        <li>The SVG image <bcp14>MUST NOT</bcp14> contain any 'script' element, according to
Section 15.2 of <xref target="SVGT"/>.</li>
        <li>The XML structure in the SVG file <bcp14>MUST</bcp14> use linefeed (0x0A) as
the end-of-line (EOL) character when calculating a hash over the
SVG image.</li>
      </ul>
      <t>When a GZIP-compressed SVG image is fetched with HTTP, the 
client will receive response that includes these headers:</t>
      <artwork><![CDATA[
   Content-Type: image/svg+xml
   Content-Encoding: gzip
]]></artwork>
      <t>In this case, the octet stream of type image/svg+xml is compressed with
GZIP <xref target="RFC1952"/> as specified in <xref target="SVGR"/>.</t>
      <t>When a uncompressed SVG image is fetched with HTTP, the client will receive
response with the same Content-Type header, but no Content-Encoding header.</t>
      <t>Whether the SVG image is GZIP-compressed or uncompressed, the hash value for
the SVG image is calculated over the uncompressed SVG content with
canonicalized EOL characters as specified above.</t>
      <t>When a SVG image is embedded in the certificate extension using the
"data" URL scheme, the SVG image data <bcp14>MUST</bcp14> be provided in GZIP-compressed
form, and the XML structure, prior to compression, <bcp14>SHOULD</bcp14> use linefeed
(0x0A) as the end-of-line (EOL) character.</t>
      <t>When a bitmapped image is used, the PNG <xref target="ISO15948"/> format <bcp14>SHOULD</bcp14> be used.</t>
      <t>When a Portable Document Format (PDF) document according to <xref target="ISO32000"/>
is used, it <bcp14>MUST</bcp14> also be formatted according to the profile PDF/A <xref target="ISO19005"/>.</t>
    </section>
    <section anchor="audio-format">
      <name>Audio Formats</name>
      <t>Implementations that support audio <bcp14>MUST</bcp14> support the MP3 audio format
<xref target="MP3"/> with a MIME type of "audio/mpeg" <xref target="RFC3003"/>.
Implementations <bcp14>MAY</bcp14> support other audio formats.</t>
    </section>
    <section anchor="sec-cons">
      <name>Security Considerations</name>
      <t>Implementations that simultaneously display multiple logotype types
(subject organization, issuer, community, or other), <bcp14>MUST</bcp14> ensure that
there is no ambiguity as to the binding between the image and the
type of logotype that the image represents.  "Logotype type" is
defined in <xref target="cert-ident"/>, and it refers to the type
of entity or affiliation represented by the logotype, not the
of binary format if the image or audio.</t>
      <t>Logotypes are very difficult to securely and accurately define.  Names
are also difficult in this regard, but logotypes are even worse.  It
is quite difficult to specify what is, and what is not, a legitimate
logotype of an organization.  There is an entire legal structure around
this issue, and it will not be repeated here.  However, issuers should
be aware of the implications of including images associated with a
trademark or servicemark before doing so.  As logotypes can be
difficult (and sometimes expensive) to verify, the possibility of errors
related to assigning wrong logotypes to organizations is increased.</t>
      <t>This is not a new issue for electronic identification instruments.  It
is already dealt with in a number of similar situations in the
physical world, including physical employee identification cards.  In
addition, there are situations where identification of logotypes is
rather simple and straightforward, such as logotypes for well-known
industries and institutes.  These issues should not stop those service
providers who want to issue logotypes from doing so, where relevant.</t>
      <t>It is impossible to prevent fraudulent creation of certificates by
dishonest or badly performing issuers, containing names and logotypes
that the issuer has no claim to or has failed to check correctly.  Such
certificates could be created in an attempt to socially engineer a user
into accepting a certificate.  The premise used for the logotype work is
thus that logotype graphics in a certificate are trusted only if the
certificate is successfully validated within a valid path.  It is thus
imperative that the representation of any certificate that fails to
validate is not enhanced in any way by using the logotype data.</t>
      <t>This underlines the necessity for CAs to provide reliable services,
and the relying party's responsibility and need to carefully select
which CAs are trusted to provide public key certificates.</t>
      <t>This also underlines the general necessity for relying parties to use
up-to-date software libraries to render or dereference data from
external sources, including logotype data in certificates, to minimize
risks related to processing potentially malicious data before it has been
adequately verified and validated.</t>
      <t>Referenced image objects are hashed in order to bind the image to the
signature of the certificate.  Some image types, such as SVG, allow
part of the image to be collected from an external source by
incorporating a reference to an external file that contains the image.  If
this feature were used within a logotype image, the hash of the image
would only cover the URI reference to the external image file, but
not the referenced image data.  Clients <bcp14>SHOULD</bcp14> verify that SVG
images meet all requirements listed in <xref target="image-format"/> and reject
images that contain references to external data.</t>
      <t>Logotype data is fetched from a server when it is needed.  By watching
activity on the network, an observer can determine which clients are
making use of certificates that contain particular logotype data.  This
observation can potentially introduce privacy issues.  Since clients are
expected to locally cache logotype data, network traffic to the server
containing the logotype data will not be generated every time the
certificate is used.  In cases where logotype data is not cashed,
monitoring would reveal usage frequency.  In cases where logotype data is
cached, monitoring would reveal when a certain logotype image or audio
sequence is used for the first time.</t>
      <t>CAs issuing certificates with embedded logotype images should be
cautious when accepting graphics from the certificate requestor for
inclusion in the certificate if the hash algorithm used to sign the
certificate is vulnerable to collision attacks.  In such a case, the
accepted image may contain data that could help an attacker to obtain
colliding certificates with identical certificate signatures.</t>
      <t>Certificates, and hence their logotype images, are commonly public
objects and as such usually will not contain privacy-sensitive
information.  However, when a logotype image that is referenced
from a certificate contains privacy-sensitive information,
appropriate security controls should be in place to protect the
privacy of that information.  Details of such controls are outside
the scope of this document.</t>
      <t>Certification paths may also impose name constraints that are
systematically checked during certification path processing, which,
in theory, may be circumvented by logotypes.</t>
      <t>Certificate path processing as defined in <xref target="RFC5280"/> does not constrain
the inclusion of logotype data in certificates.  A
parent CA can constrain certification path validation such that
subordinate CAs cannot issue valid certificates to end-entities outside a
limited name space or outside specific certificate polices.  A malicious
CA can comply with these name and policy requirements and still include
inappropriate logotypes in the certificates that it issues.  These
certificates will pass the certification path validation algorithm, which
means the client will trust the logotypes in the certificates.  Since
there is no technical mechanism to prevent or control subordinate CAs
from including the logotype extension or its contents, where appropriate,
a parent CA could employ a legal agreement to impose a suitable
restriction on the subordinate CA.  This situation is not unique to the
logotype extension.</t>
      <t>The controls available to a parent CA to protect itself from rogue
subordinate CAs are non-technical.  They include:</t>
      <ul spacing="normal">
        <li>Contractual agreements of suitable behavior, including
terms of liability in case of material breach.</li>
        <li>Control mechanisms and procedures to monitor and
follow-up behavior of subordinate CAs.</li>
        <li>Use of certificate policies to declare an assurance level
of logotype data, as well as to guide applications on how
to treat and display logotypes.</li>
        <li>Use of revocation functions to revoke any misbehaving CA.</li>
      </ul>
      <t>There is not a simple, straightforward, and absolute technical
solution.  Rather, involved parties must settle some aspects of PKI
outside the scope of technical controls.  As such, issuers need to
clearly identify and communicate the associated risks.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>For the new ASN.1 Module in <xref target="asn1-mod-new"/>, IANA
is requested to assign an object identifier (OID) for the module
identifier. The OID for the module should be allocated in the "SMI
Security for PKIX Module Identifier" registry (1.3.6.1.5.5.7.0).</t>
    </section>
    <section anchor="acks">
      <name>Acknowledgments</name>
      <section anchor="acks-rfc3709">
        <name>Acknowledgments from RFC 3709</name>
        <t>This document is the result of contributions from many
professionals.  The authors appreciate contributions from all members
of the IETF PKIX Working Group.  We extend a special thanks to Al
Arsenault, David Cross, Tim Polk, Russel Weiser, Terry Hayes, Alex
Deacon, Andrew Hoag, Randy Sabett, Denis Pinkas, Magnus Nystrom, Ryan
Hurst, and Phil Griffin for their efforts and support.</t>
        <t>Russ Housley thanks the management at RSA Laboratories, especially
Burt Kaliski, who supported the development of this specification.  The
vast majority of the work on this specification was done while
Russ was employed at RSA Laboratories.</t>
      </section>
      <section anchor="acks-rfc6170">
        <name>Acknowledgments from RFC 6170</name>
        <t>The authors recognize valuable contributions from members of the PKIX
working group, the CA Browser Forum, and James Manger, for their
review and sample data.</t>
      </section>
      <section anchor="acks-additional">
        <name>Additional Acknowledgments</name>
        <t>Combining RFC 3709 and RFC 6170 has produced an improved
specification.  The authors appreciate contributions from all members
of the IETF LAMPS Working Group.  We extend a special thanks to
Corey Bonnell for his carefule review and comments.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5755" target="https://www.rfc-editor.org/info/rfc5755">
          <front>
            <title>An Internet Attribute Certificate Profile for Authorization</title>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2010"/>
            <abstract>
              <t>This specification defines a profile for the use of X.509 Attribute Certificates in Internet Protocols.  Attribute certificates may be used in a wide range of applications and environments covering a broad spectrum of interoperability goals and a broader spectrum of operational and assurance requirements.  The goal of this document is to establish a common baseline for generic applications requiring broad interoperability as well as limited special purpose requirements.  The profile places emphasis on attribute certificate support for Internet electronic mail, IPsec, and WWW security applications.  This document obsoletes RFC 3281.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5755"/>
          <seriesInfo name="DOI" value="10.17487/RFC5755"/>
        </reference>
        <reference anchor="RFC7540" target="https://www.rfc-editor.org/info/rfc7540">
          <front>
            <title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
            <author fullname="M. Belshe" initials="M." surname="Belshe">
              <organization/>
            </author>
            <author fullname="R. Peon" initials="R." surname="Peon">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t>
              <t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7540"/>
          <seriesInfo name="DOI" value="10.17487/RFC7540"/>
        </reference>
        <reference anchor="RFC8740" target="https://www.rfc-editor.org/info/rfc8740">
          <front>
            <title>Using TLS 1.3 with HTTP/2</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin">
              <organization/>
            </author>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document updates RFC 7540 by forbidding TLS 1.3 post-handshake authentication, as an analog to the existing TLS 1.2 renegotiation restriction.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8740"/>
          <seriesInfo name="DOI" value="10.17487/RFC8740"/>
        </reference>
        <reference anchor="RFC2396" target="https://www.rfc-editor.org/info/rfc2396">
          <front>
            <title>Uniform Resource Identifiers (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee">
              <organization/>
            </author>
            <author fullname="R. Fielding" initials="R." surname="Fielding">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>This document defines a grammar that is a superset of all valid URI, such that an implementation can parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier type.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2396"/>
          <seriesInfo name="DOI" value="10.17487/RFC2396"/>
        </reference>
        <reference anchor="RFC2397" target="https://www.rfc-editor.org/info/rfc2397">
          <front>
            <title>The "data" URL scheme</title>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="August" year="1998"/>
            <abstract>
              <t>A new URL scheme, "data", is defined. It allows inclusion of small data items as "immediate" data, as if it had been included externally. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2397"/>
          <seriesInfo name="DOI" value="10.17487/RFC2397"/>
        </reference>
        <reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein">
              <organization/>
            </author>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC3003" target="https://www.rfc-editor.org/info/rfc3003">
          <front>
            <title>The audio/mpeg Media Type</title>
            <author fullname="M. Nilsson" initials="M." surname="Nilsson">
              <organization/>
            </author>
            <date month="November" year="2000"/>
            <abstract>
              <t>The audio layers of the MPEG-1 and MPEG-2 standards are in frequent use on the internet, but there is no uniform Multipurpose Internet Mail Extension (MIME) type for these files.  The intention of this document is to define the media type audio/mpeg to refer to this kind of contents.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3003"/>
          <seriesInfo name="DOI" value="10.17487/RFC3003"/>
        </reference>
        <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
          <front>
            <title>Tags for Identifying Languages</title>
            <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips">
              <organization/>
            </author>
            <author fullname="M. Davis" initials="M." role="editor" surname="Davis">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object.  It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange.  This document  specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="47"/>
          <seriesInfo name="RFC" value="5646"/>
          <seriesInfo name="DOI" value="10.17487/RFC5646"/>
        </reference>
        <reference anchor="RFC4288" target="https://www.rfc-editor.org/info/rfc4288">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in MIME and other Internet protocols.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4288"/>
          <seriesInfo name="DOI" value="10.17487/RFC4288"/>
        </reference>
        <reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker">
              <organization/>
            </author>
            <author fullname="P. Overell" initials="P." surname="Overell">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC1952" target="https://www.rfc-editor.org/info/rfc1952">
          <front>
            <title>GZIP file format specification version 4.3</title>
            <author fullname="P. Deutsch" initials="P." surname="Deutsch">
              <organization/>
            </author>
            <date month="May" year="1996"/>
            <abstract>
              <t>This specification defines a lossless compressed data format that is compatible with the widely used GZIP utility.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1952"/>
          <seriesInfo name="DOI" value="10.17487/RFC1952"/>
        </reference>
        <reference anchor="NEW-ASN1" target="https://www.itu.int/rec/T-REC-X.680">
          <front>
            <title>Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2021" month="February"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="X.680"/>
          <seriesInfo name="ISO/IEC" value="8824-1:2021"/>
        </reference>
        <reference anchor="SVGT" target="http://www.w3.org/TR/2008/PR-SVGTiny12-20081117">
          <front>
            <title>Scalable Vector Graphics (SVG) Tiny 1.2 Specification</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date year="2008" month="November" day="17"/>
          </front>
          <seriesInfo name="W3C" value="PR-SVGTiny12-20081117"/>
        </reference>
        <reference anchor="ISO15948">
          <front>
            <title>Information technology -- Computer graphics and image processing -- Portable Network Graphics (PNG): Functional specification</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2004"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15948:2004"/>
        </reference>
        <reference anchor="JPEG">
          <front>
            <title>Information technology -- Digital compression and coding of continuous-tone still images: JPEG File Interchange Format (JFIF)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2011" month="May"/>
          </front>
          <seriesInfo name="ITU-T Recommendation" value="T.871"/>
          <seriesInfo name="ISO/IEC" value="10918-5:2013"/>
        </reference>
        <reference anchor="GIF" target="https://www.w3.org/Graphics/GIF/spec-gif89a.txt">
          <front>
            <title>Graphics Interchange Format</title>
            <author>
              <organization>CompuServe Incorporated</organization>
            </author>
            <date year="1990" month="July" day="31"/>
          </front>
          <seriesInfo name="Version" value="89a"/>
        </reference>
        <reference anchor="MP3">
          <front>
            <title>Information technology -- Generic coding of moving pictures and associated audio information -- Part 3: Audio</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="ISO/IEC" value="13818-3:1998"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5912" target="https://www.rfc-editor.org/info/rfc5912">
          <front>
            <title>New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>The Public Key Infrastructure using X.509 (PKIX) certificate format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates those ASN.1 modules to conform to the 2002 version of ASN.1. There are no bits-on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5912"/>
          <seriesInfo name="DOI" value="10.17487/RFC5912"/>
        </reference>
        <reference anchor="RFC6268" target="https://www.rfc-editor.org/info/rfc6268">
          <front>
            <title>Additional New ASN.1 Modules for the Cryptographic Message Syntax (CMS) and the Public Key Infrastructure Using X.509 (PKIX)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="July" year="2011"/>
            <abstract>
              <t>The Cryptographic Message Syntax (CMS) format, and many associated formats, are expressed using ASN.1.  The current ASN.1 modules conform to the 1988 version of ASN.1.  This document updates some auxiliary ASN.1 modules to conform to the 2008 version of ASN.1; the 1988 ASN.1 modules remain the normative version.  There are no bits- on-the-wire changes to any of the formats; this is simply a change to the syntax.  This document is not an Internet Standards Track  specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6268"/>
          <seriesInfo name="DOI" value="10.17487/RFC6268"/>
        </reference>
        <reference anchor="RFC3778" target="https://www.rfc-editor.org/info/rfc3778">
          <front>
            <title>The application/pdf Media Type</title>
            <author fullname="E. Taft" initials="E." surname="Taft">
              <organization/>
            </author>
            <author fullname="J. Pravetz" initials="J." surname="Pravetz">
              <organization/>
            </author>
            <author fullname="S. Zilles" initials="S." surname="Zilles">
              <organization/>
            </author>
            <author fullname="L. Masinter" initials="L." surname="Masinter">
              <organization/>
            </author>
            <date month="May" year="2004"/>
            <abstract>
              <t>PDF, the 'Portable Document Format', is a general document representation language that has been in use for document exchange on the Internet since 1993.  This document provides an overview of the PDF format, explains the mechanisms for digital signatures and encryption within PDF files, and updates the media type registration of 'application/pdf'.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3778"/>
          <seriesInfo name="DOI" value="10.17487/RFC3778"/>
        </reference>
        <reference anchor="OLD-ASN1" target="https://www.itu.int/rec/T-REC-X.208/en">
          <front>
            <title>Specification of Abstract Syntax Notation One (ASN.1)</title>
            <author>
              <organization>CCITT</organization>
            </author>
            <date year="1988" month="November"/>
          </front>
          <refcontent>CCITT Recommendation X.208</refcontent>
        </reference>
        <reference anchor="ISO19005">
          <front>
            <title>Document management -- Electronic document file format for long-term preservation -- Part 1: Use of PDF 1.4 (PDF/A-1)</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2005"/>
          </front>
          <seriesInfo name="ISO" value="19005-1:2005"/>
        </reference>
        <reference anchor="ISO32000">
          <front>
            <title>Document management -- Portable document format -- Part 1: PDF 1.7</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2008"/>
          </front>
          <seriesInfo name="ISO" value="32000-1:2008"/>
        </reference>
        <reference anchor="SVGR" target="https://www.iana.org/assignments/media-types/image/svg+xml">
          <front>
            <title>Media Type Registration for image/svg+xml</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="SVGZR" target="https://github.com/w3c/svgwg/issues/701">
          <front>
            <title>A separate MIME type for svgz files is needed</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="PNGR" target="https://www.iana.org/assignments/media-types/image/png">
          <front>
            <title>Media Type Registration for image/png</title>
            <author>
              <organization>World Wide Web Consortium</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <section anchor="asn1-mods">
      <name>ASN.1 Modules</name>
      <section anchor="asn1-mod-old">
        <name>ASN.1 Modules with 1988 Syntax</name>
        <t>This appendix contains two ASN.1 modules, both using the old
syntax <xref target="OLD-ASN1"/>.</t>
        <t>The first ASN.1 module provides the syntax for the Logotype certificate
extension.  Only comments have changed in the module from RFC 3709, and
the IMPORTS now come from <xref target="RFC5280"/>.</t>
        <t>The second ASN.1 module provides the Certificate Image
object identifier.  The module is unchanged from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(22) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
   AlgorithmIdentifier FROM PKIX1Explicit88 -- RFC 5280
     { iso(1) identified-organization(3) dod(6) internet(1)
       security(5) mechanisms(5) pkix(7) id-mod(0)
       id-pkix1-explicit(18) };

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }


-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }

-- Note: At least one of the OPTIONAL components MUST be present

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets
   playTime        INTEGER,  -- In milliseconds
   channels        INTEGER,  -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contain DER-encoded
--       LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier,
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

END


CERT-IMAGE-MODULE { iso(1) identified-organization(3) dod(6)
    internet(1) security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype-certimage(68) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

EXPORTS ALL;   -- export all items from this module

id-logo-certImage  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-logo(20) 3 }

END
]]></sourcecode>
      </section>
      <section anchor="asn1-mod-new">
        <name>ASN.1 Module with 1997 Syntax</name>
        <t>Some developers like to use the latest version of ASN.1 standards.  This
appendix provides an ASN.1 module to assist in that goal.  It uses the ASN.1
syntax defined in <xref target="NEW-ASN1"/>, and it follows the conventions
established in <xref target="RFC5912"/> and <xref target="RFC6268"/>.</t>
        <t>This ASN.1 module incorporates the module from RFC 3709 and the module
from RFC 6170.</t>
        <sourcecode type="asn.1" markers="true"><![CDATA[
LogotypeCertExtn
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-logotype(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) }

  AlgorithmIdentifier{}, DIGEST-ALGORITHM
  FROM AlgorithmInformation-2009
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;


-- Logotype Extension

ext-logotype EXTENSION ::= {
   SYNTAX LogotypeExtn
   IDENTIFIED BY id-pe-logotype }

-- Logotype Extension OID

id-pe-logotype  OBJECT IDENTIFIER  ::=
   { iso(1) identified-organization(3) dod(6) internet(1)
     security(5) mechanisms(5) pkix(7) id-pe(1) 12 }

-- Logotype Extension Syntax

LogotypeExtn ::= SEQUENCE {
   communityLogos  [0] EXPLICIT SEQUENCE OF LogotypeInfo OPTIONAL,
   issuerLogo      [1] EXPLICIT LogotypeInfo OPTIONAL,
   subjectLogo     [2] EXPLICIT LogotypeInfo OPTIONAL,
   otherLogos      [3] EXPLICIT SEQUENCE OF OtherLogotypeInfo
                          OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., communityLogos PRESENT } |
        WITH COMPONENTS { ..., issuerLogo PRESENT } |
        WITH COMPONENTS { ..., subjectLogo PRESENT } |
        WITH COMPONENTS { ..., otherLogos PRESENT } )

LogotypeInfo ::= CHOICE {
   direct          [0] LogotypeData,
   indirect        [1] LogotypeReference }

LogotypeData ::= SEQUENCE {
   image           SEQUENCE OF LogotypeImage OPTIONAL,
   audio           [1] SEQUENCE OF LogotypeAudio OPTIONAL }
      -- At least one of the OPTIONAL components MUST be present
      ( WITH COMPONENTS { ..., image PRESENT } |
        WITH COMPONENTS { ..., audio PRESENT } )

LogotypeImage ::= SEQUENCE {
   imageDetails    LogotypeDetails,
   imageInfo       LogotypeImageInfo OPTIONAL }

LogotypeAudio ::= SEQUENCE {
   audioDetails    LogotypeDetails,
   audioInfo       LogotypeAudioInfo OPTIONAL }

LogotypeDetails ::= SEQUENCE {
   mediaType       IA5String, -- MIME media type name and optional
                              -- parameters
   logotypeHash    SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   logotypeURI     SEQUENCE SIZE (1..MAX) OF IA5String }

LogotypeImageInfo ::= SEQUENCE {
   type            [0] LogotypeImageType DEFAULT color,
   fileSize        INTEGER,  -- In octets
   xSize           INTEGER,  -- Horizontal size in pixels
   ySize           INTEGER,  -- Vertical size in pixels
   resolution      LogotypeImageResolution OPTIONAL,
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

LogotypeImageType ::= INTEGER { grayScale(0), color(1) }

LogotypeImageResolution ::= CHOICE {
   numBits         [1] INTEGER,   -- Resolution in bits
   tableSize       [2] INTEGER }  -- Number of colors or grey tones

LogotypeAudioInfo ::= SEQUENCE {
   fileSize        INTEGER,  -- In octets
   playTime        INTEGER,  -- In milliseconds
   channels        INTEGER,  -- 1=mono, 2=stereo, 4=quad
   sampleRate      [3] INTEGER OPTIONAL,  -- Samples per second
   language        [4] IA5String OPTIONAL }  -- RFC 5646 Language Tag

OtherLogotypeInfo ::= SEQUENCE {
   logotypeType    OBJECT IDENTIFIER,
   info            LogotypeInfo }

LogotypeReference ::= SEQUENCE {
   refStructHash   SEQUENCE SIZE (1..MAX) OF HashAlgAndValue,
   refStructURI    SEQUENCE SIZE (1..MAX) OF IA5String }
                    -- Places to get the same LogotypeData
                    -- image or audio object

-- Note: The referenced LogotypeData binary file contain DER-encoded
--       LogotypeData type

HashAlgAndValue ::= SEQUENCE {
   hashAlg         AlgorithmIdentifier{DIGEST-ALGORITHM, {...}},
   hashValue       OCTET STRING }

-- Other logotype type OIDs

id-logo OBJECT IDENTIFIER ::= { iso(1) identified-organization(3)
   dod(6) internet(1) security(5) mechanisms(5) pkix(7) 20 }

id-logo-loyalty    OBJECT IDENTIFIER ::= { id-logo 1 }

id-logo-background OBJECT IDENTIFIER ::= { id-logo 2 }

id-logo-certImage  OBJECT IDENTIFIER  ::= { id-logo 3 }

END
]]></sourcecode>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <section anchor="example-rfc3709">
        <name>Example from RFC 3709</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/gif.  The logotype image is referenced through
one URI and the image is hashed with SHA-1.  This example
is unchanged from RFC 3709, except that shallow indenting is used to
keep the example within traditional margins.  The use of SHA-1 was
reasonable at the time that RFC 3709 was published, but many better
choices are available today.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 106: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04  94:  OCTET STRING, encapsulates {
30  92:   SEQUENCE {
A1  90:    [1] {
A0  88:     [0] {
30  86:      SEQUENCE {
30  84:       SEQUENCE {
30  82:        SEQUENCE {
16   9:         IA5String 'image/gif'
30  33:         SEQUENCE {
30  31:          SEQUENCE {
30   7:           SEQUENCE {
06   5:            OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
      :             }
04  20:           OCTET STRING
      :            8F E5 D3 1A 86 AC 8D 8E 6B C3 CF 80 6A D4 48 18
      :            2C 7B 19 2E
      :            }
      :           }
30  34:         SEQUENCE {
16  32:          IA5String 'http://logo.example.com/logo.gif'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-new">
        <name>Issuer Logotype Example</name>
        <t>The following example displays a logotype extension containing one
Issuer logotype using direct addressing.  The issuer logotype image is
of the type image/jpeg.  The logotype image is referenced through
one URI and the image is hashed with SHA-256.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 124: SEQUENCE {
06   8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 112:  OCTET STRING, encapsulates {
30 110:   SEQUENCE {
A1 108:    [1] {
A0 106:     [0] {
30 104:      SEQUENCE {
30 102:       SEQUENCE {
30 100:        SEQUENCE {
16  10:         IA5String 'image/jpeg'
30  49:         SEQUENCE {
30  47:          SEQUENCE {
30  11:           SEQUENCE {
06   9:            OBJECT IDENTIFIER
      :             sha-256 (2 16 840 1 101 3 4 2 1)
      :             }
04  32:           OCTET STRING
      :            1E 8F 96 FD D3 50 53 EF C6 1C 9F FC F0 00 2E 53
      :            B4 9C 24 9A 32 C5 E9 0C 2C 39 39 D3 AD 6D A9 09
      :            }
      :           }
30  35:         SEQUENCE {
16  33:          IA5String 'http://logo.example.com/logo.jpeg'
      :           }
      :          }
      :         }
      :        }
      :       }
      :      }
      :     }
      :    }
      :   }
]]></artwork>
      </section>
      <section anchor="example-embed">
        <name>Embedded Image Example</name>
        <t>The following example displays a logotype extension containing one
Subject logotype using direct addressing.  The subject logotype image
uses image/svg+xml-compressed.  The logotype image is embedded in the
certificate extension with a "data:" URI and the image is hashed by
SHA-256.  This technique produces a large certificate extension, but
offers reduced latency and improved privacy.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2160: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2146:  OCTET STRING, encapsulates {
30 2142:   SEQUENCE {
A2 2138:    [2] {
A0 2134:     [0] {
30 2130:      SEQUENCE {
30 2126:       SEQUENCE {
30 2122:        SEQUENCE {
16   24:         IA5String 'image/svg+xml-compressed'
30   49:         SEQUENCE {
30   47:          SEQUENCE {
30   11:           SEQUENCE {
06    9:            OBJECT IDENTIFIER
       :             sha-256 (2 16 840 1 101 3 4 2 1)
       :             }
04   32:           OCTET STRING
       :           C5 AC 94 1A 0A 25 1F B3 16 6F 97 C5 52 40 9B 49
       :           9E 7B 92 61 5A B0 A2 6C 19 BF B9 D8 09 C5 D9 E7
       :            }
       :           }
30 2041:         SEQUENCE {
16 2037:          IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICIGpy2E'
       :          'AA2xvZ28tY29weS5zdmcApVbbbhs3EH3nV0y3Lw2Q9fK2JLe'
       :          'wHDROUBRo2iBxW+RRlTa2UFkypIWV5ut7zlB2UqF9cuLlUkt'
       :          'yLmfOzPD8xafbtdyPu/1qu5k17sw2sp/mm+V8vd2Ms2azbV5'
       :          'cmPNvXv16efXh7WvZ31/L299e/vzTpTRt1/0RLrvu1dUref/'
       :          '7j+KtdXawsete/9IYaW6m6e77rjscDmeHcLbdXXdX7zpu6t6'
       :          '9vmxxon08AREdRDt7tpyWDRRSz7+tgp2b/ew/hEKI5WGoPKy'
       :          'W082s8SmeWf13NzVyM66ub6ZZk+xXH+9X4+Hl9tOssWLly35'
       :          '53ARpd7txP+7uxx/2d+NiejefVttZ8+nNavkBj9yO40RLb8d'
       :          'pvpxP8wtzuRvn07iUP/+Wu+20my9GcWfOPpfDbjVN44YLb8d'
       :          'p3Mn7cb3aXGNCAICCc+a8+yLo/FpwfLP/uN3dzhqdriH5uwf'
       :          'bnj9a+Uz2i/maK66utA+zZ435uFqvZ823R38Q1t32Lw3pZqT'
       :          'hd/PpRpaz5o2LNkocvCzaIm0vrQvSpog359lLy3my0ga+e3H'
       :          'p+B4InjVFPD9awdhnrGEFW30Sl/Pnpvta2QBVxUEVxFbJ2VU'
       :          'FfYC01pUs+O4GK84V/k6CHUFyhvhiDVQF8Y5aPDbmnsrXbS7'
       :          '4DANjguwgENZLPwjUYVTRJQgEpiLR0ctiWj+Ig8rCvZAArxK'
       :          'ExEEWMJLqMA1F+ggnsQDXgpQeomJPCVhtCRycNrAWxgAI+g1'
       :          'Qsr6IUxlomBswjydYBEgOeVCDoRreBjiFjX2SdSA60BP5DgQ'
       :          'M63xoPlWHbNq+egAEeAzxyNAdCQz+sDEMOhaGisKJdSlS6gt'
       :          'WWm4M1rQwP0egEBIhhFLoXuCJhR4mT5RJBaiLKqqFROUEzYr'
       :          '1idG0gahwCzEnk+AMJLdp0FevQQ6VZ+SKOwGlOIJOh1MVjo0'
       :          'eB6DRA10SRpSY6il/eFFKAm+MKSIWNFqSo4OFnORfwH5wJHC'
       :          'MNM0qlDRlcIwUEkDlgiSBhiEpBgMKOx5FdAYqI3KYewKKkAI'
       :          'tTABTkp5khI86kgbOgRywEBR0VGcwAjf8t9wqvdUMG6gLAbI'
       :          '0QQ8CbzCTtCSn/DEhCbm++duQaiRG1mQkdWHnminHA+r5wpL'
       :          'vsJbCALUKsDW5NAj43J+AD5vpfamUzJqiRJACmCWwIMhQq4H'
       :          'mYGKaiiJPmIvpS80UzTtAjdSraApQZogslgFcJHw0y5WoEXD'
       :          'Yr/aTqfxk2qhcg3z6ETQL+S18llvHOZQvlEOVEVpzqCozE9V'
       :          '6JZhh/lCslg7mUFY4AR7IlcApmgV6gz3DCSDe56fQ0SRS7el'
       :          '0NJWO8mQ6mkc6ylPpaL7QUZ5IR/M/dEwoJiEp+L6iT4cdSyI'
       :          'p4ljDkoaZpQlgMoz0ApahjTiTWbZYu9v+MUqVjY61j2Bxr68'
       :          'bPF3uS1232qAyAQDMhr4MRyVZq5l2QcuwgY/oTozbgoIKycH'
       :          '+yQxhzQsPJQ/ne9OmRKvYH1AeKA/EQRtzrmaYUiHUhpJOW4b'
       :          'reSaxZ/TVc3ZAQJKOagAJiw6pRHVkBMIBa5E+SUMWi0ZNW1R'
       :          'fn/xQXywHXyMHN5G8WF6gZ2IVjANHMIJQ1lAJQE8MJjZHJiU'
       :          'tQZAWzmkisDywTVWSqLkkQG2NNB3wwyaerqRGLNKpvwUOhaQ'
       :          'FiYcqviSjvp1n8WnRRzXFs9IXDxiiDd8HU/ROoAGn9+QgTPE'
       :          'Vu6HaN6i0VPuv1SCzwyZeHwBA1EjFYoAk2jJ3OFeJ5Gp1E+3'
       :          'Dlf3Aj70bbvmag5oyKHunVyGPq6+EnvTua/JUn3iadMHlqUa'
       :          'psK2T8SwCBJUF1JnEmhu0ntBthJoQpZqumsBk5mA1hRc0LR5'
       :          'ZFerdjksaCqt3IUWXcXW16vb6xdWyHLTgCaKXWKUKK1kOp9H'
       :          'K5B3ELjSdXb0loB5RYtS01L6h9yTPW51Wpqwgosr5I927aw6'
       :          '401+YfwDria4WoQwAAA=='
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
      <section anchor="example-rfc6170">
        <name>Embedded Certificate Image Example</name>
        <t>The following example displays a logotype extension containing one
Certificate Image logotype using direct addressing.  The Certificate
Image logotype uses image/svg+xml-compressed.  The logotype image
is embedded in the certificate extension with a "data:" URI and the
image is hashed by SHA-256.  This example contains the image from
Appendix B of RFC 6170, however, the media type used here is explicit
about the use of GZIP compression <xref target="RFC1952"/>.</t>
        <t>The values on the left are the ASN.1 tag (in hexadecimal) and
the length (in decimal).</t>
        <artwork><![CDATA[
30 2910: SEQUENCE {
06    8:  OBJECT IDENTIFIER logotype (1 3 6 1 5 5 7 1 12)
04 2896:  OCTET STRING, encapsulates {
30 2892:   SEQUENCE {
A3 2888:    [3] {
30 2884:     SEQUENCE {
30 2880:      SEQUENCE {
06    8:       OBJECT IDENTIFIER '1 3 6 1 5 5 7 20 3'
A0 2866:       [0] {
30 2862:        SEQUENCE {
30 2858:         SEQUENCE {
16   24:          IA5String 'image/svg+xml-compressed'
30   49:          SEQUENCE {
30   47:           SEQUENCE {
30   11:            SEQUENCE {
06    9:             OBJECT IDENTIFIER
       :              sha-256 (2 16 840 1 101 3 4 2 1)
       :              }
04   32:            OCTET STRING
       :           83 14 B3 26 9B D3 8B 0B 2A E6 6E 42 74 E2 A7 57
       :           7A 40 B7 E1 2E 53 42 44 CC 7C AE 14 68 1B 0E B6
       :             }
       :            }
30 2777:          SEQUENCE {
16 2773:           IA5String
       :          'data:image/svg+xml-compressed;base64,H4sICLXutU0'
       :          'AA0NlcnRJbWFnZURlbW8uc3ZnANVaW2/bOBZ+n19BqBigwdo'
       :          'S7xK9jmeapB0EWHQHzez2WZZoR1tZMiQ5jvvr95CSL7Gl1Em'
       :          '8C9d9iERSPOd85+O5EB3+9jhL0YMuyiTPLh3iYgfpLMrjJJt'
       :          'eOv/661M/cFBZhVkcpnmmL50sd34b/TIsH6YoiS+da11UySS'
       :          'Jwkqj21k41Q6CDbNyUMSTS+e+quYDz1sul+6SuXkx9YhSysP'
       :          'Uo7QPK/rlKqvCx35Wvmu+a/uGYow9EOigh0Qvr/LHSwcjjDj'
       :          'GiGHQ914n0/sKlMf4Vwctk7i6X7/sGEYdNA5L/WeRT5IUDKm'
       :          'SbLVWNoo2cqNCh1XyoKN8Nsuz0iqwVW8Qb1fOF0Vqp+PI06m'
       :          'e6awqPeISzxn9goYzXYVxWIUWpfWLCMwcGoLpgy83n8wzGkb'
       :          'R4GtefENmMBznC7DEroKpOBpM8mIWVqPEYGtA+BvoMfS2E5u'
       :          'F1Wqu7R6FLvNFEelWReNolpiV3l2VpGntMW9nk6RKdf0+9Br'
       :          'FrMbeVuWhtzbHvMR6UlobPyVpBWjXBk7six2vH5nCwY6nXCo'
       :          '5xb7YusvFVPqCOGh16fSxSxglmPkScLfvmDDmC4FlDc1wov8'
       :          'IF2WZhNlVumgEPRliimDD3PhGPyTgUUMC6lKqKAjxaptq1bo'
       :          'UJvQFsvi+LOJyxZkPE/vCwHuAmXmoj1AarnRBatzqkbv7cK5'
       :          'Ls2ORfwM/vsOG5lURZqXxOnDXPKZw5t5jVzIhFKO0B6D6hAR'
       :          'SXDR6Fzqq7H7mQeJAOQiUSPvFIrUHOfuui3zrFI5dYVeAmpc'
       :          'OcOb9u63vLjae4kYX4yRifYPrTa2SlMigYdO+cEWeGADMLZL'
       :          'H96SH4R9xRYApl6q3Y02f+NzlRAl+cZSKhB6qSIVa80fsqMn'
       :          'WOqZJpmsXwAPoyNaQ95uNIGasKPwhxGzQzOXzMIIzBKabmLI'
       :          'il470zfSjWWn+kvpvLQ9g1l3yRIc8gukz0uysEcakcDfy3KM'
       :          'k+l0SOXlOopltJL7EPtUlzZfP4tnM70k8xkKCySt92MwfIXP'
       :          'oTe0pnu4dYbp7hJ/kxWySN0ey0o/1qbiCsxDXJMWWo37QekB'
       :          'cAUFPSGkPCnUJF5wwBacDK5cGlEp4BC2lYoJcrNNGVc7DzIq'
       :          'xT4CKsPlrAG8mL8whRejiQe9EmImIAoz3sds9NxP4RZEzugq'
       :          'zb7c3Q89u3WQKY9aegbsA/AUJB/bJs6pfJt9BHFEuk5DWITz'
       :          'OH5uZSThLUsDjQ5GE6RMsyihMTaQLfA6BIiAQMAhnHHN1sd6'
       :          '1WtUhDVJiuhkrdBXd740+hLB9Vm1HjQe4ywLOBLWOMMiyQAX'
       :          'NB8sm9Gx2qdGgGkMG6wY8aLfqgH4dfnmrVc+pPrE/Z/QnZOs'
       :          '8C1Okb2/ggwLdxlDC1D6DFPZDD98txv8xQf5TEc7Ax6ZyaDf'
       :          '6BC4SylWKCMqtizp80+UMchATal63qHq0M3ZTs83Ob/XO6LY'
       :          'sFzpGVY5+iLxdWvwY+NaKoR/0iJIXL3dBjT2hG+wO+NXm53X'
       :          'StSh1eogfeojV35BTOaqh/cmPUe2Mdp91pQp2CjWOO2k7Oam'
       :          'hjU1HB3DLGm66n6iajz4bqn2oICmNFxDR/x2mC5s+rKhlkUA'
       :          '3Ne3P8lgP0qJfjf9uvu+HWXSfFwNoH4uqGUmTadYMtOc7yjE'
       :          'Ed9EUhkwEEOcDSHKQ+yhnSvUYRH8miQo2FK5TCjWZZGWKB8i'
       :          'HPud16wApnCvTOzjIFAj9TQdCxa+ddOTizaa1xJvD0qMrKx+'
       :          'Ydaj6iwJQG0vaSdYWpTv4HwVRAP3Z6ONjOJunEIeKRVmhujp'
       :          'A2+wPmQR9WFQAFhh9bGQzFEXX+WwOnXq8pV35P2Acdn0pGeb'
       :          'cMg7OgQKaEdOKEAkFlk/9HuEKGBVwucc4AjnJ/LBYU09hVwW'
       :          'Y1F0HlBUC2lbyIuYF58O8p+adMwUt9YAoX/IwRtAC9NAdBAy'
       :          'GuEB3VR59u8/TGYx9/Xjz8bPB/Z/F9B0SghBK+4xxfiwtr0G'
       :          'XECqedQQ9PRVpEAQ+26MidbGSmPm8RwRzcQsT17EPSmoorH3'
       :          '+av4Jcj78O/vIp/uzMEkHKAE6/F7VHHSj8HddR0Q3ymcGZfR'
       :          'VjwfmOnNn3GuWR+FzhcPmPqiptHcayacT28T8j3Cs0/LQCwo'
       :          '6J2iYxP4R58AsobjFegusoJhuq7VNS2evRPcqASvQki+gbkB'
       :          'YwETNPt/1A2pT6UErR1zMzUITZRvF5Lp5basO1fk2U4aBSjk'
       :          'ji8quL3cDyW7TpI3unxezMcSTNhQJhfpGctKgKN2Amo7/7Sh'
       :          'Sev4oXicPSYS+6GkCm9a1Qw3VEchCUA+z5HtTcbQhK6F14YF'
       :          'Up+Yn7WgmzwpZCDf5DDiXT9B7U6RdHAHpdb7IqmLVjqZSLnT'
       :          'W61zjQ7/G7D3hm9E846uTDZoNMADmLlm7IG2ieXfUtu1US9T'
       :          'eNGUHibE9Nv//2jRJGZfQmK3v7ykJJOv1IXjBsDCPpmgWppe'
       :          '6sHxR3KVSQKqp+WIqammuJbtqkxZmMHry4oS/9pLhdCXKq8u'
       :          'R0R+LDEqCKRxqc5VXdvPvIP+ggwR0RkyBfO9iKZvrWGAKVdz'
       :          '31cuocvoO/qemClFMYEFEH7oI+vpkek4s4bCMBqK+5mHQUlD'
       :          'pE/oylpy+2/6pWXK31PEYagP04epV1cE50UMy6IQZeQM7+Ol'
       :          '74Z+eHfpHNc7OjffQ/HeV0X8BopoDkGEkAAA='
       :            }
       :           }
       :          }
       :         }
       :        }
       :       }
       :      }
       :     }
       :    }
       :   }
]]></artwork>
      </section>
    </section>
    <section anchor="changes">
      <name>Changes Since RFC 3709</name>
      <t>This appendix summarizes the changes since RFC 3709.  The changes are:</t>
      <ul spacing="normal">
        <li>Combine RFC 3709 and RFC 6170 into one document, and encourage
implementers to support  the "data" URI scheme (data:...) that was
originally specified in RFC 6170.  Merging RFC 3709 and RFC 6170 lead
to many editoral changes throughout the document.</li>
        <li>Drop SHA-1 as the mandatory-to-implement hash algorithm, and encourage
use of the one-way hash function that is employed by the certificate
signature algorithm.</li>
        <li>Update the reference for language tags to be RFC 5646 instead of
the now obsolete RFC 3066.</li>
        <li>No longer require support for the FTP scheme (ftp://...) URI.</li>
        <li>Require support for the HTTP scheme (http://...) URI and the
HTTPS scheme (https://...) URI.</li>
        <li>Require support for the compressed SVG image format with the
image/svg+xml-compressed media type.</li>
        <li>Media types <bcp14>MUST</bcp14> follow the ABNF <xref target="RFC5234"/> that is
provided in Section 4.2 of <xref target="RFC4288"/>.  This change resolves
Errata ID 2679.</li>
        <li>Remove the requirement that the LogotypeData file name have
a file extension of ".LTD".  This change resolves Errata ID 2325.</li>
        <li>Provide ASN.1 modules for the older syntax <xref target="OLD-ASN1"/> and most
recent syntax <xref target="NEW-ASN1"/>.</li>
        <li>Provide additional references.</li>
        <li>Provide additional examples.</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
